Method for generating shift matrix in encryption scheme based on LDPC code

A technology of LDPC code and shift matrix, which is applied in the field of encryption and decryption to achieve the effect of reducing overhead and enhancing security

Inactive Publication Date: 2011-01-12
BEIJING UNIV OF POSTS & TELECOMM
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But the overhead of shifting the matrix doesn't change

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for generating shift matrix in encryption scheme based on LDPC code
  • Method for generating shift matrix in encryption scheme based on LDPC code
  • Method for generating shift matrix in encryption scheme based on LDPC code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The present invention will be further described below in conjunction with the embodiments and accompanying drawings.

[0022] refer to figure 1 , figure 1 A flow chart of the steps implemented by the shift matrix generation method in the encryption scheme based on LDPC codes of the present invention, including:

[0023] The sorting step is to sort and number all variable nodes according to the check matrix H of the LDPC code, and the i-th column of H corresponds to the V-th i variable nodes, 1≤i≤n, m×n is the dimension of check matrix H;

[0024] Disruption step, using random number N and parity check matrix H to reorder the variable nodes, Represents the i-th variable node after rearrangement, 1≤a i ≤n; Among them, the random number N is determined jointly by the receiver and the sender before the communication;

[0025] Shift matrix generation step, using Generate a shift matrix.

[0026] The above steps will be described in detail below. First, explain how ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for generating a shift matrix in an encryption scheme based on an LDPC code. The method comprises the following steps of: numbering all variable nodes from left to right according to a check matrix; selecting the first variable node from the rearranged nodes by performing complementation through a big enough random number and the length of LDPC code; performing a series of complementation operation with the random number and related information in the check matrix of the LDPC codes so as to rearrange all the variable nodes; and generating the shift matrix according to a new sort order of the variable nodes. The invention provides a reliable method for generating the shift matrix for the encryption scheme based on the LDPC code, and the key expenditure caused by describing the shift matrix is obviously reduced.

Description

technical field [0001] The invention relates to encryption and decryption technology in reliable information transmission, in particular to a method for generating a shift matrix in an encryption scheme based on LDPC codes. Background technique [0002] Low Density Parity Check Code (LDPC) has excellent error correction performance and has been widely used in deep space communication, optical fiber communication, satellite digital video and audio broadcasting and other fields. However, the LDPC codeword itself does not have a confidentiality function and cannot ensure the security of information. The combination of LDPC code and encryption technology can not only ensure the reliability of the system, but also enhance the security of the system, and at the same time can save the overhead of hardware and the complexity of calculation. [0003] The McEliece scheme is the earliest algebraic code-based encryption scheme (R.J.Mceliece, "A public-key cryptosystem based on algebrai...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L1/00
Inventor 许成鑫张欣常永宇杨大成
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products