Bibliographic Details
| Title: |
Expected security performance of random linear binary codes in syndrome coding. |
| Authors: |
Ke Zhang1 kzhang@whut.edu.cn, Tomlinson, Martin2, Ahmed, Mohammed Z.2, Xiaolin Ma1 |
| Source: |
IET Communications (Wiley-Blackwell). 2018, Vol. 12 Issue 13, p1555-1562. 8p. |
| Subject Terms: |
*MONTE Carlo method, *TELECOMMUNICATION systems, RANDOM codes (Coding theory), TELECOMMUNICATION security, BINARY codes |
| Abstract: |
In this study, random codes are applied to the classical syndrome coding scheme to achieve secrecy of communications. By analysing the effect of the values of the columns of the parity check matrix on the resulting security level of communications, a code design method is presented which constructs a class of random codes, termed random permutation codes, which achieve high security levels and are easily generated. A theoretical analysis method is presented which determines the security level achieved by randomly chosen, linear binary codes, and compared with simulation results obtained by Monte Carlo analysis. The results verify the theoretical approach. In particular, the theoretical method is also suitable for analysis of long codes having a large number of parity check bits which are beyond evaluation by computer simulation. The results show that the security performance of any randomly chosen permutation code is close to that of the best equivocation code having the same code parameters. This has the practical advantage in syndrome coding of being able to use an ephemeral code for each communication session, thereby providing forward secrecy, a desired feature of modern, secure communication systems. [ABSTRACT FROM AUTHOR] |
|
Copyright of IET Communications (Wiley-Blackwell) is the property of Wiley-Blackwell and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.) |
| Database: |
Business Source Index |