Double-Staged Syndrome Coding Scheme for Improving Information Transmission Security over the Wiretap Channel

Main Article Content

Sarwat A. Ahmed
Asaad Mubdir Jassim Al-Hindawi

Abstract

This paper presents a study of a syndrome coding scheme for different binary linear error correcting codes that refer to the code families such as BCH, BKLC, Golay, and Hamming. The study is implemented on Wyner’s wiretap channel model when the main channel is error-free and the eavesdropper channel is a binary symmetric channel with crossover error probability (0 < Pe ≤ 0.5) to show the security performance of error correcting codes while used in the single-staged syndrome coding scheme in terms of equivocation rate. Generally, these codes are not designed for secure information transmission, and they have low equivocation rates when they are used in the syndrome coding scheme. Therefore, to improve the transmission security when using these codes, a modified encoder which consists of a double-staged syndrome coding scheme, is proposed. Two models are implemented in this paper: the first model utilizes one encoding stage of the conventional syndrome coding scheme. In contrast, the second model utilizes two encoding stages of the syndrome coding scheme to improve the results obtained from the first model. The C++ programming language, in conjunction with the NTL library, is used for obtaining simulation results for the implemented models. The equivocation rate results from the second model were compared to both the results of the first model and of the unsecured transmission (transmission of data without encryption). The comparison revealed that the security performance of the second model is better than the first model and the insecure system, as the equivocation for all the simulated codes over the proposed model reaches at least %97 at the Pe = 0.1.


 

Article Details

How to Cite
“Double-Staged Syndrome Coding Scheme for Improving Information Transmission Security over the Wiretap Channel” (2023) Journal of Engineering, 29(02), pp. 112–136. doi:10.31026/j.eng.2023.02.08.
Section
Articles

How to Cite

“Double-Staged Syndrome Coding Scheme for Improving Information Transmission Security over the Wiretap Channel” (2023) Journal of Engineering, 29(02), pp. 112–136. doi:10.31026/j.eng.2023.02.08.

Publication Dates

References

Al-Hassan, S., Ahmed, M. Z., and Tomlinson, M., 2013. Secrecy coding for the wiretap channel using Best Known Linear Codes, Global Information Infrastructure Symposium, IEEE, pp. 1-6.

AL-Hassan, S., Ahmed, M. Z. and Tomlinson, M., 2014. Extension of the parity check matrix to construct the best equivocation codes for syndrome coding, IEEE Global Information Infrastructure and Networking Symposium, pp. 1-3.

Chen, Y., He, D., Ying, C. and Luo, Y., 2022. Chen, Yiqi, Dan He, Chenhao Ying, and Yuan Luo. "Strong secrecy of arbitrarily varying wiretap channel with constraints, IEEE Transactions on Information Theory, 68(7), pp. 4700-4722.

Gazi, O., 2020. Forward error correction via channel coding. Switzerland: Springer.

Grassl, M., 2007. Bounds on the minimum distance of linear codes and quantum codes. [Online]

Available at: http://www.codetables.de

Harrison, W. K. et al., 2019. Implications of coding layers on physical-layer security: A secrecy benefit approach, Entropy, 21(8), pp. 755.

Kadum, A. C., Flayyih, W. N. and Rokhani, F. Z., 2020. Reliability Analysis of Multibit Error Correcting Coding and Comparison to Hamming Product Code for On-Chip Interconnect, Journal of Engineering, 26(6), pp. 94-106.

Moon, T. K., 2021. Error correction coding: mathematical methods and algorithms, 2nd ed. New Jersey, USA: John Wiley & Sons.

Nooraiepour, A., Aghdam, S. R. and Duman, T. M., 2020. On secure communications over Gaussian wiretap channels via finite-length codes, IEEE Communications Letters, 24(9), pp. 1904-1908.

Ozarow, L. H. and Wyner, A. D., 1984. Wire-tap channel II. AT&T Bell Laboratories technical journal, 63(10), pp. 2135-2157.

Shannon, C. E., 1948. A mathematical theory of communication, The Bell System Technical Journal, 27(3), pp. 379-432.

Wyner, A. D., 1975. The wiretap channel, The Bell System Technical Journal, 54(8), pp. 1355-1387.

Zhang, K., Tomlinson, M., and Ahmed, M. Z., 2013. A modified McEliece public key encryption system with a higher security level, IEEE Third International Conference on Information Science and Technology, pp. 991-996.

Similar Articles

You may also start an advanced similarity search for this article.