An overview of cryptosystems based on finite automata

Finite automata are backbones of the cryptosystems based on language theory. Most of the cryptosystems based on grammars and word problems are either insecure or do not satisfy digital signature prosperities. Basically, the cryptosystems based on automata are classified into cryptosystems based on: transducers, cellular automata and acceptors (i.e., finite automata without outputs). In this paper, we discuss the advantages and disadvantages of the important cryptosystems based on finite automata such as FAPKC, Gysin, Wolfram, Kari, Dӧmӧsi’s cryptosystems and modified Dӧmӧsi’s cryptosystems.

[1]  Stephen Wolfram Cryptography with Cellular Automata , 1985, CRYPTO.

[2]  Jarkko Kari Cryptosystems Based on Reversible Cellular Automata , 1992 .

[3]  Tamara Zhukabayeva,et al.  A Novel Stream Cipher Based on Nondeterministic Finite Automata , 2016 .

[4]  Renji Tao,et al.  The generalization of public key cryptosystem FAPKC4 , 1999 .

[5]  Yoshihide Igarashi,et al.  Break Finite Automata Public Key Cryptosystem , 1995, ICALP.

[6]  G. Margarov,et al.  Modification of Finite Automata Public Key Cryptosystem , 2006 .

[7]  Ren-ji Tao,et al.  On Finite Automaton Public-Key Cryptosystem , 1999, Theor. Comput. Sci..

[8]  Renji Tao,et al.  Two varieties of finite automaton public key cryptosystem and digital signatures , 2008, Journal of Computer Science and Technology.

[9]  Willi Meier,et al.  Analysis of Pseudo Random Sequence Generated by Cellular Automata , 1991, EUROCRYPT.

[10]  Pál Dömösi,et al.  A novel cryptosystem based on abstract automata and Latin cubes , 2015 .

[11]  Ren-ji Tao,et al.  FAPKC3: A new finite automaton public key cryptosystem , 2008, Journal of Computer Science and Technology.

[12]  Mohd Izzuddin Mohd Tamrin,et al.  A new block cipher based on finite automata systems , 2016 .

[13]  Pál Dömösi A NOVEL CRYPTOSYSTEM BASED ON FINITE AUTOMATA WITHOUT OUTPUTS , 2010 .

[14]  Marc Gysin A One-Key Cryptosystem Based on a Finite Nonlinear Automaton , 1995, Cryptography: Policy and Algorithms.

[15]  Sherzod Turaev,et al.  Performance and Security Improvements of Dömösi’s Cryptosystem , 2016 .