Abstract
The paper is an attempt to use P systems in dealing with a cryptographic issue, that of message authentication. Two algorithms are proposed, with and without confirmation from the sender, based on P systems with active membranes. We are not concerned with the practical usefulness of these algorithms, but with proving the usefulness of the membrane computing framework in addressing the authentication question.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
A. Atanasiu, P systems and arithmetic calculus, Report 14/00 of the Research Group on Mathematical Linguistics, Universitat Rovira i Virgili Tarragona, Spain, 2000.
A. Atanasiu, Arithmetic with membranes, Romanian J. of Information Science and Technology, 4, 1–2 (2001), 5–20.
A. Atanasiu, C. Martin-Vide, Recursive calculus with membranes, Fundamenta Informaticae, 49, 1–3 (2002), 45–59.
A. Atanasiu, C. Martin-Vide, P systems and context-free languages, in Actas del Primer Congreso Espanol de Algoritmos Evolutivos y Bioinspirados (AEB’02) (E. Alba, F. Fernandez, J.A. Gomez, F. Herrera, J.I. Hidalgo, J. Lanchares, J.J. Merelo et J.M. Sanchez, Eds.), Centro Universitario de Merida, Merida, 2002, 341–346.
S.N. Krishna, R. Rama, A variant of P systems with active membranes: Solving NP-complete problems, Romanian J. of Information Science and Technology, 2, 4 (1999), 357–367.
R.C. Merkle, A digital signature based on a conventional encryption function, Proc. of Advances in Cryptology-CRYPTO’ 87, Springer-Verlag, 1990, 369–378.
Gh. Păun, Computing with membranes-A variant: P systems with polarized membranes, Intern. J. of Foundations of Computer Science, 11, 1 (2000), 167–182.
Gh. Păun, Computing with membranes (P systems); Attacking NP-complete problems, Unconventional Models of Computing (I. Antoniou, C.S. Calude, M.J. Dinnen, Eds.), Springer-Verlag, 2000, 94–115.
Gh. Păun, G. Rozenberg, A guide to membrane computing, Theoretical Computer Science, 287, 1 (2002), 73–100.
G. Rozenberg, A. Salomaa, Eds., Handbook of Formal Languages, Springer-Verlag, 1997.
B. Schneier, Applied Cryptography, Second Edition, John Wiley and Sons, 1996.
D. Stinton, Cryptographie, Theorie et Pratique, Intern. Thomson Publ. France, 1996.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Atanasiu, A. (2003). Authentication of Messages Using P Systems. In: PĂun, G., Rozenberg, G., Salomaa, A., Zandron, C. (eds) Membrane Computing. WMC 2002. Lecture Notes in Computer Science, vol 2597. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36490-0_3
Download citation
DOI: https://doi.org/10.1007/3-540-36490-0_3
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00611-4
Online ISBN: 978-3-540-36490-0
eBook Packages: Springer Book Archive