Data security issues, cryptographic protection methods, and the use of cellular automata