A puzzle lies behind password authentication (PA) and blockchain proof of work (PoW). cryptographic hash function is commonly used to implement them. The potential problem with secure functions their complexity rigidity. We explore the use complex systems constructs such as a cellular automaton (CA) provide functionality. analysis shows that computational irreducibility sensitivity initial stat...