Advertisement

Performance of BCH codes with DES encryption in a digital mobile channel

  • Guy Ferland
  • Jean-Yves Chouinard
Coding and Modulation for Fading Channels
Part of the Lecture Notes in Computer Science book series (LNCS, volume 793)

Abstract

In a digital mobile communication channel, the use of an encryption algorithm is essential to prevent unwanted eavesdropping of private conversations and to protect sensitive data transfers against tampering. This paper presents a performance analysis of different modes of operation of the Data Encryption Standard (DES) encryption in a digital mobile radio channel environment. The objective is to determine the degradation effects of data enciphering on the channel reliability and to analyze the error correction capability of Bose-Chaudhuri-Hocquenghem (BCH) codes for the enciphered data when channel errors occur. The digital mobile communication channel is simulated using Fritchman's channel model, which can represent a large variety of error burst channels. Computer simulations are used to evaluate the bit error performance of BCH codes in the error burst channels, when the information data is first encrypted with DES.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    H. Beker, F. Piper, “Cipher Systems: The Protection of Communications”, Northwood Books, London, 1982.Google Scholar
  2. 2.
    R.E. Blahut, “Theory and Practice of Error Control Codes”, Addison-Wesley, Reading, Massachusetts, 1984.Google Scholar
  3. 3.
    R.E. Blahut, “Principles and Practice of Information Theory”, Addison-Wesley, Reading, Massachusetts, 1987.Google Scholar
  4. 4.
    J.-Y. Chouinard, M. Lecours, G.Y. Delisle, “Estimation of Gilbert's and Fritchman's Models Parameters Using the Gradient Method for Digital Mobile Radio Channels”, IEEE Transactions on Vehicular Technology, Vol. 37, No. 3, August 1988, pp. 158–166.Google Scholar
  5. 5.
    D.E.R. Denning, “Cryptography and Data Security”, Addison-Wesley, Reading, Massachusetts, 1983.Google Scholar
  6. 6.
    G. Ferland, J.-Y. Chouinard, “Error Rate Performance Analysis of Stream and Block Ciphers in a Digital Mobile Communication Channel”, Third Annual Conference on Vehicular Navigation and Information Systems (VNIS 92, Oslo, Norway), September 1992, pp. 426–433.Google Scholar
  7. 7.
    G. Ferland, “Error Rate Performance Analysis of Stream and Block Ciphers in a Digital Mobile Communication Channel”, M.A.Sc. thesis, University of Ottawa, Ottawa, Canada, July 1993.Google Scholar
  8. 8.
    B.D. Fritchman, “A Binary Channel Characterization Using Partitioned Markov Chains”, IEEE Transactions on Information Theory, Vol. IT-13, No. 2, April 1967, pp. 221–227.Google Scholar
  9. 9.
    R.G. Gallager, “Information Theory and Reliable Communication”, John Wiley and Sons, 1968.Google Scholar
  10. 10.
    E.N. Gilbert, “Capacity of a Burst-Noise Channel”, Bell System Technical Journal, September 1960, pp. 1253–1265.Google Scholar
  11. 11.
    L.N. Kanal, A.R.K. Sastry, “Models for Channels with Memory and Their Applications to Error Control”, Proceedings of the IEEE, Vol. 66, No. 7, July 1978, pp. 724–744.Google Scholar
  12. 12.
    M. Lecours, J.-Y. Chouinard, G.Y.Delisle, J. Roy. “Statistical Modelling of the Received Signal Envelope in a Mobile Radio Channel”, IEEE Transactions on Vehicular Technology, Vol 37, No. 4, November 1988, pp. 204–212.Google Scholar
  13. 13.
    W.C. Lee “Mobile Communications Engineering”, McGraw-Hill, 1982.Google Scholar
  14. 14.
    S. Lin, D.J. Costello, “Error Control Coding: Fundamentals and Applications”, Prentice-Hall, New Jersey, 1983.Google Scholar
  15. 15.
    C.P. Pfleeger, “Security in Computing”, Prentice-Hall, 1989.Google Scholar
  16. 16.
    A. Semmar, M. Lecours, J.-Y. Chouinard, J. Ahern, “Characterization of Error Sequences in UHF Digital Mobile Radio Channels”, IEEE Transactions on Vehicular Technology, Vol. 40, No. 4, November 1991, pp. 769–775.Google Scholar
  17. 17.
    C.E. Shannon, “Communication Theory of Secrecy Systems”, Bell System Technical Journal, Vol. 28, October 1949, pp. 656–715.Google Scholar
  18. 18.
    D.J. Torrieri, “Principles of Secure Communication Systems”, first edition, Artech House.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1994

Authors and Affiliations

  • Guy Ferland
    • 1
  • Jean-Yves Chouinard
    • 1
  1. 1.Department of Electrical EngineeringUniversity of OttawaOttawaCanada

Personalised recommendations