Noise-Enhanced High-Memory Codes
- The paper introduces a novel construction of high-memory convolutional codes enhanced by deliberate noise and dense masking to secure public-key cryptography against classical and quantum attacks.
- It employs directed-graph decryption, high constraint-length coding, and polynomial division to achieve exponential adversarial complexity while ensuring efficient decryption for legitimate users.
- The scheme scales linearly with plaintext length and resists advanced attacks like Information-Set Decoding, making it a promising candidate for post-quantum cryptographic applications.
Noise-Enhanced High-Memory Convolutional Codes (NE-HMCC) constitute a cryptographic construction employing directed-graph decryption of convolutional codes with substantially increased memory and deliberate noise injection. This approach produces public keys with generator matrices statistically indistinguishable from random linear codes, ensuring robust resistance to both classical and quantum cryptanalytic attacks. NE-HMCC integrates high constraint-length coding, dense masking, and polynomial division to facilitate efficient decryption for legitimate users while imposing exponential complexity on adversaries, making it a compelling scheme for scalable, quantum-resistant public-key cryptography (Ariel, 2 Dec 2025).
1. Code Structure and Masked Generator Construction
The NE-HMCC scheme begins with a base convolutional code (CC) of rate (typically for exposition, but the construction allows arbitrary rates). The memory parameters are (original CC memory) and (high-memory extension), yielding an overall constraint length and trellis size up to states. The base generator polynomials are
with , and the high-memory "masking" polynomials are
with , chosen so and .
The high-memory generator is constructed as
which in block form is a matrix of full rank , with . This structure inherently includes periodicity and algebraic structure that must be obscured for security.
To achieve a dense and random-like public matrix, a masking operation is applied. A small mask space of rank is selected, and a dense mask (the set of all linear combinations of rows from ) is drawn. The masked generator is
which is then obfuscated through two further transformations: , where is a random nonsingular matrix and a random permutation. The public key is where is the encryption bit-flip probability and a CRC polynomial; the private key is the tuple .
2. Noise-Enhancement and Ambiguity Mechanisms
Noise enhancement is central to the NE-HMCC security and decryption strategy. Encryption proceeds by computing and applying independent bit-flips with probability , yielding ciphertext , .
Decryption intensifies the noise through polynomial division at each block. In block , the operation is: where is the inverse-permuted ciphertext and is each mask candidate. The resulting quotient accumulates not only input bit-flip errors, but also additional "division noise." The total noise affecting the legitimate decoder is where is the total increase in error weight from division.
By carefully selecting mask polynomials (e.g., ) with widely spaced taps, both the trellis capacity and resistance to structural cryptanalysis are enhanced.
3. Decryption Workflow and Polynomial Ambiguity
Decryption proceeds through the following steps:
- Inverse Permutation: Apply to the ciphertext to recover .
- Mask Ambiguity: For all possible mask vectors , form .
- Blockwise Division: De-interleave into blocks, divide each by , and collect quotients.
- Re-interleaving and Decoding: Each mask candidate yields a separate candidate , providing length- vectors, each decoded via Viterbi in parallel (complexity ).
- Plaintext Recovery: The candidate with minimal decoding distance (close to ) is selected. CRC validation ensures correctness; if unsuccessful, the process iterates or requests retransmission.
The mask ambiguity is tractable for legitimate users (with typical ) but yields a combinatorial barrier for attackers. Incorrect mask choices inflate the Hamming distance of decoded candidates, efficiently distinguishing the correct plaintext in high probability.
4. Security Margins and Cryptanalytic Resistance
NE-HMCC achieves indistinguishability of from random linear codes, with full rank and row/column weights close to making all linear and parity structure tests ineffective. Dual-codewords can occur only with vanishing probability , while mask entropy provides possible combinations, making mask-space enumeration infeasible given ciphertext noise.
Information-Set Decoding (ISD) is the main generic attack vector. With effective error weight : and, for quantum ISD:
Compared to Classic McEliece (e.g., Goppa ), NE-HMCC with parameters , , , , yields , and , exceeding McEliece security margins by over in exponent (a margin).
Resistance to "known-CC" attacks—where attackers have but not —is guaranteed by the impractically large permutation/mask search space and the exponential complexity of all plausible decoding strategies.
5. Decryption Complexity and Scalability
Legitimate decryption requires add-compare-select (ACS) operations. For fixed (), this complexity is , supporting linear-time scaling with plaintext length and uniform per-bit cost. Parallel hardware implementations, such as arrays of directed-graph decoders, are feasible, with ACS modules mapped efficiently to ASIC, FPGA, or closely coupled RISC-V cores. For , , ACS/bit operations are well within capabilities of contemporary mobile or embedded hardware, delivering Mbps throughput.
6. Analytical Formulas and Bounds
Key analytical results that support the security and performance claims include:
- Error-Propagation Bound:
- Gilbert Bound for Incorrect-Candidate Distance:
where .
- ISD Complexity Estimates:
- Decoding Ambiguity: With -bit mask uncertainty, decoding candidates are separated by decoding distances such that only the correct candidate achieves minimal (close to ) Hamming distance with high probability.
7. Significance in Post-Quantum Cryptography
NE-HMCC harmonizes high constraint-length convolutional codes, dense masking, random transformation, and controlled noise injection to yield a public code statistically indistinguishable from random. This supports polynomial-time decryption for legitimate users and exponential-cost attacks (ISD or otherwise) for adversaries. The resulting scheme provides security margins surpassing Classic McEliece by classically and quantumly, offers hardware-friendly, scalable decryption, and admits arbitrary plaintext lengths with uniform per-bit cost (Ariel, 2 Dec 2025). The architectural properties and cryptanalytic barriers position NE-HMCC as a strong candidate for scalable, robust, and high-security public-key systems in the post-quantum era.