CFP last date
20 May 2024
Reseach Article

Crypto-Coding as DES-Convolution for Land Mobile Satellite Channel

by Rajashri Khanai, G. H. Kulkarni
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 86 - Number 18
Year of Publication: 2014
Authors: Rajashri Khanai, G. H. Kulkarni
10.5120/15083-3325

Rajashri Khanai, G. H. Kulkarni . Crypto-Coding as DES-Convolution for Land Mobile Satellite Channel. International Journal of Computer Applications. 86, 18 ( January 2014), 4-10. DOI=10.5120/15083-3325

@article{ 10.5120/15083-3325,
author = { Rajashri Khanai, G. H. Kulkarni },
title = { Crypto-Coding as DES-Convolution for Land Mobile Satellite Channel },
journal = { International Journal of Computer Applications },
issue_date = { January 2014 },
volume = { 86 },
number = { 18 },
month = { January },
year = { 2014 },
issn = { 0975-8887 },
pages = { 4-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume86/number18/15083-3325/ },
doi = { 10.5120/15083-3325 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:04:41.390667+05:30
%A Rajashri Khanai
%A G. H. Kulkarni
%T Crypto-Coding as DES-Convolution for Land Mobile Satellite Channel
%J International Journal of Computer Applications
%@ 0975-8887
%V 86
%N 18
%P 4-10
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, secure channel coding schemes based on convolutional codes are suggested to enhance the performance of combined cryptography and coding theory, which is called "Crypto-Coding". In the proposed work, Data Encryption Standard (DES) for security and channel coding algorithm such as convolutional code for efficient transmission are combined in a mono-block. This modification is required to improve the overall system performance. The combined System's performances are evaluated on Land Mobile Satellite (LMS) Channel. The results are compared with the system using ideal encryption and decryption.

References
  1. A. Mahmood, "Method to Improve Channel Coding Using Cryptography," world academy of science, Engineering and Technology, pp. 525-528, 2008.
  2. N. Zivic, "Concatenation and Turbo Principle of Channel Coding and Cryptography," IJCSNS International Journal of Computer Science and Network Security, VOL. 8,October 2008.
  3. A. J. Viterbi, "Error Bounds for Convolutional Codes and an Asymptotically Optimum Decoding Algorithm," IEEE Trans. Inf. Theory, IT-13, pp. 260–9, 1967.
  4. N. Zivic and C. Ruland "Parallel Joint Channel Coding and Cryptography," International Journal of Electrical, Computer, and Systems Engineering, pp. 140 -144, 2010.
  5. D. Gligoroski, S. J. Knapskog, and Suzana Andova, "Crypto-coding - Encryption and Error-Correction Coding in a Single Step," 2007.
  6. S. J. Knapskog, "New Cryptographic Primitives (Plenary Lecture)," 7th Computer Information Systems and Industrial Management Applications IEEE computer society, pp. 3-7, 2008.
  7. C. N. Mathur, K. Narayan, and K. P. Subbalakshmi "High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive," pp. 1-16.
  8. H. CAM, V. OZDURAN, and O. N. UCAN," A combined encryption and error correction scheme: AES-Turbo," Journal of electrical and electronics engineering year:, vol. 9, Number 1, pp. 891-896, 2009.
  9. D. A. Moghadam and V. T. Vakili, "Enhanced Secure Error Correction Code Schemes in Time Reversal UWB Systems", Wireless Personal Communications , Volume 64, Issue 2, pp 403-423, Springer , May 2012,
  10. J. Gwak, S. KimShin and H. M. Kim, "Reduced Complexity Sliding Window BCJR Decoding Algorithms for Turbo Codes", Cryptography and Coding , Lecture Notes in Computer Science Volume 1746, , pp 179-184, Springer , 1999.
  11. H. Kaneko, and E. Fujiwara, " Joint Source-Cryptographic-Channel Coding Based on Linear Block Codes", Applied Algebra, Algebraic Algorithms and Error-Correcting Codes ,Lecture Notes in Computer Science Volume 4851, pp 158-167, Springer , 2007.
  12. M. Padmaja and S. Shameem, "Secure Image Transmission over Wireless Channels", International conference on Computational Intelligence and Multimedia Applications, Vol. 4, pp. 44 – 48, dec. 2007.
  13. M. A. El-lskandarani, S. Darwish, and S. M. Abuguba," A robust and secure scheme for image transmission over wireless channels", 42nd Annual IEEE International Carnahan Conference on Security Technology( ICCST) , pp. 51 – 55, 2008.
  14. Qian Mao, Chuan Qin," A Novel Turbo-Based Encryption Scheme Using Dynamic Puncture Mechanism", Journal of Networks, Vol 7, No 2 , pp. 236-242, Feb 2012
  15. M. A. El-Iskandarani, S. Darwish, and S. M. Abuguba ," Reliable wireless error correction technique for secure image transmission", 43rd International Carnahan Conference on Security Technology, pp. 184 – 188, Oct. 2009.
  16. Y. Liang , H. V. Poor and S. Shamai," Secure communication over fading channel", IEEE Trans. On Information Theory, 2006.
  17. W. Stallings, "Cryptography and network security principles and practice", fifth edition, Prentice Hall, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Crypto-coding Convolutional coding Data Encryption Standard (DES) Land Mobile Satellite (LMS) Channel