Fig 4 - uploaded by Mustafa M Matalgah
Content may be subject to copyright.
BER vs. SNR in AWGN channel with BPSK modulation, comparison of using DES, M-DES, DES with hamming (7,4) channel coding and M-DES but with round 17 replaced by KBCP encryption algorithms.

BER vs. SNR in AWGN channel with BPSK modulation, comparison of using DES, M-DES, DES with hamming (7,4) channel coding and M-DES but with round 17 replaced by KBCP encryption algorithms.

Source publication
Conference Paper
Full-text available
Encryption is a vital process to ensure the confidentiality of the information transmitted over an insecure wireless channel. However, the nature of the wireless channel tends to deteriorate due to noise, interference and fading. Therefore, an encrypted signal will be received with some errors. Consequently, due to the strict avalanche criterion (S...

Context in source publication

Context 1
... computer simulations, the performance of the new design on the error performance is evaluated as shown in Figure 4. We assumed that the channel is an additive white gaussian noise (AWGN) channel with binary phase shift keying (BPSK) modulation. ...

Similar publications

Article
Full-text available
Advance Encryption Standard (AES) supersedes Data Encryption Standard (DES) and is the best known and most widely used block cipher. As for now, there are no known practical attacks that would allow anyone to read correctly implemented AES encrypted data. However, several theoretical attacks have been announced until now. A theoretical attack calle...
Article
Full-text available
This article presents a developed lightweight data encryption algorithm called LBC-3. Its essential difference from the known algorithms is the R1 function and the procedure for generating round keys. The main characteristics of this lightweight algorithm and all the transformations used in the encryption and decryption processes are described. The...
Article
Full-text available
Encryption is the technique used to convert a plain text message into cipher text which is unreadable to human or machine. Encryption is of two types, namely: symmetric key encryption and asymmetric key encryption. Encryption scheme in which both the sender and receiver share the same key is referred to as symmetric key encryption scheme. Encryptio...
Article
Full-text available
Security is the most challenging aspects in the internet and network applications. Cryptography is one of the main categories of computer security that converts information from its normal form into an unreadable form. Encryption is a process of generating secret text from the input text using a secret key and an encryption algorithm. The two main...
Article
Full-text available
The biggest problem facing the world is information security in the digital era. Information protection and integrity are hot topics at all times, so many techniques have been introduced to transmit and store data securely. The increase in computing power is increasing the number of security breaches and attacks at a higher rate than before on aver...

Citations

Article
Full-text available
Employing heavy conventional encryption algorithms in communications suffers from added overhead and processing time delay; and in wireless communications, in particular, suffers from severe performance deterioration (avalanche effect) due to fading. Consequently, a tremendous reduction in data throughput and increase in complexity and time delay may occur especially when information traverse resource-limited devices as in Internet-of-Things (IoT) applications. To overcome these drawbacks, efficient lightweight encryption algorithms have been recently proposed in literature. One of those, that is of particular interest, requires using conventional encryption only for the first block of data in a given frame being transmitted. All the information in the remaining blocks is transmitted securely without the need for using heavy conventional encryption. Unlike the conventional encryption algorithms, this particular algorithm achieves lower overhead/complexity and higher data throughput. Assuming the additive white Gaussian noise (AWGN) channel, the performance of the lightweight encryption algorithm under study had been evaluated in literature in terms of throughput under the assumption that the first block, that undergoes conventional encryption, is free of error, which is practically unfeasible. In this paper, we consider the AWGN channel with Rayleigh fading and assume that the signal experiences a certain channel bit error probability and investigate the performance of the lightweight encryption algorithm under study in terms of bit error probability and throughput. We derive analytical expressions for these performance metrics considering modulated signals with and without coding. In addition, we propose an extension to the lightweight encryption algorithm under study by further enhancing its security level without significantly affecting the overhead size and processing time. Via numerical results we show the superiority of the lightweight encryption algorithm under study over the conventional encryption algorithms (like the AES) and the lightweight encryption algorithms proposed in literature in terms of error and throughput performance.
Article
Encryption is primarily used to ensure the confidentiality of information transmitted over an insecure wireless channel. However, an encrypted signal may be received with some errors due to noise and interference in the wireless channel. To alleviate these errors in the received encrypted signal, Zibideh and Matalgah proposed two different versions of key-based coded permutation cipher (KBCPC) aimed to improve the error performance and security of the transmission in the wireless channel. These two versions were designed based on the modified data encryption standard (M-DES) and provide different levels of security. This study presents a divide-and-conquer attack on both M-DES and KBCPC by exploiting the function that extends the length of output. Their analysis shows that these two ciphers can only provide 56-bit level of security instead of the claimed 136-bit and 173.67-bit level of security for different versions. The authors' analysis is further verified through experiments. More importantly, their attack can be easily adapted to other schemes with a different encryption design but the same coding technique used in M-DES or KBCPC.