Log in

Implementation of RSA cryptographic algorithm using SN P systems based on HP/LP neurons

  • Regular Paper
  • Published:
Journal of Membrane Computing Aims and scope Submit manuscript

Abstract

Asymmetric cryptographic systems are often more complex and require more computational power than symmetric systems. This is why they might be implemented using unconventional computing systems, such as P systems, spiking neural systems, and DNA computing. In this work, we design an implementation model for RSA encryption and decryption algorithms in the framework of Spiking neural P systems with HP/LP basic neurons.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Canada)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Adleman, L. (1994). Molecular computation of solutions to combinatorial problems. Science,266(5187), 1021–1024. https://doi.org/10.1126/science.7973651. https://science.sciencemag.org/content/266/5187/1021.

  2. Barak, B. (2017). The complexity of public-key cryptography (pp. 45–77). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-57048-8_2.

    Book  Google Scholar 

  3. Buchanan, W., & Woodward, A. (2017). Will quantum computers be the end of public key encryption? Journal of Cyber Security Technology, 1(1), 1–22. https://doi.org/10.1080/23742917.2016.1226650.

    Article  Google Scholar 

  4. Buiu, C., & Florea, A. G. (2019). Membrane computing models and robot controller design, current results and challenges. Journal of Membrane Computing, 1(4), 262–269. https://doi.org/10.1007/s41965-019-00029-8.

    Article  MathSciNet  Google Scholar 

  5. Fan, S., Paul, P., Wu, T., Rong, H., & Zhang, G. (2020). On applications of Spiking Neural p systems. Applied Sciences, 10(20), 7011. https://doi.org/10.3390/app10207011.

    Article  Google Scholar 

  6. Guo, P., & Xu, W. (2016). A family P system of realizing RSA algorithm. In M. Gong, L. Pan, T. Song, & G. Zhang (Eds.), Bio-inspired computing—theories and applications (pp. 155–167). Singapore: Springer.

    Chapter  Google Scholar 

  7. Hussain, N., Balamurugan, C., & Mariappan, R. (2015). A novel dna computing based encryption and decryption algorithm. Procedia Computer Science, 46, 463–475. https://doi.org/10.1016/j.procs.2015.02.045.

    Article  Google Scholar 

  8. Ionescu, M., Păun, A., Păun, G., & Pérez-Jiménez, M.J. (2006). Computing with Spiking Neural P systems: Traces and small universal systems. In: Mao C. and Yokomori T. (Eds) DNA Computing. DNA 2006. Lecture Notes in Computer Science. Springer, Berlin, Heidelberg 4287(16), 1–16. https://doi.org/10.1007/11925903_1

  9. Ionescu, M., Păun, G., & Yokomori, T. (2006). Spiking Neural P systems. Fundamenta Informaticae, 71(2), 279–308.

    MathSciNet  MATH  Google Scholar 

  10. Ishdorj, T. O. (2006). Minimal parallelism for polarizationless P systems. In C. Mao & T. Yokomori (Eds.), DNA Computing (pp. 17–32). Berlin: Springer.

    Chapter  Google Scholar 

  11. Ishdorj, T. O., & Leporati, A. (2008). Uniform solutions to SAT and 3-SAT by Spiking Neural P systems with pre-computed resources. Natural Computing, 7(4), 519–534. https://doi.org/10.1007/s11047-008-9081-0.

    Article  MathSciNet  MATH  Google Scholar 

  12. Ishdorj, T.O., Ochirbat, O., & Naimannaran, C. (2020). A \(\mu\)-fluidic biochip design for Spiking Neural P systems. International Journal of Unconventional Computation

  13. Ishdorj, T. O., & Petre, I. (2008). Gene assembly models and boolean circuits. International Journal of Foundations of Computer Science, 19(05), 1133–1145.

    Article  MathSciNet  Google Scholar 

  14. Ishdorj, T. O., Petre, I., & Rogo**, V. (2007). Computational power of intramolecular gene assembly. International Journal of Foundations of Computer Science, 18(05), 1123–1136.

    Article  MathSciNet  Google Scholar 

  15. Kari, L., & Rozenberg, G. (2008). The many facets of natural computing. Communications of the ACM, 51, 72–83. https://doi.org/10.1145/1400181.1400200.

    Article  Google Scholar 

  16. Karimi, A., & Shahhoseini, H. S. (2012). Cryptanalysis of a substitution-permutation network using gene assembly in ciliates. International Journal of Communications, Network and System Sciences, 5, 154–164.

    Article  Google Scholar 

  17. Liu, Y., Nicolescu, R., & Sun, J. (2020). Formal verification of cP systems using PAT3 and ProB. Journal of Membrane Computing, 2(2), 80–94. https://doi.org/10.1007/s41965-020-00036-0.

    Article  MathSciNet  Google Scholar 

  18. Mavroeidis, V., Vishi, K., Zych, M., & Jøsang, A. (2018). The impact of quantum computing on present cryptography. International Journal of Advanced Computer Science and Applications. https://. https://doi.org/10.14569/IJACSA.2018.090354.

    Article  Google Scholar 

  19. Mitrana, V. (2019). Polarization: a new communication protocol in networks of bio-inspired processors. Journal of Membrane Computing, 1(2), 127–143. https://doi.org/10.1007/s41965-018-0001-9.

    Article  MathSciNet  MATH  Google Scholar 

  20. Narendren., Yathish, Y.B., & Mohan, C. (2018). A cryptosystem using two layers of security-dna and rsa cryptography.

  21. Ochirbat, O., Ishdorj, T. O., & Cichon, G. (2020). An error-tolerant serial binary full-adder via a Spiking Neural P system using HP/LP basic neurons. Journal of Membrane Computing, 2(1), 42–48. https://doi.org/10.1007/s41965-020-00033-3.

    Article  MathSciNet  Google Scholar 

  22. Păun, G. (2002). Membrane computing: an introduction. Berlin: Springer-Verlag.

    Book  Google Scholar 

  23. Rivest, R., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21, 120–126.

    Article  MathSciNet  Google Scholar 

  24. Shor, P. W. (1997). Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal on Computing, 26(5), 1484–1509. https://doi.org/10.1137/S0097539795293172.

    Article  MathSciNet  MATH  Google Scholar 

  25. Wang, H., Zhou, K., Zhang, G., Paul, P., Duan, Y., Qi, H., & Rong, H. (2020). Application of weighted Spiking Neural P systems with rules on synapses for breaking RSA encryption. International Journal of Unconventional Computing, 15, 37–58.

    Google Scholar 

  26. Wang, X., & Zhang, Q. (2009). DNA computing-based cryptography. In: 2009 Fourth International on Conference on Bio-Inspired Computing, pp. 1–3.

  27. Weng-Long, C., Lin, K., Chen, J. C., Chih-Chiang, W., Lai, L., Guo, M., & Michael, H. (2011). molecular solutions of the RSA public-key cryptosystem on a DNA-based computer. The Journal of Supercomputing - TJS, 61, 1–31. https://doi.org/10.1007/s11227-011-0627-z.

    Article  Google Scholar 

  28. Weste, N. H. E., & Eshraghian, K. (1985). Principles of CMOS VLSI design: a systems perspective. Boston: Addison-Wesley Longman Publishing Co. Inc.

    Google Scholar 

  29. **e, H., Li, B., Qin, J., Huang, Z., Zhu, Y., & Lin, B. (2009). A splicing model based DNA computing approach on microfluidic chip. Electrophoresis, 30(20), 3514–3518. https://doi.org/10.1002/elps.200900323.

    Article  Google Scholar 

  30. Xu, Z., Cavaliere, M., An, P., Vrudhula, S., & Cao, Y. (2014). The stochastic loss of spikes in Spiking Neural P systems: Design and implementation of reliable arithmetic circuits. Fundamenta Informaticae, 134(1–2), 183–200. https://doi.org/10.3233/FI-2014-1098.

    Article  MathSciNet  MATH  Google Scholar 

  31. Zhang, G., Shang, Z., Verlan, S., Martínez-del Amor, M. A., Yuan, C., Valencia-Cabrera, L., & Pérez-Jiménez, M. J. (2020). An overview of hardware implementation of membrane computing models. ACM Computing Surveys. https://doi.org/10.1145/3402456.

    Article  Google Scholar 

Download references

Acknowledgements

We would like to thank the financial support from the Mongolian Foundation for Science and Technology (Research Grants ShUSS- 2018/04). This work has been presented at the 21th International Conference on Membrane Computing (ICMC 2020) in Ulaanbaatar, Mongolia and Vienna, Austria, September 14–17, 2020.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tseren-Onolt Ishdorj.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Supplementary Information

Below is the link to the electronic supplementary material.

Supplementary file1 (PDF 177 KB)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ganbaatar, G., Nyamdorj, D., Cichon, G. et al. Implementation of RSA cryptographic algorithm using SN P systems based on HP/LP neurons. J Membr Comput 3, 22–34 (2021). https://doi.org/10.1007/s41965-021-00073-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41965-021-00073-3

Keywords

Navigation