Secret Error-Correcting Codes (SECC)

A secret error-correcting coding (SECC) scheme is one that provides both data secrecy and data reliability in one process to combat with problems in an insecure and unreliable channel. In an SECC scheme, only the authorized user havingsecretly held information can correct channel errors systematically. Two SECC schemes are proposed in this paper. The first is a block encryption using Preparata based nonlinear codes; the second one is based on block chaining technique. Along with each schemes can be secure.

[1]  Franco P. Preparata A Class of Optimum Nonlinear Double-Error-Correcting Codes , 1968, Inf. Control..

[2]  R. Chien,et al.  Error-Correcting Codes, Second Edition , 1973, IEEE Transactions on Communications.

[3]  H. Feistel Cryptography and Computer Privacy , 1973 .

[4]  Elwyn R. Berlekamp,et al.  On the inherent intractability of certain coding problems (Corresp.) , 1978, IEEE Trans. Inf. Theory.

[5]  Charles Cresson Wood Future Applications of Cryptography , 1981, IEEE Symposium on Security and Privacy.

[6]  Oded Goldreich,et al.  On the power of cascade ciphers , 1985, TOCS.

[7]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[8]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[9]  Whitfield Diffie,et al.  Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard , 1977, Computer.

[10]  Peter Wayner A Redundancy Reducing Cipher , 1988, Cryptologia.

[11]  T. R. N. Rao,et al.  Private-Key Algebraic-Coded Cryptosystems , 1986, CRYPTO.

[12]  John B. Kam,et al.  Structured Design of Substitution-Permutation Encryption Networks , 1979, IEEE Transactions on Computers.

[13]  F. MacWilliams,et al.  The Theory of Error-Correcting Codes , 1977 .

[14]  René Struik,et al.  The Rao-Nam Scheme is Insecure Against a Chosen-Plaintext Attack , 1987, CRYPTO.

[15]  D. K. Branstad,et al.  Data Encryption Standard: past and future , 1988, Proc. IEEE.

[16]  Robert J. McEliece,et al.  A public key cryptosystem based on algebraic coding theory , 1978 .

[17]  Abraham Bookstein,et al.  Cryptography: A new dimension in computer data security ? and ?. Wiley-Interscience, New York (1982). xxi + 775 pp., $43.95. ISBN 0471-04892-5. , 1985 .

[18]  Stafford E. Tavares,et al.  A Layered Approach to the Design of Private Key Cryptosystems , 1985, CRYPTO.

[19]  W. W. Peterson,et al.  Error-Correcting Codes. , 1962 .

[20]  Stephen M. Matyas,et al.  Cryptography: A New Dimension in Computer Data Security--A Guide for the Design and Implementation of Secure Systems , 1982 .

[21]  Shu Lin,et al.  Error control coding : fundamentals and applications , 1983 .