Advertisement

Latin Hypercubes and Cellular Automata

  • Maximilien Gadouleau
  • Luca MariotEmail author
Conference paper
  • 80 Downloads
Part of the Lecture Notes in Computer Science book series (LNCS, volume 12286)

Abstract

Latin squares and hypercubes are combinatorial designs with several applications in statistics, cryptography and coding theory. In this paper, we generalize a construction of Latin squares based on bipermutive cellular automata (CA) to the case of Latin hypercubes of dimension \(k>2\). In particular, we prove that linear bipermutive CA (LBCA) yielding Latin hypercubes of dimension \(k>2\) are defined by sequences of invertible Toeplitz matrices with partially overlapping coefficients, which can be described by a specific kind of regular de Bruijn graph induced by the support of the determinant function. Further, we derive the number of k-dimensional Latin hypercubes generated by LBCA by counting the number of paths of length \(k-3\) on this de Bruijn graph.

Keywords

Latin squares Latin hypercubes Cellular automata Bipermutivity Toeplitz matrices De bruijn graphs 

Notes

Acknowledgments

This work has been partially supported by COST Action IC1405, “Reversible Computation – Extending the Horizons of Computing”.

References

  1. 1.
    Blakley, G.R.: Safeguarding cryptographic keys. In: Managing Requirements Knowledge, International Workshop on, pp. 313–317 (1979)Google Scholar
  2. 2.
    Daykin, D.: Distribution of bordered persymmetric matrices in a finite field. J. Reine Angew. Math. (Crelle’s J.) 203, 47–54 (1960)MathSciNetzbMATHGoogle Scholar
  3. 3.
    García-Armas, M., Ghorpade, S.R., Ram, S.: Relatively prime polynomials and nonsingular Hankel matrices over finite fields. J. Comb. Theory Ser. A 118(3), 819–828 (2011)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Herranz, J., Sáez, G.: Secret sharing schemes for (kn)-consecutive access structures. In: Camenisch, J., Papadimitratos, P. (eds.) CANS 2018. LNCS, vol. 11124, pp. 463–480. Springer, Cham (2018).  https://doi.org/10.1007/978-3-030-00434-7_23CrossRefGoogle Scholar
  5. 5.
    Mariot, L., Gadouleau, M., Formenti, E., Leporati, A.: Mutually orthogonal Latin squares based on cellular automata. Des. Codes Cryptogr. 88(2), 391–411 (2019).  https://doi.org/10.1007/s10623-019-00689-8MathSciNetCrossRefzbMATHGoogle Scholar
  6. 6.
    Mariot, L., Leporati, A.: Sharing secrets by computing preimages of bipermutive cellular automata. In: Wąs, J., Sirakoulis, G.C., Bandini, S. (eds.) ACRI 2014. LNCS, vol. 8751, pp. 417–426. Springer, Cham (2014).  https://doi.org/10.1007/978-3-319-11520-7_43CrossRefzbMATHGoogle Scholar
  7. 7.
    Mariot, L., Leporati, A., Dennunzio, A., Formenti, E.: Computing the periods of preimages in surjective cellular automata. Nat. Comput. 16(3), 367–381 (2016).  https://doi.org/10.1007/s11047-016-9586-xMathSciNetCrossRefGoogle Scholar
  8. 8.
    Mariot, L., Picek, S., Leporati, A., Jakobovic, D.: Cellular automata based s-boxes. Cryptogr. Commun. 11(1), 41–62 (2019)MathSciNetCrossRefGoogle Scholar
  9. 9.
    Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)MathSciNetCrossRefGoogle Scholar
  10. 10.
    Stinson, D.R.: Combinatorial Designs - Constructions and Analysis. Springer, New York (2004).  https://doi.org/10.1007/b97564CrossRefzbMATHGoogle Scholar
  11. 11.
    Sutner, K.: De Bruijn graphs and linear cellular automata. Complex Syst. 5(1), 19–30 (1991)MathSciNetzbMATHGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2020

Authors and Affiliations

  1. 1.Department of Computer ScienceDurham UniversityDurhamUK
  2. 2.Cyber Security Research GroupDelft University of TechnologyDelftThe Netherlands

Personalised recommendations