10 research outputs found
Four Neighbourhood Cellular Automata as Better Cryptographic Primitives
Three-neighbourhood Cellular Automata (CA) are widely studied and accepted as suitable cryptographic primitive. Rule 30, a 3-neighbourhood CA rule, was proposed as an ideal candidate for cryptographic primitive by Wolfram. However, rule 30 was shown to be weak against Meier-Staffelbach attack. The cryptographic properties like diffusion and randomness increase with increase in neighbourhood radius and thus opens the avenue of exploring the cryptographic properties of 4-neighbourhood CA. This work explores whether four-neighbourhood CA can be a better cryptographic primitive. We construct a class of cryptographically suitable 4-neighbourhood nonlinear CA rules that resembles rule 30. One 4-neighbourhood nonlinear CA from this selected class is shown to be resistant against Meier-Staffelbach attack on rule 30, justifying the applicability of 4-neighbourhood CA as better cryptographic primitives
SZYFRY BLOKOWE NA PODSTAWIE ODWRACALNYCH AUTOMATĂW KOMĂRKOWYCH
The given paper is devoted to the software development of block cipher based on reversible one-dimensional cellular automata and the study of its statistical properties. The software implementation of the proposed encryption algorithm is performed in C# programming language in Visual Studio 2017. The paper presents specially designed approach for key generation. To ensure desired cryptographic stability, the shared secret parameters can be adjusted to contain information needed for creating substitution tables, defining reversible rules, and hiding final data. For the first time, it is suggested to create substitution tables based on iterations of a cellular automaton that is initialized by the key data
On the design of stream ciphers with Cellular Automata having radius = 2
Cellular Automata (CA) have recently evolved as a good cryptographic primitive. It plays an important role in the construction of new fast, efficient and secure stream ciphers. Several studies have been made on CA based stream ciphers and we observe that the cryptographic strength of a CA based stream cipher increases with the increase in the neighbourhood radii if appropriate CA rules are employed. The current work explores the cryptographic feasibility of 5-neighbourhood CA rules also referred to as pentavalent rules. A new CA based stream cipher, CARPenter, which uses pentavalent rules have been proposed. The cipher incorporates maximum length null-boundary linear CA and a non-linear CA along with a good non-linear mixing function. This is implemented in hardware as well as software and exhibits good cryptographic properties which makes the cipher resistant to almost all attacks on stream ciphers, but with the cost of additional computing requirements. This cipher uses 16 cycles for initialization, which is the least number of cycles when compared to other existing stream ciphers
Heuristic search of (semi-)bent functions based on cellular automata
An interesting thread in the research of Boolean functions for cryptography and coding theory is the study of secondary constructions: given a known function with a good cryptographic profile, the aim is to extend it to a (usually larger) function possessing analogous properties. In this work, we continue the investigation of a secondary construction based on cellular automata (CA), focusing on the classes of bent and semi-bent functions. We prove that our construction preserves the algebraic degree of the local rule, and we narrow our attention to the subclass of quadratic functions, performing several experiments based on exhaustive combinatorial search and heuristic optimization through Evolutionary Strategies (ES). Finally, we classify the obtained results up to permutation equivalence, remarking that the number of equivalence classes that our CA-XOR construction can successfully extend grows very quickly with respect to the CA diameter
Subshifts with Simple Cellular Automata
A subshift is a set of infinite one- or two-way sequences over a fixed finite set, defined by a set of forbidden patterns. In this thesis, we study subshifts in the topological setting, where the natural morphisms between them are ones defined by a (spatially uniform) local rule. Endomorphisms of subshifts are called cellular automata, and we call the set of cellular automata on a subshift its endomorphism monoid. It is known that the set of all sequences (the full shift) allows cellular automata with complex dynamical and computational properties. We are interested in subshifts that do not support such cellular automata. In particular, we study countable subshifts, minimal subshifts and subshifts with additional universal algebraic structure that cellular automata need to respect, and investigate certain criteria of âsimplicityâ of the endomorphism monoid, for each of them. In the case of countable subshifts, we concentrate on countable sofic shifts, that is, countable subshifts defined by a finite state automaton. We develop some general tools for studying cellular automata on such subshifts, and show that nilpotency and periodicity of cellular automata are decidable properties, and positive expansivity is impossible. Nevertheless, we also prove various undecidability results, by simulating counter machines with cellular automata. We prove that minimal subshifts generated by primitive Pisot substitutions only support virtually cyclic automorphism groups, and give an example of a Toeplitz subshift whose automorphism group is not finitely generated. In the algebraic setting, we study the centralizers of CA, and group and lattice homomorphic CA. In particular, we obtain results about centralizers of symbol permutations and bipermutive CA, and their connections with group structures.Siirretty Doriast
Exhaustive Generation of Linear Orthogonal Cellular Automata
We consider the problem of exhaustively visiting all pairs of linear cellular
automata which give rise to orthogonal Latin squares, i.e., linear Orthogonal
Cellular Automata (OCA). The problem is equivalent to enumerating all pairs of
coprime polynomials over a finite field having the same degree and a nonzero
constant term. While previous research showed how to count all such pairs for a
given degree and order of the finite field, no practical enumeration algorithms
have been proposed so far. Here, we start closing this gap by addressing the
case of polynomials defined over the field \F_2, which corresponds to binary
CA. In particular, we exploit Benjamin and Bennett's bijection between coprime
and non-coprime pairs of polynomials, which enables us to organize our study
along three subproblems, namely the enumeration and count of: (1) sequences of
constant terms, (2) sequences of degrees, and (3) sequences of intermediate
terms. In the course of this investigation, we unveil interesting connections
with algebraic language theory and combinatorics, obtaining an enumeration
algorithm and an alternative derivation of the counting formula for this
problem.Comment: 9 pages, 1 figure. Submitted to the exploratory track of AUTOMATA
2023. arXiv admin note: text overlap with arXiv:2207.0040
Artificial Intelligence for the design of symmetric cryptographic primitives
Algorithms and the Foundations of Software technolog
Cellular automata with complicated dynamics
A subshift is a collection of bi-infinite sequences (configurations) of symbols where some finite patterns of symbols are forbidden to occur. A cellular automaton is a transformation that changes each configuration of a subshift into another one by using a finite look-up table that tells how any symbol occurring at any possible context is to be changed. A cellular automaton can be applied repeatedly on the configurations of the subshift, thus making it a dynamical system.
This thesis focuses on cellular automata with complex dynamical behavior, with some different definitions of the word âcomplexâ. First we consider a naturally occurring class of cellular automata that we call multiplication automata and we present a case study with the point of view of symbolic, topological and measurable dynamics. We also present an application of these automata to a generalized version of Mahlerâs problem.
For different notions of complex behavior one may also ask whether a given subshift or class of subshifts has a cellular automaton that presents this behavior. We show that in the class of full shifts the Lyapunov exponents of a given reversible cellular automaton are uncomputable. This means that in the dynamics of reversible cellular automata the long term maximal propagation speed of a perturbation made in an initial configuration cannot be determined in general from short term observations.
In the last part we construct, on all mixing sofic shifts, diffusive glider cellular automata that can decompose any finite configuration into two distinct components that shift into opposing direction under repeated action of the automaton. This implies that every mixing sofic shift has a reversible cellular automaton all of whose directions are sensitive in the sense of the definition of Sablik. We contrast this by presenting a family of synchronizing subshifts on which all reversible cellular automata always have a nonsensitive direction