Cryptographic properties of Boolean functions defining elementary cellular automata

In this work, the algebraic properties of the local transition functions of elementary cellular automata (ECA) were analysed. Specifically, a classification of such cellular automata was done according to their algebraic degree, the balancedness, the resiliency, nonlinearity, the propagation criterion and the existence of non-zero linear structures. It is shown that there is not any ECA satisfying all properties at the same time.

[1]  Eli Biham,et al.  Differential Cryptanalysis of the Data Encryption Standard , 1993, Springer New York.

[2]  Steven Guan,et al.  Evolving cellular automata to generate nonlinear sequences with desirable properties , 2007, Appl. Soft Comput..

[3]  Stephen Wolfram,et al.  A New Kind of Science , 2003, Artificial Life.

[4]  Lars R. Knudsen,et al.  Truncated and Higher Order Differentials , 1994, FSE.

[5]  Willi Meier,et al.  Nonlinearity Criteria for Cryptographic Functions , 1990, EUROCRYPT.

[6]  James L. Massey,et al.  A spectral characterization of correlation-immune combining functions , 1988, IEEE Trans. Inf. Theory.

[7]  Rainer A. Rueppel,et al.  Products of linear recurring sequences with maximum complexity , 1987, IEEE Trans. Inf. Theory.

[8]  S. Wolfram Random sequence generation by cellular automata , 1986 .

[9]  Amparo Fúster-Sabater,et al.  Cellular Automata Application to the Linearization of Stream Cipher Generators , 2004, ACRI.

[10]  Xuejia Lai Higher Order Derivatives and Differential Cryptanalysis , 1994 .

[11]  Pino Caballero-Gil,et al.  On the Use of Cellular Automata in Symmetric Cryptography , 2010, ArXiv.

[13]  Marcin Seredynski,et al.  Block Encryption Using Reversible Cellular Automata , 2004, ACRI.

[14]  Eli Biham,et al.  Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.

[15]  Mitsuru Matsui,et al.  On Correlation Between the Order of S-boxes and the Strength of DES , 1994, EUROCRYPT.

[16]  Carlisle M. Adams,et al.  On Immunity Against Biham and Shamir's "Differential Cryptanalysis" , 1992, Information Processing Letters.

[17]  Burton Voorhees,et al.  Additive Cellular Automata , 2009, Encyclopedia of Complexity and Systems Science.

[18]  Stafford E. Tavares,et al.  On the Design of S-Boxes , 1985, CRYPTO.

[19]  Thomas Siegenthaler,et al.  Correlation-immunity of nonlinear combining functions for cryptographic applications , 1984, IEEE Trans. Inf. Theory.

[20]  Santanu Chattopadhyay,et al.  Additive cellular automata : theory and applications , 1997 .

[21]  Parimal Pal Chaudhuri,et al.  Theory and Applications of Cellular Automata in Cryptography , 1994, IEEE Trans. Computers.

[22]  Parimal Pal Chaudhuri,et al.  Cellular Automata Based Authentication (CAA) , 2002, ACRI.

[23]  Marco Tomassini,et al.  Cryptography with cellular automata , 2001, Appl. Soft Comput..

[24]  Bruno Martin A Walsh Exploration of Elementary CA Rules , 2008, J. Cell. Autom..