Evolutionary algorithms for designing reversible cellular automata

Journal Article (2021)
Author(s)

Luca Mariot (TU Delft - Cyber Security)

Stjepan Picek (TU Delft - Cyber Security)

Domagoj Jakobovic (University of Zagreb)

Alberto Leporati (Università degli Studi di Milano Bicocca)

Research Group
Cyber Security
DOI related publication
https://doi.org/10.1007/s10710-021-09415-7
More Info
expand_more
Publication Year
2021
Language
English
Research Group
Cyber Security
Issue number
4
Volume number
22
Pages (from-to)
429-461
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Reversible Cellular Automata (RCA) are a particular kind of shift-invariant transformations characterized by dynamics composed only of disjoint cycles. They have many applications in the simulation of physical systems, cryptography, and reversible computing. In this work, we formulate the search of a specific class of RCA – namely, those whose local update rules are defined by conserved landscapes – as an optimization problem to be tackled with Genetic Algorithms (GA) and Genetic Programming (GP). In particular, our experimental investigation revolves around three different research questions, which we address through a single-objective, a multi-objective, and a lexicographic approach. In the single-objective approach, we observe that GP can already find an optimal solution in the initial population. This indicates that evolutionary algorithms are not needed when evolving only the reversibility of such CA, and a more efficient method is to generate at random syntactic trees that define the local update rule. On the other hand, GA and GP proved to be quite effective in the multi-objective and lexicographic approach to (1) discover a trade-off between the reversibility and the Hamming weight of conserved landscape rules, and (2) observe that conserved landscape CA cannot be used in symmetric cryptography because their Hamming weight (and thus their nonlinearity) is too low.