TITLE

Parallel Joint Channel Coding and Cryptography

AUTHOR(S)
živić, Nataša; Ruland, Christoph
PUB. DATE
June 2008
SOURCE
International Journal of Computer Systems Science & Engineering;2008, Vol. 4 Issue 2, p140
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Method of Parallel Joint Channel Coding and Cryptography has been analyzed and simulated in this paper. The method is an extension of Soft Input Decryption with feedback, which is used for improvement of channel decoding of secured messages. Parallel Joint Channel Coding and Cryptography results in improved coding gain of channel decoding, which achieves more than 2 dB. Such results are an implication of a combination of receiver components and their interoperability.
ACCESSION #
35637344

 

Related Articles

  • Docorrelation: A Theory for Block Cipher Security. Vaudenay, Serge // Journal of Cryptology;2003, Vol. 16 Issue 4, p249 

    Pseudorandomness is a classical model for the security of block ciphers. In this paper we propose convenient tools in order to study it in connection with the Shannon Theory, the Carter—Wegman universal hash functions paradigm, and the Luby—Rackoff approach. This enables the...

  • Secret Key.  // Network Dictionary;2007, p428 

    A definition of the term "Secret Key" is presented. It refers to an encryption/decryption key known only by parties that exchange secret messages to one another. It is mentioned that communicators share the key so that they could encrypt and decrypt messages. It is asserted the system is broken...

  • Improvement of the Round Key Generation of AES. Junshe Wang; Han Xu; Mingqiu Yao // International Journal of Communications, Network & System Scienc;Dec2012, Vol. 5 Issue 12, p850 

    The key generation algorithm of AES was introduced, the weaknesses of the key generation design of AES were investigated. According to the key demand put forward a kind of new design idea, and this designing strategy was developed, which can be used to improve the key generation algorithm of...

  • Diffie-Hellman Key Agreement Standard.  // Network Dictionary;2007, p147 

    A definition of the term "Diffie-Hellman Key Agreement Standard" is presented. It refers to a Public-Key Cryptography Standard (PKCS) that outlines the use of the Diffie-Hellman Key Agreement, a method of sharing a secret key between two parties. The secret key is used to encrypt ongoing data...

  • Key Exchange Protocol.  // Network Dictionary;2007, p273 

    A definition of the term "key exchange protocol" is presented. Also called a key agreement protocol, it refers to the methodology by which various parties can exchange secret keys securely across an insecure network. According to the article, a key exchange protocol may use some element of...

  • Identity - Based Multiple Key Agreement Scheme. Dehkordi, Massoud Hadian; Alimoradi, Reza // KSII Transactions on Internet & Information Systems;Dec2011, Vol. 5 Issue 12, p2392 

    In order to protect some important information communicated through an insecure network, a common hidden key must be used. One can produce the common hidden key using key agreement protocols; and this helps to have high security in modern data networks. Today, the designers of public key...

  • Identity-Based Cryptography and Comparison with traditional Public key Encryption: A Survey. Girish; Phaneendra, H. D. // International Journal of Computer Science & Information Technolo;2014, Vol. 5 Issue 4, p5521 

    In this paper, we survey the state of research on identity-based cryptography(IBC) and compare it with the traditional public key encryption. IBC is an emerging area of public key cryptography. We first reviewing the basic concepts of IBE and identity based signature(IBS) schemes, and...

  • Cyberspace Security via Quantum Encryption. Hughes, David H. // Military Technology;2007, Vol. 31 Issue 5, p84 

    The article provides a description of Keyed Communication in Quantum Noise (KCQ), a cryptographic protocol demonstrating perfect or near-perfect security before addressing a new quantum data encryption protocol that uses quantum noise of light. Representations of KCQ related to ultra-secure data...

  • ESTIMATORS IN CRYPTOGRAPHIC MODELS. CONSTANTINESCU, Nicolae; BOLDEA, Costin; COSULSCHI, Mirel; GABROVEANU, Mihai // Annals of DAAAM & Proceedings;Jan2009, p883 

    One of the main problems in cryptography is to give criteria to provide good comparators of cipher systems. The security of a cipher system must include the security of the algorithm, the security of the key generator, management module and the security of the cryptographic key agreement...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics