2014
DOI: 10.1109/cc.2014.6825260
|View full text |Cite
|
Sign up to set email alerts
|

A joint encryption and error correction method used in satellite communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
8
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 7 publications
0
8
0
Order By: Relevance
“…However, this attack can be avoided simply by widening the circle of guessing, making the attacker take more time to find a way to access. Therefore, the higher encryption scheme with a large key size (32,64,128,168-bit,……) needs more time, maybe hours or days. Informing that, although back in the history the export rules in the United States limited key lengths to 56-bit symmetric keys, with rising the key size, resources required for a brute-force attack expand exponentially, not linearly.…”
Section: Brute Force Attackmentioning
confidence: 99%
“…However, this attack can be avoided simply by widening the circle of guessing, making the attacker take more time to find a way to access. Therefore, the higher encryption scheme with a large key size (32,64,128,168-bit,……) needs more time, maybe hours or days. Informing that, although back in the history the export rules in the United States limited key lengths to 56-bit symmetric keys, with rising the key size, resources required for a brute-force attack expand exponentially, not linearly.…”
Section: Brute Force Attackmentioning
confidence: 99%
“…On the other hand, the RMDO required by the PBDC algorithm mainly imposed by the calculation of the combing coefficients based on (33) and that of the signal summarization based on (32). Thus, its total complexity can be formulated as…”
Section: Complexity Analysismentioning
confidence: 99%
“…The former commonly relies on the short frame transmission, spread spectrum technology and multiple beam forming technology. The latter usually relies on the applications of encryption algorithms [31], [32]. However, neither relying on the former class nor the latter class can afford further complexity increase.…”
Section: Introductionmentioning
confidence: 99%
“…1 McEliece cryptosystem was the first attempt to operate error correction and encryption together. Secure channel encoding tried to couple channel coding with encryption to ensure high adaptive data error correction, [4][5][6] such as the combination with low density parity check and advanced encrypt standard (AES) 7 and Turbo and AES. 2,3 However, weak data correlation of McEliece cryptosystem caused error data hard to recover under high bit error rate (BER).…”
mentioning
confidence: 99%
“…2,3 However, weak data correlation of McEliece cryptosystem caused error data hard to recover under high bit error rate (BER). Secure channel encoding tried to couple channel coding with encryption to ensure high adaptive data error correction, [4][5][6] such as the combination with low density parity check and advanced encrypt standard (AES) 7 and Turbo and AES. 8 But bit error avalanche confuses secure channel encoding for global data disorder from data encryption.…”
mentioning
confidence: 99%