DC Notes
DC Notes
Communication Systems
The communication system is a system which describes the information exchange
between two points.
The process of transmission and reception of information is called communication.
Analog
Analog technology communicates data as electronic signals of varying frequency or
amplitude.
Broadcast and telephone transmission are common examples of Analog technology.
Digital
In digital technology, the data are generated and processed in two states: High
(represented as 1) and Low (represented as 0). Digital technology stores and transmits
data in the form of 1s and 0s.
Source
The source can be an analog signal. Example: A Sound signal
Input Transducer
This is a transducer which takes a physical input and converts it to an electrical signal
(Example: microphone). This block also consists of an analog to digital converter
where a digital signal is needed for further processes.
A digital signal is generally represented by a binary sequence.
Source Encoder
The source encoder compresses the data into minimum number of bits.
This process helps in effective utilization of the bandwidth. It removes the redundant
bits unnecessary excess bits,i.e., zeroes
Channel Encoder
The channel encoder, does the coding for error correction.
During the transmission of the signal, due to the noise in the channel, the signal may
get altered and hence to avoid this, the channel encoder adds some redundant bits to
the transmitted data.
These are the error correcting bits.
Digital Modulator
The signal to be transmitted is modulated here by a carrier.
The signal is also converted to analog from the digital sequence, in order to make it
travel through the channel or medium.
Channel
The channel or a medium, allows the analog signal to transmit from the transmitter
end to the receiver end.
Digital Demodulator
This is the first step at the receiver end.
The received signal is demodulated as well as converted again from analog to digital.
The signal gets reconstructed here.
Channel Decoder
The channel decoder, after detecting the sequence, does some error corrections.
The distortions which might occur during the transmission, are corrected by adding
some redundant bits.
This addition of bits helps in the complete recovery of the original signal.
Source Decoder
The resultant signal is once again digitized by sampling and quantizing so that the
pure digital output is obtained without the loss of information.
The source decoder recreates the source output.
Output Transducer
This is the last block which converts the signal into the original physical form, which
was at the input of the transmitter.
It converts the electrical signal into physical output (Example: loud speaker).
Output Signal
This is the output which is produced after the whole process. Example − The sound
signal received.
Instead of a pulse train, PCM produces a series of numbers or digits, and hence this
process is called as digital.
Each one of these digits, though in binary code, represent the approximate amplitude
of the signal sample at that instant.
In Pulse Code Modulation, the message signal is represented by a sequence of coded
pulses.
This message signal is achieved by representing the signal in discrete form in both
time and amplitude.
Advantages
Pulse Code Modulation is used in long-distance communication.
The efficiency of the transmitter in PCM is high.
Higher noise immunity is seen.
Efficient method.
Disadvantages
The bandwidth requirement is high.
PCM is a complex process, since it involves encoding, decoding and quantisation of
the circuit.
Applications of Pulse Code Modulation
It is used in telephony and compact discs.
Pulse Code Modulation is used in satellite transmission systems and space
communications.
Good Fair
Signal to noise ratio (SNR)
Applications of DPCM
The DPCM technique mainly used Speech, image and audio signal compression.
To understand the efficiency of this method of medical compression and real-time
application of medical imaging such as telemedicine and online diagnosis.
Advantages of DPCM
As the difference between x(nTs) and xˆ(nTs) is being encoded and transmitted by the
DPCM technique, a small difference voltage is to be quantized and encoded.
This will require less number of quantization levels and hence less number of bits to
represent them.
Thus signaling rate and bandwidth of a DPCM system will be less than that of PCM.
Delta Modulation
When signals are transmitted over long distances, they get affected by noise and
interference.
There are several methods invented for effective transmission of signals over long
distances without any error.
The conversion of analog signals to into digital form has brought a game-changing
revolution in the field of communication.
Modulation is the common term used in communication systems.
Communication systems use modulation and Demodulation methods for effective
transmission of low-frequency signals.
When modulation is used along with digital signals it solved many drawbacks of
analog communication.
Some of the digital signal processing methods used in communication systems
are Pulse code modulation, Differential pulse code modulation, Delta modulation,
etc…
What is Delta Modulation?
It is also known as the simplified form of Differential pulse code modulation.
It provides a staircase approximation of over-sampled base-band signal.
Here, the difference between the present sample and previous approximated sample is
quantized into two levels i.e. ±δ.
If the previous approximation is below the present sample value, then the error is
quantized by +δ.
If the approximation is above the present sample value then the error is quantized by
-δ.
Why Delta Modulation?
In PCM the signaling rate and transmission channel bandwidth are quite large since it
transmits all the bits which are used to code a sample. To overcome this problem,
Delta modulation is used.
Delta modulation transmits only one bit per sample.
Here, the present sample value is compared with the previous sample value and this
result whether the amplitude is increased or decreased is transmitted.
Transmitter
It consists of a 1-bit quantizer and a delay circuit along with two summer circuits.
The summer in the accumulator adds quantizer output (±Δ) with the previous sample
approximation . This gives present sample approximation. i.e.,
The accumulator generates the staircase approximated signal output and is delayed by
one sampling period Ts.
It is then added to the input signal.
If the input is binary ‘1’ then it adds +Δ step to the previous output (which is
delayed).
If the input is binary ‘0’ then one step ‘Δ’ is subtracted from the delayed signal.
Also, the low pass filter smoothens the staircase signal to reconstruct the original
message signal x(t) .
The delta modulation has two major drawbacks as under :
(a)Slope Overload Distortion (b) Granular Noise
ADM Transmitter
The logic for step size control is added in the diagram.
The step size increases or decreases according to a specified rule depending on one bit
quantizer output.
For an example, if one bit quantizer output is high (i.e., 1), then step size may be
doubled for next sample.
If one bit quantizer output is low, then step size may be reduced by one step.
Fig.2 shows the staircase waveforms of adaptive delta modulator and sequence of bits
to be transmitted.
ADM Waveform
Receiver
Applications
This modulation is used for a system which requires improved wireless voice quality
as well as speed transfer of bits.
In television signal transmission this modulation process is used.
This modulation method is used in voice coding.
This modulation is also used as a standard by NASA for all communications between
mission control and spacecraft.
To provide voice detection quality audio at deployed areas, military uses 16 to 32
kbit/sec modulation system in TRI-TAC digital telephones.
US army forces use 16kbit/sec rates to conserve bandwidth over tactical links.
For improved voice quality US Air Forces uses 32kbits/sec rates.
In Bluetooth-services to encode voice signals, this modulation is used with 32bits/sec
rates.
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
UNIT II – BAND PASS TRANSMISSION
Part A questions with answers
1. What is meant by pass band data transmission?
The digital data modulates high frequency carrier. It is also called as digital
modulation. It is suitable for long distance transmission.
2. List out the advantages of digital modulation.
Long distance transmission.
Absence of ISI.
3. Define coherent detection.
In this method, the locally generated carrier at the receiver is phase locked
with the carrier at the transmitter. It is also called as synchronous detection.
4. Define non coherent detection.
In this method, the receiver carrier need not be phase locked with the
transmitter. It is also called envelope detection. Non coherent detection is simple but
has high probability of error.
5. List the advantages and disadvantages of DPSK.
Advantages:
DPSK does not need carrier at the receiver. Hence complex circuitry for the
generation of local carrier is avoided.
Bandwidth requirement of DPSK is reduced compared to that of DPSK.
Disadvantages
Bit error rate of BPSK is higher than that of BPSK.
Error propagation in DPSK is more than that of BPSK.
6. Mention the advantages of QPSK over BPSK.
For the same bit error rate, bandwidth required by QPSK is reduced to half as
compared to BPSK.
Because of reduced bandwidth, the information transmission rate of QPSK is
higher.
7. Why binary ASK is also called as on off keying?
In binary ASK, the carrier is transmitted for binary ‘1’ and no carrier is
transmitted for binary ‘0’. Thus the carrier is simply turned on for binary 1 and turned
off for binary 0. Therefore it is called on off keying.
8. Draw the waveform of on off keying.
9. Define bit rate and baud rate.
Bit rate is the number of bits transmitted in one second. It is expressed as bits per
second. (bps)
Baud rate is the number of symbols transmitted in unit time. It is also referred to as
symbol rate.
10. Define bandwidth efficiency / spectral efficiency.
Bandwidth efficiency is defined as the ratio of data rate to channel bandwidth; it is
measured in the units of bits per second per Hertz.
11. Draw the signal space diagram of BFSK modulation scheme.
Jamming margin is the ratio of average power of interference (J) and the average power
of the data signal (PS).
CRYPTOGRAPHY
Introduction to Cryptography:
Decryption is the process of restoring the scrambled information to its original form.
1. Privacy/confidentiality: Ensuring that no one can read the message except the intended
receiver.
2. Authentication: The process of proving one's identity.
3. Integrity: Assuring the receiver that the received message has not been altered in any
way from the original.
4. Non-repudiation: A mechanism to prove that the sender really sent this message.
5. Key exchange: The method by which crypto keys are shared between sender and
receiver.
Goal of Cryptography:
If the sender and receiver uses same key then it is said to be symmetric key (or)
single key (or) conventional encryption.
If the sender and receiver use different keys then it is said to be public key
encryption.
A block cipher processes the input and block of elements at a time, producing
output block for each input block.
A stream cipher processes the input elements continuously, producing output
element one at a time, as it goes along.
The cipher, an algorithm that is used for converting the plaintext to cipher text, operates
on a key, which is essentially a specially generated number (value). To decrypt a secret message
(cipher text) to get back the original message (plaintext), a decrypt algorithm uses a decrypt key.
In symmetric key cryptography, same key is shared, i.e. the same key is used in both
encryption and decryption as shown in Fig. The algorithm used to decrypt is just the inverse of
the algorithm used for encryption. For example, if addition and division is used for encryption,
multiplication and subtraction are to be used for decryption. Symmetric key cryptography
algorithms are simple requiring lesser execution time. As a consequence, these are commonly
used for long messages.
Requirement of large number of unique keys. For example for n users the number
of keys required is n(n-1)/2. ƒ
Distribution of keys among the users in a secured manner is difficult.
Mono-alphabetic Substitution:
One simple example of symmetric key cryptography is the Mono alphabetic substitution.
In this case, the relationship between a character in the plaintext and a character in the cipher text
is always one-to-one. An example Mono alphabetic substitution is the Caesar cipher. As shown
in Fig., in this approach a character in the cipher text is substituted by another character shifted
by three places, e.g. A is substituted by N. Key feature of this approach is that it is very simple
but the code can be attacked very easily.
BLOCK CIPHERS:
Block ciphers use a block of bits as the unit of encryption and decryption. To encrypt a
64-bit block, one has to take each of the 264 input values and map it to one of the 264 output
values. The mapping should be one-to-one.
Some operations, such as permutation and substitution, are performed on the block of bits
based on a key (a secret number) to produce another block of bits.
In the decryption process, operations are performed in the reverse order based on the
same key to get back the original block of bits.
Substitution: The substitution is implemented with the help of three building blocks – a
decoder, one p-box and an encoder. For an n-bit input, the decoder produces a 2n bit output
having only one 1, which is applied.
Round function
Key schedule
Any additional processing − Initial and final permutation
Initial and Final Permutation:
The initial and final permutations are straight Permutation boxes (P-boxes) that are inverses of
each other. They have no cryptography significance in DES. The initial and final permutations
are shown as follows −
Round Function
The heart of this cipher is the DES function, f. The DES function applies a 48-bit key to the
rightmost 32 bits to produce a 32-bit output.
Expansion Permutation Box − since right input is 32-bit and round key is a 48-bit, we first
need to expand right input to 48 bits. Permutation logic is graphically depicted in the following
illustration –
XOR (Whitener). − After the expansion permutation, DES does XOR operation on the
expanded right section and the round key. The round key is used only in this operation.
Substitution Boxes. − The S-boxes carry out the real mixing (confusion). DES uses 8 S-boxes,
each with a 6-bit input and a 4-bit output. Refer the following illustration −
Key Generation:
The round-key generator creates sixteen 48-bit keys out of a 56-bit cipher key.
DES Analysis:
The DES satisfies both the desired properties of block cipher. These two properties make cipher
very strong.
Avalanche effect − A small change in plaintext results in the very great change in the
cipher text.
STREAM ENCRYPTION:
Block Cipher Converts the plain text Stream Cipher Converts the plain
into cipher text by taking plain text’s text into cipher text by taking 1 byte
1. block at a time. of plain text at a time.
Block cipher Uses confusion as well as While stream cipher uses only
4. diffusion. confusion.
The algorithm modes which are used in The algorithm modes which are used
6. block cipher are: ECB (Electronic Code in stream cipher are: CFB (Cipher
Book) and CBC (Cipher Block Feedback) and OFB (Output
Chaining). Feedback).
In this scheme, the plaintext is processed one bit at a time i.e. one bit of plaintext is taken, and a
series of operations is performed on it to generate one bit of cipher text. Technically, stream
ciphers are block ciphers with a block size of one bit.
KEY MANAGEMENT:
Key management refers to management of cryptographic keys in a cryptosystem. This
includes dealing with the generation, exchange, storage, use, crypto-shredding (destruction) and
replacement of keys. Key management concerns keys at the user level, either between users or
systems.
In cryptography it is a very tedious task to distribute the public and private key between sender
and receiver. If key is known to the third party (forger/eavesdropper) then the whole security
mechanism becomes worthless. So, there comes the need to secure the exchange of keys.
There are 2 aspects for Key Management:
1. Distribution of public keys.
2. Use of public-key encryption to distribute secret.
Public announcement,
Publicly available directory,
Public-key authority, and
Public-key certificates.
1. Public Announcement:
Here the public key is broadcasted to everyone. Major weakness of this method is forgery.
Anyone can create a key claiming to be someone else and broadcast it. Until forgery is
discovered can masquerade as claimed user.
2. Publicly Available Directory:
In this type, the public key is stored at a public directory. Directories are trusted here, with
properties like Participant Registration, access and allow modifying values at any time,
contains entries like {name, public-key}.
Directories can be accessed electronically still vulnerable to forgery or tampering.
4. Public Certification:
This time authority provides a certificate (which binds identity to the public key) to allow
key exchange without real-time access to the public authority each time. The certificate is
accompanied with some other info such as period of validity, rights of use etc. All of this
content is signed by the trusted Public-Key or Certificate Authority (CA) and it can be
verified by anyone possessing the authority’s public-key.
There are three primary types of keys that need to be kept safe and secure:
1. Symmetric keys – typically used to encrypt bulk data with symmetric algorithms like 3DES or
AES; anyone with the secret key can decrypt the data
2. Private keys – the secret half of public/private key pairs used in public-key cryptography with
asymmetric algorithms like RSA or ECDSA; anyone with the private key can impersonate the
owner of the private key to decrypt private data.
3. Hash keys – used to safeguard the integrity and authenticity of data and transactions with
algorithms like HMAC-SHA256.
Threats in key Management:
There are many threats that can result in a key being compromised:
Weak keys
A key is essentially just a random number – the longer and more random it is, the more difficult
it is to crack. The strength of the key should be appropriate for the value of the data it is
protecting and the period of time for which it needs to be protected. The key should be long
enough for its intended purpose .
Incorrect use of keys
Each key should be generated for a single, specific purpose (i.e. the intended application and
algorithm) – if it is used for something else, it may not provide the expected or required level of
protection.
Re-use of keys
Improper re-use of keys in certain circumstances can make it easier for an attacker to crack the
key.
Non-rotation of keys
If a key is over-used (e.g. used to encrypt too much data), then it makes the key more vulnerable
to cracking, especially when using older symmetric algorithms. To avoid this, keys should be
rotated (i.e. updated / renewed) at appropriate intervals.
Non-destruction of keys
Keys should be destroyed (i.e. securely deleted, leaving no trace) once they have expired, unless
explicitly required for later use (e.g. to decrypt data). This removes the risk of accidental
compromise at some future date.
One of the biggest classes of threat that a key faces is insider threats. If a rogue employee has
unfettered access to a key, they might use it for a malicious purpose or pass it onto someone else
to the same end.
DIFFIE-HELLMAN KEY EXCHANGE:
1. In Public key encryption schemes are secure only if authenticity of the public key is
assured.
2. Diffie-Hellman key exchange is a simple public key algorithm.
3. The protocol enables 2 users to establish a secret key using a public key scheme based on
discrete algorithms.
4. The protocol is secure only if the authenticity of the 2 participants can be established.
5. or this scheme, there are 2 publicly known numbers :
o A prime number q
o An integer α that is a primitive root of q.
(Note: Premitive root of a prime number P is one, whose powers module P generate all
the images from 1 to P-1)
6. Suppose users A and B wish to exchange the key.
User A selects a random integer XA<q and computes
YA=α XA mod q
7. User B independently selects a random integer XB<q and compute
YB=α XB mod q
8. Each side keeps X value private and makes Y value available publicly to the other side
user A computes the key as:
k= (YB) XA mod q
User B computes the key as:
k= (YA) XB mod q
Figure: Diffie-Hellman Exchange Algorithm
PUBLIC-KEY CRYPTOGRAPHY, OR ASYMMETRIC CRYPTOGRAPHY:
This accomplishes two functions: authentication, where the public key verifies that a
holder of the paired private key sent the message, and encryption, where only the paired private
key holder can decrypt the message encrypted with the public key.
The most important properties of public key encryption scheme are −
Different keys are used for encryption and decryption. This is a property which set this
scheme different than symmetric encryption scheme.
Each receiver possesses a unique decryption key, generally referred to as his private key.
Some assurance of the authenticity of a public key is needed in this scheme to avoid
spoofing by adversary as the receiver. Generally, this type of cryptosystem involves
trusted third party which certifies that a particular public key belongs to a specific
person or entity only.
Encryption algorithm is complex enough to prohibit attacker from deducing the plaintext
from the ciphertext and the encryption (public) key.
Though private and public keys are related mathematically, it is not be feasible to
calculate the private key from the public key. In fact, intelligent part of any public-key
cryptosystem is in designing a relationship between two keys.
Example:
Public keys of every user are present in the Public key Register. If B wants to send a
confidential message to C, then B encrypts the message using C Public key. When C
receives the message from B then C can decrypt it using its own Private Key. No other
recipient other than C can decrypt the message because only C know C’s private key.
Components of Public Key Encryption:
Plain Text:
This is the message which is readable or understandable. This message is given to the
Encryption algorithm as an input.
Cipher Text:
The cipher text is produced as an output of Encryption algorithm. We cannot simply
understand this message.
Encryption Algorithm:
The encryption algorithm is used to convert plain text into cipher text.
Decryption Algorithm:
It accepts the cipher text as input and the matching key (Private Key or Public key) and
produces the original plain text
Public and Private Key:
One key either Private key (Secret key) or Public Key (known to everyone) is used for
encryption and other is used for decryption
RSA ALGORITHM:
This cryptosystem is one the initial system. The system was invented by three
scholars Ron Rivest, Adi Shamir, and Len Adleman and hence, it is termed as RSA
cryptosystem.
The Algorithm:
1. Generate two large prime numbers of normally equal length ‘p’ and ‘q’ respectively.
2. Let n=p*q
3. Let T=(p-1)*(q-1)
4. Choose a small number ‘e’ co-prime to ‘T’, with GCD(T,e)=1;1<e<T
5. Find ‘d’ such that (de mod T=1)
6. Publish ‘e’ and ’n’ as Public key.
7. Keep ‘d’ and ‘T’ as the Secret key
Encryption:
Decryption:
Example:
1. P=7 q=19
2. Let n=p*q
7x19=133
3. Let T=(p-1)*(q-1)
(7-1)x(19-1)=108
GCD (108, e) =1
If e = 5 GCD (108,5)=1(yes)
The value of e is 5
6. Public key:
n=133
e=5
7. Secret key:
T=108
d=65
Encryption:
Decryption: