I noticed that the algorithm for Rule 30 is somewhat similar to what you would find from a hashing function and wondered whether you can use it for that.
Apparently, someone did a cryptanalysis on it: https://www.semanticscholar.org/paper/A-New-Cryptographic-Hash-Function-Based-on-Cellular-Jamil-Mahmood/1563c58daf7a9f63784ee19a98aeb529b7eb66bb
I noticed that the algorithm for Rule 30 is somewhat similar to what you would find from a hashing function and wondered whether you can use it for that.
Apparently, someone did a cryptanalysis on it: https://www.semanticscholar.org/paper/A-New-Cryptographic-Hash-Function-Based-on-Cellular-Jamil-Mahmood/1563c58daf7a9f63784ee19a98aeb529b7eb66bb