In the past few years organization have widely adopted local area network (LAN), wide area network (WAN) and internet to take advantages of advancement in technology1, 2. As a result of connecting private and internal network to the outside network, exchange of information is greatly facilitated. Individuals and organization worldwide can reach any point on the network through internet without regard to geographic boundaries or time of day3. However, along with the convenience and easy access to information, connecting private and internal network to outside untrusted networks bring new risks. Among them are the risks that valuable information will be lost, stolen, corrupted or misused by malicious people trying to gain some benefit or harm someone. Such an attack to an information system may be a passive attack or it may be an active attack. In passive attack, the principal goal of the attacker is to obtain information that is being transmitted. So passive attacker are of the nature of eavesdropping or monitoring of transmissions. In active attack, the attacker may want to modify the information or can send a false data stream to misguide the recipient of the message. It may be in the form of masquerading, when one entity pretends to be a different entity, or it may be in the form of modification messages.
[...] Here, only one dimensional cellular automata is considered where the CA is a linear array of cells and each cell depend on its left and right neighbor. The next state of a particular one dimensional cellular automation is shown in figure 1. For n-cell one dimensional cellular automata, the linear operator is a (nxn) matrix whose i-th row corresponds to the neighborhood relation of the i-th cell. This matrix is denoted as T and it is called the characteristics matrix of the cell cellular automata. [...]
[...] Table 1 CA rules with XOR logic Table 2 Five neighborhood dependency Top Left Self Right Bottom As only linear one dimensional Ca is considered, the two dimensional array is not discussed in detail Authentication Of The Data Transmitted Between Sender And Receiver In addition to message confidentiality, message authentication is an important network security function. Encryption protects against passive attack (eavesdropping) A. different requirement is to protect against active attack (falsification of data and transactions) Protection against such attacks is provided by message authentication. [...]
[...] Figure 5 Design of an individual cell of programmable cellular automata Figure 6 A 4 bit 90-150 programmable cellular automata Figure 7 overall architecture of a 4 bit 90-150 programmable cellular automata During transmission M is set to 0 and so at this time data is loaded into data register and as a result according to each bit, the PCA is set to 90 rule or 150 rule. During recovering data, ie, at this receiver, M is set to 1 and all PCAs are configured at 150 rule. [...]
[...] In this method, alone way hash function is used which computes a fixed length bit stream from an arbitrary along piece of plain text. Computing the message digest from plain text is a much faster process than encrypting the plain text which a public key algorithm and hence message digest can be used to speed up the digital signature algorithms. In this paper, a scheme based on two predecessor single attractor (TPSA), cellular automata is given which performs the function of authentication by digital signature and can also provide other basic security requirement like confidentiality. [...]
[...] Thus, the confidentiality of the message is obtained The Authentication and Security Protocol Suppose A wants to communicate with B. Then A Chooses a large random number and generates a tag from their shared secret key considering the first column of the data matrix formed from his chosen number. A then sends his identify and the tag and the data matrix sequence. B on receiving the message from separates the data matrix and from that generates the tag from the secret key that is known. [...]
APA Style reference
For your bibliographyOnline reading
with our online readerContent validated
by our reading committee