Decoding Random Binary Linear Codes in 2n/20 How 1+1=0 Improves Information Set Decoding
|
|
- Kelley Francis
- 5 years ago
- Views:
Transcription
1 Decoding Random Binary Linear Codes in 2n/20 How 1+1=0 Improves Information Set Decoding A. Becker, A. Joux, A. May, A. Meurer EUROCRYPT 2012, Cambridge
2 The Representation Technique [HGJ10] How to fnd a needle N in a haystack H... Expand H into larger stack H' Expanding H' introduces r many representations N1,, N r Examine a 1/r fraction of H' to fnd one Ni
3 The Representation Technique [HGJ10] How to fnd a needle N in a haystack H... Expand H into larger stack H' Expanding H' introduces r many representations N1,, N r Examine a 1/r fraction of H' to fnd one Ni Technicality: Technicality: Find Find aa way way to to examine examine aa 1/r 1/r fraction fraction of of H' H' without without completely completely constructing constructing itit beforehand beforehand
4 The Representation Technique [HGJ10] How to fnd a needle N in a haystack H... Expand H into larger stack H' Expanding H' introduces r many representations N1,, N r Technicality: Technicality: Find Find aa way way to to examine examine aa 1/r 1/r fraction fraction of of H' H' without without completely completely constructing constructing itit beforehand beforehand Examine a 1/r fraction of H' to fnd one Ni Has been used in [MMT11] to improve Information Set Decoding
5 The Representation Technique Optimizing the Representation Technique [BCJ11] r = number of needles H' = size of expanded haystack Ratio H' / r determines effciency Increase r while keeping H' small
6 The Representation Technique Optimizing the Representation Technique [BCJ11] r = number of needles H' = size of expanded haystack Ratio H' / r determines effciency Increase r while keeping H' small Can we use 1+1 = 0 to increase r?
7 Recap Binary Linear Codes C = random binary [n,k,d] code n = length / k = dimension / d = minimum distance Bounded Distance Decoding (BDD) Given x = c+e with c 2 C 4 5 and w := wt(e) = d-1 2 Find e and thus c = x+e x 4 5 d-1 2 c
8 Comparing Running Times How to compare performance of decoding algorithms Running time T(n,k,d) Fixed code rate R = k/n For n, k and d are related via Gilbert-Varshamov bound, thus T(n,k,d) = T(n,k) Compare algorithms by complexity coeffcient F(k), i.e. T(n,k) = 2 F(k) n + o(n)
9 Comparing Running Times How to compare performance of decoding algorithms Running time T(n,k,d) Fixed code rate R = k/n Minimize F(k)! For n, k and d are related via Gilbert-Varshamov bound, thus T(n,k,d) = T(n,k) Compare algorithms by complexity coeffcient F(k), i.e. T(n,k) = 2 F(k) n + o(n)
10 Syndrome Decoding (BDD) Given x = c+e with c 2 C and wt(e)=w, fnd e! H = parity check matrix Consider syndrome s := s(x) = H x = H (c+e) = H e Find linear combination of w columns of H matching s weight w n n-k H = + + = s
11 Syndrome Decoding (BDD) Given x = c+e with c 2 C and wt(e)=w, fnd e! H = parity check matrix Consider syndrome s := s(x) = H x = H (c+e) = H e Find linear combination of w columns of H matching s weight w n n-k H Brute-Force Brute-Force complexity = + + = s T(n,k,d) T(n,k,d) ==
12 Syndrome Decoding (BDD) Given x = c+e with c 2 C and wt(e)=w, fnd e! H = parity check matrix Consider syndrome s := s(x) = H x = H (c+e) = H e Find linear combination of w columns of H matching s weight w n n-k H = F(k) = s
13 Some Basic Observations for BDD Allowed (linear algebra) transformations Permuting the columns of H does not change the problem
14 Some Basic Observations for BDD Allowed (linear algebra) transformations Permuting the columns of H does not change the problem weight w n n-k H = s
15 Some Basic Observations for BDD Allowed (linear algebra) transformations Permuting the columns of H does not change the problem weight w n n-k H = s
16 Some Basic Observations for BDD Allowed (linear algebra) transformations Permuting the columns of H does not change the problem Elementary row operations on H do not change the problem
17 Some Basic Observations for BDD Allowed (linear algebra) transformations Permuting the columns of H does not change the problem Elementary row operations on H do not change the problem weight w n n-k H = s
18 Some Basic Observations for BDD Allowed (linear algebra) transformations Permuting the columns of H does not change the problem Elementary row operations on H do not change the problem weight w n UG n-k H Invertible (n-k)x(n-k) matrix = UG s
19 Randomized quasi-systematic form Work on randomly column-permuted version of H Transform H into quasi-systematic form H= n-k-l q1,..., q 0 Q' In-k-l l rows First used in generalized ISD framework of [FS09]
20 Information Set Decoding ''Reducing the brute-force search space by linear algebra.''
21 The ISD Principle Structure of H allows to divide e = e1 e2 q1,..., q 0 Q' In-k-l e1 n-k-l e2
22 The ISD Principle Structure of H allows to divide e = e1 e2 e1 e2 e1 e2 q1,..., q 0 q1,..., q 0 Q' In-k-l = Q' + In-k-l
23 The ISD Principle Structure of H allows to divide e = e1 e2 e1 e2 e1 e2 q1,..., q 0 q1,..., q 0 Q' In-k-l = = + Q' * * * + 0 * *! = In-k-l l coordinates s
24 The ISD Principle Structure of H allows to divide e = e1 e2 e1 e2 e1 e2 q1,..., q 0 q1,..., q 0 Q' In-k-l Focus Focus on on ee11 matching matching ss on on frst frst ll coordinates coordinates = = + Q' * * * + 0 * *! = In-k-l l coordinates s
25 The ISD Principle Structure e Find all e1 ofofweight p matching H allows to divide es=on frste l coordinates 1 2 e1 e2 e1 e2 q1,..., q 0 q1,..., q 0 Q' In-k-l = = + Q' * * * + 0 * *! = In-k-l l coordinates s
26 The ISD Principle Structure e Find all e1 ofofweight p matching H allows to divide es=on frste l coordinates 1 e1 e2 e1 e2 q1,..., q 0 q1,..., q 0 = Method only recovers I Q' n-k-l particular error patterns p 2 + Q' In-k-l n-k-l w-p If we fail to fnd e1 : Rerandomize H = * * * + 0 * *! = l coordinates s
27 The ISD Principle e We exploitof 1+1=0 fnd ee1=more eeffciently! Structure H allowsto to divide 1 2 e1 e2 e1 e2 q1,..., q 0 q1,..., q 0 Q' In-k-l = = + Q' * * * + 0 * *! = In-k-l l coordinates s
28 A Meet-in-the-Middle Approach Find a selection with Disjoint partition into left and right half () p () / 2 p/2 p/2 () / 2
29 A Meet-in-the-Middle Approach Find a selection To fnd with run a Meet-in-the-Middle algorithm based on Haystack = set of all () / 2 p/2 () / 2 p/2 () / 2 0 () / 2 0 Needle = unique Same F(k) as recent Ball-Collision decoding [BLP11] as shown in [MMT11]
30 A Meet-in-the-Middle Approach Find a selection To fnd with run a Meet-in-the-Middle algorithm based on Haystack = set of all () / 2 p/2 () / 2 p/2 () / 2 0 F(k) () / 2 0 Needle = unique Same F(k) as recent Ball-Collision decoding [BLP11] as shown in [MMT11]
31 Using Representations [MMT11] Find a selection with Basic representation technique Arbitrary disjoint partition p
32 Using Representations [MMT11] Find a selection with Basic representation technique Arbitrary disjoint partition p p/2 p/2
33 Using Representations [MMT11] Find a selection with Basic representation technique Arbitrary disjoint partition p p/2 p/2
34 Using Representations [MMT11] Find a selection with Basic representation technique Arbitrary disjoint partition p p/2 p/2
35 Using Representations [MMT11] Find a selection with Basic representation technique Arbitrary disjoint partition p p/2 and so on... p/2
36 Using Representations [MMT11] Find a selection with Basic representation technique Arbitrary disjoint partition p p/2 and so on... p/2 representations representations
37 Using Representations [MMT11] Find a selection with Haystack = set of all Needles = p/2 representations Bottleneck: Effcient computation of a - fraction of the haystack p/2 p/2,,...
38 Using Representations [MMT11] Find a selection with Haystack = set of all Needles = p/2 representations p/2 p/2,,... Bottleneck: Effcient computation of a - fraction of the haystack F(k)
39 Using = 0
40 How to use = 0 Write as the symmetric difference of intersecting sets
41 How to use = 0 Write as the symmetric difference of intersecting sets p p/2+² p/2+²
42 How to use = 0 Write as the symmetric difference of intersecting sets p/2+² p/2+²
43 How to use = 0 Write as the symmetric difference of intersecting sets Double columns cancel out p due to 1+1=0! p/2+² p/2+²
44 How to use = 0 Write as the symmetric difference of intersecting sets p p/2+² p/2+²
45 How to use = 0 Write as the symmetric difference of intersecting sets p p/2+² p/2+²
46 How to use = 0 Write as the symmetric difference of intersecting sets p p/2+² p/2+²
47 How to use = 0 Write as the symmetric difference of intersecting sets p p/2+² p/2+²
48 How to use = 0 Write as the symmetric difference of intersecting sets p p/2+² and so on... p/2+²
49 How to use = 0 Write as the symmetric difference of intersecting sets p p/2+² and so on... p/2+² representations representations
50 How to use = 0 Write as the symmetric difference of intersecting sets Haystack = set of all p/2+² Needles = representations p/2+² p/2+² How can we compute a 1/R fraction of the haystack?,,...
51 How to use = 0 How can we compute a 1/R fraction of the haystack? Want to fnd one needle (and suitable q1 + q3 + q4 + q11 = q2 + q4 + q7 + q12 + s ) with
52 How to use = 0 How can we compute a 1/R fraction of the haystack? Want to fnd one needle Uniform 0/1 coordinates (and suitable q1 + q3 + q4 + q11 = q2 + q4 + q7 + q12 + s ) with
53 How to use = 0 How can we compute a 1/R fraction of the haystack? Want to fnd one needle Uniform 0/1 coordinates (and suitable q1 + q3 + q4 + q11 = q2 + q4 + q7 + q12 + s Fix to 0 and ) with log(r) coordinates to s on log(r) coordinates Expect one needle to fulfll the extra constraint!
54 Some More Details The actual search for the needle à la Wagner's Generalized Birthday Algorithm Three-layered binary computation tree Some technicalities Need to exclude "badly distributed q1,, q Method introduces extra inverse-polynomial failure probability
55 Main Result F(k) < 1/20 F(k) Ball-Collisions MMT Our Algorithm k
56 Wrapping up... Summary Using 1+1=0 introduces extra representations Asymptotically fastest generic decoding algorithm Full Version eprint 2012/026 Open Questions More representations? Over Fq? (Low level) optimizations
57 Wrapping up... Summary Using 1+1=0 introduces extra representations Asymptotically fastest generic decoding algorithm Full Version eprint 2012/026 Open Questions Thank you! More representations? Over Fq? (Low level) optimizations
Improved Information Set Decoding Decoding Random Linear Codes in O(20.054n)
Imroved Information Set Decoding Decoding Random Linear Codes in O(2.54n) Alexander May, Alexander Meurer, Enrico Thomae ASIACRYPT 211, Seoul HORST GÖRTZ INSTITUTE FOR IT-SECURITY FACULTY OF MATHEMATICS
More informationHow to improve information set decoding exploiting that = 0 mod 2
How to improve information set decoding exploiting that 1 + 1 = 0 mod 2 Anja Becker Postdoc at EPFL Seminar CCA January 11, 2013, Paris Representation Find unique solution to hard problem in cryptography
More informationDecoding One Out of Many
Decoding One Out of Many Nicolas Sendrier INRIA Paris-Rocquencourt, équipe-projet SECRET Code-based Cryptography Workshop 11-12 May 2011, Eindhoven, The Netherlands Computational Syndrome Decoding Problem:
More informationDecoding Random Binary Linear Codes in 2 n/20 : How 1+1=0Improves Information Set Decoding
Decoding Random Binary Linear Codes in n/0 : How 1+1=0Improves Information Set Decoding Anja Becker 1, Antoine Joux 1,, Alexander May 3,, and Alexander Meurer 3, 1 Université de Versailles Saint-Quentin,
More informationSection 3 Error Correcting Codes (ECC): Fundamentals
Section 3 Error Correcting Codes (ECC): Fundamentals Communication systems and channel models Definition and examples of ECCs Distance For the contents relevant to distance, Lin & Xing s book, Chapter
More informationBall-collision decoding
Ball-collision decoding Christiane Peters Technische Universiteit Eindhoven joint work with Daniel J. Bernstein and Tanja Lange Oberseminar Cryptography and Computer Algebra TU Darmstadt November 8, 200
More informationELEC 405/ELEC 511 Error Control Coding. Hamming Codes and Bounds on Codes
ELEC 405/ELEC 511 Error Control Coding Hamming Codes and Bounds on Codes Single Error Correcting Codes (3,1,3) code (5,2,3) code (6,3,3) code G = rate R=1/3 n-k=2 [ 1 1 1] rate R=2/5 n-k=3 1 0 1 1 0 G
More informationELEC 519A Selected Topics in Digital Communications: Information Theory. Hamming Codes and Bounds on Codes
ELEC 519A Selected Topics in Digital Communications: Information Theory Hamming Codes and Bounds on Codes Single Error Correcting Codes 2 Hamming Codes (7,4,3) Hamming code 1 0 0 0 0 1 1 0 1 0 0 1 0 1
More informationMATH 433 Applied Algebra Lecture 22: Review for Exam 2.
MATH 433 Applied Algebra Lecture 22: Review for Exam 2. Topics for Exam 2 Permutations Cycles, transpositions Cycle decomposition of a permutation Order of a permutation Sign of a permutation Symmetric
More informationOptimum Soft Decision Decoding of Linear Block Codes
Optimum Soft Decision Decoding of Linear Block Codes {m i } Channel encoder C=(C n-1,,c 0 ) BPSK S(t) (n,k,d) linear modulator block code Optimal receiver AWGN Assume that [n,k,d] linear block code C is
More informationLecture 17: Perfect Codes and Gilbert-Varshamov Bound
Lecture 17: Perfect Codes and Gilbert-Varshamov Bound Maximality of Hamming code Lemma Let C be a code with distance 3, then: C 2n n + 1 Codes that meet this bound: Perfect codes Hamming code is a perfect
More informationEE 229B ERROR CONTROL CODING Spring 2005
EE 229B ERROR CONTROL CODING Spring 2005 Solutions for Homework 1 1. Is there room? Prove or disprove : There is a (12,7) binary linear code with d min = 5. If there were a (12,7) binary linear code with
More informationELEC 405/ELEC 511 Error Control Coding and Sequences. Hamming Codes and the Hamming Bound
ELEC 45/ELEC 5 Error Control Coding and Sequences Hamming Codes and the Hamming Bound Single Error Correcting Codes ELEC 45 2 Hamming Codes One form of the (7,4,3) Hamming code is generated by This is
More informationPost-Quantum Cryptography
Post-Quantum Cryptography Code-Based Cryptography Tanja Lange with some slides by Tung Chou and Christiane Peters Technische Universiteit Eindhoven ASCrypto Summer School: 18 September 2017 Error correction
More informationAnd for polynomials with coefficients in F 2 = Z/2 Euclidean algorithm for gcd s Concept of equality mod M(x) Extended Euclid for inverses mod M(x)
Outline Recall: For integers Euclidean algorithm for finding gcd s Extended Euclid for finding multiplicative inverses Extended Euclid for computing Sun-Ze Test for primitive roots And for polynomials
More informationSPA decoding on the Tanner graph
SPA decoding on the Tanner graph x,(i) q j,l = P(v l = x check sums A l \ {h j } at the ith iteration} x,(i) σ j,l = Σ P(s = 0 v = x,{v : t B(h )\{l}}) q {vt : t B(h j )\{l}} j l t j t B(h j )\{l} j,t
More informationLDPC Codes. Slides originally from I. Land p.1
Slides originally from I. Land p.1 LDPC Codes Definition of LDPC Codes Factor Graphs to use in decoding Decoding for binary erasure channels EXIT charts Soft-Output Decoding Turbo principle applied to
More informationThe extended coset leader weight enumerator
The extended coset leader weight enumerator Relinde Jurrius Ruud Pellikaan Eindhoven University of Technology, The Netherlands Symposium on Information Theory in the Benelux, 2009 1/14 Outline Codes, weights
More informationError-correcting Pairs for a Public-key Cryptosystem
Error-correcting Pairs for a Public-key Cryptosystem Ruud Pellikaan g.r.pellikaan@tue.nl joint work with Irene Márquez-Corbella Code-based Cryptography Workshop 2012 Lyngby, 9 May 2012 Introduction and
More informationMATH3302 Coding Theory Problem Set The following ISBN was received with a smudge. What is the missing digit? x9139 9
Problem Set 1 These questions are based on the material in Section 1: Introduction to coding theory. You do not need to submit your answers to any of these questions. 1. The following ISBN was received
More informationCharacter Polynomials
Character Polynomials Problem From Stanley s Positivity Problems in Algebraic Combinatorics Problem : Give a combinatorial interpretation of the row sums of the character table for S n (combinatorial proof
More informationSolutions to problems from Chapter 3
Solutions to problems from Chapter 3 Manjunatha. P manjup.jnnce@gmail.com Professor Dept. of ECE J.N.N. College of Engineering, Shimoga February 28, 2016 For a systematic (7,4) linear block code, the parity
More informationA 2-error Correcting Code
A 2-error Correcting Code Basic Idea We will now try to generalize the idea used in Hamming decoding to obtain a linear code that is 2-error correcting. In the Hamming decoding scheme, the parity check
More informationSolving LPN Using Covering Codes
Solving LPN Using Covering Codes Qian Guo 1,2 Thomas Johansson 1 Carl Löndahl 1 1 Dept of Electrical and Information Technology, Lund University 2 School of Computer Science, Fudan University ASIACRYPT
More informationMATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups.
MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups. Binary codes Let us assume that a message to be transmitted is in binary form. That is, it is a word in the alphabet
More informationElementary Matrices. MATH 322, Linear Algebra I. J. Robert Buchanan. Spring Department of Mathematics
Elementary Matrices MATH 322, Linear Algebra I J. Robert Buchanan Department of Mathematics Spring 2015 Outline Today s discussion will focus on: elementary matrices and their properties, using elementary
More informationCommunications II Lecture 9: Error Correction Coding. Professor Kin K. Leung EEE and Computing Departments Imperial College London Copyright reserved
Communications II Lecture 9: Error Correction Coding Professor Kin K. Leung EEE and Computing Departments Imperial College London Copyright reserved Outline Introduction Linear block codes Decoding Hamming
More informationVulnerabilities of McEliece in the World of Escher
Vulnerabilities of McEliece in the World of Escher Dustin Moody and Ray Perlner National Institute of Standards and Technology, Gaithersburg, Maryland, USA dustin.moody@nist.gov, ray.perlner@nist.gov Abstract.
More informationQuasi-cyclic Low Density Parity Check codes with high girth
Quasi-cyclic Low Density Parity Check codes with high girth, a work with Marta Rossi, Richard Bresnan, Massimilliano Sala Summer Doctoral School 2009 Groebner bases, Geometric codes and Order Domains Dept
More informationStructural Cryptanalysis of SASAS
tructural Cryptanalysis of AA Alex Biryukov and Adi hamir Computer cience department The Weizmann Institute Rehovot 76100, Israel. Abstract. In this paper we consider the security of block ciphers which
More informationMATH3302. Coding and Cryptography. Coding Theory
MATH3302 Coding and Cryptography Coding Theory 2010 Contents 1 Introduction to coding theory 2 1.1 Introduction.......................................... 2 1.2 Basic definitions and assumptions..............................
More informationLecture 4: Linear Codes. Copyright G. Caire 88
Lecture 4: Linear Codes Copyright G. Caire 88 Linear codes over F q We let X = F q for some prime power q. Most important case: q =2(binary codes). Without loss of generality, we may represent the information
More informationLecture 3: Error Correcting Codes
CS 880: Pseudorandomness and Derandomization 1/30/2013 Lecture 3: Error Correcting Codes Instructors: Holger Dell and Dieter van Melkebeek Scribe: Xi Wu In this lecture we review some background on error
More informationSYND: a Fast Code-Based Stream Cipher with a Security Reduction
SYND: a Fast Code-Based Stream Cipher with a Security Reduction Philippe Gaborit XLIM-DMI, Université de Limoges 13 av. Albert Thomas 87000, Limoges, France gaborit@unilim.fr Cedric Lauradoux INRIA Rocquencourt,
More informationBinary Linear Codes G = = [ I 3 B ] , G 4 = None of these matrices are in standard form. Note that the matrix 1 0 0
Coding Theory Massoud Malek Binary Linear Codes Generator and Parity-Check Matrices. A subset C of IK n is called a linear code, if C is a subspace of IK n (i.e., C is closed under addition). A linear
More informationLecture Introduction. 2 Linear codes. CS CTT Current Topics in Theoretical CS Oct 4, 2012
CS 59000 CTT Current Topics in Theoretical CS Oct 4, 01 Lecturer: Elena Grigorescu Lecture 14 Scribe: Selvakumaran Vadivelmurugan 1 Introduction We introduced error-correcting codes and linear codes in
More informationMcEliece in the world of Escher
McEliece in the world of Escher Danilo Gligoroski 1 and Simona Samardjiska 1,2 and Håkon Jacobsen 1 and Sergey Bezzateev 3 1 Department of Telematics, Norwegian University of Science and Technology (NTNU),
More informationProof: Let the check matrix be
Review/Outline Recall: Looking for good codes High info rate vs. high min distance Want simple description, too Linear, even cyclic, plausible Gilbert-Varshamov bound for linear codes Check matrix criterion
More informationCapacity of a channel Shannon s second theorem. Information Theory 1/33
Capacity of a channel Shannon s second theorem Information Theory 1/33 Outline 1. Memoryless channels, examples ; 2. Capacity ; 3. Symmetric channels ; 4. Channel Coding ; 5. Shannon s second theorem,
More informationLecture 12: November 6, 2017
Information and Coding Theory Autumn 017 Lecturer: Madhur Tulsiani Lecture 1: November 6, 017 Recall: We were looking at codes of the form C : F k p F n p, where p is prime, k is the message length, and
More informationAlgebraic Geometry Codes. Shelly Manber. Linear Codes. Algebraic Geometry Codes. Example: Hermitian. Shelly Manber. Codes. Decoding.
Linear December 2, 2011 References Linear Main Source: Stichtenoth, Henning. Function Fields and. Springer, 2009. Other Sources: Høholdt, Lint and Pellikaan. geometry codes. Handbook of Coding Theory,
More informationLow-density parity-check (LDPC) codes
Low-density parity-check (LDPC) codes Performance similar to turbo codes Do not require long interleaver to achieve good performance Better block error performance Error floor occurs at lower BER Decoding
More informationMATH Examination for the Module MATH-3152 (May 2009) Coding Theory. Time allowed: 2 hours. S = q
MATH-315201 This question paper consists of 6 printed pages, each of which is identified by the reference MATH-3152 Only approved basic scientific calculators may be used. c UNIVERSITY OF LEEDS Examination
More informationPROBABILITY VITTORIA SILVESTRI
PROBABILITY VITTORIA SILVESTRI Contents Preface. Introduction 2 2. Combinatorial analysis 5 3. Stirling s formula 8 4. Properties of Probability measures Preface These lecture notes are for the course
More informationPROBABILITY. Contents Preface 1 1. Introduction 2 2. Combinatorial analysis 5 3. Stirling s formula 8. Preface
PROBABILITY VITTORIA SILVESTRI Contents Preface. Introduction. Combinatorial analysis 5 3. Stirling s formula 8 Preface These lecture notes are for the course Probability IA, given in Lent 09 at the University
More informationHigh-speed cryptography, part 3: more cryptosystems. Daniel J. Bernstein University of Illinois at Chicago & Technische Universiteit Eindhoven
High-speed cryptography, part 3: more cryptosystems Daniel J. Bernstein University of Illinois at Chicago & Technische Universiteit Eindhoven Cryptographers Working systems Cryptanalytic algorithm designers
More informationAnswers and Solutions to (Even Numbered) Suggested Exercises in Sections of Grimaldi s Discrete and Combinatorial Mathematics
Answers and Solutions to (Even Numbered) Suggested Exercises in Sections 6.5-6.9 of Grimaldi s Discrete and Combinatorial Mathematics Section 6.5 6.5.2. a. r = = + = c + e. So the error pattern is e =.
More informationx n k m(x) ) Codewords can be characterized by (and errors detected by): c(x) mod g(x) = 0 c(x)h(x) = 0 mod (x n 1)
Cyclic codes: review EE 387, Notes 15, Handout #26 A cyclic code is a LBC such that every cyclic shift of a codeword is a codeword. A cyclic code has generator polynomial g(x) that is a divisor of every
More informationProbabilistic Systems Analysis Spring 2018 Lecture 6. Random Variables: Probability Mass Function and Expectation
EE 178 Probabilistic Systems Analysis Spring 2018 Lecture 6 Random Variables: Probability Mass Function and Expectation Probability Mass Function When we introduce the basic probability model in Note 1,
More informationSolutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16
Solutions of Exam Coding Theory (2MMC30), 23 June 2016 (1.a) Consider the 4 4 matrices as words in F 16 2, the binary vector space of dimension 16. C is the code of all binary 4 4 matrices such that the
More information6.895 PCP and Hardness of Approximation MIT, Fall Lecture 3: Coding Theory
6895 PCP and Hardness of Approximation MIT, Fall 2010 Lecture 3: Coding Theory Lecturer: Dana Moshkovitz Scribe: Michael Forbes and Dana Moshkovitz 1 Motivation In the course we will make heavy use of
More informationZigzag Codes: MDS Array Codes with Optimal Rebuilding
1 Zigzag Codes: MDS Array Codes with Optimal Rebuilding Itzhak Tamo, Zhiying Wang, and Jehoshua Bruck Electrical Engineering Department, California Institute of Technology, Pasadena, CA 91125, USA Electrical
More informationLecture 19: Elias-Bassalygo Bound
Error Correcting Codes: Combinatorics, Algorithms and Applications (Fall 2007) Lecturer: Atri Rudra Lecture 19: Elias-Bassalygo Bound October 10, 2007 Scribe: Michael Pfetsch & Atri Rudra In the last lecture,
More informationChapter 7. Error Control Coding. 7.1 Historical background. Mikael Olofsson 2005
Chapter 7 Error Control Coding Mikael Olofsson 2005 We have seen in Chapters 4 through 6 how digital modulation can be used to control error probabilities. This gives us a digital channel that in each
More informationGuess & Check Codes for Deletions, Insertions, and Synchronization
Guess & Check Codes for Deletions, Insertions, and Synchronization Serge Kas Hanna, Salim El Rouayheb ECE Department, Rutgers University sergekhanna@rutgersedu, salimelrouayheb@rutgersedu arxiv:759569v3
More informationMath 3121, A Summary of Sections 0,1,2,4,5,6,7,8,9
Math 3121, A Summary of Sections 0,1,2,4,5,6,7,8,9 Section 0. Sets and Relations Subset of a set, B A, B A (Definition 0.1). Cartesian product of sets A B ( Defintion 0.4). Relation (Defintion 0.7). Function,
More informationError Correcting Codes: Combinatorics, Algorithms and Applications Spring Homework Due Monday March 23, 2009 in class
Error Correcting Codes: Combinatorics, Algorithms and Applications Spring 2009 Homework Due Monday March 23, 2009 in class You can collaborate in groups of up to 3. However, the write-ups must be done
More informationMATH32031: Coding Theory Part 15: Summary
MATH32031: Coding Theory Part 15: Summary 1 The initial problem The main goal of coding theory is to develop techniques which permit the detection of errors in the transmission of information and, if necessary,
More informationCOMPSCI 650 Applied Information Theory Apr 5, Lecture 18. Instructor: Arya Mazumdar Scribe: Hamed Zamani, Hadi Zolfaghari, Fatemeh Rezaei
COMPSCI 650 Applied Information Theory Apr 5, 2016 Lecture 18 Instructor: Arya Mazumdar Scribe: Hamed Zamani, Hadi Zolfaghari, Fatemeh Rezaei 1 Correcting Errors in Linear Codes Suppose someone is to send
More informationImproving the efficiency of Generalized Birthday Attacks against certain structured cryptosystems
Improving the efficiency of Generalized Birthday Attacks against certain structured cryptosystems Robert Niebuhr 1, Pierre-Louis Cayrel 2, and Johannes Buchmann 1,2 1 Technische Universität Darmstadt Fachbereich
More information6.1.1 What is channel coding and why do we use it?
Chapter 6 Channel Coding 6.1 Introduction 6.1.1 What is channel coding and why do we use it? Channel coding is the art of adding redundancy to a message in order to make it more robust against noise. It
More informationCoding problems for memory and storage applications
.. Coding problems for memory and storage applications Alexander Barg University of Maryland January 27, 2015 A. Barg (UMD) Coding for memory and storage January 27, 2015 1 / 73 Codes with locality Introduction:
More informationLatin Squares and Their Applications
Latin Squares and Their Applications Jason Tang Mentor: Wendy Baratta October 27, 2009 1 Introduction Despite Latin Squares being a relatively unknown aspect of mathematics, there are many interesting
More information* 8 Groups, with Appendix containing Rings and Fields.
* 8 Groups, with Appendix containing Rings and Fields Binary Operations Definition We say that is a binary operation on a set S if, and only if, a, b, a b S Implicit in this definition is the idea that
More informationThe uniqueness problem for chromatic symmetric functions of trees
The uniqueness problem for chromatic symmetric functions of trees Jeremy L. Martin (University of Kansas) AMS Western Sectional Meeting UNLV, April 18, 2015 Colorings and the Chromatic Polynomial Throughout,
More informationTHIS paper is aimed at designing efficient decoding algorithms
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 45, NO. 7, NOVEMBER 1999 2333 Sort-and-Match Algorithm for Soft-Decision Decoding Ilya Dumer, Member, IEEE Abstract Let a q-ary linear (n; k)-code C be used
More informationNotes on Alekhnovich s cryptosystems
Notes on Alekhnovich s cryptosystems Gilles Zémor November 2016 Decisional Decoding Hypothesis with parameter t. Let 0 < R 1 < R 2 < 1. There is no polynomial-time decoding algorithm A such that: Given
More informationIDEALS DEFINING UNIONS OF MATRIX SCHUBERT VARIETIES
IDEALS DEFINING UNIONS OF MATRIX SCHUBERT VARIETIES A. S. BERTIGER Abstract. This note computes a Gröbner basis for the ideal defining a union of matrix Schubert varieties. Moreover, the theorem presented
More informationCoding Theory: Linear-Error Correcting Codes Anna Dovzhik Math 420: Advanced Linear Algebra Spring 2014
Anna Dovzhik 1 Coding Theory: Linear-Error Correcting Codes Anna Dovzhik Math 420: Advanced Linear Algebra Spring 2014 Sharing data across channels, such as satellite, television, or compact disc, often
More informationOn the Berlekamp/Massey Algorithm and Counting Singular Hankel Matrices over a Finite Field
On the Berlekamp/Massey Algorithm and Counting Singular Hankel Matrices over a Finite Field Matthew T Comer Dept of Mathematics, North Carolina State University Raleigh, North Carolina, 27695-8205 USA
More informationIBM Research Report. Construction of PMDS and SD Codes Extending RAID 5
RJ10504 (ALM1303-010) March 15, 2013 Computer Science IBM Research Report Construction of PMDS and SD Codes Extending RAID 5 Mario Blaum IBM Research Division Almaden Research Center 650 Harry Road San
More informationTHE MAXIMAL SUBGROUPS AND THE COMPLEXITY OF THE FLOW SEMIGROUP OF FINITE (DI)GRAPHS
THE MAXIMAL SUBGROUPS AND THE COMPLEXITY OF THE FLOW SEMIGROUP OF FINITE (DI)GRAPHS GÁBOR HORVÁTH, CHRYSTOPHER L. NEHANIV, AND KÁROLY PODOSKI Dedicated to John Rhodes on the occasion of his 80th birthday.
More informationMATH Topics in Applied Mathematics Lecture 2-6: Isomorphism. Linear independence (revisited).
MATH 311-504 Topics in Applied Mathematics Lecture 2-6: Isomorphism. Linear independence (revisited). Definition. A mapping f : V 1 V 2 is one-to-one if it maps different elements from V 1 to different
More informationMath 1B03/1ZC3 - Tutorial 2. Jan. 21st/24th, 2014
Math 1B03/1ZC3 - Tutorial 2 Jan. 21st/24th, 2014 Tutorial Info: Website: http://ms.mcmaster.ca/ dedieula. Math Help Centre: Wednesdays 2:30-5:30pm. Email: dedieula@math.mcmaster.ca. Does the Commutative
More informationBasic counting techniques. Periklis A. Papakonstantinou Rutgers Business School
Basic counting techniques Periklis A. Papakonstantinou Rutgers Business School i LECTURE NOTES IN Elementary counting methods Periklis A. Papakonstantinou MSIS, Rutgers Business School ALL RIGHTS RESERVED
More informationLatin squares: Equivalents and equivalence
Latin squares: Equivalents and equivalence 1 Introduction This essay describes some mathematical structures equivalent to Latin squares and some notions of equivalence of such structures. According to
More informationAttacks in code based cryptography: a survey, new results and open problems
Attacks in code based cryptography: a survey, new results and open problems J.-P. Tillich Inria, team-project SECRET April 9, 2018 1. Code based cryptography introduction Difficult problem in coding theory
More informationLinear Block Codes. Saravanan Vijayakumaran Department of Electrical Engineering Indian Institute of Technology Bombay
1 / 26 Linear Block Codes Saravanan Vijayakumaran sarva@ee.iitb.ac.in Department of Electrical Engineering Indian Institute of Technology Bombay July 28, 2014 Binary Block Codes 3 / 26 Let F 2 be the set
More information} has dimension = k rank A > 0 over F. For any vector b!
FINAL EXAM Math 115B, UCSB, Winter 2009 - SOLUTIONS Due in SH6518 or as an email attachment at 12:00pm, March 16, 2009. You are to work on your own, and may only consult your notes, text and the class
More informationFast correlation attacks on certain stream ciphers
FSE 2011, February 14-16, Lyngby, Denmark Fast correlation attacks on certain stream ciphers Willi Meier FHNW Switzerland 1 Overview A decoding problem LFSR-based stream ciphers Correlation attacks Fast
More informationICT12 8. Linear codes. The Gilbert-Varshamov lower bound and the MacWilliams identities SXD
1 ICT12 8. Linear codes. The Gilbert-Varshamov lower bound and the MacWilliams identities 19.10.2012 SXD 8.1. The Gilbert Varshamov existence condition 8.2. The MacWilliams identities 2 8.1. The Gilbert
More informationA distinguisher for high-rate McEliece Cryptosystems
A distinguisher for high-rate McEliece Cryptosystems JC Faugère (INRIA, SALSA project), A Otmani (Université Caen- INRIA, SECRET project), L Perret (INRIA, SALSA project), J-P Tillich (INRIA, SECRET project)
More informationImproved Generic Algorithms for Hard Knapsacks
Improved Generic Algorithms for Hard Knapsacks Anja Becker 1,, Jean-Sébastien Coron 3, and Antoine Joux 1,2 1 University of Versailles Saint-Quentin-en-Yvelines 2 DGA 3 University of Luxembourg Abstract.
More informationMain Goals. The Computably Enumerable Sets. The Computably Enumerable Sets, Creative Sets
Main Goals The Computably Enumerable Sets A Tutorial Peter Cholak University of Notre Dame Department of Mathematics Peter.Cholak.1@nd.edu http://www.nd.edu/~cholak/papers/ http://www.nd.edu/~cholak/papers/cholakkobe.pdf
More informationGenerator Matrix. Theorem 6: If the generator polynomial g(x) of C has degree n-k then C is an [n,k]-cyclic code. If g(x) = a 0. a 1 a n k 1.
Cyclic Codes II Generator Matrix We would now like to consider how the ideas we have previously discussed for linear codes are interpreted in this polynomial version of cyclic codes. Theorem 6: If the
More informationAttacking and defending the McEliece cryptosystem
Attacking and defending the McEliece cryptosystem (Joint work with Daniel J. Bernstein and Tanja Lange) Christiane Peters Technische Universiteit Eindhoven PQCrypto 2nd Workshop on Postquantum Cryptography
More informationLecture 14: Cryptographic Hash Functions
CSE 599b: Cryptography (Winter 2006) Lecture 14: Cryptographic Hash Functions 17 February 2006 Lecturer: Paul Beame Scribe: Paul Beame 1 Hash Function Properties A hash function family H = {H K } K K is
More informationCHAPTER 4. βs as a semigroup
CHAPTER 4 βs as a semigroup In this chapter, we assume that (S, ) is an arbitrary semigroup, equipped with the discrete topology. As explained in Chapter 3, we will consider S as a (dense ) subset of its
More informationReport on PIR with Low Storage Overhead
Report on PIR with Low Storage Overhead Ehsan Ebrahimi Targhi University of Tartu December 15, 2015 Abstract Private information retrieval (PIR) protocol, introduced in 1995 by Chor, Goldreich, Kushilevitz
More informationERROR CORRECTING CODES
ERROR CORRECTING CODES To send a message of 0 s and 1 s from my computer on Earth to Mr. Spock s computer on the planet Vulcan we use codes which include redundancy to correct errors. n q Definition. A
More informationCombinatorial Enumeration. Jason Z. Gao Carleton University, Ottawa, Canada
Combinatorial Enumeration Jason Z. Gao Carleton University, Ottawa, Canada Counting Combinatorial Structures We are interested in counting combinatorial (discrete) structures of a given size. For example,
More informationThings we can already do with matrices. Unit II - Matrix arithmetic. Defining the matrix product. Things that fail in matrix arithmetic
Unit II - Matrix arithmetic matrix multiplication matrix inverses elementary matrices finding the inverse of a matrix determinants Unit II - Matrix arithmetic 1 Things we can already do with matrices equality
More informationA Proposed Quantum Low Density Parity Check Code
arxiv:quant-ph/83v 29 Aug 2 A Proposed Quantum Low Density Parity Check Code Michael S. Postol National Security Agency 98 Savage Road Fort Meade, MD 2755 Email: msposto@zombie.ncsc.mil June 3, 28 2 LOW
More information: Error Correcting Codes. October 2017 Lecture 1
03683072: Error Correcting Codes. October 2017 Lecture 1 First Definitions and Basic Codes Amnon Ta-Shma and Dean Doron 1 Error Correcting Codes Basics Definition 1. An (n, K, d) q code is a subset of
More informationBounds on Birthday Attack Times
Bounds on Birthday Attack Times Michael J Wiener 20 Hennepin St, Nepean, Ontario, Canada K2J 3Z4 michaelwiener at sympaticoca 2005 September 8 Abstract We analyze a generic birthday attack where distinct
More informationAn introduction to Costas arrays
UCD CASL/Electronic & Electrical Engineering University College Dublin 03 November 2010 Example and definition [Costas (1984)] Let [n] = {1,..., n}, f : [n] [n] (order n); f is Costas (bijection) iff i,
More informationErrors, Eavesdroppers, and Enormous Matrices
Errors, Eavesdroppers, and Enormous Matrices Jessalyn Bolkema September 1, 2016 University of Nebraska - Lincoln Keep it secret, keep it safe Public Key Cryptography The idea: We want a one-way lock so,
More informationSoft-Decision Decoding Using Punctured Codes
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 47, NO 1, JANUARY 2001 59 Soft-Decision Decoding Using Punctured Codes Ilya Dumer, Member, IEEE Abstract Let a -ary linear ( )-code be used over a memoryless
More informationA Public Key Encryption Scheme Based on the Polynomial Reconstruction Problem
A Public Key Encryption Scheme Based on the Polynomial Reconstruction Problem Daniel Augot and Matthieu Finiasz INRIA, Domaine de Voluceau F-78153 Le Chesnay CEDEX Abstract. The Polynomial Reconstruction
More informationCHAPMAN & HALL/CRC CRYPTOGRAPHY AND NETWORK SECURITY ALGORITHMIC CR YPTAN ALY51S. Ant nine J aux
CHAPMAN & HALL/CRC CRYPTOGRAPHY AND NETWORK SECURITY ALGORITHMIC CR YPTAN ALY51S Ant nine J aux (g) CRC Press Taylor 8* Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor &
More information