Insights Gained after a Decade of Cellular Automata-based Cryptography

Luca Mariot
2024-05-05
Abstract:Cellular Automata (CA) have been extensively used to implement symmetric cryptographic primitives, such as pseudorandom number generators and S-boxes. However, most of the research in this field, except the very early works, seems to be published in non-cryptographic venues. This phenomenon poses a problem of relevance: are CA of any use to cryptographers nowadays? This paper provides insights into this question by briefly outlining the history of CA-based cryptography. In doing so, the paper identifies some shortcomings in the research addressing the design of symmetric primitives exclusively from a CA standpoint, alongside some recommendations for future research. Notably, the paper remarks that researchers working in CA and cryptography often tackle similar problems, albeit under different perspectives and terminologies. This observation indicates that there is still ample room for fruitful collaborations between the CA and cryptography communities in the future.
Cryptography and Security
What problem does this paper attempt to address?
### What problem does this paper attempt to solve? This paper aims to explore whether cryptography based on Cellular Automata (CA) still has practical application value today. Specifically, by reviewing CA - based cryptography research in the past decade, the author identifies some deficiencies in this field and proposes suggestions for future research. The following are the main objectives of the paper: 1. **Overview of the history**: - The paper briefly outlines the historical development of CA - based cryptography, especially how it has evolved in the CA and cryptography research communities respectively. - It emphasizes the commonalities and differences between the two communities. 2. **Identification of deficiencies**: - It lists some deficiencies in CA - based cryptography research work published in non - cryptography settings and explains why these works have limited contributions to practical applications. - It points out that much CA - based research relies on statistical or empirical tests, which are not directly related to the actual needs of cryptography and may mislead security claims. 3. **Provision of improvement suggestions**: - It provides some suggestions to alleviate the above - mentioned deficiencies and promote cooperation between the CA and cryptography research communities. - It emphasizes that when evaluating the security of CA - based cryptographic primitives, the cryptographic properties of the underlying local rules should be carefully studied, rather than relying solely on statistical tests. 4. **Emphasis on the limitations of specific models**: - It points out that it is not sufficient to claim the security of Wolfram - like PRG solely based on the cryptographic properties of local rules, because some attacks against combinator or filter models may not be applicable in the CA environment. - It suggests that the proposed CA model should be associated with specific attack types to ensure that each cryptographic property can be fully verified in the specific context of the CA model. ### Formula presentation To ensure the correctness and readability of the formulas, the following are some key formulas involved in the paper: - **Boolean function**: \( f: \{0,1\}^d \to \{0,1\} \) where \( d \) is the diameter of the cellular automaton, representing the number of neighbors (including itself) that each cell needs to look at. - **Global rule under periodic boundary conditions**: \( F(x_0, \cdots, x_{n - 1})=(f(x_{0-\omega}, \cdots, x_{0-\omega + d - 1}), \cdots, f(x_{n - 1-\omega}, \cdots, x_{n-\omega + d - 2})) \) where all indices are taken modulo \( n \), that is, \( F: \{0,1\}^n \to \{0,1\}^n \). - **Global rule without boundary conditions**: \( F(x_0, \cdots, x_{n - 1})=(f(x_0, \cdots, x_{d - 1}), f(x_1, \cdots, x_d), \cdots, f(x_{n - d}, \cdots, x_{n - 1})) \) where \( F: \{0,1\}^n \to \{0,1\}^{n - d + 1} \). ### Summary The core problem of the paper is to explore the relevance and practicality of cellular - automata - based cryptography in modern cryptography, and to provide guidance and suggestions for future research by analyzing the deficiencies of existing research.