Recovering the Cyclic-Code of Generated Polynomial by Using Evolutionary Computation

  • Kangshun Li
  • Yuanxiang Li
  • Haifang Mo
Conference paper


The data integrity in computer security is a key component of what we call trustworthy computing, and one of the most important issues in data integrity is to detect and correct error codes, which is also a crucial step in software and hardware design. Numerous methods have been recently proposed to solve legal-codes of the cyclic-code generated polynomial g(x). We think that a better approach for this purpose is to solve the legal-codes by finding the roots of the cyclic-code generated polynomial. However, as it is well known, finding roots of polynomials of high degree in the modulo-q space GF(q) is very difficult. In this paper we propose a method to solve the roots of cyclic-code generated polynomial by using evolutionary computation, which makes use of randomized searching method from biological natural selection and natural genetic system.


Evolutionary Computation Cyclic Code Computer Security Generate Polynomial Legal Code 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    Wang Xingmei, Zhang Huanguo, Ma Jianfeng, Tan Zhongping, 1999. “Error-Correction Code Technology in Computer”. People’s Post Press.Google Scholar
  2. [2].
    Pan Zhengjun. Kang Lishan, Chen Yuping, Evolutionary Computation, Tsinghua University Press, 1998.Google Scholar
  3. [3]
    Ye Dacheng, 1996, 24(12). “The solution to genetic algorithm of route selection and volume allocation problem in computer communication network”. Electronic Journal.Google Scholar
  4. [4]
    Wang Xinmei, 1991, 280 ∼ 284. “Error-Correcting Code—Theory and Method”. Xian: Xidian University Press.Google Scholar
  5. [5]
    Holland J H. 1975, “Adaption in Natural and Artificial Systems”. Ann Arbor: University of Michigan Press.Google Scholar
  6. [6]
    Spillman R. 1993, 17(4), “Cryptanalysis of Knapsack Chipers Using Genetic Algorithms”. CryptologyiaGoogle Scholar
  7. [7]
    Zhang Muxiang, 1994, 76(3), “Simulated Annealing Approach to the Minimum Distance of Error-Correcting Codes”. Int J Electronics.Google Scholar

Copyright information

© Springer-Verlag/Wien 2005

Authors and Affiliations

  • Kangshun Li
    • 1
    • 2
    • 3
  • Yuanxiang Li
    • 1
    • 2
  • Haifang Mo
    • 2
  1. 1.State Key Laboratory of Software EngineeringWuhan UniversityWuhanChina
  2. 2.Computer School of Wuhan UniversityWuhanChina
  3. 3.School of Information EngineeringJiangxi University of Science & TechnologyJiangxiChina

Personalised recommendations