首页> 外文期刊>Automatic Control and Computer Sciences >Decoding the Tensor Product of MLD Codes and Applications for Code Cryptosystems
【24h】

Decoding the Tensor Product of MLD Codes and Applications for Code Cryptosystems

机译:解码用于代码密码系统的MLD代码和应用程序的张量产品

获取原文
获取原文并翻译 | 示例
       

摘要

For the practical application of code cryptosystems such as McEliece, the code used in the cryptosystem should have a fast decoding algorithm. On the other hand, the code used must ensure that finding a secret key from a known public key is impractical with a relatively small key size. In this connection, in the present paper it is proposed to use tensor product $${{C}_{1}} otimes {{C}_{2}}$$ of group MLD codes $${{C}_{1}}$$ and $${{C}_{2}}$$ in a McEliece-type cryptosystem. The algebraic structure of code $${{C}_{1}} otimes {{C}_{2}}$$ in a general case differs from the structure of codes $${{C}_{1}}$$ and $${{C}_{2}}$$ , so it is possible to build stable cryptosystems of the McEliece type even on the basis of codes $${{C}_{i}}$$ for which successful attacks on the key are known. However, in this way there is a problem of decoding code $${{C}_{1}} otimes {{C}_{2}}$$ . The main result of this paper is the construction and validation of a series of fast algorithms needed for decoding this code. The process of constructing the decoder relies heavily on the group properties of code $${{C}_{1}} otimes {{C}_{2}}$$ . As an application, the McEliece-type cryptosystem is constructed on code $${{C}_{1}} otimes {{C}_{2}}$$ and an estimate is given of its resistance to attack on the key under the assumption that for code cryptosystems on codes $${{C}_{i}}$$ an effective attack on the key is possible. The results obtained are numerically illustrated in the case when $${{C}_{1}}$$ and $${{C}_{2}}$$ are Reed–Muller–Berman codes for which the corresponding code cryptosystem was hacked by L. Minder and A. Shokrollahi (2007).
机译:对于代码密码系统(如MECERIES)的实际应用,密码系统中使用的代码应该具有快速解码算法。另一方面,所使用的代码必须确保从已知的公钥查找密钥,这对于相对较小的密钥大小是不切实际的。在这方面,在本文中,建议使用张量产品$$ {{c} _ {1}} otimes {{c} _ {2}} MLD代码$$ {{c} _ {1}} $$和$$ {{c} _ {2}} $$在MECERIES型密码系统中。常规情况下的代数{{c} _ {1}} otimes {{c} _ {2}} $$与代码的结构不同,$$ {{c} _ {1}} $$和$$ {{c} _ {2}} $$,因此即使基于代码$$ {{c} _ {i}} $$为基础,也可以构建MCELIENCE类型的稳定密码系统已知对密钥的成功攻击。然而,通过这种方式,存在解码代码$$ {{c} _ {1}} otimes {{c} _ {2}} $$问题。本文的主要结果是解码此代码所需的一系列快速算法的构建和验证。构建解码器的过程严重依赖于代码$$ {{c}×1}} otimes {{c} _ {2}} $$的组属性。作为应用程序,MECELIENCE型密码系统由CODE $$ {{c} _ {1}} otimes {{c} _ {2}} $$和估计来估算其对键的攻击的阻力在假设代码密码系统上的代码$$ {{c} _ {i}} $$有效攻击键是可能的。在$$ {{c} _ {1}} $$和$$ {{c} _ {2}} $$是相应的代码密码系统的reed-muller-berman代码的情况下,获得的结果被L. Minder和A. Shokrollahi(2007年)被黑了攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号