ESL2023 randomInterleaverNS

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

JOURNAL OF LATEX CLASS FILES, VOL. X, NO.

X, AUGUST 202X 1

Crypto-Coding Scheme via Dynamic Interleaver for


New Communication Standards
Raúl Eduardo Lopresti, Jorge Castiñeira Moreira and Luciana De Micco

Abstract—Emerging communication standards prioritize both Encryption Standard) algorithm and turbo encoding. In [3],
the assurance of secure and reliable communications as well as a modified turbo encoder is proposed whose building blocks
the reduction of transmission delay and latency. Nevertheless, are finite state sequential machines in which a non-linear
the task of achieving these objectives presents a complex and
demanding challenge. Ensuring secure transmissions while si- function that varies its coefficients in time is inserted. Using
multaneously minimizing error rates requires the implementation this configuration, the authors manage to increase the security
of multi-stage information processing techniques that integrate of the turbo system while maintaining its performance. In
coding and encryption methods, which may unfortunately lead [4], the authors introduced a second Interleaver and managed
to an undesired increase in transmission delay and latency. This it through secret keys to enhance information encryption.
research presents an innovative crypto-coding framework capable
of concurrently achieving essential encryption and coding within They found that, from a reliability perspective, the proposed
a single, streamlined process. By leveraging this approach, we system behaves equivalently to the classical one. To assess the
aim to address the trade-off between security, efficiency, and cryptographic strength of the system, they employed the linear
transmission delay, thus contributing to the advancement of correlation coefficient.
secure and efficient communication standards. In this paper, This article introduces a novel crypto-encoder scheme en-
we present a comprehensive evaluation of the proposed scheme,
assessing its impact on final system error probability, encryption gineered to fortify the security of data transmission while
efficacy, and the complexity of hardware implementation. Our preserving the error correction capabilities inherent in turbo
findings shed light on the potential benefits of this approach for encoders. The principal objective is to augment the entropy of
future communication standards. transmitted data within the channel without compromising the
Index Terms—Coding, Delay, Dynamic Interleaver, Encryption, Binary Error Probability (Pbe ) and evading a substantial rise
Latency, Non-systematic, Security, Turbo Codes. in implementation complexity. These objectives are attainable
by leveraging the adaptive framework of the proposed system,
which dynamically modulates the interleaving mechanism and
I. I NTRODUCTION
orchestrates data masking through a Pseudo Random Num-
Wireless communications networks have reached an un- ber Generator (PRNG). This continual adaptation ensures a
precedented level of development. judicious equilibrium between heightened security measures
Turbo Codes (TC) possess the advantage of architectural and streamlined implementation protocols. The use of various
flexibility, enabling the incorporation of alternatives within PRNG with different statistical properties is examined here in
their structure. This adaptability allows for the enhancement terms of security by using NIST tests and Binary Entropy in
of security levels, potentially obviating the need for a separate the channel, Pbe at the receiver, and finally, comparing the
encryption block. The possibility of jointly implementing an cycles and hardware complexity required of our proposal with
error control and data encryption scheme is attractive both to a classical one.
avoid BER degradation of the cascading application of such
processes and to reduce the latency and delay of a system.
II. DYNAMIC I NTERLEAVER
Recently, work has emerged proposing the incorporation
of security in codification, in particular focusing on TC. In The proposed scheme relies on a turbo encoder, wherein the
[1], a symmetric encryption scheme is suggested to improve fundamental configuration comprises two encoders operating
transmission security. The authors propose a system that per- concurrently. One of these encoders receives the data directly,
forms interleaving of the information bits and puncturing the while the other does so through an Interleaver. Given that
parity bits at the encoder. How both processes are performed the traditional turbo encoder is systematic, information is
is controlled by a symmetric encryption private key. In [2], also transmitted to the channel, and the transmission of each
the authors present a joint encryption and scrambling method code bit is alternated through a process of puncturing. In
called CFB-AES-turbo, which combines the AES (Advanced the proposed case, the systematic data was replaced by the
outputs of both encoders, thus avoiding raw information being
The authors are with Instituto de Investigaciones Cientı́ficas y Tecnológicas available in the channel. In this way, decoding is simplified
en Electrónica (ICYTE) of Facultad de Ingenierı́a - Universidad Nacional de
Mar del Plata (FI-UNMdP) at Av. Juan B. Justo 4302, B7600 Mar del Plata, concerning the classical scheme. A simplified structure of the
Buenos Aires, Argentina, and Consejo Nacional de Investigaciones Cientı́ficas proposed scheme is shown in Fig. 1. In addition, the incoming
y Técnicas (CONICET), Mar del Plata, Buenos Aires, Argentina at Av. Juan data to the crypto-encoder undergoes an initial XOR operation
B. Justo 4302, B7600 Mar del Plata, Buenos Aires, Argentina (e-mails:
raul.lopresti@fi.mdp.edu.ar; casti@fi.mdp.edu.ar; ldemicco@fi.mdp.edu.ar). with the output of the PRNG. It is important to note that,
Manuscript received ; revised unlike the classic turbo encoder, the Interleaver block is now
JOURNAL OF LATEX CLASS FILES, VOL. X, NO. X, AUGUST 202X 2

dynamically evolving approach proposed here. In the static


Interleaver, the same order is maintained throughout the entire
transmission (designated as “S”), whereas in our proposed
approach, the Interleaver dynamically reconfigures every N
transmitted data (referred to as “D”). The Interleaver order
was established using various PRNGs, each characterized by
distinct statistical properties. The aim was to explore potential
Fig. 1. Simplified scheme of the proposed crypto-encoder. The Interleaver
is generated by a PRNG and changes every time a data block is sent,
relationships, if any, between these properties and the system’s
simultaneously masking the incoming data. performance. The PRNGs tested are Linear Feedback Shift
Register (LFSR) with primitive polynomial x16 + x14 + x13 +
x11 + 1, Synchronous Cellular Automata network (CA) with
dynamic, meaning it varies over time based on a specified 59 5-input cells with periodic boundary conditions and Rule
PRNG. This PRNG is responsible for generating a sequence 1771476585, Logistic Chaotic Map (LOG) [6], its fourth
of N numbers for each transmission, starting from an initial iteration (LOG4) and a uniformly distributed random PRNG
seed that would operate as the key, where N is the size of the was generated using a Matlab function. Table I compares
Interleaver. Then, the choice of the PRNG is not trivial since the proposed PRNGs in terms of implementation complexity,
it must satisfy the following conditions: randomness, and repetition period length.
1) To present high randomness in the channel in order to
enhance security against potential attacks. TABLE I
2) To achieve a Pbe at the receiver that is equal to or P ROPERTIES OF THE PRNG S USED IN THE TESTED I NTERLEAVERS .
less than what would be obtained with a classic scheme PRNG Hardware Complexity Statistical Properties Period
(encryption + encoding), considering that the sequential LFSR Low Very Low Long
use of the encryption algorithm would result in a Pbe CA Low Low Short
LOG Medium Medium Long
increase. LOG4 Moderated Moderated Long
3) To enable hardware implementation that utilizes the RAND High High Very Long
minimum amount of resources, offers low latency, and
allows for a high operating frequency.
On the receiver side, the decoder must be aware of the A. Randomness analysis
employed rule and the seed; these are the keys of the system.
1) Differential entropy: We use a quantifier that is derived
The three conditions mentioned above were evaluated as
from Shannon’s entropy [7] specifically designed for the
follows:
analysis of binary data. [8] The differential entropy (hb ) is
1) The level of randomness in the data transmitted through calculated as follows:
the channel was assessed using two methods: differential
entropy and by NIST tests [5]. hb = Sw+1 − Sw , (1)
2) The Pbe was calculated as a function of the signal-to-
noise ratio (SNR) in all cases at the receiver, considering where Sw represents the well-known Shannon entropy, with
AWGN noise. the subscript w denoting that the measure was applied to a
3) The proposed crypto-coder circuit was developed and concatenated series of w digits. As w increases, the quantifier
implemented in hardware using an FPGA, and the converges toward the entropy of the source, indicating greater
required resources were reported. Also, a qualitative randomness as its value increases.
analysis of the required cycles was conducted for both Figure 2 illustrates that all the Interleavers based on dynamic
the proposed case and a classic configuration. PRNGs (D LOG, D LOG4, D RAND, and D CA), except
for the LFSR, exhibit the highest level of randomness. They
Various configurations of the employed PRNG were evaluated
overlap on the same upper curve, stabilizing at approximately
to ensure compliance with the predefined conditions. In all
0.4. On the other hand, all the static versions of the mentioned
cases, the vector generated by the PRNG was sorted in
Interleavers, along with the dynamic version of the LFSR, ini-
ascending order, and the interchanges in the indices between
tially maintain a low positive value before eventually reaching
the unsorted vector and the sorted one were recorded to
zero. Finally, S LFSR presents a lower value for small w values
construct the Interleaver.
until it falls to zero. Additionally, the least random behavior
corresponds to the Block Interleaver, which never rises above
III. E VALUATION OF THE PROPOSED C RYPTO -E NCODER zero.
To assess the security and reliability of the proposed 2) NIST tests: The Special Publication (SP) 800-22 of
scheme, considering different PRNG-based for the Interleaver, the National Institute of Standards and Technology (NIST)
we calculated the randomness of the crypto-coded data in the represents a robust statistical package encompassing 15 dis-
channel and the Pbe at the receiver. A simulation that models tinct tests for assessing the randomness of sequences [5].
the transmitter, the channel and the receiver was developed. Capitalizing on the comprehensive nature of this suite, we
To compare various configurations, the Interleaver was set employ all 15 tests to evaluate the encryption capabilities
up in both, the traditional block (statically) manner, and the inherent in the proposed crypto-encoder.
JOURNAL OF LATEX CLASS FILES, VOL. X, NO. X, AUGUST 202X 3

the Dynamic and Static logistic Interleavers display inferior


behavior, only surpassed by dynamic CA at 1.5 dB. It can
be observed that both Static and Dynamic LFSR, LOG4,
and Rand Interleavers demonstrate the best and relatively
comparable performance among themselves.

C. Hardware Implementation
This design was implemented on a Xilinx Zedboard FPGA
to verify its feasibility. The resources used in the implemen-
tation when the PRNG is a LFSR with primitive polynomial
x16 + x14 + x13 + x11 + 1 can be seen in Table III. Fig. 4
shows the block diagram of the implemented crypto-encoder.
It consists of the following blocks:
• PRNG → Provides a pseudo-random number at each
Fig. 2. Differential Entropy on the bits transmitted via the Block, CA, RAND, clock cycle.
LOG, LOG4 and LFSR Interleavers in their Static and Dynamic versions. • SIPO (Serial-Input Parallel-Output) → Shift register with
Dynamic versions, except for the LFSR, maintain a nonzero entropy value as
w increases, while static versions and the dynamic version of the LFSR go
serial input and parallel output. Serves as an interface to
to zero as w increases. the pipeline stages.
• EIPO →It is similar to a SIPO, but writes can occur at
arbitrary positions rather than incrementally.
• PISO (Parallel-Input Serial-Output) → Shift register with
parallel input and serial output. Serves as an interface to
the pipeline stages.
• PIRO. → It is similar to a PISO, but the data is rotated
in the registry instead of discarded.
• Sorting → Order the numbers and provide indexes of the
new positions.
• FSSM → It performs the encoding. In particular, the e0
FSSM block also provides its trellis state via the s signal.
• Ending → Performs trellis termination relevant to TCs.
• Indexing → Provides the index for the EIPO block.
• Control (not shown in the diagram for legibility reasons)
→ Synchronises the system through enable and control
signals.
Fig. 3. Error probability for different signal-to-noise ratios using Block, CA,
RAND, LOG, LOG4 and LFSR Interleavers in their Static and Dynamic
The design has 4 pipeline stages identified in the diagram by
versions. S0 , S1 , S2 and S3 .

In the Dynamic case, only the logistic, its fourth iteration, IV. C ONCLUSIONS
and the random approach passed the NIST tests when digitiz- Results showed that it is feasible to realize a communication
ing was involved from the 15th bit onward and considering system with a single encryption-coding process using a time-
the two least significant bits for the XOR masking. The rest varying Interleaver with good security properties and transmis-
of the dynamic methods, LSFR and CA, do not pass the tests. sion reliability. This scheme has the advantage of reducing the
Meanwhile, none of the static methods pass them. Table II cycles required in both the transmitter and the receiver, thus
displays the results of the test applied to the Dynamic Inter- reducing delays and latencies. Among the PRNGs studied, the
leaver, utilizing LOG4 and LFSR as the PRNG. Additionally, Interleaver based on the fourth iteration of the logistic map is
it presents the results applied to the Static version of LOG4. the one that presented the best performance in terms of error
This table illustrates that only the D LOG4 passes the tests. probability and randomness in the channel. Moreover, it was
demonstrated that the hardware implementation of this design
B. Error probability does not require a significant amount of extra resources.
The calculation of Pbe followed simulations akin to those
conducted in [9], involving the transmission of 2.5 × 106 ACKNOWLEDGMENTS
data units within GF(4) using Interleavers sized at 10 000. This work was partially funded by ICTP (the Abdus Salam
This process was repeated five times, and the results were International Centre for Theoretical Physics), the ANPCyT
subsequently averaged. In Figure 3, it is observed that the (Agencia Nacional de Promoción Cientı́fica y Tecnológica,
traditional Block Interleaver exhibits the poorest performance PICT2019-03024) and the NVIDIA Academic Hardware Grant
among the studied scenarios. For SNR greater than 2 dB, both Program.
JOURNAL OF LATEX CLASS FILES, VOL. X, NO. X, AUGUST 202X 4

TABLE II
R ESULTS OF THE APPLICATION OF THE 15 NIST SP800-22 TESTS ON 100 BITSTREAMS ( EACH WITH 107 BITS ) GENERATED
BY THE PROPOSED SYSTEM USING THREE DIFFERENT PRNG S : LOG4 DYNAMIC , LOG4 STATIC AND LFSR DYNAMIC .

PRNG D LOG4 S LOG4 D LFSR


Tests p-value Rate p-value Rate p-value Rate
Frequency 0.096578 97/100 0.350485 100/100 0.978072 98/100
BlockFrequency 0.719747 98/100 0.008879 99/100 0.534146 100/100
CumulativeSums 0.181557 97/100 0.213309 100/100 0.637119 100/100
Runs 0.275709 99/100 0.350485 100/100 0.455937 100/100
LongestRun 0.955835 99/100 0.213309 100/100 0.816537 100/100
Rank 0.383827 98/100 ∗ 0.000000 13/16 ∗ 0.000000 0/100
FFT 0.366918 98/100 0.534146 100/100 0.066882 99/100
NonOverlappingTemplate 0.455937 99/100 ∗ 0.000089 100/100 ∗ 0.897763 94/100
OverlappingTemplate 0.419021 97/100 0.066882 100/100 0.048716 98/100
Universal 0.000114 99/100 0.350485 100/100 0.437274 100/100
ApproximateEntropy 0.595549 98/100 ∗ 0.000000 7/16 0.637119 99/100
Serial 0.867692 99/100 ∗ 0.000000 4/16 ∗ 0.000000 0/100
LinearComplexity 0.048716 99/100 0.066882 100/100 0.108791 98/100
RandomExcursions 0.162606 86/88 0.162606 62/62 0.201069 95/96
RandomExcursionsVariant 0.227773 87/88 0.006196 62/62 0.447593 96/96

Fig. 4. Design diagram of the crypto-encoder implementation.

TABLE III of simple, switched and skipped chaotic maps in finite precision,”
R ESOURCES USED IN THE IMPLEMENTATION OF Entropy, vol. 20, no. 2, p. 135, 2018.
THE PROPOSED DESIGN ON A X ILINX Z EDBOARD . [7] C. E. Shannon, “A mathematical theory of communication,” The Bell
system technical journal, vol. 27, no. 3, pp. 379–423, 1948.
LUTs Slice Registers Slice LUT as Logic [8] W. Ebeling and R. Steuer, “Partition-based entropies of deterministic and
4247 4287 1400 4247 stochastic maps,” Stochastics and Dynamics, vol. 1, no. 1, pp. 1–17, 2001.
[9] J. Castiñeira Moreira, D. Petruzzi, M. Liberatori, and J. Bonadero, “Non-
punctured non-systematic 1/2-rate turbo codes,” Latin American applied
research, vol. 39, no. 3, pp. 201–206, 2009.
R EFERENCES

[1] G. Zhu, D. Chen, C. Zhang, and Y. Qi, “Secure turbo-polar codes informa-
tion transmission on wireless channel,” in 2021 IEEE 15th International
Conference on Anti-counterfeiting, Security, and Identification (ASID).
IEEE, 2021, pp. 116–121.
[2] S. Jeon and J. P. Choi, “Cfb-aes-turbo: joint encryption and channel
coding for secure satellite data transmission,” in ICC 2019-2019 IEEE
International Conference on Communications (ICC). IEEE, 2019, pp.
1–7.
[3] L. De Micco, D. Petruzzi, H. A. Larrondo, and J. Castiñeira Moreira,
“Randomness of finite-state sequence machine over gf (4) and quality of
hopping turbo codes,” IET Communications, vol. 7, no. 9, pp. 783–790,
2013.
[4] V. Kovtun and Y. Ivanov, “Crypto coding system based on the turbo codes
with secret keys,” ICT Express, 2023.
[5] L. E. Bassham, A. L. Rukhin, J. Soto, J. R. Nechvatal, M. E. Smid,
E. B. Barker, S. D. Leigh, M. Levenson, M. Vangel, D. L. Banks, N. A.
Heckert, J. F. Dray, and S. Vo, “A statistical test suite for random and
pseudorandom number generators for cryptographic applications,” Tech.
Rep., 2010. [Online]. Available: https://doi.org/10.6028/nist.sp.800-22r1a
[6] M. Antonelli, L. De Micco, H. Larrondo, and O. A. Rosso, “Complexity

You might also like