Cryptography by Cellular Automata or How Fast Can Complexity Emerge in Nature?

Computation in the physical world is restricted by the following spatial locality constraint: In a single unit of time, information can only travel a bounded distance in space. A simple computational model which captures this constraint is a cellular automaton: A discrete dynamical system in which cells are placed on a grid and the state of each cell is updated via a local deterministic rule that depends only on the few cells within its close neighborhood. Cellular automata are commonly used to model real world systems in nature and society. Cellular automata were shown to be capable of a highly complex behavior. However, it is not clear how fast this complexity can evolve and how common it is with respect to all possible initial configurations. We examine this question from a computational perspective, identifying “complexity” with computational intractability. More concretely, we consider an n-cell automaton with a random initial configuration, and study the minimal number of computation steps t = t(n) after which the following problems can become computationally hard: • The inversion problem. Given the configuration y at time t, find an initial configuration x which leads to y in t steps. • The prediction problem. Given an arbitrary sequence of > n intermediate values of cells in the computation, predict some value in the sequence based on the previous values with a significant advantage over guessing. These two problems capture the natural goals of inferring the past from the present and predicting the future based on partial observations of the past. Our main results show that, under widely believed conjectures, there are cellular automata for which both problems become hard even after a single computation step. This is done by constructing cryptographic one-way functions and pseudorandom generators which are computed by a single step of a cellular automaton. Our results support the view that computational forms of complexity can emerge from simple local interactions in a very common and immediate way. Our results build on and strengthen previous results of Applebaum et al. (FOCS 2004, CRYPTO 2007) on the parallel complexity of cryptography. These previous works implement cryptographic primitives by circuits with constant depth, constant fan-in and constant fan-out, but inherently fail to satisfy the strong spatial locality requirement.

[1]  Jonathan Katzand,et al.  Parallel and Concurrent Security of the HB and HB + Protocols , 2006 .

[2]  Vitaly Feldman,et al.  New Results for Learning Noisy Parities and Halfspaces , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).

[3]  Puhua Guan,et al.  Cellular Automaton Public-Key Cryptosystem , 1987, Complex Syst..

[4]  Howard Gutowitz,et al.  Cryptography with Dynamical Systems , 1993 .

[5]  Robert J. McEliece,et al.  A public key cryptosystem based on algebraic coding theory , 1978 .

[6]  Yoshihide Igarashi,et al.  A Randomized Algorithm to Finite Automata Public Key Cryptosystem , 1994, ISAAC.

[7]  E. Berlekamp,et al.  Winning Ways for Your Mathematical Plays , 1983 .

[8]  Hugo Krawczyk,et al.  On the existence of pseudorandom generators , 1988, [Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science.

[9]  Brenda S. Baker,et al.  Approximation algorithms for NP-complete problems on planar graphs , 1983, 24th Annual Symposium on Foundations of Computer Science (sfcs 1983).

[10]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[11]  Moshe Sipper,et al.  Non-uniform cellular automata: Evolution in rule space and formation of complex structures , 1994 .

[12]  Ari Juels,et al.  Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.

[13]  Renji Tao,et al.  Two varieties of finite automaton public key cryptosystem and digital signatures , 2008, Journal of Computer Science and Technology.

[14]  Oded Goldreich,et al.  Candidate One-Way Functions Based on Expander Graphs , 2000, Studies in Complexity and Cryptography.

[15]  ApplebaumBenny,et al.  Cryptography in $NC^0$ , 2006 .

[16]  Yannick Seurin,et al.  How to Encrypt with the LPN Problem , 2008, ICALP.

[17]  E. F. Moore Sequential Machines: Selected Papers , 1964 .

[18]  Ding-Zhu Du,et al.  Proceedings of the 5th International Symposium on Algorithms and Computation , 1994 .

[19]  Manuel Blum,et al.  Secure Human Identification Protocols , 2001, ASIACRYPT.

[20]  Cryptography with constant input locality , 2007, CRYPTO 2007.

[21]  Ronitt Rubinfeld,et al.  On the learnability of discrete distributions , 1994, STOC '94.

[22]  S. Wolfram Random sequence generation by cellular automata , 1986 .

[23]  Jeffrey D. Ullman,et al.  Proceedings of the third annual ACM symposium on Theory of computing , 1971 .

[24]  Amir Shpilka,et al.  On ε-Biased Generators in NC , 2003 .

[25]  G. Y. Vichniac,et al.  Annealed and quenched inhomogeneous cellular automata (INCA) , 1986 .

[26]  J. Davenport Editor , 1960 .

[27]  Yehuda Lindell Introduction to Coding Theory Lecture Notes , 2009 .

[28]  Neil Immerman,et al.  On Uniformity within NC¹ , 1990, J. Comput. Syst. Sci..

[29]  Bennett,et al.  Role of irreversibility in stabilizing complex and nonergodic behavior in locally interacting discrete systems. , 1985, Physical Review Letters.

[30]  Stephen Wolfram,et al.  Universality and complexity in cellular automata , 1983 .

[31]  Bernard Chazelle,et al.  Census functions: An approach to VLSI upper bounds , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[32]  Oded Goldreich,et al.  Foundations of Cryptography: Basic Tools , 2000 .

[33]  Yuval Ishai,et al.  Randomizing polynomials: A new representation with applications to round-efficient secure computation , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.

[34]  Franco P. Preparata,et al.  Horizons of Parallel Computation , 1992, J. Parallel Distributed Comput..

[35]  Tanja Lange,et al.  Attacking and defending the McEliece cryptosystem , 2008, IACR Cryptol. ePrint Arch..

[36]  Iwao Sasase,et al.  A Secret Key Cryptosystem by Iterating a Chaotic Map , 1991, EUROCRYPT.

[37]  Yuval Ishai,et al.  On Pseudorandom Generators with Linear Stretch in NC0 , 2006, APPROX-RANDOM.

[38]  Yuval Ishai,et al.  Cryptography in NC0 , 2004, SIAM J. Comput..

[39]  Oscar Moreno,et al.  McEliece Public Key Cryptosystems Using Algebraic-Geometric Codes , 1996, Des. Codes Cryptogr..

[40]  Leonid A. Levin,et al.  A hard-core predicate for all one-way functions , 1989, STOC '89.

[41]  Silvio Micali,et al.  Probabilistic Encryption , 1984, J. Comput. Syst. Sci..

[42]  Willi Meier,et al.  Analysis of Pseudo Random Sequence Generated by Cellular Automata , 1991, EUROCRYPT.

[43]  F. Thomas Leighton,et al.  Complexity Issues in VLSI , 1983 .

[44]  Jonathan Katz,et al.  Parallel and Concurrent Security of the HB and HB+ Protocols , 2006, EUROCRYPT.

[45]  Parimal Pal Chaudhuri,et al.  Theory and Applications of Cellular Automata in Cryptography , 1994, IEEE Trans. Computers.

[46]  J. Schwartz,et al.  Theory of Self-Reproducing Automata , 1967 .

[47]  Elchanan Mossel,et al.  On ε‐biased generators in NC0 , 2006, Random Struct. Algorithms.

[48]  Richard J. Lipton,et al.  Cryptographic Primitives Based on Hard Learning Problems , 1993, CRYPTO.

[49]  Stephen A. Cook,et al.  The complexity of theorem-proving procedures , 1971, STOC.

[50]  Yuval Ishai,et al.  Computationally Private Randomizing Polynomials and Their Applications , 2005, Computational Complexity Conference.

[51]  Shang-Hua Teng Functional Inversion and Communication Complexity , 1991, CRYPTO.

[52]  Elwyn R. Berlekamp,et al.  On the inherent intractability of certain coding problems (Corresp.) , 1978, IEEE Trans. Inf. Theory.

[53]  Manuel Blum,et al.  How to generate cryptographically strong sequences of pseudo random bits , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).

[54]  Jarkko Kari Cryptosystems Based on Reversible Cellular Automata , 1992 .

[55]  Andrew Chi-Chih Yao,et al.  Theory and application of trapdoor functions , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).

[56]  Robert E. Tarjan,et al.  Applications of a planar separator theorem , 1977, 18th Annual Symposium on Foundations of Computer Science (sfcs 1977).

[57]  Vadim Lyubashevsky,et al.  The Parity Problem in the Presence of Noise, Decoding Random Linear Codes, and the Subset Sum Problem , 2005, APPROX-RANDOM.

[58]  Michael Kearns,et al.  Efficient noise-tolerant learning from statistical queries , 1993, STOC.

[59]  Heribert Vollmer,et al.  Introduction to Circuit Complexity: A Uniform Approach , 2010 .

[60]  P. P. Chaudhuri,et al.  A Survey on Cellular Automata ∗ , 2003 .

[61]  G. Vichniac Simulating physics with cellular automata , 1984 .

[62]  Noam Nisan,et al.  Constant depth circuits, Fourier transform, and learnability , 1993, JACM.