Title :
XOR Encryption Versus Phase Encryption, an In-Depth Analysis
Author :
Fei Huo ; Guang Gong
Author_Institution :
Dept. of Electr. & Comput. Eng., Univ. of Waterloo, Waterloo, ON, Canada
Abstract :
Encryptions are used in almost all standards to ensure the confidentiality of the data. Encryptions can be and indeed are implemented in the different layers of a network protocol stack. Conventional encryption performs the bitwise XOR operation between one message bit and one key stream bit to generate one ciphertext bit. Huo et al. have recently proposed to provide confidentialities on the user data by performing the phase encryption on the time domain OFDM samples in LTE system. Phase encryption is performed on the modulated symbols, different from the bit level of XOR encryption, i.e., stream cipher encryption. In this paper, we extend their study. We first generalize the phase encryption to general communication systems independent of the underlying modulation scheme. Then, we formulate the mathematical models for XOR and phase encryptions. Based on our model, we compare these two encryption methods in terms of their security and encryption efficiency. We also show phase encryption can resist traffic analysis attack when implemented in the physical layer. Finally, we conduct simulations to compare the performance of these two methods in terms of their decoding symbol error rate.
Keywords :
Long Term Evolution; OFDM modulation; cryptography; LTE system; XOR encryption; decoding symbol error rate; in-depth analysis; modulation scheme; phase encryption; stream cipher encryption; time domain OFDM samples; traffic analysis attack; Amplitude shift keying; Communication systems; Encryption; Phase shift keying; Encryption; security; wireless security;
Journal_Title :
Electromagnetic Compatibility, IEEE Transactions on
DOI :
10.1109/TEMC.2015.2390229