A5/1 Algorithm Based On Quantum-Dot Cellular Automata (QCA) Technology

  IJPTT-book-cover
 
International Journal of P2P Network Trends and Technology (IJPTT)          
 
© 2015 by IJPTT Journal
Volume - 5 Issue - 1
Year of Publication : 2015
Authors : Rashmi Chawla , Priyanka Gaur , Sunita Rani , Naresh Tanwar
  10.14445/22492615/IJPTT-V15P403

MLA

Rashmi Chawla , Priyanka Gaur , Sunita Rani , Naresh Tanwar " A5/1 Algorithm Based On Quantum-Dot Cellular Automata (QCA) Technology ". International Journal of P2P Network Trends and Technology (IJPTT), V5(1): 15-24 Jan - Feb 2015, ISSN:2249-2615, www.ijpttjournal.org, Published by Seventh Sense Research Group.

Abstract

The motivation for this paper has been basically the need of security for mobile communication which not only effects military but also personal usage. Quantum Cellular Automata (QCA) is an emerging new nano-technology that not only serves as an alternative solution to CMOS which decreases lots of physical limits and circuitry boundations [18]. QCA is a transistor-less technology and here information is passed based on the charge on electron and by mutual electrostatic repulsion between them. QCA has very high device density, faster switching speed clocking and extremely low power consumption. This paper describes the basic way to generate cipher text in QCA that can be helpful in QCA based secure nano-communication. The implementation and testing of results is performed using QCA Designer-2.0.3[4].Utilizing the QCA technology, we have implemented the A5/1 stream cipher which was the original encryption algorithm for GSM. The implementation of this cryptographic algorithm is accomplished by means of the implementation of its main modules. The key properties of the QCA implementation of A5/1 stream cipher such as latency, area and complexity are discussed in this paper [3].

References

[1] Lent, C., et l., “Quantum Cellular Automata,” Nanotechnology,Vol. 4, 1993, pp. 49–57.
[2] Quantum-dot Cellular Automata, by Weiqiang Liu, Máire O’Neill, and Earl E. Swartzlander, Jr.
[3] QCA Home Page,” website, 2013, http://www.nd.edu/~qcahome/.
[4] Walus, K., et al., “QCADesigner: A Rapid Design and Simulation Tool for Quantum-Dot Cellular Automata,” IEEE Transactions on Nanotechnology, Vol. 3, 2004, pp. 26–31.
[5] Lombardi, F., and J. Huang, Design and Test of Digital Circuits by Quantum-Dot Cellular Automata, Norwood, MA: Artech House, Inc., 2007.
[6] Frost, S., et al., “Memory in Motion: A Study of Storage Structures in QCA,” in Proceedings of 1st Workshop on Non-Silicon Computing, Vol. 2, 2002, pp. 30–37.
[7] Orlov, A., et al., “Experimental Demonstration of A Binary Wire for Quantum-Dot Cellular Automata,” Applied Physics Letters, Vol. 74, No. 19, 1999, pp. 2875–2877.
[8] Orlov, A., et al., “Experimental Demonstration of Clocked Single-Electron Switching in Quantum-Dot Cellular Automata,” Applied Physics Letters, Vol. 77, No. 2, 2000, pp. 295–297.
[9] Decoding GSM, by Magnus Glendrange, Kristian Hove, Espen Hvideberg, Master of Science in Communication Technology, June-2010
[10] A5/1 Security Project, http://reflextor.com/trac/a51, May 2010. Last accessed June 11, 2010.
[11] S. Babbage, A. Space/Time Trade off in Exhaustive Search Attacks on Stream Ciphers. In European Convention on Security and Detection, number 408 in IEEE Conference Publication, May 1995.
[12] Hardware-Based Cryptanalysis of the GSM A5/1 Encryption Algorithm, by Timo-Gendrullis, may-2008.
[13] Implementation of Cryptographic Algorithms for GSM Cellular Standard, by Ganpat University Journal Of Engineering & Technology, VOL.-1, ISSUE-1, Jan-June-2011.
[14] Raj Pandya, “Mobile and Personal Communication Systems and Services, 2001 IEEE PRESS, New York
[15] V. K. Garg, “Wireless and Personal Communication System”, 1997 Prentice Hall of India Private Ltd., New Delhi.
[16] Complexity-analysis on attacks of A5/1 by Tartu2006.
[17] A real-world attack breaking A5/1 within hours, by Timo Gendrullis, Martin Novotn´y, and Andy Rupp
[18] Quantum Dot-Cellular Automata Based Cipher Text Design for Nano-Communication, by Jadav Chandra Das, and Debashis De, 2012 International Conference on Radar, Communication and Computing (ICRCC), SKP Engineering College, Tiruvannamalai, TN., India. 21 – 22 December, 2012. pp. 224-229.
[19] International Technology Roadmap for Semiconductors,--(ITRS) 2005 [Online]. Available: hnp://www.itrs.net.
[20] R. Zhang, K. Walus, W. Wang, and G. A. Jullien, "A method of majority logic reduction for quantum cellular automata," IEEE Trans. Nanotechnol., vol. 3, no. 4, pp. 443-450, Dec. 2004.
[21] W. Porod, ―Quantum-dot devices and quantum-dot-cellular automata, Int. J. Bifurcation Chaos, vol. 7, no10, pp. 2199–2218, 1997.
[22] E.N.Ganesh1, Lal Kishore2 and M.J.S. Rangachar, ―Implementation of Quantum cellular automata combinational and sequential circuits using Majority logic reduction method, International Journal of Nanotechnology and Applications, Vol. 2, pp. 89106, Nov. 2008.
[23] C. S. Lent and B. Isaksen, ―Clocked molecular quantum dot cellular automata,‖ IEEE Trans. Electron Devices, vol. 50, no. 9, pp. 18901896, Sep.2003.1

Keywords
QCA-technology implementation, stream cipher, A5/1, GSM network, cryptography