2D- Cellular Automata Linear Rules for Cryptography Based on Pattern Evolution

Provided by: ISR JOURNALS
Topic: Mobility
Format: PDF
In the fast growing Information and Communication Technology (ICT) challenge of data security is emerging out predominantly due to flow of vital data on the wired and wireless networks. Cryptosystems have been designed with various techniques of text encryption and decryption. Easy key encryptions have low level of attack immunity while as complex keys although more resistant to attacks have other drawbacks of occupying more memory space and low speed of encoding and decoding. Cryptosystems have been designed with the help of pseudo sequence generation property of cellular automata too and found relevant due to easy VLSI implementation.

Find By Topic