Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2008, Applicable Algebra in Engineering, Communication and Computing
…
16 pages
1 file
In this paper, we give and explain some illustrative examples of research topics where error-correcting codes overlap with cryptography. In some of these examples, error-correcting codes employed in the implementation of secure cryptographic protocols. In the others, the codes are used in attacks against cryptographic schemes. Throughout this paper, we show the interrelation between errorcorrecting codes and cryptography, as well as point out the common features and the differences between these two fields.
Cryptography - Recent Advances and Future Developments, 2021
Quantum computers are distinguished by their enormous storage capacity and relatively high computing speed. Among the cryptosystems of the future, the best known and most studied which will resist when using this kind of computer are cryptosystems based on error-correcting codes. The use of problems inspired by the theory of error-correcting codes in the design of cryptographic systems adds an alternative to cryptosystems based on number theory, as well as solutions to their vulnerabilities. Their security is based on the problem of decoding a random code that is NP-complete. In this chapter, we will discuss the cryptographic properties of error-correcting codes, as well as the security of cryptosystems based on code theory.
2013 21st Telecommunications Forum Telfor (TELFOR), 2013
Error-correcting codes based on quasigroups are defined elsewhere. These codes are a combination of cryptographic algorithms and error correcting codes. In a paper of ours we succeed to improve the speed of the decoding process by defining new algorithm for coding and decoding, named "cut-decoding algorithm". Here, a new modification of the cut-decoding algorithm is considered in order to obtain further improvements of the code performances. We present several experimental results obtained with different decoding algorithms for these codes.
Tatra Mountains Mathematical Publications, 2019
In this paper we introduce a new cryptographic system which is based on the idea of encryption due to [McEliece, R. J. A public-key cryptosystem based on algebraic coding theory, DSN Progress Report. 44, 1978, 114–116]. We use the McEliece encryption system with a new linear error-correcting code, which was constructed in [Hannusch, C.—Lakatos, P.: Construction of self-dual binary 22 k, 22 k−1, 2 k-codes, Algebra and Discrete Math. 21 (2016), no. 1, 59–68]. We show how encryption and decryption work within this cryptosystem and we give the parameters for key generation. Further, we explain why this cryptosystem is a promising post-quantum candidate.
EURASIP Journal on Wireless Communications and Networking, 2006
Securing transmission over a wireless network is especially challenging, not only because of the inherently insecure nature of the medium, but also because of the highly error-prone nature of the wireless environment. In this paper, we take a joint encryptionerror correction approach to ensure secure and robust communication over the wireless link. In particular, we design an errorcorrecting cipher (called the high diffusion cipher) and prove bounds on its error-correcting capacity as well as its security. Towards this end, we propose a new class of error-correcting codes (HD-codes) with built-in security features that we use in the diffusion layer of the proposed cipher. We construct an example, 128-bit cipher using the HD-codes, and compare it experimentally with two traditional concatenated systems: (a) AES (Rijndael) followed by Reed-Solomon codes, (b) Rijndael followed by convolutional codes. We show that the HD-cipher is as resistant to linear and differential cryptanalysis as the Rijndael. We also show that any chosen plaintext attack that can be performed on the HD cipher can be transformed into a chosen plaintext attack on the Rijndael cipher. In terms of error correction capacity, the traditional systems using Reed-Solomon codes are comparable to the proposed joint error-correcting cipher and those that use convolutional codes require 10% more data expansion in order to achieve similar error correction as the HD-cipher. The original contributions of this work are (1) design of a new joint error-correction-encryption system, (2) design of a new class of algebraic codes with built-in security criteria, called the high diffusion codes (HD-codes) for use in the HD-cipher, (3) mathematical properties of these codes, (4) methods for construction of the codes, (5) bounds on the error-correcting capacity of the HD-cipher, (6) mathematical derivation of the bound on resistance of HD cipher to linear and differential cryptanalysis, (7) experimental comparison of the HD-cipher with the traditional systems.
Computer Communications, 1997
A new cryptographic system is presented in this paper which combines error-correction techniques with cryptographic protection as secure as one might want. The proposed system is based on the following: given a linear block code (n, k), n > k, we have a lot of possibilities to distribute 'k' information symbols among 'n' symbols composing the code word. A method for the cryptanalysis of the system is also proposed. These possibilities increase when n > > k and include the order and place of the 'k' symbols among the 'n' symbols. Practical results were obtained via simulation on a PC486,66 MHz, where the proposed system and its cryptographic analysis were implemented. 0 1997 Elsevier Science B.V.
Interactive Theorem Proving, 2015
By adding redundancy to transmitted data, error-correcting codes (ECCs) make it possible to communicate reliably over noisy channels. Minimizing redundancy and (de)coding time has driven much research, culminating with Low-Density Parity-Check (LDPC) codes. At first sight, ECCs may be considered as a trustful piece of computer systems because classical results are well-understood. But ECCs are also performance-critical so that new hardware calls for new implementations whose testing is always an issue. Moreover, research about ECCs is still flourishing with papers of ever-growing complexity. In order to provide means for implementers to perform verification and for researchers to firmly assess recent advances, we have been developing a formalization of ECCs using the SSReflect extension of the Coq proof-assistant. We report on the formalization of linear ECCs, duly illustrated with a theory about the celebrated Hamming codes and the verification of the sum-product algorithm for decoding LDPC codes.
Information Processing and Management, 2007
Cryptography is an exciting field of knowledge that deals with secure transmission of data on public channels. It has found many applications in the digital era and has attracted some of the greatest minds of the world. Many good books on cryptography and cryptographic protocol are available and more are being written. The field of information theory is also very important and highly applicable area. As pointed out by Thomas M. Cover and Joy A. Thomas in their famous book, Elements of Information Theory, that information theory is all about computing ultimate compression and computing maximum possible data rates on a communication channel. The theory of error-correcting codes deals with the error free transmission of messages on noisy channels. Therefore, all the three fields, obviously, deal with transmission of messages and are interrelated.
Springer Undergraduate Mathematics Series, 2008
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
Journal of Automated Reasoning, 2020
IEEE Transactions on Information Theory, 1999
Signals and Communication Technology, 2017
ISRN Communications and Networking, 2011
International Journal on Recent and Innovation Trends in Computing and Communication
Applicable Algebra in Engineering, Communication and Computing, 1997
Information Theory, IEEE Transactions on, 1967
Wiley Encyclopedia of Telecommunications, 2003
Journal of Physics: Conference Series, 2017
Designs, Codes and Cryptography
IEEE Signal Processing Magazine, 2013
Journal of Cryptology
Lecture Notes in Computer Science, 1993
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 2010
Discrete Mathematics, 1990
IEEE Transactions on Information Theory, 1984