A Petri Net Based Public-Key Cryptosystem

Article Preview

Abstract:

In this paper, we present a new method to build public-key Cryptosystem. The method is based on the state explosion problem occurred in the computing of average number of tokens in the places of Stochastic Petri Net (SPN). The reachable markings in the coverability tree of SPN are used as the encryption keys. Accordingly, multiple encryption keys can be generated, thus we can perform multiple encryption to get as strong security as we expect. The decryption is realized through solving a group of ordinary differential equations from Continuous Petri Net (CPN), which has the same underlying Petri net as that of SPN. The decipherment difficulty for attackers is in exponential order. The contribution of this paper is that we can use continuous mathematics to design cryptosystems instead of discrete mathematics.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2858-2861

Citation:

Online since:

August 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions in Information Theroey, vol. IT-31, no. 4, pp.469-472, (1985).

DOI: 10.1109/tit.1985.1057074

Google Scholar

[2] Q.W. Ge, T. Okamoto, A Petri net based public-key cryptography: NPKC, IEICE. Trans. Fundamentals, vol. E-84-A(6), pp.1532-1535, (2001).

Google Scholar

[3] Q. Ge, C. Shigenaga, and R. Wu, A Petri net based new conception of ublickey crytography, Proceedings of ICFS'02, pp.37-42, (2002).

Google Scholar

[4] E. Hairer, S.P. Nϕrsett, G. Wanner, Solving Ordinary Differential Equations (I)(II), Nonstiff Problems, Second Edition, Springer-Verlag, (1993).

Google Scholar

[5] C. Lin, D. C. Marinescu, Stochastic high-level Petri nets and applications, IEEE Transactions on Computers, vol. 37, no. 7, pp.815-825, (1988).

DOI: 10.1109/12.2227

Google Scholar

[6] T. Okamoto and S. Uchiyamaa, Recent topics of public-key cryptography: 1. On the security of elliptic curve cryptosystems, IPSJMagazine, vol. 39, no. 12, pp.1252-1257, (1998).

Google Scholar

[7] T. Okamoto, E. Fujisaki, and S. Uchiyamaa, Recent topics of public-key cryptography: Provably secure and practical public-key encryption, IPSJ Magazine, vol. 40, no. 2, pp.170-177, (1999).

Google Scholar

[8] R.L. Rivest, A. Shamir, L. Adleman, A method of obtaining digital ignatures and Public-Key cryptosystems, Comm. of ACM, vol. 21, no. 2, pp.120-126, (1978).

DOI: 10.1145/359340.359342

Google Scholar

[9] A. Salomaa, Public-Key Cryptograpghy, Springer-Verlag, Berlin, Heidelberg, (1990).

Google Scholar

[10] T. Shitayama, A survey of block ciper AES and a view of the future, IPSJ Magazine, vol. 40, no. 2, pp.139-145, (1999).

Google Scholar