Abstract. In the paper we extend known results studying the application of CAs for stream ciphers. We illustrate the notion of weak keys in such a cryptosystem and describe the experiments related to its implementation on micro-controllers.
Pascal Bouvry, Gilbert Klein, Franciszek Seredynsk