Turbo Codes Can Be Asymptotically Information-Theoretically Secure
نویسنده
چکیده
This paper shows that a turbo-coded communication system can be made secure with a little bit of complexity cost. The classical permutation ciphers are revisited and analyzed. Firstly, the ideal stream permutation ciphers are shown to be asymptotically information-theoretically secure in the sense that the channel from plaintext to ciphertext has a vanished capacity, while the practical stream permutation ciphers are shown to be more secure than the classical stream ciphers in terms of protecting keys. Secondly, a necessary condition to break down a block permutation cipher is derived, which is then utilized to guarantee the computational security of a modified block permutation cipher. Thirdly, turbo ciphers (turbo-like codes with private interleavers) are proposed and analyzed.
منابع مشابه
An approach to fault detection and correction in design of systems using of Turbo codes
We present an approach to design of fault tolerant computing systems. In this paper, a technique is employed that enable the combination of several codes, in order to obtain flexibility in the design of error correcting codes. Code combining techniques are very effective, which one of these codes are turbo codes. The Algorithm-based fault tolerance techniques that to detect errors rely on the c...
متن کاملCombinatorial analysis of the minimum distance of turbo codes
In this paper, new upper bounds on the maximum attainable minimum Hamming distance of Turbo codes with arbitrary — including the best — interleavers are established using a combinatorial approach. These upper bounds depend on the interleaver length, on the code rate and on the scramblers employed in the encoder. Examples of the new bounds for particular Turbo codes are given and discussed. The ...
متن کاملMinimum distance of error correcting codes versus encoding complexity, symmetry, and pseudorandomness
We study the minimum distance of binary error correcting codes from the following perspectives: • The problem of deriving bounds on the minimum distance of a code given constraints on the computational complexity of its encoder. • The minimum distance of linear codes that are symmetric in the sense of being invariant under the action of a group on the bits of the codewords. • The derandomizatio...
متن کاملAn Approach to Increasing Reliability Using Syndrome Extension
Computational errors in numerical data processing may be detected efficiently by using parity values associated with real number codes, even when inherent round off errors are allowed in addition to failure disruptions. This paper examines correcting turbo codes by straightforward application of an algorithm derived for finite-field codes, modified to operate over any field. There are syndromes...
متن کاملToward Efficient Quantum Key Distribution Reconciliation
In this paper, we propose how to construct a reconciliation method for the BB84 Quantum Key Distribution (QKD) protocol. Theoretically, it is unconditionally secure because it is based on the quantum laws of physics, rather than the assumed computational complexity of mathematical problems. BB84 protocol performances can be reduced by various errors and information leakages such as limited intr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2011 شماره
صفحات -
تاریخ انتشار 2011