• Title/Summary/Keyword: 여원 CA

Search Result 25, Processing Time 0.019 seconds

Characterization of SACA over GF(2$^{p}$) (GF(2$^{p}$) 위에서의 SACA의 특성화)

  • Choi, Un-Sook;Cho, Sung-Jin;Hwang, Yoon-Hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.335-338
    • /
    • 2005
  • Though GF(2) CA can only handle data with bit units, GF(2$^{p}$) CA can handle data with byte units. In this paper we analyze the state-transition of nongroup cellular automata(CA) with a single attractor over GF(2$^{p}$). And we propose the constructing method of the state-transition diagram of a linear SACA over GF(2$^{p}$) by using the concept of basic path. Also we propose the state-transition diagram of the nonlinear complemented SACA by using the state-transition diagram of a linear SACA.

  • PDF

Behavior of additive MACA (Additive MACA의 행동에 관한 연구)

  • Cho, Sung-Jin;Kim, Han-Doo;Choi, Un-Sook;Kim, Kwang-Seok;Rhee, Kyung-Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04b
    • /
    • pp.747-750
    • /
    • 2001
  • 직전자수가 2개인 nongroup CA 중 전이행렬의 최소다항식이 $x^d$(x+1)인 선형 MACA의 행동을 분석하고 그 tree를 구성하는 알고리즘을 제안한다. 또한 선형 MACA의 0-tree에서 0이 아닌 상태를 여원으로 갖는 또 하나의 MACA의 행동을 밝혔다.

  • PDF

Perfect Hashing Algorithm Using TPSACA (TPSACA를 이용한 완전 해싱 알고리즘)

  • 김석태;이석기;최언숙;조성진
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.6
    • /
    • pp.1047-1054
    • /
    • 2004
  • One of the fundamental problems in computer science is how to store information so that it can be searched and retrieved efficiently. Hashing is a technique which solves this problem. In this paper, we propose a tree construction algorithm using linear two-predecessor single attractor cellular automata C and its complemented cellular automata. Also by using the concept of MRT we give a perfect hasing algorithm based on C.

Color Image Encryption using MLCA and Transformation of Coordinates (MLCA와 좌표변환을 이용한 컬러 영상의 암호화)

  • Yun, Jae-Sik;Nam, Tae-Hee;Cho, Sung-Jin;Kim, Seok-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.6
    • /
    • pp.1469-1475
    • /
    • 2010
  • This paper presents a problem of existing encryption methods using pseudo-random numbers based on MLCA or complemented MLCA and proposes a method to resolve this problem. The existing encryption methods have a problem which the edge of original image appear on encrypted image because the image have color similarity of adjacent pixels. In this proposed method, we transform the value and spatial coordinates of all pixels by using pseudo-random numbers based on MLCA. This method can resolve the problem of existing methods and improve the level of encryption by encrypting pixel coordinates and pixel values of original image. The effectiveness of the proposed method is proved by conducting histogram and key space analysis.

Color Image Encryption using MLCA and Bit-oriented operation (MLCA와 비트 단위 연산을 이용한 컬러 영상의 암호화)

  • Yun, Jae-Sik;Nam, Tae-Hee;Cho, Sung-Jin;Kim, Seok-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.141-143
    • /
    • 2010
  • This paper presents a problem of the existing encryption method using MLCA or complemented MLCA and propose a method to resolve this problem. With the existing encryption methods, the result of encryption is affected by the original image because of spatial redundancy of adjacent pixels. In this proposed method, we transform spatial coordinates of all pixels into encrypted coordinates. We also encrypt color values of the original image by operating XOR with pseudo-random numbers. This can solve the problem of existing methods and improve the levels of encryption by randomly encrypting pixel coordinates and pixel values of original image. The effectiveness of the proposed method is proved by conducting histogram, key space analysis.

  • PDF