减轻了严格雪崩准则(SAC)对无线通信信道对称密钥加密的影响

M. Matalgah, Walid Y. Zibideh, Amer M. Magableh
{"title":"减轻了严格雪崩准则(SAC)对无线通信信道对称密钥加密的影响","authors":"M. Matalgah, Walid Y. Zibideh, Amer M. Magableh","doi":"10.1109/ICCITECHNOL.2011.5762665","DOIUrl":null,"url":null,"abstract":"The strict avalanche criterion (SAC) is a desirable property of traditional symmetric-key cryptographic algorithms. The SAC is said to be satisfied if, whenever a single input bit is complemented, each of the output bits changes with a probability of one half. In terms of the block ciphers context, such a small change in either the key or the plaintext should cause a drastic change in the ciphertext. Consequently catastrophic error results when decrypting the ciphertext. Although this criterion is desirable to assure security, these algorithms do not take into account the bit error characteristics of the wireless channel. If an error occurs in the encrypted data over the channel, which is highly likely in wireless channels, the decryption process at the receiver results in half the original bits to be in error due to the SAC effect. Therefore, the need for new secure encryption algorithm that takes into account the bit error characteristics of the wireless channel becomes necessary. In this paper, we present two methods to tackle this effect while at the same time not tolerating security. We first present a modification to the way the traditional Data Encryption Standard (DES) itself is performed to make it prone to errors caused by the wireless channel. Secondly, we present a modification to the way encrypted data is transmitted over the channel. The two proposed methods are shown to achieve less SAC effect and hence improved error performance, higher data rates, and at at least as secure as traditional encryption algorithms. We assume the additive white Gaussian noise (AWGN) channel model in our analysis.","PeriodicalId":211631,"journal":{"name":"2011 International Conference on Communications and Information Technology (ICCIT)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Alleviating the effect of the strict avalanche criterion (SAC) of symmetric-key encryption in wireless communication channels\",\"authors\":\"M. Matalgah, Walid Y. Zibideh, Amer M. Magableh\",\"doi\":\"10.1109/ICCITECHNOL.2011.5762665\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The strict avalanche criterion (SAC) is a desirable property of traditional symmetric-key cryptographic algorithms. The SAC is said to be satisfied if, whenever a single input bit is complemented, each of the output bits changes with a probability of one half. In terms of the block ciphers context, such a small change in either the key or the plaintext should cause a drastic change in the ciphertext. Consequently catastrophic error results when decrypting the ciphertext. Although this criterion is desirable to assure security, these algorithms do not take into account the bit error characteristics of the wireless channel. If an error occurs in the encrypted data over the channel, which is highly likely in wireless channels, the decryption process at the receiver results in half the original bits to be in error due to the SAC effect. Therefore, the need for new secure encryption algorithm that takes into account the bit error characteristics of the wireless channel becomes necessary. In this paper, we present two methods to tackle this effect while at the same time not tolerating security. We first present a modification to the way the traditional Data Encryption Standard (DES) itself is performed to make it prone to errors caused by the wireless channel. Secondly, we present a modification to the way encrypted data is transmitted over the channel. The two proposed methods are shown to achieve less SAC effect and hence improved error performance, higher data rates, and at at least as secure as traditional encryption algorithms. We assume the additive white Gaussian noise (AWGN) channel model in our analysis.\",\"PeriodicalId\":211631,\"journal\":{\"name\":\"2011 International Conference on Communications and Information Technology (ICCIT)\",\"volume\":\"129 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-03-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 International Conference on Communications and Information Technology (ICCIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCITECHNOL.2011.5762665\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 International Conference on Communications and Information Technology (ICCIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCITECHNOL.2011.5762665","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

摘要

严格雪崩准则(SAC)是传统对称密钥加密算法的理想特性。如果当单个输入位被补充时,每个输出位都以1 / 2的概率变化,那么SAC就被认为是满足的。就块密码上下文而言,密钥或明文的微小变化都应该导致密文的剧烈变化。因此,在解密密文时将导致灾难性的错误。虽然这一标准是保证安全性的理想标准,但这些算法没有考虑到无线信道的误码特性。如果在通道上加密的数据中出现错误(这在无线通道中很可能发生),则接收器的解密过程会由于SAC效应导致一半的原始比特出现错误。因此,需要一种考虑到无线信道误码特性的新型安全加密算法。在本文中,我们提出了两种方法来解决这种影响,同时不容忍安全。我们首先对传统数据加密标准(DES)本身的执行方式进行了修改,使其容易受到无线信道引起的错误的影响。其次,我们对加密数据在信道上传输的方式进行了修改。结果表明,这两种方法实现了较小的SAC效应,从而改善了错误性能,提高了数据速率,并且至少与传统加密算法一样安全。在我们的分析中我们假设加性高斯白噪声(AWGN)信道模型。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Alleviating the effect of the strict avalanche criterion (SAC) of symmetric-key encryption in wireless communication channels
The strict avalanche criterion (SAC) is a desirable property of traditional symmetric-key cryptographic algorithms. The SAC is said to be satisfied if, whenever a single input bit is complemented, each of the output bits changes with a probability of one half. In terms of the block ciphers context, such a small change in either the key or the plaintext should cause a drastic change in the ciphertext. Consequently catastrophic error results when decrypting the ciphertext. Although this criterion is desirable to assure security, these algorithms do not take into account the bit error characteristics of the wireless channel. If an error occurs in the encrypted data over the channel, which is highly likely in wireless channels, the decryption process at the receiver results in half the original bits to be in error due to the SAC effect. Therefore, the need for new secure encryption algorithm that takes into account the bit error characteristics of the wireless channel becomes necessary. In this paper, we present two methods to tackle this effect while at the same time not tolerating security. We first present a modification to the way the traditional Data Encryption Standard (DES) itself is performed to make it prone to errors caused by the wireless channel. Secondly, we present a modification to the way encrypted data is transmitted over the channel. The two proposed methods are shown to achieve less SAC effect and hence improved error performance, higher data rates, and at at least as secure as traditional encryption algorithms. We assume the additive white Gaussian noise (AWGN) channel model in our analysis.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Tunable multi-wavelength SOA based linear cavity fiber laser source for optical communications applications A low complexity fine timing offset and channel estimation algorithm for cooperative diversity OFDM system On the detection and estimation of correlated signal using circular antenna arrays Critical infrastructure protection: A 21st century challenge Sharpening the limits of the zeros of Daubechies wavelets related polynomials
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1