We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Low Complex Crypto based Channel Coding with Turbo Code

by Celine Mary Stuart, Nandan S., Deepthi P. P.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 61 - Number 16
Year of Publication: 2013
Authors: Celine Mary Stuart, Nandan S., Deepthi P. P.
10.5120/10015-5026

Celine Mary Stuart, Nandan S., Deepthi P. P. . Low Complex Crypto based Channel Coding with Turbo Code. International Journal of Computer Applications. 61, 16 ( January 2013), 39-44. DOI=10.5120/10015-5026

@article{ 10.5120/10015-5026,
author = { Celine Mary Stuart, Nandan S., Deepthi P. P. },
title = { Low Complex Crypto based Channel Coding with Turbo Code },
journal = { International Journal of Computer Applications },
issue_date = { January 2013 },
volume = { 61 },
number = { 16 },
month = { January },
year = { 2013 },
issn = { 0975-8887 },
pages = { 39-44 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume61/number16/10015-5026/ },
doi = { 10.5120/10015-5026 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:08:50.514563+05:30
%A Celine Mary Stuart
%A Nandan S.
%A Deepthi P. P.
%T Low Complex Crypto based Channel Coding with Turbo Code
%J International Journal of Computer Applications
%@ 0975-8887
%V 61
%N 16
%P 39-44
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A novel encryption system to increase security in a three tier manner without any additional complexity is proposed in this paper. The encryption block here is a Shrinking generator which is a Linear Feedback Shift Register (LFSR) based stream cipher system in which controlled randomness provides security. The channel coding technique used is Turbo code that performs very well and provides results near Shannon's Limit. The design of interleaver used in turbo code provides security while channel coding. Puncturing pattern designed for channel coding further increases the security of the system and improves the code rate also. Security of the system is achieved by hiding the keys used in code generation and puncturing from unintended users. For an intended user, performance of the channel coding system is further improved by using Soft Input Decryption (SID) technique. The hardware complexity of the proposed Shrinking Generator Based Cipher (SGBC) is compared with joint coding cryptographic schemes available in literature. Improved Linear Consistency Attack is mounted to analyze the security of the proposed system and the results show that a significant increase in security could be achieved without any additional increase in complexity.

References
  1. OluwayomiAdamo, M. R. Varanasi, "Joint Scheme for Physical Layer Error Correction and Security", International Scholarly Research Network, ISRN Communications and Networking, Volume 2011, Article ID 502987, 9 pages.
  2. Berrou. C. , Glavieux. A and Thitimajshima. P, 'Near Shannon limit error-correcting coding: turbo codes'. Proc. IEEE International Conference on Communications, Geneva, Switzerland, 1993, pp. 1064–1070.
  3. J. Hokfelt, O. Edfors, and T. Maseng,"A Turbo Code Interleaver Design Criterion Based on the Performance of Iterative Decoding", IEEE Communications Letters, Vol. 5, No. 2, February 2001.
  4. KashifNizam Khan, JinatRehana, RameswarDebnath, "An Improved Interleaver Design for Turbo Codes", International Conference on Information and Communication Technology ICICT 2007, 7-9 March 2007.
  5. S. Lin, D. J. Costello, Error Control Coding: Fundamentals and Applications, Prentice Hall, Englewood Cliffs, N. J. , 1983.
  6. J. Hagenauer, "Rate compatible punctured convolutional codes and their applications," IEEE Transactions on Communications, vol. 36, no. 4, pp. 389-400, Apr. 1988.
  7. M. Fan, S. C. Kwatra, and K. Junghwan, "Analysis of puncturing pattern for high rate turbo codes," in Proc. of Military Communication Conference (MILCOM'99), NewJersey, USA, Oct. 1999, pp. 547-550.
  8. F. Babich, G. Montorsi, and F. Vatta, "Design of rate-compatible punctured Turbo (RCPT) codes," in Proc. International Conference on Communication (ICC'02), New York, USA, Apr. 2002, pp. 1701-1705.
  9. M. A. Kousa and A. H. Mugaibel, "Puncturing effects on Turbo Codes," IEE Proceedings on Communications, Vol. 149, 2002, pp. 132-138.
  10. N. Živi?, C. Ruland, "Channel Coding as a Cryptography Enhancer", Advances in Communications, Proceeding in the 11th WSEAS International conference on Communications (part of the 2007 CSCC multiconference), AgiosNikolaos, Crete Island, Greece, July 26-28, 2007.
  11. NatasaZivic, "Strategies and Performances of Soft Input Decryption", (IJCSIS) International Journal of Computer Science and Information Security, Vol. 1 No. 1, May 2009.
  12. NatasaZivic, "Iterative method for improvement of coding and Decryption", International Journal of Network Security & Its Applications (IJNSA), Vol 1, No 2, July 2009.
  13. Coppersmith, D. , Krawczyk H. , and Mansour, Y. (1994):"The Shrinking Generator", Proceedings of Crypto-93, LNCS Vol 773, Springer-Verlag, 1994, pp. 22-39.
  14. KANSO, A. (2003): Clock-controlled shrinking generator of feedback shift registers, Lecture Notes in Computer Science, vol. 2727, Springer Verlag: 443-451.
  15. H. Molland, "Improved Linear Consistency Attack on Irregular Clocked keystream Generators", Fast Software Encryption-FSE'2004, LNCS vol. 3017, Springer- Verlag, (2004), pp. 109-126.
  16. Qian Mao; Longii Sun; ChuanQin : "Joint Error Correction and Encryption Scheme Based on Turbo Codes", IEEE International Symposium Intelligence Information Processing and Trusted Computing (IPTC), Oct. 2010.
  17. Silvio A. Abrantes, "From BCJR to turbo decoding: MAP algorithms made easier © Silvio A. Abrantes, April 2004
Index Terms

Computer Science
Information Sciences

Keywords

Turbo code Puncturing Soft Input Decryption Improved Linear Consistency Attack