CYBERSECURITY REINFORCED: LDPC AND THE STOPPING SET ALGORITHM FOR ERROR-FREE CRYPTOGRAPHIC COMMUNICATION
Abstract
This research investigates the integration of Low-Density Parity-Check (LDPC) codes and the Stopping Set Algorithm into cryptographic communication systems to enhance security and reliability. LDPC codes, known for their exceptional error-correcting capabilities, are employed to safeguard data during transmission. The Stopping Set Algorithm further fortifies the security of cryptographic communication by identifying vulnerabilities within the LDPC code structure. Through an in-depth analysis and experimental validation, this study demonstrates the effectiveness of this combined approach in ensuring error-free and secure cryptographic communication. The findings underscore the potential of LDPC and the Stopping Set Algorithm as powerful tools for strengthening cybersecurity in communication systems.
Keywords
Cryptographic Communication, Cybersecurity, Stopping Set Algorithm
References
- Stopping Set Distribution of LDPC Code Ensembles :Alon Orlitsky, Member, IEEE, Krishnamurthy Viswanathan, and Junan Zhang, Student Member,IEEE.March 2005
- Wireless Information-Theoretic Security. Matthieu Bloch, Student Member, IEEE, Joo Barros, Member, IEEE, Miguel R. D. Rodrigues, Member, IEEE, and Steven W. McLaughlin, Fellow, IEEE 2008.
- The Wiretap Channel with Feedback: Encryption over the C hannel Lifeng Lai, Hesham El Gamal and H. Vincent Poor 2007.
- An Efficient Algorithm to Find All Small-Size Stopping Sets of Low-Density Parity-Check Matrices Eirik Rosnes, Member, IEEE, and yvind Ytrehus, Senior Member, IEEE 2009.
- IRE TRANSACTIONS ON IFORMATION THEORY 21 Low-Density parity-Check Codes20056] Achieving the Secrecy Capacity of WiretapChannels Using Polar Codes Hessam Mahdavifar, Student Member, IEEE, and Alexander Vardy, Fellow, IEEE 2011
- Information-Theoretic Key Agreement: FromWeak to Strong Secrecy for Free Ueli Maurer and Stefan Wolf Computer Science Department, Swiss Federal Institute of Technology (ETH Zurich)
- Physical-Layer security:Combining Error Control Coding and Cryptography Willie K Harrison and Steven W. McLaughlin IEEE 2008.
- [Herbert Schild] The Complete Reference JAVA, Mc Graw Hill2007.
- Jonathan K nudsen,Java Cryptography, Oreilly1998.11] cryptography-network-security-5th-edition.