期刊文献+

基于线性分组码的自同步扰码盲识别 被引量:5

Blind Recognition of Self-Synchronized Scrambler Based on Linear Block Code
下载PDF
导出
摘要 针对加扰前信息序列为线性分组码情况下的自同步扰码盲识别问题,提出了一种有效的解决方法.首先,从理论上分析了线性分组码与随机序列游程特性的差异,得出了扰码序列正确抽取与错误抽取时输出序列的游程特性的区别;然后,通过遍历寻找抽取后序列的游程比值与随机序列游程比值的欧几里得距离的最大值方式实现了自同步扰码多项式的盲识别.仿真实验验证了理论分析的正确性,解决了0、1均衡情况下的线性分组码自同步扰码盲识别问题,具有一定的工程应用价值. A blind recognition method of self-synchronous scrambler based on the linear block code with unbiased information source is proposed. Different run characteristics of the linear block code and random sequence are analyzed, leading to the conclusion that the run feature of correctly extracted scrambler sequence differs from that of the wrong one. A polynomial of the scrambler is determined with maximum value search in all possible Euclidean distances between the run ratios of extracted and random sequences. Experi- ments and simulation results show correctness of the theoretical analysis. Blind recognition of self-synchronous scrambler after the linear block code with unbiased information source can be realized, useful in engineering application.
出处 《应用科学学报》 CAS CSCD 北大核心 2015年第2期178-186,共9页 Journal of Applied Sciences
基金 国家自然科学基金(No.60972161)资助
关键词 自同步扰码 盲识别 线性分组码 游程特性 欧几里得距离 self-synchronized scrambler, blind recognition, linear block code, run characteristic, Euclidean distance
  • 相关文献

参考文献7

二级参考文献38

  • 1朱华安,谢端强.基于m序列统计特性的序列密码攻击[J].通信技术,2003,36(8):96-98. 被引量:6
  • 2罗向阳,沈利,陆佩忠,刘粉林.高容错伪随机扰码的快速盲恢复[J].信号处理,2004,20(6):552-558. 被引量:13
  • 3杨忠立,刘玉君.自同步扰乱序列的综合算法研究[J].信息技术,2005,29(2):30-32. 被引量:13
  • 4杨允军,武传华,陶雷.m序列估计的三阶相关函数法[J].电子对抗技术,2005,20(6):18-20. 被引量:4
  • 5肖国镇.伪随机序列及其应用[M].北京:国防工业出版社,1985..
  • 6Meier W, Staffelbach O. Fast correlation attacks on certain stream ciphers[J]. J Cryptology, 1989, 1: 159- 176.
  • 7Johansson T, Jonsson F. Improved fast correlation attacks on stream ciphers via convolutional codes[ C] //Advances in Cryptology-EUROCRYPT'99, Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 1999, 1592: 347-362.
  • 8Johansson T, Jonsson F. Fast correlation attacks based on turbo code techniques[C] //Advances in Cryptology-CRYPT'99, Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 1999,1666:181 - 197.
  • 9Johansson T, Jonsson F. Theoretical analysis of a correlation attack based on convolutional codes [ J ]. IEEE Trans On Information Theory, 2002, 48(8) : 2173- 2181.
  • 10Colic D J, Hawkes P. Vectorial approach to fast correlation attacks[J]. Designs, Codes and Cryptpgraphy, 2005, 35: 5-19.

共引文献36

同被引文献46

引证文献5

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部