Browse > Article
http://dx.doi.org/10.6109/jkiice.2017.21.7.1401

Cryptographic synchronization signal generation method using maximal length sequence  

Son, Young-ho (Attached Institute of ETRI)
Bae, Keun-sung (School of Electronics Engineering, Kyungpook National University)
Abstract
Cryptographic synchronization which synchronizes internal state of cryptographic algorithm and ciphertext stream between an encryptor and a decryptor affects the quality of secure communication. If there happens a synchronization loss between a transmitter and a receiver in a secure communication, the output of the receiver is unintelligible until resynchronization is made. Especially, in the secure communication on a wireless channel with high BER, synchronization performance can dominate its quality. In this paper, we proposed a novel and noise robust synchronization signal generation method as well as its detection algorithm. We generated a synchronization signal in the form of a masking structure based on the maximal length sequence, and developed a detection algorithm using a correlation property of the maximal length sequence. Experimental results have demonstrated that the proposed synchronization signal outperforms the conventional concatenated type synchronization signal in a noisy environment.
Keywords
Cryptographic synchronization; secure communication; synchronization signal; m-sequence; masking; etc;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. J. Menezes, P. C. Oorschot, and S. A. Vanstone, Handbook of Applied cryptography, Boca Raton, FL: CRC press, 1996.
2 W. Stallings and M. P. Tahiliani, Cryptography and Network Security: Principles and Practice (6th edition), London: Pearson, 2014.
3 H. J. Lee, "Highly reliable synchronous stream cipher system for link encryption," in Proceedings of International Conference on Computational Science and Its Applications, pp. 269-278, 2006.
4 J. H. Yoon, "A non-periodic random sequence resynchronization method using the address data of LAPB and HDLC," Ph. D. Dissertation, Kyungpook National University, Daegu, Korea, 1997.
5 G. Ascheid and H. Meyr, "Cycle slips in phase-locked loops: a tutorial survey," IEEE Trans. Communications, vol. 30, no.10, pp. 2228-2241, 1982.   DOI
6 V. Smirnova and A. V. Proskurnikov, "Phase locking, oscillations and cycle slipping in synchronization systems," in Proceedings of European Control Conference, pp. 873-878, 2016.
7 P. Eliardsson, E. Axell, P. Stenumgaard, K. Wiklundh, B. Johansson, and B. Asp, "Military HF communications considering unintentional platform-generated electromagnetic interference," in Proceedings of International Conference on Military Communications and Information Systems, pp. 1-6, 2015.
8 Witvliet, Ben A. and Rosa Ma Alsina-Pages. (2017). Radio communication via Near Vertical Incidence Skywave propagation: an overview. Telecommunication Systems [Online]. pp. 1-15. Available: http://link.springer.com/article/10.1007/s11235-017-0287-2.
9 R. J. Sutton, Secure Communications: Applications and Management, Chichester, U.K.: John Wiley & Sons, 2002.
10 S. W. GOLOMB. Digital communications with Space Applications, Englewood Cliffs, NJ: Prentice-Hall, 1964.
11 A. Ahmad, S. S. Al-Busaidi, M. J. Al-Musharafi, "On properties of PN sequences generated by LFSR - A generalized study and simulation modeling," Indian Journal of Science and Technology, vol. 6, no 10. pp. 5351-5358, Oct. 2013.
12 F. J. MacWilliams and N. J. A. Sloane, The theory of error correcting codes, Amsterdam: North-Holland, 1977.
13 N. S. Abinaya and P. Prakasam, "Performance analysis of maximum length LFSR and BBS method for cryptographic application," in Proceedings of International Conference on Electronics and Communication Systems, pp. 1-5, 2014.
14 Y. H. Son, J. K. Hong and K. S. Bae, "Authentication masking code against DoS of T-MAC protocol," Journal of Central South University, vol. 20, no. 7, pp. 1889-1895, Jul. 2013.   DOI