高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于实时检测的扰码重建算法

马钰 张立民

马钰, 张立民. 基于实时检测的扰码重建算法[J]. 电子与信息学报, 2016, 38(7): 1794-1799. doi: 10.11999/JEIT151068
引用本文: 马钰, 张立民. 基于实时检测的扰码重建算法[J]. 电子与信息学报, 2016, 38(7): 1794-1799. doi: 10.11999/JEIT151068
MA Yu, ZHANG Limin. Reconstruction of Scrambler with Real-time Test[J]. Journal of Electronics & Information Technology, 2016, 38(7): 1794-1799. doi: 10.11999/JEIT151068
Citation: MA Yu, ZHANG Limin. Reconstruction of Scrambler with Real-time Test[J]. Journal of Electronics & Information Technology, 2016, 38(7): 1794-1799. doi: 10.11999/JEIT151068

基于实时检测的扰码重建算法

doi: 10.11999/JEIT151068
基金项目: 

泰山学者工程专项经费

Reconstruction of Scrambler with Real-time Test

Funds: 

Taishan Scholar Special Foundation

  • 摘要: 基于Walsh-Hadamard变换的扰码重建算法在最大成立数准则下寻找全局最优解,是求解线性反馈关系的一种有效方法,但其计算复杂度随着变换阶数的增加而迅速增加。为降低算法的计算复杂度,论文提出一种基于实时检测的扰码重建算法,即在进行Walsh-Hadamard变换的过程中,实时判断检测对象是否为反馈关系;当检测到反馈关系时,即可停止运算。引入实时检测后可使计算复杂度平均减少50%。
  • 钱国兵, 李立萍, 郭亨艺. 多入单出正交空时分组码系统的调制识别[J]. 电子与信息学报, 2015, 37(4): 863-867. doi: 10.11999/JEIT140644.
    QIAN Guobing, LI Liping, and GUO Hengyi. Modulation identification for orthogonal space-time block code in multiple input single output systems[J]. Journal of Electronics Information Technology, 2015, 37(4): 863-867. doi: 10.11999/JEIT140644.
    沈斌, 王建新. 基于奇异值分解的直扩信号伪码序列及信息序列盲估计方法[J]. 电子与信息学报, 2014, 36(9): 2098-2103. doi: 10.3724/SP.J.1146.2013.01692.
    SHEN Bin and WANG Jianxin. Blind estimation of the PN sequence and information sequence of a DSSS signal based on SVD[J]. Journal of Electronics Information Technology, 2014, 36(9): 2098-2103. doi: 10.3724/SP.J.1146.2013.01692.
    沈斌, 王建新. 窄带干扰条件下含有未知载频的直扩信号的伪码序列估计[J]. 电子与信息学报, 2015, 37(7): 1556-1561. doi: 10.11999/JEIT141322.
    SHEN Bin and WANG Jianxin. Estimation of PN sequence in DSSS signals with unknown carrier frequency under narrow band interference[J]. Journal of Electronics Information Technology, 2015, 37(7): 1556-1561. doi: 10.11999/JEIT141322.
    阔永红, 曾伟涛, 陈健. 基于概率逼近的本原BCH码编码参数的盲识别方法[J]. 电子与信息学报, 2014, 36(2): 332-339. doi: 10.3724/SP.J.1146.2013.00584.
    KUO Yonghong, ZENG Weitao, and CHEN Jian. Blind identi6cation of primitive BCH codes parameters based on probability approximation[J]. Journal of Electronics Information Technology, 2014, 36(2): 332-339. doi: 10.3724/ SP.J.1146.2013.00584.
    解辉, 王丰华, 黄知涛. 基于最大似然检测的(n,1,m)卷积码盲识别方法[J]. 电子与信息学报, 2013, 35(7): 1671-1676. doi: 10.3724/SP.J.1146.2012.01578.
    XIE Hui, WANG Fenghua, and HUANG Zhitao. Blind recognition of (n,1,m) convolutional code based on maximum likelihood detection[J]. Journal of Electronics Information Technology, 2013, 35(7): 1671-1676. doi: 10.3724/SP.J.1146. 2012.01578.
    解辉, 王丰华, 黄知涛. 卷积交织器盲识别方法[J]. 电子与信息学报, 2013, 35(8): 1952-1957. doi: 10.3724/SP.J.1146.2013. 00287.
    XIE Hui, WANG Fenghua, and HUANG Zhitao. A method for blind recognition of convolutional interleave[J]. Journal of Electronics Information Technology, 2013, 35(8): 1952-1957. doi: 10.3724/SP.J.1146.2013.00287.
    赵知劲, 顾骁炜, 沈雷. 非周期长码直扩信号的长扰码识别[J]. 电子与信息学报, 2014, 36(8): 1792-1797. doi: 10.3724/ SP.J.1146.2013.01454.
    ZHUAO Zhijin, GU Xiaowei, and SHEN Lei. An identification method of long pseudo-random code sequence in non-periodic direct sequence spread spectral signals[J]. Journal of Electronics Information Technology, 2014, 36(8): 1792-1797. doi: 10.3724/SP.J.1146.2013.01454.
    高逸龙. 基于网络层的链路层协议盲分析[D]. [硕士论文], 电子科技大学, 2013.
    GAO Yilong. Blind analysis of the link layer protocol based on the network layer[D]. [Master dissertation], University of Electronic Science and Technology of China, 2013.
    MEIER W and STAFFELBACH O. Fast correlation attack on stream ciphers[C]. Advances in Cryptology, Davos, Switzerland, 1988: 301-314. doi: 10.1007/3-540-45961-8_28.
    MEIER W and STAFFELBACH O. Fast correlation attack on stream ciphers[J]. Journal of Cryptology, 1989, 1(3): 159-176. doi: 10.1007/BF02252874.
    JOHANSSON T and JNSSON F. Improved fast correlation attacks on stream ciphers via convolutional codes[C]. Advances in cryptology, Prague, Czech Republic, 1999: 347-362. doi: 10.1007/3-540-48910-X_24.
    JOHANSSON T and JNSSON F. Fast correlation attacks through reconstruction of linear polynomials[C]. 20th Annual International Cryptology Conference Santa Barbara, California, USA, 2000: 300-315. doi: 10.1007/3-540-44598- 6_19.
    游凌, 朱中梁. Walsh函数在解二元域方程组上的应用[J]. 信号处理, 2000, 16(增刊): 27-30.
    YOU Ling and ZHU Zhongliang. The application of Walsh function in resolving of F(2) equations[J]. Signal Processing, 2000, 16(Supplement): 27-30.
    伍文君, 黄芝平, 唐贵林, 等. 含错扰码序列的快速恢复[J]. 兵工学报, 2009, 30(8): 1134-1138.
    WU Wenjun, HUANG Zhiping, TANG Guilin, et al. Fast recovery of interfered scrambling code sequence[J]. Acta Armamentarii, 2009, 30(8): 1134-1138.
    廖红舒, 袁叶, 甘露. 自同步扰码的盲识别方法[J]. 通信学报, 2013, 34(1): 136-143. doi: 10.3969/j.issn.1000-436x.2013.01. 016.
    LIAO Hongshu, YUAN Ye, and GAN Lu. Novel blind recognition method for self-synchronized scrambler[J]. Journal on Communications, 2013, 34(1): 136-143. doi: 10. 3969/j.issn.1000-436x.2013.01.016.
    黄芝平, 周靖, 苏绍璟, 等. 基于游程统计的自同步扰码多项式阶数估计[J]. 电子科技大学学报, 2013, 42(4): 541-545. doi: 10.3969/j.issn.1001-0548.2013.04.002.
    HUANG Zhiping, ZHOU Jing, SU Shaojing, et al. Order estimation of self-synchronizing scrambling polynomial based on run statistic[J]. Journal of University of Electronic Science and Technology of China, 2013, 42(4): 541-545. doi: 10.3969/j.issn.1001-0548.2013.04.002.
    CLUZEAU M. Reconstruction of a linear scrambler[J]. IEEE Transactions on Computers, 2007, 56(9): 1283-1291. doi: 10.1109/TC.2007.1055.
    LIU X B, KOH S N, WU X W, et al. Reconstruction of a linear scrambler with improved detection capability and in the presence of noise[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(1): 208-218. doi: 10.1109/ TIFS.2011.2169790.
    AHMED N and RAO K R. Orthogonal Transforms for Digital Signal Processing[M]. Berlin Heidelberg, Springer, 1975.
    MA Yu, ZHANG Limin, and WANG Haotong. Reconstructing synchronous scrambler with robust detection capability in the presence of noise[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(2): 397-408. doi: 10.1109/TIFS.2014.2378143.
  • 加载中
计量
  • 文章访问数:  1483
  • HTML全文浏览量:  159
  • PDF下载量:  593
  • 被引次数: 0
出版历程
  • 收稿日期:  2015-09-21
  • 修回日期:  2016-04-08
  • 刊出日期:  2016-07-19

目录

    /

    返回文章
    返回