A New Cryptographic Scheme Based on Cellular Automata

  • Said BouchkarenEmail author
  • Saiida Lazaar
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 381)


Some electronic data exchanged on internet are very critical and may be intercepted by malicious people for passive or active attacks; to protect these data, many cryptographic algorithms have been elaborated to ensure confidentiality and integrity. In this context we define and we implement a new secure and fast symmetric cryptographic scheme named Novel Encryption Scheme using Cellular Automata (NESCA) using irreversible cellular automata and a series of non-uniform cellular automata to generate cipher texts and to reconstruct plain texts. The process of encryption is applied on blocks of data and runs according to a number of rounds applying sub keys generated by cellular automata. To prove the reliability of the proposed system, a couple of tests are carried out and a comparison with AES-256 is presented.


AES Cellular automaton Confusion Decryption Diffusion Encryption Secret key 


  1. 1.
    Schneier, B., et al.: Applied Cryptography. Wiley (1996)Google Scholar
  2. 2.
    NIST Aes: Advanced encryption standard. Federal Information Processing Standard, FIPS-197, 12 (2001)Google Scholar
  3. 3.
    Wolfram, S: A New Kind of Science, vol. 5. Wolfram Media Champaign (2002)Google Scholar
  4. 4.
    Wolfram, S.: Cryptography with cellular automata. In: Advances in CryptologyCRYPTO85 Proceedings, pp. 429–432. Springer (1986)Google Scholar
  5. 5.
    Bouchkaren, S., Lazaar, S.: A fast cryptosystem using reversible cellular automata. Int. J. Adv. Comput. Sci. Appl. 5(5), 207–210 (2014)Google Scholar
  6. 6.
    Anghelescu, P., Ionita, S., Sofron, E.: Block encryption using hybrid additive cellular automata. In: 7th International Conference on Hybrid Intelligent Systems, 2007, HIS 2007, pp. 132–137. IEEE (2007)Google Scholar
  7. 7.
    Phani Krishna Kishore, M., Kanthi Kiran, S.: A novel encryption system using layered cellular automata. In: Proceedings of the World Congress on Engineering, vol. 1 (2011)Google Scholar
  8. 8.
    Jin, J.: An image encryption based on elementary cellular automata. Opt. Lasers Eng. 50(12), 1836–1843 (2012)CrossRefGoogle Scholar
  9. 9.
    Faraoun, K.M.: A genetic strategy to design cellular automata based block ciphers. Expert Syst. Appl. 41(17), 7958–7967 (2014)CrossRefGoogle Scholar
  10. 10.
    Faraoun, K.M.: Fast encryption of RGB color digital images using a tweakable cellular automaton based schema. Opt. Laser Technol. 64, 145–155 (2014)CrossRefGoogle Scholar
  11. 11.
    Ping, P., Feng, X., Wang, Z.-J.: Image encryption based on non-affine and balanced cellular automata. Signal Process. 105, 419–429 (2014)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.Department of Mathematics and Computing, National School of Applied Sciences of Tangier/LTIAbdelMalek Essaadi UniversityTangierMorocco

Personalised recommendations