2019
DOI: 10.1016/j.cnsns.2019.104878
|View full text |Cite
|
Sign up to set email alerts
|

Random number generation using decimal cellular automata

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 21 publications
0
4
0
Order By: Relevance
“…In particular, past experience seems to indicate that the best way to employ CA in a symmetric cipher is as nonlinear transformations applied for a single time step, and combining their output with that of other non-CA components to improve diffusion. The best known example of this design pattern is the v transformation used in KECCAK (Bertoni et al 2011), which is now part of the SHA-3 standard for cryptographic hash functions.…”
Section: Cellular Automatamentioning
confidence: 99%
See 1 more Smart Citation
“…In particular, past experience seems to indicate that the best way to employ CA in a symmetric cipher is as nonlinear transformations applied for a single time step, and combining their output with that of other non-CA components to improve diffusion. The best known example of this design pattern is the v transformation used in KECCAK (Bertoni et al 2011), which is now part of the SHA-3 standard for cryptographic hash functions.…”
Section: Cellular Automatamentioning
confidence: 99%
“…Cellular automata (CA) have been extensively investigated as a computational building block for designing several cryptographic primitives. The most famous examples include Wolfram's pseudorandom number generator for Vernam-like stream ciphers (Wolfram 1986), which was based on the chaotic dynamics of the elementary local rule 30 (later shown to be vulnerable to correlation and approximation attacks Meier and Staffelbach 1991;Koc and Apohan 1997), and the v nonlinear transformation by Daemen et al (1994), used as an S-box in KECCAK (Bertoni et al 2011) and other symmetric ciphers. As far as we know, most of these works focused on the study of certain local rules that, when plugged into a CA, would yield good cryptographic functions.…”
Section: Introductionmentioning
confidence: 99%
“…Bhattacharjee et al [4] considered CA rules on a ternary alphabet with diameter d = 3, finding one rule that was able to pass several statistical and empirical tests for randomness. Later, Bhattacharjee et al [3] extended the scope of this investigation to CA with a decimal alphabet, finding a few rules whose randomness can compete with some of the best pseudorandom generators proposed in the literature, both based on CA and not.…”
Section: Related Workmentioning
confidence: 99%
“…Several works related to the PRNG design have been proposed; for example, there are strategies that implement PRNGs using linear feedback shift registers (LFSR) [1][2][3][4][5], while other strategies are based on block cipher [6], stream cipher [7], quantum walks [8], cellular automata [9,10], chaotic oscillators and artificial neural networks (ANN) [11], or chaotic maps [12][13][14][15]. There are also PRNG design approaches that combine several of the above strategies [16].…”
Section: Introductionmentioning
confidence: 99%