• F. Sattar Department of Electrical Engineering, University of Engineering and Technology, Taxila, Pakistan
  • M. Mufti Department of Electrical Engineering, University of Engineering and Technology, Taxila, Pakistan


This paper presents a mathematical framework for analysis of effect of counter mode (CTR) encryption on the traffic capacity of packet communication systems based on direct-sequence, code-division, multiple-access (DS-CDMA). We specify QoS constraints in terms of minimum acceptable mean opinion score (MOS) of voice payload, maximum permissible resource utilization for CTR-mode re-keying and DS-CDMA processing gain. We quantify the trade-offs in system capacity as a function of these constraints. Results show that application of CTR encryption causes error expansion and respecting the QoS constraints while satisfying the desired encryption parameters results in reduction of traffic capacity


F. Sattar and M. Mufti, Lecture Notes in

Computer, Springer-Verlag, Berlin Heidelberg

(2008) p. 507-516.

J. M. Reason and D. G. Messerschmitt,

Proceedings of the 4th IFIP/IEEE

International Conference on Management of

Multimedia Networks and Services:

Management of Multimedia on the Internet

Springer-Verlag, 2001, Berlin Heidelberg

(2001) p. 175-192.

Olteanu, Alina, Yang Xiao, Proceedings of

the 2009 IEEE International Conference on

Communications, IEEE Press, Piscataway,

NJ, USA (2009) p.575-579.

W. Liang and W. Wang, INFOCOM, 24th

Annual Joint Conference of the IEEE

Computer and Communications Societies

IEEE Proceedings, Vol.2 (2005) p. 1478-

M. Dworkin, NIST Special Publication 800-

A, Computer Security Division, ITL NIST,

Gaithersburg (2001) p.15-16.

H. Lipmaa, P. Rogaway and D. Wagner,

Comment to NIST concerning AES Modes of

operations: CTR-Mode Encryption (January


S. Moshavi, IEEE Communications Magazine

, No.10 (1996) 124.

W.C.Y. Lee, IEEE Transactions on Vehicular

Technology 40, No.2 (1991) 291.

R.L. Pickholtz, L.B. Milstein, D.L. Schilling,

IEEE Transactions on Vehicular Technology

, No.2 (1991) 313.

Housley, IETF RFC 3686, Network Working

Group, The Internet Society (January 2004).

IEEE Std 802.11i, IEEE Standard for

Information Technology - Telecommunication

and information exchange between systems -

Local and metropolitan area networks -

Specific requirements - Part 11: Wireless

LAN Medium Access Control (MAC) and

Physical Layer (PHY) Specifications.

Amendment 6: Media Access Control (MAC)

Security Enhancements (July 2004).

L. Yun and D.G. Messerschmitt, Proceedings

of IEEE Military Communications

Conference MILCOM '94, Fort Monmouth, NJ

(Oct. 2-4, 1994) p. 178 -182.

International Teleommunication Union,

Telecommunication Standardization Sector of

ITU, ITU-T Recommendation G.107 (March


J. Reason, Ph.D. dissertation, University of

California, Berkeley (Dec. 2000) p. 72-98.

S. T. Chung and A. J. Goldsmith, IEEE

Transactions on Communications

(September 2001) p. 1561-71.

F. Sattar and M.Mufti, International Journal of

Network Security 8, No.2 (2009) 119.

R. Forre, Proceedings on Advances in

Cryptology, Springer-Verlag, New York, NY,

USA, August 21-25 (1988) p.450-468.

National Institute of Standards and

Technology, FIPS Pub 197: Advanced

Encryption Standard (AES) (Nov. 2001).

A. Benyassine, E. Shlomot, H.-Y. Su,

D. Massaloux and C. Lamblin, J.-P. Petit,

IEEE Communications Magazine 35, No. 9

(1997) 64.

C. Bormann et al., IETF RFC 3095, Network

Working Group (July 2001).

R. C. Dixon, Spread Spectrum Systems with

Commercial Applications, Wiley & Sons,





How to Cite

F. Sattar and M. Mufti, “ON CAPACITY TRADEOFFS IN SECURE DS-CDMA PACKET COMMUNICATIONS WITH QOS CONSTRAINTS”, The Nucleus, vol. 49, no. 3, pp. 199–208, Sep. 2012.