1 / 17

Exploration of Cryptology and BCH Codes - PowerPoint PPT Presentation

Exploration of Cryptology and BCH Codes. By: Carla Sorrell. Thesis Advisor: Dr. Jennifer Hontz. Introduction. Overview of Cryptology. History of Cryptology. BCH Codes. Algebraic Approach with Maple. New Method for BCH Codes. Application to Education. Further Research and Exploration.

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.

PowerPoint Slideshow about 'Exploration of Cryptology and BCH Codes' - nash

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

and BCH Codes

By: Carla Sorrell

• Overview of Cryptology

• History of Cryptology

• BCH Codes

• Algebraic Approach with Maple

• New Method for BCH Codes

• Application to Education

• Further Research and Exploration

Cryptanalysis

Cryptology

Overview of Cryptology

Interesting Points:

Caesar cipher

History of Cryptology

• Enigma

• Jefferson Cylinder

• Bose-Chaudhuri-Hocquengham codes

• Error correcting code

• Subclass of cyclic codes

• Information transmitted via the Internet

• Data stored on a computer

• Encoded music

• Photograph Transmission

• Data transmission

2-Errors

• Primitive Polynomial or Not?

• Generator Element

• Cosets

• Not disjoint

• Therefore and thus, .

• So

Ideal:

Word ____________ power of___

100 1 =1

010 x

001

101

111

110 1+x

011

000 0 -

• The parity check matrix of G: 7X6

=H

• Syndromes:

• Multiply received word by matrix H

• Find syndromes

[1111001][H]=[001100]

=001=

=100= =

=

• Where the sum of two words :

• The roots are at and .

• Error Polynomial:

• Corrected Polynomial:

• Using Maple to approach BCH codes

• Maple Commands

Theorem by Yi-Chang Cheng, Erl Huei Lu, To Chang, and Po-Chiang Lu

For =1 or 2, if and only if

where is the number of errors in received vector, or block length

Cyclic Shift Theorem

For either =1 or 2,

if and only if .

• Students break the code to learn information for other subjects.

• Students gain skills in the content and process standards.

• Start simple with simple cipher, cryptograms, and matching or word search to learn history, and move to more advanced activities.

• Further Exploration

• Questions