Skip to main content
  • Book
  • © 2009

Finite Automata and Application to Cryptography

Authors:

  • Elaborates automata-theoretic aspect of cryptography
  • Proposes a canonical form for one key cryptosystems and a new design approach different from Shannon's
  • Presents deeper crypto-analyses for Finite Automata Public Key Cryptography (FAPKC)
  • 8952 Accesses

Buy it now

Buying options

eBook USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (9 chapters)

  1. Front Matter

    Pages i-ix
  2. Introduction

    • Renji Tao
    Pages 1-45
  3. Mutual Invertibility and Search

    • Renji Tao
    Pages 47-76
  4. Ra Rb Transformation Method

    • Renji Tao
    Pages 77-107
  5. Relations Between Transformations

    • Renji Tao
    Pages 109-152
  6. Structure of Feedforward Inverses

    • Renji Tao
    Pages 153-175
  7. Some Topics on Structure Problem

    • Renji Tao
    Pages 177-214
  8. Linear Autonomous Finite Automata

    • Renji Tao
    Pages 215-271
  9. One Key Cryptosystems and Latin Arrays

    • Renji Tao
    Pages 273-346
  10. Back Matter

    Pages 395-406

About this book

Finite Automata and Application to Cryptography mainly deals with the invertibility theory of finite automata and its application to cryptography. In addition, autonomous finite automata and Latin arrays, which are relative to the canonical form for one-key cryptosystems based on finite automata, are also discussed.

Finite automata are regarded as a natural model for ciphers. The Ra Rb transformation method is introduced to deal with the structure problem of such automata; then public key cryptosystems based on finite automata and a canonical form for one-key ciphers implementable by finite automata with bounded-error-propagation and without data expansion are proposed.

The book may be used as a reference for computer science and mathematics majors, including seniors and graduate students.

Renji Tao is a Professor at the Institute of Software, Chinese Academy of Sciences, Beijing.

 

 

Reviews

From the reviews:

"The present book treats an up-to-date subject from a mathematical point of view. … The entire work is presented at a high level and has a very good and well proved mathematical background … making the book a kind of a reference volume to applied mathematics in cryptography, coding theory and information security for students having basic knowledge and wanting a thorough account of this area, or for developers wanting to understand the mathematical background of the algorithms used in authentication systems." (Ion Iancu, Zentralblatt MATH, Vol. 1157, 2009)

"This is a most welcome and anticipated volume in the fields of automata and cryptography. … this book should be considered a major work on these topics and is a must read for anyone active in these fields. It is fortunate for the reader that the structure of this book is pedagogic in nature … . researchers will be most comfortable with the structure and format of individual chapters … . There is a collective exhaustive bibliography at the end of the book … ." (Michael Goldberg, ACM Computing Reviews, July, 2009)

Bibliographic Information

  • Book Title: Finite Automata and Application to Cryptography

  • Authors: Renji Tao

  • DOI: https://doi.org/10.1007/978-3-540-78257-5

  • Publisher: Springer Berlin, Heidelberg

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer-Verlag Berlin Heidelberg 2009

  • Hardcover ISBN: 978-3-540-78256-8Published: 12 December 2008

  • eBook ISBN: 978-3-540-78257-5Published: 08 March 2009

  • Edition Number: 1

  • Number of Pages: 350

  • Number of Illustrations: 2 b/w illustrations

  • Additional Information: Jointly Published with Tsinghua University Press.

  • Topics: Cryptology, Systems and Data Security, Mathematics, general, Computer Communication Networks

Buy it now

Buying options

eBook USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access