2012
DOI: 10.4304/jnw.7.2.236-242
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Turbo-Based Encryption Scheme Using Dynamic Puncture Mechanism

Abstract: This paper proposes a novel encryption method based on Turbo code. In most communication systems, information encryption and error correction are always independent. While joint encryption and error correction codes combine these two processes into one. In order to provide information encryption and error correction simultaneously, we generate a normal random sequence that controls the puncturing mechanism by a secret key in the Turbo encoder. The puncturing mechanism is dynamic and controlled by the secret ke… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 20 publications
0
5
0
Order By: Relevance
“…Chaotic sequence{} k s is generated by a key (Logistic mapping initial value), through its binary processing, pseudo-random binary sequence {} k t is generated. Suppose the number of data is i, which the value is "1" in{} k t ;and the number of data is j, which the value is "0" in{} 12 { , , , } j q q q ,at last, the system-bit information sequence whose length is N is obtained.…”
Section: System-bit Information Sequence Decryptionmentioning
confidence: 99%
“…Chaotic sequence{} k s is generated by a key (Logistic mapping initial value), through its binary processing, pseudo-random binary sequence {} k t is generated. Suppose the number of data is i, which the value is "1" in{} k t ;and the number of data is j, which the value is "0" in{} 12 { , , , } j q q q ,at last, the system-bit information sequence whose length is N is obtained.…”
Section: System-bit Information Sequence Decryptionmentioning
confidence: 99%
“…Its strength depends on the constitutive parameters and roughness of the ground. Since this ray normally arrives with a negative elevation, it is not always received by a directional terminal antenna [14].…”
Section: Land Mobile Satellite Channelmentioning
confidence: 99%
“…In recent years, there have been some investigations that combine encryption and coding to reduce the complexity of the system. One of these methods is based on adjusting the interleaver or the puncturing mechanism of the Turbo code to enhance reliability and security [10][11][12][13][14][15][16][17][18]. In [10], the authors proposed a joint error correction and encryption approach, but this encryption and coding scheme has a low error-correcting capability and is dependent on the hard decision.…”
Section: Introductionmentioning
confidence: 99%
“…In [10], the authors proposed a joint error correction and encryption approach, but this encryption and coding scheme has a low error-correcting capability and is dependent on the hard decision. The methods proposed in [11,12] were focused on changing the puncturing mechanism, the performances of the system are comparable to the normal Turbo code at the same coding rate, but relying on a static secret key has the disadvantage of allowing illegal users to guess the secret key or even the plaintext.…”
Section: Introductionmentioning
confidence: 99%