64 research outputs found

    Generalized Hermitian Codes over GF(2^r)

    Full text link
    In this paper we studied generalization of Hermitian function field proposed by A.Garcia and H.Stichtenoth. We calculated a Weierstrass semigroup of the point at infinity for the case q=2, r>=3. It turned out that unlike Hermitian case, we have already three generators for the semigroup. We then applied this result to codes, constructed on generalized Hermitian function fields. Further, we applied results of C.Kirfel and R.Pellikaan to estimating a Feng-Rao designed distance for GH-codes, which improved on Goppa designed distance. Next, we studied the question of codes dual to GH-codes. We identified that the duals are also GH-codes and gave an explicit formula. We concluded with some computational results. In particular, a new record-giving [32,16,>=12]-code over GF(8) was presented

    Towards a Better Understanding of the Semigroup Tree

    Full text link
    In this paper we elaborate on the structure of the semigroup tree and the regularities on the number of descendants of each node observed earlier. These regularites admit two different types of behavior and in this work we investigate which of the two types takes place in particular for well-known classes of semigroups. Also we study the question of what kind of chains appear in the tree and characterize the properties (like being (in)finite) thereof. We conclude with some thoughts that show how this study of the semigroup tree may help in solving the conjecture of Fibonacci-like behavior of the number of semigroups with given genus.Comment: 17 pages, 2 figure

    A Note on the Injection Distance

    Full text link
    Koetter and Kschischang showed in [R. Koetter and F.R. Kschischang, "Coding for Errors and Erasures in Random Network Coding," IEEE Trans. Inform. Theory, {54(8), 2008] that the network coding counterpart of Gabidulin codes performs asymptotically optimal with respect to the subspace distance. Recently, Silva and Kschischang introduced in [D. Silva and F.R. Kschischang, "On Metrics for Error Correction in Network Coding," To appear in IEEE Trans. Inform. Theory, ArXiv: 0805.3824v4[cs.IT], 2009] the injection distance to give a detailed picture of what happens in noncoherent network coding. We show that the above codes are also asymptotically optimal with respect to this distance

    Obtaining and solving systems of equations in key variables only for the small variants of AES

    Get PDF
    This work is devoted to attacking the small scale variants of the Advanced Encryption Standard (AES) via systems that contain only the initial key variables. To this end, we introduce a system of equations that naturally arises in the AES, and then eliminate all the intermediate variables via normal form reductions. The resulting system in key variables only is solved then. We also consider a possibility to apply our method in the meet-in-the-middle scenario especially with several plaintext/ciphertext pairs. We elaborate on the method further by looking for subsystems which contain fewer variables and are overdetermined, thus facilitating solving the large system

    CyclicRainbow - A multivariate Signature Scheme with a Partially Cyclic Public Key based on Rainbow

    Get PDF
    Multivariate Cryptography is one of the alternatives to guarantee the security of communication in the post-quantum world. One major drawback of such schemes is the huge size of their keys. In \cite{PB10} Petzoldt et al. proposed a way how to reduce the public key size of the UOV scheme by a large factor. In this paper we extend this idea to the Rainbow signature scheme of Ding and Schmidt \cite{DS05}. By our construction it is possible to reduce he size of the public key by up to 62 \verb!%!

    INFORMATION SPACE AND SOCIETY: EXPLORING NEGATIVE TRENDS, IDEOLOGICAL INFLUENCE, AND STRATEGIES FOR SUSTAINABLE DEVELOPMENT

    Get PDF
    Objective: The study aimed to identify ways to establish a secure environment that fosters the circulation of reliable information. This objective was pursued through enhancing the protection of the existing information infrastructure and ensuring its sustainable functioning, while also taking into account the impact of information confrontation on the escalation of interstate and intrastate conflicts. Methods: The study employs a comprehensive analysis of societal trends to understand the negative effects of information space on the development of destabilizing ideologies. By utilizing general scientific methods, including philosophical approaches and logical reasoning, the study aims to examine the problems of modern informatization in society and the activities of states and society in achieving sustainable development. Results: The study highlights the influence of information space on establishing conditions for public safety, personal security, and the security of critical sectors such as fuel and energy. It identifies the challenges involved in creating a secure information space and presents a viewpoint on the necessity of developing a unified information space that facilitates both educational and supervisory functions. Conclusion: The study's final conclusions emphasize the importance of mass information sources in providing quality information to individuals in social interactions. These sources play a crucial role in promoting socially beneficial behavior and establishing criteria for progressive development in societies and states. It also stresses the importance of increasing protection against potential threats that can harm individuals' lives, health, property, and personal data, as well as the social and psychological rehabilitation of those affected by modern threats

    Selecting Parameters for the Rainbow Signature Scheme - Extended Version -

    Get PDF
    Multivariate public key cryptography is one of the main approaches to guarantee the security of communication in a post-quantum world. One of the most promising candidates in this area is the Rainbow signature scheme, which was first proposed by J. Ding and D. Schmidt in 2005. In this paper we develop a model of security for the Rainbow signature scheme. We use this model to find parameters for Rainbow over GF(16), GF(31) and GF(256) which, under certain assumptions, guarantee the security of the scheme for now and the near future

    Selecting Parameters for Secure McEliece-based Cryptosystems

    Get PDF
    In 1994, P. Shor showed that quantum computers will be able to break cryptosystems based on integer factorization and on the discrete logarithm, e.g. RSA or ECC. Code-based crytosystems are promising alternatives to public key schemes based on these problems, and they are believed to be secure against quantum computer attacks. In this paper, we solve the problem of selecting optimal parameters for the McEliece cryptosystem that provide security until a given year and give detailed recommendations. Our analysis is based on the lower bound complexity estimates by Sendrier and Finiasz, and the security requirements model proposed by Lenstra and Verheul

    Some Problems from Coding Theory and Cryptography

    No full text
    • …
    corecore