Authentication of Messages Using P Systems

  • Adrian Atanasiu
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2597)

Abstract

The paper is an attempt to use P systems in dealing with a cryptographic issue, that of message authentication. Two algorithms are proposed, with and without confirmation from the sender, based on P systems with active membranes. We are not concerned with the practical usefulness of these algorithms, but with proving the usefulness of the membrane computing framework in addressing the authentication question.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    A. Atanasiu, P systems and arithmetic calculus, Report 14/00 of the Research Group on Mathematical Linguistics, Universitat Rovira i Virgili Tarragona, Spain, 2000.Google Scholar
  2. 2.
    A. Atanasiu, Arithmetic with membranes, Romanian J. of Information Science and Technology, 4, 1–2 (2001), 5–20.Google Scholar
  3. 3.
    A. Atanasiu, C. Martin-Vide, Recursive calculus with membranes, Fundamenta Informaticae, 49, 1–3 (2002), 45–59.MathSciNetMATHGoogle Scholar
  4. 4.
    A. Atanasiu, C. Martin-Vide, P systems and context-free languages, in Actas del Primer Congreso Espanol de Algoritmos Evolutivos y Bioinspirados (AEB’02) (E. Alba, F. Fernandez, J.A. Gomez, F. Herrera, J.I. Hidalgo, J. Lanchares, J.J. Merelo et J.M. Sanchez, Eds.), Centro Universitario de Merida, Merida, 2002, 341–346.Google Scholar
  5. 5.
    S.N. Krishna, R. Rama, A variant of P systems with active membranes: Solving NP-complete problems, Romanian J. of Information Science and Technology, 2, 4 (1999), 357–367.Google Scholar
  6. 6.
    R.C. Merkle, A digital signature based on a conventional encryption function, Proc. of Advances in Cryptology-CRYPTO’ 87, Springer-Verlag, 1990, 369–378.Google Scholar
  7. 7.
    Gh. Păun, Computing with membranes-A variant: P systems with polarized membranes, Intern. J. of Foundations of Computer Science, 11, 1 (2000), 167–182.CrossRefGoogle Scholar
  8. 8.
    Gh. Păun, Computing with membranes (P systems); Attacking NP-complete problems, Unconventional Models of Computing (I. Antoniou, C.S. Calude, M.J. Dinnen, Eds.), Springer-Verlag, 2000, 94–115.Google Scholar
  9. 9.
    Gh. Păun, G. Rozenberg, A guide to membrane computing, Theoretical Computer Science, 287, 1 (2002), 73–100.MathSciNetMATHCrossRefGoogle Scholar
  10. 10.
    G. Rozenberg, A. Salomaa, Eds., Handbook of Formal Languages, Springer-Verlag, 1997.Google Scholar
  11. 11.
    B. Schneier, Applied Cryptography, Second Edition, John Wiley and Sons, 1996.Google Scholar
  12. 12.
    D. Stinton, Cryptographie, Theorie et Pratique, Intern. Thomson Publ. France, 1996.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Adrian Atanasiu
    • 1
  1. 1.Faculty of MathematicsBucharest UniversityBucharestRomania

Personalised recommendations