Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Cellular automata computations and secret key cryptography
Seredynski F., Bouvry P., Zomaya A. (ed) Parallel Computing30 (5-6):753-766,2004.Type:Article
Date Reviewed: Oct 7 2004

Cellular automata have the advantage of being amenable to the use of highly parallel and distributed system configurations, and, therefore, have attracted the attention of many researchers in recent years, most notably S. Wolfram.

This paper studies the possibility of producing a set of rules for cellular automata that will generate pseudorandom number sequences of very high statistical quality, which can in turn be used to construct a secret-key cryptosystem that is resistant to attack. A set of eight such rules is selected, and the results of experiments on them are presented, showing that they indeed produce sequences of the desired quality.

Reviewer:  Jonathan Golan Review #: CR130241
Bookmark and Share
  Reviewer Selected
 
 
Unbounded-Action Devices (F.1.1 ... )
 
 
Code Breaking (E.3 ... )
 
 
Random Number Generation (G.3 ... )
 
 
Data Encryption (E.3 )
 
Would you recommend this review?
yes
no
Other reviews under "Unbounded-Action Devices": Date
An efficient solution of the firing mob problem
Karel I., Dube S. Theoretical Computer Science 91(1): 57-69, 1991. Type: Article
Nov 1 1992
Real-time, pseudo real-time, and linear-time ITA
Karel I., Yu S. Theoretical Computer Science 47(1): 15-26, 1986. Type: Article
May 1 1988
Cellular automata machines: a new environment for modeling
Toffoli T. (ed), Margolus N., MIT Press, Cambridge, MA, 1987. Type: Book (9789780262200608)
Jan 1 1988
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy