Professional Documents
Culture Documents
ESL2023 randomInterleaverNS
ESL2023 randomInterleaverNS
ESL2023 randomInterleaverNS
X, AUGUST 202X 1
Abstract—Emerging communication standards prioritize both Encryption Standard) algorithm and turbo encoding. In [3],
the assurance of secure and reliable communications as well as a modified turbo encoder is proposed whose building blocks
the reduction of transmission delay and latency. Nevertheless, are finite state sequential machines in which a non-linear
the task of achieving these objectives presents a complex and
demanding challenge. Ensuring secure transmissions while si- function that varies its coefficients in time is inserted. Using
multaneously minimizing error rates requires the implementation this configuration, the authors manage to increase the security
of multi-stage information processing techniques that integrate of the turbo system while maintaining its performance. In
coding and encryption methods, which may unfortunately lead [4], the authors introduced a second Interleaver and managed
to an undesired increase in transmission delay and latency. This it through secret keys to enhance information encryption.
research presents an innovative crypto-coding framework capable
of concurrently achieving essential encryption and coding within They found that, from a reliability perspective, the proposed
a single, streamlined process. By leveraging this approach, we system behaves equivalently to the classical one. To assess the
aim to address the trade-off between security, efficiency, and cryptographic strength of the system, they employed the linear
transmission delay, thus contributing to the advancement of correlation coefficient.
secure and efficient communication standards. In this paper, This article introduces a novel crypto-encoder scheme en-
we present a comprehensive evaluation of the proposed scheme,
assessing its impact on final system error probability, encryption gineered to fortify the security of data transmission while
efficacy, and the complexity of hardware implementation. Our preserving the error correction capabilities inherent in turbo
findings shed light on the potential benefits of this approach for encoders. The principal objective is to augment the entropy of
future communication standards. transmitted data within the channel without compromising the
Index Terms—Coding, Delay, Dynamic Interleaver, Encryption, Binary Error Probability (Pbe ) and evading a substantial rise
Latency, Non-systematic, Security, Turbo Codes. in implementation complexity. These objectives are attainable
by leveraging the adaptive framework of the proposed system,
which dynamically modulates the interleaving mechanism and
I. I NTRODUCTION
orchestrates data masking through a Pseudo Random Num-
Wireless communications networks have reached an un- ber Generator (PRNG). This continual adaptation ensures a
precedented level of development. judicious equilibrium between heightened security measures
Turbo Codes (TC) possess the advantage of architectural and streamlined implementation protocols. The use of various
flexibility, enabling the incorporation of alternatives within PRNG with different statistical properties is examined here in
their structure. This adaptability allows for the enhancement terms of security by using NIST tests and Binary Entropy in
of security levels, potentially obviating the need for a separate the channel, Pbe at the receiver, and finally, comparing the
encryption block. The possibility of jointly implementing an cycles and hardware complexity required of our proposal with
error control and data encryption scheme is attractive both to a classical one.
avoid BER degradation of the cascading application of such
processes and to reduce the latency and delay of a system.
II. DYNAMIC I NTERLEAVER
Recently, work has emerged proposing the incorporation
of security in codification, in particular focusing on TC. In The proposed scheme relies on a turbo encoder, wherein the
[1], a symmetric encryption scheme is suggested to improve fundamental configuration comprises two encoders operating
transmission security. The authors propose a system that per- concurrently. One of these encoders receives the data directly,
forms interleaving of the information bits and puncturing the while the other does so through an Interleaver. Given that
parity bits at the encoder. How both processes are performed the traditional turbo encoder is systematic, information is
is controlled by a symmetric encryption private key. In [2], also transmitted to the channel, and the transmission of each
the authors present a joint encryption and scrambling method code bit is alternated through a process of puncturing. In
called CFB-AES-turbo, which combines the AES (Advanced the proposed case, the systematic data was replaced by the
outputs of both encoders, thus avoiding raw information being
The authors are with Instituto de Investigaciones Cientı́ficas y Tecnológicas available in the channel. In this way, decoding is simplified
en Electrónica (ICYTE) of Facultad de Ingenierı́a - Universidad Nacional de
Mar del Plata (FI-UNMdP) at Av. Juan B. Justo 4302, B7600 Mar del Plata, concerning the classical scheme. A simplified structure of the
Buenos Aires, Argentina, and Consejo Nacional de Investigaciones Cientı́ficas proposed scheme is shown in Fig. 1. In addition, the incoming
y Técnicas (CONICET), Mar del Plata, Buenos Aires, Argentina at Av. Juan data to the crypto-encoder undergoes an initial XOR operation
B. Justo 4302, B7600 Mar del Plata, Buenos Aires, Argentina (e-mails:
raul.lopresti@fi.mdp.edu.ar; casti@fi.mdp.edu.ar; ldemicco@fi.mdp.edu.ar). with the output of the PRNG. It is important to note that,
Manuscript received ; revised unlike the classic turbo encoder, the Interleaver block is now
JOURNAL OF LATEX CLASS FILES, VOL. X, NO. X, AUGUST 202X 2
C. Hardware Implementation
This design was implemented on a Xilinx Zedboard FPGA
to verify its feasibility. The resources used in the implemen-
tation when the PRNG is a LFSR with primitive polynomial
x16 + x14 + x13 + x11 + 1 can be seen in Table III. Fig. 4
shows the block diagram of the implemented crypto-encoder.
It consists of the following blocks:
• PRNG → Provides a pseudo-random number at each
Fig. 2. Differential Entropy on the bits transmitted via the Block, CA, RAND, clock cycle.
LOG, LOG4 and LFSR Interleavers in their Static and Dynamic versions. • SIPO (Serial-Input Parallel-Output) → Shift register with
Dynamic versions, except for the LFSR, maintain a nonzero entropy value as
w increases, while static versions and the dynamic version of the LFSR go
serial input and parallel output. Serves as an interface to
to zero as w increases. the pipeline stages.
• EIPO →It is similar to a SIPO, but writes can occur at
arbitrary positions rather than incrementally.
• PISO (Parallel-Input Serial-Output) → Shift register with
parallel input and serial output. Serves as an interface to
the pipeline stages.
• PIRO. → It is similar to a PISO, but the data is rotated
in the registry instead of discarded.
• Sorting → Order the numbers and provide indexes of the
new positions.
• FSSM → It performs the encoding. In particular, the e0
FSSM block also provides its trellis state via the s signal.
• Ending → Performs trellis termination relevant to TCs.
• Indexing → Provides the index for the EIPO block.
• Control (not shown in the diagram for legibility reasons)
→ Synchronises the system through enable and control
signals.
Fig. 3. Error probability for different signal-to-noise ratios using Block, CA,
RAND, LOG, LOG4 and LFSR Interleavers in their Static and Dynamic
The design has 4 pipeline stages identified in the diagram by
versions. S0 , S1 , S2 and S3 .
In the Dynamic case, only the logistic, its fourth iteration, IV. C ONCLUSIONS
and the random approach passed the NIST tests when digitiz- Results showed that it is feasible to realize a communication
ing was involved from the 15th bit onward and considering system with a single encryption-coding process using a time-
the two least significant bits for the XOR masking. The rest varying Interleaver with good security properties and transmis-
of the dynamic methods, LSFR and CA, do not pass the tests. sion reliability. This scheme has the advantage of reducing the
Meanwhile, none of the static methods pass them. Table II cycles required in both the transmitter and the receiver, thus
displays the results of the test applied to the Dynamic Inter- reducing delays and latencies. Among the PRNGs studied, the
leaver, utilizing LOG4 and LFSR as the PRNG. Additionally, Interleaver based on the fourth iteration of the logistic map is
it presents the results applied to the Static version of LOG4. the one that presented the best performance in terms of error
This table illustrates that only the D LOG4 passes the tests. probability and randomness in the channel. Moreover, it was
demonstrated that the hardware implementation of this design
B. Error probability does not require a significant amount of extra resources.
The calculation of Pbe followed simulations akin to those
conducted in [9], involving the transmission of 2.5 × 106 ACKNOWLEDGMENTS
data units within GF(4) using Interleavers sized at 10 000. This work was partially funded by ICTP (the Abdus Salam
This process was repeated five times, and the results were International Centre for Theoretical Physics), the ANPCyT
subsequently averaged. In Figure 3, it is observed that the (Agencia Nacional de Promoción Cientı́fica y Tecnológica,
traditional Block Interleaver exhibits the poorest performance PICT2019-03024) and the NVIDIA Academic Hardware Grant
among the studied scenarios. For SNR greater than 2 dB, both Program.
JOURNAL OF LATEX CLASS FILES, VOL. X, NO. X, AUGUST 202X 4
TABLE II
R ESULTS OF THE APPLICATION OF THE 15 NIST SP800-22 TESTS ON 100 BITSTREAMS ( EACH WITH 107 BITS ) GENERATED
BY THE PROPOSED SYSTEM USING THREE DIFFERENT PRNG S : LOG4 DYNAMIC , LOG4 STATIC AND LFSR DYNAMIC .
TABLE III of simple, switched and skipped chaotic maps in finite precision,”
R ESOURCES USED IN THE IMPLEMENTATION OF Entropy, vol. 20, no. 2, p. 135, 2018.
THE PROPOSED DESIGN ON A X ILINX Z EDBOARD . [7] C. E. Shannon, “A mathematical theory of communication,” The Bell
system technical journal, vol. 27, no. 3, pp. 379–423, 1948.
LUTs Slice Registers Slice LUT as Logic [8] W. Ebeling and R. Steuer, “Partition-based entropies of deterministic and
4247 4287 1400 4247 stochastic maps,” Stochastics and Dynamics, vol. 1, no. 1, pp. 1–17, 2001.
[9] J. Castiñeira Moreira, D. Petruzzi, M. Liberatori, and J. Bonadero, “Non-
punctured non-systematic 1/2-rate turbo codes,” Latin American applied
research, vol. 39, no. 3, pp. 201–206, 2009.
R EFERENCES
[1] G. Zhu, D. Chen, C. Zhang, and Y. Qi, “Secure turbo-polar codes informa-
tion transmission on wireless channel,” in 2021 IEEE 15th International
Conference on Anti-counterfeiting, Security, and Identification (ASID).
IEEE, 2021, pp. 116–121.
[2] S. Jeon and J. P. Choi, “Cfb-aes-turbo: joint encryption and channel
coding for secure satellite data transmission,” in ICC 2019-2019 IEEE
International Conference on Communications (ICC). IEEE, 2019, pp.
1–7.
[3] L. De Micco, D. Petruzzi, H. A. Larrondo, and J. Castiñeira Moreira,
“Randomness of finite-state sequence machine over gf (4) and quality of
hopping turbo codes,” IET Communications, vol. 7, no. 9, pp. 783–790,
2013.
[4] V. Kovtun and Y. Ivanov, “Crypto coding system based on the turbo codes
with secret keys,” ICT Express, 2023.
[5] L. E. Bassham, A. L. Rukhin, J. Soto, J. R. Nechvatal, M. E. Smid,
E. B. Barker, S. D. Leigh, M. Levenson, M. Vangel, D. L. Banks, N. A.
Heckert, J. F. Dray, and S. Vo, “A statistical test suite for random and
pseudorandom number generators for cryptographic applications,” Tech.
Rep., 2010. [Online]. Available: https://doi.org/10.6028/nist.sp.800-22r1a
[6] M. Antonelli, L. De Micco, H. Larrondo, and O. A. Rosso, “Complexity