JCA Home • Issue Contents

EnCash: An Authenticated Encryption Scheme Using Cellular Automata
Tapadyoti Banerjee and Dipanwita Roy Chowdhury

In this paper, we present a new Cellular Automata (CA) based authenticated encryption scheme, named EnCash.

Both encryption and authentication employ the simple and regular structure of CA. Encryption involves substitution and permutation. Substitution is performed by the random mapping of non-linear CA evolution whereas the permutation exploits the simple linear CA. Authentication uses a CA-based hash function that provides strong resistance against the popular multi-collision attack. Our analyses assure the security of the EnCash.

Keywords: Authenticated Encryption, Cellular Automata, Substitution-Permutation Network, Cryptanalysis

Full Text (IP)