Advertisement

Encode-then-Encrypt: A Novel Framework for Reliable and Secure Communication

  • Rajrupa Singh
  • C. Pavan Kumar
  • R. SelvakumarEmail author
Conference paper
Part of the Trends in Mathematics book series (TM)

Abstract

Achieving a reliable and secure communication is the major challenge in the context of data communication and storage. In this paper, Encode-then-Encrypt framework is defined using linear error correcting codes and elliptic curves to address these challenges as a single solution rather than addressing them separately. The working of the proposed framework is explained in detail by taking Reed-Solomon codes (with a set of encoding and decoding algorithms) and elliptic curves of characteristic 2 (with a set of encryption and decryption algorithms). We have outlined the advantages of using such elliptic curves and error correcting codes over any other cryptosystem defined in the existing literature. The proposed framework can be implemented as a part of any real-time communication system to ensure reliability and security.

Keywords

Encode Encrypt Reed-Solomon Codes Elliptic Curve Cryptography 

References

  1. 1.
    McEliece, R.: A public-key cryptosystem based on algebraic coding tehory. DSN Progress Report (1978) 42–44Google Scholar
  2. 2.
    Gligoroski, D., Knapskog, S.J., Andova, S.: Cryptcoding-encryption and error-correction coding in a single step. In: Security and Management. (2006) 145–151Google Scholar
  3. 3.
    Kak, S.C.: Joint encryption and error-correction coding. In: Security and Privacy, 1983 IEEE Symposium on, IEEE (1983) 55–55Google Scholar
  4. 4.
    Rao, T.: Joint encryption and error correction schemes. In: ACM SIGARCH Computer Architecture News. Volume 12., ACM (1984) 240–241Google Scholar
  5. 5.
    National Science Foundation: Report of the working group on cryptology and coding theory, https://www.nsf.gov/pubs/1998/nsf9814/nsf9814.htm (1997)
  6. 6.
    Sudan, M.: Coding theory: tutorial amp; survey. In: Proceedings 2001 IEEE International Conference on Cluster Computing. (Oct 2001) 36–53Google Scholar
  7. 7.
    Koblitz, N.: A course in number theory and cryptography. Volume 114. Springer Science & Business Media (1994)Google Scholar
  8. 8.
    Stallings, W.: Cryptography and network security: principles and practices. Pearson Education India (2006)Google Scholar
  9. 9.
    Bos, J.W., Halderman, J.A., Heninger, N., Moore, J., Naehrig, M., Wustrow, E.: Elliptic curve cryptography in practice. In: International Conference on Financial Cryptography and Data Security, Springer (2014) 157–175Google Scholar
  10. 10.
    Moon, T.K.: Error correction coding: mathematical methods and algorithms. (2005)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.School of Advanced Sciences (SAS)Vellore Institute of TechnologyVelloreIndia
  2. 2.Department of MathematicsVellore Institute of TechnologyVelloreIndia
  3. 3.School of Computer Science and Engineering (SCOPE)Vellore Institute of TechnologyVelloreIndia

Personalised recommendations