NON-BREAKABLE DATA ENCRYPTION WITH CLASSICAL INFORMATION

Size: px
Start display at page:

Download "NON-BREAKABLE DATA ENCRYPTION WITH CLASSICAL INFORMATION"

Transcription

1 Fluctuation and Noise Letters Vol. 4, No. 2 (2004) C1 C5 c World Scientific Publishing Company NON-REKLE DT ENCRYPTION WITH CLSSICL INFORMTION LSZLO. KISH and SWMINTHN SETHURMN Texas &M University, Department of Electrical Engineering College Station, TX , US Received 12 May 2004 Revised 9 June 2004 ccepted 9 June 2004 Secure encryption of data is one of the most important parts of information technology and major concern of data security, military, defense and homeland security applications. The main aim of the paper is to propose a new way of approach to encryption. We propose a new possible approach [1] to encryption, which could be a fast, simple, inexpensive, robust, flexible, and mobile way of data encryption for absolutely secure data transmission by using classical digital information. The Eavesdropper is allowed to know the received signal thus the method has a higher level of protection than that of quantum encryption. Factorization algorithms do not help to break the code. Proper scrambling operators, which are necessary for the method, are study of current research. Keywords: Classical information; encryption. 1. Introduction Secure encryption of data is one of the most important parts of information technology and major concern of data security, military, defense and homeland security applications. So far, there is no secure practical way to encrypt the data. Depending on the type of encryption, if the Third Party (Eavesdropper) acquires enough knowledge about how the encryption is made and/or about the key, the Eavesdropper can decode the encrypted message. The general opinion is that classical information systems, either digital or analog, are not suitable for absolutely secure data encryption. This is the reason why governments, defense and funding agencies have been spending billions of dollars for the research of quantum encryption which has the potential to reach absolutely secure encryption. However, the performance of data transfer via quantum encryption is very poor, expensive and extremely slow. The reason for these deficiencies is the fact that quantum encryption requires generating, handling and detecting of single photons (or other particles) and that requirement implies short transfer distance (<one mile) or the need of a large number of repeaters which makes the system slow, expensive, fragile, less flexible and less mobile. Moreover, it usually needs at least two parallel information channels, a quantum one and a classical one. C1

2 C2 L.. Kish & S. Sethuraman The method proposed in this paper offers a fast, simple, inexpensive, robust, flexible, and mobile way of data encryption for absolutely secure data transmission by using classical digital information. The speed of transfer depends on the level of security and practically unbreakable encryption can be reached at a relatively high speed. The absolute security is supported by the following facts: (i) (ii) There are no shared secret keys or public keys to share between the Sender and the Receiver. The encoding keys are random and they exist only locally and temporarily. They are kept at the stations where they are generated and terminated after use. Therefore, the Eavesdropper has no way to acquire the actual encoding key, unless it has a physical access to the encoder or the decoder. (iii) nybody, including the Eavesdropper, is allowed to know the all details of the process how the encryption is made. (iv) The actual encoding key is random and it is changing for each message. Thus, the Eavesdropper is unable to succeed by using statistical analysis of the transmitted signals. 2. Description of the Method Table 1 illustrates how the method works. The arrows show the direction of signal transmission. Let us suppose that we have two data scrambling operators which satisfy the following relation: =. (1) (1) In the first step, the message u(t), and the random number sequence (seed) for the scrambling operator are generated. (2) Then the encoded signal is generated and sent to the Receiver through a channel which can be a public classical channel. The Eavesdropper cannot decode the message, even if he knows the operation because it is scrambled by an unknown random sequence. (3) The Receiver generates the random number sequence (seed) for the scrambling operator, then uses on the received message and generates. Then he sends back to the Sender. (4) The Sender receives the signal and removes the operator by applying its inverse on this signal. = u(t), in accordance with Eq. (1). Then the Sender sends the signal u(t) back to the Receiver. The Sender does not need the random seed for the operator any more, so he deletes it to secure non-breakability. (5) The Receiver decodes this signal by applying the inverse of operation thus he gets u(t) = u(t). The Receiver does not need the random seed for the operator any more, so he deletes it to secure non-breakability.

3 Non-breakable Simple Encryption with No Key to Share C3 Table. 1. Scheme of absolute secure data transfer by a public classical channel. The Eavesdropper is allowed to know almost everything except the seeds (random number sequences) used by the operators and. S T E P Sender Signal Transferred (Eavesdropper knows) Receiver 1) Message: u(t) Generates seed for: 2) u(t) u(t) u(t) 3) Generates seed for: 4) u(t) = u(t) u(t) u(t) 5) Deletes seed for: u(t) = u(t) Deletes seed for: Keeps: u(t) O P E R T O R S = R P = R P = R P = R P

4 C4 L.. Kish & S. Sethuraman The remaining part of the description is to identify what kind of scrambling operators can provide the non-breakability. The first condition, which is necessary for the basic operation of the method, is described by Eq. (1). However, this is not enough for nonbreakability. For example, let us imagine that the data sequence and the seeds consist of numbers +1 and -1 (instead of numbers zero and 1). Then the operators can be simply the multiplication by the seeds. Equation (1) holds and the encryption functions with division by the seeds used as inverse operators. However, it is easily breakable. Observing the signals in phase 2 and 3 (see Table 1) makes it very easy to determine the operator and its inverse. Thus after observing the signal in phase 4, it can be easily decoded. The necessary non-breakability condition for an operator C used with the present method is the following. The observation of a particular signal x(t) and the signal C x(t) obtained by the operation should not make it possible to determine how the operator will act on a different signal y(t) provided y(t) is statistically independent of x(t). In conclusion: The knowledge of x(t), C x(t) and y(t) should not be enough to determine C y(t). (2) Equation (1) and Condition 2 look like they are not easy to satisfy at the same time and the search for satisfactory operations is currently going on. In the rest of the paper, we show a simple operator below which may satisfy both Eq. (1) and Condition 2. Let us continue to work with data sequences containing +1 and -1 numbers only. Let the operator C be defined as follows: C = P C R C (3) where the operator P C makes a random permutation of the location of the data within the signal u(t) (that is, scrambles the variable t); and the operator R C multiplies the elements of the signal by the elements of a random data sequence r C (t). It can be shown that a fairly large subset of these operators satisfy both Eq. (1) and Condition 2. Note, alternative orderings of the permutation and random sequence operators are also relevant. The transferred signals will be completely scrambled and for long data lengths and supposedly there is no way to reconstruct the original message by the Eavesdropper because she has less known parameters than unknown variables and equations to solve. This assumption is still to be confirmed. If this realization works, it would have the following advantages when compared to quantum encryption: The encryption is more secure than quantum encryption because the Eavesdropper can be allowed to be present at the signal receiver and see all the received signals, which cannot be allowed at secure quantum communication. Moreover, the method needs only a single classical channel (quantum encryption needs two channels). Classical communication, so it is many orders of magnitude faster than quantum communication. It is simple, very cheap and can be easily installed at the software level. No maintenance is needed.

5 Non-breakable Simple Encryption with No Key to Share C5 Finally, it is important to emphasize that the main aim of this paper is to propose a new way of approach to encryption. The proper operators and the exact conditions of their working still have to be found or confirmed. It is also possible that the proposed method has to be expanded for satisfactory performance. For example, one can imagine that the original message is encrypted by different but related operators and these encrypted data are sent to the Receiver, who acts similarly before sending them back. Then the message would be decrypted in a more sophisticated way by combing the operators and the data packages. cknowledgements Valuable discussions with Janos ergou, Suhail Zubairy, Julio Gea anacloche, Deepa Kundur, Minoru Fujishima, Robert Vajtai and Gabe Schmera are appreciated. References [1] L.. Kish and S. Sethuraman, Non-reakable Encryption with Classical Information, Patent Disclosure, Texas &M University, TMU-TEES, May 11, 2004.

Cryptography CS 555. Topic 5: Pseudorandomness and Stream Ciphers. CS555 Spring 2012/Topic 5 1

Cryptography CS 555. Topic 5: Pseudorandomness and Stream Ciphers. CS555 Spring 2012/Topic 5 1 Cryptography CS 555 Topic 5: Pseudorandomness and Stream Ciphers CS555 Spring 2012/Topic 5 1 Outline and Readings Outline Stream ciphers LFSR RC4 Pseudorandomness Readings: Katz and Lindell: 3.3, 3.4.1

More information

An Introduction to Cryptography

An Introduction to Cryptography An Introduction to http://www.southernct.edu/~fields/ Terminology is the study of secret writing. This is the only branch of mathematics to be designated by the U.S. government as export-controlled. Cryptographic

More information

Digital Audio and Video Fidelity. Ken Wacks, Ph.D.

Digital Audio and Video Fidelity. Ken Wacks, Ph.D. Digital Audio and Video Fidelity Ken Wacks, Ph.D. www.kenwacks.com Communicating through the noise For most of history, communications was based on face-to-face talking or written messages sent by courier

More information

DELTA MODULATION AND DPCM CODING OF COLOR SIGNALS

DELTA MODULATION AND DPCM CODING OF COLOR SIGNALS DELTA MODULATION AND DPCM CODING OF COLOR SIGNALS Item Type text; Proceedings Authors Habibi, A. Publisher International Foundation for Telemetering Journal International Telemetering Conference Proceedings

More information

ISSN (Print) Original Research Article. Coimbatore, Tamil Nadu, India

ISSN (Print) Original Research Article. Coimbatore, Tamil Nadu, India Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 016; 4(1):1-5 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources) www.saspublisher.com

More information

Construction of Cable Digital TV Head-end. Yang Zhang

Construction of Cable Digital TV Head-end. Yang Zhang Advanced Materials Research Online: 2014-05-21 ISSN: 1662-8985, Vol. 933, pp 682-686 doi:10.4028/www.scientific.net/amr.933.682 2014 Trans Tech Publications, Switzerland Construction of Cable Digital TV

More information

A LOW COST TRANSPORT STREAM (TS) GENERATOR USED IN DIGITAL VIDEO BROADCASTING EQUIPMENT MEASUREMENTS

A LOW COST TRANSPORT STREAM (TS) GENERATOR USED IN DIGITAL VIDEO BROADCASTING EQUIPMENT MEASUREMENTS A LOW COST TRANSPORT STREAM (TS) GENERATOR USED IN DIGITAL VIDEO BROADCASTING EQUIPMENT MEASUREMENTS Radu Arsinte Technical University Cluj-Napoca, Faculty of Electronics and Telecommunication, Communication

More information

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /ISCAS.2005.

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /ISCAS.2005. Wang, D., Canagarajah, CN., & Bull, DR. (2005). S frame design for multiple description video coding. In IEEE International Symposium on Circuits and Systems (ISCAS) Kobe, Japan (Vol. 3, pp. 19 - ). Institute

More information

UTTR BEST TELEMETRY SOURCE SELECTOR

UTTR BEST TELEMETRY SOURCE SELECTOR UTTR BEST TELEMETRY SOURCE SELECTOR Kenneth H. Rigley David H. Wheelwright Brandt H. Fowers Computer Sciences Corporation, Hill Air Force Base, Utah ABSTRACT The UTTR (Utah Test & Training Range) offers

More information

Audio Compression Technology for Voice Transmission

Audio Compression Technology for Voice Transmission Audio Compression Technology for Voice Transmission 1 SUBRATA SAHA, 2 VIKRAM REDDY 1 Department of Electrical and Computer Engineering 2 Department of Computer Science University of Manitoba Winnipeg,

More information

DIGITAL COMMUNICATION

DIGITAL COMMUNICATION 10EC61 DIGITAL COMMUNICATION UNIT 3 OUTLINE Waveform coding techniques (continued), DPCM, DM, applications. Base-Band Shaping for Data Transmission Discrete PAM signals, power spectra of discrete PAM signals.

More information

Technical Article MS-2714

Technical Article MS-2714 . MS-2714 Understanding s in the JESD204B Specification A High Speed ADC Perspective by Jonathan Harris, applications engineer, Analog Devices, Inc. INTRODUCTION As high speed ADCs move into the GSPS range,

More information

Permutation based speech scrambling for next generation mobile communication

Permutation based speech scrambling for next generation mobile communication Permutation based speech scrambling for next generation mobile communication Dhanya G #1, Dr. J. Jayakumari *2 # Research Scholar, ECE Department, Noorul Islam University, Kanyakumari, Tamilnadu 1 dhanyagnr@gmail.com

More information

Previous Lecture Sequential Circuits. Slide Summary of contents covered in this lecture. (Refer Slide Time: 01:55)

Previous Lecture Sequential Circuits. Slide Summary of contents covered in this lecture. (Refer Slide Time: 01:55) Previous Lecture Sequential Circuits Digital VLSI System Design Prof. S. Srinivasan Department of Electrical Engineering Indian Institute of Technology, Madras Lecture No 7 Sequential Circuit Design Slide

More information

Dual Link DVI Receiver Implementation

Dual Link DVI Receiver Implementation Dual Link DVI Receiver Implementation This application note describes some features of single link receivers that must be considered when using 2 devices for a dual link application. Specific characteristics

More information

Enhancing Performance in Multiple Execution Unit Architecture using Tomasulo Algorithm

Enhancing Performance in Multiple Execution Unit Architecture using Tomasulo Algorithm Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

Metastability Analysis of Synchronizer

Metastability Analysis of Synchronizer Forn International Journal of Scientific Research in Computer Science and Engineering Research Paper Vol-1, Issue-3 ISSN: 2320 7639 Metastability Analysis of Synchronizer Ankush S. Patharkar *1 and V.

More information

Joint Optimization of Source-Channel Video Coding Using the H.264/AVC encoder and FEC Codes. Digital Signal and Image Processing Lab

Joint Optimization of Source-Channel Video Coding Using the H.264/AVC encoder and FEC Codes. Digital Signal and Image Processing Lab Joint Optimization of Source-Channel Video Coding Using the H.264/AVC encoder and FEC Codes Digital Signal and Image Processing Lab Simone Milani Ph.D. student simone.milani@dei.unipd.it, Summer School

More information

Eric Roberts and Jerry Cain Handout #36 CS 106J May 15, The Enigma Machine

Eric Roberts and Jerry Cain Handout #36 CS 106J May 15, The Enigma Machine Eric Roberts and Jerry Cain Handout #36 CS 106J May 15, 2017 The Enigma Machine In World War II, a team of British mathematicians working at a secret facility called Bletchley Park was able to break the

More information

Figure 2: Original and PAM modulated image. Figure 4: Original image.

Figure 2: Original and PAM modulated image. Figure 4: Original image. Figure 2: Original and PAM modulated image. Figure 4: Original image. An image can be represented as a 1D signal by replacing all the rows as one row. This gives us our image as a 1D signal. Suppose x(t)

More information

Why t? TEACHER NOTES MATH NSPIRED. Math Objectives. Vocabulary. About the Lesson

Why t? TEACHER NOTES MATH NSPIRED. Math Objectives. Vocabulary. About the Lesson Math Objectives Students will recognize that when the population standard deviation is unknown, it must be estimated from the sample in order to calculate a standardized test statistic. Students will recognize

More information

Optimization of Multi-Channel BCH Error Decoding for Common Cases. Russell Dill Master's Thesis Defense April 20, 2015

Optimization of Multi-Channel BCH Error Decoding for Common Cases. Russell Dill Master's Thesis Defense April 20, 2015 Optimization of Multi-Channel BCH Error Decoding for Common Cases Russell Dill Master's Thesis Defense April 20, 2015 Bose-Chaudhuri-Hocquenghem (BCH) BCH is an Error Correcting Code (ECC) and is used

More information

REGIONAL NETWORKS FOR BROADBAND CABLE TELEVISION OPERATIONS

REGIONAL NETWORKS FOR BROADBAND CABLE TELEVISION OPERATIONS REGIONAL NETWORKS FOR BROADBAND CABLE TELEVISION OPERATIONS by Donald Raskin and Curtiss Smith ABSTRACT There is a clear trend toward regional aggregation of local cable television operations. Simultaneously,

More information

Detection and demodulation of non-cooperative burst signal Feng Yue 1, Wu Guangzhi 1, Tao Min 1

Detection and demodulation of non-cooperative burst signal Feng Yue 1, Wu Guangzhi 1, Tao Min 1 International Conference on Applied Science and Engineering Innovation (ASEI 2015) Detection and demodulation of non-cooperative burst signal Feng Yue 1, Wu Guangzhi 1, Tao Min 1 1 China Satellite Maritime

More information

Breaking the Enigma. Dmitri Gabbasov. June 2, 2015

Breaking the Enigma. Dmitri Gabbasov. June 2, 2015 Breaking the Enigma Dmitri Gabbasov June 2, 2015 1 Introduction Enigma was an electro-mechanical machine that was used before and during the World War II by Germany to encrypt and decrypt secret messages.

More information

P1: OTA/XYZ P2: ABC c01 JWBK457-Richardson March 22, :45 Printer Name: Yet to Come

P1: OTA/XYZ P2: ABC c01 JWBK457-Richardson March 22, :45 Printer Name: Yet to Come 1 Introduction 1.1 A change of scene 2000: Most viewers receive analogue television via terrestrial, cable or satellite transmission. VHS video tapes are the principal medium for recording and playing

More information

The reduction in the number of flip-flops in a sequential circuit is referred to as the state-reduction problem.

The reduction in the number of flip-flops in a sequential circuit is referred to as the state-reduction problem. State Reduction The reduction in the number of flip-flops in a sequential circuit is referred to as the state-reduction problem. State-reduction algorithms are concerned with procedures for reducing the

More information

Dual Link DVI Receiver Implementation

Dual Link DVI Receiver Implementation Dual Link DVI Receiver Implementation This application note describes some features of single link receivers that must be considered when using 2 devices for a dual link application. Specific characteristics

More information

A Top-down Hierarchical Approach to the Display and Analysis of Seismic Data

A Top-down Hierarchical Approach to the Display and Analysis of Seismic Data A Top-down Hierarchical Approach to the Display and Analysis of Seismic Data Christopher J. Young, Constantine Pavlakos, Tony L. Edwards Sandia National Laboratories work completed under DOE ST485D ABSTRACT

More information

CZT vs FFT: Flexibility vs Speed. Abstract

CZT vs FFT: Flexibility vs Speed. Abstract CZT vs FFT: Flexibility vs Speed Abstract Bluestein s Fast Fourier Transform (FFT), commonly called the Chirp-Z Transform (CZT), is a little-known algorithm that offers engineers a high-resolution FFT

More information

Overview of All Pixel Circuits for Active Matrix Organic Light Emitting Diode (AMOLED)

Overview of All Pixel Circuits for Active Matrix Organic Light Emitting Diode (AMOLED) Chapter 2 Overview of All Pixel Circuits for Active Matrix Organic Light Emitting Diode (AMOLED) ---------------------------------------------------------------------------------------------------------------

More information

CS311: Data Communication. Transmission of Digital Signal - I

CS311: Data Communication. Transmission of Digital Signal - I CS311: Data Communication Transmission of Digital Signal - I by Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Web: http://home.iitj.ac.in/~manaskhatua http://manaskhatua.github.io/

More information

Introduction to Signal Processing D R. T A R E K T U T U N J I P H I L A D E L P H I A U N I V E R S I T Y

Introduction to Signal Processing D R. T A R E K T U T U N J I P H I L A D E L P H I A U N I V E R S I T Y Introduction to Signal Processing D R. T A R E K T U T U N J I P H I L A D E L P H I A U N I V E R S I T Y 2 0 1 4 What is a Signal? A physical quantity that varies with time, frequency, space, or any

More information

INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR NPTEL ONLINE CERTIFICATION COURSE. On Industrial Automation and Control

INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR NPTEL ONLINE CERTIFICATION COURSE. On Industrial Automation and Control INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR NPTEL ONLINE CERTIFICATION COURSE On Industrial Automation and Control By Prof. S. Mukhopadhyay Department of Electrical Engineering IIT Kharagpur Topic Lecture

More information

Company overview. Brief profile

Company overview. Brief profile Company overview Brief profile For nearly 80 years, Rohde & Schwarz has stood for quality, precision and innovation in all fields of wireless communications. The company is strategically based on four

More information

Research Article Design and Analysis of a High Secure Video Encryption Algorithm with Integrated Compression and Denoising Block

Research Article Design and Analysis of a High Secure Video Encryption Algorithm with Integrated Compression and Denoising Block Research Journal of Applied Sciences, Engineering and Technology 11(6): 603-609, 2015 DOI: 10.19026/rjaset.11.2019 ISSN: 2040-7459; e-issn: 2040-7467 2015 Maxwell Scientific Publication Corp. Submitted:

More information

How to Predict the Output of a Hardware Random Number Generator

How to Predict the Output of a Hardware Random Number Generator How to Predict the Output of a Hardware Random Number Generator Markus Dichtl Siemens AG, Corporate Technology Markus.Dichtl@siemens.com Abstract. A hardware random number generator was described at CHES

More information

VITERBI DECODER FOR NASA S SPACE SHUTTLE S TELEMETRY DATA

VITERBI DECODER FOR NASA S SPACE SHUTTLE S TELEMETRY DATA VITERBI DECODER FOR NASA S SPACE SHUTTLE S TELEMETRY DATA ROBERT MAYER and LOU F. KALIL JAMES McDANIELS Electronics Engineer, AST Principal Engineers Code 531.3, Digital Systems Section Signal Recover

More information

WATERMARKING USING DECIMAL SEQUENCES. Navneet Mandhani and Subhash Kak

WATERMARKING USING DECIMAL SEQUENCES. Navneet Mandhani and Subhash Kak Cryptologia, volume 29, January 2005 WATERMARKING USING DECIMAL SEQUENCES Navneet Mandhani and Subhash Kak ADDRESS: Department of Electrical and Computer Engineering, Louisiana State University, Baton

More information

Example: compressing black and white images 2 Say we are trying to compress an image of black and white pixels: CSC310 Information Theory.

Example: compressing black and white images 2 Say we are trying to compress an image of black and white pixels: CSC310 Information Theory. CSC310 Information Theory Lecture 1: Basics of Information Theory September 11, 2006 Sam Roweis Example: compressing black and white images 2 Say we are trying to compress an image of black and white pixels:

More information

Software vs Hardware Machine Control: Cost and Performance Compared

Software vs Hardware Machine Control: Cost and Performance Compared Software vs Hardware Machine Control: Cost and Performance Compared SOFTWARE VS HARDWARE MACHINE CONTROL WHITE PAPER SOFTWARE VS. HARDWARE MOTION CONTROL WHITE PAPER In this paper, we will compare a software-based

More information

Implementation of a turbo codes test bed in the Simulink environment

Implementation of a turbo codes test bed in the Simulink environment University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2005 Implementation of a turbo codes test bed in the Simulink environment

More information

Analysis of local and global timing and pitch change in ordinary

Analysis of local and global timing and pitch change in ordinary Alma Mater Studiorum University of Bologna, August -6 6 Analysis of local and global timing and pitch change in ordinary melodies Roger Watt Dept. of Psychology, University of Stirling, Scotland r.j.watt@stirling.ac.uk

More information

IEEE P a. IEEE P Wireless Personal Area Networks. hybrid modulation schemes and cameras ISC modes

IEEE P a. IEEE P Wireless Personal Area Networks. hybrid modulation schemes and cameras ISC modes IEEE P802.15 Wireless Personal Area Networks Project IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Title Kookmin PHY 4 modes hybrid modulation schemes and cameras ISC modes Date

More information

A Novel Approach towards Video Compression for Mobile Internet using Transform Domain Technique

A Novel Approach towards Video Compression for Mobile Internet using Transform Domain Technique A Novel Approach towards Video Compression for Mobile Internet using Transform Domain Technique Dhaval R. Bhojani Research Scholar, Shri JJT University, Jhunjunu, Rajasthan, India Ved Vyas Dwivedi, PhD.

More information

Exploring the Enigma [The MATH Connection]

Exploring the Enigma [The MATH Connection] Exploring the Enigma [The MATH Connection] by Claire Ellis, from Issue 34 of PLUS Magazine As long ago as the Ancient Greeks, warring armies have encrypted their communications in an attempt to keep their

More information

Adaptive decoding of convolutional codes

Adaptive decoding of convolutional codes Adv. Radio Sci., 5, 29 214, 27 www.adv-radio-sci.net/5/29/27/ Author(s) 27. This work is licensed under a Creative Commons License. Advances in Radio Science Adaptive decoding of convolutional codes K.

More information

IP Telephony and Some Factors that Influence Speech Quality

IP Telephony and Some Factors that Influence Speech Quality IP Telephony and Some Factors that Influence Speech Quality Hans W. Gierlich Vice President HEAD acoustics GmbH Introduction This paper examines speech quality and Internet protocol (IP) telephony. Voice

More information

Access Fee Charging System for Information Contents SharingThrough P2P Communications

Access Fee Charging System for Information Contents SharingThrough P2P Communications Access Fee Charging System for Information Contents SharingThrough P2P Communications Kohei Arai Graduate School of Science and Engineering Saga University Saga City, Japan Abstract Charge system for information

More information

Practical Bit Error Rate Measurements on Fibre Optic Communications Links in Student Teaching Laboratories

Practical Bit Error Rate Measurements on Fibre Optic Communications Links in Student Teaching Laboratories Ref ETOP021 Practical Bit Error Rate Measurements on Fibre Optic Communications Links in Student Teaching Laboratories Douglas Walsh 1, David Moodie 1, Iain Mauchline 1, Steve Conner 1, Walter Johnstone

More information

User Requirements for Terrestrial Digital Broadcasting Services

User Requirements for Terrestrial Digital Broadcasting Services User Requirements for Terrestrial Digital Broadcasting Services DVB DOCUMENT A004 December 1994 Reproduction of the document in whole or in part without prior permission of the DVB Project Office is forbidden.

More information

1 Introduction to PSQM

1 Introduction to PSQM A Technical White Paper on Sage s PSQM Test Renshou Dai August 7, 2000 1 Introduction to PSQM 1.1 What is PSQM test? PSQM stands for Perceptual Speech Quality Measure. It is an ITU-T P.861 [1] recommended

More information

V.Sorge/E.Ritter, Handout 5

V.Sorge/E.Ritter, Handout 5 06-20008 Cryptography The University of Birmingham Autumn Semester 2015 School of Computer Science V.Sorge/E.Ritter, 2015 Handout 5 Summary of this handout: Stream Ciphers RC4 Linear Feedback Shift Registers

More information

Sherlock Holmes and the adventures of the dancing men

Sherlock Holmes and the adventures of the dancing men Sherlock Holmes and the adventures of the dancing men Kseniya Garaschuk May 30, 2013 1 Overview Cryptography (from Greek for hidden, secret ) is the practice and study of hiding information. A cipher is

More information

COMPRESSION OF DICOM IMAGES BASED ON WAVELETS AND SPIHT FOR TELEMEDICINE APPLICATIONS

COMPRESSION OF DICOM IMAGES BASED ON WAVELETS AND SPIHT FOR TELEMEDICINE APPLICATIONS COMPRESSION OF IMAGES BASED ON WAVELETS AND FOR TELEMEDICINE APPLICATIONS 1 B. Ramakrishnan and 2 N. Sriraam 1 Dept. of Biomedical Engg., Manipal Institute of Technology, India E-mail: rama_bala@ieee.org

More information

Digital holographic security system based on multiple biometrics

Digital holographic security system based on multiple biometrics Digital holographic security system based on multiple biometrics ALOKA SINHA AND NIRMALA SAINI Department of Physics, Indian Institute of Technology Delhi Indian Institute of Technology Delhi, Hauz Khas,

More information

Performance of a Low-Complexity Turbo Decoder and its Implementation on a Low-Cost, 16-Bit Fixed-Point DSP

Performance of a Low-Complexity Turbo Decoder and its Implementation on a Low-Cost, 16-Bit Fixed-Point DSP Performance of a ow-complexity Turbo Decoder and its Implementation on a ow-cost, 6-Bit Fixed-Point DSP Ken Gracie, Stewart Crozier, Andrew Hunt, John odge Communications Research Centre 370 Carling Avenue,

More information

Steganographic Technique for Hiding Secret Audio in an Image

Steganographic Technique for Hiding Secret Audio in an Image Steganographic Technique for Hiding Secret Audio in an Image 1 Aiswarya T, 2 Mansi Shah, 3 Aishwarya Talekar, 4 Pallavi Raut 1,2,3 UG Student, 4 Assistant Professor, 1,2,3,4 St John of Engineering & Management,

More information

A Video Frame Dropping Mechanism based on Audio Perception

A Video Frame Dropping Mechanism based on Audio Perception A Video Frame Dropping Mechanism based on Perception Marco Furini Computer Science Department University of Piemonte Orientale 151 Alessandria, Italy Email: furini@mfn.unipmn.it Vittorio Ghini Computer

More information

Transmission System for ISDB-S

Transmission System for ISDB-S Transmission System for ISDB-S HISAKAZU KATOH, SENIOR MEMBER, IEEE Invited Paper Broadcasting satellite (BS) digital broadcasting of HDTV in Japan is laid down by the ISDB-S international standard. Since

More information

DisplayPort 1.4 Link Layer Compliance

DisplayPort 1.4 Link Layer Compliance DisplayPort 1.4 Link Layer Compliance Neal Kendall Product Marketing Manager Teledyne LeCroy quantumdata Product Family neal.kendall@teledyne.com April 2018 Agenda DisplayPort 1.4 Source Link Layer Compliance

More information

On the design of turbo codes with convolutional interleavers

On the design of turbo codes with convolutional interleavers University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2005 On the design of turbo codes with convolutional interleavers

More information

A Novel Video Compression Method Based on Underdetermined Blind Source Separation

A Novel Video Compression Method Based on Underdetermined Blind Source Separation A Novel Video Compression Method Based on Underdetermined Blind Source Separation Jing Liu, Fei Qiao, Qi Wei and Huazhong Yang Abstract If a piece of picture could contain a sequence of video frames, it

More information

ABCD. Application Note No Reeve Engineers. Transmission Level Point. 1. Introduction. 2. Application of the TLP

ABCD. Application Note No Reeve Engineers. Transmission Level Point. 1. Introduction. 2. Application of the TLP ABCD E Application Note No. 8 1996 Reeve Engineers Transmission Level Point 1. Introduction This application note covers the concept of the Transmission Level Point, or TLP. Another related application

More information

Research on sampling of vibration signals based on compressed sensing

Research on sampling of vibration signals based on compressed sensing Research on sampling of vibration signals based on compressed sensing Hongchun Sun 1, Zhiyuan Wang 2, Yong Xu 3 School of Mechanical Engineering and Automation, Northeastern University, Shenyang, China

More information

Lab 5 Linear Predictive Coding

Lab 5 Linear Predictive Coding Lab 5 Linear Predictive Coding 1 of 1 Idea When plain speech audio is recorded and needs to be transmitted over a channel with limited bandwidth it is often necessary to either compress or encode the audio

More information

Lecture 8: Cracking the Codes based on Tony Sale s Codes & Ciphers Web Page. History of Computing. Today s Topics. History of Computing Cipher Systems

Lecture 8: Cracking the Codes based on Tony Sale s Codes & Ciphers Web Page. History of Computing. Today s Topics. History of Computing Cipher Systems Lecture 8: Cracking the Codes based on Tony Sale s Codes & Ciphers Web Page Today s Topics Cipher Systems Substitution Ciphers Cracking Caesar s Cipher Polyalphabetic Substitution The Enigma Machine Rotors,

More information

Keywords- Cryptography, Frame, Least Significant Bit, Pseudo Random Equations, Text, Video Image, Video Steganography.

Keywords- Cryptography, Frame, Least Significant Bit, Pseudo Random Equations, Text, Video Image, Video Steganography. International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 164 High Security Video Steganography Putti DeepthiChandan, Dr. M. Narayana Abstract- Video Steganography is a technique

More information

Pseudorandom bit Generators for Secure Broadcasting Systems

Pseudorandom bit Generators for Secure Broadcasting Systems +00? IE.Nfejb~lV 4 Pseudorandom bit Generators for Secure Broadcasting Systems Chung-Huang Yang m Computer & Communication Research Laboratories Industrial Technology Research Institute Chutung, Hsinchu

More information

Randomness analysis of A5/1 Stream Cipher for secure mobile communication

Randomness analysis of A5/1 Stream Cipher for secure mobile communication Randomness analysis of A5/1 Stream Cipher for secure mobile communication Prof. Darshana Upadhyay 1, Dr. Priyanka Sharma 2, Prof.Sharada Valiveti 3 Department of Computer Science and Engineering Institute

More information

CAP240 First semester 1430/1431. Sheet 4

CAP240 First semester 1430/1431. Sheet 4 King Saud University College of Computer and Information Sciences Department of Information Technology CAP240 First semester 1430/1431 Sheet 4 Multiple choice Questions 1-Unipolar, bipolar, and polar encoding

More information

SECURED EEG DISTRIBUTION IN TELEMEDICINE USING ENCRYPTION MECHANISM

SECURED EEG DISTRIBUTION IN TELEMEDICINE USING ENCRYPTION MECHANISM SECURED EEG DISTRIBUTION IN TELEMEDICINE USING ENCRYPTION MECHANISM Ankita Varshney 1, Mukul Varshney 2, Jitendra Varshney 3 1 Department of Software Engineering, 3 Department Of Computer Science and Engineering

More information

FRAME ERROR RATE EVALUATION OF A C-ARQ PROTOCOL WITH MAXIMUM-LIKELIHOOD FRAME COMBINING

FRAME ERROR RATE EVALUATION OF A C-ARQ PROTOCOL WITH MAXIMUM-LIKELIHOOD FRAME COMBINING FRAME ERROR RATE EVALUATION OF A C-ARQ PROTOCOL WITH MAXIMUM-LIKELIHOOD FRAME COMBINING Julián David Morillo Pozo and Jorge García Vidal Computer Architecture Department (DAC), Technical University of

More information

Enigma. Developed and patented (in 1918) by Arthur Scherbius Many variations on basic design Eventually adopted by Germany

Enigma. Developed and patented (in 1918) by Arthur Scherbius Many variations on basic design Eventually adopted by Germany Enigma Enigma 1 Enigma Developed and patented (in 1918) by Arthur Scherbius Many variations on basic design Eventually adopted by Germany o For both military and diplomatic use o Many variations used Broken

More information

MPEG has been established as an international standard

MPEG has been established as an international standard 1100 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 9, NO. 7, OCTOBER 1999 Fast Extraction of Spatially Reduced Image Sequences from MPEG-2 Compressed Video Junehwa Song, Member,

More information

TERRESTRIAL broadcasting of digital television (DTV)

TERRESTRIAL broadcasting of digital television (DTV) IEEE TRANSACTIONS ON BROADCASTING, VOL 51, NO 1, MARCH 2005 133 Fast Initialization of Equalizers for VSB-Based DTV Transceivers in Multipath Channel Jong-Moon Kim and Yong-Hwan Lee Abstract This paper

More information

Pivoting Object Tracking System

Pivoting Object Tracking System Pivoting Object Tracking System [CSEE 4840 Project Design - March 2009] Damian Ancukiewicz Applied Physics and Applied Mathematics Department da2260@columbia.edu Jinglin Shen Electrical Engineering Department

More information

116 Facta Universitatis ser.: Elect. and Energ. vol. 11, No.1 è1998è to use any kind of encrypted information or with not very pleased attitude of loc

116 Facta Universitatis ser.: Elect. and Energ. vol. 11, No.1 è1998è to use any kind of encrypted information or with not very pleased attitude of loc FACTA UNIVERSITATIS èniçsè Series: Electronics and Energetics vol. 11, No.1 è1998è, 115-125 CRYPTOGRAPHY AND STEGANOGRAPHY OF VIDEO INFORMATION IN MODERN COMMUNICATIONS Zenon Hrytskiv, Sviatoslav Voloshynovskiy

More information

VLSI System Testing. BIST Motivation

VLSI System Testing. BIST Motivation ECE 538 VLSI System Testing Krish Chakrabarty Built-In Self-Test (BIST): ECE 538 Krish Chakrabarty BIST Motivation Useful for field test and diagnosis (less expensive than a local automatic test equipment)

More information

The Impact of the DTV Transition on Consumers and Consumer Choice. Overview of the DTV Transition Situation

The Impact of the DTV Transition on Consumers and Consumer Choice. Overview of the DTV Transition Situation The Impact of the DTV Transition on Consumers and Consumer Choice Session: Opportunity in Chaos Economics of the Digital TV Transition The Columbia Institute for Tele-Information Columbia University Barry

More information

CS408 Cryptography & Internet Security

CS408 Cryptography & Internet Security CS408 Cryptography & Internet Security Lecture 4: Rotor Machines Enigma Reza Curtmola Department of Computer Science / NJIT How to move from pencil and paper to more automatic ways of encrypting and decrypting?

More information

6.111 Project Proposal IMPLEMENTATION. Lyne Petse Szu-Po Wang Wenting Zheng

6.111 Project Proposal IMPLEMENTATION. Lyne Petse Szu-Po Wang Wenting Zheng 6.111 Project Proposal Lyne Petse Szu-Po Wang Wenting Zheng Overview: Technology in the biomedical field has been advancing rapidly in the recent years, giving rise to a great deal of efficient, personalized

More information

Review paper on study of various Interleavers and their significance

Review paper on study of various Interleavers and their significance Review paper on study of various Interleavers and their significance Bobby Raje 1, Karuna Markam 2 1,2Department of Electronics, M.I.T.S, Gwalior, India ---------------------------------------------------------------------------------***------------------------------------------------------------------------------------

More information

AN EXPLORATION OF THE BENEFITS OF MIGRATION TO DIGITAL BROADCASTING

AN EXPLORATION OF THE BENEFITS OF MIGRATION TO DIGITAL BROADCASTING AN EXPLORATION OF THE BENEFITS OF MIGRATION TO DIGITAL BROADCASTING Rev. Fr. Hyacinth C. Orlu-Orlu, Ph.D. Senior Lecturer, Department of Linguistics and Communication Studies, University of Port- Harcourt,

More information

SERIES H: AUDIOVISUAL AND MULTIMEDIA SYSTEMS Infrastructure of audiovisual services Coding of moving video

SERIES H: AUDIOVISUAL AND MULTIMEDIA SYSTEMS Infrastructure of audiovisual services Coding of moving video International Telecommunication Union ITU-T H.272 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (01/2007) SERIES H: AUDIOVISUAL AND MULTIMEDIA SYSTEMS Infrastructure of audiovisual services Coding of

More information

News from Rohde&Schwarz Number 195 (2008/I)

News from Rohde&Schwarz Number 195 (2008/I) BROADCASTING TV analyzers 45120-2 48 R&S ETL TV Analyzer The all-purpose instrument for all major digital and analog TV standards Transmitter production, installation, and service require measuring equipment

More information

MPO Technology Connectivity & Application

MPO Technology Connectivity & Application MPO Technology Connectivity & Application White paper White Paper MPO Technology Connectivity & Application v1.0 1 Introduction It has been proved that reducing cable diameters and increasing connection

More information

Eddy current tools for education and innovation

Eddy current tools for education and innovation 17th World Conference on Nondestructive Testing, 25-28 Oct 2008, Shanghai, China Eddy current tools for education and innovation Gerhard MOOK, Jouri SIMONIN Institute of Materials and Joining Technology,

More information

Introduction to Digital Signal Processing (DSP)

Introduction to Digital Signal Processing (DSP) Introduction to Digital Processing (DSP) Elena Punskaya www-sigproc.eng.cam.ac.uk/~op205 Some material adapted from courses by Prof. Simon Godsill, Dr. Arnaud Doucet, Dr. Malcolm Macleod and Prof. Peter

More information

VIDEO SCRAMBLING - AN OVERVIEW. V. Bhaskaran, M. Davidov. CORPORATE RESEARCH AND DEVELOPMENT OAK Industries Inc., Rancho Bernardo, California 92127

VIDEO SCRAMBLING - AN OVERVIEW. V. Bhaskaran, M. Davidov. CORPORATE RESEARCH AND DEVELOPMENT OAK Industries Inc., Rancho Bernardo, California 92127 VIDEO SCRAMBLING - AN OVERVIEW V. Bhaskaran, M. Davidov ABSTRACT CORPORATE RESEARCH AND DEVELOPMENT OAK Industries Inc., Rancho Bernardo, California 92127 As cable systems evolve, they will handle diverse

More information

Student Laboratory Experiments Exploring Optical Fibre Communication Systems, Eye Diagrams and Bit Error Rates

Student Laboratory Experiments Exploring Optical Fibre Communication Systems, Eye Diagrams and Bit Error Rates Student Laboratory Experiments Exploring Optical Fibre Communication Systems, Eye Diagrams and Bit Error Rates Douglas Walsh, David Moodie, Iain Mauchline, Steve Conner, *Walter Johnstone, *Brian Culshaw,

More information

Digital Audio Design Validation and Debugging Using PGY-I2C

Digital Audio Design Validation and Debugging Using PGY-I2C Digital Audio Design Validation and Debugging Using PGY-I2C Debug the toughest I 2 S challenges, from Protocol Layer to PHY Layer to Audio Content Introduction Today s digital systems from the Digital

More information

Design and Implementation of Data Scrambler & Descrambler System Using VHDL

Design and Implementation of Data Scrambler & Descrambler System Using VHDL Design and Implementation of Data Scrambler & Descrambler System Using VHDL Naina K.Randive Dept.of Electronics and Telecommunications Dept. of Electronics and Telecommunications P.R. Pote (Patil) college

More information

ELEC 310 Digital Signal Processing

ELEC 310 Digital Signal Processing ELEC 310 Digital Signal Processing Alexandra Branzan Albu 1 Instructor: Alexandra Branzan Albu email: aalbu@uvic.ca Course information Schedule: Tuesday, Wednesday, Friday 10:30-11:20 ECS 125 Office Hours:

More information

AC103/AT103 ANALOG & DIGITAL ELECTRONICS JUN 2015

AC103/AT103 ANALOG & DIGITAL ELECTRONICS JUN 2015 Q.2 a. Draw and explain the V-I characteristics (forward and reverse biasing) of a pn junction. (8) Please refer Page No 14-17 I.J.Nagrath Electronic Devices and Circuits 5th Edition. b. Draw and explain

More information

Title: Lucent Technologies TDMA Half Rate Speech Codec

Title: Lucent Technologies TDMA Half Rate Speech Codec UWCC.GTF.HRP..0.._ Title: Lucent Technologies TDMA Half Rate Speech Codec Source: Michael D. Turner Nageen Himayat James P. Seymour Andrea M. Tonello Lucent Technologies Lucent Technologies Lucent Technologies

More information

hit), and assume that longer incidental sounds (forest noise, water, wind noise) resemble a Gaussian noise distribution.

hit), and assume that longer incidental sounds (forest noise, water, wind noise) resemble a Gaussian noise distribution. CS 229 FINAL PROJECT A SOUNDHOUND FOR THE SOUNDS OF HOUNDS WEAKLY SUPERVISED MODELING OF ANIMAL SOUNDS ROBERT COLCORD, ETHAN GELLER, MATTHEW HORTON Abstract: We propose a hybrid approach to generating

More information

Lab experience 1: Introduction to LabView

Lab experience 1: Introduction to LabView Lab experience 1: Introduction to LabView LabView is software for the real-time acquisition, processing and visualization of measured data. A LabView program is called a Virtual Instrument (VI) because

More information

Scalable Foveated Visual Information Coding and Communications

Scalable Foveated Visual Information Coding and Communications Scalable Foveated Visual Information Coding and Communications Ligang Lu,1 Zhou Wang 2 and Alan C. Bovik 2 1 Multimedia Technologies, IBM T. J. Watson Research Center, Yorktown Heights, NY 10598, USA 2

More information

Institute of Southern Punjab, Multan

Institute of Southern Punjab, Multan Institute of Southern Punjab, Multan Network Security Substitution Techniques Lecture#4 Mazhar Hussain E-mail: mazhar.hussain@isp.edu.pk Lecture 4: Substitution Techniques Polybius Cipher Playfair Cipher

More information