期刊文献+

Rao-Nam私钥密码体制的修正 被引量:3

Modification of Rao-Nam's Private-Key Cryptosystem
在线阅读 下载PDF
导出
摘要 该文提出了一种非查表的错误图样生成算法。该算法通过将可纠正的错误矢量的部分信息嵌入到明文消息中,从而得到比原错误矢量具有更大汉明重量的错误图样。用该算法修正的Rao-Nam私钥密码体制高效实用,既无需存储错误图样,又增强了安全性。 A new kind of algorithm is proposed which can produce random error vector without looking up the syndrome-error table. An error vector with larger Hamming weight can be produced by mixing a part of the original error vector with the plaintext. A modified Rao-Nam scheme based on the new algorithm is presented, which requires no storage for random error vector. The scheme is efficient and practical, and offers a much higher security level.
出处 《电子与信息学报》 EI CSCD 北大核心 2005年第8期1287-1289,共3页 Journal of Electronics & Information Technology
关键词 私钥密码体制 纠错码 错误图样 Private-key cryptosystem, Error-correcting code, Error vector
  • 相关文献

参考文献8

  • 1Berlekamp E R, McEliece R J, van Tilborg H C A. On the inherent intractability of certain coding problems. IEEE Trans. on Information Theory, 1978, IT-24:384 - 386.
  • 2McEliece R J. A public-key cryptosystem based on algebraic coding theory. DSN Prog. Rep. 1978:42 - 44, 114 - 116.
  • 3Rao T R N. Joint encryption and error correction schemes. Confer ence Proceedings-11^th Annual International Symposium on Com puter Architecture, Ann Arbor, Mich, USA., 1984:240 - 241.
  • 4Rao T R N, Nam K H. Private-key algebraic-code encryptions.IEEE Trans. on Information Theory, 1989, 35(4): 829 - 833.
  • 5Struik R, Tilburg J. The Rao-Nam scheme is insecure against a chosen-plaintext attack. Advances in Cryptology-CRYPTO '87.New York: Springer-Verlag, 1988:458 - 461.
  • 6Struik R. On the Rao-Nam scheme using nonlinear codes. Infor mation Theory Proceedings. 1991 IEEE International Symposium,Eindhoven University of Technology, 1991: 174 - 174.
  • 7Denny W F. Encryptions using linear and nonlinear codes:implementation and security considerations. [Ph.D. dissertation],The Center for Advanced Computer Studies, University of Southwestem Louisiana, Lafayette, 1988.
  • 8Sun H M, Hwang T. Key generation of algebraic-code crypto systems. Computer Math. Application, 1994, 27(2): 99 - 106.

同被引文献29

  • 1王文君,刘少华.基于LDPC码的BICM系统性能分析[J].电子科技,2004,17(11):21-24. 被引量:4
  • 2彭蓉,崔竞松.一种基于纠错码的分布式安全文件系统[J].计算机工程,2005,31(7):7-8. 被引量:2
  • 3唐明,张国平,张焕国.基于汉明纠错编码的AES硬件容错设计与实现[J].电子学报,2005,33(11):2013-2016. 被引量:7
  • 4钟竞东,梁钊.准循环LDPC码的性能及其在图像传输中的应用[J].电子科技,2006,19(2):47-50. 被引量:1
  • 5RAO T R N, NAM K H. Private-key algebraic-code crypt osystems[ C] //Advances in Cryptology-CRYPTO' 86, Lec ture Notes in Computer Science. Berlin: Springer, 1987, 263:35-48.
  • 6RAO T R N, NAM K H. Private-key algebraic-code en cryption[J]. IEEE Transactions on Information Theory, 1989, 35(4) :829-833.
  • 7STRUIK R, Van TILBURG J. The Rao-Nam scheme is insecure against a chosen-plaintext attack[ C]//Advances in CryptologyCRYPTO' 87, Lecture Notes in Computer Science. Berlin: Springer, 1988, 293 : 445-457.
  • 8DENNY W F. Encryptions using linear and non-linear codes: Implementation and security considerations[J]. Dis sertation Abstracts International Part B: Science and Engi neering, 1989, 49(10) :64.
  • 9STRUIK R. On the Rao-Nam scheme using nonlinear codes [C]// Proc. of the 1991 IEEE Int Symp on Information Theory. [S.1. ] :IEEE, 1991:174.
  • 10HIN P J M. Channel-Error-Correcting Privacy Cryptosys terns[ D]. Delft: Delft University of Technology, 1986.

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部