Abstract
In practical communication applications, the channels for intended users and eavesdroppers are not error-free and Wyner’s wiretap channel model deals with the scenario. Using this model, the security of a stand-alone stream cipher can be strengthened by exploiting the properties of physical layer. In this paper, a joint channel coding and light weight cryptography for setting a Gaussian wiretap channel is proposed. The scheme is based on a keyed Quasi Cyclic Low Density Parity Check (QCLDPC) encoder and light weight stream cipher based on Linear Feedback Shift Register (LFSR). The significant contribution is that, highly complex non-linear function that provides security in a Non-Linear Filter Generator (NLFG) is replaced by a simple non-linear function without compromising security. Enhanced security with lesser complexity is achieved by embedding security in channel encoder. Results show that attacker cannot extract the secret key because of the errors introduced in the physical layer due to unknown structure of the channel encoder.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Fan, X., Mandal, K., Gong, G.: WG-8: A Light-Weight Stream Cipher for Resource-Constrained Smart Devices. In: Singh, K., Awasthi, A.K. (eds.) QShine 2013. LNICST, vol. 115, pp. 617–632. Springer, Heidelberg (2013)
Dichtl, M.: On nonlinear filter generators. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 103–106. Springer, Heidelberg (1997)
Teo, S.-G., Simpson, L.R., Dawson, E.: Bias in the nonlinear filter generator output sequence. International Journal of Cryptology Research 2, 27–37 (2010)
Thangaraj, A., Dihidar, S., Calderbank, A.R., McLaughlin, S.W., Merolla, J.M.: Applications of LDPC codes to the wiretap channel. IEEE Transactions on Information Theory 53, 2933–2945 (2007)
Wong, C.W., Wong, T.F., Shea, J.M.: LDPC code design for the BPSK-constrained Gaussian wiretap channel. In: IEEE GLOBECOM Workshop (2011)
Harrison, W.K., Mclaughlin, S.W.: Physical-layer security: Combining error control coding and cryptography. In: Proc. IEEE Int. Conf. Communications, Dresden, Germany, pp. 1–5 (2009)
Harrison, W., Almeida, J., Bloch, M., McLaughlin, S., Barros, J.: Coding for secrecy: An overview of error-control coding techniques for physical-layer security. IEEE Signal Processing Magazine 30(5), 41–50 (2013)
Klinc, D., Ha, J., McLaughlin, S.W., Barros, J., Kwak, B.J.: LDPC codes for the Gaussian wiretap channel. IEEE Transactions on Information Forensics and Security 6, 532–540 (2011)
Baldi, M., Bianchi, M., Chiaraluce, F.: Coding with scrambling, concatenation, and HARQ for the AWGN wire-tap channel: A security gap analysis. IEEE Transactions on Information Forensics and Security 7, 883–894 (2012)
Zhou, L., Wu, D., Zheng, B., Guizani, M.: Joint physical-application layer security for wireless multimedia delivery. IEEE Communications Magazine 52(3), 66–72 (2014)
Tanner, R.M., Sridhara, D., Sridharan, A., Fuja, T.E., Costello Jr., D.J.: LDPC block and convolutional codes based on circulant matrices. IEEE Transactions on Information Theory 50, 2966–2984 (2004)
Fossorier, M.P.: Quasicyclic low-density parity-check codes from circulant permutation matrices. IEEE Transactions on Information Theory 50, 1788–1793 (2004)
Costello, D., Lin, S.: Error Control Coding. Pearson Higher Education (2011)
Li, Z., Chen, L., Zeng, L., Lin, S., Fong, W.H.: Efficient encoding of quasi-cyclic low-density parity-check codes. IEEE Transactions on Communications 54, 71–81 (2006)
Biasi, F.P., Barreto, P.S., Misoczki, R., Ruggiero, W.V.: Scaling efficient code-based cryptosystems for embedded platforms. Journal of Cryptographic Engineering 4(2), 123–134 (2014)
Fossorier, M.P., Mihaljevic, M., Imai, H.: Reduced complexity iterative decoding of low-density parity check codes based on belief propagation. IEEE Transactions on Communications 47, 673–680 (1999)
Chen, J., Dholakia, A., Eleftheriou, E., Fossorier, M.P., Hu, X.Y.: Reduced-complexity decoding of LDPC codes. IEEE Transactions on Communications 53, 1288–1299 (2005)
Peters, C.: Information-set decoding for linear codes over F q . In: Sendrier, N. (ed.) PQCrypto 2010. LNCS, vol. 6061, pp. 81–94. Springer, Heidelberg (2010)
Meier, W., Staffelbach, O.: Fast correlation attacks on certain stream ciphers. Journal of Cryptology 1, 159–176 (1989)
Jonsson, F., Johansson, T.: A fast correlation attack on LILI-128. Information Processing Letter 81, 127–132 (2002)
Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC Press (1996)
Chepyzhov, V.V., Johansson, T., Smeets, B.: A simple algorithm for fast correlation attacks on stream ciphers. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 181–195. Springer, Heidelberg (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Stuart, C.M., Deepthi, P.P. (2014). Low Complex System for Physical Layer Security Using NLFG and QCLDPC Code. In: Mauri, J.L., Thampi, S.M., Rawat, D.B., Jin, D. (eds) Security in Computing and Communications. SSCC 2014. Communications in Computer and Information Science, vol 467. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-44966-0_30
Download citation
DOI: https://doi.org/10.1007/978-3-662-44966-0_30
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-44965-3
Online ISBN: 978-3-662-44966-0
eBook Packages: Computer ScienceComputer Science (R0)