Mathematical Optimization of decrypting Algorithm for Soft Input Decryption

被引:0
|
作者
Zivic, Natasa [1 ]
Kadusic, Esad [2 ]
Skrbic, Mirko [3 ]
机构
[1] Univ Siegen, Inst Data Commun Syst, D-57076 Siegen, Germany
[2] BH Telecom, Dept Planning & Dev Serv Networks, Sarajevo 71000, Bosnia & Herceg
[3] Teleinformat DOO, Voice & Data Solut, Sarajevo 71000, Bosnia & Herceg
关键词
Soft Input Decryption; L-values; optimization; verification; SID block; digital signatures; control matrix;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this work, the strategy for correction of bits using Soft Input Decryption is analyzed. Soft Input Decryption is used for correction of cryptographic check values, which are very fragile when they are transmitted over noisy channels: only one wrong bit at input of the decryptor causes about 50% of errors at output of the decryptor. Soft Input Decryption corrects incorrect bits of cryptographic check values in most of cases using combination of SISO channel decoding and decrypting. Soft Input Decryption is an iterative process and therefore it is needed to minimize duration of iterations. This paper suggests an algorithm for optimization of Soft Input Decryption, which enables restriction of needed computing time of the Soft Input Decryption algorithm. Suggested optimization is performed for ECDSA digital signatures.
引用
收藏
页码:237 / +
页数:3
相关论文
共 50 条
  • [31] THE MATHEMATICAL MODEL AND ALGORITHM OF DISTRIBUTION NETWORK OPTIMIZATION PROBLEMS
    Zhao, Xiu-Heng
    Mi, Li-Min
    PROCEEDINGS OF 2015 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOL. 2, 2015, : 696 - 701
  • [32] Research of genetic algorithm applied on mathematical optimization problems
    Zhang Li-ping
    Proceedings of 2006 Chinese Control and Decision Conference, 2006, : 457 - 459
  • [33] MATHEMATICAL-MODELING OF A PARALLEL GLOBAL OPTIMIZATION ALGORITHM
    ESKOW, E
    SCHNABEL, RB
    PARALLEL COMPUTING, 1989, 12 (03) : 315 - 325
  • [34] Development of Platform Using NIOS II Soft Core Processor for Image Encryption and Decryption Using AES Algorithm
    Trivedi, Sneha V.
    Hasamnis, M. A.
    2015 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2015, : 1147 - 1151
  • [35] Mobile text input with soft keyboards: Optimization by means of visual clues
    Magnien, L
    Bouraoui, JL
    Vigouroux, N
    MOBILE HUMAN-COMPUTER INTERACTION - MOBILEHCI 2004, PROCEEDINGS, 2004, 3160 : 337 - 341
  • [36] A new algorithm for encryption/decryption for field applications
    Ramasamy, Rajaram
    Muniyandi, Amutha Prabakar
    Devi, Indra
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (06) : 1069 - 1072
  • [37] An Encryption and Decryption Algorithm for Image Based on DNA
    Soni, Ranu
    Johar, Arun
    Soni, Vishakha
    2013 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2013), 2013, : 478 - 481
  • [38] Input parameter optimization of virtual sensor based on genetic algorithm
    Zhao, Yu
    Zhou, Yu-Yang
    Hu, Nian-Su
    Dongli Gongcheng/Power Engineering, 2003, 23 (04):
  • [39] A Soft-Input Soft-Output Decoding Algorithm for LDPC Codes Based on Euclidean Distance
    Guo, Rui
    Wang, Lixin
    ADVANCED RESEARCH ON MECHANICAL ENGINEERING, INDUSTRY AND MANUFACTURING ENGINEERING, PTS 1 AND 2, 2011, 63-64 : 999 - 1004
  • [40] DATA ENCRYPTION AND DECRYPTION USING ANZL ALGORITHM
    Luma, Artan
    Zeqiri, Nderim
    ICEIS 2008: PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL ISAS-1: INFORMATION SYSTEMS ANALYSIS AND SPECIFICATION, VOL 1, 2008, : 220 - 223