National Repository of Grey Literature 5 records found  Search took 0.01 seconds. 
Data transmition security with Reed-Müller codes
Hrouza, Ondřej ; Burda, Karel (referee) ; Němec, Karel (advisor)
The aim of this work is to propose a Reed-Muller code that secure data transfer to t = 4 independent errors, the information rate R ? 0,5 and for this code to produce a detailed proposal for implementation of the codec. In order to implement this proposal, it is necessary to familiarize themselves with the basic properties Reed-Muller codes. To understand the function of codec Reed-Muller code is in this thesis analyzed the process of encoding and decoding, which is based on a method of using the majority logic. For the design of codec, which consists of encoder and decoder, are used programmable logic circuits FPGA. These circuits are programmed in VHDL language, when for the design source codes is used Xilinx ISE 10.1. In thesis is examined in detail the structure and function of the encoder and decoder chosen Reed-Muller code and there are presented parts of the proposed source codes. Verify the functional ability of the codec is achieved by simulation in program ModelSim SE 5.7f. The simulation results together with the another proposal realization are output of this work.
Forward Error Correction in Digital Communication Systems
Kostrhoun, Jan ; Sysel, Petr (referee) ; Číž, Radim (advisor)
This work deals with forward error correction. In the work, basic methods and algorithms of error correction are described. For the presentation of encoding and decoding process of Hamming code, Reed-Müller code, Fire code, Reed-Solomon code and Trellis coded modulation programs in Matlab were created.
Minder's structural attack upon Sidelnikov's cryptosystem
Steinhauser, František ; Drápal, Aleš (advisor) ; Žemlička, Jan (referee)
After Sidelnikov proved in 1992 that the cryptosystem of Niederreiter is vulnera- ble, he designed his own cryptosystem in 1993. This new cryptosystem was based on McEliece schema, it was to be resistant to quantum computers and faster than McEliece cryptosystem. However, in 2007, Minder and Shokrollah proposed an attack proving that the cryptosystem of Sidelnikov was vulnerable as well. This thesis uses several well-known and several new theorems to describe algebraic characteristics of the Reed-Muller code, especially from the affinity point of view. It proves that the attack proposed by Minder and Shokrollah really breaks the cryptosystem of Sidelnikov. Implementation of this attack in C/C++ language is presented in the conclusion of the thesis along with a table of duration of this attack on a personal computer.
Data transmition security with Reed-Müller codes
Hrouza, Ondřej ; Burda, Karel (referee) ; Němec, Karel (advisor)
The aim of this work is to propose a Reed-Muller code that secure data transfer to t = 4 independent errors, the information rate R ? 0,5 and for this code to produce a detailed proposal for implementation of the codec. In order to implement this proposal, it is necessary to familiarize themselves with the basic properties Reed-Muller codes. To understand the function of codec Reed-Muller code is in this thesis analyzed the process of encoding and decoding, which is based on a method of using the majority logic. For the design of codec, which consists of encoder and decoder, are used programmable logic circuits FPGA. These circuits are programmed in VHDL language, when for the design source codes is used Xilinx ISE 10.1. In thesis is examined in detail the structure and function of the encoder and decoder chosen Reed-Muller code and there are presented parts of the proposed source codes. Verify the functional ability of the codec is achieved by simulation in program ModelSim SE 5.7f. The simulation results together with the another proposal realization are output of this work.
Forward Error Correction in Digital Communication Systems
Kostrhoun, Jan ; Sysel, Petr (referee) ; Číž, Radim (advisor)
This work deals with forward error correction. In the work, basic methods and algorithms of error correction are described. For the presentation of encoding and decoding process of Hamming code, Reed-Müller code, Fire code, Reed-Solomon code and Trellis coded modulation programs in Matlab were created.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.