From: tcmay@got.net (Timothy C. May)
To: cypherpunks@toad.com
Message Hash: b7fcd0c0153a53194accfafe6742f6eb87dd5073125ca566e6902f739cfde613
Message ID: <ad6763a10a021004611d@[205.199.118.202]>
Reply To: N/A
UTC Datetime: 1996-03-10 01:25:56 UTC
Raw Date: Sun, 10 Mar 1996 09:25:56 +0800
From: tcmay@got.net (Timothy C. May)
Date: Sun, 10 Mar 1996 09:25:56 +0800
To: cypherpunks@toad.com
Subject: Re: Fractals, Cellular Automata, and Encryption
Message-ID: <ad6763a10a021004611d@[205.199.118.202]>
MIME-Version: 1.0
Content-Type: text/plain
At 11:35 PM 3/9/96, Alan Bostick wrote:
>Howard Gutowitz published and patented in 1992 a symmetric block cipher
>algorithm, based on cellular automata, called CA-1.1 . There are a
>couple of CA-based hash algorithms. CA-based PRNGs have been shown to
>be isomorphic to linear feedback shift register RNGs (not linear
>congruential generators, despite what Tim says) and so are subject to
>the same security woes as LFSRs.
Yeah, that sounds like what it is. This is what I get for answering a
question without checking reference sources and/or FAQs, including my own
FAQ, wherein it is written:
18.6.2. "Can cellular automata, like Conway's "Game of Life," be used
for cryptography?"
- Stephen Wolfram proposed use of cellular automata for
crytography some years back; his collection of essays on
cellular automata contains at least one such mention. Many
people suspected that 1D CAs were no stronger than linear
feedback shift registers (LFSRs), and I recally hearing a
couple of years ago that someone proved 1D CAs (and maybe
all CAs?) are equivalent to LFSRs, which have been used in
crypto for many years.
- Wolfram's book is "Theory and Applications of Cellular
Automata," 1986, World Scientific. Several papers on using
CAs for random sequence generation. P. Bardell showed
in1990 that CAs produce the outputs of LFSRs.) Wolfram also
has a paper, "Cryptography with cellular automata," in
Proc. CRYPTO 85.
- Intuitively, the idea of a CA looks attractive for "one-way
functions," for the reasons mentioned. But what's the
"trapdoor" that gives the key holder a shortcut to reverse
the process? (Public key crypto needs a trapdoor 1-way
funtion that is easy to reverse if one has the right
information).
On the other hand, if more people asking questions about fractals, chaos,
quantum cryptography, etc., would check the usual places, others would not
have to do this searching for them. (To his credit, the guy who asked today
if anyone knew anything about the "index of coincidence" did say that he
first grepped through my FAQ.)
--Tim May
Boycott "Big Brother Inside" software!
We got computers, we're tapping phone lines, we know that that ain't allowed.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May | Crypto Anarchy: encryption, digital money,
tcmay@got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets,
Higher Power: 2^756839 - 1 | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."
Return to March 1996
Return to “tcmay@got.net (Timothy C. May)”
1996-03-10 (Sun, 10 Mar 1996 09:25:56 +0800) - Re: Fractals, Cellular Automata, and Encryption - tcmay@got.net (Timothy C. May)