Some Remarks and Tests on the Dh1 Cryptosystem Based on Automata Compositions
DOI:
https://doi.org/10.31449/inf.v43i2.2687Abstract
In this paper we discuss NIST test results of a previously introduced cryptosystem based on automata compositions. We conclude that the requirements of NIST test are all fulfilled by the cryptosystem.References
[Dömösi and Horváth, 2015a] Dömösi, P. and Horváth, G.(2015). A novel cryptosystem based on abstract automata and Latin cubes. Studia Scientiarum Mathematicarum Hungarica, 52(2):221–232. https://doi.org/10.1556/012.2015.52.2.1309
[Dömösi and Horváth, 2015b] Dömösi, P. and Horváth, G.(2015). A novel cryptosystem based on Gluškov product of automata. Acta Cybernetica, 22:359–371.https://doi.org/10.14232/actacyb.22.2.2015.8
[Dömösi et al., 2017] Dömösi, P., Gáll, J., Horváth, G and Tihanyi, N. (2017). Statistical Analysis of DH1 Cryptosystem. Acta Cybrnetica, 23:371–378.https://doi.org/10.14232/actacyb.23.1.2017.20
[Dömösi and Nehaniv, 2005] Dömösi, P. and Nehaniv, C.L. (2005). Algebraic theory of automata networks: An introduction. ser. SIAM monographs on Discrete Mathematics and Applications, vol.11, Society for Industrial and Applied Mathematics (SIAM), Philadelphia, PA. https://doi.org/10.1137/1.9780898718492
[Mezenes and Vanstone, 1996] Menezes, P. C. O. A. J. and Vanstone, S. A. (1996). Handbook of Applied Cryptography ser. Discrete Mathematics and Its Applications. CRC Press. https://doi.org/10.1201/9781439821916
[Rukhin et al., 2010] Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., Levenson, M., Vangel, M., Banks, D., Heckert, A., Dray, J., Vo, S.(2010). NIST Special Publication 800-22: A Statistical Test Suite for Random and Pseudo Random Number Generators for Cryptographic Applications. National Institute of Standards and Technology,https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-22r1a.pdf, downloaded in August 2016. https://doi.org/10.6028/nist.sp.800-22
[Tihanyi et al., 2015] Tihanyi, N., Kovács, A., Vargha, G., Lénárt, Á. Unrevealed Patterns in Password Databases Part One: Analyses of Cleartext Passwords. Technology and Practice of Passwords.PASSWORDS 2014. Lecture Notes in Computer Science, vol 9393. https://doi.org/10.1007/978-3-319-24192-0_6
Downloads
Published
How to Cite
Issue
Section
License
I assign to Informatica, An International Journal of Computing and Informatics ("Journal") the copyright in the manuscript identified above and any additional material (figures, tables, illustrations, software or other information intended for publication) submitted as part of or as a supplement to the manuscript ("Paper") in all forms and media throughout the world, in all languages, for the full term of copyright, effective when and if the article is accepted for publication. This transfer includes the right to reproduce and/or to distribute the Paper to other journals or digital libraries in electronic and online forms and systems.
I understand that I retain the rights to use the pre-prints, off-prints, accepted manuscript and published journal Paper for personal use, scholarly purposes and internal institutional use.
In certain cases, I can ask for retaining the publishing rights of the Paper. The Journal can permit or deny the request for publishing rights, to which I fully agree.
I declare that the submitted Paper is original, has been written by the stated authors and has not been published elsewhere nor is currently being considered for publication by any other journal and will not be submitted for such review while under review by this Journal. The Paper contains no material that violates proprietary rights of any other person or entity. I have obtained written permission from copyright owners for any excerpts from copyrighted works that are included and have credited the sources in my article. I have informed the co-author(s) of the terms of this publishing agreement.
Copyright © Slovenian Society Informatika