-
A tiny public key scheme based on Niederreiter Cryptosystem
Authors:
Arash Khalvan,
Amirhossein Zali,
Mahmoud Ahmadian Attari
Abstract:
Due to the weakness of public key cryptosystems encounter of quantum computers, the need to provide a solution was emerged. The McEliece cryptosystem and its security equivalent, the Niederreiter cryptosystem, which are based on Goppa codes, are one of the solutions, but they are not practical due to their long key length. Several prior attempts to decrease the length of the public key in code-bas…
▽ More
Due to the weakness of public key cryptosystems encounter of quantum computers, the need to provide a solution was emerged. The McEliece cryptosystem and its security equivalent, the Niederreiter cryptosystem, which are based on Goppa codes, are one of the solutions, but they are not practical due to their long key length. Several prior attempts to decrease the length of the public key in code-based cryptosystems involved substituting the Goppa code family with other code families. However, these efforts ultimately proved to be insecure. In 2016, the National Institute of Standards and Technology (NIST) called for proposals from around the world to standardize post-quantum cryptography (PQC) schemes to solve this issue. After receiving of various proposals in this field, the Classic McEliece cryptosystem, as well as the Hamming Quasi-Cyclic (HQC) and Bit Flip** Key Encapsulation (BIKE), chosen as code-based encryption category cryptosystems that successfully progressed to the final stage. This article proposes a method for develo** a code-based public key cryptography scheme that is both simple and implementable. The proposed scheme has a much shorter public key length compared to the NIST finalist cryptosystems. The key length for the primary parameters of the McEliece cryptosystem (n=1024, k=524, t=50) ranges from 18 to 500 bits. The security of this system is at least as strong as the security of the Niederreiter cryptosystem. The proposed structure is based on the Niederreiter cryptosystem which exhibits a set of highly advantageous properties that make it a suitable candidate for implementation in all extant systems.
△ Less
Submitted 10 October, 2023;
originally announced October 2023.
-
Novel LDPC Decoder via MLP Neural Networks
Authors:
Alireza Karami,
Mahmoud Ahmadian Attari
Abstract:
In this paper, a new method for decoding Low Density Parity Check (LDPC) codes, based on Multi-Layer Perceptron (MLP) neural networks is proposed. Due to the fact that in neural networks all procedures are processed in parallel, this method can be considered as a viable alternative to Message Passing Algorithm (MPA), with high computational complexity. Our proposed algorithm runs with soft criteri…
▽ More
In this paper, a new method for decoding Low Density Parity Check (LDPC) codes, based on Multi-Layer Perceptron (MLP) neural networks is proposed. Due to the fact that in neural networks all procedures are processed in parallel, this method can be considered as a viable alternative to Message Passing Algorithm (MPA), with high computational complexity. Our proposed algorithm runs with soft criterion and concurrently does not use probabilistic quantities to decide what the estimated codeword is. Although the neural decoder performance is close to the error performance of Sum Product Algorithm (SPA), it is comparatively less complex. Therefore, the proposed decoder emerges as a new infrastructure for decoding LDPC codes.
△ Less
Submitted 12 November, 2014;
originally announced November 2014.
-
Parity Check Matrix Recognition from Noisy Codewords
Authors:
Yasser Karimian,
Saeideh Ziapour,
Mahmoud Ahmadian Attari
Abstract:
We study recovering parity check relations for an unknown code from intercepted bitstream received from Binary Symmetric Channel in this paper. An iterative column elimination algorithm is introduced which attempts to eliminate parity bits in codewords of noisy data. This algorithm is very practical due to low complexity and use of XOR operator. Since, the computational complexity is low, searchin…
▽ More
We study recovering parity check relations for an unknown code from intercepted bitstream received from Binary Symmetric Channel in this paper. An iterative column elimination algorithm is introduced which attempts to eliminate parity bits in codewords of noisy data. This algorithm is very practical due to low complexity and use of XOR operator. Since, the computational complexity is low, searching for the length of code and synchronization is possible. Furthermore, the Hamming weight of the parity check words are only used in threshold computation and unlike other algorithms, they have negligible effect in the proposed algorithm. Eventually, experimental results are presented and estimations for the maximum noise level allowed for recovering the words of the parity check matrix are investigated.
△ Less
Submitted 21 May, 2012;
originally announced May 2012.
-
Optimal Rate and Maximum Erasure Probability LDPC Codes in Binary Erasure Channel
Authors:
H. Tavakoli,
M. Ahmadian Attari,
M. R. Peyghami
Abstract:
In this paper, we present a novel way for solving the main problem of designing the capacity approaching irregular low-density parity-check (LDPC) code ensemble over binary erasure channel (BEC). The proposed method is much simpler, faster, accurate and practical than other methods. Our method does not use any relaxation or any approximate solution like previous works. Our method works and finds o…
▽ More
In this paper, we present a novel way for solving the main problem of designing the capacity approaching irregular low-density parity-check (LDPC) code ensemble over binary erasure channel (BEC). The proposed method is much simpler, faster, accurate and practical than other methods. Our method does not use any relaxation or any approximate solution like previous works. Our method works and finds optimal answer for any given check node degree distribution. The proposed method was implemented and it works well in practice with polynomial time complexity. As a result, we represent some degree distributions that their rates are close to the capacity with maximum erasure probability and maximum code rate.
△ Less
Submitted 27 February, 2021; v1 submitted 20 March, 2012;
originally announced March 2012.
-
Achievable Rates for a Two-Relay Network with Relays-Transmitter Feedbacks
Authors:
Mohammad Ali Tebbi,
Mahtab Mirmohseni,
Mahmoud Ahmadian Attari,
Mohammad Reza Aref
Abstract:
We consider a relay network with two relays and two feedback links from the relays to the sender. To obtain the achievability results, we use the compress-and-forward and the decode-and-forward strategies to superimpose facility and cooperation analogue to what proposed by Cover and El Gamal for a relay channel. In addition to random binning, we use deterministic binning to perform restricted deco…
▽ More
We consider a relay network with two relays and two feedback links from the relays to the sender. To obtain the achievability results, we use the compress-and-forward and the decode-and-forward strategies to superimpose facility and cooperation analogue to what proposed by Cover and El Gamal for a relay channel. In addition to random binning, we use deterministic binning to perform restricted decoding. We show how to use the feedback links for cooperation between the sender and the relays to transmit the information which is compressed in the sender and the relays.
△ Less
Submitted 10 November, 2011;
originally announced November 2011.
-
An Achievable Rate Region for a Two-Relay Network with Receiver-Transmitter Feedback
Authors:
Mohammad Ali Tebbi,
Mahtab Mirmohseni,
Mahmoud Ahmadian Attari,
Mohammad Reza Aref
Abstract:
We consider a relay network with two relays and a feedback link from the receiver to the sender. To obtain the achievability result, we use compress-and-forward and random binning techniques combined with deterministic binning and restricted decoding. Moreover, we use joint decoding technique to decode the relays' compressed information to achieve a higher rate in the receiver.
We consider a relay network with two relays and a feedback link from the receiver to the sender. To obtain the achievability result, we use compress-and-forward and random binning techniques combined with deterministic binning and restricted decoding. Moreover, we use joint decoding technique to decode the relays' compressed information to achieve a higher rate in the receiver.
△ Less
Submitted 7 September, 2011; v1 submitted 6 September, 2011;
originally announced September 2011.
-
Optimal Rate for Irregular LDPC Codes in Binary Erasure Channel
Authors:
H. Tavakoli,
M. Ahmadian Attari,
M. Reza Peyghami
Abstract:
In this paper, we introduce a new practical and general method for solving the main problem of designing the capacity approaching, optimal rate, irregular low-density parity-check (LDPC) code ensemble over binary erasure channel (BEC). Compared to some new researches, which are based on application of asymptotic analysis tools out of optimization process, the proposed method is much simpler, faste…
▽ More
In this paper, we introduce a new practical and general method for solving the main problem of designing the capacity approaching, optimal rate, irregular low-density parity-check (LDPC) code ensemble over binary erasure channel (BEC). Compared to some new researches, which are based on application of asymptotic analysis tools out of optimization process, the proposed method is much simpler, faster, accurate and practical. Because of not using any relaxation or any approximate solution like previous works, the found answer with this method is optimal. We can construct optimal variable node degree distribution for any given binary erasure rate, ε, and any check node degree distribution. The presented method is implemented and works well in practice. The time complexity of this method is of polynomial order. As a result, we obtain some degree distribution which their rates are close to the capacity.
△ Less
Submitted 7 August, 2011;
originally announced August 2011.