Protection of Information from Imitation on the Basis of Crypt-Code Structures

09/07/2018
by   Dmitry Samoylenko, et al.
0

A system is offered for imitation resistant transmitting of encrypted information in wireless communication networks on the basis of redundant residue polynomial codes. The particular feature of this solution is complexing of methods for cryptographic protection of information and multi-character codes that correct errors, and the resulting structures (crypt-code structures) ensure stable functioning of the information protection system in the conditions simulating the activity of the adversary. Such approach also makes it possible to create multi-dimensional "crypt-code structures" to conduct multi-level monitoring and veracious restoration of distorted encrypted information. The use of authentication codes as a means of one of the levels to detect erroneous blocks in the ciphertext in combination with the redundant residue polynomial codes of deductions makes it possible to decrease the introduced redundancy and find distorted blocks of the ciphertext to restore them.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/04/2022

Multi-dimensional Constacyclic Codes of Arbitrary Length over Finite Fields

Multi-dimensional cyclic code is a natural generalization of cyclic code...
research
01/21/2019

A construction of UD k-ary multi-user codes from (2^m(k-1)+1)-ary codes for MAAC

In this paper, we proposed a construction of a UD k-ary T-user coding sc...
research
01/16/2019

Deep Holes of Projective Reed-Solomon Codes

Projective Reed-Solomon (PRS) codes are Reed-Solomon codes of the maximu...
research
02/16/2019

Compiled Obfuscation for Data Structures in Encrypted Computing

Encrypted computing is an emerging technology based on a processor that ...
research
12/05/2015

Maximum Entropy Binary Encoding for Face Template Protection

In this paper we present a framework for secure identification using dee...
research
05/06/2019

Lifted Multiplicity Codes

Lifted Reed Solomon Codes (Guo, Kopparty, Sudan 2013) were introduced in...

Please sign up or login with your details

Forgot password? Click here to reset