Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Scytale An Evolutionary Cryptosystem  
  Authors : Unnikrishnan Menon; Atharva Hudlikar; Divyani Panda
  Cite as:

 

With the advent of quantum computing, and other advancements in computation and processing capabilities of modern systems, there arises a need to develop new trapdoor functions that will serve as the foundation for a new generation of encryption schemes. This paper explores the possibility of one such potential trapdoor function using concepts stemming from Reversible Cellular Automata (RCA) - specifically, the Critter's Rule set up in a Margolus Neighborhood. The proposed block encryption algorithm discusses how sensitive data can be manipulated and converted efficiently into a two dimensional sequence of bits, that can be iteratively evolved using the rules of the RCA and a private key to achieve a desirable level of encryption within a reasonable runtime. The performance benchmark and analysis results exemplify how well the proposed encryption algorithm stands against different forms of attacks.

 

Published In : IJCSN Journal Volume 9, Issue 4

Date of Publication : August 2020

Pages : 153-159

Figures :06

Tables : 02

 

Unnikrishnan Menon : Department of Electrical and Electronics Engineering, Vellore Institute of Technology Vellore, Tamil Nadu 632014, India.

Atharva Hudlikar : Department of Electrical and Electronics Engineering, Vellore Institute of Technology Vellore, Tamil Nadu 632014, India.

Divyani Panda : Department of Electrical and Electronics Engineering, Vellore Institute of Technology Vellore, Tamil Nadu 632014, India.

 

Critter's Rule, Encryption, Cryptography, Margolus Neighborhood, Cellular Automata

The idea of this paper is to introduce an original cryptosystem that utilizes an unconventional trapdoor function which is built upon the concept of Reversible Cellular Automata. The proposed algorithm requires the selection of the block size and the iterations for evolving the RCA as the private key. On a machine that works on sequential processing, it has been observed that choosing fewer iterations for evolving the RCA leads to a drastic reduction in the time it takes to encrypt, and decrypt a given message. However, security is not compromised owing to the edge wrap-around feature of the 2?? lattice that is evolved.

 

[1] Dooley, John F, " A brief history of cryptology and cryptographic algorithms", New York: Springer, 2013. [2] J. Katz, and Y. Lindell, "lntroduction to Modern Cryptography", London: Taylor & Francis Group, LLC , 2008. [3] S. Chandra, S. Paira, S. S. Alam and G. Sanyal, "A comparative survey of Symmetric and Asymmetric Key Cryptography", International Conference on Electronics, Communication and Computational Engineering (ICECCE), Hosur, 2014. [4] S. Chandra, S. Bhattacharyya, S. Paira and S. S. Alam, "A study and analysis on symmetric cryptography," International Conference on Science Engineering and Management Research (ICSEMR), Chennai, 2014, pp. 1-8 [5] Townsend Security (2018, August). AES vs. DES Encryption: Why Advanced Encryption Standard (AES) has replaced DES, 3DES and TDEA. Retrieved from https://blog.syncsort.com/2018/08/data-security/aes-vs-des-encryption-standard-3des-tdea/. [6] SolarWinds MSP (2019, July). Understanding AES 256 Encryption. Retrieved from https://www.solarwindsmsp.com/blog/aes-256-encryption-algorithm. [7] Cerda, Joaquin, Rafael Gadea, and Guillermo Paya, "Implementing a Margolus neighborhood cellular automata on a FPGA", International Work-Conference on Artificial Neural Networks. Springer, Berlin, Heidelberg, 2003. [8] Margolus, Norman, "Physics-like models of computation", Physica D: Nonlinear Phenomena 10.1-2 (1984): 81-95. [9] Bouvry, Pascal, Franciszek Seredynski, and Albert Y. Zomaya. "Application of cellular automata for cryptography." In International Conference on Parallel Processing and Applied Mathematics, Berlin, Heidelberg, 2003, pp. 447-454. [10] Iwo Bialynicki-Birula and Iwona Bialynicka-Birula, Modeling Reality: How computers mirror life. Vol. 1, Oxford University Press on Demand, 2004. [11] Anze Losdorfer Bozic and Doc. Dr. Primoz Ziherl, "Cellular Automata", Department of Mathematics and Physics University of Ljubljana, 2009. [12] Panda, D., Menon, U., & Hudlikar, A. (2020, June). Project Scytale. Retrieved from https://github.com/7divs7/Project_Scytale.