Spline-wavelet bent robust codes
Journal: Scientific and Technical Journal of Information Technologies, Mechanics and Optics (Vol.21, No. 6)Publication Date: 2021-12-24
Authors : Levina A.B. Ryaskin G.A.;
Page : 936-941
Keywords : robust codes; bent functions; spline-wavelet decomposition of information; side channel attacks; attack on computational errors;
Abstract
The paper examines the application and properties of bent functions of various degrees to construct R-robust codes with a spline wavelet grid for the protection against side-channel attacks. The use of the bent function of various degrees in coding algorithms allows changes the robust parameters and the information coding time. Higher degrees of bent functions in robust coding algorithms increase the likelihood of detecting errors in the transmission or storage of data. In comparison, smaller degrees reduce the time for coding information but at the expense of robust properties. As part of the coding algorithm, it is possible to change the degree of the bent function through the use of the spline-wavelet decomposition; for this, it is necessary to change the process of generating the spline-wavelet grid. In this work, bent functions were compiled from nonlinear functions and elements of the spline-wavelet composition. Based on the results obtained, a new construction of a spline-wavelet robust bent code was proposed. The use of spline wavelets allows one to change the designs and parameters of codes during execution, which increases the security of the system against attacker's actions. The distinction between the given code constructions lies in the use of different grids for the splinewavelet transform and in the choice of bent functions of various degrees. The developed design of a robust code has a lower probability of error concealment in the case of using a high-degree bent function, while a lesser degree entails a faster coding time compared to existing robust codes. These code constructions can be used to protect against sidechannel attacks when storing and transmitting information in communication systems.
Other Latest Articles
- Bi-level authentication and mannequin routing for improving security features of WSN-IoT
- Model of information interaction channel routing on the FANET network using fuzzy logic
- An Enhanced Exploration and Exploitation of Modified Grey Wolf Optimizer for Fuzzy Rules Reduction in Cloud Intrusion Detection System (CIDS)
- Research of machine learning methods in the problem of identification of blood cells
- Stochastic software testing for vulnerability analysis
Last modified: 2022-01-10 20:05:18