=Paper= {{Paper |id=Vol-2603/short3 |storemode=property |title=The Research of Reversible Cellular Automata with a Finite Lattice |pdfUrl=https://ceur-ws.org/Vol-2603/short3.pdf |volume=Vol-2603 |authors=Alexey Chilikov,Alexey Zhukov,Alexey Verkhovsky }} ==The Research of Reversible Cellular Automata with a Finite Lattice== https://ceur-ws.org/Vol-2603/short3.pdf
           Copyright ยฉ 2019 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0)



The Research of Reversible Cellular Automata with a
                  Finite Lattice

                                         Alexey Chilikov, Alexey Zhukov, Alexey Verkhovsky
                                               Information Security department
                      Bauman Moscow State Technical University, Moscow Institute of Physics and Technology
                                                      Moscow, Russia
                            chilikov@passware.com, aez_iu8@rambler.ru, alexey.verkhovsky@mail.ru

    Abstract. The work contains a research about a reversibility
property of cellular automata. Using computational methods, local
connection functions, that provide a property of reversibility to
cellular one-dimensional and two-dimensional automata of
different dimensions, were explicitly obtained. Reversibility criteria          Based on the second model, a hash function was
were obtained for simple cases, as well as properties for which                 recently obtained [7]. A reversible cellular
reversibility is preserved. Authors provided several directions for
theoretical analysis, such as polynomial and group model and gain
                                                                                automaton      such that each of its states has only
several results, which could be relatively easy extended and                    one antecedent. In a recent review [8] it is shown
generalized. The property of cyclicity represent interest for                   that the main results of studies of reversible cellular
developing a theory, similar to theory of LFSR. Reversible cellular
automata with non-linear local function contains properties of
                                                                                automata affect only automata with infinite lattice.
cyclicity and non-linearity, which could be interesting for
cryptographic applications.                                                     For cryptographic applications, it makes no sense to
Keywords โ€” cellular automata, reversible transformations,                       consider such automata. Authors have found
nonlinear transformations, cryptographic primitive, algebraic                   examples of reversible cellular automata with finite
models
                                                                                lattice, as well as proposed areas of theoretical
                           I.         INTRODUCTION                              research and obtained some results.

        For the first time cellular automata were                                                 II.        FORMAL STATEMENT OF PROBLEM
mentioned by John von Neumann in the 40s of the
twentieth century. In 1985 Steven Wolfram                                                 An autonomous finite automaton (1) is called a
described the first stream encryption algorithm on                              cellular automaton                             over a set with
cellular automata [1]. A classical cellular automaton                           d-dimensional lattices, which has size                         ,
is an ordered set of memory cells forming some                                  with a radius of locality ๐‘Ÿ, a neighborhood      local coupling
                                                                                function ๐‘“ that specifies the transition rule.
regular n-dimensional lattice. Many theoretical
studies, especially concerning the theory of
dynamical systems, mostly consider infinite lattice.
In practice, the most widespread cellular automata                                                                           ,
of small dimension-with one-, two- and three-
dimensional      lattices,  usually     infinite.  In
cryptography, as shown in the review [2] โ€“ [5], one-                            where ๐‘† is the set of possible States of the automaton,
dimensional and two-dimensional finite-lattice                                  is the initial state of the automaton, ๐น is the transition function.
                                                                                Denote by                        the lattice cell of the cellular
automata, or models based on generalized cellular
                                                                                automaton with coordinates                           . Denote by
automata, have so far found their application. On
                                                                                                this value if we need to specify its value at the
the basis of a two-dimensional cellular automaton, a
                                                                                time ๐‘ก. Each internal state ๐‘  of the automaton corresponds to
high-performance stream cipher was obtained [6].                                the filling of its lattice. It is described by an ordered set whose
                                                                                components are the values of memory cells, as shown in the
                                                                                formula (2)
    This work was supported by Russian Scientific Foundation Grant N 17-
11-01377.




                                                                                                                                                    12
                                                                   (2)   situations a nonzero and zero boundary, respectively. A
                                                                         cellular automaton is called reversible if each of its states has
Consider a one-dimensional            cellular   automaton        with   the only one preceding state              such that                .
coefficients from .                                                      Obviously this condition is equivalent to the periodicity of the
                                                                         cellular automaton: for each there is such that                    .
                                                                         For cryptography, there are two interesting questions: how to
Cellular automaton is called a one-dimensional Boolean                   calculate the period efficiently and how to construct automata
cellular automaton   (3) with a lattice of size , locality               with maximal possible period (or almost maximal). Let a
radius , neighborhood       and the local communication                  lattice be finite and a set of cell states is . Itโ€™s easy to see
function ๐‘“                                                               that the reversibility is guaranteed if a local communication
                                                                         function of automaton is a shift. In the two-dimensional case,
                                                                  (3)    the cell takes the value of its neighbor, or its inversion. That is,
                                                                         a function of the form (6):
described by an autonomous finite state machine           (4):
                                                                                                                      .               (6)
                                                                  (4)
                                                                         In order to identify nontrivial local communication functions,
                                                                         we wrote a program in C++. This program reveals functions
Here ๐‘† =      is a set of internal states, ๐‘ 0 โˆˆ ๐‘† is an initial state,   that provide reversibility to a cellular automaton with a given
            is a transition function.                                    number of cells by the method of brute force. The source code
                                                                         and the results can be found in the repository [9].
         The    internal  state is described by the set
                          The action of  is to apply a local                         III.     AUTOMATA, OBTAINED BY BRUTE FORCE
communication function to the neighborhood of each cell of
the cellular automaton, as shown in (5)                                           In the course of the program, a large number of
                                                                         functions were obtained that provide reversibility to automata
                                  ,0โ‰ค๐‘ฅ<๐‘‹                         (5)     of dimension 1 and the number of cells from 7 to 23 in the
                                                                         case of a function of three variables, and up to 19 for
                                                                         equilibrium functions of 5 variables. Among them were a
          Let the lattice is finite. In this case we should
                                                                         large number of the aforementioned shift functions as well as
understand how acts near boundaries of lattice. We consider              linear functions. Linear functions are a fairly simple case, they
2 cases. In the first cells near boundary are neighbors to each          provide reversibility to the automaton if and only if the matrix
other, i.e. in the one-dimensional case, the neighbor of the             of the corresponding linear operator acting on the vector
rightmost cell is the leftmost cell (shown at figure 1).                 representing the current state of the automaton is not
                                                                         degenerate. In addition to linear functions as well as shift
                                                                         functions, 542 functions with a nonlinear local communication
                                                                         function were obtained. Among them, the following facts are
                                                                         noticed: the inversion of each function providing reversibility
                                                                         also provides reversibility.

                                                                                             IV.       THEORETICAL ANALYSIS

                                                                                   The non-obvious results prompted a detailed
                                                                         theoretical analysis of the reversible cellular automaton as a
                                                                         model. The following will list the properties that hold for
                                                                         cellular automata.

                                                                         Property 1. If      is a local communication function that
                                                                         provides reversibility for given Boolean cellular automata
  Figure 1. Identification of cells, located near with a lattice         then      also provides reversibility.
     boundary, of a one-dimensional cellular automaton
                                                                         Proof: We will use rule of contraries. For simplicity, consider
 In the second case we assume that beyond the boundaries of              the one-dimensional case (        ). Let be some state of the
the finite lattice there are cells filled with zeros, and they do        cellular automaton                            . And let the
not change when the cellular automata works. We call such                transition function translate the automaton into a state




                                                                                                                                            13
                                      Then         will translate                                                                    (8)
    to                        - state with inverted coordinates.
Suppose that after applying the inverted function, the state
has another predecessor         . But then in the original          Thus, for any coordinate we have the same function depending
automaton, . will be translated by            into      (its own    on the neighboring coordinates of the vector, which means
inversion), and it has only one predecessor, and that is . That     that this map is a cellular automaton. It is worth noting that the
is,    coincides with . Similarly, it is proved for large           function may not be local โ€“ it may well depend on all the
dimensions.                                                         values of all cells of the lattice. The influence of the
                                                                    parameters of the local communication function on the
The following 2 properties are essentially an adaptation of the     distribution of values was studied in [10].
classical results from [9] to the case of a finite lattice.
                                                                    Property 3. For a reversible binary one-dimensional cellular
                                                                    automaton with a nonzero boundary, there is an inverse
Property 2. A map over a vector space is a cellular automaton       cellular automaton.
if and only if it commutes with a cyclic shift operator.            We write the commutativity condition with shift in terms of
                                                                    functions:
Proof: For one-dimensional cellular automata with a nonzero                                                                 (9)
boundary, there is a fact, which is also true for automata with
an infinite lattice, namely, commutativity with a shift
operation. That is, if                  is the function of the
                                                                    Applying right and left      , we get:

cellular automaton, and                   is the function of the

cyclic shift vector     , then                           . This                                                                 (10)

statement is quite obvious, because when applying the cyclic
shift, the content of the neighborhood of each cell will not        That is, the inverse map also commutes with shifts, and
change, and therefore its value will not change when applying       therefore is a cellular automaton.
the transformation of the cellular automaton. The converse is
also true, if a map over a vector space commutes with a shift
operator, then this map is a cellular automaton with a nonzero
boundary. To do this, we show that shift invariance means the       Theorem 1. A substitutional polynomial written using a
homogeneity of the transformation. Let          be a boolean        normal basis will have coefficients from the field .

function showing the change of the -th coordinate of an -bit
                                                                    By normal bases we mean such that each element of the field
vector when the function     acts on it, depending on the value
                                                                        is represented as below:
of neighboring coordinates. Since we work with binary
vectors, we can get it explicitly by applying to each set of

neighboring coordinates (and itself). Having received a
column of values, we write the function f through Zhegalkin
polynom:                                                            The shift condition in this case is written as
                                                              (7)
                                                                                                      .                       (11)

Since the value after the shift does not change for any such
coordinates, and the values of all neighboring cells do not         An reversible cellular automaton is a substitution, so we write
change, then the function does not change during the shift. For     for it a substitution polynomial in the normal basis:
example, if you shift by , the coordinate value is     (8):                                                                 (12)




                                                                                                                                     14
Then the condition of commutativity with shift will be written                                  V.         CONCLUSION
as:
                                                       (13)       Reversible cellular automata are a fairly simple described
                                                                  transformation. They can provide the properties of
Combining with (14), we obtain:                                   nonlinearity and dispersion (the value of the cell on the
                                                                  next cycle affects the entire neighborhood). These
                                                                  properties are very useful for construction of symmetric
                                                                  cryptosystems. In addition, [13] and [14] show ways to
                                                                  construct asymmetric cryptosystems based on reversible
                                                                  cellular automata. The theoretical basis of cellular automata
So           and         .                                        with finite lattice is not yet fully developed. Authors have
                                                                  taken steps in this direction. Obtained results may well
This approach allows us to work with cellular automata as         serve as the beginning of the construction of a theory
mappings over the extension field, which are also                 similar to the theory of linear feedback shift registers
representable as polynomials. More about the properties of        (LFSR).
such a construction is written in [10].
                                                                                                  REFERENCES
Definition 1. Letโ€™s determine a graph by the following rule.
                                                                  [1]  Wolfram S. Cryptography with cellular automata // Lecture Notes in
Let be a finite group , and each vertex of the graph is                Computer Science. 1986. Vol. 218. P. 429โ€“432.
                                                                  [2] Klyucharev P. Methods of designing cryptographic hash-functions based
bijectively mapped to some element of the group. Let also be           on iteration of the uniform cellular automat. Voprosy kiberbezopasnosti
                                                                       [Cybersecurity issues], 2017. No 1 (19), pp. 45-50. DOI:
fixed some subset                       (not necessarily a             10.21681/2311-3456-2017-1-45-50.
                                                                  [3] Zhukov A.E. Kletochnye avtomaty v kriptografii. Chastโ€™ 1, Voprosy
subgroup), and the following property holds: the edge number           kiberbezopasnosti [Cybersecurity issues]. 2017, No 3 (21). P. 70-76.
                                                                       DOI: 10.21581/2311-3456-2017-2-70-76.
  leading to the vertex comes from the vertex        . on the
                                                                  [4] Zhukov A.E. Kletochnye avtomaty v kriptografii. Chastโ€™ 1, Voprosy
                                                                       kiberbezopasnosti [Cybersecurity issues]. 2017, No 4 (22) โ€“ 2017 P. 47-
graph thus described, one can specify a cellular automaton             66. DOI: 10.21681/2311-3456-2017-4-47-66
(both homogeneous and inhomogeneous). We will call such an        [5] Zotov Ya. Usage of cellular automaton in symmetric-key algorithm.
                                                                       Voprosy kiberbezopasnosti [Cybersecurity issues], 2015. No 3 (11) , pp.
automaton a group automaton, and a group          a carrier            43-45.
                                                                  [6] Suhinin            B.M.       Vysokoskorostnye                 generatory
automaton. The connection function will take the form                  psevdosluchajnyh posledovatelโ€™nostej na osnove kletochnyh avtomatov,
           , and the equation describing the operation of the          Prikladnaya diskretnaya matematika. โ€“ 2010. โ€“ No2. โ€“ S. 34โ€“41.
                                                                  [7] Klyucharev P.G. Metod postroeniya kriptograficheskikh khesh-funktsiy
                                                                       na osnove iteratsiy obobshchennogo kletochnogo avtomata, Voprosy
automaton will have the form:                                          kiberbezopasnosti [Cybersecurity issues]. 2017. N 1 (19). P. 45-50.
                                                                  [8] Kari, J.: Reversible Cellular Automata: From Fundamental Classical
                                                                       Results to Recent Developments.: New Generation Computing 36, 145โ€“
                                                          (15)         172 (2018)
                                                                  [9] Bitbucket: repository
                                                                       https://bitbucket.org/KleshIvanovich/bruterca/src/master/
                                                                  [10] Suhinin B.M. O vliyanii parametrov lokalโ€™noj funkcii svyazi na
A quasi-group automaton can be defined similarly by                    raspredelenie znachenij yacheek dvoichnyh kletochnyh avtomatov,
replacing the word "group" with "quasi-group". Recall that in          Obedinennyj nauchnyj zhurnal. โ€“ 2010. โ€“ No. 8. โ€“ S. 39โ€“41.
a quasigroup, the associativity property is not necessarily,      [11] Hedlund, G.A.: Endomorphisms and automorphisms of the shift
unlike a group. This definition can be very useful for studying        dynamical systems. Math. Syst. Theory 3(4), 320โ€“375 (1969)
the periodicity properties of the cellular automaton. In          [12] Lidl R., Niederreiter H. (1997), Finite Fields (2nd ed.), Cambridge
addition, the considered classical automata can be considered          University Press, ISBN 0-521-39231-4
as automata whose carrier is a cyclic group, which naturally      [13] Puhua Guan.: Cellular Automaton Public-Key Cryptosystem. Complex
                                                                       Systems 1 51- 57 (1987)
leads to the idea of generalizing the developed theory by
                                                                  [14] Xing Zhang, Rongxing Lu, Hong Zhang, and Chungen Xu: A New
transferring it to a wider class of groups (for example, finite        Public Key Encryption Scheme based on Layered Cellular Automata.
Abelian).                                                              KSII Transactions on internet and information systems. Vol. 8, No. 10
                                                                       (2014)




                                                                                                                                           15