
ADVANCING ERROR-FREE CRYPTOGRAPHIC COMMUNICATION WITH LDPC CODES AND THE STOPPING SET ALGORITHM
Prof. Bharat Soni , Dept of information technology, SPCOE(Otur), IndiaAbstract
This study investigates the application of Low-Density Parity-Check (LDPC) codes in enhancing error-free cryptographic communication, leveraging the Stopping Set Algorithm for improved reliability. LDPC codes are known for their capacity to achieve near-Shannon limit performance in error correction, making them suitable for secure data transmission. The Stopping Set Algorithm plays a crucial role in identifying critical error patterns that could compromise communication integrity. This research explores the synergy between LDPC codes and the Stopping Set Algorithm, evaluating their effectiveness in mitigating errors and enhancing the security and efficiency of cryptographic communication systems. Results demonstrate significant improvements in error detection and correction capabilities, highlighting the potential of LDPC-based approaches to advance secure communication protocols.
Keywords
LDPC codes, Stopping Set Algorithm, Error-free communication
References
Stopping Set Distribution of LDPC Code Ensembles :Alon Orlitsky, Member, IEEE, Krishnamurthy Viswanathan, and Junan Zhang, Student Member,IEEE.March 2005
Wireless Information-Theoretic Security. Matthieu Bloch, Student Member, IEEE, Joo Barros, Member, IEEE, Miguel R. D. Rodrigues, Member, IEEE, and Steven W. McLaughlin, Fellow, IEEE 2008.
The Wiretap Channel with Feedback: Encryption over the C hannel Lifeng Lai, Hesham El Gamal and H. Vincent Poor 2007.
An Efficient Algorithm to Find All Small-Size Stopping Sets of Low-Density Parity-Check Matrices Eirik Rosnes, Member, IEEE, and yvind Ytrehus, Senior Member, IEEE 2009.
IRE TRANSACTIONS ON IFORMATION THEORY 21 Low-Density parity-Check Codes20056] Achieving the Secrecy Capacity of WiretapChannels Using Polar Codes Hessam Mahdavifar, Student Member, IEEE, and Alexander Vardy, Fellow, IEEE 2011
Information-Theoretic Key Agreement: FromWeak to Strong Secrecy for Free Ueli Maurer and Stefan Wolf Computer Science Department, Swiss Federal Institute of Technology (ETH Zurich)
Physical-Layer security:Combining Error Control Coding and Cryptography Willie K Harrison and Steven W. McLaughlin IEEE 2008.
[Herbert Schild] The Complete Reference JAVA, Mc Graw Hill2007.
Jonathan K nudsen,Java Cryptography, Oreilly1998.11] cryptography-network-security-5th-edition.
Article Statistics
Downloads
Copyright License
Copyright (c) 2024 Prof. Bharat Soni

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Copyright and Ethics:
- Authors are responsible for obtaining permission to use any copyrighted materials included in their manuscript.
- Authors are also responsible for ensuring that their research was conducted in an ethical manner and in compliance with institutional and national guidelines for the care and use of animals or human subjects.
- By submitting a manuscript to International Journal of Computer Science & Information System (IJCSIS), authors agree to transfer copyright to the journal if the manuscript is accepted for publication.