Cellular automata provide discrete deterministic mathematical models for physical, biological and computational systems. Despite their simple construction, cellular automata are shown to be capable of complicated behaviour, and to generate complex and random patterns. There have been constant efforts to exploit cellular automata for cryptography since the very beginning of the research on cellular automata. Unfortunately, most of the previous cryptosystems based on cellular automata are either insecure or inefficient. [8] is the latest effort in cellular automata cryptosystems (CACs) design, where the affine cellular automata are combined with non-affine transformations. It is claimed that the weakness in some of the previous CACs due to affine property is removed. In this paper we show that the new CAC is still insecure. It can be broken by a chosen-plaintext attack. The attack is very efficient, requiring only hundreds of chosen plaintexts and a small computation amount. We also consider the possibility of modifying the new CAC. Our results show, however, that it is not easy to secure the scheme by minor modifications. The cryptanalysis in this paper enforces the opinion once more that the security must be very carefully analyzed in designing the cryptosystems based on some mathematical systems. We should not blindly trust the pseudo randomness brought by the available mathematical systems. The designing techniques developed by cryptographic community are always optimal.
[1]
Parimal Pal Chaudhuri,et al.
Theory and Applications of Cellular Automata in Cryptography
,
1994,
IEEE Trans. Computers.
[2]
Wolfram,et al.
Origins of randomness in physical systems.
,
1985,
Physical review letters.
[3]
Y. Pomeau.
Invariant in cellular automata
,
1984
.
[4]
Stephen Wolfram,et al.
Cellular automata as models of complexity
,
1984,
Nature.
[5]
S. Wolfram.
Random sequence generation by cellular automata
,
1986
.
[6]
Puhua Guan,et al.
Cellular Automaton Public-Key Cryptosystem
,
1987,
Complex Syst..
[7]
Stephen Wolfram.
Cryptography with Cellular Automata
,
1985,
CRYPTO.
[8]
M. Creutz.
Deterministic Ising dynamics
,
1986
.
[9]
John H. Kalivas,et al.
Global optimization by simulated annealing with wavelength selection for ultraviolet-visible spectrophotometry
,
1989
.
[10]
Kenneth G. Paterson,et al.
Comments on "Theory and Applications of Cellular Automata in Cryptography"
,
1997,
IEEE Trans. Computers.
[11]
C. D. Gelatt,et al.
Optimization by Simulated Annealing
,
1983,
Science.
[12]
Parimal Pal Chaudhuri,et al.
Cellular Automata Based Cryptosystem (CAC)
,
2002,
ICICS.