The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Cryptographic Techniques Based on Bio-Inspired Systems
Abstract
In this chapter, bio-inspired techniques based on the cellular automata (CAs) and programmable cellular automata (PCAs) theory are used to develop information security systems. The proposed cryptosystem is composed from a combination of a CA as a pseudorandom number generator (PRNG) and a PCA that construct the ciphering functions of the designed enciphering scheme. It is presented how simple elements named „cells” interact between each other using certain rules and topologies to form a larger system that can be used to encrypt/decrypt data sent over network communication systems. The proposed security system was implemented in hardware in FPGA devices of type Spartan 3E – XC3S500E and was analyzed and verified, including NIST statistical tests, to assure that the system has good security and high speed. The experimental results proves that the cryptographic techniques based on bio-inspired algorithms provides an alternative to the conventional techniques (computational methods).
Related Content
Qais Al-Na'amneh, Rahaf Hazaymih, Tasnim Al-Harasis, Mohammed Amin Almaiah, Mahmoud Aljawarneh, Braa Qadoumi, Shahid Munir Shah.
© 2025.
28 pages.
|
K. G. Anilkumar, D. Muhammad Noorul Mubarak.
© 2025.
12 pages.
|
Tuqa Al-Makkawi, Ayoub Alsarhan, Qais Al-Na'amneh, Mohammad Aljaidi, Mohammed Amin Almaiah, Mahmoud AlJamal, Rabee Alqura'n, Mahmoud Aljawarneh.
© 2025.
20 pages.
|
Qais Al-Na'amneh, Walid Dhifallah, Rahaf Hazaymih, Tasnim Al-Harasis, Mohammed Amin Almaiah, Braa Qadoumi, Ayoub Alsarhan.
© 2025.
16 pages.
|
Brijesh Yadav, Vishal Jain.
© 2025.
36 pages.
|
Malak Al-Majali, Mohammad Aljaidi, Qais Al-Naamneh, Ghassan Samara, Ayoub Alsarhan, Braa Qadoumi.
© 2025.
14 pages.
|
S. Indra Priyadharshini, T. V. Padmavathy, D. Shiny Irene.
© 2025.
18 pages.
|
|
|