Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Cryptosystems for picture languages
Siromoney R., Subramanian K., Jeyanthi A., Springer-Verlag New York, Inc., New York, NY, 1988. Type: Book (9780387192093)
Date Reviewed: Aug 1 1989

The construction of a public key cryptosystem is based on the idea of a trapdoor. Without the secret information in the trapdoor, the cryptanalyst who only has the public information finds it difficult to decode a ciphertext. The trapdoor information allows the legal recipient to decode the message easily.

The main purpose of this paper is to illustrate the usefulness of syntactic methods in the construction of public key cryptosystems for picture languages. The authors describe two types of public key cryptosystems. In the first system, pictures to be encrypted are represented in chain-code picture languages, while in the second system they are represented as arrays. In both systems, the basic idea is to make cryptanalysis equivalent to the membership problem for TOL systems (which is NP-complete). The public encryption key is a generative grammar, and the encryption algorithm uses a morphism for the conversion. The trapdoor hides information about this morphism.

The paper contains encryption and decryption algorithms and is peppered with examples. The authors assume a familiarity with the basic concepts of L-systems.

Reviewer:  Razvan Andonie Review #: CR113136
Bookmark and Share
 
Picture Description Languages (I.3.4 ... )
 
 
Language Parsing And Understanding (I.2.7 ... )
 
 
Public Key Cryptosystems (E.3 ... )
 
 
Structural (I.5.1 ... )
 
 
Visible Line/ Surface Algorithms (I.3.7 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Picture Description Languages": Date
Complexity and decidability for chain code picture languages
Sudborough I., Welzl E. Theoretical Computer Science 36(2-3): 173-202, 1985. Type: Article
Jan 1 1986

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy