Skip to main content
Top
Published in: Designs, Codes and Cryptography 2/2016

01-08-2016

Convolutional block codes with cryptographic properties over the semi-direct product \({\mathbb {Z}}/N{\mathbb {Z}} \rtimes {\mathbb {Z}}/M{\mathbb {Z}}\)

Authors: Marion Candau, Roland Gautier, Johannes Huisman

Published in: Designs, Codes and Cryptography | Issue 2/2016

Login to get access

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Classic convolutional codes are defined as the convolution of a message and a transfer function over \(\mathbb {Z}\). In this paper, we study time-varying convolutional codes over a finite group G of the form \({\mathbb {Z}}/N{\mathbb {Z}} \rtimes {\mathbb {Z}}/M{\mathbb {Z}}\). The goal of this study is to design codes with cryptographic properties. To define a message u of length k over the group G, we choose a subset E of G that changes at each encoding, and we put \(u = \sum _i u_iE(i)\). These subsets E are generated chaotically by a dynamical system, walking from a starting point (xy) on a space paved by rectangles, each rectangle representing an element of G. So each iteration of the dynamical system gives an element of the group which is saved on the current E. The encoding is done by a convolution product with a fixed transfer function. We have found a criterion to check whether an element in the group algebra can be used as a transfer function. The decoding process is realized by syndrome decoding. We have computed the minimum distance for the group \(G=\mathbb {Z}/7\mathbb {Z} \rtimes \mathbb {Z}/3\mathbb {Z}\). We found that it is slightly smaller than those of the best linear block codes. Nevertheless, our codes induce a symmetric cryptosystem whose key is the starting point (xy) of the dynamical system. Consequently, these codes are a compromise between error correction and security.
Footnotes
1
It is an additive law therefore it would be logical to denote it +, but as the + sign is used to represent the elements of the group algebra, we prefer to use \(\cdot \) to note the group law.
 
2
To compute \(\tau ^{-1}\), we compute the inverse Fourier transform of the vector composed by all the \((\widehat{\tau }(R_i))^{-1}\).
 
Literature
1.
go back to reference Devaney R.L.: An Introduction to Chaotic Dynamical Systems, 2nd edn. Addison-Wesley, Redwood City (1989). Devaney R.L.: An Introduction to Chaotic Dynamical Systems, 2nd edn. Addison-Wesley, Redwood City (1989).
2.
go back to reference Elias P.: Coding for two noisy channels. In: Information Theory, the 3rd London Symposium, pp. 61–76. Buttersworth’s Scientific Publications, London (1955). Elias P.: Coding for two noisy channels. In: Information Theory, the 3rd London Symposium, pp. 61–76. Buttersworth’s Scientific Publications, London (1955).
4.
go back to reference Hatcher A.: Algebraic Topology. Cambridge University Press, Cambridge (2002). Hatcher A.: Algebraic Topology. Cambridge University Press, Cambridge (2002).
5.
go back to reference Katz J., Lindell Y.: Introduction to Modern Cryptography. Chapman & Hall/CRC Cryptography and Network Security. Chapman & Hall/CRC, Boca Raton (2008). Katz J., Lindell Y.: Introduction to Modern Cryptography. Chapman & Hall/CRC Cryptography and Network Security. Chapman & Hall/CRC, Boca Raton (2008).
6.
go back to reference Marazin M., Gautier R., Burel G.: Blind recovery of k/n rate convolutional encoders in a noisy environment. EURASIP J. Wirel. Commun. Netw. 2011, 168 (2011). Marazin M., Gautier R., Burel G.: Blind recovery of k/n rate convolutional encoders in a noisy environment. EURASIP J. Wirel. Commun. Netw. 2011, 168 (2011).
7.
go back to reference Moon T.K.: Convolutional codes. In: Error Correction Coding: Mathematical Methods and Algorithms, chap. 12, pp. 452–580. Wiley-Interscience, Hoboken (2005). Moon T.K.: Convolutional codes. In: Error Correction Coding: Mathematical Methods and Algorithms, chap. 12, pp. 452–580. Wiley-Interscience, Hoboken (2005).
8.
go back to reference Neubauer A.: Convolutional codes. In: Coding Theory: Algorithms, Architectures and Applications, chap. 3, pp. 112–177. Wiley-Interscience, Hoboken (2007). Neubauer A.: Convolutional codes. In: Coding Theory: Algorithms, Architectures and Applications, chap. 3, pp. 112–177. Wiley-Interscience, Hoboken (2007).
9.
go back to reference Terras A.: Fourier Analysis on Finite Groups and Applications. London Mathematical Society Student Texts 43. Cambridge University Press, Cambridge (1999). Terras A.: Fourier Analysis on Finite Groups and Applications. London Mathematical Society Student Texts 43. Cambridge University Press, Cambridge (1999).
Metadata
Title
Convolutional block codes with cryptographic properties over the semi-direct product
Authors
Marion Candau
Roland Gautier
Johannes Huisman
Publication date
01-08-2016
Publisher
Springer US
Published in
Designs, Codes and Cryptography / Issue 2/2016
Print ISSN: 0925-1022
Electronic ISSN: 1573-7586
DOI
https://doi.org/10.1007/s10623-015-0101-7

Other articles of this Issue 2/2016

Designs, Codes and Cryptography 2/2016 Go to the issue

Premium Partner