Download Now Free registration required
This paper presents a new stream cipher for data security, which is based on permutation of the data and replacement of the data values. Permutation is done by scan patterns generated by the SCAN approach. The replacement of data values using variable ordered recursive Cellular Automata (CA) substitutions. To achieve this aim, an encryption-specific SCAN technique was firstly developed, 2-D hybrid CA was next built, and then 1st-ordered and 2nd-ordered generalized CA transforms were introduced to build variable ordered recursive CA substitutions.
- Format: PDF
- Size: 915.11 KB