Skip to main content

Performance of BCH codes with DES encryption in a digital mobile channel

  • Coding and Modulation for Fading Channels
  • Conference paper
  • First Online:
Information Theory and Applications (ITA 1993)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 793))

Included in the following conference series:

Abstract

In a digital mobile communication channel, the use of an encryption algorithm is essential to prevent unwanted eavesdropping of private conversations and to protect sensitive data transfers against tampering. This paper presents a performance analysis of different modes of operation of the Data Encryption Standard (DES) encryption in a digital mobile radio channel environment. The objective is to determine the degradation effects of data enciphering on the channel reliability and to analyze the error correction capability of Bose-Chaudhuri-Hocquenghem (BCH) codes for the enciphered data when channel errors occur. The digital mobile communication channel is simulated using Fritchman's channel model, which can represent a large variety of error burst channels. Computer simulations are used to evaluate the bit error performance of BCH codes in the error burst channels, when the information data is first encrypted with DES.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. H. Beker, F. Piper, “Cipher Systems: The Protection of Communications”, Northwood Books, London, 1982.

    Google Scholar 

  2. R.E. Blahut, “Theory and Practice of Error Control Codes”, Addison-Wesley, Reading, Massachusetts, 1984.

    Google Scholar 

  3. R.E. Blahut, “Principles and Practice of Information Theory”, Addison-Wesley, Reading, Massachusetts, 1987.

    Google Scholar 

  4. J.-Y. Chouinard, M. Lecours, G.Y. Delisle, “Estimation of Gilbert's and Fritchman's Models Parameters Using the Gradient Method for Digital Mobile Radio Channels”, IEEE Transactions on Vehicular Technology, Vol. 37, No. 3, August 1988, pp. 158–166.

    Google Scholar 

  5. D.E.R. Denning, “Cryptography and Data Security”, Addison-Wesley, Reading, Massachusetts, 1983.

    Google Scholar 

  6. G. Ferland, J.-Y. Chouinard, “Error Rate Performance Analysis of Stream and Block Ciphers in a Digital Mobile Communication Channel”, Third Annual Conference on Vehicular Navigation and Information Systems (VNIS 92, Oslo, Norway), September 1992, pp. 426–433.

    Google Scholar 

  7. G. Ferland, “Error Rate Performance Analysis of Stream and Block Ciphers in a Digital Mobile Communication Channel”, M.A.Sc. thesis, University of Ottawa, Ottawa, Canada, July 1993.

    Google Scholar 

  8. B.D. Fritchman, “A Binary Channel Characterization Using Partitioned Markov Chains”, IEEE Transactions on Information Theory, Vol. IT-13, No. 2, April 1967, pp. 221–227.

    Google Scholar 

  9. R.G. Gallager, “Information Theory and Reliable Communication”, John Wiley and Sons, 1968.

    Google Scholar 

  10. E.N. Gilbert, “Capacity of a Burst-Noise Channel”, Bell System Technical Journal, September 1960, pp. 1253–1265.

    Google Scholar 

  11. L.N. Kanal, A.R.K. Sastry, “Models for Channels with Memory and Their Applications to Error Control”, Proceedings of the IEEE, Vol. 66, No. 7, July 1978, pp. 724–744.

    Google Scholar 

  12. M. Lecours, J.-Y. Chouinard, G.Y.Delisle, J. Roy. “Statistical Modelling of the Received Signal Envelope in a Mobile Radio Channel”, IEEE Transactions on Vehicular Technology, Vol 37, No. 4, November 1988, pp. 204–212.

    Google Scholar 

  13. W.C. Lee “Mobile Communications Engineering”, McGraw-Hill, 1982.

    Google Scholar 

  14. S. Lin, D.J. Costello, “Error Control Coding: Fundamentals and Applications”, Prentice-Hall, New Jersey, 1983.

    Google Scholar 

  15. C.P. Pfleeger, “Security in Computing”, Prentice-Hall, 1989.

    Google Scholar 

  16. A. Semmar, M. Lecours, J.-Y. Chouinard, J. Ahern, “Characterization of Error Sequences in UHF Digital Mobile Radio Channels”, IEEE Transactions on Vehicular Technology, Vol. 40, No. 4, November 1991, pp. 769–775.

    Google Scholar 

  17. C.E. Shannon, “Communication Theory of Secrecy Systems”, Bell System Technical Journal, Vol. 28, October 1949, pp. 656–715.

    Google Scholar 

  18. D.J. Torrieri, “Principles of Secure Communication Systems”, first edition, Artech House.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

T. Aaron Gulliver Norman P. Secord

Rights and permissions

Reprints and permissions

Copyright information

© 1994 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ferland, G., Chouinard, JY. (1994). Performance of BCH codes with DES encryption in a digital mobile channel. In: Gulliver, T.A., Secord, N.P. (eds) Information Theory and Applications. ITA 1993. Lecture Notes in Computer Science, vol 793. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-57936-2_37

Download citation

  • DOI: https://doi.org/10.1007/3-540-57936-2_37

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-57936-6

  • Online ISBN: 978-3-540-48392-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics