Crypto-coding technique based on polar code and secret key generated from wireless channel characteristics for wireless communication systems
The crypto-coding technique is essential for modern digital wireless communications systems, allowing data encryption and channel coding to be performed in only one step without requiring additional hardware. This work proposes a crypto-coding technique combining polar codes with a secret key, which...
Saved in:
| Published in | PloS one Vol. 20; no. 2; p. e0318110 |
|---|---|
| Main Authors | , , |
| Format | Journal Article |
| Language | English |
| Published |
United States
Public Library of Science
25.02.2025
Public Library of Science (PLoS) |
| Subjects | |
| Online Access | Get full text |
| ISSN | 1932-6203 1932-6203 |
| DOI | 10.1371/journal.pone.0318110 |
Cover
| Summary: | The crypto-coding technique is essential for modern digital wireless communications systems, allowing data encryption and channel coding to be performed in only one step without requiring additional hardware. This work proposes a crypto-coding technique combining polar codes with a secret key, which is derived from wireless channel characteristics, to boost the security and reliability characteristics of the systems. The secret key is divided into two parts, one is assigned to the frozen bits, and the other is XORed with the information bits. A simulation with different key lengths and code lengths is carried out in Additive white Gaussian noise (AWGN) that helps us to evaluate this technique by the error correction and security performance, computational complexity. The key benefit is that it achieves the same bit error rate (BER) performance and computational complexity as traditional polar codes and existing methods despite only taking one step. Meanwhile, it ensures completely degraded decoding effectiveness at eavesdroppers, thus it is effective against passive eavesdropping attacks. Furthermore, this method does not require additional hardware overhead for key management and distribution. |
|---|---|
| Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 Competing Interests: The authors have declared that no competing interests exist. |
| ISSN: | 1932-6203 1932-6203 |
| DOI: | 10.1371/journal.pone.0318110 |