Application of linear block codes in cryptography

dc.contributor.authorEsmaeili, Mostafa
dc.contributor.supervisorGulliver, T. Aaron
dc.date.accessioned2019-03-19T18:27:51Z
dc.date.available2019-03-19T18:27:51Z
dc.date.copyright2019en_US
dc.date.issued2019-03-19
dc.degree.departmentDepartment of Electrical and Computer Engineering
dc.degree.levelDoctor of Philosophy Ph.D.en_US
dc.description.abstractRecently, there has been a renewed interest in code based cryptosystems. Amongst the reasons for this interest is that they have shown to be resistant to quantum at- tacks, making them candidates for post-quantum cryptosystems. In fact, the National Institute of Standards and Technology is currently considering candidates for secure communication in the post-quantum era. Three of the proposals are code based cryp- tosystems. Other reasons for this renewed interest include e cient encryption and decryption. In this dissertation, new code based cryptosystems (symmetric key and public key) are presented that use high rate codes and have small key sizes. Hence they overcome the drawbacks of code based cryptosystems (low information rate and very large key size). The techniques used in designing these cryptosystems include random bit/block deletions, random bit insertions, random interleaving, and random bit ipping. An advantage of the proposed cryptosystems over other code based cryp- tosystems is that the code can be/is not secret. These cryptosystems are among the rst with this advantage. Having a public code eliminates the need for permutation and scrambling matrices. The absence of permutation and scrambling matrices results in a signi cant reduction in the key size. In fact, it is shown that with simple random bit ipping and interleaving the key size is comparable to well known symmetric key cryptosystems in use today such as Advanced Encryption Standard (AES). The security of the new cryptosystems are analysed. It is shown that they are immune against previously proposed attacks for code based cryptosystems. This is because scrambling or permutation matrices are not used and the random bit ipping is beyond the error correcting capability of the code. It is also shown that having a public code still provides a good level of security. This is proved in two ways, by nding the probability of an adversary being able to break the cryptosystem and showing that this probability is extremely small, and showing that the cryptosystem has indistinguishability against a chosen plaintext attack (i.e. is IND-CPA secure). IND-CPA security is among the primary necessities for a cryptosystem to be practical. This means that a ciphertext reveals no information about the corresponding plaintext other than its length. It is also shown that having a public code results in smaller key sizes.en_US
dc.description.scholarlevelGraduateen_US
dc.identifier.bibliographicCitationM. Esmaeili and T. A. Gulliver, "Joint channel coding-cryptography based on random insertions and deletions in QC-LDPC codes,'' IET Communications, vol. 9, no. 12, pp. 1555--1560, 2015.en_US
dc.identifier.bibliographicCitationM. Esmaeili, M. Dakhilalian, and T. A. Gulliver, "New secure channel coding scheme based on randomly punctured quasi-cyclic low-density parity check codes," IET Communications, vol. 8, no. 14, pp. 2556--2562, 2014.en_US
dc.identifier.bibliographicCitationM. Esmaeili and T. A. Gulliver, "A secure code based cryptosystem via random insertions, deletions, and errors,'' IEEE Communications Letters, vol. 20, no. 5, pp. 870--873, 2016.en_US
dc.identifier.bibliographicCitationM. Esmaeili, T.A. Gulliver, "Code-based security with random interleaving,'' IET Communications, vol. 11, no. 8, pp. 1195--1198, Jun. 2017.en_US
dc.identifier.urihttp://hdl.handle.net/1828/10655
dc.languageEnglisheng
dc.language.isoenen_US
dc.rightsAvailable to the World Wide Weben_US
dc.subjectcryptographyen_US
dc.subjectlinear block codesen_US
dc.subjectrandom bit deletionen_US
dc.subjectrandom bit insertionen_US
dc.subjectrandom interleavingen_US
dc.subjectcode based encryptionen_US
dc.subjectpost-quantum encryptionen_US
dc.titleApplication of linear block codes in cryptographyen_US
dc.typeThesisen_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Esmaeili_Mostafa_PhD_2019.pdf
Size:
682.04 KB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: