On some developments in cryptography and their applications to computer science
This paper presents a discussion and summary of results obtained jointly with K.Culik  and M.Nivat .
The idea of public key systems as applicable to information systems is reviewed. The development of information systems based on the new concept of encryption triple is outlined. Although the construction of encryption triples using number-theoretic tools is possible, systems of encryption triples obtained that way do not possess all properties desirable for designing information systems. As first step towards an alternative approach, regular bijections i.e. bijections definable by a-transducers are investigated, and a complete characterization of such bijections is given.
Unable to display preview. Download preview PDF.
- 1.Culik II, K. and Maurer, H.A., Secure information storage and retrieval using new results in cryptography. Information Processing Letters (to appear), also: Report 16, IIG Graz (1978).Google Scholar
- 2.Maurer, H.A. and Nivat, M., Rational bijections of rational sets. Report 29, IIG Graz (1979).Google Scholar
- 3.Diffie, W. and Hellman, M., New directions in cryptography. IEEE Transactions on Information Theory (1976), 644–654.Google Scholar
- 5.Rivest, R., Private communication. (1978).Google Scholar