Blind detection of LFSR-based Scar Mabel parameters in digital data

Number of pages: 94 File Format: word File Code: 32224
Year: 2014 University Degree: Master's degree Category: Electrical Engineering
  • Part of the Content
  • Contents & Resources
  • Summary of Blind detection of LFSR-based Scar Mabel parameters in digital data

    Master thesis in the field

    Electrical Engineering

    Communication-system

    Abstract

    Blind detection of parameters of LFSR based scramblers, in digital data

    by effort

     Zahra Zakari

    In digital telecommunication systems, linear scramblers are used both for simple encryption and for breaking a large sequence of identical bits. The bit sequence issue, i.e. a large number of 0's and 1's in a row, usually leads to synchronization problems. In fact, the methods of whitening the statistics of the digital source without using the content data are called scrambling. In telecommunications and decoders, a scrambler is a device that manipulates and changes data before it is sent. These changes are done in reverse in the receiver to reach the primary data.

    In this thesis, after introducing the scrambler and its components, the methods of finding the scrambler parameters in two cases of having the input text sequence (Berlkamp-Messi method) and the other case of having only the scrambled sequence (Clausio algorithm) are discussed and the results are analyzed. takes After that, we consider the case where the scrambled data has an error after passing through the channel, and in the presence of channel noise, we identify the scrambler parameters and observe the effect of noise on the output data of two types of scramblers (multiplicative scramblers and collective scramblers). After that, we investigate the feedback polynomial identification method of linear scramblers assuming that the source bits are coded by error correction coding before they are scrambled.

     

    1-1- What is a scrambler and why do we use it?

    A digital data transmission system always causes errors and damages when sending data, and the amount of these disturbances and damages changes depending on the statistics of the source. Sometimes synchronization, interference and equalization problems are related to source statistics. Although the use of internals in sending codes makes the system performance independent from the source statistics to some extent, there are always dependencies, in addition, adding internals data causes problems such as increasing the rate of sent symbols or adding alignment in symbols. In a code sending system, if we assume that the symbols sent are statistically independent, it will be much easier to analyze and find errors. We call such a source whose symbols are statistically independent from each other as a white source because its analysis is like Gaussian white noise. Whitening methods of digital source statistics without using content data are described as scrambling[1]. In telecommunications and decoders, a scrambler[2] is a device that manipulates and changes data before it is sent. These changes are done in reverse in the receiver to get the original data. Various scrambling methods are used in satellite and PSTN modems [3]. The scrambler can be placed just before an FEC encoder [4] or it can be placed after the FEC and before the modulation block.

    Our effort in this research is to investigate different methods and techniques in identifying the parameters of linear scramblers. This is done by having a string of output bits and based on assumptions on the input bits of the scrambler. Of course, someone who does this using the output bits must consider two categories: first, error correction, and then extracting the scrambler parameters. Considering the linearity of the discussed scramblers, using algebraic methods to estimate the scrambler parameters is the most efficient method. Especially linear shift registers with feedback, whose feedback function is a linear function, which is further explained in this regard.

    1-2- Advantages of using scrambling before sending data

    With this method, without adding content data to the sent message, the accuracy of Time Recovery can be increased in the receiving equipment.

    By spreading the energy throughout the carrier signal, it reduces the possibility of interference between the carrier signals and the dependence of the spectral density between It removes the scrambled data and the real data sent.

    It increases the security of sending data and scramblers can be used in encryption. Because the ideal state of a ciphertext is to be a completely random sequence. In other words, the bits of the sequence are completely independent from each other and the probability of being zero and one is equal, and a long and i.i.d sequence can be produced from a limited and short key.

    1-3- Pseudo-random sequences

    In order to simulate and test digital communication systems, sequences that are approximate to the sequence Binary randoms are ideal, we need. We use linear feedback shift registers in the generation of binary pseudo-random sequence. With a simple modification to these circuits, they can be used as self-synchronous digital scramblers/descramblers. Scramblers allow tracking loops in the receiver to be protected and hidden by breaking a long string of 0's or 1's in the data. At moderate data rates such as telephone line modems, it can be implemented with a few simple lines of code. By combining this function and other features into the code, you can eliminate additional hardware. This method increases reliability and reduces production costs.

    An ideal binary random sequence is actually an independent infinite sequence with a uniform distribution in which the random variables accept any of the values ??0 or 1 with a probability of 0.5. This sequence can be modeled by the data string produced by the binary sources. With linear feedback shift registers, the best approximation for binary random sequences can be achieved. The sequence obtained in this way is called pseudo-random, pseudo-noise, maximum-length, or sequence.

    To simulate a random binary sequence, we are looking for a shift register that, if its length is a register, the sequence it produces has the largest possible period, i.e. Such a sequence is called a "maximum length sequence". It can be shown that the shift register produces a sequence with the maximum length, whose connection polynomial (in the next chapter, it is explained about the connection polynomial) is of the fundamental polynomial type. There are fundamental polynomials of any degree. A necessary condition for a polynomial to be fundamental is that it is indecomposable, but this condition is not sufficient. A polynomial with binary coefficients in the binary basis is said to be indecomposable when we cannot decompose it into a binary polynomial with coefficients and at least 1.

    1-4- Criteria for the degree of randomness of a sequence

    The degree of randomness of a sequence refers to the degree of unpredictability of a sequence. Any random sequence produced by processes used in practical applications is not necessarily random. Here we are going to express some characteristics of random sequences and any sequence that has these characteristics is called random or more precisely pseudo-random.

    Criteria and principles provided by Glomb for the randomness of a sequence:

    Glomb criteria for sequences with a period of periodicity are from the next vector space in the field, but because The field of work of this thesis is on binary sequences in the field. We express these properties for binary sequences.

    Balance law: in each periodic period of these sequences, the number of zeros and the number of ones is almost equal. (More precisely, the mismatch is less than one.

  • Contents & References of Blind detection of LFSR-based Scar Mabel parameters in digital data

    List:

    Chapter 1- Introduction. 2

    1-1- What is scrambler and why do we use it? 2

    1-2- Advantages of using scrambling before sending data 3

    1-3- Pseudo-random sequences. 4

    1-4- Criteria for the degree of randomness of a sequence. 5

    Chapter 2- Theory of operation of linear shift registers with feedback. 8

    2-1- Composition and structure of shift registers 8

    2-2- Synthesis of LFSR algorithm. 11

    2-3- Classical representation of LFSR sequences. 18

    2-4- Simulation and results related to the implementation of Berlekamp-Messi algorithm on the LFSR output sequence. 21

    Chapter 3- Identifying the parameters of linear scramblers. 25

    3-1- Detection of scrambler parameters using the sequence of input text x(t) 28

    3-2- Detection of collective scrambler parameters only using input text bias. 29

    3-3- Detection of multiplicative scrambler parameters using input text bias only. 39

    3-4- Modified Closio Algorithm 42

    3-5- Simulation results of Closio Algorithm on multiplicative and cumulative scramblers. 50

    Chapter 4- Identification of scrambler parameters in the presence of channel noise. 54

    4-1- Scrambler detection when the noise is in the form of changed bits. 54

    4-2- Identifying the scrambler when bit insertion occurs as noise in the sequence. 59

    3-3- Simulation results of polynomial identification of scramblers in the presence of channel noise. 65

    Chapter 5- Identifying the scrambler parameters using the word double channel encoder. 68

    5-1- Bias calculation after channel coding. 69

    5-2- Polynomial reconstruction of feedback scrambler after passing through channel coding. 71

    5-3- The results related to the identification of the scrambler placed after the block encoder. 79

    Conclusion.89

    Sources..91

    English abstract and title

    Source:

    [1] F. G. Gustavson, "Analysis of the Berlekamp-Massey linear feedback shift-register synthesis algorithm," IBM Journal of Research and Development, vol. 20, pp. 204-212, 1976.

    [2] J. L. Massey, "Shift-register synthesis and BCH decoding," IEEE Transactions on Information Theory, vol. 15, pp. 122-127, 1969.

    [3] E. R. Berlekamp, ??Nonbinary BCH decoding: University of North Carolina. Department of Statistics, 1966.

    [4] E. Filiol, "Reconstruction of punctured convolutional encoders," in International Symposium on Information Theory and its Applications (ISITA'00), 2000.

    [5] A. Valembois, "Detection and recognition of a binary linear code," Discrete Applied Mathematics, vol. 111, pp. 199-218, 2001.

    [6] M. Cluzeau, "Reconstruction of a linear scrambler," Computers, IEEE Transactions on, vol. 56, pp. 1283-1291, 2007.

    [7] R. Lidl and G. L. Mullen, "When does a polynomial over a finite field permute the elements of the field?," American Mathematical Monthly, pp. 243-246, 1988.

    [8] A. Canteaut and E. Filiol, "Ciphertext only reconstruction of stream ciphers based on combination generators," in Fast Software Encryption, 2001, pp. 165-180.

    [9] X.-B. Liu, S. N. Koh, C.-C. Chui, and X.-W. Wu, "A study on reconstruction of linear scrambler using dual words of channel encoder," Information Forensics and Security, IEEE Transactions on, vol. 8, pp. 542-552, 2013. [10] X.-B. Liu, S. N. Koh, X.-W. Wu, and C.-C. Chui, "Reconstructing a linear scrambler with improved detection capability and in the presence of noise," Information Forensics and Security, IEEE Transactions on, vol. 7, pp. 208-218, 2012.

    [11] B. Sklar, Digital communications vol. 2: Prentice Hall NJ, 2001. [12] X.-W. Wu, S. N. Koh, and C.-C. Chui, "Primitive polynomials for robust scramblers and stream ciphers against reverse engineering," in Information Theory Proceedings (ISIT), 2010 IEEE International Symposium on, 2010, pp. 2473-2477.

    [13] K. Umebayashi, S. Ishii, and R. Kohno, "Blind adaptive estimation of modulation scheme for software defined radio," in Personal, Indoor and Mobile Radio Communications, 2000. PIMRC 2000. The 11th IEEEThe 11th IEEE International Symposium on, 2000, pp. 43-47.

    [14] H. Ishii, S. Kawamura, T. Suzuki, M. Kuroda, H. Hosoya, and H. Fujishima, "An adaptive receiver based on software defined radio techniques," in Personal, Indoor and Mobile Radio Communications, 2001 12th IEEE International Symposium on, 2001, pp. G-120-G-124 vol. 2.

    [15] E. Filiol, "Decimation attack of stream ciphers," in Progress in Cryptology—INDOCRYPT 2000, ed: Springer, 2000, pp. 31-42.

    [16] M. Cote and N. Sendrier, "Reconstruction of convolutional codes from noisy observation," in Proceedings of the 2009 IEEE international conference on Symposium on Information Theory-Volume 1, 2009, pp. 546-550.

    [17] W. Meier and O. Staffelbach, "Fast correlation attacks on stream ciphers," in Advances in Cryptology—EUROCRYPT'88, 1988, pp. 301-314. [18] R. Gautier, G. Burel, J. Letessier, and O. Berder, “Blind estimation of scrambler offset using encoder redundancy,” in Proc. Thirty-Sixth

                 Asilomar Conf. Signals, Systems and Computers, Pacific Grove, CA,

                Nov. 3-6, 2002, vol. 1, pp. 626–630.

    [19] E. Filiol, “Reconstruction of convolutional encoder over ,” in

                Proc. Sixth IMA Conf. Cryptography and Coding, 1997, Lecture Notes

                in Computer Science, no. 1355, pp. 100–110, Springer Verlag. [20] E. Filiol, “Reconstruction of punctured convolutional encoders,” in Proc. IEEE Int. Symp. Information Theory and Applications (ISITA'00), 2000, pp. 4–7, SITA and IEICE Publishing.

    [21] J. Barbier, “Reconstruction of turbo-code encoders,” in Proc. SPIE Defense and Security Symp., Space Communications Technologies Conf., Mar. 28-31, 2005, vol. 5819, pp. 463–473.

    [22] J. Barbier, G. Sicot, and S. Houcke, “Algebraic approach fo reconstruction of linear and convolutional error correcting codes,” Int. J Appl. Math. Comput. Sci., vol. 3, no. 3, pp. 113–118, 2006.

Blind detection of LFSR-based Scar Mabel parameters in digital data