Abstract
Cryptology is the science and art of secret writing. The basic idea is to convert a meaningful text to another text in which the meaning is concealed. This starting point seems to imply that cryptology is essentially connected to semantics. The reason why this conclusion is not true is the following.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Andrasiu, M., Atanasiu, A., PÃ un, G. and Salomaa, A.: A new cryptosys- tern based on formal language theory. Bull. Math. de la Soc. Sci. Math. de Roumanie, Tome 36, (1992).
Andrasiu, M., Pà un, G., Dassow, J. and Salomaa, A.: Language-theoretic problems arising from Richelieu cryptosystems. Theoretical Computer Science, 116, (1993) 339–357.
Anshel, I. M. and Anshel, M.: From the Post-Markov theorem through decision problems to public-key cryptography. American Mathematical Monthly 100, (1993) 835–844.
Atanasiu, A.: A class of coders based on gsm. Acta Informatica, 29, (1992) 779–791.
Bao, F. and Igarashi, Y.: A randomized algorithm to finite automata public key cryptosystem. Proceedings of ISAAC’94, Lecture Notes in Computer Science 834, Springer-Verlag, Berlin, 1994, 678–686.
Bao, F. and Igarashi, Y.: Break finite automata public key cryptosystem. Proceedings of ICALP’95, Lecture Notes in Computer Science 944, Springer-Verlag, Berlin, 1995, 147–158.
Bell, D. E. and LaPadula, L. J.: Secure computer system: unified exposition and Multics interpretation. Technical report MTR-2997, Mitre Corp., Bedford, Mass., 1976.
Benois, M.: Descendants of regular language in a class of rewriting systems: algorithm and complexity of an automata construction. Proceedings of Rewriting Techniques and Applications, Lecture Notes in Computer Science 256, Springer-Verlag, Berlin, 1987, 121–132.
Daemen, J., Govaerts, R. and Vandewalle, J.: A framework for the design of one-way hash functions including cryptanalysis of Damgârd’s one-way function based on a cellular automaton. Advances in cryptology-ASIACRYPT’91, Lecture Notes in Computer Science 739, Springer-Verlag, Berlin, 1993, 82–96.
Damgârd, I.: A design principle for hash functions. Advances in cryptologyCRYPTO’89, Lecture Notes in Computer Science 435, Springer-Verlag, Berlin, 1990, 416–427.
Denning, D. E.: Cryptography and data security. Addison-Wesley, Reading, Mass., 1982.
Diffie, W. and Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory IT-22 (1976), 644–654.
Dolev, D. and Yao, A. C.: On the security of public key protocols. IEEE Transactions on information theory IT-29 (1983) 198–208.
Dwork, C. and Stockmeyer, L.: Zero-knowledge with finite state verifiers. Advances in cryptology-CRYPTO’88, Lecture Notes in Computer Science 403, Springer-Verlag, Berlin, 1990, 71–75.
Garzon, M. and Zalcstein, Y.: The complexity of Grigorchuk groups with application to cryptography. Theoretical Computer Science 88, (1991), 8398.
Guan, P.: Cellular Automaton public-key cryptosystem. Complex Systems 1, (1987) 51–56.
Gutowitz, H.: Cryptography with dynamical systems. Proceedings of Cellular Automata and Cooperative Systems, NATO Advanced Institute, Kluwer, Dordrecht, 1993, 237–274.
Kari, J.: A cryptanalytic observation concerning systems based on language theory. Discrete Applied Mathematics 21, (1988) 265–268.
Kari, J.: Observations concerning a public-key cryptosystem based on iterated morphisms. Theoretical Computer Science 66, (1989) 45–53.
Kari, L.: On insertion and deletion in formal languages. Ph. D. thesis, Univ. of Turku, Turku, 1991.
Kearns, M. and Valiant, L.: Cryptographic limitations on learning boolean formulae and finite automata. Journal of the ACM 41, (1994) 67–95.
Li, J. and Gao, X.: Realization of finite automata public key cryptosystem and digital signature. Proceedings of CRYPTOCHINA’92, 110–115. (in Chinese)
Lothaire, M.: Combinatorics on Words. Addison-Wesley, Reading, MA, 1982.
Matei, C. and Tiplea, F. L.: (0,1)-total pure context-free grammars. Proceedings of Developments in Language Theory ‘85, World Scientific, Singapore, 1996, 148–153.
Meier, W. and Staffelbach, O.: Analysis of pseudo random sequences generated by cellular automata. Advances in cryptology-EUROCRYPT ‘81, Lecture Notes in Computer Science 547, Springer-Verlag, Berlin, 1991, 186–199.
Nandi, S., Kar, B. K. and Pal Chaudhuri, P.: Theory and applications of cellular automata in cryptography. IEEE Transactions on Computers 43, (1994) 1346–1357.
Niemi, V.: Hiding regular languages: a public-key cryptosystem. Manuscript, 1989.
Oleshchuk, V. A.: On public-key cryptosystem based on Church-Rosser string-rewriting systems. Proceedings of Computing and Combinatorics ‘85, Lecture Notes in Computer Science 959, Springer-Verlag, Berlin, 1995, 264–269.
Oommen, B. J. and Zgierski, R.: Breaking substitution cyphers using stochastic automata. IEEE Transactions on Pattern Analysis and Machine Intelligence 15, (1993) 185–192.
Pichler, F.: Finite state machine modelling of cryptographic systems in LOOPS. Advances in cryptology-EUROCRYPT ‘87, Lecture Notes in Computer Science, Springer-Verlag, Berlin, 1988, 65–73.
Pichler, F.: Application of automata theory in cryptology. Elektrotechnik und Informationstechnik 105, (1988) 18–25. (in German)
Pitt, L. and Warmuth, M. K.: Prediction-preserving reducibility. Journal of Computer and System Sciences 41, (1990) 430–467.
Qin, Z. and Zhang, H.: The attack algorithm A tau M to finite automaton public key cryptosystems. Chinese Journal of Computers, 18, (1995) 199–204.
Rayward-Smith, V. J.: Mealy machines as coding devices. In: Beker, H. J. and Piper, F. C. (eds.): Cryptography and codings, Clarendon Press, Oxford, 1989.
Rivest, R. L., Shamir, A. and Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of ACM, 21, (1978), 120–126.
Rueppel, R.: A formal approach to security architecture. Advances in cryptology — EUROCRYPT’91, Lecture Notes in Computer Science 547, Springer-Verlag, Berlin, 1991, 387–398.
Salomaa, A.: A public-key cryptosystem based on language theory. Computers and Security 7, (1988) 83–87.
Salomaa, A: Public-key cryptography. EATCS Monographs in Theoretical Computer Science, vol. 23, Springer-Verlag, Berlin, 1990.
Salomaa, A. and Yu, S.: On a public-key cryptosystem based on iterated morphisms and substitutions. Theoretical Computer Science 48, (1986) 283296.
Schneier, B.: Applied cryptology: protocols, algorithms and source code in C. John Wiley & Sons, New York, 1994.
Seberry, J. and Pieprzyk, J.: Cryptography: an introduction to computer security. Prentice Hall, New York, 1989.
Simmons, G. J. (ed.): Contemporary cryptology: the science of information integrity. IEEE Press, 1992.
Siromoney, R. and Mathew, L.: A public key cryptosystem based on Lyndon words. Information Processing Letters 35, (1990) 33–36.
Stinson, D. R.: Cryptography: theory and practice. CRC Press, 1995.
Subramanian, K. G., Siromoney, R. and Abisha, P. J.: A DOL-TOL public key cryptosystem. Information Processing Letters 26, (1987), 95–97.
Tao, R.: Some results on the structure of feedforward inverses. Scientia Sinica (Series A) 27, (1984) 157–162.
Tao, R.: Invertibility of linear finite automata over a ring. Proceedings of ICALP’88, Lecture Notes in Computer Science 317, Springer-Verlag, Berlin, 1988, 489–501.
Tao, R.: On finite automaton one-key cryptosystems. Proceedings of Cambridge Security Workshop, Fast Software Encryption, Lecture Notes in Computer Science 809, Springer-Verlag, Berlin, 1994, 135–148.
Tao, R.: On Latin arrays, Proceedings of International Workshop on Discrete Mathematics and Algorithms, Jinan University Press, 1994, 1–14.
Tao, R.: On invertibility of some compound finite automata. Technical report No. ISCAS-LCS-95–06, Laboratory for Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, 1995.
Tao, R. and Chen, S.: Finite automata public key cryptosystem and digital signature. Computer Acta 8, (1985) 401–409 (in Chinese).
Tao, R. and Chen, S.: Two varieties of finite automata public key cryptosystem and digital signature. Journal of Computer Science and Technology 1, (1986) 9–18.
Tao, R. and Chen, S.: An implementation of identity-based cryptosystems and signature schemes by finite automaton public key cryptosystems. Proceedings of CRYPTOCHINA’92, 87–104. (in Chinese)
Tao, R. and Chen, S.: Generating a kind of nonlinear finite automata with invertibility by transformation method. Technical report No. ISCAS-LCS-9505, Laboratory for Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, 1995.
Tao, R., Chen, S. and Chen, X.: FAPKC3: a new finite automaton public key cryptosystem. Technical report No. ISCAS-LCS-95–07, Laboratory for Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, 1995.
Wagner, N. R. and Magyarik, M. R.: A public-key cryptosystem based on the word problem. Advances in cryptology-CRYPTO’84, Lecture Notes in Computer Science 196, Springer-Verlag, Berlin, 1985, 19–37.
Wichmann, P.: Cryptanalysis of a modified rotor machine. Advances in cryptology-EUROCRYPT’89, Lecture Notes in Computer Science 434, Springer-Verlag, Berlin, 1990, 395–402.
Wolfram, S.: Cryptography with cellular automata. Advances in cryptologyCRYPTO ‘85, Lecture Notes in Computer Science 218, Springer-Verlag, Berlin, 1986, 429–432.
Zhang, H., Qin, Z. et al.: The software implementation of FA public key cryptosystem. Proceedings of CRYPTOCHINA’92, 105–109. (in Chinese)
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1997 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Niemi, V. (1997). Cryptology: Language-Theoretic Aspects. In: Rozenberg, G., Salomaa, A. (eds) Handbook of Formal Languages. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-07675-0_11
Download citation
DOI: https://doi.org/10.1007/978-3-662-07675-0_11
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-08230-6
Online ISBN: 978-3-662-07675-0
eBook Packages: Springer Book Archive