Design of Strongly Secure Communication and Computation Channels by Nonlinear Error Detecting Codes

Computers, IEEE Transactions  (2014)

引用 48|浏览19
暂无评分
摘要
The security of communication or computational systems protected by traditional error detecting codes rely on the assumption that the information bits of the message (output of the device-under-attack) are not known to attackers or the error patterns are not controllable by external forces. For applications where the assumption is not valid, e.g., secure cryptographic devices, secret sharing, etc, the security of systems protected by traditional error detecting codes can be easily compromised by an attacker. In this paper, we present constructions for strongly secure codes based on the nonlinear encoding functions. For $(\\mbi {k},\\mbi {m},\\mbi {r})$ strongly secure codes, a message contains three parts: $\\mbi {k}$ -bit information data $\\mbi {y}$ , $\\mbi {m}$ -bit random data $\\mbi {x}$ , and $\\mbi {r}$ -bit redundancy $\\mbi {f}(\\mbi {y},\\mbi {x})$ . For any error $\\mbi {e}$ and information $\\mbi {y}$ , the fraction of $\\mbi {x}$ that masks the error $\\mbi {e}$ is less than 1. In this paper, we describe lower and upper bounds on the proposed codes and show that the presented constructions can generate optimal or close to optimal codes. An efficient encoding and decoding method for the codes minimizing the number of multipliers using the multivariate Horner scheme is presented.
更多
查看译文
关键词
channel coding,decoding,error detection codes,nonlinear codes,telecommunication security,computation channels,computational systems,decoding method,device-under-attack,encoding method,error patterns,multivariate Horner scheme,nonlinear encoding functions,nonlinear error detecting codes,secret sharing,secure communication,secure cryptographic devices,Nonlinear codes,fault injection attacks,reed-muller codes,secure hardware
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要