Abstract
From the point of view of computational learning theory, we analyze the security of Richelieu cry ptosystems, which are based on language theory. Richelieu cryptosystems use generating systems of slender languages as key generators. We consider the problem of learning slender languages using queries and additional information. We show that families of slender languages are not polynomial-time learnable by only using membership queries, but certain subfamilies of slender languages are polynomial-time learnable from representative samples and membership queries. Based on these results, we discuss the security of Richelieu cryptosystems.
Preview
Unable to display preview. Download preview PDF.
References
M. Andra§iu, G. Păun, J. Dassow, and A. Salomaa. Language-theoretic problems arising from Richelieu cryptosystems. Theoretical Computer Science, 116(2):339–357, 1993.
D. Angluin. Queries and concept learning. Machine Learning, 2(4):319–342, 1988.
J. Berstel and M. Mignotte. Deux propriétés décidables des suites récurrentes linéaires. Bulletin de la Société Mathématique de France, 104(2):173–184, 1976.
E. M. Gold. Language identification in the limit. Information and Control, 10(5):447–474, 1967.
M. A. Harrison. Introduction to Formal Language Theory. Addison-Wesley, Reading: Massachusetts, 1978.
J. I. Hmelevskii. Equations in free semigroups. Proceedings of the Steklov Institute of Mathematics, 107:1–270, 1976.
L. Ilie. On a conjecture about slender context-free languages. Theoretical Computer Science, 132(1–2):427–434, 1994.
T. Koshiba. On a hierarchy of slender languages based on control sets. To appear in Fundamenta Informaticae.
M. Lothaire. Combinatorics on Words. Addison-Wesley, Reading:Massachusetts, 1983.
G. Paun and A. Salomaa. Thin and slender languages. Discrete Applied Mathematics, 61(3):257–270, 1995.
D. Raz. On slender context-free languages. In Lecture Notes in Computer Science (STACS'95), Vol. 900, pp. 445–454. Springer-Verlag, 1995.
A. Salomaa. Public-Key Cryptography. Springer-Verlag, Berlin, 1990.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1997 Springer-Verlag
About this paper
Cite this paper
Koshiba, T. (1997). Computational learning theoreitc cryptanalysis of language theoretic cryptosystems. In: Han, Y., Okamoto, T., Qing, S. (eds) Information and Communications Security. ICICS 1997. Lecture Notes in Computer Science, vol 1334. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0028459
Download citation
DOI: https://doi.org/10.1007/BFb0028459
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-63696-0
Online ISBN: 978-3-540-69628-5
eBook Packages: Springer Book Archive