Skip to main content
Log in

An extended strange planet protocol

  • Published:
Journal of Combinatorial Optimization Aims and scope Submit manuscript

Abstract

This paper presents an extension of the original strange planet protocol with three species who mate in a special way, to \(m\) species and reveals essential principles in the new protocol. Further, must-fail, might-fail and cannot-fail states are formalized and the relationship among them is established. Moreover, the number of each kind of states is calculated. In addition, the conditions for secure communications based on the new protocol are given. Finally, an application is provided to illustrate how the extended strange planet protocol can be used for secure communication.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  • Adamatzky A, Alonso-Sanz R, Lawniczak A (2008) Automata-2008: theory and applications of cellular automata. Luniver Press, Beckington

    Google Scholar 

  • Agrawal D, Zeng QA (2010) Introduction to wireless and mobile systems. Cengage Learning, Radford

    Google Scholar 

  • Burks AW (1970) Essays on cellular automata. University of Illinois Press, Champaign

    MATH  Google Scholar 

  • Cameron PJ (1994) Combinatorics: topics, techniques, algorithms. Cambridge University Press, Cambridge

    MATH  Google Scholar 

  • Codd EF (1968) Cellular automata. Academic Press Inc, New York

    MATH  Google Scholar 

  • Comer D (1995) Internetworking with TCP/IP, vol. I: pinciples, protocols, and architecture, 3/e. Prentice-Hall, Englewood Cliffs

    Google Scholar 

  • Gajardo A, Goles E, Moreira A (2001) STACS 2001., Generalized langtons ant: dynamical behavior and complexitySpringer, Berlin, pp 259–270

    Book  Google Scholar 

  • Gajardo A, Moreira A, Goles E (2002) Complexity of langton’s ant. Discret Appl Math 117:41–50

    Article  MATH  MathSciNet  Google Scholar 

  • Gardner M (1970) Mathematical games: the fantastic combinations of john conways new solitaire game life. Sci Am 223:120–123

    Article  Google Scholar 

  • Holzmann GJ (1991) Design and validation of computer protocols. Pretentice Hall, Upper Saddle River

    Google Scholar 

  • Hopcroft JE, Motwani R, Ullman JD (2000) Introduction to automata theory, languages, and computation. Pearson Education, New York

    Google Scholar 

  • Perlman R (2000) Interconnections: bridges, routers, switches, and internetworking protocols. Addison-Wesley Professional, Boston

    Google Scholar 

  • Rich E (2008) Automata, computability and complexity: theory and applications. Pearson Prentice Hall, Upper Saddle River

    Google Scholar 

  • Silverman JH (2006) A friendly introduction to number theory. Am Math Compet 10:12

    Google Scholar 

  • Stallings W (1995) Network and internetwork security: principles and practice. Prentice-Hall Inc, Englewood Cliffs

    Google Scholar 

  • Stallings W, Stallings W (1997) Data and computer communications, vol 6. Prentice hall New Jersey, Upper Saddle River

    MATH  Google Scholar 

  • Stark HM (1970) An introduction to number theory. Markham Publishing Company Chicago, Illinois

    MATH  Google Scholar 

  • Tao R (2008) Finite automata and application to cryptography. Springer, Chicago

    MATH  Google Scholar 

  • Tian C, Duan Z, Liu J (2014) Secure communications with strange planet protocol. Optim Lett 8(1):201–209

    Article  MATH  MathSciNet  Google Scholar 

Download references

Acknowledgments

This research is supported by the NSFC Grant Nos. 61133001, 61272118, 61272117, 61202038, 91218301,61322202, 61373043 and National Program on Key Basic Research Project (973 Program) Grant No. 2010CB328102

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhenhua Duan.

Appendix

Appendix

The pseudo code written in C++ computing \(P(n,m)\), the number of circle states is as follows:

figure a
figure b

The pseudo code for computing \(k\)-partition of positive integer \(n\) under the condition that each partition is not more than \(max\)

figure c

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, J., Duan, Z., Tian, C. et al. An extended strange planet protocol. J Comb Optim 30, 299–319 (2015). https://doi.org/10.1007/s10878-014-9750-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10878-014-9750-0

Keywords

Navigation