Volume 12, Number 2, December 2016 - DOI: http://dx.doi.org/10.21700/ijcis.2016.274


Computing and Information Sciences is a peer reviewed journal that is committed to timely publication of original research, surveying and tutorial contributions on the analysis and development of computing and information science. The journal is designed mainly to serve researchers and developers, dealing with information and computing. Papers that can provide both theoretical analysis, along with carefully designed computational experiments, are particularly welcome. The journal is published 2-3 times per year with distribution to librarians, universities, research centers, researchers in computing, mathematics, and information science. The journal maintains strict refereeing procedures through its editorial policies in order to publish papers of only the highest quality. The refereeing is done by anonymous Reviewers. Often, reviews take four months to six months to obtain, occasionally longer, and it takes an additional several months for the publication process.

DOI: http://dx.doi.org/10.21700/ijcis.2016.127

Stream Cipher with Space-Time Block Code

Hanaa Mohsin Ahmed*   email: 110113@uotechnology.edu.iq
Anwar Abbas Hattab

Department of Computer Science, Iraq University of Technology, Baghdad, Iraq


*Corresponding author

Received: 01 May 2016
Revised: 12 August 2016
Accepted: 10 September 2016
Published: 25 December 2016

Abstract: This paper proposes a new method to secure data in the physical layer (physical layer cipher) in mobile networks using a cipher with channel code (space-time block code or STBC), which is used to increase reliability in wireless networks. In this method, we will cipher the STBC codewords and use a new approach to produce keys related to arithmetic attributes of images as an average value. There is no requirement to insert any major key by the user. In this method, the average value of the packet is used as a seed for the linear feedback register (LFSR). Then, it will generate keys as complex forms that are used to cipher STBC codewords; the results practically and theoretically show a stronger method against plain attackers, knownplaintext attacks, choice plaintext attackers, and ciphertext attackers and creates more confusion and diffusion to make cipher analysis more difficult. Their effect on security is discussed. Performance, system architecture, and the proposed method satisfy the performance analysis tests (of the image), such as the histogram, power spectrum, correlation, large key space, NPCR, UACI, and entropy, and it is resistant to statistical, brute force, and differential attacks.

Keywords: Physical Layer Security; STBC; Stream Cipher; Image Cipher; Complex Number.

  • PDF (909 KB)
  • ZIP (854 KB)



    Prof. Jihad Mohamad Alja'am 
    Email: journal.editor.ijcis@gmail.com

    The Journal Secretary
    Eng. Dana Bandok
    Ontario, Canada 
    Email: sec.ijcis@gmail.com 

    Home Page »