Contents & References of Blind detection of LFSR-based Scar Mabel parameters in digital data
List:
Chapter 1- Introduction. 2
1-1- What is scrambler and why do we use it? 2
1-2- Advantages of using scrambling before sending data 3
1-3- Pseudo-random sequences. 4
1-4- Criteria for the degree of randomness of a sequence. 5
Chapter 2- Theory of operation of linear shift registers with feedback. 8
2-1- Composition and structure of shift registers 8
2-2- Synthesis of LFSR algorithm. 11
2-3- Classical representation of LFSR sequences. 18
2-4- Simulation and results related to the implementation of Berlekamp-Messi algorithm on the LFSR output sequence. 21
Chapter 3- Identifying the parameters of linear scramblers. 25
3-1- Detection of scrambler parameters using the sequence of input text x(t) 28
3-2- Detection of collective scrambler parameters only using input text bias. 29
3-3- Detection of multiplicative scrambler parameters using input text bias only. 39
3-4- Modified Closio Algorithm 42
3-5- Simulation results of Closio Algorithm on multiplicative and cumulative scramblers. 50
Chapter 4- Identification of scrambler parameters in the presence of channel noise. 54
4-1- Scrambler detection when the noise is in the form of changed bits. 54
4-2- Identifying the scrambler when bit insertion occurs as noise in the sequence. 59
3-3- Simulation results of polynomial identification of scramblers in the presence of channel noise. 65
Chapter 5- Identifying the scrambler parameters using the word double channel encoder. 68
5-1- Bias calculation after channel coding. 69
5-2- Polynomial reconstruction of feedback scrambler after passing through channel coding. 71
5-3- The results related to the identification of the scrambler placed after the block encoder. 79
Conclusion.89
Sources..91
English abstract and title
Source:
[1] F. G. Gustavson, "Analysis of the Berlekamp-Massey linear feedback shift-register synthesis algorithm," IBM Journal of Research and Development, vol. 20, pp. 204-212, 1976.
[2] J. L. Massey, "Shift-register synthesis and BCH decoding," IEEE Transactions on Information Theory, vol. 15, pp. 122-127, 1969.
[3] E. R. Berlekamp, ??Nonbinary BCH decoding: University of North Carolina. Department of Statistics, 1966.
[4] E. Filiol, "Reconstruction of punctured convolutional encoders," in International Symposium on Information Theory and its Applications (ISITA'00), 2000.
[5] A. Valembois, "Detection and recognition of a binary linear code," Discrete Applied Mathematics, vol. 111, pp. 199-218, 2001.
[6] M. Cluzeau, "Reconstruction of a linear scrambler," Computers, IEEE Transactions on, vol. 56, pp. 1283-1291, 2007.
[7] R. Lidl and G. L. Mullen, "When does a polynomial over a finite field permute the elements of the field?," American Mathematical Monthly, pp. 243-246, 1988.
[8] A. Canteaut and E. Filiol, "Ciphertext only reconstruction of stream ciphers based on combination generators," in Fast Software Encryption, 2001, pp. 165-180.
[9] X.-B. Liu, S. N. Koh, C.-C. Chui, and X.-W. Wu, "A study on reconstruction of linear scrambler using dual words of channel encoder," Information Forensics and Security, IEEE Transactions on, vol. 8, pp. 542-552, 2013. [10] X.-B. Liu, S. N. Koh, X.-W. Wu, and C.-C. Chui, "Reconstructing a linear scrambler with improved detection capability and in the presence of noise," Information Forensics and Security, IEEE Transactions on, vol. 7, pp. 208-218, 2012.
[11] B. Sklar, Digital communications vol. 2: Prentice Hall NJ, 2001. [12] X.-W. Wu, S. N. Koh, and C.-C. Chui, "Primitive polynomials for robust scramblers and stream ciphers against reverse engineering," in Information Theory Proceedings (ISIT), 2010 IEEE International Symposium on, 2010, pp. 2473-2477.
[13] K. Umebayashi, S. Ishii, and R. Kohno, "Blind adaptive estimation of modulation scheme for software defined radio," in Personal, Indoor and Mobile Radio Communications, 2000. PIMRC 2000. The 11th IEEEThe 11th IEEE International Symposium on, 2000, pp. 43-47.
[14] H. Ishii, S. Kawamura, T. Suzuki, M. Kuroda, H. Hosoya, and H. Fujishima, "An adaptive receiver based on software defined radio techniques," in Personal, Indoor and Mobile Radio Communications, 2001 12th IEEE International Symposium on, 2001, pp. G-120-G-124 vol. 2.
[15] E. Filiol, "Decimation attack of stream ciphers," in Progress in Cryptology—INDOCRYPT 2000, ed: Springer, 2000, pp. 31-42.
[16] M. Cote and N. Sendrier, "Reconstruction of convolutional codes from noisy observation," in Proceedings of the 2009 IEEE international conference on Symposium on Information Theory-Volume 1, 2009, pp. 546-550.
[17] W. Meier and O. Staffelbach, "Fast correlation attacks on stream ciphers," in Advances in Cryptology—EUROCRYPT'88, 1988, pp. 301-314. [18] R. Gautier, G. Burel, J. Letessier, and O. Berder, “Blind estimation of scrambler offset using encoder redundancy,” in Proc. Thirty-Sixth
Asilomar Conf. Signals, Systems and Computers, Pacific Grove, CA,
Nov. 3-6, 2002, vol. 1, pp. 626–630.
[19] E. Filiol, “Reconstruction of convolutional encoder over ,” in
Proc. Sixth IMA Conf. Cryptography and Coding, 1997, Lecture Notes
in Computer Science, no. 1355, pp. 100–110, Springer Verlag. [20] E. Filiol, “Reconstruction of punctured convolutional encoders,” in Proc. IEEE Int. Symp. Information Theory and Applications (ISITA'00), 2000, pp. 4–7, SITA and IEICE Publishing.
[21] J. Barbier, “Reconstruction of turbo-code encoders,” in Proc. SPIE Defense and Security Symp., Space Communications Technologies Conf., Mar. 28-31, 2005, vol. 5819, pp. 463–473.
[22] J. Barbier, G. Sicot, and S. Houcke, “Algebraic approach fo reconstruction of linear and convolutional error correcting codes,” Int. J Appl. Math. Comput. Sci., vol. 3, no. 3, pp. 113–118, 2006.