Skip to main content
Log in

A cryptographic and coding-theoretic perspective on the global rules of cellular automata

  • Published:
Natural Computing Aims and scope Submit manuscript

Abstract

Cellular Automata (CA) have widely been studied to design cryptographic primitives such as stream ciphers and pseudorandom number generators, focusing in particular on the properties of the underlying local rules. On the other hand, there have been comparatively fewer works concerning the applications of CA to the design of S-boxes and block ciphers, a task that calls for a study of CA global rules in terms of vectorial boolean functions. The aim of this paper is to analyze some of the most basic cryptographic criteria of the global rules of CA. We start by observing that the algebraic degree of a CA global rule equals the degree of its local rule. Then, we characterize the Walsh spectrum of CA induced by permutive local rules, from which we derive a formula for the nonlinearity of such CA. Additionally, we prove that the 1-resiliency property of bipermutive local rules transfers to the corresponding global rules. This result leads us to consider CA global rules from a coding-theoretic point of view: in particular, we show that linear CA are equivalent to linear cyclic codes, observing that the syndrome computation process corresponds to the application of the CA global rule, while the error-correction capability of the code is related to the resiliency order of the global rule.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  • Bertoni G, Daemen J, Peeters M, Assche GV (2013) Keccak. In: Proceedings of advances in cryptology—EUROCRYPT 2013, 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26–30, 2013, pp 313–314

  • Carlet C (2010a) Boolean functions for cryptography and error correcting codes. Boolean Models Methods Math Comput Sci Eng 2:257–397

    Article  MATH  Google Scholar 

  • Carlet C (2010b) Vectorial boolean functions for cryptography. Boolean Models Methods Math Comput Sci Eng 134:398–469

    Article  MATH  Google Scholar 

  • Daemen J, Rijmen V (2002) The design of Rijndael. Springer-Verlag, New York

    Book  MATH  Google Scholar 

  • Daemen J, Govaerts R, Vandewalle J (1994) An efficient nonlinear shift-invariant transformation. In: Macq B (ed) Proceedings of the 15th symposium on information theory in the Benelux, Werkgemeenschap voor Informatie-en Communicatietheorie, Citeseer, pp 108–115

  • Formenti E, Imai K, Martin B, Yunès J (2014) Advances on random sequence generation by uniform cellular automata. In: Computing with new resources—essays dedicated to Jozef Gruska on the occasion of his 80th birthday, pp 56–70

  • Kari J (2012) Basic concepts of cellular automata. In: Handbook of natural computing, pp 3–24

  • Koc CK, Apohan A (1997) Inversion of cellular automata iterations. IEE Proc Comput Digital Tech 144(5):279–284

    Article  Google Scholar 

  • Leporati A, Mariot L (2014) Cryptographic properties of bipermutive cellular automata rules. J Cell Autom 9(5–6):437–475

    MathSciNet  MATH  Google Scholar 

  • Mariot L, Leporati A (2015) On the periods of spatially periodic preimages in linear bipermutive cellular automata. In: Proceedings of cellular automata and discrete complex systems—21st IFIP WG 1.5 international workshop, AUTOMATA 2015, Turku, Finland, June 8–10, 2015, pp 181–195

  • Mariot L, Leporati A (2016) Resilient vectorial functions and cyclic codes arising from cellular automata. In: Proceedings of cellular automata—12th international conference on cellular automata for research and industry, ACRI 2016, Fez, Morocco, September 5–8, 2016, pp 34–44

  • Martin B (2008) A walsh exploration of elementary CA rules. J Cell Autom 3(2):145–156

    MathSciNet  MATH  Google Scholar 

  • McEliece R (2002) The theory of information and coding. Cambridge University Press, Cambridge

    Book  MATH  Google Scholar 

  • Meier W, Staffelbach O (1991) Analysis of pseudo random sequence generated by cellular automata. In: Proceedings of advances in cryptology—EUROCRYPT ’91, workshop on the theory and application of of cryptographic techniques, Brighton, UK, April 8–11, 1991, pp 186–199

  • Nyberg K (1994) S-boxes and round functions with controllable linearity and differential uniformity. In: Proceedings of fast software encryption: second international workshop. Leuven, Belgium, 14–16 December 1994, pp 111–130

  • Rijmen V, Barreto PSLM, Filho DLG (2008) Rotation symmetry in algebraically generated cryptographic substitution tables. Inf Process Lett 106(6):246–250

    Article  MathSciNet  MATH  Google Scholar 

  • Shannon CE (1949) Communication theory of secrecy systems. Bell Labs Tech J 28(4):656–715

    Article  MathSciNet  MATH  Google Scholar 

  • Siegenthaler T (1985) Decrypting a class of stream ciphers using ciphertext only. IEEE Trans Comput 34(1):81–85

    Article  Google Scholar 

  • Stinson DR (1995) Cryptography—theory and practice. Discrete mathematics and its applications series. CRC Press, Boca Raton

    Google Scholar 

  • Stinson DR (2004) Combinatorial designs—constructions and analysis. Springer, Berlin

    MATH  Google Scholar 

  • Ulam S (1952) Random processes and transformations. Proc Int Congr Math 2:264–275

    MathSciNet  MATH  Google Scholar 

  • Von Neumann J (1966) Theory of self-reproducing automata. Edited by Burks, Arthur W. University of Illinois Press, Champaign

    Google Scholar 

  • Wolfram S (1983) Statistical mechanics of cellular automata. Rev Mod Phys 55(3):601

    Article  MathSciNet  MATH  Google Scholar 

  • Wolfram S (1985) Cryptography with cellular automata. In: Proceedings of advances in cryptology—CRYPTO ’85, Santa Barbara, California, USA, August 18–22, 1985, pp 429–432

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Luca Mariot.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mariot, L., Leporati, A. A cryptographic and coding-theoretic perspective on the global rules of cellular automata. Nat Comput 17, 487–498 (2018). https://doi.org/10.1007/s11047-017-9635-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11047-017-9635-0

Keywords

Mathematics Subject Classification

Navigation