Cryptography Reference
In-Depth Information
Abschn. 8.5.5
x 14 +
x 13 +
x 12 +
x 9 +
x 6 +
x 3 +
x 2 +
1. b
(
x
)=
x
+1
0. b/
A
1. s 1 =
α 1 )=(
α 14 +
α 13 +
α 12 +
α 9 +
α 6 +
α 3 +
α 2 +
b
(
x
=
α
+1)
mod M
(
α
)=
α,
s 2 = s 1 = α 2 ,s 3 = b ( x = α 3 )=1 ,s 4 = s 2 = α 4 ,
s 5 =
α 5 )=1
s 3 =1
b
(
x
=
,s 6 =
α 2 σ 2 +
α 4
2. ασ 3 +
σ 1 =
α 2 σ 3 +
α 4 σ 1 =1
σ 2 +
α 4 σ 2 +
x 3 +
αx 2 +
α 9 x
α 11
σ 3 +
σ 1 =1 −→
σ
(
x
)=
+
α 3 ,x 2 =
α 10 ,x 3 =
α 13
3. x 1 =
x 13 +
x 10 +
x 3
e
(
x
)=
x 14 +
x 12 +
x 10 +
x 9 +
x 6 +
x 2 +
b korr (
x
)=
x
+1
2. b korr, 0 =
b korr, 1 = (110010001111010)
3. b 1 =( α 4 000000)
:
0. b 1 ∈ A
1. s 1 =
α 1 )=
α 3 ,s 2 =
α 2 )=
α 2
b
(
x
=
b
(
x
=
2. α 3 σ 1 =
α 2
α 6
−→
σ
(
x
)=
x
+
α 6
y 1 x 6
3. x 1 =
−→
e
(
x
)=
α 4 x 6
4. s 1 =
y 1 x 1 −→
e
(
x
)=
−→
b 1 ,korr = (0000000)
A
b 2 =( α 4 0000 α 2 0)
:
0. b 2 /
A
α 1 )=0
α 2 )=
1. s 1 =
b
(
x
=
,s 2 =
b
(
x
=
α
2. 0
σ 1 =
α
−→
nicht lösbar, Rekonstruktionsversagen
α 0 α 0 α 0 α 0 )
4. b
= (00000000000
0. b∈ A
1. s 1 =
α 12 ,s 2 =
α 9 ,s 3 =
α 12 ,s 4 =
α 3 ,s 5 =1
α 9
,s 6 =
x 3 +
α 12 x 2 +
α 9 x
α 12
2. σ
(
x
)=
+
(2 4 )
3. Für alle x
GF
ist σ
(
x
) =0
. Es liegen mehr als f k Fehler und damit
Rekonstruktionsversagen vor.
5. a) b
α 2 0 α 5 α 5 αα 6 0)
α 0 5 );
=(
,U
=(
ρ
=2
,f k =2
0. b/
A
1. s 1 =
α 4 ,s 2 =
α 5 ,s 3 =
α,s 4 =
α
2. Abarbeitungsprotokoll:
i
Δ i Λ(
x
)
l B
(
x
)
T
(
x
)
1
0 1
1
1+
x
1
1+
x
α 4 x
α 5 x 2
α 4 x
α 5 x 2
1+
+
1+
+
2
2
α 2 x
α 6 x 3
3 α 6 +
α 3 x
α 4 x 2
α 2 x
α 6 x 3
3 α
1+
+
+
1+
+
α 6 x
α 4 x 2 +
αx 3
α 6 x
α 3 x 2 +
α 4 x 3 1+
α 6 x
α 4 x 2 +
αx 3
4 α
1+
+
+
+
Λ( x ) BM =1+ α 6 x + α 4 x 2 + αx 3 ; ν =3 2=1 .
−→
Ausgabe:
x 3 +
α 6 x 2 +
α 4 x
−→
σ
(
x
)=
+
α (Anwendung Gl. (8.45))
α 3
3. x 3 =
Search WWH ::




Custom Search