IMACS ACA '96

Coding Theory and Cryptology

Organizer

Shojiro Sakata (sakata@cs.uec.ac.jp)
University of Electro-Communications
Faculty of Electro-Communications
Department of Computer Science and Information Mathematics
1-5-1 Chofugaoka, Chofu-shi, Tokyo 182, JAPAN
Tel: 81-424-83-2161 (ext. 4386)
Fax: 81-424-87-9104

Description

The session is devoted to providing a forum for exchange of ideas and research results related to computer algebra (software and/or hardware) systems and algorithmic treatment of all kinds of symbolic objects in application to coding theory and cryptography. Nowadays error-correcting codes and cryptographic systems are important from both theoretical and practical reasons, and there have been done many interesting investigations on them recently. We notice that Computer Algebra, i.e. constructive algebraic methods and algebraic computations with developments and applications of computational tools and systems are indispensable to theoretical and practical works also in the field of coding theory and cryptology.

Talks

  1. IDEAS: A Computer-algebra-based Chip Design Environment for Algebraic Computation, Coding and Signal Processing
    Armin Nueckel
    Abstract: In general, commercial synthesis products are only able to generate quite inefficient gate level netlists based on boolean functions or so called RT-level models. Motivated by the observation, that problems in very large areas of engineering are specified in terms of mathematical expressions, the IAKS (Institut für Algorithmen und Kognitive Systeme, Prof. Beth) started a long term research project called IDEAS (Intelligent Designs Environment for Algorithms and Systems). The main goal of this project was the development of algebraic algorithm and optimization methods, very comparable to the principle of boolean optimization. As a result of this project, the first fully integrated design environment for algebraic algorithm engineering based on computer algebra systems was implemented at the IAKS. The talk will describe the general structure of the design environment and demonstrates the design style based on some application examples.

  2. Algebra for Optical Computing and Quantum Computing
    Thomas Beth, Markus Grassl and Joern Mueller-Quade
    Abstract: Optical and quantum mechanical systems enjoy a great intrinsic parallelism that can be used to speed-up computations. As both types of systems are linear, designing these systems leads to the problem of factoring a given matrix into matrices corresponding to the computational primitives of the physical system.
    We present an algebraic approach to this "programming" problem for optical computing and quantum computing.
    For optical systems, the computational primitives are diffractive elements corresponding to diagonal matrices and wave propagation modelled by the Fresnel transformation. We show that, in principle, any linear transformation can be realized optically up to a scalar factor, but possibly with many diffractive elements. In practice, optical setups with a small number of diffractive elements are of interest. We present a divide and conquer algorithm for the design of 8f-systems, i. e., systems with up to four lenses and three arbitrary diffractive elements.
    Computations in quantum mechanical systems are specified by unitary matrices acting on a Hilbert space which is a tensor product of smaller subspaces. The computational primitives are unitary transformations acting on these subspaces. In principle, any unitary transformation can be factored into such basic transformations. For complexity reasons we are interested in a factorization with a small number of factors. We present an algebraic approach to find a "factorization" similar to that for optical systems.
    Solving the equations arising in the design problem is equivalent to computing the inverse of a rational mapping. For this mapping, a decomposition can be derived from a tower of unirational function fields. We discuss how to compute the intermediate fields using Groebner bases and primary decomposition. Algorithms using such a functional decomposition solve the nonlinear equations faster than more universal methods.

  3. Cryptographic Aspects Of Real Quadratic Congruence Function Fields
    Andreas Stein
    Abstract: We show how the theory of real quadratic congruence function fields can be used to produce a secure key distribution protocol. The technique is similar to that advocated by Diffie and Hellman in 1976, but instead of making use of a group for its underlying structure, makes use of a structure which is ``almost'' a group. The method is an extension of the recent ideas of Scheidler, Buchmann and Williams, but, because it is implemented in these function fields, several of the difficulties with their protocol can be eliminated. A description of the protocol is provided, together with a discussion of the difficulty of the so-called discrete logarithm problem (DLP) in real quadratic congruence function fields. In this context, we will point out that the DLP for real quadratic congruence function fields of genus one is equivalent to the DLP for elliptic curves over finite fields.

  4. On Certain Torsion Subgroups of Jacobians of Decomposable Curves of Genus 2 and Its Applications to Symbolic Integration and Primality Proving
    Franck Leprevost
    Abstract: Given two elliptic curves $E_1$ and $E_2$ defined over a number field $K$, we construct under some assumptions a curve $C$ of genus 2 defined over $K$ such that its jacobian is $K$-isogenous to the product $E_1 \times E_2$ (following Serre, one says that the jacobian of a curve of genus $g$ is decomposable if its jacobian is isogenous to a product of $g$ elliptic curves). If $E_1$ and $E_2$ have a non-trivial rational torsion subgroup, this method allows to produce some curves of genus 2 with a ``big'' rational torsion group. We achieve this in the case $K=\Q$ (the field of rational numbers), and break the previous record for the order of a rational torsion subgroup of the jacobian of a curve of genus 2, and produce by the way a minoration of the conjectural bound in the dimension 2 case. The conjecture we refer to is the uniform boundness conjecture for the order of the torsion groups of abelian varieties. Thanks to a theorem of Risch, by-products take place in the problem of the integration of algebraic functions. Another more cryptographical application is connected with ``primality proving''.

    (short break)

  5. Groebner Basis: A Bridge between Coding Theory and Computer Algebra
    Shojiro Sakata
    Abstract: In this talk we give a survey of
    1. when the concept of Groebner basis has been introduced into the world of coding theory;
    2. how the concept of Groebner basis has been applied to construction and decoding of error-correcting codes,
    and discuss some important roles of Groebner basis in recent development of coding theory. It is emphasized that Buchberger's algorithm and its relatives take their parts just at the point of contact of coding theory with system theory and that Groebner basis is a key not only to full decoding of the most frequently used error-correcting codes such as Reed-Solomon and Bose-Chaudhuri-Hocquenghem codes but also to construction and efficient decoding method of the next generation of error-correcting codes called algebraic-geometry codes.

  6. Computing Groebner Bases for Finding Codewords of Small Weight
    Daniel Augot
    Abstract: We describe a relationship between codewords of small weight in codes and algebraic systems of equations. These systems are constructed from the (generalized) Newton's identities, and solving these systems is equivalent to find codewords of weight less than a given weight. We propose to compute a Groebner basis of the system, by using the Buchberger algorithm, or variants. These is a complexity barrier, which make the method inefficient for long codes. However, for small length, valuable information is obtained on codewords, because their Fourier transform is then known. Examples are given.

______________
__________________________________________

Previous page RISC SWP Linz Austria