Abstract
In this paper, the critical noise beyond which no convergence can be expected is determined for iterative decoding with belief propagation of binary linear block codes over the binary symmetric channel. This value is derived developing the self composition channel model first introduced for iterative a-posteriori-probability decoding. These results are then applied to the cryptanalysis of a keystream generator based on linear feedback shift registers.
This research was supported in part by the National Science Foundation under Grant CCR-97-32959, by the Science Fund of Serbia under Grant 04M02, through the Mathematical Institute, Serbian Academy of Science and Arts and by the Japan Society for Promotion of Science (JSPS) under Contract JSPS-RFTF-96P00604.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
A.M. Chan and F.R. Kschischang, “A simple taboo-based soft-decision decoding algorithm for expander codes,” IEEE Commun. Lett., vol. 2, pp. 183–185, 1998.
V. Chepyzhov and B. Smeets, “On fast correlation attack on certain stream ciphers,” Advances in Cryptology-EUROCRYPT’ 91, Lecture Notes in Computer Science,vol. 547, pp. 176–185, 1991.
G. C. Clark, Jr. and J. B. Cain, Error-Correcting Coding for Digital Communications. New York: Plenum Press, 1982.
A. Clark, J. Dj. Golić, and E. Dawson, “A comparison of fast correlation attacks,” Fast Software Encryption-Cambridge’ 96, Lecture Notes in Computer Science, vol. 1039, pp. 145–157, 1996.
M.P.C. Fossorier, M. Mihaljević and H. Imai, “Reduced complexity iterative decoding of low density parity check codes based on belief propagation,” IEEE Trans. Commun., vol. 47, pp. 673–680, May 1999.
R. G. Gallager, “Low-density parity-check codes,” IRE Trans. Inform. Theory, vol. IT-8, pp. 21–28, Jan. 1962.
M.G. Luby, M. Mitzenmacher, M.A. Shokrollahi and D.A. Spielman, “Analysis of Low Density Codes and Improved Designs Using Irregular Graphs,” 30th ACM STOC, May 1998.
R. Lucas, M. Bossert, and M. Breitbach, “On Iterative soft-decision decoding of linear binary block codes and product codes,” IEEE Jour. Select. Areas Commun., vol. 16, pp. 276–298, Feb. 1998.
D.J.C. MacKay, “Good error-correcting codes based on very sparse matrices,” IEEE Trans. Inform. Theory, vol. 45, pp. 399–431, Mar. 1999.
D.J.C. MacKay, “Free Energy Minimization Algorithm for Decoding and Cryptanalysis,” Electronics Lett., vol. 31, pp. 446–447, Mar. 1995.
J. L. Massey, Threshold Decoding. Cambridge, MA: MIT Press, 1963.
W. Meier and O. Staffelbach,“ Fast correlation attacks on certain stream ciphers,” Journal of Cryptology, vol. 1, pp. 159–176, 1989.
A. Menezes, P.C. van Oorschot and S.A. Vanstone, Handbook of Applied Cryptography. Boca Raton: CRC Press, 1997.
M. Mihaljević and J. Golić, “A comparison of cryptanalytic principles based on iterative error-correction,” Advances in Cryptology-EUROCRYPT’ 91, Lecture Notes in Computer Science, vol. 547, pp. 527–531, 1991.
M. Mihaljević and J. Golić, “A method for convergence analysis of iterative error-correction decoding,” ISITA 96-1996 IEEE Int. Symp. Inform. Theory and Appl., Canada, Victoria, B.C., Sep. 1996, Proc. pp. 802–805 and submitted to IEEE Trans. Inform. Theory, Apr. 1997.
J. Pearl, Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. San Mateo, CA: Morgan Kaufmann, 1988.
T. Richardson and R. Urbanke, “The Capacity of Low-Density Parity Check Codes under Message-Passing Decoding,” submitted to IEEE Trans. Inform. Theory, Nov. 1998.
T. Siegenthaler, “Decrypting a class of stream ciphers using ciphertext only,” IEEE Trans. Comput., vol. C-34, pp. 81–85, 1985.
M. Sipser and D.A. Spielman, “Expander codes,” IEEE Trans. Inform. Theory, vol. 42, pp. 1710–1722, Nov. 1996.
K. Yamaguchi, H. Iizuka, E. Nomura and H. Imai, “Variable Threshold Soft Decision Decoding,” IEICE Trans. Elect. and Commun., vol. 72, pp. 65–74, Sep. 1989.
K. Zeng, C.H. Yang and T.R.N. Rao, “An improved linear syndrome method in cryptanalysis with applications,” Advances in Cryptology-CRYPTO’ 90, Lecture Notes in Computer Science, vol. 537, pp. 34–47, 1991.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Fossorier, M.P.C., Mihaljević, M.J., Imai, H. (1999). Critical Noise for Convergence of Iterative Probabilistic Decoding with Belief Propagation in Cryptographic Applications. In: Fossorier, M., Imai, H., Lin, S., Poli, A. (eds) Applied Algebra, Algebraic Algorithms and Error-Correcting Codes. AAECC 1999. Lecture Notes in Computer Science, vol 1719. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-46796-3_28
Download citation
DOI: https://doi.org/10.1007/3-540-46796-3_28
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-66723-0
Online ISBN: 978-3-540-46796-0
eBook Packages: Springer Book Archive