ijaers social
google plus

International Journal of Advanced Engineering, Management and Science

Pseudo Random Generator Based Public Key Cryptography

( Vol-3,Issue-5,May 2017 )

Author(s): Neha Saini, Kirti Bhatia

Total View : 676
Downloads : 9
Page No: 453-457
ijaems crossref doiDOI: 10.24001/ijaems.3.5.8


Cryptography, LFSR, Pseudorandom codes, hamming codes.


Advances in communication technology have seen strong interest in digital data transmission. However, illegal data access has become more easy and prevalent in wireless and general communication networks. In order to protect the valuable data from illegal access, different kinds of cryptographic systems have been proposed. In this paper, a new integrating channel coding and cryptography design communication systems is proposed. So we use cryptography as an error detection tool. In order to preserve the advantages of encryption and to improve its disadvantages, we place the encryptor before the encoder. The hamming encoder is used to select the generator matrix to be used as a block code to form the new system .In this the security of common cryptographic primitive i.e a key stream generator based on LFSR can be strengthened by using the properties of a physical layer.So, a passive eaves dropping will experience great difficulty in cracking the LFSR based cryptography system as the computational complexity of discovering the secret key increases to large extent. The analysis indicates that the proposed design possesses the following feature. Its security is higher than the conventional one with the channel encoder only. Privacy is more due to unknown random codes. As the applied codes are unknown to a hostile user, this means that it is hardly possible to detect the message of another user. Anti-jam performance is good. It overcomes the disadvantage of Chaos based cryptography system as input data is not extended and hence bandwidth is not wasted. Moreover, the computer simulation shows that the proposed system has a good ability in error detection especially when the SNR per bit is moderate high, and the detection ability is enhanced when the increased length of Hamming code is employed.

Cite This Article:
Show All (MLA | APA | Chicago | Harvard | IEEE | Bibtex)