##plugins.themes.academic_pro.article.main##
Abstract
Abstract— In this paper we discuss how LDPC and Stopping set can be used in communication system design. In cryptographic secure communication we are transmitting data securely. LDPC algorithm implemented at sender side and stopping set algorithm are implemented receiver side to providing secure and error free communication. To make a strong security we are applying double encryption technique. LDPC algorithm protected under RSA algorithm. If hacker make modification in original data at that time that modified data can not received by the receiver. Whenever the eavesdropper attack on system and it has better channel Quality than the receiver at that time it difficult to receive original data or error free data. this security is achieved by using LDPC and stopping set algorithm.
Index Terms— Cryptography, LDPC, Stopping Set, Eavesdroppers.##plugins.themes.academic_pro.article.details##
References
[2] Wireless Information-Theoretic Security. Matthieu Bloch, Student Member, IEEE, Joo Barros, Member, IEEE, Miguel R. D. Rodrigues, Member, IEEE, and Steven W. McLaughlin, Fellow, IEEE 2008.
[3] The Wiretap Channel with Feedback: Encryption over the Channel Lifeng Lai, Hesham El Gamal and H. Vincent Poor 2007.
[4] An Efficient Algorithm to Find All Small-Size Stopping Sets of Low-Density Parity-Check Matrices Eirik Rosnes, Member, IEEE, and yvind Ytrehus, Senior Member, IEEE 2009.
5]IRE TRANSACTIONS ON IFORMATION THEORY 21 Low-Density parity-Check Codes2005
6] Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes Hessam Mahdavifar, Student Member, IEEE, and Alexander Vardy, Fellow, IEEE 2011
7] Information-Theoretic Key Agreement: FromWeak to Strong Secrecy for Free Ueli Maurer and Stefan Wolf Computer Science Department, Swiss Federal Institute of Technology (ETH Zurich)
8]Physical-Layer security:Combining Error Control Coding and Cryptography Willie K Harrison and Steven W. McLaughlin IEEE 2008.
9] [Herbert Schild] The Complete Reference JAVA, Mc Graw Hill2007.
10] Jonathan Knudsen, Java Cryptography, Oreilly1998.
11] cryptography-network-security-5th-edition.