Influenced Encryption Key for AES based MF-TDMA in Mobile Communication


  • Won Ho Jeong
  • Sang-Lim Ju
  • Ju-Phil Cho
  • Kyung-Seok Kim



AES encrytion algorithm, CTC (Convolutional Turbo Code), Key error, Mobile channel, PSNR (Peak Signal-to-Noise Ratio)


In recent years, network security has become an important issue. Cryptography has been used for secure data and control access. In this paper, we analyze the effect of the key error according to plaintext size in the encrypted mobile communication. We have applied the Multi-Frequency Time-Division Multiple Access (MF-TDMA) based mobile communication environment and used the Advanced Encryption Standard (AES) algorithm. Simulator configured with the Convolutional Turbo Code (CTC) channel coder and Offset Quadrature Phase Shift Keying (OQPSK) modulation scheme and Additive White Gaussian Noise (AWGN) mobile channel. Depending on the length of the plaintext, we confirmed through the correlation of the bit error rate (BER) and the peak signal-to-noise ratio (PSNR). In addition, we analyze the correlation according to SNR in AES Counter (CTR) and Cipher-Block Chaining (CBC) mode and analyze the effect of encryption algorithm on communication. Finally, this study is used as data to analyze the performance of application of cryptographic service and various communication environments in the environment of MF-TDMA based mobile communication, and it is expected that it will be useful for performance analysis of image data restoration.



[1] Andriyanova I, Soljanin E, “Optimized IR-HARQ Schemes Based on Punctured LDPC Codes Over the BECâ€, IEEE Transactions on Information Theory, Vol.58, No.10, (2012), pp.6433-6436.

[2] Tonde AR, Dhande AP, “Implementation of Advanced Encryption Standard (AES) Algorithm Based on FPGAâ€, International Journal of Current Engineering and Technology, Vol.4, No.2, (2014), pp.1048-1050.

[3] Sumitra, “Comparative Analysis of AES and DES security Algorithmsâ€, International Journal of Scientific and Research Publications, Vol.3, No.1, (2013), pp.1-5.

[4] Bhalerao PV, Ghongade RD, Langote VB, “Hardware Implementation of Cryptosystem by AES Algorithm Using FPGAâ€, International Journal of Computer Science and Mobile Computing, Vol.6, No.5, (2017), pp.84-89.

[5] Yan J, Chen F, “An Improved AES Key Expansion Algorithm. International Conference on Electricalâ€, Mechanical and Industrial Engineering (ICEMIE), (2016), pp.113-116.

[6] Shekhar S, Singh P, Jaiswal M, “An Enhanced AES Algorithm Based on Variable Sbox And 200 Bit Data Blockâ€, International Journal of Innovative Research in Computer and Communication Engineering, Vol.4, No.4, (2016), pp.6470-6477.

[7] Ning L, Kanfeng L, Zhongliang D, “A Joint Encryption and Error Correction Method Used in Satellite Communicationsâ€, China Communications, Vol.11, No.3, (2014), pp.70-79.

[8] Olteanu A, Xiao Y, Zhang Y, “Optimization Between AES Security and Performance for IEEE 802.15.3 WPANâ€, IEEE Transactions on Wireless Communications, Vol.8, No.12, (2009), pp.6030-6037.

[9] Haleem MA, Mathur C, Chandramouli R, Subbalakshmi KP, “Opportunistic Encryption: A Trade-off between Security and Throughput in Wireless Networksâ€, IEEE Transactions on Dependable and Secure Computing, Vol.4, No.4, (2007), pp.313-324.

[10] Choi JH, “On Large Deviations of HARQ with Incremental Redundancy over Fading Channelsâ€, IEEE Communications Letters, Vol.16, No.6, (2012), pp.913-916.

View Full Article: