Analysis of Pseudo Random Sequences Generated by Cellular Automata
The security of cellular automata for stream cipher applications is investigated. A cryptanalytic algorithm is developed for a known plaintext attack where the plaintext is assumed to be known up to the unicity distance. The algorithm is shown to be successful on small computers for key sizes up to N between 300 and 500 bits. For a cellular automaton to be secure against more powerful adversaries it is concluded that the key size N needs to be about 1000 bits.
The cryptanalytic algorithm takes advantage of an equivalent description of the cryptosystem in which the keys are not equiprobable. It is shown that key search can be reduced considerably if one is contented to succeed only with a certain success probability. This is established by an information theoretic analysis of arbitrary key sources with non-uniform probability distribution.
- I. Damgård, A Design Principle for Hash Functions, Advances in Cryptology—Crypto’89, Proceedings, pp. 416–427, Springer-Verlag, 1990.
- W. Diffie, The First Ten Years of Public-Key Cryptography, Proceedings of the IEEE, pp. 560–577, 1988.
- Grassberger, P. (1986) Toward a Quantitative Theory of Self-Generated Complexity. International Journal of Theoretical Physics 25: pp. 907-938 CrossRef
- U. Maurer, A Universal Statistical Test for Random Bit Generators, Proceedings of Crypto’90, Springer-Verlag, to appear.
- Shannon, C.E. (1948) A Mathematical Theory of Communication. Bell Syst. Tech. Journal 27: pp. 379-423
- Wolfram, S. (1985) Origins of Randomness in Physical Systems. Physical Review Letters 55: pp. 449-452 CrossRef
- Wolfram, S. (1986) Random Sequence Generation by Cellular Automata. Advances in Applied Mathematics 7: pp. 123-169 CrossRef
- S. Wolfram, Cryptography with Cellular Automata, Advances in Cryptology—Crypto’85, Proceedings, pp. 429–432, Springer-Verlag, 1986.
- Analysis of Pseudo Random Sequences Generated by Cellular Automata
- Book Title
- Advances in Cryptology — EUROCRYPT ’91
- Book Subtitle
- Workshop on the Theory and Application of Cryptographic Techniques Brighton, UK, April 8–11, 1991 Proceedings
- pp 186-199
- Print ISBN
- Online ISBN
- Series Title
- Lecture Notes in Computer Science
- Series Volume
- Series ISSN
- Springer Berlin Heidelberg
- Copyright Holder
- Springer-Verlag Berlin Heidelberg
- Additional Links
- Industry Sectors
- eBook Packages
To view the rest of this content please follow the download PDF link above.