CELLULAR AUTOMATA BASED KEY AGREEMENT

Debdeep Mukhopadhyay, Dipanwita RoyChowdhury

Abstract

This paper proposes a new key agreement protocol using Cellular Automata (CA). The primitives on which the protocol is based has been developed using specially designed CA structures. The paper aims at developing a key agreement technique which is not based on the Diffie-Hellman problem. The removal of exponentiations makes the protocol fast and have a linear time complexity. The protocol has been found to resist known forms of attacks. Indeed the initial review promises the development of a key agreement protocol which meets nicely the conflicting ends of security and efficiency.

References

  1. A.Menezes, P. V. O. and Vanstone, S. (1996). Handbook of Applied Cryptography, chapter 12, pages 489-541. CRC Press.
  2. Boyd, C. (1993). Hidden assumptions in cryptographic protocols. IEEE Journal of Selected Areas in Communications, 11(5):694-701.
  3. Boyd, C. and Mathuria, A. (2003). Protocols for Authentication and Key Establishment, chapter 5, pages 138- 199. Springer.
  4. Chaudhuri, P. P., Chowdhury, D., Nandi, S., and Chattopadhyay, S. (1997). Additive Cellular Automata Theory and its Application, volume 1, chapter 4. IEEE Computer Society Press.
  5. Hortensius, P. D. et al. (1989). Cellular automata based pseudo-random number generators for built-in selftest. 8(8):842-859.
  6. Mihir Bellare and Phillip Rogaway (1994). Optimal Assymetric Encryption-How to Encrypt with RSA. In Advances in Cryptology-Eurocrypt 1994. Lecture Notes in Computer Science, Vol. 950, Springer Verlag.
  7. Mukhopadhyay, D. and RoyChowdhury, D. (2004). Characterization of a class of complemented group cellular automata. In In the Proceedings of ACRI 2004, LNCS 3305. University of Amsterdam, Science Park Amsterdam, The Netherlands.
  8. Stallings, W. (2003). Cryptography and Network Security. Prentice Hall.
  9. W.Diffie and M.Hellman (1976). New Directions in Cryptography. In IEEE Transactions on Information Theory (22), pages 644-654. IEEE.
  10. Wolfram, S. (1983). Statistical mechanics of cellular automata. Rev. Mod. Phys., 55(3):601-644.
Download


Paper Citation


in Harvard Style

Mukhopadhyay D. and RoyChowdhury D. (2005). CELLULAR AUTOMATA BASED KEY AGREEMENT . In Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 1: ICETE, ISBN 972-8865-32-5, pages 262-267. DOI: 10.5220/0001412402620267


in Bibtex Style

@conference{icete05,
author={Debdeep Mukhopadhyay and Dipanwita RoyChowdhury},
title={CELLULAR AUTOMATA BASED KEY AGREEMENT},
booktitle={Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 1: ICETE,},
year={2005},
pages={262-267},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001412402620267},
isbn={972-8865-32-5},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 1: ICETE,
TI - CELLULAR AUTOMATA BASED KEY AGREEMENT
SN - 972-8865-32-5
AU - Mukhopadhyay D.
AU - RoyChowdhury D.
PY - 2005
SP - 262
EP - 267
DO - 10.5220/0001412402620267