polarRLCE: A New Code-Based Cryptosystem Using Polar Codes
نویسندگان
چکیده
منابع مشابه
Secret Key Cryptosystem Based on Non-systematic Polar Codes
˗ Polar codes are provably capacity achieving linear block codes. The generator matrix of these codes is specified by knowing the parameters of transmission channel, length and dimension of the used code. On the other hand, for the cryptosystems based on general decoding problem (i.e. code based cryptosystems), the generator matrix of the applied code should be properly hidden from the attacker...
متن کاملAn efficient secure channel coding scheme based on polar codes
In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...
متن کاملExponents of polar codes using algebraic geometric code kernels
Reed-Solomon and BCH codes were considered as kernels of polar codes by Mori and Tanaka in [6] and Korada, Şaşoğlu, and Urbanke in [4] to create polar codes with large exponents. For codes of length l ≤ q, Mori and Tanaka showed Reed-Solomon codes give the best possible exponent, where q is the size of the input alphabet. However, considering larger matrices over Fq yields better exponents for ...
متن کاملPKC-PC: A Variant of the McEliece Public Key Cryptosystem based on Polar Codes
Polar codes are novel and efficient error correcting codes with low encoding and decoding complexities. These codes have a channel dependent generator matrix which is determined by the code dimension, code length and transmission channel parameters. This paper studies a variant of the McEliece public key cryptosystem based on polar codes, called"PKC-PC". Due to the fact that the structure of po...
متن کاملFPGA-Based Niederreiter Cryptosystem Using Binary Goppa Codes
This paper presents an FPGA implementation of the Niederreiter cryptosystem using binary Goppa codes, including modules for encryption, decryption, and key generation. We improve over previous implementations in terms of efficiency (time-area product and raw performance) and security level. Our implementation is constant time in order to protect against timing side-channel analysis. The design ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2019
ISSN: 1939-0114,1939-0122
DOI: 10.1155/2019/3086975