Page 46 - ISCI’2017
P. 46

1 General provisions of the algebraic theory of block codes used to describe the theoretical

            and code schemes


            Let us introduce new terms and definitions of the algebraic coding theory [38-40] used in further at a
            consideration of the asymmetric code cryptosystems (theoretical-code schemes),  includes the

            algorithms of formation and checking of the electronic digital signature (EDS).
               Will  fix the  finite field  GF(q)  and will consider a vector space  Vn  as a set  n-sequences with

            elements from GF(q) with a component wise addition and multiplication to a scalar.

               Linear (n, k, d)-code Vk over the field GF(q) is a subspace into Vn, i.e. non-empty set of n-sequences
            (code words) with elements from GF(q), where k is a dimension of the linear space, d is the minimal

            Hamming weight (number of nonzero elements) wh(c) of a random non-zero code word c of the code
            Vk:

                                                    d =  min w    (c ) .
                                                        ∀ c∈ V k  ,c≠ 0  h
               Based on a linearity of subspace Vk a set of weights of different non-zero code words matches with
            a set of Hamming distances  among different code words, i.e. a value  d  also calls the  minimal

            Hamming code distances of the code Vk. The value R = k / n calls the relative code rate, and the value

            δ = d / n calls the relative minimal code distance.
               The main problem of the redundant coding theory has been formulated firstly in K. Shannon’s

            publication [41]: will find codes with the with a high relative rate R and with a high minimal distance
            d. This problem follows from the follow theorem.

               Theorem  1  [41].  Let  С(P0)  is a bandwidth of the discrete symmetric  channel with the error

            probability P0. Then for any ε > 0, if R < С(P0) and n is sufficiently large, (n, k, d)-code exists with

            relative rate k / n ≥ R, the error probability of which is equal to Perror < ε.
               This theorem is proved by the probabilistic methods and doesn’t give to us any mechanism to

            building of codes with the high R and δ. The following evaluation (the Gilbert–Varshamov bound) is

            valid for linear block codes.
               Theorem 2 [40]. If the following equality is performed

                                                         d −2
                                                                     )
                                                                     i
                                                  q n −k  ≥  ∑ C n i −1 ( −1 ,                                                          (1)
                                                                q
                                                         i =0
            then the linear (n, k, d)-code on the field GF(q) exists.
            In practice, the asymptotic boundaries often use that give a representation about the limited code
            characteristics at the indefinitely high code length. Logarithm of the expression (1), then we obtain

                                                            −2
                                                                         
                                                           d
                                                                        i
                                               n − k  ≥ log q   ∑ C i n −1 ( −1q  )  .
                                                           =0i          
            46
   41   42   43   44   45   46   47   48   49   50   51