cours / présentation

3.2. Combinatorial Solutions: Exhaustive Search and Birthday Decoding

In this session, I will detail two combinatorial solutions to the decoding problem. The first one is the Exhaustive Search. To find our w columns, we will simply enumerate all the tuples j1 to jw and check whether the corresponding column plus the syndrome is equal to zero modulo 2. In detail here i...

Date de création :

05.05.2015

Auteur(s) :

Irene MARQUEZ-CORBELLA, Nicolas SENDRIER, Matthieu FINIASZ

Présentation

Informations pratiques

Langue du document : Anglais
Type : cours / présentation
Niveau : master, doctorat
Durée d'exécution : 5 minutes 17 secondes
Contenu : vidéo
Document : video/mp4
Poids : 131.77 Mo
Droits d'auteur : libre de droits, gratuit
Droits réservés à l'éditeur et aux auteurs. Ces ressources de cours sont, sauf mention contraire, diffusées sous Licence Creative Commons. L’utilisateur doit mentionner le nom de l’auteur, il peut exploiter l’œuvre sauf dans un contexte commercial et il ne peut apporter de modifications à l’œuvre originale.

Description de la ressource

Résumé

In this session, I will detail two combinatorial solutions to the decoding problem. The first one is the Exhaustive Search. To find our w columns, we will simply enumerate all the tuples j1 to jw and check whether the corresponding column plus the syndrome is equal to zero modulo 2. In detail here is how we will do. We have w loops enumerating the indices from j1 to jw, and in the innermost loop, we add the w columns plus the syndrome and either we test the value of the syndrome or we store it depending on what is our need. The cost of this algorithm is at most w(n,w) column additions plus a certain number of tests. In practice, the cost for the test is negligible and we will just ignore that term, and we have this cost for the algorithm. But we can do better. Instead, we may keep track of partial sums. In the first loop, line 1, we add the syndrome to the first column. In the second loop, we add the first partial sum to the second column. We obtain a second partial sum and so on until, in the inner loop, we add the previous partial sum to the last column. If we do this, since each line i is executed (n,i) times, we have a total of column additions which is given here. And this cost is dominated by (n,w), when w is not too large. So, the total cost for the Exhaustive Search is (n,w) column operations. And for that cost, we obtain all the solutions to our problem. We can do better with the Birthday Decoding. In this algorithm, we split the matrix into two equal parts and we will enumerate all solutions by enumerating those two lists using error pattern of weight w/2. If the intersection of those two lists is not empty, then we have a solution to our problem. Here is the algorithm. We first enumerate all errors of weight w/2, compute the syndrome and store each of the computed values. This will cost (n/2,w/2), that is the size of the first list. At this point, we may check the intersection of the two lists, L1 and L2. This last part of the algorithm will cost (L1 * L2)/2 to the size of the syndrome. Coming back to the Birthday Decoding slide, the cost of the above enumeration will be given by the formula here with binomial coefficient which can also be written as 2L + (L²/2^(n-k)) where L is the size common to the two lists. To measure the exact complexity of this algorithm, we have to take into account that an error pattern of weight w splits evenly between the two halves of the matrix with a probability P which may be smaller than one.

"Domaine(s)" et indice(s) Dewey

  • Analyse numérique (518)
  • Théorie de l'information (003.54)
  • données dans les systèmes informatiques (005.7)
  • cryptographie (652.8)
  • Mathématiques (510)

Domaine(s)

  • Analyse numérique
  • Analyse numérique appliquée, calcul numérique, mathématiques numériques
  • Programmation : Algorithmique, langages, conception objet, programmes
  • Informatique
  • Informatique
  • Expression orale et écrite
  • Cryptographie
  • Généralités, philosophie, théorie des mathématiques
  • Généralités
  • Outils, méthodes et techniques scientifiques
  • Didactique des mathématiques
  • Histoire des mathématiques
  • Mathématiques et physique

Document(s) annexe(s)

Fiche technique

Identifiant de la fiche : 32871
Identifiant OAI-PMH : oai:canal-u.fr:32871
Schéma de la métadonnée : oai:uved:Cemagref-Marine-Protected-Areas
Entrepôt d'origine : Canal-U

Voir aussi

Canal-U
Canal-U
05.05.2015
Description : Welcome to the third week of the MOOC on code-based cryptography. This week, we will learn about message attacks. Among the ten sessions of this week, the first six will present the most essential part of generic decoding and the last four will be devoted to more advanced matters. The first session ...
  • algèbre linéaire
  • chiffrement à clé publique
  • cryptage des données
  • cryptographie
  • algorithmes
Canal-U
Canal-U
05.05.2015
Description : In this fifth session, we will study a variant of information set decoding proposed by Lee and Brickell. So, the main idea consists in relaxing the Prange algorithm to amortize the cost of the Gaussian elimination. So, instead of error patterns with all positions on the left, we will allow error ...
  • algèbre linéaire
  • chiffrement à clé publique
  • cryptage des données
  • cryptographie
  • algorithmes