Ninjastic
Home
Search
Users
Boards
Addresses
Ctrl + K
Toggle theme
Open menu
Post
Edited versions
Quotes to this post
Post
7896253
Topic
698460
Board
Development & Technical Discussion
Re: Rule 30 automaton as hash function
by
Anders
on
17/07/2014, 17:10:59 UTC
Quote from: dentldir on July 17, 2014, 04:37:46 PM
A relevant cryptanalysis can be found in:
Analysis of Pseudo Random Sequences Generated by Cellular Automata
Willi Meier, Othmar Stdelbach
It doesn't cover every other center bit but does address the CA as a whole.
It seems that using cellular automata for hash functions is a viable option according to that paper:
http://download.springer.com/static/pdf/386/chp%253A10.1007%252F3-540-46416-6_17.pdf?auth66=1405789057_31fc1522b59f8110ad57d060b99b9ccc&ext=.pdf
I wonder how well my Rule 30 hash function performs. I have no clue how to test it. It would be good to have a general test that can be fed a bulk of sample hashes. I found this:
http://hashtest.sourceforge.net
but I can't determine whether the test is useful or not. I guess I need to learn more about cryptography.