scispace - formally typeset
Search or ask a question
Author

Franco Chiaraluce

Bio: Franco Chiaraluce is an academic researcher from Marche Polytechnic University. The author has contributed to research in topics: Low-density parity-check code & Block code. The author has an hindex of 26, co-authored 260 publications receiving 2664 citations.


Papers
More filters
Book ChapterDOI
10 Sep 2008
TL;DR: A new variant of the McEliece cryptosystem based on QC-LDPC codes is improved and it is shown that a new attack has been discovered that can recover the private key with limited complexity can be avoided by changing the form of some constituent matrices.
Abstract: We improve our proposal of a new variant of the McEliece cryptosystem based on QC-LDPC codes. The original McEliece cryptosystem, based on Goppa codes, is still unbroken up to now, but has two major drawbacks: long key and low transmission rate. Our variant is based on QC-LDPC codes and is able to overcome such drawbacks, while avoiding the known attacks. Recently, however, a new attack has been discovered that can recover the private key with limited complexity. We show that such attack can be avoided by changing the form of some constituent matrices, without altering the remaining system parameters. We also propose another variant that exhibits an overall increased security level. We analyze the complexity of the encryption and decryption stages by adopting efficient algorithms for processing large circulant matrices. The Toom-Cook algorithm and the short Winograd convolution are considered, that give a significant speed-up in the cryptosystem operations.

153 citations

Journal ArticleDOI
TL;DR: While Eve's channel has a quality equal to or better than that of Bob's channel, it is shown that the use of a hybrid automatic repeat-request protocol with authentication still allows achieving a sufficient level of security.
Abstract: This paper examines the use of nonsystematic channel codes to obtain secure transmissions over the additive white Gaussian noise wire-tap channel. Unlike the previous approaches, we propose to implement nonsystematic coded transmission by scrambling the information bits, and characterize the bit error rate of scrambled transmissions through theoretical arguments and numerical simulations. We have focused on some examples of Bose-Chaudhuri-Hocquenghem and low-density parity-check codes to estimate the security gap, which we have used as a measure of physical layer security, in addition to the bit error rate. Based on a number of numerical examples, we found that such a transmission technique can outperform alternative solutions. In fact, when an eavesdropper (Eve) has a worse channel than the authorized user (Bob), the security gap required to reach a given level of security is very small. The amount of degradation of Eve's channel with respect to Bob's that is needed to achieve sufficient security can be further reduced by implementing scrambling and descrambling operations on blocks of frames, rather than on single frames. While Eve's channel has a quality equal to or better than that of Bob's channel, we have shown that the use of a hybrid automatic repeat-request protocol with authentication still allows achieving a sufficient level of security. Finally, the secrecy performance of some practical schemes has also been measured in terms of the equivocation rate about the message at the eavesdropper and compared with that of ideal codes.

136 citations

Proceedings ArticleDOI
24 Jun 2007
TL;DR: A class of quasi-cyclic low-density parity-check codes that allow to overcome the main limitations of the original McEliece cryptosystem based on Goppa codes, that are large key size and low transmission rate are adopted.
Abstract: We adopt a class of quasi-cyclic low-density parity-check codes that allow to overcome the main limitations of the original McEliece cryptosystem based on Goppa codes, that are large key size and low transmission rate. The codes are designed by using a new algorithm based on "random difference families" that permits to construct very large sets of equivalent codes. An extensive cryptanalysis is developed to verify the security level achievable through a selected choice of the system parameters. While previous versions of the McEliece cryptosystem based on LDPC codes are vulnerable to the considered attacks, a new scheme is proposed that ensures satisfactory system robustness with reduced key size and increased transmission rate. Moreover, it is established that the new cryptosystem can be fast enough to justify its adoption as an alternative to widespread solutions, like RSA.

130 citations

Journal ArticleDOI
TL;DR: A new encryption algorithm for the video signal is presented that, employing suitably arranged chaotic functions, allows to increase the security level while maintaining acceptable processing times.
Abstract: We present a new encryption algorithm for the video signal that, employing suitably arranged chaotic functions, allows to increase the security level while maintaining acceptable processing times. We analyze the performance of the new scheme either though simulation or via practical implementation, thus demonstrating its efficiency, also in comparison with previous proposals.

113 citations

Proceedings ArticleDOI
24 Jun 2007
TL;DR: The authors conclude that some families of QC-LDPC codes, based on circulant permutation matrices, are inapplicable in this context, due to security issues, whilst other codes,based on the "difference families" approach, can be able to ensure a good level of security against intrusions, even if very large lengths are needed.
Abstract: In this paper, a new variant of the McEliece cryptosystem, based on quasi-cyclic low-density parity-check (QC-LDPC) codes, is studied. In principle, such codes can substitute Goppa codes, originally used by McEliece; their adoption, however, is subject to cryptanalytic evaluation to ensure sufficient system robustness. The authors conclude that some families of QC-LDPC codes, based on circulant permutation matrices, are inapplicable in this context, due to security issues, whilst other codes, based on the "difference families" approach, can be able to ensure a good level of security against intrusions, even if very large lengths are needed.

104 citations


Cited by
More filters
01 Jan 2007
TL;DR: In this paper, the authors provide updates to IEEE 802.16's MIB for the MAC, PHY and asso-ciated management procedures in order to accommodate recent extensions to the standard.
Abstract: This document provides updates to IEEE Std 802.16's MIB for the MAC, PHY and asso- ciated management procedures in order to accommodate recent extensions to the standard.

1,481 citations

ReportDOI
08 Dec 1998
TL;DR: In this article, the authors consider the unique features of UWB technology and propose that the FCC should consider them in considering changes to Part 15 and take into account their unique features for radar and communications uses.
Abstract: In general, Micropower Impulse Radar (MIR) depends on Ultra-Wideband (UWB) transmission systems. UWB technology can supply innovative new systems and products that have an obvious value for radar and communications uses. Important applications include bridge-deck inspection systems, ground penetrating radar, mine detection, and precise distance resolution for such things as liquid level measurement. Most of these UWB inspection and measurement methods have some unique qualities, which need to be pursued. Therefore, in considering changes to Part 15 the FCC needs to take into account the unique features of UWB technology. MIR is applicable to two general types of UWB systems: radar systems and communications systems. Currently LLNL and its licensees are focusing on radar or radar type systems. LLNL is evaluating MIR for specialized communication systems. MIR is a relatively low power technology. Therefore, MIR systems seem to have a low potential for causing harmful interference to other users of the spectrum since the transmitted signal is spread over a wide bandwidth, which results in a relatively low spectral power density.

644 citations

Journal ArticleDOI
TL;DR: A survey of routing protocols for Wireless Sensor Network is given and their strengths and limitations are compared.
Abstract: Advances in wireless sensor network (WSN) technology has provided the availability of small and low-cost sensor nodes with capability of sensing various types of physical and environmental conditions, data processing, and wireless communication. Variety of sensing capabilities results in profusion of application areas. However, the characteristics of wireless sensor networks require more effective methods for data forwarding and processing. In WSN, the sensor nodes have a limited transmission range, and their processing and storage capabilities as well as their energy resources are also limited. Routing protocols for wireless sensor networks are responsible for maintaining the routes in the network and have to ensure reliable multi-hop communication under these conditions. In this paper, we give a survey of routing protocols for Wireless Sensor Network and compare their strengths and limitations.

582 citations