Password Protected Visual Cryptography via Cellular Automaton Rule 30

Visual cryptography depends on two shares. The initial configuration, extra security bits and the number of the rule for the CA along with the number of computed steps serve as a password for a visually encrypted image. The second share could contain a pr

  • PDF / 595,379 Bytes
  • 11 Pages / 439.363 x 666.131 pts Page_size
  • 94 Downloads / 215 Views

DOWNLOAD

REPORT


Computer Engineering and Computer Science, University of Louisville, Louisville, USA 2 BMB, University of Louisville, Louisville, USA 3 Cerner Corporation, Kansas City, USA {rvyamp01,jdrebo01}@louisville.edu, [email protected]

Abstract. Visual cryptography depends on two shares. The initial configuration, extra security bits and the number of the rule for the CA along with the number of computed steps serve as a password for a visually encrypted image. The second share could contain a predefined pattern; the developed algorithm uses a snapshot of a CA after a certain number of steps to generate the predefined share. Only one of these shares has to be random. The developed encryption system is a hybrid between visual and classical cryptographic approaches. It requires less storage space compared to a standalone visual encryption system and relies on Rule 30’s tested statistically significant randomness. Keywords: Cellular Automata, CA Rule 30, Cryptography, One Time Pad, Visual Cryptography.

1

Introduction

Visual cryptography [1-2] is broad in definition and applicability [3-23], and there are many methods used in encrypting visual data. In essence, an image is converted into one or more images, which in isolation convey no information whatsoever. However, with a proper means to decrypt those images, one can display the original data. During Eurocrypt ’94, Moni Naor and Adi Shamir [1] proposed a novel visual cryptographic method. Their method was based on the one time pad system of encryption. In its most basic form an image is split into two derived images or ‘shares.’ One share acts as a key and the other as a cipher. Each one, when viewed in isolation from the other, displays no meaningful data. However, when they are superimposed a discernible image can be viewed. The advantage of their method lies in its security and practicality. It is completely secure due to the fact that without all the shares the original visual data cannot be retrieved. Also, the encrypted shares are generated in a random manner to ensure that no date can be retrieved from a single share. Its practicality on the other hand lies in computational decryption. Printing the shares on transparencies and superimposing them on top of one another will achieve the desired decryption. Y.Q. Shi (Ed.): Transactions on DHMS IX, LNCS 8363, pp. 57–67, 2014. © Springer-Verlag Berlin Heidelberg 2014

58

R.V. Yampolskiy, J.D D. Rebolledo-Mendez, and M. M. Hindi

ually builds the first share in a completely random fashiion. Visual cryptography usu Then, using the original im mage’s pixel data as well as the first share’s random piixel data, the second complemen ntary share is generated. Despite the method’s sim mplicity and practicality, the retrieval and decryption off the image requires presence of both shares. If one of the shares is missing, the decrypttion process becomes impossiblle. In addition, a single image of size n bytes has to be expanded, first by doubling eaach side and then by multiplying that by two. If we can find a method that can