SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal of Electronics and Communication Engineering & TechnologyAND
             INTERNATIONAL JOURNAL OF ELECTRONICS (IJECET), ISSN
        COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)
 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 2, July-September (2012), © IAEME

ISSN 0976 – 6464(Print)
ISSN 0976 – 6472(Online)
Volume 3, Issue 2, July- September (2012), pp. 346-351
                                                                              IJECET
© IAEME: www.iaeme.com/ijecet.html
Journal Impact Factor (2012): 3.5930 (Calculated by GISI)                   ©IAEME
www.jifactor.com



         COMBINING CRYPTOGRAPHY WITH CHANNEL CODING TO
                       REDUCE COMPLICITY
                                                   Sunaina Sharma
                                       Electronics and Communication
                                          Sunaina.sh39@gmail.com

 ABSTRACT

 Cryptography is a form of hiding the text so to increase the security of the information. On
 the other hand the main purpose of using coding is to reduce the error probability and to
 increase the efficiency of the channel. As the word complicity means criminal offence. This
 paper presents an overview how complicity can be reduce by combining Channel coding with
 cryptography with the use of LFSR shift register

 Keywords: Include at least 5 keywords or phrases
 I. INTRODUCTION
    The general communication system consist separate block for channel coding and for
 encryption [1]. The general diagram for has been shown below:


      Source       Quantization
                                       Digital Data Input
               Source     Encrypti        Channel           Modul
               Coding       on            Coding            ation

                                                       Channel

        Source          Channel         Equaliza      Demodul
       Decoding         Decoding          tion         ation

         D/A            Digital Data
       Convertor          Output



                                       Fig 1.1: Communication System



                                                            346
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 2, July-September (2012), © IAEME
   This paper provides the information how to merge channel coding with the cryptography
to provide more security to the signal. In the network security and cryptography, the study of
confidentiality, authenticity and error correction are very important [4][6]. Many of the
modern communication systems are limited in resources such as battery power and
computational power. Mobile sensor networks, smart cards etc., are some examples. Hence a
major research in communication concentrates on designing systems with low computational
or hardware complexity. To reduce the computational and communication cost of two major
cryptographic operations say channel coding and cryptography has been combined. And the
proposed work as [1] [2]:


 Source           Quantization                Combining
                                               Blocks


           Source         Encrypti        Channel        Modul
           Coding           on            Coding         ation


                                                        Channel
       Source          Channel           Equaliza      Demodul
      Decoding         Decoding            tion         ation

        D/A
      Convertor


                                   Fig 1.2: Purposed Communication System

II.COMBINING CRYPTOGRAPHY WITH CHANNEL CODING
   The objective of the paper is to combine Cryptography with channel coding to reduce the
computational and communication cost and to increase the security per bit [7] [8]. The block
diagram shows how encryption and coding has been done on the signal [2]:
             LFSR          G Matrix



  Sound Signal          Digital Signal               Channel Noise
  is converted          divided into                (White Gaussian
   into digital         bits of 4 (i)                   Noise)



   Comparison                                         Received
    between                                            Word
   Coded and
  Uncoded word
                                      Finding out
                    Calculating       Coset Leader        Standard
                    Error Vector          and              Array
                                       Syndrome


                             Fig 1.3: Block dig of channel coding with LFSR

                                                          347
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 2, July-September (2012), © IAEME
   An approach to improve the performance of a communication system without increase in
complexity is to embed encryption within channel coding. For this, programming has been
done in Matlab. Since Matlab is commonly used for programming purposes, it provides
several of inbuilt functions and tools used for programming purposes. A voice signal is first
converted into digital and then encoded and encrypted. And at the receiver side it is decoded
and decrypted. The flow diagram for this is as under [2]:


       LFSR               Start



    XORing the        Sound Signal
     tapes and
   generating the
     sequence         Digital Signal


                     Signal Divided
    Selecting G      into Bit of 4(i)
      Matrix
   according to
   the sequence        Codeword
     generated         CW = i×G
       LFSR
                        Channel




                        Received
                         word              Standard
                         valid              Array


                                        Syndrome &         G
                                        Coset leader      matrix
                                           (errV)

                     CW = i- errV


                    Decoded Word


                      Comparison
                       between
                      Coded and
                       Un-coded
                        Signal



                          Stop



                     Fig 14: Flow dig of cryptography with channel coding

                                                 348
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 2, July-September (2012), © IAEME
III. LINEAR FEEDBACK SHIFT REGISTER
     A linear feedback shift register (LFSR) is a shift register whose input bit is a linear
function of its previous state. The most commonly used linear function of single bits is XOR.
Thus, an LFSR is most often a shift register whose input bit is driven by the exclusive-or
(XOR) of some bits of the overall shift register value. The initial value of the LFSR is called
the seed, and because the operation of the register is deterministic, the stream of values
produced by the register is completely determined by its current (or previous) state. Likewise,
because the register has a finite number of possible states, it must eventually enter a repeating
cycle [9]. A 12 bit key is given as input to the filter then this filter will generate 4095 (212-1)
number of sequence. According to which the G matrix is selected. There are approximately
6000 equivalent G matrixes generated by applying different linear process on the basic matrix
[2].

     Key           Define        XORing         Generating
   (As input)     Tapping        Tapings         Numbers



                                               Fig 1.5: LFSR

IV. ENCODING AND ENCRYPTING
   The Number of G matrix has been created using permutation and linear expirations. Such
as addition of scalar multiple of one row to another, permutation of columns. Then using this
numbers generated by the LFSR the respective matrix from the set of matrix has been
selected. Then that particular matrix is multiplied with that codeword only [2].
                                     Information
                                   Signal i (4 bits)


            Creating        Choosing
            number          G matrix              Codeword
              of G          according               CW
             matrix           LFSR


                       Fig 1.6: Generating codeword using G matrix and LFSR
   Note: It must be noted here that for every 4 bit of information signal different G matrix is
multiplied every time according to LFSR.
   As the intruder is not known to the key and the actual sequence of the number generated
by the LFSR and the matrix to which the codeword is being multiplied he/she won’t be able
to reconstruct the signal even if the codeword is known to them. And the reverse process has
been employed to reconstruct the signal again at the receiver [8].

                                              Coding rate R= k/n




                                                       349
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 2, July-September (2012), © IAEME


                                 Block
                     k                                 n
                                          k                      n-k

              Information Bits           Parity Bits


                                               n digital codewords
                                      Fig 1.7: Generating Codeword

V. DECODING AND DECRYPTING
  The signal is received at the receiver end. And the standard array has been created. Once
the standard array has been created, now next step is to check if the received word is correct
or not. Now divide the received signal in bits of 7. This is the codeword. Now first step is to
multiply the codeword with the parity check matrix if the resulted is zero that means no error
has occurred otherwise the signal is in error. Compare this codeword with the standard array
that the codeword falls in which column. The coset leader of that column is in error. Subtract
the coset leader of the error vector with every received word the resultant is the actual
codeword which has been send [2] [8].
  Standard array has been created, now next step is to check if the received word is correct or
not. Now divide the received signal in bits of 7. This is the codeword. Now first step is to
multiply the codeword with the parity check matrix if the resulted is zero that means no error
has occurred otherwise the signal is in error. Compare this codeword with the standard array
that the codeword falls in which column. The coset leader of that column is in error. Subtract
the coset leader with every received word the resultant is the actual codeword which has been
send [5].
  Note: It must be noted here that the weight which is being added should not be a codeword
and the resultant should not be a repeating number i.e. all the numbers in the standard array
should be unique and non repeating number.

        Received
         word


                              Comparing
        Multiplied             code with
          with               Standard array
         Parity
                                                   H matrix
                                Column             multiplied
                             multiplied with       according
                             HT (syndrome)          to LFSR
     Codeword = Error
     vector – received         Define error
           word              vector according
                               to syndrome



                                         Fig 1.8: Decoding diagram


                                                       350
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 2, July-September (2012), © IAEME
VI. CONCLUSIONS
  Till now the work on channel coding consist of the single G matrix which is been
multiplied with the complete data to produce the codewords but in this paper the number of G
matrix has been produced by permutation and adding of one row with another. These G
matrixes are randomly selected by LFSR register and multiplied with the block of data. For
every new block different G matrix is selected and codeword is generated. As different G
matrix is used every time it would be very hard for intruder to guess the right G matrix every
time and to interpret the right information.
ACKNOWLEDGMENT
   I would like to thank my Parents to provide financial and emotional spot to me and
standing with me in every even and odds. I would like to thank almighty for showing me the
right direction out of the blue, to help me stay calm in the oddest of the times and keep
moving even at times when there was no hope.
REFERENCES
[1] Sunaina Sharma, Combining Cryptography with Channel Coding, ISOR, vol. 2. July
    2012.
[2] Sunaina Sharma, Combining Cryptographic Operation for complexity reduction, Lovely
    Professional University Jalandhar, M.Tech, 2012.
[3] Natasa Zivic And Christoph Ruland, Channel coding as cryptographic Enhancer, Wseas
    Transactions On Communications, Issue 2, Volume 7, February 2008.
[4] G. Julius Caesar, John F. Kennedy, Security Engineering: A Guide to Building
    Dependable Distributed Systems.
[5] Anonym, Coding In Communication System.
[6] Gary C. Kessler, An Overview of Cryptography, Auerbach, September 1998.
    Books
[7] Richard E. Blahut, Algebraic code for data transmission (Cambridge University Press,
    2003).
[8] Ranjan Bose, Information theory, Coding and Cryptography (Tata McGraw Hill, 2008).

    Websites
[9] www.wekipedia.com




                                                351

More Related Content

What's hot

Performance Study of RS (255, 239) and RS (255.233) Used Respectively in DVB-...
Performance Study of RS (255, 239) and RS (255.233) Used Respectively in DVB-...Performance Study of RS (255, 239) and RS (255.233) Used Respectively in DVB-...
Performance Study of RS (255, 239) and RS (255.233) Used Respectively in DVB-...IJERA Editor
 
Survey on Error Control Coding Techniques
Survey on Error Control Coding TechniquesSurvey on Error Control Coding Techniques
Survey on Error Control Coding TechniquesIJTET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
D I G I T A L C O M M U N I C A T I O N S J N T U M O D E L P A P E R{Www
D I G I T A L  C O M M U N I C A T I O N S  J N T U  M O D E L  P A P E R{WwwD I G I T A L  C O M M U N I C A T I O N S  J N T U  M O D E L  P A P E R{Www
D I G I T A L C O M M U N I C A T I O N S J N T U M O D E L P A P E R{Wwwguest3f9c6b
 
The Reliability in Decoding of Turbo Codes for Wireless Communications
The Reliability in Decoding of Turbo Codes for Wireless CommunicationsThe Reliability in Decoding of Turbo Codes for Wireless Communications
The Reliability in Decoding of Turbo Codes for Wireless CommunicationsIJMER
 
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...ijitjournal
 
Ldpc based error correction
Ldpc based error correctionLdpc based error correction
Ldpc based error correctionVijay Balaji
 
Reed Solomon Coding For Error Detection and Correction
Reed Solomon Coding For Error Detection and CorrectionReed Solomon Coding For Error Detection and Correction
Reed Solomon Coding For Error Detection and Correctioninventionjournals
 
A new channel coding technique to approach the channel capacity
A new channel coding technique to approach the channel capacityA new channel coding technique to approach the channel capacity
A new channel coding technique to approach the channel capacityijwmn
 
An efficient transcoding algorithm for G.723.1 and G.729A ...
An efficient transcoding algorithm for G.723.1 and G.729A ...An efficient transcoding algorithm for G.723.1 and G.729A ...
An efficient transcoding algorithm for G.723.1 and G.729A ...Videoguy
 
Reed solomon explained v1 0
Reed solomon explained v1 0Reed solomon explained v1 0
Reed solomon explained v1 0Simona Grigoras
 
IRJET - Wireless Transmission of Data using LDPC Codes based on Raspberry Pi
IRJET - Wireless Transmission of Data using LDPC Codes based on Raspberry PiIRJET - Wireless Transmission of Data using LDPC Codes based on Raspberry Pi
IRJET - Wireless Transmission of Data using LDPC Codes based on Raspberry PiIRJET Journal
 
Reed Solomon Frame Structures Revealed
Reed Solomon Frame Structures RevealedReed Solomon Frame Structures Revealed
Reed Solomon Frame Structures RevealedDavid Alan Tyner
 

What's hot (20)

Turbo codes.ppt
Turbo codes.pptTurbo codes.ppt
Turbo codes.ppt
 
Performance Study of RS (255, 239) and RS (255.233) Used Respectively in DVB-...
Performance Study of RS (255, 239) and RS (255.233) Used Respectively in DVB-...Performance Study of RS (255, 239) and RS (255.233) Used Respectively in DVB-...
Performance Study of RS (255, 239) and RS (255.233) Used Respectively in DVB-...
 
Survey on Error Control Coding Techniques
Survey on Error Control Coding TechniquesSurvey on Error Control Coding Techniques
Survey on Error Control Coding Techniques
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
D I G I T A L C O M M U N I C A T I O N S J N T U M O D E L P A P E R{Www
D I G I T A L  C O M M U N I C A T I O N S  J N T U  M O D E L  P A P E R{WwwD I G I T A L  C O M M U N I C A T I O N S  J N T U  M O D E L  P A P E R{Www
D I G I T A L C O M M U N I C A T I O N S J N T U M O D E L P A P E R{Www
 
The Reliability in Decoding of Turbo Codes for Wireless Communications
The Reliability in Decoding of Turbo Codes for Wireless CommunicationsThe Reliability in Decoding of Turbo Codes for Wireless Communications
The Reliability in Decoding of Turbo Codes for Wireless Communications
 
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
 
Ldpc based error correction
Ldpc based error correctionLdpc based error correction
Ldpc based error correction
 
Reed Solomon Coding For Error Detection and Correction
Reed Solomon Coding For Error Detection and CorrectionReed Solomon Coding For Error Detection and Correction
Reed Solomon Coding For Error Detection and Correction
 
Presentation
PresentationPresentation
Presentation
 
Turbo Code
Turbo Code Turbo Code
Turbo Code
 
A new channel coding technique to approach the channel capacity
A new channel coding technique to approach the channel capacityA new channel coding technique to approach the channel capacity
A new channel coding technique to approach the channel capacity
 
Turbo Codes
Turbo CodesTurbo Codes
Turbo Codes
 
An efficient transcoding algorithm for G.723.1 and G.729A ...
An efficient transcoding algorithm for G.723.1 and G.729A ...An efficient transcoding algorithm for G.723.1 and G.729A ...
An efficient transcoding algorithm for G.723.1 and G.729A ...
 
Reed solomon codes
Reed solomon codesReed solomon codes
Reed solomon codes
 
Reed solomon explained v1 0
Reed solomon explained v1 0Reed solomon explained v1 0
Reed solomon explained v1 0
 
IRJET - Wireless Transmission of Data using LDPC Codes based on Raspberry Pi
IRJET - Wireless Transmission of Data using LDPC Codes based on Raspberry PiIRJET - Wireless Transmission of Data using LDPC Codes based on Raspberry Pi
IRJET - Wireless Transmission of Data using LDPC Codes based on Raspberry Pi
 
Reed Solomon Frame Structures Revealed
Reed Solomon Frame Structures RevealedReed Solomon Frame Structures Revealed
Reed Solomon Frame Structures Revealed
 
Jb2415831591
Jb2415831591Jb2415831591
Jb2415831591
 
Reed solomon code
Reed solomon codeReed solomon code
Reed solomon code
 

Viewers also liked

Viewers also liked (7)

Source coding for a mixed source: determination of second order asymptotics
Source coding for a mixed source: determination of second order asymptoticsSource coding for a mixed source: determination of second order asymptotics
Source coding for a mixed source: determination of second order asymptotics
 
Coding
CodingCoding
Coding
 
Channel coding
Channel coding  Channel coding
Channel coding
 
Channel coding
Channel codingChannel coding
Channel coding
 
Source coding theorem
Source coding theoremSource coding theorem
Source coding theorem
 
Source coding
Source codingSource coding
Source coding
 
Source coding
Source codingSource coding
Source coding
 

Similar to Combining cryptography with channel coding to reduce complicity

Implementation of reed solomon codes basics
Implementation of reed solomon codes basicsImplementation of reed solomon codes basics
Implementation of reed solomon codes basicsRam Singh Yadav
 
FPGA Implementation of Efficient Viterbi Decoder for Multi-Carrier Systems
FPGA Implementation of Efficient Viterbi Decoder for  Multi-Carrier SystemsFPGA Implementation of Efficient Viterbi Decoder for  Multi-Carrier Systems
FPGA Implementation of Efficient Viterbi Decoder for Multi-Carrier SystemsIJMER
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
BER Performance for Convalutional Code with Soft & Hard Viterbi Decoding
BER Performance for Convalutional Code with Soft & Hard  Viterbi DecodingBER Performance for Convalutional Code with Soft & Hard  Viterbi Decoding
BER Performance for Convalutional Code with Soft & Hard Viterbi DecodingIJMER
 
Paper id 312201514
Paper id 312201514Paper id 312201514
Paper id 312201514IJRAT
 
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC CodesPerformance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC Codesidescitation
 
PERFORMANCE ESTIMATION OF LDPC CODE SUING SUM PRODUCT ALGORITHM AND BIT FLIPP...
PERFORMANCE ESTIMATION OF LDPC CODE SUING SUM PRODUCT ALGORITHM AND BIT FLIPP...PERFORMANCE ESTIMATION OF LDPC CODE SUING SUM PRODUCT ALGORITHM AND BIT FLIPP...
PERFORMANCE ESTIMATION OF LDPC CODE SUING SUM PRODUCT ALGORITHM AND BIT FLIPP...Journal For Research
 
BLOCK CODES,STBCs & STTCs.pptx
BLOCK CODES,STBCs & STTCs.pptxBLOCK CODES,STBCs & STTCs.pptx
BLOCK CODES,STBCs & STTCs.pptxFAIZAN SHAFI
 
FPGA Implementation of LDPC Encoder for Terrestrial Television
FPGA Implementation of LDPC Encoder for Terrestrial TelevisionFPGA Implementation of LDPC Encoder for Terrestrial Television
FPGA Implementation of LDPC Encoder for Terrestrial TelevisionAI Publications
 
ITERATIVE METHOD FOR IMPROVEMENT OF CODING AND DECRYPTION
ITERATIVE METHOD FOR IMPROVEMENT OF CODING AND DECRYPTIONITERATIVE METHOD FOR IMPROVEMENT OF CODING AND DECRYPTION
ITERATIVE METHOD FOR IMPROVEMENT OF CODING AND DECRYPTIONIJNSA Journal
 
IRJET- A Survey on Encode-Compare and Decode-Compare Architecture for Tag Mat...
IRJET- A Survey on Encode-Compare and Decode-Compare Architecture for Tag Mat...IRJET- A Survey on Encode-Compare and Decode-Compare Architecture for Tag Mat...
IRJET- A Survey on Encode-Compare and Decode-Compare Architecture for Tag Mat...IRJET Journal
 
New Structure of Channel Coding: Serial Concatenation of Polar Codes
New Structure of Channel Coding: Serial Concatenation of Polar CodesNew Structure of Channel Coding: Serial Concatenation of Polar Codes
New Structure of Channel Coding: Serial Concatenation of Polar Codesijwmn
 

Similar to Combining cryptography with channel coding to reduce complicity (20)

Implementation of reed solomon codes basics
Implementation of reed solomon codes basicsImplementation of reed solomon codes basics
Implementation of reed solomon codes basics
 
FPGA Implementation of Efficient Viterbi Decoder for Multi-Carrier Systems
FPGA Implementation of Efficient Viterbi Decoder for  Multi-Carrier SystemsFPGA Implementation of Efficient Viterbi Decoder for  Multi-Carrier Systems
FPGA Implementation of Efficient Viterbi Decoder for Multi-Carrier Systems
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
40120140505011
4012014050501140120140505011
40120140505011
 
115 118
115 118115 118
115 118
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
BER Performance for Convalutional Code with Soft & Hard Viterbi Decoding
BER Performance for Convalutional Code with Soft & Hard  Viterbi DecodingBER Performance for Convalutional Code with Soft & Hard  Viterbi Decoding
BER Performance for Convalutional Code with Soft & Hard Viterbi Decoding
 
Paper id 312201514
Paper id 312201514Paper id 312201514
Paper id 312201514
 
K0216571
K0216571K0216571
K0216571
 
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC CodesPerformance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
 
Hv3414491454
Hv3414491454Hv3414491454
Hv3414491454
 
Turbo encoder and decoder chip design and FPGA device analysis for communicat...
Turbo encoder and decoder chip design and FPGA device analysis for communicat...Turbo encoder and decoder chip design and FPGA device analysis for communicat...
Turbo encoder and decoder chip design and FPGA device analysis for communicat...
 
PERFORMANCE ESTIMATION OF LDPC CODE SUING SUM PRODUCT ALGORITHM AND BIT FLIPP...
PERFORMANCE ESTIMATION OF LDPC CODE SUING SUM PRODUCT ALGORITHM AND BIT FLIPP...PERFORMANCE ESTIMATION OF LDPC CODE SUING SUM PRODUCT ALGORITHM AND BIT FLIPP...
PERFORMANCE ESTIMATION OF LDPC CODE SUING SUM PRODUCT ALGORITHM AND BIT FLIPP...
 
BLOCK CODES,STBCs & STTCs.pptx
BLOCK CODES,STBCs & STTCs.pptxBLOCK CODES,STBCs & STTCs.pptx
BLOCK CODES,STBCs & STTCs.pptx
 
FPGA Implementation of LDPC Encoder for Terrestrial Television
FPGA Implementation of LDPC Encoder for Terrestrial TelevisionFPGA Implementation of LDPC Encoder for Terrestrial Television
FPGA Implementation of LDPC Encoder for Terrestrial Television
 
ITERATIVE METHOD FOR IMPROVEMENT OF CODING AND DECRYPTION
ITERATIVE METHOD FOR IMPROVEMENT OF CODING AND DECRYPTIONITERATIVE METHOD FOR IMPROVEMENT OF CODING AND DECRYPTION
ITERATIVE METHOD FOR IMPROVEMENT OF CODING AND DECRYPTION
 
Ff34970973
Ff34970973Ff34970973
Ff34970973
 
Coding
CodingCoding
Coding
 
IRJET- A Survey on Encode-Compare and Decode-Compare Architecture for Tag Mat...
IRJET- A Survey on Encode-Compare and Decode-Compare Architecture for Tag Mat...IRJET- A Survey on Encode-Compare and Decode-Compare Architecture for Tag Mat...
IRJET- A Survey on Encode-Compare and Decode-Compare Architecture for Tag Mat...
 
New Structure of Channel Coding: Serial Concatenation of Polar Codes
New Structure of Channel Coding: Serial Concatenation of Polar CodesNew Structure of Channel Coding: Serial Concatenation of Polar Codes
New Structure of Channel Coding: Serial Concatenation of Polar Codes
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Combining cryptography with channel coding to reduce complicity

  • 1. International Journal of Electronics and Communication Engineering & TechnologyAND INTERNATIONAL JOURNAL OF ELECTRONICS (IJECET), ISSN COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 2, July-September (2012), © IAEME ISSN 0976 – 6464(Print) ISSN 0976 – 6472(Online) Volume 3, Issue 2, July- September (2012), pp. 346-351 IJECET © IAEME: www.iaeme.com/ijecet.html Journal Impact Factor (2012): 3.5930 (Calculated by GISI) ©IAEME www.jifactor.com COMBINING CRYPTOGRAPHY WITH CHANNEL CODING TO REDUCE COMPLICITY Sunaina Sharma Electronics and Communication Sunaina.sh39@gmail.com ABSTRACT Cryptography is a form of hiding the text so to increase the security of the information. On the other hand the main purpose of using coding is to reduce the error probability and to increase the efficiency of the channel. As the word complicity means criminal offence. This paper presents an overview how complicity can be reduce by combining Channel coding with cryptography with the use of LFSR shift register Keywords: Include at least 5 keywords or phrases I. INTRODUCTION The general communication system consist separate block for channel coding and for encryption [1]. The general diagram for has been shown below: Source Quantization Digital Data Input Source Encrypti Channel Modul Coding on Coding ation Channel Source Channel Equaliza Demodul Decoding Decoding tion ation D/A Digital Data Convertor Output Fig 1.1: Communication System 346
  • 2. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 2, July-September (2012), © IAEME This paper provides the information how to merge channel coding with the cryptography to provide more security to the signal. In the network security and cryptography, the study of confidentiality, authenticity and error correction are very important [4][6]. Many of the modern communication systems are limited in resources such as battery power and computational power. Mobile sensor networks, smart cards etc., are some examples. Hence a major research in communication concentrates on designing systems with low computational or hardware complexity. To reduce the computational and communication cost of two major cryptographic operations say channel coding and cryptography has been combined. And the proposed work as [1] [2]: Source Quantization Combining Blocks Source Encrypti Channel Modul Coding on Coding ation Channel Source Channel Equaliza Demodul Decoding Decoding tion ation D/A Convertor Fig 1.2: Purposed Communication System II.COMBINING CRYPTOGRAPHY WITH CHANNEL CODING The objective of the paper is to combine Cryptography with channel coding to reduce the computational and communication cost and to increase the security per bit [7] [8]. The block diagram shows how encryption and coding has been done on the signal [2]: LFSR G Matrix Sound Signal Digital Signal Channel Noise is converted divided into (White Gaussian into digital bits of 4 (i) Noise) Comparison Received between Word Coded and Uncoded word Finding out Calculating Coset Leader Standard Error Vector and Array Syndrome Fig 1.3: Block dig of channel coding with LFSR 347
  • 3. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 2, July-September (2012), © IAEME An approach to improve the performance of a communication system without increase in complexity is to embed encryption within channel coding. For this, programming has been done in Matlab. Since Matlab is commonly used for programming purposes, it provides several of inbuilt functions and tools used for programming purposes. A voice signal is first converted into digital and then encoded and encrypted. And at the receiver side it is decoded and decrypted. The flow diagram for this is as under [2]: LFSR Start XORing the Sound Signal tapes and generating the sequence Digital Signal Signal Divided Selecting G into Bit of 4(i) Matrix according to the sequence Codeword generated CW = i×G LFSR Channel Received word Standard valid Array Syndrome & G Coset leader matrix (errV) CW = i- errV Decoded Word Comparison between Coded and Un-coded Signal Stop Fig 14: Flow dig of cryptography with channel coding 348
  • 4. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 2, July-September (2012), © IAEME III. LINEAR FEEDBACK SHIFT REGISTER A linear feedback shift register (LFSR) is a shift register whose input bit is a linear function of its previous state. The most commonly used linear function of single bits is XOR. Thus, an LFSR is most often a shift register whose input bit is driven by the exclusive-or (XOR) of some bits of the overall shift register value. The initial value of the LFSR is called the seed, and because the operation of the register is deterministic, the stream of values produced by the register is completely determined by its current (or previous) state. Likewise, because the register has a finite number of possible states, it must eventually enter a repeating cycle [9]. A 12 bit key is given as input to the filter then this filter will generate 4095 (212-1) number of sequence. According to which the G matrix is selected. There are approximately 6000 equivalent G matrixes generated by applying different linear process on the basic matrix [2]. Key Define XORing Generating (As input) Tapping Tapings Numbers Fig 1.5: LFSR IV. ENCODING AND ENCRYPTING The Number of G matrix has been created using permutation and linear expirations. Such as addition of scalar multiple of one row to another, permutation of columns. Then using this numbers generated by the LFSR the respective matrix from the set of matrix has been selected. Then that particular matrix is multiplied with that codeword only [2]. Information Signal i (4 bits) Creating Choosing number G matrix Codeword of G according CW matrix LFSR Fig 1.6: Generating codeword using G matrix and LFSR Note: It must be noted here that for every 4 bit of information signal different G matrix is multiplied every time according to LFSR. As the intruder is not known to the key and the actual sequence of the number generated by the LFSR and the matrix to which the codeword is being multiplied he/she won’t be able to reconstruct the signal even if the codeword is known to them. And the reverse process has been employed to reconstruct the signal again at the receiver [8]. Coding rate R= k/n 349
  • 5. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 2, July-September (2012), © IAEME Block k n k n-k Information Bits Parity Bits n digital codewords Fig 1.7: Generating Codeword V. DECODING AND DECRYPTING The signal is received at the receiver end. And the standard array has been created. Once the standard array has been created, now next step is to check if the received word is correct or not. Now divide the received signal in bits of 7. This is the codeword. Now first step is to multiply the codeword with the parity check matrix if the resulted is zero that means no error has occurred otherwise the signal is in error. Compare this codeword with the standard array that the codeword falls in which column. The coset leader of that column is in error. Subtract the coset leader of the error vector with every received word the resultant is the actual codeword which has been send [2] [8]. Standard array has been created, now next step is to check if the received word is correct or not. Now divide the received signal in bits of 7. This is the codeword. Now first step is to multiply the codeword with the parity check matrix if the resulted is zero that means no error has occurred otherwise the signal is in error. Compare this codeword with the standard array that the codeword falls in which column. The coset leader of that column is in error. Subtract the coset leader with every received word the resultant is the actual codeword which has been send [5]. Note: It must be noted here that the weight which is being added should not be a codeword and the resultant should not be a repeating number i.e. all the numbers in the standard array should be unique and non repeating number. Received word Comparing Multiplied code with with Standard array Parity H matrix Column multiplied multiplied with according HT (syndrome) to LFSR Codeword = Error vector – received Define error word vector according to syndrome Fig 1.8: Decoding diagram 350
  • 6. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 2, July-September (2012), © IAEME VI. CONCLUSIONS Till now the work on channel coding consist of the single G matrix which is been multiplied with the complete data to produce the codewords but in this paper the number of G matrix has been produced by permutation and adding of one row with another. These G matrixes are randomly selected by LFSR register and multiplied with the block of data. For every new block different G matrix is selected and codeword is generated. As different G matrix is used every time it would be very hard for intruder to guess the right G matrix every time and to interpret the right information. ACKNOWLEDGMENT I would like to thank my Parents to provide financial and emotional spot to me and standing with me in every even and odds. I would like to thank almighty for showing me the right direction out of the blue, to help me stay calm in the oddest of the times and keep moving even at times when there was no hope. REFERENCES [1] Sunaina Sharma, Combining Cryptography with Channel Coding, ISOR, vol. 2. July 2012. [2] Sunaina Sharma, Combining Cryptographic Operation for complexity reduction, Lovely Professional University Jalandhar, M.Tech, 2012. [3] Natasa Zivic And Christoph Ruland, Channel coding as cryptographic Enhancer, Wseas Transactions On Communications, Issue 2, Volume 7, February 2008. [4] G. Julius Caesar, John F. Kennedy, Security Engineering: A Guide to Building Dependable Distributed Systems. [5] Anonym, Coding In Communication System. [6] Gary C. Kessler, An Overview of Cryptography, Auerbach, September 1998. Books [7] Richard E. Blahut, Algebraic code for data transmission (Cambridge University Press, 2003). [8] Ranjan Bose, Information theory, Coding and Cryptography (Tata McGraw Hill, 2008). Websites [9] www.wekipedia.com 351