IJETST
  • Register
  • Login
##common.pageHeaderLogo.altText##
  • Home
  • About
    • Editorial Team
    • About the Journal
  • Current
  • Archives
  • Submissions
  • Contact
Advanced Search
  1. Home
  2. Archives
  3. Vol. 1 No. 02 (2014): April 2014 Issue
  4. Articles

Vol. 1 No. 02 (2014)

April 2014

Error Free Cryptographic Secure Communication Using LDPC and Stopping Set Algorithm

  • Prof. Devendra.O. Shamkuwar
  • Mrs. Kanchan Suresh Shinde
  • Mr. Rameshwar.G. Wavhal
  • Mr. Somnath.B. Nikam
  • Mr. Somnath.R. Pande

International Journal of Emerging Trends in Science and Technology, Vol. 1 No. 02 (2014), 12 April 2014
Published 17 April 2014

  • View Article
  • Download
  • Cite
  • Reference
  • Statastics
  • Share

Abstract

Abstract— In this paper we discuss how LDPC and Stopping set can be used in communication system design. In cryptographic secure communication we are transmitting data securely. LDPC algorithm implemented at sender side and stopping set algorithm are implemented receiver side to providing secure and error free communication. To make a strong security we are applying double encryption technique. LDPC algorithm protected under RSA algorithm. If hacker make modification in original data at that time that modified data can not received by the receiver. Whenever the eavesdropper attack on system and it has better channel Quality than the receiver at that time it difficult to receive original data or error free data. this security is achieved by using LDPC and stopping set algorithm.

Index Terms— Cryptography, LDPC, Stopping Set, Eavesdroppers.
    PDF

How to Cite

Shamkuwar, P. D., Shinde, M. K. S., Wavhal, M. R., Nikam, M. S., & Pande, M. S. (2014). Error Free Cryptographic Secure Communication Using LDPC and Stopping Set Algorithm. International Journal of Emerging Trends in Science and Technology, 1(02). Retrieved from http://www.ijetst.in/index.php/ijetst/article/view/34
  • ACM
  • ACS
  • APA
  • ABNT
  • Chicago
  • Harvard
  • IEEE
  • MLA
  • Turabian
  • Vancouver

  • Download Citation

    • Endnote/Zotero/Mendeley (RIS)
    • BibTeX

    References

    [1] Stopping Set Distribution of LDPC Code Ensembles :Alon Orlitsky, Member, IEEE, Krishnamurthy Viswanathan, and Junan Zhang, Student Member,IEEE.March 2005

    [2] Wireless Information-Theoretic Security. Matthieu Bloch, Student Member, IEEE, Joo Barros, Member, IEEE, Miguel R. D. Rodrigues, Member, IEEE, and Steven W. McLaughlin, Fellow, IEEE 2008.

    [3] The Wiretap Channel with Feedback: Encryption over the Channel Lifeng Lai, Hesham El Gamal and H. Vincent Poor 2007.

    [4] An Efficient Algorithm to Find All Small-Size Stopping Sets of Low-Density Parity-Check Matrices Eirik Rosnes, Member, IEEE, and yvind Ytrehus, Senior Member, IEEE 2009.

    5]IRE TRANSACTIONS ON IFORMATION THEORY 21 Low-Density parity-Check Codes2005

    6] Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes Hessam Mahdavifar, Student Member, IEEE, and Alexander Vardy, Fellow, IEEE 2011

    7] Information-Theoretic Key Agreement: FromWeak to Strong Secrecy for Free Ueli Maurer and Stefan Wolf Computer Science Department, Swiss Federal Institute of Technology (ETH Zurich)

    8]Physical-Layer security:Combining Error Control Coding and Cryptography Willie K Harrison and Steven W. McLaughlin IEEE 2008.

    9] [Herbert Schild] The Complete Reference JAVA, Mc Graw Hill2007.

    10] Jonathan Knudsen, Java Cryptography, Oreilly1998.

    11] cryptography-network-security-5th-edition.
    • Article Viewed: 69 Total Download

    Downloads

    Download data is not yet available.

    ##plugins.themes.ojsPlusA.frontend.article.downloadstatastics##

    • Linkedin
    • Twitter
    • Facebook
    • Telegram

    Make a Submission

    Make a Submission

    Current Issue

    • Atom logo
    • RSS2 logo
    • RSS1 logo

    Information

    • For Readers
    • For Authors
    • For Librarians
    Keywords
    • Home
    • Archives
    • Submissions
    • About the Journal
    • Editorial Team
    • Contact
     Open Access Policy || Publication & Peer Review Policy || Publication Ethics
    The publication is licensed under a Creative Commons License (CC BY). View Legal Code
    Copyright © 2018 All Rights Reserved, International journal of Emerging Trends in Science and Technology | Powered By IJETST
    International journal of Emerging Trends in Science and Technology