Page 57 - ISCI’2017
P. 57

  g r  0   ...  0 
                                                     g   g    ...  0  
                                                     r  1 −  r      
                                                     ...  ...  ... ... 
                                                                    
                                                     g 1  g 2  ... g r 

            is invertible. Consequently, the validation matrix

                                                             ( )
                                                            −
                                                            1
                                    1     1    ...  1     G α 1    0      ...    0   
                                    α    α     ...  α      0     G − 1 (α ) ...   0    
                              H =    1     2         n                 2                 =
                                    ...   ...  ...  ...     ...    ...    ...   ...  
                                    r−  1  r−  1    r−  1                               
                                    α  1  α  2  ... α  n     0     0      ... G − 1 (α n   )
                                           G α  −  1 ( )  G −  1 (α  )  ...  G −  1 (α  ) 
                                                  1
                                           α  G α  −  1 ( )  α  G −  1 (α  2  )  ...  α  G −  1 (α  n  )  
                                       =    1     1      2     2         n      n 
                                              ...          ...     ...      ...    
                                           r−   1  −  1  r−  1  −  1    r−  1  −  1    
                                           α  1  G  (α  1 ) α  2  G  (α  2 ) ... α  n  G  (α  n   )

            also determines the (n, k, d)-Goppa code Г(L, G) over GF(q).
                                                                          -1
                                                             -1
                                                                                           -1
               The last expression at Y = (Y1, Y2, …, Yn), Y1 = G (α1), Y2 = G (α2), …, Yn = G (αn) is equivalent
            to the expression (15). The validation matrix Г(L, G) over GF(q) with the elements from GF(q) can
                                                                       m
            obtain by a way of representation of each element from GF(q ) column-vector of length  m-symbols
            from  GF(q). Following estimate is valid.

                  Theorem 3 [40, 42, 43]. The parameters (n, k, d) Goppa code Г(L, G) connects by the following
            expressions: n = L, k ≥ n – mr, r = deg G(x), d ≥ r + 1.

                  For separable the binary Goppa codes (when the polynomial G(x) has not any multiple radicals

            in any extension of the field) the minimal code distance is equal to d ≥ 2r + 1. At the same, if G(x) is
                                                           m
            an irreducible polynomial of degree r over GF(q ) and L = GF(q ), then the Goppa code exists over
                                                                           m
                 m
            GF(q ), which are lying on the Gilbert–Varshamov bound [40, 42, 43].
                  Theorem 3  guarantees the existence of alternantive codes, which  have  built via the Goppa
            polynomial, with the code characteristics, which satisfying (1) and (2). The block codes, which are

            lying above the Gilbert–Varshamov bound [40, 42, 43], can be built at the appropriate choice of the
            vector template Y = (Y1, Y2, …, Yn). This property of the considered above code schemes indicates to

            a prospect  of using of the alternantive codes,  includes the  Goppa codes  to solve of different
            engineering problems both in improving noise immunity of data transmission and for cryptographic

            protection of information resources. In particular, use of the considered provisions of the algebraic

            theory of block codes in cryptographic purposes allows to realize asymmetric cryptosystems of the
            provable security, which  in addition to high-speed two-key cryptographic transformation and the

            possibility to combine error checking with a protection against unauthorized familiarization [15-22],
            they remain steadfast, even in the case of quantum computing [28].


                                                                                                          57
   52   53   54   55   56   57   58   59   60   61   62