期刊文献+

基于m序列三阶相关性的同步扰码反馈多项式重构 被引量:4

Reconstruction of Feedback Polynomial of Synchronous Scrambler Placed After Convolutional Encoder Based on Triple Correlation Property of m-Sequences
下载PDF
导出
摘要 在已有的卷积码同步加扰的扰码反馈多项式重构方法中,卷积码对偶码字需要先验已知.为了解决该问题,本文基于m序列的三阶相关性,提出一种卷积码加扰的扰码反馈多项式重构新方法.首先对卷积码加扰序列进行分块处理,数据块的长度为卷积码编码约束长度,相邻数据块的起始位间隔一个码长;然后证明了加扰数据块与对偶码字相乘后,输出序列为与扰码周期相同的m序列,由此基于m序列的三阶相关峰值特性估计出对偶码字;最后利用三阶相关峰的位置信息重构出同步扰码反馈多项式.在有误码情况下,推导了峰值与非峰值位置处三阶相关函数值的概率分布,得到三阶相关峰的检测门限与重构结果正确的置信度.仿真实验验证了本文方法的有效性,与已有的重构方法相比,该方法无需先验已知对偶码字,消除了重构结果的不确定性,具有更好的容错性. The existing methods need to know a priori dual word of a convolutional code to reconstruct the feedback polynomial of a synchronous scrambler placed after a convolutional encoder.To overcome this limitation,a novel reconstruction method is proposed based on the triple correlation property of m-sequences.First,the scrambled bit sequence is divided into multiple blocks.The length of each block equals the constraint length of the convolutional encoder,and the interval between two start points of adjacent blocks is the codeword length.Then,it is proved that the generated sequence by the dot product of scrambled bit blocks with a dual word is also an m-sequence,having the same period as the synchronous scrambler.With this result,a dual word of the convolutional encoder can be estimated based on the triple correlation property of m-sequences.Finally,the feedback polynomial is reconstructed by using two locations of triple correlation peaks.For the case that there are bit errors in the received sequence,the probability distributions of the peak and non-peak values of triple correlation are derived.Therefore,the threshold for detecting triple correlation peaks is obtained,and the confidence level of the correct reconstruction is analyzed.Simulation results show the effectiveness of the proposed method.Compared with the existing methods,the proposed method does not require the prior knowledge of a dual word and eliminates the uncertainty in the reconstruction results.Moreover,the proposed method is more robust to bit errors.
作者 韩树楠 张旻 李歆昊 HAN Shu-nan;ZHANG Min;LI Xin-hao(College of Electronic Engineering,National University of Defense Technology,Hefei,Anhui 230031,China)
出处 《电子学报》 EI CAS CSCD 北大核心 2019年第3期552-559,共8页 Acta Electronica Sinica
基金 国家自然科学基金(No.61602491) 安徽省自然科学基金(No.1408085QF115)
关键词 同步扰码 卷积码 M序列 三阶相关性 对偶码字 synchronous scrambler convolutional code m-sequence triple correlation property dual word
  • 相关文献

参考文献11

二级参考文献144

  • 1罗向阳,沈利,陆佩忠,刘粉林.高容错伪随机扰码的快速盲恢复[J].信号处理,2004,20(6):552-558. 被引量:13
  • 2朱琦,叶芳,刘钧雷,酆广增.LDPC码在802.16a OFDM系统衰落信道中的性能分析[J].电子学报,2005,33(4):624-628. 被引量:4
  • 3曾玲,黄益盛.隐藏式帧同步技术探讨[J].信息安全与通信保密,2005,27(7):366-368. 被引量:1
  • 4邹艳,陆佩忠.关键方程的新推广[J].计算机学报,2006,29(5):711-718. 被引量:62
  • 5Meier W, Staffelbach O. Fast correlation attacks on certain stream ciphers[J]. J Cryptology, 1989, 1: 159- 176.
  • 6Johansson T, Jonsson F. Improved fast correlation attacks on stream ciphers via convolutional codes[ C] //Advances in Cryptology-EUROCRYPT'99, Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 1999, 1592: 347-362.
  • 7Johansson T, Jonsson F. Fast correlation attacks based on turbo code techniques[C] //Advances in Cryptology-CRYPT'99, Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 1999,1666:181 - 197.
  • 8Johansson T, Jonsson F. Theoretical analysis of a correlation attack based on convolutional codes [ J ]. IEEE Trans On Information Theory, 2002, 48(8) : 2173- 2181.
  • 9Colic D J, Hawkes P. Vectorial approach to fast correlation attacks[J]. Designs, Codes and Cryptpgraphy, 2005, 35: 5-19.
  • 10Golic D J. Computation of low-weight parity-check polynomials [J]. Electronic Leters, 1996, 32: 1981- 1982.

共引文献169

同被引文献37

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部