Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Enhancing Data Access Security through the Utilization of [2048,512,4] Linear Code

View through CrossRef
Linear code is a type of error-correcting code that satisfies the property of closure under addition. Linear codes have been a major component in data security and cryptography and has been proven as an important tool in maintaining privacy. Linear code, [n,k,d] is a type of linear code with specific parameters that describe its properties and capabilities with n being the length of codewords, k, the dimension of the code and d denotes the minimum Hamming distance. Code [2048,512,4] is an example of [n,k,d] Linear code with large codeword length, high dimension and a moderate minimum hamming distance. It was generated by a combination of two of [1024,256,4] linear code and its validity has been verified and confirmed using Gilbert Varshamov bound.   This paper proposes a technique to enhance data access security by utilizing linear code [2048,512,4]. The proposed algorithm utilizes a sophisticated linear code equivalence test methodology to create a robust and secure system that generates and validates unique [2048, 512, 4] linear codes. These codes serve as highly effective authentication mechanisms, granting individualized access privileges to different users within the system. Also, by employing cutting-edge techniques in linear code equivalence testing, the algorithm ensures the generation of distinct and non-repeating [2048, 512, 4] linear codes, uniquely tailored to be each user's credentials. The analysis of the results reveals that to breach such a security measure, an intruder would need to contend with a vast number of permutations and combinations. In particular, there are 2048 P 2048 patterns and an astounding 131,328 distinct combinations of codewords that remain unknown to any potential breacher. These findings underscore the robustness and invulnerability of the proposed technique for enhancing data access security. The proposed technique also demonstrates a potential for significantly enhancing the protection of sensitive data for organisations in both pre-quantum and post quantum computing within the digital ecosystem.
Title: Enhancing Data Access Security through the Utilization of [2048,512,4] Linear Code
Description:
Linear code is a type of error-correcting code that satisfies the property of closure under addition.
Linear codes have been a major component in data security and cryptography and has been proven as an important tool in maintaining privacy.
Linear code, [n,k,d] is a type of linear code with specific parameters that describe its properties and capabilities with n being the length of codewords, k, the dimension of the code and d denotes the minimum Hamming distance.
Code [2048,512,4] is an example of [n,k,d] Linear code with large codeword length, high dimension and a moderate minimum hamming distance.
It was generated by a combination of two of [1024,256,4] linear code and its validity has been verified and confirmed using Gilbert Varshamov bound.
   This paper proposes a technique to enhance data access security by utilizing linear code [2048,512,4].
The proposed algorithm utilizes a sophisticated linear code equivalence test methodology to create a robust and secure system that generates and validates unique [2048, 512, 4] linear codes.
These codes serve as highly effective authentication mechanisms, granting individualized access privileges to different users within the system.
Also, by employing cutting-edge techniques in linear code equivalence testing, the algorithm ensures the generation of distinct and non-repeating [2048, 512, 4] linear codes, uniquely tailored to be each user's credentials.
The analysis of the results reveals that to breach such a security measure, an intruder would need to contend with a vast number of permutations and combinations.
In particular, there are 2048 P 2048 patterns and an astounding 131,328 distinct combinations of codewords that remain unknown to any potential breacher.
These findings underscore the robustness and invulnerability of the proposed technique for enhancing data access security.
The proposed technique also demonstrates a potential for significantly enhancing the protection of sensitive data for organisations in both pre-quantum and post quantum computing within the digital ecosystem.

Related Results

Design of Malicious Code Detection System Based on Binary Code Slicing
Design of Malicious Code Detection System Based on Binary Code Slicing
<p>Malicious code threatens the safety of computer systems. Researching malicious code design techniques and mastering code behavior patterns are the basic work of network se...
Alih Kode Dan Campur Kode Dalam Interaksi Masyarakat Terminal Motabuik Kota Atambua
Alih Kode Dan Campur Kode Dalam Interaksi Masyarakat Terminal Motabuik Kota Atambua
This research aims to describe the use of language in community interactions at the Motabuik terminal, Atambua City. The use of language in question is the form and function of cod...
Systematic Evaluation of AI-Generated Python Code: A Comparative Study across Progressive Programming Tasks
Systematic Evaluation of AI-Generated Python Code: A Comparative Study across Progressive Programming Tasks
Abstract Background: AI-based code assistants are on the rise in software development as powerful technologies offering streamlining of code generation and better-quality c...
CODE CHOICE USED BY CHIYU TAMADE (CHU2) CHARACTER IN THE ANIME “BANG DREAM! SEASON 2 EP 3, 8, AND 9”
CODE CHOICE USED BY CHIYU TAMADE (CHU2) CHARACTER IN THE ANIME “BANG DREAM! SEASON 2 EP 3, 8, AND 9”
In the field of Sociolinguistics, phenomenons of language use such as code-switching and code-mixing are often found in our daily lives. BanG Dream is a multimedia project that foc...
Code Switching and Code Mixing in the Communication of Arabic Language Education Master Students UIN Malang: A Sociolinguistic Study
Code Switching and Code Mixing in the Communication of Arabic Language Education Master Students UIN Malang: A Sociolinguistic Study
Code switching is the phenomenon of changing the use of language or language variants in a conversation by a speaker, either between languages (e.g., from Indonesian to English) or...
A large-scale analysis of bioinformatics code on GitHub
A large-scale analysis of bioinformatics code on GitHub
AbstractIn recent years, the explosion of genomic data and bioinformatic tools has been accompanied by a growing conversation around reproducibility of results and usability of sof...

Back to Top