Pseudo Random Generator Based Public Key Cryptography

Advances in communication technology have seen strong interest in digital data transmission. However, illegal data access has become more easy and prevalent in wireless and general communication networks. In order to protect the valuable data from illegal access, different kinds of cryptographic systems have been proposed. In this paper, a new integrating channel coding and cryptography design communication systems is proposed. So we use cryptography as an error detection tool. In order to preserve the advantages of encryption and to improve its disadvantages, we place the encryptor before the encoder. The hamming encoder is used to select the generator matrix to be used as a block code to form the new system .In this the security of common cryptographic primitive i.e a key stream generator based on LFSR can be strengthened by using the properties of a physical layer.So, a passive eaves dropping will experience great difficulty in cracking the LFSR based cryptography system as the computational complexity of discovering the secret key increases to large extent. The analysis indicates that the proposed design possesses the following feature. Its security is higher than the conventional one with the channel encoder only. Privacy is more due to unknown random codes. As the applied codes are unknown to a hostile user, this means that it is hardly possible to detect the message of another user. Anti-jam performance is good. It overcomes the disadvantage of Chaos based cryptography system as input data is not extended and hence bandwidth is not wasted. Moreover, the computer simulation shows that the proposed system has a good ability in error detection especially when the SNR per bit is moderate high, and the detection ability is enhanced when the increased length of Hamming code is employed.

[1]  Christoph Ruland,et al.  Using HMAC for Error Correction over a Wireless Channel , 2009, 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing.

[2]  J. C. Hancock,et al.  Performance of Hamming Codes , 1963, IEEE Transactions on Space Electronics and Telemetry.

[3]  Michael A. Jensen,et al.  Improved channel quantization for secret key establishment in wireless systems , 2010, 2010 IEEE International Conference on Wireless Information Technology and Systems.

[4]  Christoph Ruland,et al.  Error correction over wireless channels using symmetric cryptography , 2009, 2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology.

[5]  Gordon B. Agnew Cryptographic systems using redundancy , 1990, IEEE Trans. Inf. Theory.

[6]  Nelson Wax On upper bounds for error detecting and error correcting codes of finite length , 1959, IRE Trans. Inf. Theory.

[7]  Claude E. Shannon,et al.  General treatment of the problem of coding , 1953, Trans. IRE Prof. Group Inf. Theory.

[8]  J.E. Mazo,et al.  Digital communications , 1985, Proceedings of the IEEE.