Insights Gained after a Decade of Cellular Automata-based Cryptography

Type: Preprint

Publication Date: 2024-05-05

Citations: 0

DOI: https://doi.org/10.48550/arxiv.2405.02875

Abstract

Cellular Automata (CA) have been extensively used to implement symmetric cryptographic primitives, such as pseudorandom number generators and S-boxes. However, most of the research in this field, except the very early works, seems to be published in non-cryptographic venues. This phenomenon poses a problem of relevance: are CA of any use to cryptographers nowadays? This paper provides insights into this question by briefly outlining the history of CA-based cryptography. In doing so, the paper identifies some shortcomings in the research addressing the design of symmetric primitives exclusively from a CA standpoint, alongside some recommendations for future research. Notably, the paper remarks that researchers working in CA and cryptography often tackle similar problems, albeit under different perspectives and terminologies. This observation indicates that there is still ample room for fruitful collaborations between the CA and cryptography communities in the future.

Locations

  • arXiv (Cornell University) - View - PDF

Similar Works

Action Title Year Authors
+ PDF Chat On the Use of Cellular Automata in Symmetric Cryptography 2006 A. Fúster-Sabater
Pino Caballero‐Gil
+ PDF Chat Secure and Computationally Efficient Cryptographic Primitive Based on Cellular Automaton 2019 Rade Vuckovac
+ A Survey on Code-Based Cryptography 2022 Violetta Weger
Niklas Gassner
Joachim Rosenthal
+ PDF Chat Code-Based Cryptography 2023 Thomas Jerkovits
Felicitas Hörmann
Hannes Bartz
+ Cellular Automata in Cryptographic Random Generators 2013 Jason Spencer
+ Lattice Gas Symmetric Cryptography 2013 Laurent Signac
+ Efficient and cryptographically secure pseudorandom number generators based on chains of hybrid cellular automata maps 2014 Radu Dogaru
Ioana Dogaru
+ Search Space Reduction of Asynchrony Immune Cellular Automata by Center Permutivity 2019 Luca Mariot
Luca Manzoni
Alberto Dennunzio
+ White-Box Cryptography 2013 Dušan Klinec
Petr Švenda
+ PDF Chat An Evaluation and Enhancement of Seredynski-Bouvry CA-based Encryption Scheme 2021 Hossein Arabnezhad
Babak Sadeghiyan
+ An Evaluation and Enhancement of Seredynski-Bouvry CA-based Encryption Scheme 2021 Hossein Arabnezhad
Babak Sadeghiyan
+ Cryptography with chaos and shadowing 2009 Nejib Smaoui
Ali Kanso
+ Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences 2010 Pino Caballero‐Gil
Amparo Fúster-Sabater
Oscar Delgado-Mohatar
+ Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences 2010 Pino Caballero‐Gil
Amparo Fúster-Sabater
Oscar Delgado-Mohatar
+ Finite Fields and Cryptography 2015 Aristeidis Kontogeorgis
Ioannis Antoniadis
Αριστείδης Κοντογεώργης
Ιωάννης Αντωνιάδης
+ Gost R 34.12-2015 (Kuznechik) analysis of a cryptographic algorithm 2023 Anvar Kabulov
Mansur Berdimurodov
+ Understanding the RSA algorithm 2023 Zhengping Luo
Ruowen Liu
Aarav Mehta
+ A reversible system based on hybrid toggle radius-4 cellular automata and its application as a block cipher 2021 Everton R. Lira
Heverton B. Macêdo
Danielli Araújo Lima
Leonardo Alt
Teresa Oliveira
+ PDF Chat Code-Based Key Encapsulation from McEliece’s Cryptosystem 2017 Edoardo Persichetti
+ PDF Chat Problems and solutions from the fourth International Students’ Olympiad in Cryptography (NSUCRYPTO) 2019 A. A. Gorodilova
Sergey Agievich
Claude Carlet
E. V. Gorkunov
Valeriya Idrisova
N. A. Kolomeec
A. V. Kutsenko
Svetla Nikova⋆
Alexey Oblaukhov
Stjepan Picek

Works That Cite This (0)

Action Title Year Authors

Works Cited by This (0)

Action Title Year Authors