New Possibilities for Cellular Automata in Cryptography
|
|
- Kerrie Armstrong
- 5 years ago
- Views:
Transcription
1 New Possibilities for Cellular Automata in Cryptography Mauro Tardivo Filho Marco A. A. Henriques Faculty of Electrical and Computer Engineering University of Campinas Sao Paulo - Brazil
2 Overview 1. History 2. Cellular Automata 3. Chaotic Cellular Automata 4. Application of Chaotic Cellular Automata in Cryptography 5. Parallelism in Cellular Automata 1. Mechanisms of parallelism 2. Results 6. New results 7. Conclusion 2
3 History Universal copier and constructor (1940s): Stanislaw Ulam: growth of crystals; John von Neumann: self-replicating systems in robotics. John Conway: Game of Life (1970s) Stephen Wolfram: analyzed the behavior and complexity of cellular automata (1983). 3
4 Elementary Cellular Automata (CA) Discrete dynamic system neighborhood radius r s states synchronous evolution depending on rule R r States (s) = 0 t t+1 D=1, r=1, = 1 t+2 4 N c= 2
5 CA Rules One-dimensional CA: next state of cell i: Example: Rule 3010 = 1E16 = Time 5
6 CA evolution Evolution depends strongly on initial conditions and rule used 1-D Time 2-D Source: Wolfram, A New 6 Kind of Science, 2002
7 Chaotic Behaviour Some rules cause a chaotic behaviour => Chaotic CA (CCA) The difference between the evolutions from two similar initial states increases with respect to time; consequence: great dependence on initial conditions. future states cannot be predicted unless doing a state by state calculation; cost to obtain previous states can be made very high, increasing the number of CA cells and/or the radius r. 7
8 Chaotic CA Evolution Very similar conditions can led to very different final states Time 8
9 Computational Unpredictability and Irreversibility Prediction: impossible Time Reversion: costly 9
10 Applications of CCA in Cryptography Random Number Generators Hash Algorithms Input/Seed Input Input k-iterations Output Output Output 1 st generation 2 nd generation n th generation 1
11 Applications of CCA in Cryptography Example: Vernam cipher key generator Seed Plain Text: Hello World k-iterations = Cipher Text: 1 9aHew(d0=M$
12 CA robustness Bao (2003) showed vulnerabilities in CA cryptosystems: they can be predictable. Solutions: use different rules for differente cells (Hybrid CA); increase number of cells (N), neighborhood radius (r) or number of iterations (k); use rules with good chaotic behaviour. 1
13 What is good, can become better? 1
14 Parallelism in CA The evolution of CA can be calculated using parallel processing: take advantage of multicore processors; increase performance N=20, r = 11, 4 cores 1
15 Parallel CA Experiments Large CA simulated using parallelism number of cells: 2 7 <= N <= 2 18 ( k bits) cores: 2 rule: 3010 = 1E16 iterations: k = 2N parallel C libraries: OpenMP PThreads 1
16 Results (1) Runtime as a function of the input size (2 cores) time decreases 1
17 Results (2) Speedup as a function of the (log2) input size (2 cores) Speedupmax=1.65 Gain over singleprocessing 1
18 New Results Impact of radius r on parallel processing of CAs Algorithm optimization 1
19 Impact of radius r on processing parallel CA Each of p cores, will read ((N/p) + 2r) cells at each iteration. r r The cells on the gray area are shared by two t+1 t cores for reading, but not for writing ==> t+2 synchronization is easier. r=1 1
20 Problem using larger radius r Problems: Memory access bottleneck t r r Cores will need more time to t+1 t+2 synchronize r=4 2
21 Algorithm Optimization A pseudo-random number (bit) generator can be obtained from the central cell during the CA evolution. N In this case, fewer cell states need to be calculated => black areas cells can be ignored. Number of states to update: Traditional: N*k Optimized: N*(k - h/2) k-iterations h 2
22 Computational effort reduction Reduction of steps as a function of number of iterations k and radius r 2
23 Conclusions CAs have good characteristics to be used as random number generators and hash functions. However, they need adequate sizes and good set of rules. Popularity of multicore processors (even on mobile devices) is increasing the adoption of parallel processing. CA can be easily implemented and scaled in parallel architectures. However, experiments indicate that the choice of appropriate mapping and programming tools is crucial to the success of a parallel implementation. Some optimizations can be made to reduce the volume of calculation needed and the actual reduction depends strongly on the size and other CA parameters. 2
24 Future Works New research efforts are needed to better understand: the strength of CA with larger neighborhoods (radius); the real benefits that can be obtained from parallel processing techniques in multicore enviroments; the impacts of a CA parallel implementation on the overall system security. 2
25 Thank You! Gracias! Obrigado! about.me/maurotfilho 2
26 Boundary Conditions At the extremes of each line, where the neighboring cells are not physically adjacent, we use one of the following approaches: Null Neighbourhood t t+1 t+2 Cyclic Neighbourhood t N t+1 = 0 = 1 2
27 CA Important Facts Szaban et. al (2006) implemented a Genetic Algorithm (GA) which found sets of rules for CA with good non-linearity and randomness, using neighborhoods of radii 1 and 2. As a future work, larger neighborhoods can be explored to possible find better rules. 2
28 References Petre Anghelescu, Silviu Ionita, and Ionel Bostan. Design of programmable cellular automata based cipher scheme World Congress on Nature & Biologically Inspired Computing (NaBIC), pages , Blaise Barney. Posix threads programming. Debasis, Das and Abhishek Ray. A Parallel Encryption Algorithm for Block Ciphers Based on Reversible Programmable Cellular Automata. Journal of Computer Science, 1(1):82 90, Martin Gardner. The fantastic combinations of John Conway s new solitaire game "life". Scientific American, 1(223): , Juan Pedro Hecht. Autómatas celulares caóticos en la generación de funciones. IV Congreso Iberoamericano de Seguridad Informática CIBSI 07, pages , K J Jegadish Kumar, K Chenna Kesava, and S Salivahanan. Novel and Efficient Cellular Automata based Symmetric Key Encryption Algorithm for Wireless Sensor Networks. International Journal, 13(4), T. G. Mattos and J. G. Moreira. Universality classes of chaotic cellular automata. Brazilian Journal of Physics, 34(2a): , June S.Nandi, B.K.Kar, and P. Pal Chaudhuri. Theory and applications of cellular automata in cryptography. IEEE Transactions on Computers, 43(12): , The OpenMP API specification for parallel programming. specifications/. Tommaso Toffoli and Norman Margolus. Invertible cellular automata: A review. Physica D 45, pages , Stanislaw Ulam. Random process and transformations. Proceedings of the International Congress on Mathematics, Vol. 2 (1952): , John von Neumann. The general and logical theory of automata. Collected Works, 5:288, John von Neumann. Theory of Self- Reproducing Automata. University of Illinois, Urbana, Stephen Wolfram. Theory and applications of cellular automata. Rev. Mod. Physica, 55(601), Stephen Wolfram. Universality and complexity in cellular automata. Physica D10, Stephen Wolfram. Random sequence generation by cellular automata. Adv Appl Math, 7:123, Stephen Wolfram. A New Kind of Science. Wolfram Media, Inc,
Image Encryption and Decryption Algorithm Using Two Dimensional Cellular Automata Rules In Cryptography
Image Encryption and Decryption Algorithm Using Two Dimensional Cellular Automata Rules In Cryptography P. Sanoop Kumar Department of CSE, Gayatri Vidya Parishad College of Engineering(A), Madhurawada-530048,Visakhapatnam,
More informationCellular automata are idealized models of complex systems Large network of simple components Limited communication among components No central
Cellular automata are idealized models of complex systems Large network of simple components Limited communication among components No central control Complex dynamics from simple rules Capability of information
More informationCellular Automata. and beyond. The World of Simple Programs. Christian Jacob
Cellular Automata and beyond The World of Simple Programs Christian Jacob Department of Computer Science Department of Biochemistry & Molecular Biology University of Calgary CPSC / MDSC 605 Fall 2003 Cellular
More informationCellular Automata. ,C ) (t ) ,..., C i +[ K / 2] Cellular Automata. x > N : C x ! N. = C x. x < 1: C x. = C N+ x.
and beyond Lindenmayer Systems The World of Simple Programs Christian Jacob Department of Computer Science Department of Biochemistry & Molecular Biology University of Calgary CPSC 673 Winter 2004 Random
More informationMotivation. Evolution has rediscovered several times multicellularity as a way to build complex living systems
Cellular Systems 1 Motivation Evolution has rediscovered several times multicellularity as a way to build complex living systems Multicellular systems are composed by many copies of a unique fundamental
More informationProcedures for calculating reversible one-dimensional cellular automata
Procedures for calculating reversible one-dimensional cellular automata Juan Carlos Seck Tuoh Mora Sergio V. Chapa Vergara Genaro Juárez Martínez Departamento de Ingeniería Eléctrica, Sección Computación,
More informationApplications of Two Dimensional Cellular Automata rules for Block Cipher in Cryptography
Applications of Two Dimensional Cellular Automata rules for Block Cipher in Cryptography Sambhu Prasad Panda 1, Madhusmita Sahu 2, Manas Kumar Swain 3 C V Raman Computer Academy 1,2, C V Raman College
More informationCellular Automata. History. 1-Dimensional CA. 1-Dimensional CA. Ozalp Babaoglu
History Cellular Automata Ozalp Babaoglu Developed by John von Neumann as a formal tool to study mechanical self replication Studied extensively by Stephen Wolfram ALMA MATER STUDIORUM UNIVERSITA DI BOLOGNA
More informationMitchell Chapter 10. Living systems are open systems that exchange energy, materials & information
Living systems compute Mitchell Chapter 10 Living systems are open systems that exchange energy, materials & information E.g. Erwin Shrodinger (1944) & Lynn Margulis (2000) books: What is Life? discuss
More informationStream Ciphers. Çetin Kaya Koç Winter / 20
Çetin Kaya Koç http://koclab.cs.ucsb.edu Winter 2016 1 / 20 Linear Congruential Generators A linear congruential generator produces a sequence of integers x i for i = 1,2,... starting with the given initial
More informationarxiv: v1 [cs.fl] 17 May 2017
New Directions In Cellular Automata arxiv:1705.05832v1 [cs.fl] 17 May 2017 Abdulrhman Elnekiti Department of Computer Science University of Turkish Aeronautical Association 11 Bahcekapi, 06790 Etimesgut
More informationOptimization of 1D and 2D Cellular Automata for Pseudo Random Number Generator.
IOSR Journal of VLSI and Signal Processing (IOSR-JVSP) Volume 4, Issue 6, Ver. I (Nov - Dec. 2014), PP 28-33 e-issn: 2319 4200, p-issn No. : 2319 4197 Optimization of 1D and 2D Cellular Automata for Pseudo
More informationEncryption And Decryption Algorithm Using Two Dimensional Cellular Automata Rules And 1D CA Based S-Box (1D Rule-30) In Cryptography
International Refereed Journal of Engineering and Science (IRJES) ISSN (Online) 2319-183X, (Print) 2319-1821 Volume 1, Issue 2 (October 2012), PP.25-36 Encryption And Decryption Algorithm Using Two Dimensional
More informationExtension of cellular automata by introducing an algorithm of recursive estimation of neighbors
Extension of cellular automata by introducing an algorithm of recursive estimation of neighbors Yoshihiko Kayama BAIKA Women s University, Japan (Tel: 81-72-643-6221, Fax: 81-72-643-8473) kayama@baika.ac.jp
More informationII. Cellular Automata 8/27/03 1
II. Cellular Automata 8/27/03 1 Cellular Automata (CAs) Invented by von Neumann in 1940s to study reproduction He succeeded in constructing a self-reproducing CA Have been used as: massively parallel computer
More informationWeak Key Analysis and Micro-controller Implementation of CA Stream Ciphers
Weak Key Analysis and Micro-controller Implementation of CA Stream Ciphers Pascal Bouvry 1, Gilbert Klein 1, and Franciszek Seredynski 2,3 1 Luxembourg University Faculty of Sciences, Communication and
More informationII. Spatial Systems. A. Cellular Automata. Structure. Cellular Automata (CAs) Example: Conway s Game of Life. State Transition Rule
II. Spatial Systems A. Cellular Automata B. Pattern Formation C. Slime Mold D. Excitable Media A. Cellular Automata 1/18/17 1 1/18/17 2 Cellular Automata (CAs) Invented by von Neumann in 1940s to study
More informationSorting Network Development Using Cellular Automata
Sorting Network Development Using Cellular Automata Michal Bidlo, Zdenek Vasicek, and Karel Slany Brno University of Technology, Faculty of Information Technology Božetěchova 2, 61266 Brno, Czech republic
More informationCellular Automata. Jason Frank Mathematical Institute
Cellular Automata Jason Frank Mathematical Institute WISM484 Introduction to Complex Systems, Utrecht University, 2015 Cellular Automata Game of Life: Simulator: http://www.bitstorm.org/gameoflife/ Hawking:
More informationCELLULAR AUTOMATA WITH CHAOTIC RULE FORMATION AND ITS CHARACTERISTICS ABSTRACT
CELLULAR AUTOMATA WITH CHAOTIC RULE FORMATION AND ITS CHARACTERISTICS Christopher Immanuel W * 1 Paul Mary Deborrah S 2 Samuel Selvaraj R 3 * Research and Development Centre, Bharathiar University, Coimbatore
More informationII. Spatial Systems A. Cellular Automata 8/24/08 1
II. Spatial Systems A. Cellular Automata 8/24/08 1 Cellular Automata (CAs) Invented by von Neumann in 1940s to study reproduction He succeeded in constructing a self-reproducing CA Have been used as: massively
More informationA Colorful Introduction to Cellular Automata
A Colorful Introduction to Cellular Automata Silvio Capobianco February 5, 2011 Revised: February 10, 2011 Silvio Capobianco () February 5, 2011 1 / 37 Overview Cellular automata (ca) are local presentations
More informationIntroduction. Spatial Multi-Agent Systems. The Need for a Theory
Introduction Spatial Multi-Agent Systems A spatial multi-agent system is a decentralized system composed of numerous identically programmed agents that either form or are embedded in a geometric space.
More informationREALIZATION OF A TRI-VALUED PROGRAMMABLE CELLULAR AUTOMATA WITH TERNARY OPTICAL COMPUTER
INTERNATIONAL JOURNAL OF NUMERICAL ANALYSIS AND MODELING Volume 9, Number 2, Pages 304 311 c 2012 Institute for Scientific Computing and Information REALIZATION OF A TRI-VALUED PROGRAMMABLE CELLULAR AUTOMATA
More informationExercise 4: Markov Processes, Cellular Automata and Fuzzy Logic
Exercise 4: Markov Processes, Cellular Automata and Fuzzy Logic Formal Methods II, Fall Semester 2013 Distributed: 8.11.2013 Due Date: 29.11.2013 Send your solutions to: tobias.klauser@uzh.ch or deliver
More informationModelling with cellular automata
Modelling with cellular automata Shan He School for Computational Science University of Birmingham Module 06-23836: Computational Modelling with MATLAB Outline Outline of Topics Concepts about cellular
More informationChaos, Complexity, and Inference (36-462)
Chaos, Complexity, and Inference (36-462) Lecture 10 Cosma Shalizi 14 February 2008 Some things you can read: [1] is what got me interested in the subject; [2] is the best introduction to CA modeling code
More informationJustine Seastres. Cellular Automata and the Game of Life
Justine Seastres Saint Mary s College of California Department of Mathematics May 16, 2016 Cellular Automata and the Game of Life Supervisors: Professor Porter Professor Sauerberg 2 Contents 1 Introduction
More informationThe Game (Introduction to Digital Physics) *
The Game (Introduction to Digital Physics) * Plamen Petrov ppetrov@digitalphysics.org In the present brief article we introduce the main idea of Digital Physics in the form of an abstract game. 1 Introduction
More informationbiologically-inspired computing lecture 12 Informatics luis rocha 2015 INDIANA UNIVERSITY biologically Inspired computing
lecture 12 -inspired Sections I485/H400 course outlook Assignments: 35% Students will complete 4/5 assignments based on algorithms presented in class Lab meets in I1 (West) 109 on Lab Wednesdays Lab 0
More informationBio-inspired Models of Computation Seminar. Daniele Sgandurra. 16 October 2009
Bio-inspired Models of Computation Seminar Università di Pisa 16 October 2009 Outline Introduction Motivation History Cellular Systems Wolfram Classes Variants and Extensions Extended Topics Garden of
More informationTwo-state, Reversible, Universal Cellular Automata In Three Dimensions
Two-state, Reversible, Universal Cellular Automata In Three Dimensions Daniel B. Miller and Edward Fredkin Carnegie Mellon University West Coast Campus Bldg 23, Nasa Research Park Moffett Field, CA 94035
More informationIntroduction to Artificial Life and Cellular Automata. Cellular Automata
Introduction to Artificial Life and Cellular Automata CS405 Cellular Automata A cellular automata is a family of simple, finite-state machines that exhibit interesting, emergent behaviors through their
More informationOn Elementary and Algebraic Cellular Automata
Chapter On Elementary and Algebraic Cellular Automata Yuriy Gulak Center for Structures in Extreme Environments, Mechanical and Aerospace Engineering, Rutgers University, New Jersey ygulak@jove.rutgers.edu
More informationChaos, Complexity, and Inference (36-462)
Chaos, Complexity, and Inference (36-462) Lecture 10: Cellular Automata Cosma Shalizi 12 February 2009 Some things you can read: Poundstone (1984) is what got me interested in the subject; Toffoli and
More informationCellular Automata CS 591 Complex Adaptive Systems Spring Professor: Melanie Moses 2/02/09
Cellular Automata CS 591 Complex Adaptive Systems Spring 2009 Professor: Melanie Moses 2/02/09 Introduction to Cellular Automata (CA) Invented by John von Neumann (circa~1950). A cellular automata consists
More informationFrom Glider to Chaos: A Transitive Subsystem Derived From Glider B of CA Rule 110
From Glider to Chaos: A Transitive Subsystem Derived From Glider B of CA Rule 110 Pingping Liu, Fangyue Chen, Lingxiao Si, and Fang Wang School of Science, Hangzhou Dianzi University, Hangzhou, Zhejiang,
More informationDiscrete Tranformation of Output in Cellular Automata
Discrete Tranformation of Output in Cellular Automata Aleksander Lunøe Waage Master of Science in Computer Science Submission date: July 2012 Supervisor: Gunnar Tufte, IDI Norwegian University of Science
More informationo or 1. The sequence of site values is the "configuration" of the cellular automaton. The cellular
Physica loo (1984) vii- xii North-Holland. Amsterdam VlI PREFACE Stephen WOLFRAM The Institute /or Advanced Study, Princeton, NJ 08540, USA 1. Introduction Differential equations form the mathematical
More informationIntroduction to Scientific Modeling CS 365, Fall 2011 Cellular Automata
Introduction to Scientific Modeling CS 365, Fall 2011 Cellular Automata Stephanie Forrest ME 214 http://cs.unm.edu/~forrest/cs365/ forrest@cs.unm.edu 505-277-7104 Reading Assignment! Mitchell Ch. 10" Wolfram
More informationDesigning Cellular Automata Structures using Quantum-dot Cellular Automata
Designing Cellular Automata Structures using Quantum-dot Cellular Automata Mayur Bubna, Subhra Mazumdar, Sudip Roy and Rajib Mall Department of Computer Sc. & Engineering Indian Institute of Technology,
More informationImplementation Tutorial on RSA
Implementation Tutorial on Maciek Adamczyk; m adamczyk@umail.ucsb.edu Marianne Magnussen; mariannemagnussen@umail.ucsb.edu Adamczyk and Magnussen Spring 2018 1 / 13 Overview Implementation Tutorial Introduction
More informationElementary Cellular Automata with
letourneau_pdf.nb 1 Elementary Cellular Automata with Memory Paul-Jean Letourneau Department of Physics, University of Calgary Elementary Cellular Automata (ECA) In order to explain how an Elementary Cellular
More informationResearch Article Complex Dynamic Behaviors in Cellular Automata Rule 14
Discrete Dynamics in Nature and Society Volume, Article ID 5839, pages doi:.55//5839 Research Article Complex Dynamic Behaviors in Cellular Automata Rule 4 Qi Han, Xiaofeng Liao, and Chuandong Li State
More informationComputation by competing patterns: Life rule B2/S
Computation by competing patterns: Life rule B2/S2345678 Genaro J. Martínez, Andrew Adamatzky, Harold V. McIntosh 2, and Ben De Lacy Costello 3 Faculty of Computing, Engineering and Mathematical Sciences,
More informationOne-way Hash Function Based on Neural Network
One-way Hash Function Based on Neural Network Shiguo Lian, Jinsheng Sun, Zhiquan Wang Department of Automation, Nanjing University of Science & echnology, Nanjing, 294, China, sg_lian@63.com Abstract A
More informationAPPLICATION OF FUZZY LOGIC IN THE CLASSICAL CELLULAR AUTOMATA MODEL
J. Appl. Math. & Computing Vol. 20(2006), No. 1-2, pp. 433-443 Website: http://jamc.net APPLICATION OF FUZZY LOGIC IN THE CLASSICAL CELLULAR AUTOMATA MODEL CHUNLING CHANG, YUNJIE ZHANG, YUNYING DONG Abstract.
More informationCBSSS 6/24/02. Physics becomes the. Computing Beyond Silicon Summer School. computer. Norm Margolus
Computing Beyond Silicon Summer School Physics becomes the computer Norm Margolus Physics becomes the computer 0/1 Emulating Physics» Finite-state, locality, invertibility, and conservation laws Physical
More informationQuantum Computing. Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge
Quantum Computing Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge Physics and Computation A key question: what is computation....fundamentally? What makes it
More informationTheory of Additive Cellular Automata
Fundamenta Informaticae XXI (200) 00 02 00 IOS Press Theory of Additive Cellular Automata Niloy Ganguly Department of Computer Science and Engineering, Indian Institute of Technology, Waragpur, India Biplab
More informationEMERGENT 1D ISING BEHAVIOR IN AN ELEMENTARY CELLULAR AUTOMATON MODEL
International Journal of Modern Physics C Vol. 20, No. 1 (2009) 133 145 c World Scientific Publishing Company EMERGENT 1D ISING BEHAVIOR IN AN ELEMENTARY CELLULAR AUTOMATON MODEL PAUL G. KASSEBAUM and
More informationMulti-Map Orbit Hopping Chaotic Stream Cipher
Multi-Map Orbit Hopping Chaotic Stream Cipher Xiaowen Zhang 1, Li Shu 2, Ke Tang 1 Abstract In this paper we propose a multi-map orbit hopping chaotic stream cipher that utilizes the idea of spread spectrum
More informationEvolvability, Complexity and Scalability of Cellular Evolutionary and Developmental Systems
1 Evolvability, Complexity and Scalability of Cellular Evolutionary and Developmental Systems Stefano Nichele February 18, 2015 2 Outline Motivation / Introduction Research Questions Background Results
More informationCellular Automata as Models of Complexity
Cellular Automata as Models of Complexity Stephen Wolfram, Nature 311 (5985): 419 424, 1984 Natural systems from snowflakes to mollusc shells show a great diversity of complex patterns. The origins of
More informationLecture Note 3 Date:
P.Lafourcade Lecture Note 3 Date: 28.09.2009 Security models 1st Semester 2007/2008 ROUAULT Boris GABIAM Amanda ARNEDO Pedro 1 Contents 1 Perfect Encryption 3 1.1 Notations....................................
More informationLinear Cellular Automata as Discrete Models for Generating Cryptographic Sequences
Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences Pino Caballero-Gil Faculty of Mathematics. University of La Laguna 38271. La Laguna, Tenerife, Spain. pcaballe@ull.es
More informationPerformance Enhancement of Reversible Binary to Gray Code Converter Circuit using Feynman gate
Performance Enhancement of Reversible Binary to Gray Code Converter Circuit using Feynman gate Kamal Prakash Pandey 1, Pradumn Kumar 2, Rakesh Kumar Singh 3 1, 2, 3 Department of Electronics and Communication
More informationInformation and Communications Security: Encryption and Information Hiding
Short Course on Information and Communications Security: Encryption and Information Hiding Tuesday, 10 March Friday, 13 March, 2015 Lecture 9: Encryption using Chaos Contents Chaos and Cryptography Iteration
More informationPeriodic Cellular Automata of Period-2
Malaysian Journal of Mathematical Sciences 10(S) February: 131 142 (2016) Special Issue: The 3 rd International Conference on Mathematical Applications in Engineering 2014 (ICMAE 14) MALAYSIAN JOURNAL
More informationarxiv:cond-mat/ v4 [cond-mat.soft] 23 Sep 2002
arxiv:cond-mat/0207679v4 [cond-mat.soft] 23 Sep 2002 A Two-Player Game of Life Mark Levene and George Roussos School of Computer Science and Information Systems Birkbeck College, University of London London
More informationAn Optimized Interestingness Hotspot Discovery Framework for Large Gridded Spatio-temporal Datasets
IEEE Big Data 2015 Big Data in Geosciences Workshop An Optimized Interestingness Hotspot Discovery Framework for Large Gridded Spatio-temporal Datasets Fatih Akdag and Christoph F. Eick Department of Computer
More informationNETWORK REPRESENTATION OF THE GAME OF LIFE
JAISCR, 2011, Vol.1, No.3, pp. 233 240 NETWORK REPRESENTATION OF THE GAME OF LIFE Yoshihiko Kayama and Yasumasa Imamura Department of Media and Information, BAIKA Women s University, 2-19-5, Shukuno-sho,
More informationA Chaotic Encryption System Using PCA Neural Networks
A Chaotic Encryption System Using PCA Neural Networks Xiao Fei, Guisong Liu, Bochuan Zheng Computational Intelligence Laboratory, School of Computer Science and Engineering, University of Electronic Science
More informationLinear Cellular Automata as Discrete Models for Generating Cryptographic Sequences
Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences A Fúster-Sabater P Caballero-Gil 2 Institute of Applied Physics, CSIC Serrano 44, 286 Madrid, Spain Email: amparo@ieccsices
More informationCellular Automata in Cryptographic Random Generators
arxiv:1306.3546v1 [cs.cr] 15 Jun 2013 Cellular Automata in Cryptographic Random Generators Jason Spencer College of Computing and Digital Media DePaul University A thesis submitted in partial fulfillment
More informationExploring the Massing of Growth in Cellular Automata
Exploring the Massing of Growth in Cellular Automata Robert J. Krawczyk College of Architecture, Illinois Institute of Technology, Chicago, IL, USA. e-mail: krawczyk@iit.edu Abstract In the investigation
More informationEVOLUTIONARY GAMES AND LOCAL DYNAMICS
International Game Theory Review c World Scientific Publishing Company EVOLUTIONARY GAMES AND LOCAL DYNAMICS PHILIPPE UYTTENDAELE FRANK THUIJSMAN Department of Knowledge Engineering Maastricht University
More informationLecture Notes. Advanced Discrete Structures COT S
Lecture Notes Advanced Discrete Structures COT 4115.001 S15 2015-01-27 Recap ADFGX Cipher Block Cipher Modes of Operation Hill Cipher Inverting a Matrix (mod n) Encryption: Hill Cipher Example Multiple
More informationarxiv: v1 [cs.et] 13 Jul 2016
Processing In-memory realization using Quantum Dot Cellular Automata arxiv:1607.05065v1 [cs.et] 13 Jul 2016 P.P. Chougule, 1 B. Sen, 2 and T.D. Dongale 1 1 Computational Electronics and Nanoscience Research
More informationP The Entropy Trajectory: A Perspective to Classify Complex Systems. Tomoaki SUZUDO Japan Atomic Energy Research Institute, JAERI
P 0 0 8 The Entropy Trajectory: A Perspective to Classify Complex Systems Tomoaki SUZUDO Japan Atomic Energy Research Institute, JAERI What are complex systems? Having macroscopic properties which are
More informationComputation in Cellular Automata: A Selected Review
Computation in Cellular Automata: A Selected Review Melanie Mitchell Santa Fe Institute 1399 Hyde Park Road Santa Fe, NM 87501 U.S.A. email: mm@santafe.edu In T. Gramss, S. Bornholdt, M. Gross, M. Mitchell,
More informationOn the Relationship between Boolean and Fuzzy Cellular Automata
Automata 2009 On the Relationship between Boolean and Fuzzy Cellular Automata Heather Betel 1,2 School of Information Technology and Engineering University of Ottawa, 800 King Edward, Ottawa, Ontario,
More informationCell-based Model For GIS Generalization
Cell-based Model For GIS Generalization Bo Li, Graeme G. Wilkinson & Souheil Khaddaj School of Computing & Information Systems Kingston University Penrhyn Road, Kingston upon Thames Surrey, KT1 2EE UK
More informationInformation Encoding by Using Cellular Automata
Vol. 44 No. SIG 7(TOM 8) May 2003 CA CA CA 1 CA CA Information Encoding by Using Cellular Automata Yoshihisa Fukuhara and Yoshiyasu Takefuji In this paper, we propose a new information encoding method
More informationCHAPTER 12 CRYPTOGRAPHY OF A GRAY LEVEL IMAGE USING A MODIFIED HILL CIPHER
177 CHAPTER 12 CRYPTOGRAPHY OF A GRAY LEVEL IMAGE USING A MODIFIED HILL CIPHER 178 12.1 Introduction The study of cryptography of gray level images [110, 112, 118] by using block ciphers has gained considerable
More informationPerturbing the topology of the Game of Life increases its robustness to asynchrony
Perturbing the topology of the Game of Life increases its robustness to asynchrony Nazim Fatès, Michel Morvan To cite this version: Nazim Fatès, Michel Morvan. Perturbing the topology of the Game of Life
More informationRadial View: Observing Fuzzy Cellular Automata with a New Visualization Method
Radial View: Observing Fuzzy Cellular Automata with a New Visualization Method Paola Flocchini and Vladimir Cezar School of Information Technology and Engineering University of Ottawa, 800 King Eduard,
More informationCellular Automata: Overview and classical results
Reykjavík, August 23, 2006 Cellular Automata: Overview and classical results Silvio Capobianco Háskólinn í Reykjavík, Silvio@ru.is Università degli Studi di Roma La Sapienza, capobian@mat.uniroma1.it 1
More informationSimulation of cell-like self-replication phenomenon in a two-dimensional hybrid cellular automata model
Simulation of cell-like self-replication phenomenon in a two-dimensional hybrid cellular automata model Takeshi Ishida Nippon Institute of Technology ishida06@ecoinfo.jp Abstract An understanding of the
More informationDynamics and Chaos. Melanie Mitchell. Santa Fe Institute and Portland State University
Dynamics and Chaos Melanie Mitchell Santa Fe Institute and Portland State University Dynamical Systems Theory: The general study of how systems change over time Calculus Differential equations Discrete
More informationRule 110 explained as a block substitution system
Rule 110 explained as a block substitution system Juan C. Seck-Tuoh-Mora 1, Norberto Hernández-Romero 1 Genaro J. Martínez 2 April 2009 1 Centro de Investigación Avanzada en Ingeniería Industrial, Universidad
More informationSecure Communication Using H Chaotic Synchronization and International Data Encryption Algorithm
Secure Communication Using H Chaotic Synchronization and International Data Encryption Algorithm Gwo-Ruey Yu Department of Electrical Engineering I-Shou University aohsiung County 840, Taiwan gwoyu@isu.edu.tw
More informationOn the Dynamic Qualitative Behavior of Universal Computation
On the Dynamic Qualitative Behavior of Universal Computation Hector Zenil Department of Computer Science/Kroto Research Institute The University of Sheffield Regent Court, 211 Portobello, S1 4DP, UK h.zenil@sheffield.ac.uk
More informationPartitioning of Cellular Automata Rule Spaces
Partitioning of Cellular Automata Rule Spaces Rodrigo A. Obando TSYS School of Computer Science Columbus State University 4225 University Avenue Columbus, GA 31907, USA Obando_Rodrigo@ColumbusState.edu
More informationContinuous Spatial Automata
Continuous Spatial Automata B. J. MacLennan Department of Computer Science University of Tennessee Knoxville, TN 37996-1301 maclennan@cs.utk.edu CS-90-121 November 26, 1990 Abstract A continuous spatial
More informationCan You do Maths in a Crowd? Chris Budd
Can You do Maths in a Crowd? Chris Budd Human beings are social animals We usually have to make decisions in the context of interactions with many other individuals Examples Crowds in a sports stadium
More informationNetworks and sciences: The story of the small-world
Networks and sciences: The story of the small-world Hugues Bersini IRIDIA ULB 2013 Networks and sciences 1 The story begins with Stanley Milgram (1933-1984) In 1960, the famous experience of the submission
More information10 Cellular Automata and Lattice Gases
10 Cellular Automata and Lattice Gases We started our discussion of partial differential equations by considering how they arise as continuum approximations to discrete systems(such as cars on a highway,
More informationcells [20]. CAs exhibit three notable features, namely massive parallelism, locality of cellular interactions, and simplicity of basic components (cel
I. Rechenberg, and H.-P. Schwefel (eds.), pages 950-959, 1996. Copyright Springer-Verlag 1996. Co-evolving Parallel Random Number Generators Moshe Sipper 1 and Marco Tomassini 2 1 Logic Systems Laboratory,
More informationDesign of S-Box using Combination of Chaotic Functions
129 Design of S-Box using Combination of Chaotic Functions Tanu Wadhera 1, Gurmeet Kaur 2 1 Department of Electronics and Communication Engineering, Punjabi University, Patiala, India 2 Department of Electronics
More informationEvolution of Genotype-Phenotype mapping in a von Neumann Self-reproduction within the Platform of Tierra
Evolution of Genotype-Phenotype mapping in a von Neumann Self-reproduction within the Platform of Tierra Declan Baugh and Barry Mc Mullin The Rince Institute, Dublin City University, Ireland declan.baugh2@mail.dcu.ie,
More informationA Large Block Cipher Involving Key Dependent Permutation, Interlacing and Iteration
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 13, No 3 Sofia 2013 Print ISSN: 1311-02; Online ISSN: 1314-4081 DOI: 10.2478/cait-2013-0025 A Large Block Cipher Involving
More informationSymmetric Crypto Systems
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A Symmetric Crypto Systems EECE 412 Copyright 2004-2008 Konstantin Beznosov 09/16/08 Module Outline Stream ciphers under the hood Block ciphers
More informationChaotic Random Bit Generator Realized with a Microcontroller
Journal of Computations & Modelling, vol.3, no.4, 2013, 115-136 ISSN: 1792-7625 (print), 1792-8850 (online) Scienpress Ltd, 2013 Chaotic Random Bit Generator Realized with a Microcontroller Christos K.
More informationChair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics
Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle Network Security Chapter 2 Basics 2.4 Random Number Generation for Cryptographic Protocols Motivation It is
More informationA novel pseudo-random number generator based on discrete chaotic iterations
A novel pseudo-random number generator based on discrete chaotic iterations Qianxue Wang, Christophe Guyeux and Jacques M. Bahi University of Franche-Comte Computer Science Laboratory LIFC, Belfort, France
More informationPublic Key Cryptography. All secret key algorithms & hash algorithms do the same thing but public key algorithms look very different from each other.
Public Key Cryptography All secret key algorithms & hash algorithms do the same thing but public key algorithms look very different from each other. The thing that is common among all of them is that each
More informationCryptographically Robust Large Boolean Functions. Debdeep Mukhopadhyay CSE, IIT Kharagpur
Cryptographically Robust Large Boolean Functions Debdeep Mukhopadhyay CSE, IIT Kharagpur Outline of the Talk Importance of Boolean functions in Cryptography Important Cryptographic properties Proposed
More informationApplication of Cellular Automata in Conservation Biology and Environmental Management 1
Application of Cellular Automata in Conservation Biology and Environmental Management 1 Miklós Bulla, Éva V. P. Rácz Széchenyi István University, Department of Environmental Engineering, 9026 Győr Egyetem
More informationCryptography and Security Midterm Exam
Cryptography and Security Midterm Exam Solution Serge Vaudenay 25.11.2015 duration: 1h45 no documents allowed, except one 2-sided sheet of handwritten notes a pocket calculator is allowed communication
More information