Skip to main content
Erschienen in: Designs, Codes and Cryptography 3/2016

01.12.2016

Complementary information set codes over GF(p)

verfasst von: Hyun Jin Kim, Yoonjin Lee

Erschienen in: Designs, Codes and Cryptography | Ausgabe 3/2016

Einloggen, um Zugang zu erhalten

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Complementary information set codes (CIS codes) over a finite field GF(p) are closely connected to correlation-immune functions over GF(p), which are important cryptographic functions, where p is an odd prime. Using our CIS codes over GF(p) of minimum weight \(d+1\), we can obtain p-ary correlation-immune function of strength d. We find an efficient method for constructing CIS codes over GF(p). We also find a criterion for checking equivalence of CIS codes over GF(p). We complete the classification of all inequivalent CIS codes over GF(p) of lengths up to 8 for \(p = 3,5,7\) using our construction and criterion. We also find their weight enumerators and the order of their automorphism groups. The class of CIS codes over GF(p) includes self-dual codes over GF(p) as its subclass, and some CIS codes are formally self-dual codes as well; we sort out our classification results. Furthermore, we show that long CIS codes over GF(p) meet the Gilbert–Vashamov bound.
Literatur
1.
Zurück zum Zitat Camion P., Canteaut A.: Correlation-immune and resilient functions over a finite alphabet and their applications in cryptography. Des. Codes Cryptogr. 16(2), 121–149 (1999) Camion P., Canteaut A.: Correlation-immune and resilient functions over a finite alphabet and their applications in cryptography. Des. Codes Cryptogr. 16(2), 121–149 (1999)
2.
Zurück zum Zitat Cannon J., Playoust C.: An Introduction to Magma. University of Sydney, Sydney (1994) Cannon J., Playoust C.: An Introduction to Magma. University of Sydney, Sydney (1994)
3.
Zurück zum Zitat Carlet C.: More correlation-immune and resilient functions over galois fields and galois rings. In: Advances in Cryptology—EUROCRYPT’97. Lecture Note in Computer Sciences, vol. 1233, pp. 422-433. Springer, New York (1997) Carlet C.: More correlation-immune and resilient functions over galois fields and galois rings. In: Advances in Cryptology—EUROCRYPT’97. Lecture Note in Computer Sciences, vol. 1233, pp. 422-433. Springer, New York (1997)
4.
Zurück zum Zitat Carlet C., Gaborit P., Kim J.-L., Solé P.: A new class of codes for Boolean masking of cryptographic computations. IEEE Trans. Inf. Theory 58, 6000–6011 (2012) Carlet C., Gaborit P., Kim J.-L., Solé P.: A new class of codes for Boolean masking of cryptographic computations. IEEE Trans. Inf. Theory 58, 6000–6011 (2012)
5.
Zurück zum Zitat Carlet C., Freibert F., Guilley S., Kiermaier M., Kim J.-L., Solé P.: Higher-order CIS codes. IEEE Trans. Inf. Theory 60(9), 5283–5295 (2014) Carlet C., Freibert F., Guilley S., Kiermaier M., Kim J.-L., Solé P.: Higher-order CIS codes. IEEE Trans. Inf. Theory 60(9), 5283–5295 (2014)
6.
Zurück zum Zitat Harada M., Munemasa A.: Classification of self-dual codes of length 36. Adv. Math. Commun. 6, 229–235 (2012) Harada M., Munemasa A.: Classification of self-dual codes of length 36. Adv. Math. Commun. 6, 229–235 (2012)
7.
Zurück zum Zitat Kim J.-L.: New extremal self-dual codes of lengths 36, 38 and 58. IEEE Trans. Inf. Theory 47, 386–393 (2001) Kim J.-L.: New extremal self-dual codes of lengths 36, 38 and 58. IEEE Trans. Inf. Theory 47, 386–393 (2001)
8.
Zurück zum Zitat Kim J.-L., Lee Y.: Euclidean and Hermitian self-dual MDS codes over large finite fields. J. Combin. Theory Ser. A 105(1), 79–95 (2004) Kim J.-L., Lee Y.: Euclidean and Hermitian self-dual MDS codes over large finite fields. J. Combin. Theory Ser. A 105(1), 79–95 (2004)
9.
Zurück zum Zitat Kim J.-L., Lee Y.: An efficient construction of self-dual codes. Bull. Korean Math. Soc. 52(3), 915–923 (2015) Kim J.-L., Lee Y.: An efficient construction of self-dual codes. Bull. Korean Math. Soc. 52(3), 915–923 (2015)
11.
Zurück zum Zitat MacWilliams F.J., Sloane N.J.A.: The Theory of Error Correcting Codes. Elsevier, Amsterdam (1981) MacWilliams F.J., Sloane N.J.A.: The Theory of Error Correcting Codes. Elsevier, Amsterdam (1981)
12.
Zurück zum Zitat Pless V.S., Huffman W.C.: Handbook of Coding Theory. Elsevier, Amsterdam (1998) Pless V.S., Huffman W.C.: Handbook of Coding Theory. Elsevier, Amsterdam (1998)
13.
Zurück zum Zitat Schnorr C.P., Vaudenay S.: Black box cryptanalysis of hash networks based on multipermutations. In: Advances in Cryptology—EUROCRYPT’94. Lecture Note in Computer Science 950, pp. 47–57. Springer, New York (1995). Schnorr C.P., Vaudenay S.: Black box cryptanalysis of hash networks based on multipermutations. In: Advances in Cryptology—EUROCRYPT’94. Lecture Note in Computer Science 950, pp. 47–57. Springer, New York (1995).
14.
Zurück zum Zitat Siegenthaler T.: Correlation-immunity of non-linear combining functions for cryptographic applications. IEEE Trans. Inf. Theory 30(5), 776–780 (1984) Siegenthaler T.: Correlation-immunity of non-linear combining functions for cryptographic applications. IEEE Trans. Inf. Theory 30(5), 776–780 (1984)
15.
Zurück zum Zitat Yildiz B., Ozger Z.O.: A generalization of the Lee weight to \({\mathbb{Z}}_{p^{k}}\). TWMS J. Appl. Eng. Math 2(2), 145–153 (2012) Yildiz B., Ozger Z.O.: A generalization of the Lee weight to \({\mathbb{Z}}_{p^{k}}\). TWMS J. Appl. Eng. Math 2(2), 145–153 (2012)
Metadaten
Titel
Complementary information set codes over GF(p)
verfasst von
Hyun Jin Kim
Yoonjin Lee
Publikationsdatum
01.12.2016
Verlag
Springer US
Erschienen in
Designs, Codes and Cryptography / Ausgabe 3/2016
Print ISSN: 0925-1022
Elektronische ISSN: 1573-7586
DOI
https://doi.org/10.1007/s10623-015-0174-3

Weitere Artikel der Ausgabe 3/2016

Designs, Codes and Cryptography 3/2016 Zur Ausgabe

Premium Partner