CELLULAR AUTOMATA BASED KEY AGREEMENT
Debdeep Mukhopadhyay, Dipanwita RoyChowdhury
2005
Abstract
This paper proposes a new key agreement protocol using Cellular Automata (CA). The primitives on which the protocol is based has been developed using specially designed CA structures. The paper aims at developing a key agreement technique which is not based on the Diffie-Hellman problem. The removal of exponentiations makes the protocol fast and have a linear time complexity. The protocol has been found to resist known forms of attacks. Indeed the initial review promises the development of a key agreement protocol which meets nicely the conflicting ends of security and efficiency.
References
- A.Menezes, P. V. O. and Vanstone, S. (1996). Handbook of Applied Cryptography, chapter 12, pages 489-541. CRC Press.
- Boyd, C. (1993). Hidden assumptions in cryptographic protocols. IEEE Journal of Selected Areas in Communications, 11(5):694-701.
- Boyd, C. and Mathuria, A. (2003). Protocols for Authentication and Key Establishment, chapter 5, pages 138- 199. Springer.
- Chaudhuri, P. P., Chowdhury, D., Nandi, S., and Chattopadhyay, S. (1997). Additive Cellular Automata Theory and its Application, volume 1, chapter 4. IEEE Computer Society Press.
- Hortensius, P. D. et al. (1989). Cellular automata based pseudo-random number generators for built-in selftest. 8(8):842-859.
- Mihir Bellare and Phillip Rogaway (1994). Optimal Assymetric Encryption-How to Encrypt with RSA. In Advances in Cryptology-Eurocrypt 1994. Lecture Notes in Computer Science, Vol. 950, Springer Verlag.
- Mukhopadhyay, D. and RoyChowdhury, D. (2004). Characterization of a class of complemented group cellular automata. In In the Proceedings of ACRI 2004, LNCS 3305. University of Amsterdam, Science Park Amsterdam, The Netherlands.
- Stallings, W. (2003). Cryptography and Network Security. Prentice Hall.
- W.Diffie and M.Hellman (1976). New Directions in Cryptography. In IEEE Transactions on Information Theory (22), pages 644-654. IEEE.
- Wolfram, S. (1983). Statistical mechanics of cellular automata. Rev. Mod. Phys., 55(3):601-644.
Paper Citation
in Harvard Style
Mukhopadhyay D. and RoyChowdhury D. (2005). CELLULAR AUTOMATA BASED KEY AGREEMENT . In Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 1: ICETE, ISBN 972-8865-32-5, pages 262-267. DOI: 10.5220/0001412402620267
in Bibtex Style
@conference{icete05,
author={Debdeep Mukhopadhyay and Dipanwita RoyChowdhury},
title={CELLULAR AUTOMATA BASED KEY AGREEMENT},
booktitle={Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 1: ICETE,},
year={2005},
pages={262-267},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001412402620267},
isbn={972-8865-32-5},
}
in EndNote Style
TY - CONF
JO - Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 1: ICETE,
TI - CELLULAR AUTOMATA BASED KEY AGREEMENT
SN - 972-8865-32-5
AU - Mukhopadhyay D.
AU - RoyChowdhury D.
PY - 2005
SP - 262
EP - 267
DO - 10.5220/0001412402620267