scispace - formally typeset
Book ChapterDOI

Design and Analysis of a Secure Coded Communication System Using Chaotic Encryption and Turbo Product Code Decoder

Reads0
Chats0
TLDR
In this article, the design and analysis of a secure and reliable communication system accomplished using logistic map-based chaotic encryption and turbo product codes is presented. But the system is simulated using MATLAB and it is shown that the use of encryption for secure communication does not degrade the system performance.
Abstract
Errors in a transmitted message is unavoidable since noise is inevitable in any communication channel. For reliable transmission of messages, the bit error rate has to be kept at an acceptable rate by the use of proper error control coding schemes. To ensure that the transmission is also secure, data encryption is used as an integral part of the system. This paper deals with the design and analysis of a secure and reliable communication system accomplished using logistic map-based chaotic encryption and turbo product codes. The system is simulated using MATLAB and it is shown that the use of encryption for secure communication does not degrade the system performance. The hardware design of the decoder is also done and verified in Verilog using the same set of vectors as obtained from the system simulation. BER performance was analyzed in all the different scenarios and the correctness of the design was established.

read more

Citations
More filters
Book ChapterDOI

Implementation of Classical Error Control Codes for Memory Storage Systems Using VERILOG

Jiaqi Wang
TL;DR: In this paper , the authors demonstrate the VERILOG implementation targeted for Artix-7 board, various error coding, and correction methodologies in the view of hardware storage using field programmable gate array (FPGA), thereby providing the readers an insight into the performance and advantages offered by these techniques.
Book ChapterDOI

Design of a High-Speed and Low-Power AES Architecture

Hugh Barr
TL;DR: In this article , the design of a high-speed and low-power advanced encryption standard (AES) architecture to be used as a hardware accelerator in various cryptographic systems is explored.
Journal ArticleDOI

Low power and area efficient AES implementation using ROM based key expansion and rotational shift

TL;DR: In this paper , the design and implementation of a low power and area efficient AES architecture has been discussed, which is achieved by avoiding the use of registers and using ROM during the sorting operation of AddRound keys and by merging of shift row operation and byte substitution.
Proceedings ArticleDOI

Low power and area efficient AES implementation using ROM based key expansion and rotational shift

TL;DR: In this paper , the design and implementation of a low power and area efficient AES architecture has been discussed, which is achieved by avoiding the use of registers and using ROM during the sorting operation of AddRound keys and by merging of shift row operation and byte substitution.
References
More filters
Journal ArticleDOI

Near-optimum decoding of product codes: block turbo codes

TL;DR: An iterative decoding algorithm for any product code built using linear block codes based on soft-input/soft-output decoders for decoding the component codes so that near-optimum performance is obtained at each iteration.
Journal ArticleDOI

Chaos-based cryptography: a brief overview

TL;DR: In this paper, chaos-based cryptography is discussed from a point of view which the author believes is closer to the spirit of both cryptography and chaos theory than the way the subject has been treated recently by many researchers.
Book

The logistic map and the route to chaos : from the beginnings to modern applications

TL;DR: In this paper, a model of chaotic growth with the Logistic Model of P.-F. Verhulst's final triumph is presented, where the authors study the influence of advection and nonlocal effects on the evolution of complex networks of oscillators.
BookDOI

The Logistic Map and the Route to Chaos

TL;DR: In this article, a model of chaotic growth with the Logistic Model of P.-F. Verhulst's final triumph is presented, where the authors study the influence of advection and nonlocal effects on the evolution of complex networks of oscillators.
Journal ArticleDOI

Analyzing and improving a chaotic encryption method

TL;DR: A zero-point autocorrelation method is given, which can recover the parameters of the scalar signal from the modulated signal, and the messages will be extracted from the demodulated chaotic carrier by using return map.
Related Papers (5)