Secured polar code derived from random hopped frozen-bits

نویسندگان

چکیده

Abstract The polar code is a unique coding approach that can achieve Shannon's capacity in modern communication systems' discrete memory-less channels with superior reliability, but it not secure enough under attacks for such systems. This study aims to offer comprehensive secured scheme uses combination of and the Mersenne-Twister pseudo-random number generator (MT-PRNG) super encoding. pre-shared crypto-system cyphering key initiates starting state MT-PRNG as seed. randomly generated sequences govern values frozen bits polarized bit their associated indices. A half-bit-error-rate probability system performance calculated when encoding ciphering keys at receiver differ by single from those utilized transmitter. Using numerical analysis, shown be against brute force attacks, Rao-Nam reconstruction attacks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

About Random Bits

1 Random Bit Generators 2 1.1 Pseudo-Random Bit Generators . . . . . . . . . . . . . . . . . . . . 2 2 Physical Sources for Random Bits 3 2.1 Exploiting Air Turbulence in Hard Disk Drives . . . . . . . . . . 3 2.2 Generating Unbiased Random Bits . . . . . . . . . . . . . . . . . . 4 3 Generating Random Seeds 5 3.1 Obtaining Random Timings . . . . . . . . . . . . . . . . . . . . . . 6 3.2 Locati...

متن کامل

P-118: Developmental Competence of Ovine Embryos Derived from Frozen Oocytes Co-Cultured with Embryos Derived from Fresh Oocytes

Background: Currently, a limited number of studies have been done on the vitrification of small ruminant oocytes, especially in sheep, where poor developmental rates are obtained following immature and mature oocyte vitrification. Poor ovine oocyte cryopreservation could attribute to the damage to enzymes which has role in metabolic pathways. Therefore, production of cytokines and growth factor...

متن کامل

Eecient Privatization of Random Bits

The paper investigates the extent to which a public source of random bits can be used to obtain private random bits that can be safely used in cryptographic protocols. This process is called privatization of random bits. We consider the case in which the party privatizing random bits has a small number of private random bits. Using techniques from the theory of pseudo-random generators and nely...

متن کامل

How to Recycle Random Bits

We show that modified versions of the linear congruential generator and the shift register generator are provably good for amplifying the correctness of a probabilistic algorithm. More precisely, if r random bits are needed for a BPP algorithm to be correct with probability at least 2/3, then O(r + k) bits are needed to improve this probability to 1 − 2−k. We also present a different pseudo-ran...

متن کامل

How to Privatize Random Bits

The paper investigates the extent to which a public source of random bits can be used to obtain private random bits that can be safely used in cryptographic protocols. We consider two cases: (a) the case in which the part privatizing random bits is computationally more powerful than the adversary, and (b) the case in which the part privatizing random bits has a small number of private random bi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Wireless Networks

سال: 2022

ISSN: ['1572-8196', '1022-0038']

DOI: https://doi.org/10.1007/s11276-022-03127-1