Some Remarks and Tests on the Dh1 Cryptosystem Based on Automata Compositions
Abstract
In this paper we discuss NIST test results of a previously introduced cryptosystem based on automata compositions. We conclude that the requirements of NIST test are all fulfilled by the cryptosystem.References
[Dömösi and Horváth, 2015a] Dömösi, P. and Horváth, G.(2015). A novel cryptosystem based on abstract automata and Latin cubes. Studia Scientiarum Mathematicarum Hungarica, 52(2):221–232. https://doi.org/10.1556/012.2015.52.2.1309
[Dömösi and Horváth, 2015b] Dömösi, P. and Horváth, G.(2015). A novel cryptosystem based on Gluškov product of automata. Acta Cybernetica, 22:359–371.https://doi.org/10.14232/actacyb.22.2.2015.8
[Dömösi et al., 2017] Dömösi, P., Gáll, J., Horváth, G and Tihanyi, N. (2017). Statistical Analysis of DH1 Cryptosystem. Acta Cybrnetica, 23:371–378.https://doi.org/10.14232/actacyb.23.1.2017.20
[Dömösi and Nehaniv, 2005] Dömösi, P. and Nehaniv, C.L. (2005). Algebraic theory of automata networks: An introduction. ser. SIAM monographs on Discrete Mathematics and Applications, vol.11, Society for Industrial and Applied Mathematics (SIAM), Philadelphia, PA. https://doi.org/10.1137/1.9780898718492
[Mezenes and Vanstone, 1996] Menezes, P. C. O. A. J. and Vanstone, S. A. (1996). Handbook of Applied Cryptography ser. Discrete Mathematics and Its Applications. CRC Press. https://doi.org/10.1201/9781439821916
[Rukhin et al., 2010] Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., Levenson, M., Vangel, M., Banks, D., Heckert, A., Dray, J., Vo, S.(2010). NIST Special Publication 800-22: A Statistical Test Suite for Random and Pseudo Random Number Generators for Cryptographic Applications. National Institute of Standards and Technology,https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-22r1a.pdf, downloaded in August 2016. https://doi.org/10.6028/nist.sp.800-22
[Tihanyi et al., 2015] Tihanyi, N., Kovács, A., Vargha, G., Lénárt, Á. Unrevealed Patterns in Password Databases Part One: Analyses of Cleartext Passwords. Technology and Practice of Passwords.PASSWORDS 2014. Lecture Notes in Computer Science, vol 9393. https://doi.org/10.1007/978-3-319-24192-0_6
DOI:
https://doi.org/10.31449/inf.v43i2.2687Downloads
Published
How to Cite
Issue
Section
License
Authors retain copyright in their work. By submitting to and publishing with Informatica, authors grant the publisher (Slovene Society Informatika) the non-exclusive right to publish, reproduce, and distribute the article and to identify itself as the original publisher.
All articles are published under the Creative Commons Attribution license CC BY 3.0. Under this license, others may share and adapt the work for any purpose, provided appropriate credit is given and changes (if any) are indicated.
Authors may deposit and share the submitted version, accepted manuscript, and published version, provided the original publication in Informatica is properly cited.







