You are on page 1of 2

Channel Coding and Cryptography

Professor Dr. Tariq Shah


Department of Mathematics, Quaid-i-Azam University,
Islamabad, Pakistan

Channel coding utilizes repetitive data for the recognition or correction of errors that happen amid the
information exchange over a boisterous/noisy channel. Cryptography gives secure data exchange: it ensures
against spying or control of transmitted data, or disguising of information inception.

The collaboration between channel coding and cryptography has been looked into in [1] and [2]: utilizing
channel unraveling for the change of unscrambling results and, the other way around, utilizing
cryptography for the change of channel decoding. This idea is called consolidated channel coding and
cryptography. The channel code can be considered as an internal code and the cryptographic component as
an external code. A message with cryptographic check esteem is transmitted over a loud channel utilizing
channel coding and decoding.

The unscrambling of the cryptographic check esteem is extremely fragile, on the grounds that in the event
that one piece or a greater amount of the contribution of decoding isn't right, around 50 % of decoded bits
are false, and the confirmation of cryptographic check esteem fizzles. Thusly, all bits of the message and
the cryptographic check esteem must be right at the contribution of decoding. The answer for such issue
utilizes the technique for redress which is called Soft Input Decryption [1]: if the decoder can't reproduce
the first message and cryptographic check esteem due to a noisy channel or wastefulness of the channel
decoding algorithm, it is conceivable to remedy the message with the cryptographic check esteem utilizing
side data of the channel decoder in type of purported L-values.

Wireless networks systems offers versatility and simple if use to numerous applications. Most famous
applications are cell communication, Short message Service (SMS), multimedia messaging service (MMS),
web perusing and Internet get to, document exchange, detecting spilling sound and video and video
conferencing. Scope, coverage and arrangement foundation of the remote correspondence shift contingent
upon the coveted application. Wireless communication is more inclined transmission errors. The decent
information error rate relies on the application. For more transmission mistake is permitted in voice
correspondence when contrasted with record exchange application. Likewise SMS is additionally a sort of
document transmission. Here information transmission mistake ought to be completely unimportant. In
remote condition, the transmission mistakes are because of it’s communicate nature. By and by numerous
business associations are utilizing SMS as an application in business. Cryptography is a period tried
method to give security. Another idea has been proposed as called as Joint Channel Coding and
Cryptography (JCCC) to give both security and error control. It consolidates the cryptographic strategies
for information security with the systems for error correction.

My stress here is to combine channel coding and cryptography in order to strengthen our existing
methodologies for cyber warfare. It’s a need of time to make a strong collaboration with all those who are
working in cyber security and do something for oncoming generation in this continuously growing digital
world.
“The whole world is encrypted and by the Day of Judgment, Allah subhana tala will decipher everything!”

(10th December, 2015; My PhD thesis defense)

References

1. N. Živiü, C. Ruland, “Soft Input Decryption”, 4thTurbocode Conference, 6th Source and Channel
Code Conference, VDE/IEEE, in Plastics, Munich, April 2006. [2]

2. N. Živiü, C. Ruland, “Feedback in Joint Coding and Cryptography”, 7th International ITG
Conference on Source and Channel Coding VDE/IEEE, Ulm, January 2008.

You might also like