• Title/Summary/Keyword: Symmetric transition rule

Search Result 2, Processing Time 0.015 seconds

Completed Stream Cipher by Cellular Automata - About Cellular Automata rule 30 - (Cellular Automata 기초로 형성된 Stream Cipher - Cellular Automata rule 30을 중심으로 -)

  • Nam, Tae-Hee
    • Journal of the Korea Computer Industry Society
    • /
    • v.9 no.2
    • /
    • pp.93-98
    • /
    • 2008
  • In this study, analyzed principle about stream cipher that is formed to Cellular Automata foundation. Cellular Automata can embody complicated and various principle with simple identifying marks that is State, Neighborhood, Transition Rules originally. Cellular Automata is hinting that can handle encipherment smoothly using transition rule. Create binary pad (key stream) by Cellular Automata's transition rule 30 applications in treatise that see therefore, and experimented ability of encryption and decryption because using stream cipher of symmetric key encryption way of password classification.

  • PDF

ANALYSIS OF THE 90/150 CA GENERATED BY LINEAR RULE BLOCKS

  • CHO, SUNG-JIN;KIM, HAN-DOO;CHOI, UN-SOOK;KIM, JIN-GYOUNG;KANG, SUNG-WON
    • Journal of applied mathematics & informatics
    • /
    • v.37 no.1_2
    • /
    • pp.23-35
    • /
    • 2019
  • Self-reciprocal polynomials are important because it is possible to specify only half of the coefficients. The special case of the self-reciprocal polynomial, the maximum weight polynomial, is particularly important. In this paper, we analyze even cell 90/150 cellular automata with linear rule blocks of the form < $a_1,{\cdots},a_n,d_1,d_2,b_n,{\cdots},b_1$ >. Also we show that there is no 90/150 CA of the form < $U_n{\mid}R_2{\mid}U^*_n$ > or < $\bar{U_n}{\mid}R_2{\mid}\bar{U^*_n}$ > whose characteristic polynomial is $f_{2n+2}(x)=x^{2n+2}+{\cdots}+x+1$ where $R_2$ =< $d_1,d_2$ > and $U_n$ =< $0,{\cdots},0$ >, and $\bar{U_n}$ =< $1,{\cdots},1$ >.