Research output: Contribution to Journal/Magazine › Journal article › peer-review
Research output: Contribution to Journal/Magazine › Journal article › peer-review
}
TY - JOUR
T1 - Reducible Rank Codes and Their Applications to Cryptography.
AU - Gabidulin, E. M.
AU - Ourivski, A. V.
AU - Honary, Bahram
AU - Ammar, B.
N1 - This collaborative work with the Moscow Institute of Physics and Technology, Russia, introduces a new class of Combined Coding and Encryption with application to the Public Key Crypto System with short Key size and low Complexity. This novel idea will play a big role in future wireless communication systems, (for example TETRA V2, this can be verified by Dr M. Noori, the Chairman of WG4-TETRA for ETSI). RAE_import_type : Journal article RAE_uoa_type : Electrical and Electronic Engineering
PY - 2004/1/1
Y1 - 2004/1/1
N2 - We present a new family of so-called reducible rank codes which are a generalization of rank product codes . This family includes maximal rank distance (MRD) codes for lengths n>N in the field F/sub N/. We give methods for encoding and decoding reducible rank codes. A public key cryptosystem based on these codes and on the idea of a column scrambler is proposed. The column scrambler "mixes" columns of a generator (parity-check) matrix of a code. It makes the system more resistant to structural attacks such as Gibson's attacks. Possible attacks on the system are thoroughly studied. The system is found to be secure against known attacks for public keys of about 16 kbits and greater.
AB - We present a new family of so-called reducible rank codes which are a generalization of rank product codes . This family includes maximal rank distance (MRD) codes for lengths n>N in the field F/sub N/. We give methods for encoding and decoding reducible rank codes. A public key cryptosystem based on these codes and on the idea of a column scrambler is proposed. The column scrambler "mixes" columns of a generator (parity-check) matrix of a code. It makes the system more resistant to structural attacks such as Gibson's attacks. Possible attacks on the system are thoroughly studied. The system is found to be secure against known attacks for public keys of about 16 kbits and greater.
KW - DCS-publications-id
KW - art-724
KW - DCS-publications-credits
KW - coding
KW - DCS-publications-personnel-id
KW - 1
KW - 28
U2 - 10.1109/TIT.2003.820038
DO - 10.1109/TIT.2003.820038
M3 - Journal article
VL - 49
SP - 3289
EP - 3293
JO - IEEE Transactions on Information Theory
JF - IEEE Transactions on Information Theory
SN - 0018-9448
IS - 12
ER -