Book ChapterDOI
Design and Analysis of a Secure Coded Communication System Using Chaotic Encryption and Turbo Product Code Decoder
S. Khavya,Karthi Balasubramanian,B. Yamuna,Deepak Mishra +3 more
- pp 657-666
Reads0
Chats0
TLDR
In this article, the design and analysis of a secure and reliable communication system accomplished using logistic map-based chaotic encryption and turbo product codes is presented. But the system is simulated using MATLAB and it is shown that the use of encryption for secure communication does not degrade the system performance.Abstract:
Errors in a transmitted message is unavoidable since noise is inevitable in any communication channel. For reliable transmission of messages, the bit error rate has to be kept at an acceptable rate by the use of proper error control coding schemes. To ensure that the transmission is also secure, data encryption is used as an integral part of the system. This paper deals with the design and analysis of a secure and reliable communication system accomplished using logistic map-based chaotic encryption and turbo product codes. The system is simulated using MATLAB and it is shown that the use of encryption for secure communication does not degrade the system performance. The hardware design of the decoder is also done and verified in Verilog using the same set of vectors as obtained from the system simulation. BER performance was analyzed in all the different scenarios and the correctness of the design was established.read more
Citations
More filters
Book ChapterDOI
Implementation of Classical Error Control Codes for Memory Storage Systems Using VERILOG
TL;DR: In this paper , the authors demonstrate the VERILOG implementation targeted for Artix-7 board, various error coding, and correction methodologies in the view of hardware storage using field programmable gate array (FPGA), thereby providing the readers an insight into the performance and advantages offered by these techniques.
Book ChapterDOI
Design of a High-Speed and Low-Power AES Architecture
TL;DR: In this article , the design of a high-speed and low-power advanced encryption standard (AES) architecture to be used as a hardware accelerator in various cryptographic systems is explored.
Journal ArticleDOI
Low power and area efficient AES implementation using ROM based key expansion and rotational shift
TL;DR: In this paper , the design and implementation of a low power and area efficient AES architecture has been discussed, which is achieved by avoiding the use of registers and using ROM during the sorting operation of AddRound keys and by merging of shift row operation and byte substitution.
Proceedings ArticleDOI
Low power and area efficient AES implementation using ROM based key expansion and rotational shift
TL;DR: In this paper , the design and implementation of a low power and area efficient AES architecture has been discussed, which is achieved by avoiding the use of registers and using ROM during the sorting operation of AddRound keys and by merging of shift row operation and byte substitution.
References
More filters
Journal ArticleDOI
Near-optimum decoding of product codes: block turbo codes
TL;DR: An iterative decoding algorithm for any product code built using linear block codes based on soft-input/soft-output decoders for decoding the component codes so that near-optimum performance is obtained at each iteration.
Journal ArticleDOI
Chaos-based cryptography: a brief overview
TL;DR: In this paper, chaos-based cryptography is discussed from a point of view which the author believes is closer to the spirit of both cryptography and chaos theory than the way the subject has been treated recently by many researchers.
Book
The logistic map and the route to chaos : from the beginnings to modern applications
Marcel Ausloos,Michel Dirickx +1 more
TL;DR: In this paper, a model of chaotic growth with the Logistic Model of P.-F. Verhulst's final triumph is presented, where the authors study the influence of advection and nonlocal effects on the evolution of complex networks of oscillators.
BookDOI
The Logistic Map and the Route to Chaos
Marcel Ausloos,Michel Dirickx +1 more
TL;DR: In this article, a model of chaotic growth with the Logistic Model of P.-F. Verhulst's final triumph is presented, where the authors study the influence of advection and nonlocal effects on the evolution of complex networks of oscillators.
Journal ArticleDOI
Analyzing and improving a chaotic encryption method
TL;DR: A zero-point autocorrelation method is given, which can recover the parameters of the scalar signal from the modulated signal, and the messages will be extracted from the demodulated chaotic carrier by using return map.
Related Papers (5)
Joint Error Correction and Encryption Scheme Based on Turbo Codes
Qian Mao,Longji Sun,Chuan Qin +2 more