期刊文献+

基于游程统计的自同步扰码多项式阶数估计 被引量:12

Order Estimation of Self-Synchronizing Scrambling Polynomial Based on Run Statistic
下载PDF
导出
摘要 为了获取数字通信中未知线路的自同步加扰信息,提出了一种自同步扰码多项式的阶数估计方法。通过对自同步加扰序列的游程特性进行深入研究,发现了自同步加扰序列的游程统计结果与自同步扰码多项式阶数的对应关系。利用这一关系,通过对接收到的自同步加扰序列进行不同长度的游程统计,根据统计结果的极值变化可以估计出未知线路自同步扰码多项式的阶数。实验结果验证了理论分析的正确性和自同步扰码多项式阶数估计方法的有效性。 In order to get the self-synchronizing scrambling information of the unknown lines in digital communication, a method of order estimation of self-synchronizing scrambling polynomial is presented. Through deeply studying the run property of self-synchronizing scrambled sequences, the corresponding relationship between the result of run statistic and the order of the self-synchronizing scrambling polynomial is gained. With this relationship, after calculating the run statistic with different length using the received scrambled sequence, the self-synchronizing scrambling polynomial order of the unknown line will be estimated through the distribution of the run extremums. The results of experiment verify the correctness of the theory analysis and the validity of the whole method.
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2013年第4期541-545,共5页 Journal of University of Electronic Science and Technology of China
基金 部级项目
关键词 数字通信 阶数估计 游程统计 自同步扰码多项式 digital communication order estimation run statistic self-synchronizing scrambling polynomial
  • 相关文献

参考文献7

二级参考文献33

  • 1朱华安,谢端强.基于m序列统计特性的序列密码攻击[J].通信技术,2003,36(8):96-98. 被引量:6
  • 2肖国镇.伪随机序列及其应用[M].北京:国防工业出版社,1985..
  • 3Paul C, Kocher, Joshua Jae, et al. Differential Power Analysis [ C ]//Advances in Cryptology-CRYPTO '99. Germany : Springer-Verlag, 1999,1666:388 - 397.
  • 4Joseph Lano, Nele Mentens, Bart Preneel, Ingrid Verbauwhede. Power Analysis of Synchronous Stream Ciphers with Resynchronization Mechanism [ C ]//The State of the Art of Stream Ciphers. SASC Workshop. Novotel Brugge Centrum, Belgium, 2004:327 -333.
  • 5Fischer W, Gammel B M, Kniffler O, et al. Differential Power Analysis of Stream Ciphers [ C ]//Masayuki Abe. Topics in Cryptology-CT-RSA 2007. 2006, 4377:257 - 270.
  • 6Sandeep Kumar, Kerstin Lemke, Christof Paar. Some Thoughts about Implementation Properties of Stream Ciphers [ C ]//The State of the Art of Stream Ciphers. 2004:311 -319.
  • 7Berbain C, Billet O, Canteaut A, et at. DECIMv2[ EB/ 0L]. [ 2007 - 05 - 02 ]. http://www. ecrypt, eu. org/ stream/p3 Ciphers/ecim/decim p3. pdf.
  • 8Meier W, Staffelbach O. Fast correlation attacks on certain stream ciphers[J]. J Cryptology, 1989, 1: 159- 176.
  • 9Johansson T, Jonsson F. Improved fast correlation attacks on stream ciphers via convolutional codes[ C] //Advances in Cryptology-EUROCRYPT'99, Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 1999, 1592: 347-362.
  • 10Johansson T, Jonsson F. Fast correlation attacks based on turbo code techniques[C] //Advances in Cryptology-CRYPT'99, Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 1999,1666:181 - 197.

共引文献57

同被引文献71

引证文献12

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部