A Public-Key Cryptosystem Based On Stochastic Petri Net

In this paper, we present a new method to build  public-key Cryptosystem. The method is based on the state  explosion problem occurred in the computing of average  number of tokens in the places of Stochastic Petri Net  (SPN). The reachable markings in the coverability tree of  SPN are used as the encryption keys. Accordingly, multiple  encryption keys can be generated, thus we can perform  multiple encryption to get as strong security as we expect.  The decryption is realized through solving a group of  ordinary differential equations from Continuous Petri Net  (CPN), which has the same underlying Petri net as that  of SPN. The decipherment difficulty for attackers is in  exponential order. The contribution of this paper is that  we can use continuous mathematics to design cryptosystems  besides discrete mathematics.

[1]  Qi-Wei Ge,et al.  A Petri Net Based Public-Key Cryptography:PNPKC(Special Section on Papers Selected from ITC-CSCC 2000) , 2001 .

[2]  Michael K. Molloy Performance Analysis Using Stochastic Petri Nets , 1982, IEEE Transactions on Computers.

[3]  S. Tu,et al.  Applying Petri net reduction to support Ada-tasking deadlock detection , 1990, Proceedings.,10th International Conference on Distributed Computing Systems.

[4]  Manuel Silva Suárez,et al.  Continuous Petri Nets: Expressive Power and Decidability Issues , 2007, Int. J. Found. Comput. Sci..

[5]  Peter G. Taylor,et al.  A net level performance analysis of stochastic Petri nets , 1989, The Journal of the Australian Mathematical Society. Series B. Applied Mathematics.

[6]  Eiichiro Fujisaki,et al.  Recent Topics of Public-Key Cryptography : 2. Provably Secure and Practical Public-Key Encryption , 1999 .

[7]  William H. Press,et al.  Numerical Recipes in C, 2nd Edition , 1992 .

[8]  Karline Soetaert,et al.  Solving Ordinary Differential Equations in R , 2012 .

[9]  Simson L. Garfinkel,et al.  PGP: Pretty Good Privacy , 1994 .

[10]  Kunihiko Hiraishi,et al.  Performance Evaluation of Workflows Using Continuous Petri Nets with Interval Firing Speeds , 2008, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[11]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[12]  Uri M. Ascher,et al.  Computer methods for ordinary differential equations and differential-algebraic equations , 1998 .

[13]  David S. Johnson,et al.  Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .

[14]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[15]  E. Hairer,et al.  Solving Ordinary ,Differential Equations I, Nonstiff problems/E. Hairer, S. P. Norsett, G. Wanner, Second Revised Edition with 135 Figures, Vol.: 1 , 2000 .

[16]  Dan C. Marinescu,et al.  Stochastic High-Level Petri Nets and Applications , 1988, IEEE Trans. Computers.

[17]  Marco Ajmone Marsan,et al.  Petri Nets in Performance Analysis: An Introduction , 1996, Petri Nets.

[18]  Arto Salomaa,et al.  Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.

[19]  Stafford E. Tavares,et al.  Modelling and Analyzing Cryprographic Protocols Using Petri Nets , 1992, AUSCRYPT.

[20]  Michael K. Molloy,et al.  On the integration of delay and throughput measures in distributed processing models , 1981 .

[21]  P. Hartman Ordinary Differential Equations , 1965 .

[22]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[23]  René David,et al.  Autonomous And Timed Continous Petri Nets , 1991, Applications and Theory of Petri Nets.

[24]  Aram W. Harrow,et al.  Quantum algorithm for solving linear systems of equations , 2010 .

[25]  T. Okamoto Recent topics of public-key crytography : 1. On the security of elliptic curve cryptosystems , 1998 .

[26]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[27]  Serge Haddad,et al.  Application and Theory of Petri Nets , 2012, Lecture Notes in Computer Science.

[28]  A. Harrow,et al.  Quantum algorithm for linear systems of equations. , 2008, Physical review letters.

[29]  HiraishiKunihiko Performance Evaluation of Workflows Using Continuous Petri Nets with Interval Firing Speeds , 2008 .