On finite automaton public-key cryptosystem
✍ Scribed by Renji Tao; Shihua Chen
- Publisher
- Elsevier Science
- Year
- 1999
- Tongue
- English
- Weight
- 236 KB
- Volume
- 226
- Category
- Article
- ISSN
- 0304-3975
No coin nor oath required. For personal study only.
✦ Synopsis
In this paper, we propose a ÿnite-automaton public-key cryptosystem. The compound ÿnite automaton of the public key of this cryptosystem consists of n + 1 ÿnite automata, where n is an arbitrary positive integer. This cryptosystem contains FAPKC3 and FAPKC4 as special cases, and can be used for encryption and for digital signature. We deal with the problem of generating safe keys. Some results on generating ÿnite automata with desired properties on invertibility are brie y mentioned. Relations of R a R b transformation sequences with linear Ra are characterized. We prove that for inversion of ÿnite automata by linear Ra R b transformation method, in a sense, only one linear Ra R b transformation sequence is enough. We give a feasible inversion algorithm for compound ÿnite automaton, of which one component belongs to quasi-linear ÿnite automata and the other component belongs to a kind of weakly invertible or weak inverse ÿnite automata generated by linear Ra R b inverse transformation. Some applications to the key-generator of FAPKCs are discussed and several linear attacks are considered.
📜 SIMILAR VOLUMES
The most lethal and most expensive weapon in the Gulf War was the electronic information system deployed by the multinational troops. This information system was large-scale, advanced in technology, strict in organization, and high in operational efficiency, providing the overall, precise, timely, a
We demonstrate that with the given specifications the Lyndon words based public key cryptosystem suggested by Siromoney and Mathew [Inform. Process. Lett. 35 (1990) 33-36] is susceptible to very simple ciphertext only attacks. Consequently, in the present form this system cannot be considered as suf
## Received date A new public key cryptosystem was introduced by Wu and Dawson at the Fourth International Conference on Finite Fields (Fq4). This scheme is similar to the McEliece public key cryptosystem, in the sense that it also can be described in terms of linear error-correcting codes over "n