A joint encryption and error correction scheme based on chaos and LDPC

  • Jie Liu
  • Xiaojun Tong
  • Yang Liu
  • Miao Zhang
  • Jing Ma
Original Paper
  • 9 Downloads

Abstract

Although some cryptosystems based on error correction code have been presented, the security and efficiency must be overcome before it can be realized. In this paper, a novel method of combined encryption and error correction based on hyperchaotic system and lower-density parity check (LDPC) code is proposed to provide both of the security and efficiency. The proposed system adopts a pseudorandom sequence generator based on hyperchaotic system for scrambling the plaintext and constructing the dynamic permutation box. The message is encoded by the LDPC encoder after it was scrambled and then encrypted by the permutation box. Different permutation patterns generated for different message blocks help to provide high security, while the encoder helps to provide capacity of error correction. MATLAB simulations reveal that the proposed scheme is more secure and effective than the existing joint encryption and error correction coding scheme. Moreover, the full error correction ability of LDPC is kept without confliction. So, the proposed scheme is suitable for secure communication system.

Keywords

Cryptosystem Error correction Hyperchaotic LDPC code 

Notes

Acknowledgements

This work was supported by the Foundation of Science and Technology on Information Assurance Laboratory (No. KJ-17-004), 2017 Weihai University Co-construction Project.

Compliance with ethical standards

Conflicts of interest

The authors declare that they have no conflict of interest.

References

  1. 1.
    Mceliece, R. J.: A public-key crypto-system based on algebraic coding theory. Deep Space Network Progress Report, pp. 114–116 (1978)Google Scholar
  2. 2.
    Xinmei, W.: Generalization of M public-key cryptosystem and analysis of its performance on noisy channel. Acta Electron. Sin. 14, 84–90 (1986)Google Scholar
  3. 3.
    Rao, T.R.N., Nam, K.-H.: Private-key algebraic-coded cryptosystems. Adv. Cryptol. (1986).  https://doi.org/10.1007/3-540-47721-7_3 MATHGoogle Scholar
  4. 4.
    Struik, R., VanTilburg, J.: The Rao-Nam scheme is insecure against a chosen-plaintext attack. Conf. Adv. Cryptol. (1987).  https://doi.org/10.1007/3-540-48184-2_40 Google Scholar
  5. 5.
    Rao, T.R.N., Nam, K.-H.: Private-key algebraic-code encryptions. IEEE Trans. Inf. Theory. 35, 829–833 (1989)MathSciNetCrossRefMATHGoogle Scholar
  6. 6.
    Niederreiter, H.: Knapsack-type cryptosystems and algebraic coding theory. Probl. Control Inf. Theory 15, 159–166 (1986)MathSciNetMATHGoogle Scholar
  7. 7.
    Rao, T.R.N., Hwang, T.: Secret error-correcting codes (SECC). Adv. Cryptol. 36, 540–563 (1988)MATHGoogle Scholar
  8. 8.
    Mathur, C.N., Narayan, K., Subbalakshmi, K.P.: On the design of error-correcting ciphers. EURASIP J. Wirel. Commun. Netw. 2006, 42871 (2006)CrossRefGoogle Scholar
  9. 9.
    Xiao, Y., Zhao, Y., Lee, M.H.: Encrypting LDPC-codec. In: International Conference on Signal Processing. Beijing, China (2006)Google Scholar
  10. 10.
    Ng, T.Y., Chew, L.Y., Puthusserypady, S.: Error correction with chaotic switching between convolutional codecs. IEEE Trans. Circuits Syst. I. Regul. 55, 3655–3662 (2008)MathSciNetCrossRefGoogle Scholar
  11. 11.
    Zhou, J., Au, O.C.: On the security of chaotic convolutional coder. IEEE Trans. Circuits Syst. I Regul. Pap. 58, 595–606 (2011)MathSciNetCrossRefGoogle Scholar
  12. 12.
    Adamo, O., Fu, S., Varanasi, M.R.: Physical layer error correction based cipher. Glob. Telecommun. Conf. (2010).  https://doi.org/10.1109/GLOCOM.2010.5683788 Google Scholar
  13. 13.
    Cankaya, E.C., Nair b, S., Cankaya, H.C.: Applying error correction codes to achieve security and dependability. Comput. Stand. Interfaces 35, 78–86 (2013)CrossRefGoogle Scholar
  14. 14.
    Su, Q., Xiao, Y.: Design of LDPC-based error correcting cipher. Int. Conf. Wirel. Mob. Multimed. Netw. (2008).  https://doi.org/10.1049/cp:20081038 Google Scholar
  15. 15.
    Cam, H., Ucan, O.N., Odabasioglu, N., Sonmez, A.C.: Multilevel/AES-LDPCC-CPFSK with channel equalization over WSSUS multipath environment. AEU Int. J. Electron. Commun. 65, 1015–1022 (2011)CrossRefGoogle Scholar
  16. 16.
    Ning, L., Kanfeng, L., Wenliang, L., Zhongliang, D.: A joint encryption and error correction method used in satellite communications. China Commun. 11, 70–79 (2014)CrossRefGoogle Scholar
  17. 17.
    Yao, J., Liu, J., Yang, Y.: Joint encryption and error correction technical research applied an efficient turbo code. Int. J. Secur. Appl. 9, 31–46 (2015)Google Scholar
  18. 18.
    Zhang, W., MAO, Q.: Error-correcting and encryption joint coding scheme based on turbo code. Radio Commun. Technol. 38, 29–32 (2012)Google Scholar
  19. 19.
    Stuart, C.M., Deepthi, P.P.: Low complex system for physical layer security using NLFG and QCLDPC code. Int. Symp. Secur. Comput. Commun. 467, 313–324 (2014)Google Scholar
  20. 20.
    Chen, Z., Yin, L., Pei, Y., Lu, J.: CodeHop: physical layer error correction and encryption with LDPC-based code hopping. Sci. China Inf. Sci. 59, 1–15 (2016)Google Scholar
  21. 21.
    Stuart, C.M., Spandana, K., Dhanaraj, K.J., Pattathil, D.P.: Design and implementation of hardware efficient modified Rao–Nam scheme with high security for wireless sensor networks. J. Inf. Secur. Appl. 29, 65–79 (2016)Google Scholar
  22. 22.
    Chen, Z.Q., Yang, Y., Yuan, Z.Z.: A single three-wing or four-wing chaotic attractor generated from a three-dimensional smooth quadratic autonomous system. Chaos Solitons Fractals 38, 1187–1196 (2008)MathSciNetCrossRefMATHGoogle Scholar
  23. 23.
    Stuart, CM, Deepthi, P.P.: FPGA implementation of highly secure, hardware-efficient QCLDPC code. Based nonlinear cryptosystem for wireless sensor networks. Int. J. Commun. Syst. (2017). https://doi.org/10.1002/dac.3233

Copyright information

© Springer Science+Business Media B.V., part of Springer Nature 2018

Authors and Affiliations

  • Jie Liu
    • 1
    • 2
  • Xiaojun Tong
    • 1
  • Yang Liu
    • 1
  • Miao Zhang
    • 1
  • Jing Ma
    • 3
  1. 1.School of Computer Science and TechnologyHarbin Institute of TechnologyWeihaiChina
  2. 2.School of RongchengHarbin University of Science and TechnologyRongchengChina
  3. 3.Science and Technology on Information Assurance LaboratoryBeijingChina

Personalised recommendations