Cellular automata (CA) are particularly well suited for cryptographic application and there are several previous studies in this topic (Benkiniouar & Benmohamed, 2004; Gutowitz, 1995; Kari, 1992; Nandi et al., 1994; Oliveira et al., 2004; 2008; Seredynski et al., 2003; Tomassini & Perrenoud, 2000; Wuensche, 2008; Wolfram, 1986). Since CA rule is simple, local and discrete, it can be executed in...