DOI QR코드

DOI QR Code

Cryptographic synchronization signal generation method using maximal length sequence

최대길이 시퀀스를 이용한 암호동기신호 생성 기법

  • Received : 2017.03.16
  • Accepted : 2017.03.25
  • Published : 2017.07.31

Abstract

Cryptographic synchronization which synchronizes internal state of cryptographic algorithm and ciphertext stream between an encryptor and a decryptor affects the quality of secure communication. If there happens a synchronization loss between a transmitter and a receiver in a secure communication, the output of the receiver is unintelligible until resynchronization is made. Especially, in the secure communication on a wireless channel with high BER, synchronization performance can dominate its quality. In this paper, we proposed a novel and noise robust synchronization signal generation method as well as its detection algorithm. We generated a synchronization signal in the form of a masking structure based on the maximal length sequence, and developed a detection algorithm using a correlation property of the maximal length sequence. Experimental results have demonstrated that the proposed synchronization signal outperforms the conventional concatenated type synchronization signal in a noisy environment.

암호통신에서 암호기와 복호기 간의 암호 알고리즘 내부 상태 동기와 스트림 동기를 일치시키는 암호동기 기능은 암호통신 품질에 많은 영향을 준다. 암호통신 중 송신기와 수신기 간에 동기 이탈이 발생하면 재동기를 이루기까지 통신 불능 상태가 된다. 특히 BER이 높은 무선 채널에서 이루어지는 암호통신에서는 암호동기 성능이 암호통신의 품질을 좌우하는 요소가 된다. 본 논문에서는 BER이 높은 잡음 환경에서도 동기 성능을 향상시킬 수 있는 새로운 형태의 암호동기신호 생성 및 검출 기법을 제안하였다. 제안한 방법에서는 최대길이 시퀀스 기반의 마스킹 구조 형태로 동기신호를 생성하고, 최대길이 시퀀스의 상관함수 특성을 이용하여 동기신호를 검출한다. 다양한 모의실험을 통해 제안한 마스킹 구조 형태의 동기신호가 기존의 연접 형태의 동기신호에 비하여 잡음환경에서 우수한 동기 성능을 보임을 확인하였다.

Keywords

References

  1. A. J. Menezes, P. C. Oorschot, and S. A. Vanstone, Handbook of Applied cryptography, Boca Raton, FL: CRC press, 1996.
  2. W. Stallings and M. P. Tahiliani, Cryptography and Network Security: Principles and Practice (6th edition), London: Pearson, 2014.
  3. H. J. Lee, "Highly reliable synchronous stream cipher system for link encryption," in Proceedings of International Conference on Computational Science and Its Applications, pp. 269-278, 2006.
  4. J. H. Yoon, "A non-periodic random sequence resynchronization method using the address data of LAPB and HDLC," Ph. D. Dissertation, Kyungpook National University, Daegu, Korea, 1997.
  5. G. Ascheid and H. Meyr, "Cycle slips in phase-locked loops: a tutorial survey," IEEE Trans. Communications, vol. 30, no.10, pp. 2228-2241, 1982. https://doi.org/10.1109/TCOM.1982.1095423
  6. V. Smirnova and A. V. Proskurnikov, "Phase locking, oscillations and cycle slipping in synchronization systems," in Proceedings of European Control Conference, pp. 873-878, 2016.
  7. P. Eliardsson, E. Axell, P. Stenumgaard, K. Wiklundh, B. Johansson, and B. Asp, "Military HF communications considering unintentional platform-generated electromagnetic interference," in Proceedings of International Conference on Military Communications and Information Systems, pp. 1-6, 2015.
  8. Witvliet, Ben A. and Rosa Ma Alsina-Pages. (2017). Radio communication via Near Vertical Incidence Skywave propagation: an overview. Telecommunication Systems [Online]. pp. 1-15. Available: http://link.springer.com/article/10.1007/s11235-017-0287-2.
  9. R. J. Sutton, Secure Communications: Applications and Management, Chichester, U.K.: John Wiley & Sons, 2002.
  10. S. W. GOLOMB. Digital communications with Space Applications, Englewood Cliffs, NJ: Prentice-Hall, 1964.
  11. A. Ahmad, S. S. Al-Busaidi, M. J. Al-Musharafi, "On properties of PN sequences generated by LFSR - A generalized study and simulation modeling," Indian Journal of Science and Technology, vol. 6, no 10. pp. 5351-5358, Oct. 2013.
  12. N. S. Abinaya and P. Prakasam, "Performance analysis of maximum length LFSR and BBS method for cryptographic application," in Proceedings of International Conference on Electronics and Communication Systems, pp. 1-5, 2014.
  13. Y. H. Son, J. K. Hong and K. S. Bae, "Authentication masking code against DoS of T-MAC protocol," Journal of Central South University, vol. 20, no. 7, pp. 1889-1895, Jul. 2013. https://doi.org/10.1007/s11771-013-1687-4
  14. F. J. MacWilliams and N. J. A. Sloane, The theory of error correcting codes, Amsterdam: North-Holland, 1977.