New Possibilities for Cellular Automata in Cryptography

Size: px
Start display at page:

Download "New Possibilities for Cellular Automata in Cryptography"

Transcription

1 New Possibilities for Cellular Automata in Cryptography Mauro Tardivo Filho Marco A. A. Henriques Faculty of Electrical and Computer Engineering University of Campinas Sao Paulo - Brazil

2 Overview 1. History 2. Cellular Automata 3. Chaotic Cellular Automata 4. Application of Chaotic Cellular Automata in Cryptography 5. Parallelism in Cellular Automata 1. Mechanisms of parallelism 2. Results 6. New results 7. Conclusion 2

3 History Universal copier and constructor (1940s): Stanislaw Ulam: growth of crystals; John von Neumann: self-replicating systems in robotics. John Conway: Game of Life (1970s) Stephen Wolfram: analyzed the behavior and complexity of cellular automata (1983). 3

4 Elementary Cellular Automata (CA) Discrete dynamic system neighborhood radius r s states synchronous evolution depending on rule R r States (s) = 0 t t+1 D=1, r=1, = 1 t+2 4 N c= 2

5 CA Rules One-dimensional CA: next state of cell i: Example: Rule 3010 = 1E16 = Time 5

6 CA evolution Evolution depends strongly on initial conditions and rule used 1-D Time 2-D Source: Wolfram, A New 6 Kind of Science, 2002

7 Chaotic Behaviour Some rules cause a chaotic behaviour => Chaotic CA (CCA) The difference between the evolutions from two similar initial states increases with respect to time; consequence: great dependence on initial conditions. future states cannot be predicted unless doing a state by state calculation; cost to obtain previous states can be made very high, increasing the number of CA cells and/or the radius r. 7

8 Chaotic CA Evolution Very similar conditions can led to very different final states Time 8

9 Computational Unpredictability and Irreversibility Prediction: impossible Time Reversion: costly 9

10 Applications of CCA in Cryptography Random Number Generators Hash Algorithms Input/Seed Input Input k-iterations Output Output Output 1 st generation 2 nd generation n th generation 1

11 Applications of CCA in Cryptography Example: Vernam cipher key generator Seed Plain Text: Hello World k-iterations = Cipher Text: 1 9aHew(d0=M$

12 CA robustness Bao (2003) showed vulnerabilities in CA cryptosystems: they can be predictable. Solutions: use different rules for differente cells (Hybrid CA); increase number of cells (N), neighborhood radius (r) or number of iterations (k); use rules with good chaotic behaviour. 1

13 What is good, can become better? 1

14 Parallelism in CA The evolution of CA can be calculated using parallel processing: take advantage of multicore processors; increase performance N=20, r = 11, 4 cores 1

15 Parallel CA Experiments Large CA simulated using parallelism number of cells: 2 7 <= N <= 2 18 ( k bits) cores: 2 rule: 3010 = 1E16 iterations: k = 2N parallel C libraries: OpenMP PThreads 1

16 Results (1) Runtime as a function of the input size (2 cores) time decreases 1

17 Results (2) Speedup as a function of the (log2) input size (2 cores) Speedupmax=1.65 Gain over singleprocessing 1

18 New Results Impact of radius r on parallel processing of CAs Algorithm optimization 1

19 Impact of radius r on processing parallel CA Each of p cores, will read ((N/p) + 2r) cells at each iteration. r r The cells on the gray area are shared by two t+1 t cores for reading, but not for writing ==> t+2 synchronization is easier. r=1 1

20 Problem using larger radius r Problems: Memory access bottleneck t r r Cores will need more time to t+1 t+2 synchronize r=4 2

21 Algorithm Optimization A pseudo-random number (bit) generator can be obtained from the central cell during the CA evolution. N In this case, fewer cell states need to be calculated => black areas cells can be ignored. Number of states to update: Traditional: N*k Optimized: N*(k - h/2) k-iterations h 2

22 Computational effort reduction Reduction of steps as a function of number of iterations k and radius r 2

23 Conclusions CAs have good characteristics to be used as random number generators and hash functions. However, they need adequate sizes and good set of rules. Popularity of multicore processors (even on mobile devices) is increasing the adoption of parallel processing. CA can be easily implemented and scaled in parallel architectures. However, experiments indicate that the choice of appropriate mapping and programming tools is crucial to the success of a parallel implementation. Some optimizations can be made to reduce the volume of calculation needed and the actual reduction depends strongly on the size and other CA parameters. 2

24 Future Works New research efforts are needed to better understand: the strength of CA with larger neighborhoods (radius); the real benefits that can be obtained from parallel processing techniques in multicore enviroments; the impacts of a CA parallel implementation on the overall system security. 2

25 Thank You! Gracias! Obrigado! about.me/maurotfilho 2

26 Boundary Conditions At the extremes of each line, where the neighboring cells are not physically adjacent, we use one of the following approaches: Null Neighbourhood t t+1 t+2 Cyclic Neighbourhood t N t+1 = 0 = 1 2

27 CA Important Facts Szaban et. al (2006) implemented a Genetic Algorithm (GA) which found sets of rules for CA with good non-linearity and randomness, using neighborhoods of radii 1 and 2. As a future work, larger neighborhoods can be explored to possible find better rules. 2

28 References Petre Anghelescu, Silviu Ionita, and Ionel Bostan. Design of programmable cellular automata based cipher scheme World Congress on Nature & Biologically Inspired Computing (NaBIC), pages , Blaise Barney. Posix threads programming. Debasis, Das and Abhishek Ray. A Parallel Encryption Algorithm for Block Ciphers Based on Reversible Programmable Cellular Automata. Journal of Computer Science, 1(1):82 90, Martin Gardner. The fantastic combinations of John Conway s new solitaire game "life". Scientific American, 1(223): , Juan Pedro Hecht. Autómatas celulares caóticos en la generación de funciones. IV Congreso Iberoamericano de Seguridad Informática CIBSI 07, pages , K J Jegadish Kumar, K Chenna Kesava, and S Salivahanan. Novel and Efficient Cellular Automata based Symmetric Key Encryption Algorithm for Wireless Sensor Networks. International Journal, 13(4), T. G. Mattos and J. G. Moreira. Universality classes of chaotic cellular automata. Brazilian Journal of Physics, 34(2a): , June S.Nandi, B.K.Kar, and P. Pal Chaudhuri. Theory and applications of cellular automata in cryptography. IEEE Transactions on Computers, 43(12): , The OpenMP API specification for parallel programming. specifications/. Tommaso Toffoli and Norman Margolus. Invertible cellular automata: A review. Physica D 45, pages , Stanislaw Ulam. Random process and transformations. Proceedings of the International Congress on Mathematics, Vol. 2 (1952): , John von Neumann. The general and logical theory of automata. Collected Works, 5:288, John von Neumann. Theory of Self- Reproducing Automata. University of Illinois, Urbana, Stephen Wolfram. Theory and applications of cellular automata. Rev. Mod. Physica, 55(601), Stephen Wolfram. Universality and complexity in cellular automata. Physica D10, Stephen Wolfram. Random sequence generation by cellular automata. Adv Appl Math, 7:123, Stephen Wolfram. A New Kind of Science. Wolfram Media, Inc,

Image Encryption and Decryption Algorithm Using Two Dimensional Cellular Automata Rules In Cryptography

Image Encryption and Decryption Algorithm Using Two Dimensional Cellular Automata Rules In Cryptography Image Encryption and Decryption Algorithm Using Two Dimensional Cellular Automata Rules In Cryptography P. Sanoop Kumar Department of CSE, Gayatri Vidya Parishad College of Engineering(A), Madhurawada-530048,Visakhapatnam,

More information

Cellular automata are idealized models of complex systems Large network of simple components Limited communication among components No central

Cellular automata are idealized models of complex systems Large network of simple components Limited communication among components No central Cellular automata are idealized models of complex systems Large network of simple components Limited communication among components No central control Complex dynamics from simple rules Capability of information

More information

Cellular Automata. and beyond. The World of Simple Programs. Christian Jacob

Cellular Automata. and beyond. The World of Simple Programs. Christian Jacob Cellular Automata and beyond The World of Simple Programs Christian Jacob Department of Computer Science Department of Biochemistry & Molecular Biology University of Calgary CPSC / MDSC 605 Fall 2003 Cellular

More information

Cellular Automata. ,C ) (t ) ,..., C i +[ K / 2] Cellular Automata. x > N : C x ! N. = C x. x < 1: C x. = C N+ x.

Cellular Automata. ,C ) (t ) ,..., C i +[ K / 2] Cellular Automata. x > N : C x ! N. = C x. x < 1: C x. = C N+ x. and beyond Lindenmayer Systems The World of Simple Programs Christian Jacob Department of Computer Science Department of Biochemistry & Molecular Biology University of Calgary CPSC 673 Winter 2004 Random

More information

Motivation. Evolution has rediscovered several times multicellularity as a way to build complex living systems

Motivation. Evolution has rediscovered several times multicellularity as a way to build complex living systems Cellular Systems 1 Motivation Evolution has rediscovered several times multicellularity as a way to build complex living systems Multicellular systems are composed by many copies of a unique fundamental

More information

Procedures for calculating reversible one-dimensional cellular automata

Procedures for calculating reversible one-dimensional cellular automata Procedures for calculating reversible one-dimensional cellular automata Juan Carlos Seck Tuoh Mora Sergio V. Chapa Vergara Genaro Juárez Martínez Departamento de Ingeniería Eléctrica, Sección Computación,

More information

Applications of Two Dimensional Cellular Automata rules for Block Cipher in Cryptography

Applications of Two Dimensional Cellular Automata rules for Block Cipher in Cryptography Applications of Two Dimensional Cellular Automata rules for Block Cipher in Cryptography Sambhu Prasad Panda 1, Madhusmita Sahu 2, Manas Kumar Swain 3 C V Raman Computer Academy 1,2, C V Raman College

More information

Cellular Automata. History. 1-Dimensional CA. 1-Dimensional CA. Ozalp Babaoglu

Cellular Automata. History. 1-Dimensional CA. 1-Dimensional CA. Ozalp Babaoglu History Cellular Automata Ozalp Babaoglu Developed by John von Neumann as a formal tool to study mechanical self replication Studied extensively by Stephen Wolfram ALMA MATER STUDIORUM UNIVERSITA DI BOLOGNA

More information

Mitchell Chapter 10. Living systems are open systems that exchange energy, materials & information

Mitchell Chapter 10. Living systems are open systems that exchange energy, materials & information Living systems compute Mitchell Chapter 10 Living systems are open systems that exchange energy, materials & information E.g. Erwin Shrodinger (1944) & Lynn Margulis (2000) books: What is Life? discuss

More information

Stream Ciphers. Çetin Kaya Koç Winter / 20

Stream Ciphers. Çetin Kaya Koç   Winter / 20 Çetin Kaya Koç http://koclab.cs.ucsb.edu Winter 2016 1 / 20 Linear Congruential Generators A linear congruential generator produces a sequence of integers x i for i = 1,2,... starting with the given initial

More information

arxiv: v1 [cs.fl] 17 May 2017

arxiv: v1 [cs.fl] 17 May 2017 New Directions In Cellular Automata arxiv:1705.05832v1 [cs.fl] 17 May 2017 Abdulrhman Elnekiti Department of Computer Science University of Turkish Aeronautical Association 11 Bahcekapi, 06790 Etimesgut

More information

Optimization of 1D and 2D Cellular Automata for Pseudo Random Number Generator.

Optimization of 1D and 2D Cellular Automata for Pseudo Random Number Generator. IOSR Journal of VLSI and Signal Processing (IOSR-JVSP) Volume 4, Issue 6, Ver. I (Nov - Dec. 2014), PP 28-33 e-issn: 2319 4200, p-issn No. : 2319 4197 Optimization of 1D and 2D Cellular Automata for Pseudo

More information

Encryption And Decryption Algorithm Using Two Dimensional Cellular Automata Rules And 1D CA Based S-Box (1D Rule-30) In Cryptography

Encryption And Decryption Algorithm Using Two Dimensional Cellular Automata Rules And 1D CA Based S-Box (1D Rule-30) In Cryptography International Refereed Journal of Engineering and Science (IRJES) ISSN (Online) 2319-183X, (Print) 2319-1821 Volume 1, Issue 2 (October 2012), PP.25-36 Encryption And Decryption Algorithm Using Two Dimensional

More information

Extension of cellular automata by introducing an algorithm of recursive estimation of neighbors

Extension of cellular automata by introducing an algorithm of recursive estimation of neighbors Extension of cellular automata by introducing an algorithm of recursive estimation of neighbors Yoshihiko Kayama BAIKA Women s University, Japan (Tel: 81-72-643-6221, Fax: 81-72-643-8473) kayama@baika.ac.jp

More information

II. Cellular Automata 8/27/03 1

II. Cellular Automata 8/27/03 1 II. Cellular Automata 8/27/03 1 Cellular Automata (CAs) Invented by von Neumann in 1940s to study reproduction He succeeded in constructing a self-reproducing CA Have been used as: massively parallel computer

More information

Weak Key Analysis and Micro-controller Implementation of CA Stream Ciphers

Weak Key Analysis and Micro-controller Implementation of CA Stream Ciphers Weak Key Analysis and Micro-controller Implementation of CA Stream Ciphers Pascal Bouvry 1, Gilbert Klein 1, and Franciszek Seredynski 2,3 1 Luxembourg University Faculty of Sciences, Communication and

More information

II. Spatial Systems. A. Cellular Automata. Structure. Cellular Automata (CAs) Example: Conway s Game of Life. State Transition Rule

II. Spatial Systems. A. Cellular Automata. Structure. Cellular Automata (CAs) Example: Conway s Game of Life. State Transition Rule II. Spatial Systems A. Cellular Automata B. Pattern Formation C. Slime Mold D. Excitable Media A. Cellular Automata 1/18/17 1 1/18/17 2 Cellular Automata (CAs) Invented by von Neumann in 1940s to study

More information

Sorting Network Development Using Cellular Automata

Sorting Network Development Using Cellular Automata Sorting Network Development Using Cellular Automata Michal Bidlo, Zdenek Vasicek, and Karel Slany Brno University of Technology, Faculty of Information Technology Božetěchova 2, 61266 Brno, Czech republic

More information

Cellular Automata. Jason Frank Mathematical Institute

Cellular Automata. Jason Frank Mathematical Institute Cellular Automata Jason Frank Mathematical Institute WISM484 Introduction to Complex Systems, Utrecht University, 2015 Cellular Automata Game of Life: Simulator: http://www.bitstorm.org/gameoflife/ Hawking:

More information

CELLULAR AUTOMATA WITH CHAOTIC RULE FORMATION AND ITS CHARACTERISTICS ABSTRACT

CELLULAR AUTOMATA WITH CHAOTIC RULE FORMATION AND ITS CHARACTERISTICS ABSTRACT CELLULAR AUTOMATA WITH CHAOTIC RULE FORMATION AND ITS CHARACTERISTICS Christopher Immanuel W * 1 Paul Mary Deborrah S 2 Samuel Selvaraj R 3 * Research and Development Centre, Bharathiar University, Coimbatore

More information

II. Spatial Systems A. Cellular Automata 8/24/08 1

II. Spatial Systems A. Cellular Automata 8/24/08 1 II. Spatial Systems A. Cellular Automata 8/24/08 1 Cellular Automata (CAs) Invented by von Neumann in 1940s to study reproduction He succeeded in constructing a self-reproducing CA Have been used as: massively

More information

A Colorful Introduction to Cellular Automata

A Colorful Introduction to Cellular Automata A Colorful Introduction to Cellular Automata Silvio Capobianco February 5, 2011 Revised: February 10, 2011 Silvio Capobianco () February 5, 2011 1 / 37 Overview Cellular automata (ca) are local presentations

More information

Introduction. Spatial Multi-Agent Systems. The Need for a Theory

Introduction. Spatial Multi-Agent Systems. The Need for a Theory Introduction Spatial Multi-Agent Systems A spatial multi-agent system is a decentralized system composed of numerous identically programmed agents that either form or are embedded in a geometric space.

More information

REALIZATION OF A TRI-VALUED PROGRAMMABLE CELLULAR AUTOMATA WITH TERNARY OPTICAL COMPUTER

REALIZATION OF A TRI-VALUED PROGRAMMABLE CELLULAR AUTOMATA WITH TERNARY OPTICAL COMPUTER INTERNATIONAL JOURNAL OF NUMERICAL ANALYSIS AND MODELING Volume 9, Number 2, Pages 304 311 c 2012 Institute for Scientific Computing and Information REALIZATION OF A TRI-VALUED PROGRAMMABLE CELLULAR AUTOMATA

More information

Exercise 4: Markov Processes, Cellular Automata and Fuzzy Logic

Exercise 4: Markov Processes, Cellular Automata and Fuzzy Logic Exercise 4: Markov Processes, Cellular Automata and Fuzzy Logic Formal Methods II, Fall Semester 2013 Distributed: 8.11.2013 Due Date: 29.11.2013 Send your solutions to: tobias.klauser@uzh.ch or deliver

More information

Modelling with cellular automata

Modelling with cellular automata Modelling with cellular automata Shan He School for Computational Science University of Birmingham Module 06-23836: Computational Modelling with MATLAB Outline Outline of Topics Concepts about cellular

More information

Chaos, Complexity, and Inference (36-462)

Chaos, Complexity, and Inference (36-462) Chaos, Complexity, and Inference (36-462) Lecture 10 Cosma Shalizi 14 February 2008 Some things you can read: [1] is what got me interested in the subject; [2] is the best introduction to CA modeling code

More information

Justine Seastres. Cellular Automata and the Game of Life

Justine Seastres. Cellular Automata and the Game of Life Justine Seastres Saint Mary s College of California Department of Mathematics May 16, 2016 Cellular Automata and the Game of Life Supervisors: Professor Porter Professor Sauerberg 2 Contents 1 Introduction

More information

The Game (Introduction to Digital Physics) *

The Game (Introduction to Digital Physics) * The Game (Introduction to Digital Physics) * Plamen Petrov ppetrov@digitalphysics.org In the present brief article we introduce the main idea of Digital Physics in the form of an abstract game. 1 Introduction

More information

biologically-inspired computing lecture 12 Informatics luis rocha 2015 INDIANA UNIVERSITY biologically Inspired computing

biologically-inspired computing lecture 12 Informatics luis rocha 2015 INDIANA UNIVERSITY biologically Inspired computing lecture 12 -inspired Sections I485/H400 course outlook Assignments: 35% Students will complete 4/5 assignments based on algorithms presented in class Lab meets in I1 (West) 109 on Lab Wednesdays Lab 0

More information

Bio-inspired Models of Computation Seminar. Daniele Sgandurra. 16 October 2009

Bio-inspired Models of Computation Seminar. Daniele Sgandurra. 16 October 2009 Bio-inspired Models of Computation Seminar Università di Pisa 16 October 2009 Outline Introduction Motivation History Cellular Systems Wolfram Classes Variants and Extensions Extended Topics Garden of

More information

Two-state, Reversible, Universal Cellular Automata In Three Dimensions

Two-state, Reversible, Universal Cellular Automata In Three Dimensions Two-state, Reversible, Universal Cellular Automata In Three Dimensions Daniel B. Miller and Edward Fredkin Carnegie Mellon University West Coast Campus Bldg 23, Nasa Research Park Moffett Field, CA 94035

More information

Introduction to Artificial Life and Cellular Automata. Cellular Automata

Introduction to Artificial Life and Cellular Automata. Cellular Automata Introduction to Artificial Life and Cellular Automata CS405 Cellular Automata A cellular automata is a family of simple, finite-state machines that exhibit interesting, emergent behaviors through their

More information

On Elementary and Algebraic Cellular Automata

On Elementary and Algebraic Cellular Automata Chapter On Elementary and Algebraic Cellular Automata Yuriy Gulak Center for Structures in Extreme Environments, Mechanical and Aerospace Engineering, Rutgers University, New Jersey ygulak@jove.rutgers.edu

More information

Chaos, Complexity, and Inference (36-462)

Chaos, Complexity, and Inference (36-462) Chaos, Complexity, and Inference (36-462) Lecture 10: Cellular Automata Cosma Shalizi 12 February 2009 Some things you can read: Poundstone (1984) is what got me interested in the subject; Toffoli and

More information

Cellular Automata CS 591 Complex Adaptive Systems Spring Professor: Melanie Moses 2/02/09

Cellular Automata CS 591 Complex Adaptive Systems Spring Professor: Melanie Moses 2/02/09 Cellular Automata CS 591 Complex Adaptive Systems Spring 2009 Professor: Melanie Moses 2/02/09 Introduction to Cellular Automata (CA) Invented by John von Neumann (circa~1950). A cellular automata consists

More information

From Glider to Chaos: A Transitive Subsystem Derived From Glider B of CA Rule 110

From Glider to Chaos: A Transitive Subsystem Derived From Glider B of CA Rule 110 From Glider to Chaos: A Transitive Subsystem Derived From Glider B of CA Rule 110 Pingping Liu, Fangyue Chen, Lingxiao Si, and Fang Wang School of Science, Hangzhou Dianzi University, Hangzhou, Zhejiang,

More information

Discrete Tranformation of Output in Cellular Automata

Discrete Tranformation of Output in Cellular Automata Discrete Tranformation of Output in Cellular Automata Aleksander Lunøe Waage Master of Science in Computer Science Submission date: July 2012 Supervisor: Gunnar Tufte, IDI Norwegian University of Science

More information

o or 1. The sequence of site values is the "configuration" of the cellular automaton. The cellular

o or 1. The sequence of site values is the configuration of the cellular automaton. The cellular Physica loo (1984) vii- xii North-Holland. Amsterdam VlI PREFACE Stephen WOLFRAM The Institute /or Advanced Study, Princeton, NJ 08540, USA 1. Introduction Differential equations form the mathematical

More information

Introduction to Scientific Modeling CS 365, Fall 2011 Cellular Automata

Introduction to Scientific Modeling CS 365, Fall 2011 Cellular Automata Introduction to Scientific Modeling CS 365, Fall 2011 Cellular Automata Stephanie Forrest ME 214 http://cs.unm.edu/~forrest/cs365/ forrest@cs.unm.edu 505-277-7104 Reading Assignment! Mitchell Ch. 10" Wolfram

More information

Designing Cellular Automata Structures using Quantum-dot Cellular Automata

Designing Cellular Automata Structures using Quantum-dot Cellular Automata Designing Cellular Automata Structures using Quantum-dot Cellular Automata Mayur Bubna, Subhra Mazumdar, Sudip Roy and Rajib Mall Department of Computer Sc. & Engineering Indian Institute of Technology,

More information

Implementation Tutorial on RSA

Implementation Tutorial on RSA Implementation Tutorial on Maciek Adamczyk; m adamczyk@umail.ucsb.edu Marianne Magnussen; mariannemagnussen@umail.ucsb.edu Adamczyk and Magnussen Spring 2018 1 / 13 Overview Implementation Tutorial Introduction

More information

Elementary Cellular Automata with

Elementary Cellular Automata with letourneau_pdf.nb 1 Elementary Cellular Automata with Memory Paul-Jean Letourneau Department of Physics, University of Calgary Elementary Cellular Automata (ECA) In order to explain how an Elementary Cellular

More information

Research Article Complex Dynamic Behaviors in Cellular Automata Rule 14

Research Article Complex Dynamic Behaviors in Cellular Automata Rule 14 Discrete Dynamics in Nature and Society Volume, Article ID 5839, pages doi:.55//5839 Research Article Complex Dynamic Behaviors in Cellular Automata Rule 4 Qi Han, Xiaofeng Liao, and Chuandong Li State

More information

Computation by competing patterns: Life rule B2/S

Computation by competing patterns: Life rule B2/S Computation by competing patterns: Life rule B2/S2345678 Genaro J. Martínez, Andrew Adamatzky, Harold V. McIntosh 2, and Ben De Lacy Costello 3 Faculty of Computing, Engineering and Mathematical Sciences,

More information

One-way Hash Function Based on Neural Network

One-way Hash Function Based on Neural Network One-way Hash Function Based on Neural Network Shiguo Lian, Jinsheng Sun, Zhiquan Wang Department of Automation, Nanjing University of Science & echnology, Nanjing, 294, China, sg_lian@63.com Abstract A

More information

APPLICATION OF FUZZY LOGIC IN THE CLASSICAL CELLULAR AUTOMATA MODEL

APPLICATION OF FUZZY LOGIC IN THE CLASSICAL CELLULAR AUTOMATA MODEL J. Appl. Math. & Computing Vol. 20(2006), No. 1-2, pp. 433-443 Website: http://jamc.net APPLICATION OF FUZZY LOGIC IN THE CLASSICAL CELLULAR AUTOMATA MODEL CHUNLING CHANG, YUNJIE ZHANG, YUNYING DONG Abstract.

More information

CBSSS 6/24/02. Physics becomes the. Computing Beyond Silicon Summer School. computer. Norm Margolus

CBSSS 6/24/02. Physics becomes the. Computing Beyond Silicon Summer School. computer. Norm Margolus Computing Beyond Silicon Summer School Physics becomes the computer Norm Margolus Physics becomes the computer 0/1 Emulating Physics» Finite-state, locality, invertibility, and conservation laws Physical

More information

Quantum Computing. Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge

Quantum Computing. Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge Quantum Computing Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge Physics and Computation A key question: what is computation....fundamentally? What makes it

More information

Theory of Additive Cellular Automata

Theory of Additive Cellular Automata Fundamenta Informaticae XXI (200) 00 02 00 IOS Press Theory of Additive Cellular Automata Niloy Ganguly Department of Computer Science and Engineering, Indian Institute of Technology, Waragpur, India Biplab

More information

EMERGENT 1D ISING BEHAVIOR IN AN ELEMENTARY CELLULAR AUTOMATON MODEL

EMERGENT 1D ISING BEHAVIOR IN AN ELEMENTARY CELLULAR AUTOMATON MODEL International Journal of Modern Physics C Vol. 20, No. 1 (2009) 133 145 c World Scientific Publishing Company EMERGENT 1D ISING BEHAVIOR IN AN ELEMENTARY CELLULAR AUTOMATON MODEL PAUL G. KASSEBAUM and

More information

Multi-Map Orbit Hopping Chaotic Stream Cipher

Multi-Map Orbit Hopping Chaotic Stream Cipher Multi-Map Orbit Hopping Chaotic Stream Cipher Xiaowen Zhang 1, Li Shu 2, Ke Tang 1 Abstract In this paper we propose a multi-map orbit hopping chaotic stream cipher that utilizes the idea of spread spectrum

More information

Evolvability, Complexity and Scalability of Cellular Evolutionary and Developmental Systems

Evolvability, Complexity and Scalability of Cellular Evolutionary and Developmental Systems 1 Evolvability, Complexity and Scalability of Cellular Evolutionary and Developmental Systems Stefano Nichele February 18, 2015 2 Outline Motivation / Introduction Research Questions Background Results

More information

Cellular Automata as Models of Complexity

Cellular Automata as Models of Complexity Cellular Automata as Models of Complexity Stephen Wolfram, Nature 311 (5985): 419 424, 1984 Natural systems from snowflakes to mollusc shells show a great diversity of complex patterns. The origins of

More information

Lecture Note 3 Date:

Lecture Note 3 Date: P.Lafourcade Lecture Note 3 Date: 28.09.2009 Security models 1st Semester 2007/2008 ROUAULT Boris GABIAM Amanda ARNEDO Pedro 1 Contents 1 Perfect Encryption 3 1.1 Notations....................................

More information

Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences

Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences Pino Caballero-Gil Faculty of Mathematics. University of La Laguna 38271. La Laguna, Tenerife, Spain. pcaballe@ull.es

More information

Performance Enhancement of Reversible Binary to Gray Code Converter Circuit using Feynman gate

Performance Enhancement of Reversible Binary to Gray Code Converter Circuit using Feynman gate Performance Enhancement of Reversible Binary to Gray Code Converter Circuit using Feynman gate Kamal Prakash Pandey 1, Pradumn Kumar 2, Rakesh Kumar Singh 3 1, 2, 3 Department of Electronics and Communication

More information

Information and Communications Security: Encryption and Information Hiding

Information and Communications Security: Encryption and Information Hiding Short Course on Information and Communications Security: Encryption and Information Hiding Tuesday, 10 March Friday, 13 March, 2015 Lecture 9: Encryption using Chaos Contents Chaos and Cryptography Iteration

More information

Periodic Cellular Automata of Period-2

Periodic Cellular Automata of Period-2 Malaysian Journal of Mathematical Sciences 10(S) February: 131 142 (2016) Special Issue: The 3 rd International Conference on Mathematical Applications in Engineering 2014 (ICMAE 14) MALAYSIAN JOURNAL

More information

arxiv:cond-mat/ v4 [cond-mat.soft] 23 Sep 2002

arxiv:cond-mat/ v4 [cond-mat.soft] 23 Sep 2002 arxiv:cond-mat/0207679v4 [cond-mat.soft] 23 Sep 2002 A Two-Player Game of Life Mark Levene and George Roussos School of Computer Science and Information Systems Birkbeck College, University of London London

More information

An Optimized Interestingness Hotspot Discovery Framework for Large Gridded Spatio-temporal Datasets

An Optimized Interestingness Hotspot Discovery Framework for Large Gridded Spatio-temporal Datasets IEEE Big Data 2015 Big Data in Geosciences Workshop An Optimized Interestingness Hotspot Discovery Framework for Large Gridded Spatio-temporal Datasets Fatih Akdag and Christoph F. Eick Department of Computer

More information

NETWORK REPRESENTATION OF THE GAME OF LIFE

NETWORK REPRESENTATION OF THE GAME OF LIFE JAISCR, 2011, Vol.1, No.3, pp. 233 240 NETWORK REPRESENTATION OF THE GAME OF LIFE Yoshihiko Kayama and Yasumasa Imamura Department of Media and Information, BAIKA Women s University, 2-19-5, Shukuno-sho,

More information

A Chaotic Encryption System Using PCA Neural Networks

A Chaotic Encryption System Using PCA Neural Networks A Chaotic Encryption System Using PCA Neural Networks Xiao Fei, Guisong Liu, Bochuan Zheng Computational Intelligence Laboratory, School of Computer Science and Engineering, University of Electronic Science

More information

Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences

Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences A Fúster-Sabater P Caballero-Gil 2 Institute of Applied Physics, CSIC Serrano 44, 286 Madrid, Spain Email: amparo@ieccsices

More information

Cellular Automata in Cryptographic Random Generators

Cellular Automata in Cryptographic Random Generators arxiv:1306.3546v1 [cs.cr] 15 Jun 2013 Cellular Automata in Cryptographic Random Generators Jason Spencer College of Computing and Digital Media DePaul University A thesis submitted in partial fulfillment

More information

Exploring the Massing of Growth in Cellular Automata

Exploring the Massing of Growth in Cellular Automata Exploring the Massing of Growth in Cellular Automata Robert J. Krawczyk College of Architecture, Illinois Institute of Technology, Chicago, IL, USA. e-mail: krawczyk@iit.edu Abstract In the investigation

More information

EVOLUTIONARY GAMES AND LOCAL DYNAMICS

EVOLUTIONARY GAMES AND LOCAL DYNAMICS International Game Theory Review c World Scientific Publishing Company EVOLUTIONARY GAMES AND LOCAL DYNAMICS PHILIPPE UYTTENDAELE FRANK THUIJSMAN Department of Knowledge Engineering Maastricht University

More information

Lecture Notes. Advanced Discrete Structures COT S

Lecture Notes. Advanced Discrete Structures COT S Lecture Notes Advanced Discrete Structures COT 4115.001 S15 2015-01-27 Recap ADFGX Cipher Block Cipher Modes of Operation Hill Cipher Inverting a Matrix (mod n) Encryption: Hill Cipher Example Multiple

More information

arxiv: v1 [cs.et] 13 Jul 2016

arxiv: v1 [cs.et] 13 Jul 2016 Processing In-memory realization using Quantum Dot Cellular Automata arxiv:1607.05065v1 [cs.et] 13 Jul 2016 P.P. Chougule, 1 B. Sen, 2 and T.D. Dongale 1 1 Computational Electronics and Nanoscience Research

More information

P The Entropy Trajectory: A Perspective to Classify Complex Systems. Tomoaki SUZUDO Japan Atomic Energy Research Institute, JAERI

P The Entropy Trajectory: A Perspective to Classify Complex Systems. Tomoaki SUZUDO Japan Atomic Energy Research Institute, JAERI P 0 0 8 The Entropy Trajectory: A Perspective to Classify Complex Systems Tomoaki SUZUDO Japan Atomic Energy Research Institute, JAERI What are complex systems? Having macroscopic properties which are

More information

Computation in Cellular Automata: A Selected Review

Computation in Cellular Automata: A Selected Review Computation in Cellular Automata: A Selected Review Melanie Mitchell Santa Fe Institute 1399 Hyde Park Road Santa Fe, NM 87501 U.S.A. email: mm@santafe.edu In T. Gramss, S. Bornholdt, M. Gross, M. Mitchell,

More information

On the Relationship between Boolean and Fuzzy Cellular Automata

On the Relationship between Boolean and Fuzzy Cellular Automata Automata 2009 On the Relationship between Boolean and Fuzzy Cellular Automata Heather Betel 1,2 School of Information Technology and Engineering University of Ottawa, 800 King Edward, Ottawa, Ontario,

More information

Cell-based Model For GIS Generalization

Cell-based Model For GIS Generalization Cell-based Model For GIS Generalization Bo Li, Graeme G. Wilkinson & Souheil Khaddaj School of Computing & Information Systems Kingston University Penrhyn Road, Kingston upon Thames Surrey, KT1 2EE UK

More information

Information Encoding by Using Cellular Automata

Information Encoding by Using Cellular Automata Vol. 44 No. SIG 7(TOM 8) May 2003 CA CA CA 1 CA CA Information Encoding by Using Cellular Automata Yoshihisa Fukuhara and Yoshiyasu Takefuji In this paper, we propose a new information encoding method

More information

CHAPTER 12 CRYPTOGRAPHY OF A GRAY LEVEL IMAGE USING A MODIFIED HILL CIPHER

CHAPTER 12 CRYPTOGRAPHY OF A GRAY LEVEL IMAGE USING A MODIFIED HILL CIPHER 177 CHAPTER 12 CRYPTOGRAPHY OF A GRAY LEVEL IMAGE USING A MODIFIED HILL CIPHER 178 12.1 Introduction The study of cryptography of gray level images [110, 112, 118] by using block ciphers has gained considerable

More information

Perturbing the topology of the Game of Life increases its robustness to asynchrony

Perturbing the topology of the Game of Life increases its robustness to asynchrony Perturbing the topology of the Game of Life increases its robustness to asynchrony Nazim Fatès, Michel Morvan To cite this version: Nazim Fatès, Michel Morvan. Perturbing the topology of the Game of Life

More information

Radial View: Observing Fuzzy Cellular Automata with a New Visualization Method

Radial View: Observing Fuzzy Cellular Automata with a New Visualization Method Radial View: Observing Fuzzy Cellular Automata with a New Visualization Method Paola Flocchini and Vladimir Cezar School of Information Technology and Engineering University of Ottawa, 800 King Eduard,

More information

Cellular Automata: Overview and classical results

Cellular Automata: Overview and classical results Reykjavík, August 23, 2006 Cellular Automata: Overview and classical results Silvio Capobianco Háskólinn í Reykjavík, Silvio@ru.is Università degli Studi di Roma La Sapienza, capobian@mat.uniroma1.it 1

More information

Simulation of cell-like self-replication phenomenon in a two-dimensional hybrid cellular automata model

Simulation of cell-like self-replication phenomenon in a two-dimensional hybrid cellular automata model Simulation of cell-like self-replication phenomenon in a two-dimensional hybrid cellular automata model Takeshi Ishida Nippon Institute of Technology ishida06@ecoinfo.jp Abstract An understanding of the

More information

Dynamics and Chaos. Melanie Mitchell. Santa Fe Institute and Portland State University

Dynamics and Chaos. Melanie Mitchell. Santa Fe Institute and Portland State University Dynamics and Chaos Melanie Mitchell Santa Fe Institute and Portland State University Dynamical Systems Theory: The general study of how systems change over time Calculus Differential equations Discrete

More information

Rule 110 explained as a block substitution system

Rule 110 explained as a block substitution system Rule 110 explained as a block substitution system Juan C. Seck-Tuoh-Mora 1, Norberto Hernández-Romero 1 Genaro J. Martínez 2 April 2009 1 Centro de Investigación Avanzada en Ingeniería Industrial, Universidad

More information

Secure Communication Using H Chaotic Synchronization and International Data Encryption Algorithm

Secure Communication Using H Chaotic Synchronization and International Data Encryption Algorithm Secure Communication Using H Chaotic Synchronization and International Data Encryption Algorithm Gwo-Ruey Yu Department of Electrical Engineering I-Shou University aohsiung County 840, Taiwan gwoyu@isu.edu.tw

More information

On the Dynamic Qualitative Behavior of Universal Computation

On the Dynamic Qualitative Behavior of Universal Computation On the Dynamic Qualitative Behavior of Universal Computation Hector Zenil Department of Computer Science/Kroto Research Institute The University of Sheffield Regent Court, 211 Portobello, S1 4DP, UK h.zenil@sheffield.ac.uk

More information

Partitioning of Cellular Automata Rule Spaces

Partitioning of Cellular Automata Rule Spaces Partitioning of Cellular Automata Rule Spaces Rodrigo A. Obando TSYS School of Computer Science Columbus State University 4225 University Avenue Columbus, GA 31907, USA Obando_Rodrigo@ColumbusState.edu

More information

Continuous Spatial Automata

Continuous Spatial Automata Continuous Spatial Automata B. J. MacLennan Department of Computer Science University of Tennessee Knoxville, TN 37996-1301 maclennan@cs.utk.edu CS-90-121 November 26, 1990 Abstract A continuous spatial

More information

Can You do Maths in a Crowd? Chris Budd

Can You do Maths in a Crowd? Chris Budd Can You do Maths in a Crowd? Chris Budd Human beings are social animals We usually have to make decisions in the context of interactions with many other individuals Examples Crowds in a sports stadium

More information

Networks and sciences: The story of the small-world

Networks and sciences: The story of the small-world Networks and sciences: The story of the small-world Hugues Bersini IRIDIA ULB 2013 Networks and sciences 1 The story begins with Stanley Milgram (1933-1984) In 1960, the famous experience of the submission

More information

10 Cellular Automata and Lattice Gases

10 Cellular Automata and Lattice Gases 10 Cellular Automata and Lattice Gases We started our discussion of partial differential equations by considering how they arise as continuum approximations to discrete systems(such as cars on a highway,

More information

cells [20]. CAs exhibit three notable features, namely massive parallelism, locality of cellular interactions, and simplicity of basic components (cel

cells [20]. CAs exhibit three notable features, namely massive parallelism, locality of cellular interactions, and simplicity of basic components (cel I. Rechenberg, and H.-P. Schwefel (eds.), pages 950-959, 1996. Copyright Springer-Verlag 1996. Co-evolving Parallel Random Number Generators Moshe Sipper 1 and Marco Tomassini 2 1 Logic Systems Laboratory,

More information

Design of S-Box using Combination of Chaotic Functions

Design of S-Box using Combination of Chaotic Functions 129 Design of S-Box using Combination of Chaotic Functions Tanu Wadhera 1, Gurmeet Kaur 2 1 Department of Electronics and Communication Engineering, Punjabi University, Patiala, India 2 Department of Electronics

More information

Evolution of Genotype-Phenotype mapping in a von Neumann Self-reproduction within the Platform of Tierra

Evolution of Genotype-Phenotype mapping in a von Neumann Self-reproduction within the Platform of Tierra Evolution of Genotype-Phenotype mapping in a von Neumann Self-reproduction within the Platform of Tierra Declan Baugh and Barry Mc Mullin The Rince Institute, Dublin City University, Ireland declan.baugh2@mail.dcu.ie,

More information

A Large Block Cipher Involving Key Dependent Permutation, Interlacing and Iteration

A Large Block Cipher Involving Key Dependent Permutation, Interlacing and Iteration BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 13, No 3 Sofia 2013 Print ISSN: 1311-02; Online ISSN: 1314-4081 DOI: 10.2478/cait-2013-0025 A Large Block Cipher Involving

More information

Symmetric Crypto Systems

Symmetric Crypto Systems T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A Symmetric Crypto Systems EECE 412 Copyright 2004-2008 Konstantin Beznosov 09/16/08 Module Outline Stream ciphers under the hood Block ciphers

More information

Chaotic Random Bit Generator Realized with a Microcontroller

Chaotic Random Bit Generator Realized with a Microcontroller Journal of Computations & Modelling, vol.3, no.4, 2013, 115-136 ISSN: 1792-7625 (print), 1792-8850 (online) Scienpress Ltd, 2013 Chaotic Random Bit Generator Realized with a Microcontroller Christos K.

More information

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle Network Security Chapter 2 Basics 2.4 Random Number Generation for Cryptographic Protocols Motivation It is

More information

A novel pseudo-random number generator based on discrete chaotic iterations

A novel pseudo-random number generator based on discrete chaotic iterations A novel pseudo-random number generator based on discrete chaotic iterations Qianxue Wang, Christophe Guyeux and Jacques M. Bahi University of Franche-Comte Computer Science Laboratory LIFC, Belfort, France

More information

Public Key Cryptography. All secret key algorithms & hash algorithms do the same thing but public key algorithms look very different from each other.

Public Key Cryptography. All secret key algorithms & hash algorithms do the same thing but public key algorithms look very different from each other. Public Key Cryptography All secret key algorithms & hash algorithms do the same thing but public key algorithms look very different from each other. The thing that is common among all of them is that each

More information

Cryptographically Robust Large Boolean Functions. Debdeep Mukhopadhyay CSE, IIT Kharagpur

Cryptographically Robust Large Boolean Functions. Debdeep Mukhopadhyay CSE, IIT Kharagpur Cryptographically Robust Large Boolean Functions Debdeep Mukhopadhyay CSE, IIT Kharagpur Outline of the Talk Importance of Boolean functions in Cryptography Important Cryptographic properties Proposed

More information

Application of Cellular Automata in Conservation Biology and Environmental Management 1

Application of Cellular Automata in Conservation Biology and Environmental Management 1 Application of Cellular Automata in Conservation Biology and Environmental Management 1 Miklós Bulla, Éva V. P. Rácz Széchenyi István University, Department of Environmental Engineering, 9026 Győr Egyetem

More information

Cryptography and Security Midterm Exam

Cryptography and Security Midterm Exam Cryptography and Security Midterm Exam Solution Serge Vaudenay 25.11.2015 duration: 1h45 no documents allowed, except one 2-sided sheet of handwritten notes a pocket calculator is allowed communication

More information