Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safe and reliable transmission method based on LDPC

A technology of LDPC code and transmission method, which is applied in the field of coding and encryption fusion design based on LDPC code, can solve the problems of large key overhead, low information rate of M public key system, no consideration of disturbed channel, etc., so as to reduce the key Overhead, improve system security, reduce the effect of key overhead

Active Publication Date: 2018-03-09
UNIV OF ELECTRONICS SCI & TECH OF CHINA +1
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the M public key system has obvious defects: the length of the public and private keys is large, which leads to large key overhead, the information rate of the M public key system is low, and the M public key system does not consider the situation of disturbed channels.
In 1984, Rao proposed a block encryption error correction system based on the M public key system that combines encryption and error correction, also known as the M symmetric cryptosystem, but the key overhead is still the weakness of the scheme, and subsequent research Prove that the scheme can be broken by some chosen plaintext attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe and reliable transmission method based on LDPC
  • Safe and reliable transmission method based on LDPC

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention will be further described in detail below in conjunction with the accompanying drawings.

[0038] Set code length n, code rate R=1 / 2, construct LDPC code based on RDF, according to figure 1 As shown in (a), it is assumed that the k-bit plaintext information to be encrypted in this communication is m i , the specific operation of the sender is as follows:

[0039] first step:

[0040] Use k×k order key matrix S for plaintext information m i Encrypt to get c i1 =m i · S, then the sequence c i1 The length of is still k bits;

[0041] Step two:

[0042] The sender of the communication receives the key a 1 , b 1 , N, take them as the parameters of the recurrence formula of the linear congruential generator 1:

[0043] c i+1 =a 1 · c i +b 1 (mod M 1 )i=0,1,2,...,M 1 -1

[0044] where c 0 = N mod M 1 , M 1 =p, p is the block length when constructing the LDPC parity check matrix H based on the RDF method, and the integer sequence c is o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of channel coding and encryption and particularly relates to coding and encryption integrated design based on a LDPC. For the defect that an M symmetric cryptosystemis high in key cost and has security vulnerabilities, the invention provides a safe and reliable transmission method based on the LDPC. According to the method, an encryption error correction matrixis generated under the control of a big random number seed N, the same permutation matrix and check matrix which are generated by two parties synchronously based on linear congruence according to thesame seed are received, and each time when communication is carried out, encryption coding matrixes are changed synchronously, so one-time pad is realized, the key cost is reduced, and moreover the safety of a system can be ensured.

Description

technical field [0001] The invention belongs to the field of channel coding and encryption, in particular to the fusion design of coding and encryption based on LDPC codes. Background technique [0002] In order to realize the effectiveness of confidential communication and improve the reliability and security of transmitted data, Diffie and Hellman proposed a new concept of public key in 1976, which broke many old ideas of traditional cryptography and made the security of cryptographic system based on On top of a difficult math problem, that is, on the NPC problem. In 1978, E.R. Berkekamp, ​​R.J. McEliece and H.C.A. van Tilborg proved that the decoding problem of general linear block codes in error-correcting codes is an NPC problem. These two achievements established the theoretical basis for the combination of error-correcting codes and cryptography. As a result, McEliece proposed the McEliece public key system (also known as M public key system), which is the first pub...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/06H04L1/00
CPCH04L1/0057H04L1/0063H04L9/0631H04L9/0869
Inventor 任亚军史治平张俊详
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products