Some Remarks and Tests on the Dh1 Cryptosystem Based on Automata Compositions

Pál Dömösi, József Gáll, Géza Horváth, Norbert Tihanyi

Abstract


In this paper we discuss NIST test results of a previously introduced cryptosystem based on automata compositions. We conclude that the requirements of NIST test are all fulfilled by the cryptosystem.

Full Text:

PDF

References


[Dömösi and Horváth, 2015a] Dömösi, P. and Horváth, G.(2015). A novel cryptosystem based on abstract automata and Latin cubes. Studia Scientiarum Mathematicarum Hungarica, 52(2):221–232. https://doi.org/10.1556/012.2015.52.2.1309

[Dömösi and Horváth, 2015b] Dömösi, P. and Horváth, G.(2015). A novel cryptosystem based on Gluškov product of automata. Acta Cybernetica, 22:359–371.https://doi.org/10.14232/actacyb.22.2.2015.8

[Dömösi et al., 2017] Dömösi, P., Gáll, J., Horváth, G and Tihanyi, N. (2017). Statistical Analysis of DH1 Cryptosystem. Acta Cybrnetica, 23:371–378.https://doi.org/10.14232/actacyb.23.1.2017.20

[Dömösi and Nehaniv, 2005] Dömösi, P. and Nehaniv, C.L. (2005). Algebraic theory of automata networks: An introduction. ser. SIAM monographs on Discrete Mathematics and Applications, vol.11, Society for Industrial and Applied Mathematics (SIAM), Philadelphia, PA. https://doi.org/10.1137/1.9780898718492

[Mezenes and Vanstone, 1996] Menezes, P. C. O. A. J. and Vanstone, S. A. (1996). Handbook of Applied Cryptography ser. Discrete Mathematics and Its Applications. CRC Press. https://doi.org/10.1201/9781439821916

[Rukhin et al., 2010] Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., Levenson, M., Vangel, M., Banks, D., Heckert, A., Dray, J., Vo, S.(2010). NIST Special Publication 800-22: A Statistical Test Suite for Random and Pseudo Random Number Generators for Cryptographic Applications. National Institute of Standards and Technology,https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-22r1a.pdf, downloaded in August 2016. https://doi.org/10.6028/nist.sp.800-22

[Tihanyi et al., 2015] Tihanyi, N., Kovács, A., Vargha, G., Lénárt, Á. Unrevealed Patterns in Password Databases Part One: Analyses of Cleartext Passwords. Technology and Practice of Passwords.PASSWORDS 2014. Lecture Notes in Computer Science, vol 9393. https://doi.org/10.1007/978-3-319-24192-0_6




DOI: https://doi.org/10.31449/inf.v43i2.2687

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.