Hyperelliptic curves encryption combined with block codes for Gaussian channel

نویسندگان

  • Iván Jirón
  • Ismael Soto
  • Rolando A. Carrasco
  • Néstor Becerra Yoma
چکیده

In this paper, a new cryptographic system is constructed using a combination of a hyperelliptic curve of genus g 1⁄4 2 over the Galois field GF(2) and a Reed–Solomon code (N, K) over the Galois field GF(2) and this system uses a smaller key than the elliptic curves cryptosystem and the Rivest, Shamir, and Adleman cryptosystem. The design criterion for the combination can be expressed as the data compression condition and addressing capability of the code. In addition, the system performance is compared with other systems; extraordinary improvements of 8 and 16.5 dB can be obtained for a BER=10 , when compared with binary phase shift keying and differential chaos shift keying, respectively. This system has a polynomial complexity, which depends on data length and the number of operations in GF(2). Copyright # 2005 John Wiley & Sons, Ltd.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An efficient secure channel coding scheme based on polar codes

In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...

متن کامل

Gaussian Z Channel with Intersymbol Interference

In this paper, we derive a capacity inner bound for a synchronous Gaussian Z channel with intersymbol interference (ISI) under input power constraints. This is done by converting the original channel model into an n-block memoryless circular Gaussian Z channel (n-CGZC) and successively decomposing the n-block memoryless channel into a series of independent parallel channels in the frequency dom...

متن کامل

A Study of Hyperelliptic Curves in Cryptography

Elliptic curves are some specific type of curves known as hyper elliptic curves. Compared to the integer factorization problem(IFP) based systems, using elliptic curve based cryptography will significantly decrease key size of the encryption. Therefore, application of this type of cryptography in systems that need high security and smaller key size has found great attention. Hyperelliptic curve...

متن کامل

Imaginary automorphisms on real hyperelliptic curves

A real hyperelliptic curve X is said to be Gaussian if there is an automorphism α : XC → XC such that α = [−1]C ◦ α, where [−1] denotes the hyperelliptic involution on X. Gaussian curves arise naturally in several contexts, for example when one studies real Jacobians. In the present paper we study the properties of Gaussian curves and we describe their moduli spaces. MSC 2000: 14H15, 14H37, 14P...

متن کامل

On the Achievable Rate-Regions for the Gaussian Two-way Diamond Channels

In this channel,we study rate region of a Gaussian two-way diamond channel which operates in half-duplex mode. In this channel, two transceiver (TR) nodes exchange their messages with the help of two relay nodes. We consider a special case of the Gaussian two-way diamond channels which is called Compute-and-Forward Multiple Access Channel (CF-MAC). In the CF-MAC, the TR nodes transmit their mes...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Int. J. Communication Systems

دوره 19  شماره 

صفحات  -

تاریخ انتشار 2006