Advanced Search
Volume 27 Issue 8
Aug.  2005
Turn off MathJax
Article Contents
Liu Jin-long, Xu Zong-ze. Modification of Rao-Nam's Private-Key Cryptosystem[J]. Journal of Electronics & Information Technology, 2005, 27(8): 1287-1289.
Citation: Liu Jin-long, Xu Zong-ze. Modification of Rao-Nam's Private-Key Cryptosystem[J]. Journal of Electronics & Information Technology, 2005, 27(8): 1287-1289.

Modification of Rao-Nam's Private-Key Cryptosystem

  • Received Date: 2004-03-23
  • Rev Recd Date: 2004-07-14
  • Publish Date: 2005-08-19
  • A new kind of algorithm is proposed which can produce random error vector without looking up the syndrome-error table. An error vector with larger Hamming weight can be produced by mixing a part of the original error vector with the plaintext. A modified Rao-Nam scheme based on the new algorithm is presented, which requires no storage for random error vector. The scheme is efficient and practical, and offers a much higher security level.
  • loading
  • Berlekamp E R, McEliece R J, van Tilborg H C A. On the inherent intractability of certain coding problems. IEEE Trans. on Information Theory, 1978, IT-24: 384- 386. [2]McEliece R J. A public-key cryptosystem based on algebraic coding theory. DSN Prog. Rep. 1978:42 - 44, 114 - 116. [3]Rao T R N. Joint encryption and error correction schemes. Confer ence Proceedings-11th Annual International Symposium on Com puter Architecture, Ann Arbor, Mich, USA., 1984:240 - 241. [4]王新梅,马文平,等.纠错密码理论.北京:人民邮电出版社,2001:137-139. [5]Rao T R N, Nam K H. Private-key algebraic-code encryptions.IEEE Trans. on Information Theory, 1989, 35(4): 829- 833. [6]Struik R, Tilburg J. The Rao-Nam scheme is insecure against a chosen-plaintext attack. Advances in Cryptology-CRYPTO ’87.New York: Springer-Verlag, 1988:458 - 461. [7]王新梅,肖国镇.纠错码-原理与方法.西安:西安电子科技大学出版社,2001:63-63. [8]Struik R. On the Rao-Nam scheme using nonlinear codes. Infor mation Theory Proceedings. 1991 IEEE International Symposium,Eindhoven University of Technology, 1991: 174 - 174. [9]Denny W F. Encryptions using linear and nonlinear codes:implementation and security considerations. [Ph.D. dissertation],The Center for Advanced Computer Studies, University of Southwestern Louisiana, Lafayette, 1988. [10]Sun H M, Hwang T. Key generation of algebraic-code crypto systems. Computer Math. Application, 1994, 27(2): 99- 106.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2618) PDF downloads(734) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return