Cascaded Coding Schemes For Public-Key Cryptography

Show simple item record El Soudani, Magdi M. Said en_US
date.accessioned 2009-11-25T13:03:59Z en_US
date.available 2009-11-25T13:03:59Z en_US
date.issued 1995 en_US
identifier.citation Engineering Journal of Qatar University, 1995, Vol. 8, Pages 65-81. en_US
identifier.uri en_US
description.abstract 1976 Diffic and Hellman introduced the concept of public-key cryptography and in 1978, McEliece introduced the first public-key cryptosystem based on error correcting codes. Since that time, several methods have been proposed to use error correcting codes for cryptography either directly or indirectly. In this work we propose the use of cascaded codes in McEliece algorithm where cascading here means that one code is used after the other. Two or more codes are used in cascade to get high error correcting capabilities even with moderate length codes. This makes the system more useful over noisy channels. The structure of cascaded codes is in itself a good way to secure the data. Binary block codes are only considered in this work although other types of codes can be used. We discuss two different encryption schemes where normal and Tensor products of matrices are used to form the codes. The proposed schemes are more adequate for block encryption. Decoding is also performed in cascade to make use of the existing fast decoding algorithms available for each of the used codes. Therefore, the decryption process will be fast too compared with other schemes based on number theory. The selection of proper code parameters is discussed and the probability of correct recovery of transmitted messages is also found. en_US
language.iso en en_US
publisher Qatar University en_US
subject Engineering: Research & Technology en_US
title Cascaded Coding Schemes For Public-Key Cryptography en_US
type Article en_US
identifier.pagination 65-81 en_US
identifier.volume 8 en_US

Files in this item

This item appears in the following Collection(s)

Show simple item record