Crypto-coding technique based on polar code and secret key generated from wireless channel characteristics for wireless communication systems

The crypto-coding technique is essential for modern digital wireless communications systems, allowing data encryption and channel coding to be performed in only one step without requiring additional hardware. This work proposes a crypto-coding technique combining polar codes with a secret key, which...

Full description

Saved in:
Bibliographic Details
Published inPloS one Vol. 20; no. 2; p. e0318110
Main Authors Van Linh, Dinh, Van Yem, Vu, Thi Phuong Thao, Hoang
Format Journal Article
LanguageEnglish
Published United States Public Library of Science 25.02.2025
Public Library of Science (PLoS)
Subjects
Online AccessGet full text
ISSN1932-6203
1932-6203
DOI10.1371/journal.pone.0318110

Cover

More Information
Summary:The crypto-coding technique is essential for modern digital wireless communications systems, allowing data encryption and channel coding to be performed in only one step without requiring additional hardware. This work proposes a crypto-coding technique combining polar codes with a secret key, which is derived from wireless channel characteristics, to boost the security and reliability characteristics of the systems. The secret key is divided into two parts, one is assigned to the frozen bits, and the other is XORed with the information bits. A simulation with different key lengths and code lengths is carried out in Additive white Gaussian noise (AWGN) that helps us to evaluate this technique by the error correction and security performance, computational complexity. The key benefit is that it achieves the same bit error rate (BER) performance and computational complexity as traditional polar codes and existing methods despite only taking one step. Meanwhile, it ensures completely degraded decoding effectiveness at eavesdroppers, thus it is effective against passive eavesdropping attacks. Furthermore, this method does not require additional hardware overhead for key management and distribution.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
Competing Interests: The authors have declared that no competing interests exist.
ISSN:1932-6203
1932-6203
DOI:10.1371/journal.pone.0318110