Papers
Topics
Authors
Recent
2000 character limit reached

Noise-Enhanced High-Memory Codes

Updated 9 December 2025
  • The paper introduces a novel construction of high-memory convolutional codes enhanced by deliberate noise and dense masking to secure public-key cryptography against classical and quantum attacks.
  • It employs directed-graph decryption, high constraint-length coding, and polynomial division to achieve exponential adversarial complexity while ensuring efficient decryption for legitimate users.
  • The scheme scales linearly with plaintext length and resists advanced attacks like Information-Set Decoding, making it a promising candidate for post-quantum cryptographic applications.

Noise-Enhanced High-Memory Convolutional Codes (NE-HMCC) constitute a cryptographic construction employing directed-graph decryption of convolutional codes with substantially increased memory and deliberate noise injection. This approach produces public keys with generator matrices statistically indistinguishable from random linear codes, ensuring robust resistance to both classical and quantum cryptanalytic attacks. NE-HMCC integrates high constraint-length coding, dense masking, and polynomial division to facilitate efficient decryption for legitimate users while imposing exponential complexity on adversaries, making it a compelling scheme for scalable, quantum-resistant public-key cryptography (Ariel, 2 Dec 2025).

1. Code Structure and Masked Generator Construction

The NE-HMCC scheme begins with a base convolutional code (CC) of rate k/nk/n (typically k=1k=1 for exposition, but the construction allows arbitrary rates). The memory parameters are pp (original CC memory) and qq (high-memory extension), yielding an overall constraint length m=p+qm = p + q and trellis size up to 2p+q2^{p+q} states. The base generator polynomials are

Gp(x)=[p0(x),p1(x),,pn1(x)]G_p(x) = [\,p_0(x),\,p_1(x),\,\ldots,\,p_{n-1}(x)\,]

with pi(x)=j=0paj(i)xjp_i(x)=\sum_{j=0}^{p} a_{j}^{(i)} x^{j}, and the high-memory "masking" polynomials are

GQ(x)=[q0(x),q1(x),,qn1(x)]G_Q(x) = [\,q_0(x),\,q_1(x),\,\ldots,\,q_{n-1}(x)\,]

with qi(x)=j=0qbj(i)xjq_i(x)=\sum_{j=0}^q b_{j}^{(i)}x^j, chosen so p+q200p+q \gg 200 and pqp \ll q.

The high-memory generator is constructed as

GpQ(x)=[p0(x)q0(x),p1(x)q1(x),,pn1(x)qn1(x)]G_{pQ}(x) = [\,p_0(x) q_0(x),\,p_1(x) q_1(x),\,\ldots,\,p_{n-1}(x) q_{n-1}(x)\,]

which in block form is a K×NK \times N matrix of full rank KK, with N=n(K+p+q)N = n (K + p + q). This structure inherently includes periodicity and algebraic structure that must be obscured for security.

To achieve a dense and random-like public matrix, a masking operation is applied. A small mask space LF2NL \subset \mathbb{F}_2^N of rank K\ell \ll K is selected, and a dense mask G˙LS(L)\dot{G} \in LS(L) (the set of all 22^{\ell} linear combinations of rows from LL) is drawn. The masked generator is

G=GpQ+G˙G' = G_{pQ} + \dot{G}

which is then obfuscated through two further transformations: G=SGRG = S G' R, where SS is a random nonsingular K×KK \times K matrix and RR a random N×NN \times N permutation. The public key is (G,e,r)(G, e, r) where ee is the encryption bit-flip probability and r(x)r(x) a CRC polynomial; the private key is the tuple (S,R,Gp(x),GQ(x),G˙)(S, R, G_p(x), G_Q(x), \dot{G}).

2. Noise-Enhancement and Ambiguity Mechanisms

Noise enhancement is central to the NE-HMCC security and decryption strategy. Encryption proceeds by computing c=mGc = m\,G and applying independent bit-flips with probability ee, yielding ciphertext Ce=c+eC_e = c + e, eBernoulli(e)e \sim \mathrm{Bernoulli}(e).

Decryption intensifies the noise through polynomial division at each block. In block jj, the operation is: (d(i))j(x)=((cˇ)j(x))÷qj(x)(d^{(i)})_j(x) = ((\check{c} - \ell)_j(x)) \div q_j(x) where cˇ\check{c} is the inverse-permuted ciphertext and \ell is each mask candidate. The resulting quotient accumulates not only input bit-flip errors, but also additional "division noise." The total noise affecting the legitimate decoder is e^=eN+a\widehat{e} = eN + a where aa is the total increase in error weight from division.

By carefully selecting mask polynomials (e.g., qj(x)=1+xAq_j(x) = 1 + x^A) with widely spaced taps, both the trellis capacity and resistance to structural cryptanalysis are enhanced.

3. Decryption Workflow and Polynomial Ambiguity

Decryption proceeds through the following steps:

  1. Inverse Permutation: Apply RTR^T to the ciphertext to recover cˇ\check{c}.
  2. Mask Ambiguity: For all 22^\ell possible mask vectors LS(L)\ell \in LS(L), form c~=cˇ\tilde{c} = \check{c} - \ell.
  3. Blockwise Division: De-interleave c~\tilde{c} into nn blocks, divide each by qj(x)q_j(x), and collect quotients.
  4. Re-interleaving and Decoding: Each mask candidate yields a separate candidate DD, providing 22^\ell length-NN vectors, each decoded via Viterbi in parallel (complexity O(2N2p)O(2^\ell N 2^p)).
  5. Plaintext Recovery: The candidate with minimal decoding distance (close to e^=eN+a\widehat{e} = eN + a) is selected. CRC validation ensures correctness; if unsuccessful, the process iterates or requests retransmission.

The mask ambiguity is tractable for legitimate users (with typical =5\ell=5) but yields a combinatorial barrier for attackers. Incorrect mask choices inflate the Hamming distance of decoded candidates, efficiently distinguishing the correct plaintext in high probability.

4. Security Margins and Cryptanalytic Resistance

NE-HMCC achieves indistinguishability of GG from random linear codes, with full rank and row/column weights close to N/2N/2 making all linear and parity structure tests ineffective. Dual-codewords can occur only with vanishing probability 2Ω(K)2^{-\Omega(K)}, while mask entropy provides 2K2^{\ell K} possible combinations, making mask-space enumeration infeasible given ciphertext noise.

Information-Set Decoding (ISD) is the main generic attack vector. With effective error weight t=eN+at = eN + a: CISD20.29(Nt)(NK)1C_{\rm ISD} \sim 2^{0.29 (N - t)} \binom{N}{K}^{-1} and, for quantum ISD: CQISD20.145(Nt)C_{\rm QISD} \sim 2^{0.145 (N - t)}

Compared to Classic McEliece (e.g., Goppa (4096,3556,45)(4096, 3556, 45)), NE-HMCC with parameters N=5600N=5600, K=2600K=2600, e=0.02e=0.02, q0=x93q_0 = x^{93}, q1=1+x186q_1 = 1 + x^{186} yields t0.07N=392t \approx 0.07N = 392, and CISD2×10112C_{\rm ISD} \approx 2 \times 10^{112}, exceeding McEliece security margins by over 2722^{72} in exponent (a >2200> 2^{200} margin).

Resistance to "known-CC" attacks—where attackers have (Gp(x),GQ(x))(G_p(x), G_Q(x)) but not (S,R,G˙)(S, R, \dot{G})—is guaranteed by the impractically large permutation/mask search space and the exponential complexity of all plausible decoding strategies.

5. Decryption Complexity and Scalability

Legitimate decryption requires O(2N2p)O(2^\ell N 2^p) add-compare-select (ACS) operations. For fixed (,p\ell, p), this complexity is O(N)O(N), supporting linear-time scaling with plaintext length and uniform per-bit cost. Parallel hardware implementations, such as arrays of directed-graph decoders, are feasible, with ACS modules mapped efficiently to ASIC, FPGA, or closely coupled RISC-V cores. For p=10p=10, =5\ell=5, 215=327682^{15} = 32\,768 ACS/bit operations are well within capabilities of contemporary mobile or embedded hardware, delivering Mbps throughput.

6. Analytical Formulas and Bounds

Key analytical results that support the security and performance claims include:

  • Error-Propagation Bound:

a=j=0n1(wt((c~)j÷qj(x))wt(ej))a = \sum_{j=0}^{n-1} \left( \mathrm{wt}\left( (\tilde{c})_j \div q_j(x) \right) - \mathrm{wt}(e_j) \right)

  • Gilbert Bound for Incorrect-Candidate Distance:

i=0δN(Ni)2N(1p)    δH21(1p)\sum_{i=0}^{\delta N} \binom{N}{i} \approx 2^{N(1-p)} \implies \delta \approx H_2^{-1}(1-p)

where H2(x)=xlog2x(1x)log2(1x)H_2(x) = -x \log_2 x - (1-x)\log_2(1-x).

  • ISD Complexity Estimates:

CISD20.29(Nt)(NK)1,CQISD20.145(Nt)C_{\rm ISD} \approx 2^{0.29(N - t)} \binom{N}{K}^{-1}, \quad C_{\rm QISD} \approx 2^{0.145(N - t)}

  • Decoding Ambiguity: With \ell-bit mask uncertainty, 22^\ell decoding candidates are separated by decoding distances such that only the correct candidate achieves minimal (close to tt) Hamming distance with high probability.

7. Significance in Post-Quantum Cryptography

NE-HMCC harmonizes high constraint-length convolutional codes, dense masking, random transformation, and controlled noise injection to yield a public code statistically indistinguishable from random. This supports polynomial-time decryption for legitimate users and exponential-cost attacks (ISD or otherwise) for adversaries. The resulting scheme provides security margins surpassing Classic McEliece by >2200>2^{200} classically and >2100>2^{100} quantumly, offers hardware-friendly, scalable decryption, and admits arbitrary plaintext lengths with uniform per-bit cost (Ariel, 2 Dec 2025). The architectural properties and cryptanalytic barriers position NE-HMCC as a strong candidate for scalable, robust, and high-security public-key systems in the post-quantum era.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (1)

Whiteboard

Follow Topic

Get notified by email when new papers are published related to Noise-Enhanced High-Memory Convolutional Codes.