Physical Layer Error Correction Based Cipher

In conventional communication systems, error correction is carried out at the physical layer while data security is performed performed at an upper layer. As a result, these steps are done as separate steps. As opposed to this conventional system, we present a scheme that combines error correction and data security as one unit so that both encryption and encoding could be carried out at the physical layer. Hence, in this paper, we present an Error Correction Based Cipher (ECBC) that combines error correction and encryption/decryption in a single step. Encrypting and encoding or decoding and decrypting in a single step will lead to a faster and more efficient implementation. One of the challenges of using previous joint schemes in a communications channel is that there is a tradeoff between data reliability and security. However in ECBC, there is no trade off between reliability and security. Errors introduced at the transmitter for randomization are removed at the receiver. Hence ECBC can utilize its full capacity to correct channel errors. We show the result of randomization test on ECBC and its security against conventional attacks. We also present the result of the FPGA implementation of the ECBC encryption.

[1]  Stephen M. Matyas,et al.  Cryptography: A New Dimension in Computer Data Security--A Guide for the Design and Implementation of Secure Systems , 1982 .

[2]  T. R. N. Rao,et al.  Joint encryption and error correction schemes , 1984, ISCA '84.

[3]  Ahmad Ahmad,et al.  Study of a new physical layer encryption concept , 2008, 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[4]  André Zúquete,et al.  Physical-layer encryption with stream ciphers , 2008, 2008 IEEE International Symposium on Information Theory.

[5]  T. R. N. Rao,et al.  Private-key algebraic-code encryptions , 1989, IEEE Trans. Inf. Theory.

[6]  Qing Su,et al.  Design of LDPC-based error correcting cipher , 2008 .

[7]  Tzonelih Hwang,et al.  Secret Error-Correcting Codes (SECC) , 1990 .

[8]  Pierre L'Ecuyer,et al.  TestU01: A C library for empirical testing of random number generators , 2006, TOMS.

[9]  René Struik,et al.  The Rao-Nam Scheme is Insecure Against a Chosen-Plaintext Attack , 1987, CRYPTO.

[10]  K. P. Subbalakshmi,et al.  On the Design of Error-Correcting Ciphers , 2006, EURASIP J. Wirel. Commun. Netw..

[11]  Robert J. McEliece,et al.  A public key cryptosystem based on algebraic coding theory , 1978 .

[12]  Manfred Glesner,et al.  Design of a reconfigurable AES encryption/decryption engine for mobile terminals , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).

[13]  Chetan N. Mathur,et al.  A MATHEMATICAL FRAMEWORK FOR COMBINING ERROR CORRECTION AND ENCRYPTION , 2007 .

[14]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[15]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[16]  T. R. N. Rao,et al.  Private-Key Algebraic-Coded Cryptosystems , 1986, CRYPTO.