20 research outputs found

    A construction of MDS array codes

    Get PDF
    In this paper a new construction of MDS array codes is introduced. In order to obtain a code with this property, the parity-check matrix is constructed just using a superregular matrix of blocks composed of powers of the companion matrix of a primitive polynomial. Also a decoding algorithm for these codes is introduced.The work of the first and the second authors was partially supported by Spanish grant MTM2011-24858 of the Ministerio de Economía y Competitividad of the Gobierno de España. The work of first author was also partially supported by a grant for research students from the Generalitat Valenciana with reference BFPI/2008/138. The work of the third author was partially supported by the research project UMH-Bancaja with reference IPZS01

    Interleaving Shifted Versions of a PN-Sequence

    Get PDF
    The output sequence of the shrinking generator can be considered as an interleaving of determined shifted versions of a single PN -sequence. In this paper, we present a study of the interleaving of a PN-sequence and shifted versions of itself. We analyze some important cryptographic properties as the period and the linear complexity in terms of the shifts. Furthermore, we determine the total number of the interleaving sequences that achieve each possible value of the linear complexity.This research is partially supported by Ministerio de Economía, Industria y Competitividad (MINECO), Agencia Estatal de Investigación (AEI), and Fondo Europeo de Desarrollo Regional (FEDER, UE) under project COPCIS, reference TIN2017-84844-C2-1-R. It is also supported by Comunidad de Madrid (Spain) under project CYNAMON (P2018/TCS-4566), co-funded by FSE and European Union FEDER funds. Finally, the third author is partially supported by Spanish grant VIGROB-287 of the Universitat d’Alacant

    Computational Analysis of Interleaving PN-Sequences with Different Polynomials

    Get PDF
    Binary PN-sequences generated by LFSRs exhibit good statistical properties; however, due to their intrinsic linearity, they are not suitable for cryptographic applications. In order to break such a linearity, several approaches can be implemented. For example, one can interleave several PN-sequences to increase the linear complexity. In this work, we present a deep randomness study of the resultant sequences of interleaving binary PN-sequences coming from different characteristic polynomials with the same degree. We analyze the period and the linear complexity, as well as many other important cryptographic properties of such sequences.This work was supported in part by the Spanish State Research Agency (AEI) of the Ministry of Science and Innovation (MICINN), project P2QProMeTe (PID2020-112586RB-I00/AEI/ 10.13039/501100011033). It was also supported by Comunidad de Madrid (Spain) under project CYNAMON (P2018/TCS-4566), co-funded by FSE and European Union FEDER funds. The work of the second author was partially supported by Spanish grant VIGROB-287 of the University of Alicante

    An Efficient Algorithm to Compute the Linear Complexity of Binary Sequences

    Get PDF
    Binary sequences are algebraic structures currently used as security elements in Internet of Things devices, sensor networks, e-commerce, and cryptography. In this work, a contribution to the evaluation of such sequences is introduced. In fact, we present a novel algorithm to compute a fundamental parameter for this kind of structure: the linear complexity, which is related to the predictability (or non-predictability) of the binary sequences. Our algorithm reduced the computation of the linear complexity to just the addition modulo two (XOR logic operation) of distinct terms of the sequence. The performance of this procedure was better than that of other algorithms found in the literature. In addition, the amount of required sequence to perform this computation was more realistic than in the rest of the algorithms analysed. Tables, figures, and numerical results complete the work.This work was supported in part by the Spanish State Research Agency (AEI) of the Ministry of Science and Innovation (MICINN), Project P2QProMeTe (PID2020-112586RB-I00/AEI/10.13039/501100011033), co-funded by the European Regional Development Fund (ERDF, EU). It is also supported by Comunidad de Madrid (Spain) under Project CYNAMON (P2018/TCS-4566), co-funded by FSE and European Union FEDER funds. The work of the second author was partially supported by Spanish Grant VIGROB-287 of the University of Alicante

    A Construction of Bent Functions of n + 2 Variables from a Bent Function of n Variables and Its Cyclic Shifts

    Get PDF
    We present a method to iteratively construct new bent functions of n + 2 variables from a bent function of n variables and its cyclic shift permutations using minterms of n variables and minterms of 2 variables. In addition, we provide the number of bent functions of n + 2 variables that we can obtain by applying the method here presented, and finally we compare this method with a previous one introduced by us in 2008 and with the Rothaus and Maiorana-McFarland constructions.The work of the first author was partially supported by Spanish Grant MTM2011-24858 of the Ministerio de Economía y Competitividad of the Gobierno de España

    On the construction of new bent functions from the max-weight and min-weight functions of old bent functions

    Get PDF
    Given a bent function f (x) of n variables, its max-weight and min-weight functions are introduced as the Boolean functions f + (x) and f − (x) whose supports are the sets {a ∈ Fn2 | w( f ⊕la) = 2n−1+2 n 2 −1} and {a ∈ Fn2 | w( f ⊕la) = 2n−1−2 n 2 −1} respectively, where w( f ⊕ la) denotes the Hamming weight of the Boolean function f (x) ⊕ la(x) and la(x) is the linear function defined by a ∈ Fn2 . f + (x) and f − (x) are proved to be bent functions. Furthermore, combining the 4 minterms of 2 variables with the max-weight or min-weight functions of a 4-tuple ( f0(x), f1(x), f2(x), f3(x)) of bent functions of n variables such that f0(x) ⊕ f1(x) ⊕ f2(x) ⊕ f3(x) = 1, a bent function of n + 2 variables is obtained. A family of 4-tuples of bent functions satisfying the above condition is introduced, and finally, the number of bent functions we can construct using the method introduced in this paper are obtained. Also, our construction is compared with other constructions of bent functions

    The degree of a Boolean function and some algebraic properties of its support

    Get PDF
    In this paper, the support of a Boolean function is used to establish some algebraic properties. These properties allow the degree of a Boolean function to be obtained without having to calculate its algebraic normal form. Furthermore, some algorithms are derived and the average time computed to obtain the degree of some Boolean functions from its support.Partially supported by Spanish grant MTM2011-24858 of the Ministerio de Economía y Competitividad of the Gobierno de España and by the research project UMH-Bancaja with reference IPZS01

    Estrategias Docentes para motivar al alumnado de Matemática Discreta de las titulaciones de Informática

    Get PDF
    Desde el curso 2003-2004, los autores de este trabajo iniciaron un proyecto de redes de investigación en docencia universitaria diseñando una guía docente de la asignatura Matemática Discreta, siguiendo la orientación ECTS [1]. Se planteaban estrategias docentes innovadoras basadas en la integración de las TIC, como actividades on-line y uso de herramientas de software para ayudar a entender la asignatura. El objetivo de este artículo es intentar evaluar la implantación de la metodología planteada, a partir de su puesta en marcha durante el curso 2004-2005, centrándose especialmente en la actitud del alumnado

    Block Toeplitz matrices for burst-correcting convolutional codes

    Get PDF
    In this paper we study a problem in the area of coding theory. In particular, we focus on a class of error-correcting codes called convolutional codes. We characterize convolutional codes that can correct bursts of erasures with the lowest possible delay. This characterization is given in terms of a block Toeplitz matrix with entries in a finite field that is built upon a given generator matrix of the convolutional code. This result allows us to provide a concrete construction of a generator matrix of a convolutional code with entries being only zeros or ones that can recover bursts of erasures with low delay. This construction admits a very simple decoding algorithm and, therefore, simplifies the existing schemes proposed recently in the literature.This work was partially supported by Spanish grants AICO/2017/128 of the Generalitat Valenciana and VIGROB-287 of the Universitat d’Alacant
    corecore