Professional Documents
Culture Documents
Mealy Model Research Paper 2
Mealy Model Research Paper 2
ISSN: 2278-0181
Vol. 2 Issue 5, May - 2013
developed for secure communication which is In this paper, new secret sharing scheme is
designed for encryption and also maintains secrecy proposed using finite state machines. Secret sharing
of the message. schemes were discovered independently by Blakley
and Shamir. The motivation for secret sharing is to
Key words: Mealy Machine, Recurrence matrix, have secure key management. In some situations,
Fermat‘s and Mersenne‘s sequence. there is usually one secret key that provides access
to many important files, if such a key is lost then
1. INTRODUCTION all the important files become inaccessible. The
basic idea in secret sharing is to divide the secret
key into pieces and distribute the pieces to different
There is a scope for a wide range of application of
persons so that certain subsets of the persons can
automaton theory in the field of cryptology. In
get together to recover the key.[7][1]
automata theory, a branch of theoretical computer
science, a deterministic finite automaton (DFA)— In Mealy Machine every finite state machine has a
also known as deterministic finite state machine— fixed output. Mathematically Mealy machine is a
is a finite state machine that accepts/rejects finite six-tuple machine and is defined as :
strings of symbols and only produces a unique
computation (or run) of the automaton for each M= ( Q, , , , , q0 )
'
www.ijert.org 1286
International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
Vol. 2 Issue 5, May - 2013
Step 3
Step 4
IJE
Define input.
Step 5
Step 6
Fig 1 Mealy machine
Define recurrence matrix and choose recurrence
..In the above diagram 0/1 represent input/output. relation.
Recurrence matrix is a matrix whose elements are Define the value of n of recurrence relation.
taken from a recurrence relation [1].
Step 8
The recurrence matrix in this paper is defined as
Define cipher text at each stage for all the plain
1 𝐶𝑛+1 𝐶𝑛 texts.
Rn= 𝐶𝑛+1 1 𝐶𝑛 +2
𝐶𝑛 𝐶𝑛+2 1 Step 9
www.ijert.org 1287
International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
Vol. 2 Issue 5, May - 2013
5 Implementation
Algorithm proposed, is a simple application of Let us encrypt the ‗Birds are singing.‘
addition of two matrices. But the recurrence matrix
and elements of recurrence matrix are different at This sentence has eighteen characters which
each stage depending on the input and output. It is include space and full stop.
very difficult to break the cipher text without
Step 1
proper key, defined operation and the chosen finite
state machine. The key is defined as the sum of all P= BIRDS ARE SINGING
the elements of this plain text.
Step 2
www.ijert.org 1288
International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
Vol. 2 Issue 5, May - 2013
a recurrence relation.
9 114 71
Step 7 Send cipher text 109 26 209 to receiver 1
54 227 12
Let ‗Ci+1‘ be the cipher text at Ci+ith state and is
defined as 7 148 73
And cipher text 143 14 268 to receiver 2.
Ci+1 = Ci+Rn 52 156 34
Concluding Remarks
Fermat‘s sequence when input=0
Rn = Mersenne‘s sequence when input = 1
Then the cipher text at each state is as follows: 1. The secret key.
www.ijert.org 1289
International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
Vol. 2 Issue 5, May - 2013
References
[5]
http://www.certicom.com/index.php/eccctutorial
www.ijert.org 1290