Professional Documents
Culture Documents
REDDY K., SALIVAHANAN S. - Novel and Efficient Celular Automated Based Symmetric Key Encription Algorithm For Wireless Sensor Network
REDDY K., SALIVAHANAN S. - Novel and Efficient Celular Automated Based Symmetric Key Encription Algorithm For Wireless Sensor Network
30
International Journal of Computer Applications (0975 – 8887)
Volume 13– No.4, January 2011
31
International Journal of Computer Applications (0975 – 8887)
Volume 13– No.4, January 2011
32
International Journal of Computer Applications (0975 – 8887)
Volume 13– No.4, January 2011
determined by the above equations. traditional 1-D CA [19] which consists of three inputs, one of
them being the cell itself and other two being its neighbors.
However the output is simply one cell. Comprising of same
number of states, it is very uncertain that the one output cell can
protect the entire useful content of the three preceding input
cells. This proves that the state of the next three step cells
depends on each state of the previous cells, thus distributing the
information of the previous cells and thereby conserving the
entire information allocated to the next state of the cells.
However, the likelihood of this occurrence is not very high.
Hence, we chose the Margolus neighborhood described in
Figure 5(b).
33
International Journal of Computer Applications (0975 – 8887)
Volume 13– No.4, January 2011
cells remains fixed and when the margin lines swings by one constraints by realizing on the SPARTAN-3, xc3s1400.
square in the crosswise direction such that the odd and even
cells share boxes [20]. In Margolus neighborhood the contents 4.1 Results in MATLAB
of boxes are updated at once wholly as compared to the As discussed above, the preliminary testing was done using
traditional 1-D CA neighborhood. The rule applied to all the four MATLAB. Plain texts of size 128-bits and key length of 128 bits
cell to alter the states based D Rules, generally called as Billiard were chosen and encrypted using the proposed cipher. The
Ball Machine rules [21]. cipher text, the decrypted data and the difference between the
plain text and the cipher-text were obtained corresponding to
each plain-text. Also, for grayscale and colour images, Cipher
Block Chaining (CBC) was used, where the plain texts are
combined with the cipher text of the previous plain text before
applying the cipher. Some of the results for plain-texts being a
bit image, a grayscale image and a colour image followed in
Figure 8.
00: , 01: , 02: , 03: , Figure 8: Encryption and Decryption of Grayscale Image
4. IMPLEMENTATION OF ALGORITHM
AND RESULT ANALYSIS
Our objective of designing and implementing a 2D CA-based Figure 9: Encryption and Decryption of Color Image
symmetric-key encryption algorithm has been fulfilled.
MATLAB was used as the development and testing platform. 4.2 Basic Cryptanalysis Results
The necessary criteria for a good cipher is that the relationship
between the plain-text, the key and the cipher-text should be as With the aim of robustness assessment, rules are subjected to
involved and complex as possible, making it almost impossible various tests. One of the attractive features of CAs is, non
to decipher the plain-text from the cipher-text without the exact feasibility to judge each of its individual rule on a whole. The
key. The cipher-text on deciphering with the exact key should entire idea is that each element jointly leads to some momentous
yield the plain-text without any error. Various tests were behavior and yet cannot recognize what each individual element
performed on our proposed algorithm to ensure that both the is supposed to behave. Performance of all individual elements is
above criteria are satisfied. Our proposed algorithm was too narrowly interwoven with states of the cells in its
implemented straight forwardly by generic VHDL in Xilinx 9.1 neighborhood. Achieving robustness to a rule is based on
tool to take advantage of the parallelism inherent in our design. executing the complete CA on ―numerous‖ problems, and each
MATLAB is only a sequential programming platform whereas has its own known solution. And also necessary to verify that the
VHDL facilitates simultaneous parallel operations. The HDL given cell attains the correct ―restraining‖ state every time. A
modules were also synthesized and the equivalent hardware good estimation of the fitness and robustness of a cell is
circuitry of our algorithm was extracted. Our well-organized evaluated as the ratio of number of exact final states to the total
implementation accomplished efficient space, energy and speed number of tests. Both ―numerous‖ and ―restraining‖ have to be
34
International Journal of Computer Applications (0975 – 8887)
Volume 13– No.4, January 2011
given finite values that are adequate and realistic so as to end the Table 4.1 Basic Statistical Results
simulation in a reasonable time. Some preliminary cryptanalysis
was performed in MATLAB and its results are as follows.
35
International Journal of Computer Applications (0975 – 8887)
Volume 13– No.4, January 2011
for various block ciphers are provided in the Table 4.2. Our [2] S Tripathy and S Nandi,"LCASE: Lightweight Cellular
proposed cipher uses 128-bit plain-text block as the other Automata-based Symmetric-key Encryption‖,
ciphers use the standard 128-bit plain-text block. Our efficient International Journal of Network Security, Vol.8, No.2 ,
implementation achieves lower area expressed in terms of LUT Mar. 2009.
and considerably higher throughputs on the target platform
VIRTEX-4, XC4VL25-10ff668. Finally, power analysis are [3] Palash Sarkar, ―A Brief History of Cellular automata‖,
made on Xpower analyzer tool in Xilinx 9.1. Journal of ACM Computing Surveys (CSUR), Volume 32
Issue 1, March 2000.
The implementation results prove that our security processor
occupying 642 slices in terms of area, 169.22mW of total power [4] S. Wolfram, ―Cryptography with Cellular Automata,‖
Crypto ‘85, LNCS 218, pp. 429- 432, Springer-Verlag,
consumption and throughputs of 2136 Mbits/sec at the
1986.
maximum work frequency of 334 MHz is compatible to any
Main processor of a sensor Node in Wireless sensor networks. [5] S. Wolfram, ―Random sequence generation by cellular
Thus we have enhanced the performance of a sensor node by automata,‖ Advances in Applied Maths, vol. 7, No. 2, pp.
achieving maximum level security and efficiency regarding 123-169, 1986.
Area, Power and Throughputs.
[6] J. Daemen, and V. Rijmen, Specification for the
Table 4.2 Comparison of Hardware Complexity in terms of Advanced Encryption Standard (AES), Springer-Verlag,
4-Input LUT Count and Power consumption 2002.
36
International Journal of Computer Applications (0975 – 8887)
Volume 13– No.4, January 2011
(CAC)‖, ACRI-2002, LNCS 2513, pp. 303-314, Springer- [19] "Cellular Automata Rules Lexicon - Margolus
Verlag, 2002. Neighborhood." Free Software of mirek Wojtowicz.
http://www.mirekw.com/ca/rullex_marg.html.
[17] T. Toffoli and N. Margolus, ―Invertible cellular
automata: A review,‖ Physica D, vol. 45, pp. 229-253, [20] ―2D Reversible Cellular Automata" Lotus
(reprinted with correction as of Oct. 2001). ArtificialLife.http://www.alife.co.uk/ca/bbm/2d/.
[18] Jérôme Durand-Lose ―Representing Reversible Cellular [21] Joaquin Cerda, Rafael Gadea, and Guillermo Paya,
Automata with Reversible Block Cellular Automata‖, ―Implementing a Margolus Neighborhood Cellular
Discrete Mathematics and Theoretical Computer Science automat on FPGA‖, IWANN 2003, LNCS 2687, pp. 121-
Proceedings AA (DM-CCG), 2001, pp 145–154. 128, Springer-verlag Berlin Heidelberg, 2003.
37