On Post Decryption Error Pobability in Counter Mode Operation with Explicit Counter Transmittal

نویسندگان

  • Fouz Sattar
  • Muid Mufti
چکیده

This paper analyzes the post decryption error probability in Counter mode operation in an error prone communications channel. A finite state stochastic model has been developed that quantifies the impact of bit errors in the ciphertext and cipher synchronization counter. Analytical results are used to compute post decryption error probabilities and are found to be in reasonable agreement with the simulation results.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

COUPLING MODEL FOR MULTI-COMPONENT GAS PERMEATION PROCESS

A gas permeation model (Coupling Model) has been developed which has the flexibility to be used for different membrane module configurations. The aim of this work is to predict the performance of a single stage gas separation process using membranes and provide a comprehensive description of process parameters like flow rates, composition, stage cut and stream pressure. The significant feature ...

متن کامل

Design of an Encryption-Decryption Module Oriented for Internet Information Security SOC Design

In order to protect the security of network data, a high speed chip module for encrypting and decrypting of network data packet is designed. The chip module is oriented for internet information security SOC (System on Chip) design. During the design process, AES (Advanced Encryption Standard) and 3DES (Data Encryption Standard) encryption algorithm are adopted to protect the security of network...

متن کامل

Low Cost Aes Crypto Core

AES (Advanced Encryption Standard) is state of the art symmetric cipher. This study illustrates a new approach to low cost and efficient implementation of AES cipher on 8 bit microprocessors. This crypto processor implementation is recommended for low speed applications where cost, availability and ease of developing and manufacturing comes in. Most efficient possible implementation of Galois f...

متن کامل

Energy Efficient Encryption using Counter mode of operation in Wireless Sensor Network

Sensor networks are deployed for various monitoring applications. The reporting should be in secure manner so that the adversary can’t forge the data and can be prevented from any disclosure. In this paper we have identified those calculations which are not necessary to be performed on sensor node for securing the network, shifted to base stations to save the energy at nodes. Using pre-processi...

متن کامل

Resource Saving AES-CCMP Design with Hybrid Counter Mode Block Chaining - MAC

IEEE 802.11i security standard is emerging as an essential security requirement to support the growth of a wide range of wireless data services and applications. However, with the advent of more battery powered wireless devices, efficient and robust cryptographic designs are needed that do not impose high computational overhead and avoid mismatch with limited battery resources and low processin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • I. J. Network Security

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2009