• Title/Summary/Keyword: Group Cellular Automata

Search Result 18, Processing Time 0.024 seconds

Characterization of Uniform/Hybrid Complemented Group Cellular Automata with Rules 195/153/51 (전이규칙 195,153,51을 갖는 Uniform/Hybrid 여원 그룹 셀룰라 오토마타의 특성화)

  • Hwang, Yoon-Hee;Cho, Sung-Jin;Choi, Un-Sook;Kim, Seok-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.315-318
    • /
    • 2005
  • Recently, the advent of wireless communication and other handhold devices like Personal Digital Assistants and smart cards have made in implementation of cryptosystems a major issue. One important aspect of modern day ciphers is the scope for hardware sharing between the encryption and decryption algorithm. The cellular Automata which have been proposed as an alternative to linear feedback shift registers(LFSRs) can be programmed to perform the operations without using any dedicated hardware. But to generalize and analyze CA is not easy. In this paper, we characterizes uniform/hybird complemented group CA with rules 195/153/51 that divide the entire state space into smaller spaces of maximal equal lengths. This properties can be useful in constructing key agreement algorithm.

  • PDF

Complemented Group Cellular Automata derived from Complement Vectors (여원벡터에 의해 유도된 여원 그룹 셀룰라 오토마타에 관한 연구)

  • Cho, Sung-Jin;Hwang, Yoon-Hee;Choi, Un-Sook;Pyo, Yong-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.1063-1066
    • /
    • 2005
  • 셀룰라 오토마타(Cellular Automata, 이하 CA)는 LFSR의 대안으로 제안되었으나 일반화와 분석이 어려워 거의 이뤄지지 않고 있다. 본 논문에서는 특별한 전이규칙을 가지는 그룹 CA에서 각각의 여원벡터에 대응하여 유도되는 여원 그룹 CA의 구조를 분석한다. 여기서 분석하는 그룹 여원 CA는 전체 상태가 그룹 CA의 최대 주기나 그것의 2배가 되는 같은 길이의 사이클들로 분리된다. 이러한 성질은 암호학에서 키 공유 프로토콜에 유용한 성질로 사용될 수 있다.

  • PDF

Expander graphs based on 60/102 NBCA and its application (60/102 NBCA에 기반을 둔 확장그래프들과 그 응용)

  • Kim, Han-Doo;Cho, Sung-Jin;Choi, Un-Sook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.9
    • /
    • pp.1939-1946
    • /
    • 2011
  • Expander graphs are useful in the design and analysis of communication networks. Mukhopadhyay et. al introduced a method to generate a family of expander graphs based on nongroup two predecessor single attractor CA(Cellular Automata). In this paper we propose a method to generate a family of expander graphs based on 60/102 Null boundary CA(NBCA) which is a group CA. The spectral gap generated by our method is larger than that of Mukhopadhyay et. al [12]. As an application we give an algorithm which generate one-way functions whose security lies on the combinatorial properties of our expander graphs. the one-way function using d-regular graph generated by the 60/102 NBCA is based on the Goldreich's construction [5].

Synthesis of Uniform CA and 90/150 Hybrid CA (Uniform CA와 90/150 Hybrid CA의 합성)

  • Kim, Han-Doo;Cho, Sung-Jin;Choi, Un-Sook;Kwon, Min-Jeong;Kong, Gil-Tak
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.3
    • /
    • pp.293-302
    • /
    • 2016
  • In this paper we analyze the CA formed by combining the uniform 102 CA $\mathbb{C}_u$ and the m-cell 90/150 hybrid CA $\mathbb{C}_h$ whose characteristic polynomial is $(x+1)^m$. We analyze cycle structures of complemented group CA derived from $\mathbb{C}_u$ and propose a condition of complemented CA dividing the entire state space into smaller cycles of equal lengths. And we analyze the cycle structure of complemented group CA $\mathbb{C}^{\prime}$ derived from the CA $\mathbb{C}$ formed by combining $\mathbb{C}_u$ and $\mathbb{C}_h$ with complement vector F such that $(T+I)^{q-1}F{\neq}0$ where $(x+1)^q$ is the minimal polynomial of $\mathbb{C}$.

ANALYSIS OF COMPLEMENTED GROUP CA DERIVED FROM 90/150 GROUP CA

  • KWON, MIN-JEONG;CHO, SUNG-JIN;KIM, HAN-DOO;CHOI, UN-SOOK;KONG, GIL-TAK
    • Journal of applied mathematics & informatics
    • /
    • v.34 no.3_4
    • /
    • pp.239-247
    • /
    • 2016
  • In recent years, CA has been applied to image security due to its simple and regular structure, local interaction and random-like behavior. Since the initial state is regenerated after some iterations in the group CA, the receiver is able to decrypt by the same CA. Pries et al. showed that the all lengths of the cycles in the complemented group CA C with rules 195, 153, and 51 are equal to the order of C. Nandi et al. reported the encryption technique using C. These results can be made efficient use in cryptosystem by expanding the Nandi's key space. In this paper, we analyze the order of the complemented group CA derived from 90=150 group CA and show that all the lengths of the cycles in the complemented CA are equal to the order of the complemented CA.

A Study on the Characteristics of Topological Invariant Expression in the Space of Digital Architecture (디지털건축공간에 나타난 위상기하학적 불변항의 표현특성에 관한 연구)

  • Bae Kang-Won;Park Chan-Il
    • Korean Institute of Interior Design Journal
    • /
    • v.14 no.3 s.50
    • /
    • pp.64-72
    • /
    • 2005
  • The purpose of this study is to propose a topological design principles and to analyze the space of digital architecture applying topological invariant expressive characteristics. As this study is based on topology as a science of true world's pattern, we intented to explain the concepts and provide some methods of low-level and hyperspace topological invariant Properties. Four major aspects are discussed. Those are connection theory, boundary concept, homotopy group, knot Pattern theory as topological invariant properties. Then we intented to make understand topological characteristics of the Algorithms, luring machine, cellular automata, string theory, membrane, DNA and supramolecular chemistry. In fine, the topological invariant properties of the digital architecture as genetic algorithms based on self-organization and heterogeneous networks of interacting actors can be analyzed and used as a critical tool. Therefore topology can be provided endless possibilities for architecture, designers and scientists intended in expressing the more complex and organic patterns of nature as life.

Analysis of Characteristic Polynomials of 90/150 Group CA (90/150 그룹 CA의 특성다항식 분석)

  • Cho Sung-Jin;Kim Kyung-Ja;Choi Un-Sook;Hwang Yoon-Hee;Kim Han-Doo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.393-396
    • /
    • 2006
  • In this paper, we analyze the characteristic polynomials of 90/150 cellular automata which uses only 90, 150 rules as state-transition rules. In particular, we propose the method which the characteristic polynomial is represented as the exponential type of a primitive polynomial by synthesizing 90/150 CA.

  • PDF

Modeling and simulation of large crowd evacuation in hazard-impacted environments

  • Datta, Songjukta;Behzadan, Amir H.
    • Advances in Computational Design
    • /
    • v.4 no.2
    • /
    • pp.91-118
    • /
    • 2019
  • Every year, many people are severely injured or lose their lives in accidents such as fire, chemical spill, public pandemonium, school shooting, and workplace violence. Research indicates that the fate of people in an emergency situation involving one or more hazards depends not only on the design of the space (e.g., residential building, industrial facility, shopping mall, sports stadium, school, concert hall) in which the incident occurs, but also on a host of other factors including but not limited to (a) occupants' characteristics, (b) level of familiarity with and cognition of the surroundings, and (c) effectiveness of hazard intervention systems. In this paper, we present EVAQ, a simulation framework for modeling large crowd evacuation by taking into account occupants' behaviors and interactions during an emergency. In particular, human's personal (i.e., age, gender, disability) and interpersonal (i.e., group behavior and interactions) attributes are parameterized in a hazard-impacted environment. In addition, different hazard types (e.g., fire, lone wolf attacker) and propagation patterns, as well as intervention schemes (simulating building repellent systems, firefighters, law enforcement) are modeled. Next, the application of EVAQ to crowd egress planning in an airport terminal under human attack, and a shopping mall in fire emergency are presented and results are discussed. Finally, a validation test is performed using real world data from a past building fire incident to assess the reliability and integrity of EVAQ in comparison with existing evacuation modeling tools.