Error Correction of Noisy Block Cipher Using Cipher and Plaintext Characteristics

Contemporary proven cryptographic algorithms, like the Advanced Encryption Standard (AES), are used in many secure data storage systems. Cipher data when written or read might be subject to noise. Classical error detection and correction methods are not suitable for encrypted data. In this paper, error detection and correction is performed at the receiver end, without any changes to the encryption algorithm. One of the properties of encrypted information is that all encrypted blocks have a minimum hamming distance from each other. This property is exploited to obtain the exact correct block. When error correction based on the encrypted data cannot be performed, natural language properties of plaintext data are used to eliminate noise. The plaintext blocks surrounding the noisy plaintext block are used to generate possible candidates. In case a unique solution is not achieved, n-gram properties of the plaintext language are used to rank the possibilities and promote the best fit.

[1]  Tanya Vladimirova,et al.  On-Board Security Services in Small Satellites , 2006 .

[2]  Yair Frankel,et al.  On the Relation of Error Correction and Cryptography to an Off Line Biometric Based Identification S , 1999 .

[3]  K. P. Subbalakshmi,et al.  On the Design of Error-Correcting Ciphers , 2006, EURASIP J. Wirel. Commun. Netw..

[4]  Yanghee Choi,et al.  Secure multimedia transmission in IPv6 wireless networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.

[5]  M.S. Kumar,et al.  Reliable transmission and storage of medical images with patient information using error control codes , 2004, Proceedings of the IEEE INDICON 2004. First India Annual Conference, 2004..

[6]  Robert J. McEliece,et al.  A public key cryptosystem based on algebraic coding theory , 1978 .

[7]  C. E. SHANNON,et al.  A mathematical theory of communication , 1948, MOCO.

[8]  Gordon B. Agnew Cryptographic systems using redundancy , 1990, IEEE Trans. Inf. Theory.

[9]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[10]  Tzonelih Hwang,et al.  Secret Error-Correcting Codes (SECC) , 1990 .

[11]  Robert Cole,et al.  Computer Communications , 1982, Springer New York.

[12]  Israel Koren,et al.  Error Analysis and Detection Procedures for a Hardware Implementation of the Advanced Encryption Standard , 2003, IEEE Trans. Computers.

[13]  Ramesh Karri,et al.  On-line error detection and BIST for the AES encryption algorithm with different S-box implementations , 2005, 11th IEEE International On-Line Testing Symposium.

[14]  C. Mitchell in Designs , Codes , and Cryptography , 2007 .

[15]  Ramesh Karri,et al.  Low cost concurrent error detection for the advanced encryption standard , 2004, 2004 International Conferce on Test.

[16]  Ramesh Karri,et al.  Concurrent error detection schemes for fault-based side-channel cryptanalysis of symmetric block ciphers , 2002, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..

[17]  Tzonelih Hwang,et al.  Secret Error-Correcting Codes (SECC) , 1988, CRYPTO.

[18]  Maciej Nikodem,et al.  Error detection and error correction procedures for the advanced encryption standard , 2008, Des. Codes Cryptogr..

[19]  Danilo Gligoroski,et al.  Cryptcoding - Encryption and Error-Correction Coding in a Single Step , 2006, Security and Management.

[20]  Hyuck M. Kwon,et al.  Packet loss due to encryption in space data systems , 1994, IEEE Trans. Commun..

[21]  Ramesh Karri,et al.  Low cost concurrent error detection for the advanced encryption standard , 2004 .

[22]  Walter Godoy,et al.  A proposal of a cryptography algorithm with techniques of error correction , 1997, Comput. Commun..