Secure text message transmission in a 4G compatible MIMO MCCDMA system with combined implementation of Vigenere Cipher and RSA cryptographic algorithm

نویسنده

  • Mousumi Haque
چکیده

In this paper, a comprehensive performance evaluative study has been made on a secured MIMO MCCDMA wireless communication system with implementation of Minimum Mean Square Error (MMSE) and ZeroForcing (ZF) Linear channel equalization schemes. The 4G compatible system deploys two channel encoding schemes(1/2-rated Convolutional and CRC ) under BPSK,DPSK QPSK and QAM digital modulations. In the present simulated system, a text message transmission has been secured with concatenated implementation of Vigenere Cipher and RSA cryptographic algorithm. It is anticipated from the numerical results that with MMSE channel equalization and 1/2-rated Convolutional channel Encoding schemes, the MIMO MCCDMA system outperforms in BPSK digital modulation under AWGN and Raleigh fading channels. In CRC channel coding, the system shows comparatively worst performance in higher Signal to Noise ratio(SNR) values under DPSK, QPSK and QAM digital modulations. It has been observed from the present study that the system performance deteriorates with increase in noise power as compared to signal power.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Wireless Text Message Transmission with the Implementation of RSA Cryptographic Algorithm

Security is crucial to a wide range of wireless data applications and services. This paper presents a simulation based study of a wireless communication system with the implementation of secured asymmetric RSA cryptographic encryption/decryption algorithm on text message transmission. The system under investigation incorporates 2/3-rated CRC channel coding and QPSK digital modulation over an ad...

متن کامل

Three-Pass Protocol Implementation in Vigenere Cipher Classic Cryptography Algorithm with Keystream Generator Modification

Vigenere Cipher is one of the classic cryptographic algorithms and included into symmetric key cryptography algorithm, where to encryption and decryption process use the same key. Vigenere Cipher has the disadvantage that if key length is not equal to the length of the plaintext, then the key will be repeated until equal to the plaintext length, it course allows cryptanalysts to make the proces...

متن کامل

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

A secure approach for embedding message text on an elliptic curve defined over prime fields, and building 'EC-RSA-ELGamal' Cryptographic System

This paper presents a new probabilistic approach to embedding message text on an elliptic curve, by using the concept of the RSA Algorithm and its security, and such approach allows us discovering the message from the point, only according to the security of the RSA Algorithm. By mixing between the concept of this approach and the concept of EC-ELGamal Cryptographic System, we have built a cryp...

متن کامل

Time stamp based ECC encryption and decryption

Elliptic Curve Cryptography (ECC) provides a secure means of exchanging keys among communicating hosts using the diffie hellman key exchange algorithm. Encryption and decryption of texts and messages have also been attempted. In the paper on Knapsack over ECC algorithm, the authors presented the implementation of ECC by first transforming the message into an affine point on the EC, and then app...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012