Cipher feedback mode under go-back-N and selective-reject protocols in error channels

نویسندگان

  • Xiannuan Liang
  • Yang Xiao
  • Suat Özdemir
  • Athanasios V. Vasilakos
  • Hongmei Deng
چکیده

To produce ciphertexts, two modes of encryption are applied—block ciphers, which encrypt a fixed size block of plaintext at a time, and stream ciphers, which encrypt stream data, one or more bits at a time. As one of stream ciphers, the cipher feedback (CFB) mode is implemented by a block cipher via multiple stages, and in each stage, 1 bit or a number of bits of plaintext are encrypted at a time. Throughout this paper, the study will focus upon the error performance of the stream-based CFB under two sliding-window protocols, go-back-N and selective-reject, in an error channel in terms of throughput.Wemodel the performance of the CFB in terms of application-level throughput and derive the number of stages needed to achieve the optimal throughput, under a given error rate in an error channel. Copyright © 2012 John Wiley & Sons, Ltd.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Automatic Veri cation of Asynchronous Retransmission Go-Back-N ARQ Protocols Using the Concurrency Workbench

The Go-Back-N and Selective-Repeat automatic repeat request (ARQ) protocols are widely used for error control in computer-communication networks. They are nearly optimal for channels characterized by low error rates and small propagation delays, and thus suitable for many classical data transmission applications. However, these protocols are not eecient for modern non-conventional channels with...

متن کامل

ARQ error control for fading mobile radio channels

Michele Zorzi, Member, IEEE, Ramesh R. Rao, Senior Member, IEEE, and Laurence B. Milstein, Fellow, IEEE Abstract— In this paper, we study the correlation properties of the fading mobile radio channel. Based on these studies, we model the channel as a one-step Markov process whose transition probabilities are a function of the channel characteristics. Then we present the throughput performance o...

متن کامل

Sharing several secrets based on Lagrange's interpolation formula and Cipher feedback mode

In a multi-secret sharing scheme, several secret values are distributed among a set of n participants.In 2000 Chien et al.'s proposed a (t; n) multi-secret sharing scheme. Many storages and publicvalues required in Chien's scheme. Motivated by these concerns, some new (t; n) multi-secret sharingschemes are proposed in this paper based on the Lagrange interpolation formula for polynomials andcip...

متن کامل

Energy-conserving Selective Repeat ARQ Protocols for Wireless Data Networks

Mobile communications implies reliance on a self-contained, portable power source, error-prone fading radio channels and subsequent need for acknowledgments. We propose two energy-conserving variants of the Selective Repeat ARQ protocol, which reduce the number of acknowledgments sent by the mobile node. The protocols are compared to previously described energy-conserving Go-Back-N ARQ protocol...

متن کامل

An effective go-back-N ARQ scheme for variable-error-rate channels

RQ (AUTOMATIC-REPEAT-REQUEST) techniques, A including stop-and-wait, go-back-N, and selective repeat, are widely used for error control in data communication systems. Particularly, the go-back-N ARQ scheme is very popular because it provides higher throughput compared to stop-and-wait ARQ, and its implementation is simpler than selective repeat ARQ since it does not require buffering and resequ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Security and Communication Networks

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2013