期刊文献+

一种新的自同步扰码多项式盲恢复方法 被引量:9

A Novel Blind Recovery Method of Self-synchronizing Scrambling Polynomial
下载PDF
导出
摘要 为了获取数字通信中未知线路的自同步扰码信息,在对信源不平衡条件下自同步加扰序列的重码统计特性进行深入分析的基础上,提出了基于重码统计的自同步扰码多项式阶数盲测定方法。之后,基于组合不平衡性的思想,提出了一种优于Walsh变换法的自同步扰码多项式抽头位置判定算法。实验和仿真结果验证了理论分析的正确性和自同步扰码多项式盲恢复方法的有效性。 In order to get the self-synchronizing scrambling information of the unknown lines in digital communication,a novel method of blind detection of the order of self-synchronizing scrambling polynomial is proposed based on deeply studying the statistic characteristics of reduplicate codes in self-synchronizing scrambled sequence on condition that the number of "0" or "1" bit in source is imbalanced.Later,an algorithm for estimating the feedback position in self-synchronizing scrambling polynomial,which is better than the method of Walsh transformation,is offered with the idea of combinatorial imbalance.The results of experiment and simulation verify the correctness of the theory analysis and the validity of the whole algorithm.
出处 《兵工学报》 EI CAS CSCD 北大核心 2011年第6期680-685,共6页 Acta Armamentarii
关键词 通信技术 自同步扰码多项式 重码统计 盲恢复 communication technology self-synchronizing scrambling polynomial statistic of reduplicate codes blind recovery
  • 相关文献

参考文献7

二级参考文献32

  • 1朱华安,谢端强.基于m序列统计特性的序列密码攻击[J].通信技术,2003,36(8):96-98. 被引量:6
  • 2肖国镇.伪随机序列及其应用[M].北京:国防工业出版社,1985..
  • 3Paul C, Kocher, Joshua Jae, et al. Differential Power Analysis [ C ]//Advances in Cryptology-CRYPTO '99. Germany : Springer-Verlag, 1999,1666:388 - 397.
  • 4Joseph Lano, Nele Mentens, Bart Preneel, Ingrid Verbauwhede. Power Analysis of Synchronous Stream Ciphers with Resynchronization Mechanism [ C ]//The State of the Art of Stream Ciphers. SASC Workshop. Novotel Brugge Centrum, Belgium, 2004:327 -333.
  • 5Fischer W, Gammel B M, Kniffler O, et al. Differential Power Analysis of Stream Ciphers [ C ]//Masayuki Abe. Topics in Cryptology-CT-RSA 2007. 2006, 4377:257 - 270.
  • 6Sandeep Kumar, Kerstin Lemke, Christof Paar. Some Thoughts about Implementation Properties of Stream Ciphers [ C ]//The State of the Art of Stream Ciphers. 2004:311 -319.
  • 7Berbain C, Billet O, Canteaut A, et at. DECIMv2[ EB/ 0L]. [ 2007 - 05 - 02 ]. http://www. ecrypt, eu. org/ stream/p3 Ciphers/ecim/decim p3. pdf.
  • 8Meier W, Staffelbach O. Fast correlation attacks on certain stream ciphers[J]. J Cryptology, 1989, 1: 159- 176.
  • 9Johansson T, Jonsson F. Improved fast correlation attacks on stream ciphers via convolutional codes[ C] //Advances in Cryptology-EUROCRYPT'99, Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 1999, 1592: 347-362.
  • 10Johansson T, Jonsson F. Fast correlation attacks based on turbo code techniques[C] //Advances in Cryptology-CRYPT'99, Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 1999,1666:181 - 197.

共引文献55

同被引文献52

  • 1朱洪斌.突发数字传输中载波频偏估计技术[J].科技风,2010(14):220-221. 被引量:2
  • 2罗向阳,沈利,陆佩忠,刘粉林.高容错伪随机扰码的快速盲恢复[J].信号处理,2004,20(6):552-558. 被引量:13
  • 3杨忠立,刘玉君.自同步扰乱序列的综合算法研究[J].信息技术,2005,29(2):30-32. 被引量:13
  • 4LUPeizhong,LIShen,ZOUYan,LUOXiangyang.Blind recognition of punctured convolutional codes[J].Science in China(Series F),2005,48(4):484-498. 被引量:18
  • 5樊昌信,曹丽娜.通信原理[M].北京:国防工业出版社,2007.
  • 6甘良才.伪随机信号处理:理论与应用[M].北京:电子工业出版社,2007:109-111.
  • 7杨晶超.基于伪随机序列的高精度时延测量技术研究[J].理论与方法,2009,28(1):30-32.
  • 8LAN/MAN Standards Committee.NY10016-59-97,IEEE S-td 802 1.1-2007.Wireless L A N mediu m access control(MAC)and physicallayer(PHY)specifications[S].New York:IEEIEEE Computer Society,2007.
  • 9MATHIEU C.Reconstruction of a Linear Scrambler[J].IEEE TRANSACTIONS ON COMPUTERS,2007,56(9):128 3-1291.
  • 10STEVEN S.Analysis of the Interaction Between Line-ar Cyclic Error Correcting Codes And Self-Synchro-nous Payload Scramblers[J].IEEETRANSACTIONSON COMMUNICA-TIONS,2008,56(11):1800-1806.

引证文献9

二级引证文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部