Paper
26 May 2023 Identification of self-synchronous scrambler of error-correcting codes under BER conditions
Jiyuan Tan, Zhaogen Zhong, Jie Jiang
Author Affiliations +
Proceedings Volume 12700, International Conference on Electronic Information Engineering and Data Processing (EIEDP 2023); 127002I (2023) https://doi.org/10.1117/12.2682289
Event: International Conference on Electronic Information Engineering and Data Processing (EIEDP 2023), 2023, Nanchang, China
Abstract
For the identification of self-synchronous scrambler of error-correcting codes, a method of identification of adjacent travel ratios is proposed. Firstly, the mathematical model of the self-synchronous scrambler of error-correcting codes is given, then the biasedness of the self-synchronous scrambler of error-correcting codes is proved to be close to unbiased, secondly, the identification method of the adjacent travel ratio of error-correcting codes is given, the difference of the adjacent travel ratio of different error-correcting code unscrambler sequences is analyzed, the discriminant criterion of the maximum mean square difference fitting is established, and the identification of the generating polynomial of the self-synchronous scrambler of error-correcting codes is completed. The simulation shows that the algorithm can effectively identify the self-synchronous scrambler of linear block codes and convolutional codes and has good fault tolerance.
© (2023) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Jiyuan Tan, Zhaogen Zhong, and Jie Jiang "Identification of self-synchronous scrambler of error-correcting codes under BER conditions", Proc. SPIE 12700, International Conference on Electronic Information Engineering and Data Processing (EIEDP 2023), 127002I (26 May 2023); https://doi.org/10.1117/12.2682289
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Forward error correction

Error analysis

Detection and tracking algorithms

Computer simulations

Information security

Mathematical modeling

Matrices

Back to Top