• English
    • العربية
  • العربية
  • Login
  • QU
  • QU Library
  •  Home
  • Communities & Collections
View Item 
  •   Qatar University Digital Hub
  • Qatar University Institutional Repository
  • Academic
  • University Publications
  • QU Ceased Journals
  • Engineering Journal of Qatar University - [From 1988 TO 2005]
  • View Item
  • Qatar University Digital Hub
  • Qatar University Institutional Repository
  • Academic
  • University Publications
  • QU Ceased Journals
  • Engineering Journal of Qatar University - [From 1988 TO 2005]
  • View Item
  •      
  •  
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Cascaded Coding Schemes For Public-Key Cryptography

    Thumbnail
    View/Open
    06-95-8-0004-fulltext.pdf (565.2Kb)
    Date
    1995
    Author
    El Soudani, Magdi M. Said
    Metadata
    Show full item record
    Abstract
    1976 Diffic and Hellman introduced the concept of public-key cryptography and in 1978, McEliece introduced the first public-key cryptosystem based on error correcting codes. Since that time, several methods have been proposed to use error correcting codes for cryptography either directly or indirectly. In this work we propose the use of cascaded codes in McEliece algorithm where cascading here means that one code is used after the other. Two or more codes are used in cascade to get high error correcting capabilities even with moderate length codes. This makes the system more useful over noisy channels. The structure of cascaded codes is in itself a good way to secure the data. Binary block codes are only considered in this work although other types of codes can be used. We discuss two different encryption schemes where normal and Tensor products of matrices are used to form the codes. The proposed schemes are more adequate for block encryption. Decoding is also performed in cascade to make use of the existing fast decoding algorithms available for each of the used codes. Therefore, the decryption process will be fast too compared with other schemes based on number theory. The selection of proper code parameters is discussed and the probability of correct recovery of transmitted messages is also found.
    DOI/handle
    http://hdl.handle.net/10576/7862
    Collections
    • Engineering Journal of Qatar University - [From 1988 TO 2005] [‎221‎ items ]

    entitlement


    Qatar University Digital Hub is a digital collection operated and maintained by the Qatar University Library and supported by the ITS department

    Contact Us | Send Feedback
    Contact Us | Send Feedback | QU

     

     

    Home

    Submit your QU affiliated work

    Browse

    All of Digital Hub
      Communities & Collections Publication Date Author Title Subject Type Language Publisher
    This Collection
      Publication Date Author Title Subject Type Language Publisher

    My Account

    Login

    Statistics

    View Usage Statistics

    Qatar University Digital Hub is a digital collection operated and maintained by the Qatar University Library and supported by the ITS department

    Contact Us | Send Feedback
    Contact Us | Send Feedback | QU

     

     

    Video