Home > JOURNALS > IJCNS > Vol. 1 > Iss. 1 (2011)
International Journal of Communication Networks and Security
Abstract
In this paper we present the equivalence of the operations involved in DES and AES algorithm with operations of cellular automata. We identify all the permutation and substitution operations involved in DES and AES algorithm and compare these operations with the cellular automata rules. Then we find that permutation operations involved in DES and AES are equivalent to linear cellular automata rules providing diffusion property of cryptography whereas substitution operations involved in DES and AES are equivalent to non linear cellular automata rules providing the confusion property of cryptography. Hence instead of using operations involved in DES and AES algorithm, we can apply linear as well as non-linear cellular automata rules in cryptography for better security and parallel processing.
Recommended Citation
Panda, Sambhu Prasad; Sahu, Madhusmita; Rout, Umesh Prasad; and Nanda, Surendra Kumar
(2011)
"Equivalence of DES and AES Algorithm with Cellular Automata,"
International Journal of Communication Networks and Security: Vol. 1
:
Iss.
1
, Article 10.
Available at:
https://www.interscience.in/ijcns/vol1/iss1/10