A Unique Educational & Career Opportunity with Stephen Wolfram

A unique opportunity to do original research at the frontiers of science, the Wolfram Science Summer School teaches about 50 students from a diverse range of scientific backgrounds how to use Stephen Wolfram's A New Kind of Science and the Wolfram Language to implement projects in their fields of interest. Most of these students are advanced undergraduates and early graduate students, but those in different circumstances are considered. We are looking for students who want to enhance their careers with Wolfram Science and the Wolfram Language. Read more »

Class of 2006

Enrico Zimuel

Bio [2006]

Enrico Zimuel is a research programmer at the Informatics Institute of the University of Amsterdam (the Netherlands). He received his laurea degree cum laude in computer science and economics from the G. d'Annunzio University of Chieti-Pescara (Italy).

He worked as an IT consultant for more than 10 years, with many Italian companies in the sectors of IT security and software development. In 1999 he coauthored a book about cryptography named Secrets, Spies and Codes Number (Apogeo, Italy). Moreover, he published articles on cryptography, computer security, and query processing for XML.

Now he collaborates with the Science Department of the G. d'Annunzio University of Chieti-Pescara. His (other) personal interests include traveling, electronic music, computer art, poetry, cinema, free climbing, kickboxing, swimming, mountain biking, etc.

Project Title

A New Cryptographic Hash Function Based on the Cellular Automaton Rule 30


The aim of my project is to use the cellular automaton rule 30 to create a secure cryptographic hash function. A hash function H is a transformation that takes a variable-size input m and returns a fixed-size string, which is called the hash value h (that is, h = H(m)). Hash functions with just this property have a variety of general computational uses, but when employed in cryptography the hash functions are usually chosen to have some additional properties.

The basic requirements for a cryptographic hash function are:

  • The input can be of any length
  • The output has a fixed length
  • H(x) is relatively easy to compute for any given x
  • H(x) is one-way
  • H(x) is collision-free

A hash function H is said to be one-way if it is hard to invert, where "hard to invert" means that given a hash value h, it is computationally infeasible to find some input x such that H(x) = h.

If, given a message x, it is computationally infeasible to find a message y not equal to x such that H(x) = H(y), then H is said to be a weakly collision-free hash function.

A strongly collision-free hash function H is one for which it is computationally infeasible to find any two messages x and y such that H(x) = H(y).

I'll use the Avalanche Test and the Collision Test to prove the security of the hash function. Moreover, I'll investigate the global and local reversibility of the cellular automaton rule 30.

Favorite Four-Color, Radius-1/2 Rule

Rule chosen: 2536347893

Note: This number is prime. 2536347893==Prime[123123123]