A General Encryption Scheme Based on MDS Code ( Extended Summary )

نویسنده

  • Lihao Xu
چکیده

Many applications, such as wireless communications, high speed multimedia data streaming systems and sensor networks, call for strong ciphers with low computation complexity and high speed in encryption and decryption. Additive stream ciphers usually have lower computation complexity and thus provide higher encryption/decryption speed than block ciphers. An additive stream cipher usually encrypts a plaintext stream simply by adding it to a key stream, where the addition (⊕) is simple bitwise XOR (exclusive OR). Additive stream ciphers though have a main disadvantage that a known plaintext-ciphertext stream pair reveals the corresponding key stream used in encryption. The encryption key used to generate the key stream can then be deduced from a long enough key stream. Even two ciphertext streams encrypted using a same key stream can be exploited to obtain the key stream itself[3]. In fact, such a disadvantage of stream ciphers has been exploited to show the insecurity of the WEP (Wired Equivalent Privacy) protocol used in IEEE 802.11 standard for wireless networks [2]. Block ciphers, on the other hand, can conceal statistical properties of a plaintext more easily in the corresponding ciphertext. To keep the merits of both stream cipher and block cipher but lessen their disadvantages, it has been proposed to combining stream ciphers and block ciphers together to achieve stronger security [4]. Such combining, however, does not lessen computation complexity of encryption and decryption. In fact, computation complexity is even higher than that of the component block ciphers and stream ciphers. In this paper, we propose to combine cryptographically strong random key stream generators (including those used in stream ciphers) with simple block encoders to achieve both high cryptographic strength and low computation complexity of encryption and decryption. In particular, we show proper error correcting codes can be used as block encoders. In general, encoding and decoding of a proper block error (or more accurately erasure) correcting code is much faster than encryption and decryption of block ciphers.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An efficient secure channel coding scheme based on polar codes

In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...

متن کامل

Artemia: a family of provably secure authenticated encryption schemes

Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...

متن کامل

A Non-MDS Erasure Code Scheme for Storage Applications

This paper investigates the use of redundancy and self repairing against node failures indistributed storage systems using a novel non-MDS erasure code. In replication method, accessto one replication node is adequate to reconstruct a lost node, while in MDS erasure codedsystems which are optimal in terms of redundancy-reliability tradeoff, a single node failure isrepaired after recovering the ...

متن کامل

SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing

While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...

متن کامل

Secure and Efficient Code Encryption Scheme Based on Indexed Table

© 2011 ETRI Journal, Volume 33, Number 1, February 2011 Software is completely exposed to an attacker after it is distributed because reverse engineering is widely known. To protect software, techniques against reverse engineering are necessary. A code encryption scheme is one of the techniques. A code encryption scheme encrypts the binary executable code. Key management is the most important p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003