Abstract
In this paper, weights of output set and of input set for finite automata are discussed. For a weakly invertible finite automaton, we prove that for states with minimal output weight, the distribution of input sets is uniform. Then for a kind of compound finite automata, we give weights of output set and of input set explicitly, and a characterization of their input-trees. For finite automaton public key cryptosystems, of which automata in public keys belong to such a kind of compound finite automata, we evaluate search amounts of exhaust search algorithms in average case and in worse case for both encryption and signature, and successful probabilities of stochastic search algorithms for both encryption and signature. In addition, a result on mutual invertibility of finite automata is also given.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Diffie W, Hellman M. New directions in cryptography.IEEE Trans. Information Theory, 1976, IT-22: 644–654.
Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems.Communications of the ACM, 1978, 21: 120–126.
Merkle R C, Hellman M E. Hiding information and signatures in trapdoor knapsacks.IEEE Trans. Information Theory, 1978, 24: 525–530.
McEliece R J. A public-key cryptosystem based on algebraic coding theory. DSN Progress Report, 1978, pp. 42–44.
ElGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms.IEEE Trans. Information Theory, 1985, IT-31: 469–472.
Koblitz N. Elliptic curve cryptosystems.Mathematics of Computation, 1987, 48: 203–209.
Salomaa A. Public-Key Cryptography. Springer-Verlag, Berlin, 1990.
Smith P. LUC public-key encryption.Dr. Dobb’s Journal, 1993, 18: 44–49.
Tao R, Chen S. A finite automaton public key cryptosystem and digital signatures.Chinese J. of Computers, 1985, 8: 401–409 (in Chinese).
Tao R, Chen S. Two varieties of finite automaton public key cryptosystem and digital signatures.J. of Computer Science and Technology, 1986, 1: 9–18.
Tao R, Chen S, Chen X. FAPKC3: A new finite automaton public key cryptosystem.J. of Computer Science and Technology, 1997, 12: 289–305.
Tao R, Chen S. A variant of the public key cryptosystem FAPKC3.J. of Network and Computer Applications, 1997, 20: 283–303.
Tao R, Chen S. A note on the public key cryptosystem FAPKC3. InAdvances in Cryptology—CHI-NACRYPT’98, Science Press, Beijing, 1998.
Tao R, Chen S. The generalization of public key cryptosystem FAPKC4.Chinese Science Bulletin, 1999, 44: 784–790.
Tao R, Chen S. On finite automaton public key cryptosystem.Theoretical Computer Science, 1999, 226: 143–172.
Dai D, Wu K, Zhang H. Cryptanalysis on a finite automaton public key cryptosystem.Science in China, Ser. A, 1996, 39: 27–36.
Tao R. On invertibility of some compound finite automata. Technical Report No. ISCAS-LCS-95-06, Laboratory for Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, June 1995.
Bao F, Igarashi Y. Break finite automata public key cryptosystem. InICALP’95, Automata, Languages and Programming, LNCS 944, Springer-Verlag, Berlin, 1995, pp. 147–158.
Tao R. OnR a R b transformation and inversion of compound finite automata. Technical Report No. ISCAS-LCS-95-10, Laboratory for Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, Sept. 1995.
Wang H. TheR a R b representation of a class of the reduced echelon matrices.J. of Software, 1997, 8: 772–780. (in Chinese)
Tao R, Feng P. On relations betweenR a R b transformation and canonical diagonal form of λ-matrix.Science in China, Ser. E, 1997, 40: 258–268.
Tao R. Several specific factorizations of matrix polynomials.Chinese J. of Computers, 1999, 22: 1–10. (in Chinese)
Qin Z, Zhang H. Cryptanalysis of finite automaton public key cryptosystems. InAdvances in Cryptology— CHINACRYPT’96, Science Press, Beijing, 1996, pp. 75–86. (in Chinese)
Dai Z. A class of separable nonlinear finite automata—and an analysis of a certain typed FA based public key encryption and signature scheme. InAdvances in Cryptology—CHINACRYPT’96, Science Press, Beijing, 1996, pp. 87–94. (in Chinese)
Bao F. Increasing ranks of linear finite automata and complexity of FA public key cryptosystem.Science in China, Ser. A, 1994, 37: 504–512.
Bao F, Igarashi Y. A randomized algorithm to finite automata public key cryptosystem. InProc. ISACC’94, LNCS 834, Springer-Verlag, Berlin, 1994, pp. 678–686.
Tao R. Analyzing several search attacks on FAPKC1. Unpublished Manuscript, 1994. (in Chinese)
Qin Z, Zhang H. Enumeration of sequences in finite automata with application to cryptanalysis. InAdvances in Cryptology—CHINACRYPT’94, Science Press, Beijing, 1994, pp. 112–119. (in Chinese)
Qin Z, Zhang H. The attack algorithmAtM to finite automation public key cryptosystems.Chinese J. of Computers, 1995, 18: 199–204. (in Chinese)
Tao R, Chen S. On input-trees of finite automata. InAdvances in Cryptology—CHINACRYPT’94, Science Press, Beijing, 1994, pp.65–74. (in Chinese)
Bao F. Limited error-propagation, self-synchronization and finite input memory FSMa as weak invverses. InAdvances in Chinese Computer Science, World Scientific, Singapore, 1991, 3: 1–24.
Bao F. Composition and decomposition of weakly invertible finite automata.Science in China, Chinese Edition, 1993, 23: 759–766.
Raney G N. Sequential functions.J. of the Association for Computing Machinery, 1958, 5: 177–180.
Author information
Authors and Affiliations
Corresponding author
Additional information
Supported by the National Natural Science Foundation of China under grant No. 69773022 and the NKBRSF of China.
For the biographies ofTAO Renji andCHEN Shihua, please refer to p.26 of No.1, Vol.15 of this journal.
Rights and permissions
About this article
Cite this article
Tao, R., Chen, S. Input-trees of finite automata and application to cryptanalysis. J. Comput. Sci. & Technol. 15, 305–325 (2000). https://doi.org/10.1007/BF02948867
Received:
Issue Date:
DOI: https://doi.org/10.1007/BF02948867