#### Abstract

Channel coding technology is indispensable in digital communication systems. In noncooperative contexts, the identification of the channel codes of the synchronous scrambler is essential. In this paper, a new algorithm that directly uses a soft decision sequence for blind reconstruction of the synchronous scrambler is proposed. First, considering imbalanced signal sources and the principle of scrambling and descrambling the synchronous scrambler, the error-containing equation of the synchronous scrambler is established. Second, the average check conformity is introduced to complete the check relationship detection. Then, based on the statistical characteristics of the average check conformity, the corresponding discrimination threshold is established, and the reconstruction of the feedback polynomial of the synchronous scrambler is completed by traversing the possible primitive polynomials. Finally, the verification equation is determined by the method of subsection optimization, which greatly reduces the number of initial states that need to be traversed; this is critical for scramblers with high-order feedback polynomials (i.e., when the order of the feedback polynomial is greater than 15). Simulations show that the algorithm can effectively reconstruct the synchronous scrambler under imbalanced signal sources. Moreover, the proposed algorithm offers improved performance with about 1–2 dB gain at low signal-to-noise ratios compared with existing methods, and its computational complexity is reasonable.

#### 1. Introduction

In communication systems, there are often many sequences with continuous zeroes or continuous ones in the transmitted data. To enhance the randomness of the transmitted signal and improve the reliability of signal transmission, the signal transmitter scrambles the transmitted signal, so synchronous scramblers are widely used in satellite communications, spread spectrum communications, and cryptographic systems [1, 2]. In noncooperative fields, a third party needs to rapidly identify and analyze the channel codes in an environment with a low signal-to-noise ratio (SNR). The recognition of channel codes using an intercepted sequence of noise-affected code words is commonly known as reverse analysis [3].

Techniques for blind code identification have gained increasingly more attention from researchers, and several types of channel codes such as low-density parity-check (LDPC) [4, 5] and turbo [6, 7] codes have been studied. In this paper, our research goal is to reconstruct the synchronous scrambler, and we only use truncated soft decision sequences to accomplish the identification of feedback polynomials and initial states. We assume that the acquired sequence has been demodulated and frame synchronized successfully, which is achievable in practical engineering. In contrast to our solution, the existing algorithms for reconstructing the synchronous scrambler mainly use hard decision sequences (0 and 1).

The blind recognition of the synchronous scrambler includes the reconstruction of the feedback polynomial and the identification of the initial state of the scrambler [8–11]. At present, the reconstruction methods of synchronous scrambler polynomials are mainly divided into two categories: reconstruction of polynomial based on source bias [12–15] and reconstruction of polynomial based on channel coding [13, 16–20]. In actual communication, the zeroes and ones in the source sequence are not balanced. The Walsh–Hadamard method based on the bias of the source uses the maximum established quasi-test to find the global optimal solution, which has become a classic and practical channel coding parameter recognition algorithm. In reference [21], the Walsh–Hadamard method was proposed to solve the two-element domain equations. The result obtained after Walsh transformation is the difference between the number of established and unsatisfied equations, and the solution of the equations is obtained based on this. In reference [14], the error-containing equations of the scrambler sequence were reconstructed on the basis of reference [21], and the feedback polynomial of the scrambler was reconstructed based on the Walsh–Hadamard method. However, the order of the scrambler needs to be estimated first, and the complexity of the algorithm increases exponentially with the order of the feedback polynomial. In reference [15], a scrambler reconstruction algorithm based on real-time detection was proposed, which continuously determines the feedback relationship during the Walsh transformation. This method reduces the computational complexity. In reference [16], a Walsh transform based method is used to solve the feedback polynomial recovery and initial state identification. In reference [17], a method based on Gaussian elimination and double detection is proposed, which solves the problem of blind identification of the synchronous scrambler in directly spread spectrum systems.

For the estimation of the initial state of the synchronous scrambler, a method of fast correlation attack on convolutional codes was proposed to estimate the initial state [10]. With this method, the identification of the initial state is converted into the decoding of the convolutional code, and then, the Viterbi hard decision decoding algorithm is used for decoding to estimate the initial state of the synchronous scrambler. When the original sequence is recovered from the error, the convolutional code needs to be reconstructed, so the computational complexity of the algorithm is increased. In reference [14], an initial state estimation algorithm was proposed to improve the fast correlation attack. The performance of this algorithm is not limited by the number of taps of the feedback polynomial, but the influence of channel noise and modulation information is not considered. In reference [22], the dual code was used to complete the reconstruction of the feedback polynomial, but the estimation of the initial state in the case of noise was not analyzed in detail. References [23, 24] used the reconstructed feedback polynomial to randomly generate a synchronous scrambler sequence and compared it with the estimation. The cross-correlation operation was performed on the synchronous scrambler sequence, and the initial state estimation was completed according to the peak value of the correlation function and the correlation spectrum.

Based on the above analysis, almost all current algorithms use hard decision sequences to reconstruct the synchronous scrambler. However, in practice, intercepted communication is usually a soft sequence containing the modulation method and channel noise [7, 25–28]. Because hard decision sequences result in a loss of channel reliability, their performance is not ideal at low SNR. Hence, there remains a need for a new methodology for synchronous scrambler reconstruction to improve the performance under low SNR.

In this paper, we blindly recognize the binary synchronous scrambler for binary phase-shift keying (BPSK) signals over an additive white Gaussian noise (AWGN) channel. The proposed method is different from the hard decision algorithm because it uses a soft decision sequence instead of a hard decision sequence. The contributions of this paper are summarized as follows:(1)We define the concept of the average check conformity [28], which measures the probability that the error-containing equation is established correctly. The average check conformity can be blindly computed by an intercepted soft decision sequence.(2)We analyze the statistical characteristics of the average check conformity. Moreover, a threshold based on the minimum error criterion is obtained, which can quickly detect the irreducible factors of the feedback polynomial.(3)We propose a method for finding the check equation and solving the error-containing equation when the order of the feedback polynomial is greater than 15, which greatly reduces the number of initial states that need to be traversed.

The remainder of this paper is organized as follows. Section 2 summarizes the principle and mathematical model of the synchronous scrambler. Section 3 establishes the average check conformity degree, solves the discriminant threshold, and analyzes the computational complexity of the algorithm for the recovery of the feedback polynomial. In Section 4, the verification equation is determined by the method of subsection optimization when the order of the feedback polynomial is greater than 15. In Section 5, our proposed method is evaluated by Monte Carlo simulations, and its performance is compared with that of the hard decision method. Finally, the conclusions are provided in Section 6.

#### 2. Principle of the Synchronous Scrambler and the Walsh–Hadamard Transform Method

##### 2.1. Principle of the Synchronous Scrambler

The scrambling process of the synchronous scrambler is based on a linear feedback shift register (LFSR), and the scrambling process is shown in Figure 1.

An L-stage LFSR is composed of a weighted feedback network and *L* registers (Figure 1), which are called the first-stage register, second-stage register,..., and -th stage register from left to right. Each register has two possible states, 0 and 1, and the operator represents modulo-2 addition. When a shift pulse is added, the output content at the previous moment is fed back to the first-stage register, the content of each register is shifted to the next stage, and the current output is generated by operation. Therefore, given initial values , under the action of the shift pulse, the -stage LFSR will output a sequence , which satisfies the linear recurrence relation (or feedback logic)where . This sequence is called the *L*-stage LFSR sequence, and its linearity is mainly reflected in its feedback logic being linear. Any consecutive term in a sequence of -stage LFSR is called a state of the sequence. The state is called the initial state.

The scrambling process can be expressed aswhere means modulo-2 summation, and represents a binary domain. The value of is 0 or 1, and . The feedback polynomial of the scrambler can be expressed as

The mathematical model of the synchronous scrambler studied is shown in Figure 2.

The model expression can be expressed aswhere is the channel noise, is the modulated scrambling sequence, and represents the -th moment. The biased sources are , . This article assumes that the received scrambler sequence adopts BPSK modulation, the signal amplitude is , and the noise is Gaussian white noise with the mean value of zero and the variance of . The SNR is defined as

For the receiver, the intercepted information sequence is , and the information sequence that needs to be acquired is . At this time, the feedback polynomial coefficient needs to be known. In actual communication, most of the LFSR orders used by the synchronous scrambler are 3–60 orders, generally three-term or five-term [9], and are the original polynomials [19]. The reconstruction of polynomials in this study is also based on this foundation.

##### 2.2. Walsh–Hadamard Transform Method

From the scrambling of the synchronous scrambler in Figure 1, it can be seen that the relationship between the input and output of each level of LFSR is as follows

According to equation (5), the following equations are establishedwhere is the length of the intercepted scrambler sequence and is the order of the feedback polynomial.

Next, is substituted into equation (6) to obtain the error-containing equations of the synchronous scramblerwhere represents the -th symbol of the received scrambling code sequence.

The Walsh–Hadamard transform method is an effective algorithm for solving the feedback polynomial of the maximum length sequence (*m*-sequence). The physical meaning of the transformed spectral coefficients can be expressed as the difference between the number of statistics that make the equation true and the number that does not hold [13]. Therefore, the algorithm will map the solution with the largest number of equations to the feedback relationship as the estimated value of the LFSR feedback polynomial. The following is a brief review of the feedback relationship estimation algorithm based on the Walsh–Hadamard transform.

Hadamard matrix , can be expressed as follows:

The initial matrix is given by

The -dimensional row vector , which is transformed into a -dimensional row vector by the Walsh–Hadamard transform, can be expressed as follows:

The algorithm for estimating the feedback relationship using the Walsh–Hadamard transform is as follows:(1)Group the received sequence according to the length and equation (7) with overlapping and continuous grouping and perform decimal conversion. The received data will be decimal numbers.(2)Construct a -dimensional vector with these decimal numbers, that is, mark the position of the -th element in the vector as , and the value of the -th element is equal to in the decimal numbers. The number of occurrences is .(3)The -dimensional vector is generated by the Walsh–Hadamard transform to generate the -dimensional vector .(4)Convert the binary representation of the position of the largest element except the first element in vector into a feedback relationship. Assuming that the largest element appears at the -th position, the binary representation of is , where is a positive integer, . Then the estimated feedback relationship is

The first element is excluded in Step 4 because the first element corresponds to the all-zero feedback coefficient, which will cause the value of the first element to be equal to , and the all-zero feedback coefficient is meaningless, so the all-zero solution is excluded. According to the physical meaning of the Walsh–Hadamard transform, the criterion for finding the largest element except the first element after transformation is called the criterion of maximum established number.

The computational complexity of the algorithm increases exponentially with the order of the feedback polynomial. Furthermore, the performance of the algorithm under low SNR needs to be improved.

#### 3. Reconstruction of Feedback Polynomial of the Synchronous Scrambler

##### 3.1. Establishment of Average Check Conformity

For the convenience of explanation, the line of the error-containing equation is listed and discussed separately, and the following error-containing check equation is obtainedwhere , and represents the *k*-th row and *l*-th column of matrix A in equation (7), where *A* is .

To measure the possibility of the establishment of the equations, the establishment of the check conformity [28] is as follows:

In equation (14), is the hard decision sequence, the corresponding soft decision sequence is , and is the probability that the hard decision sequence takes the value of one under the condition that the intercepted scrambler soft decision sequence is .

When , and the check conformity is mapped to 1; otherwise, it is mapped to −1. The posterior probability in equation (14) is derived as follows:

According to the Bayesian formula,and can be expressed as

Since there is no prior information, let . Using equations (15)–(18), the following expressions can be obtained:

By substituting equations (19) into (14), the expression of the check conformity can be obtained as

Considering all error-containing equations in equation (8), the average check conformity is obtained as follows:

Equation (21) can be transformed intowhere .

When the polynomial to be traversed is a feedback polynomial, the number of valid and nonconforming error-checking equations (8) is different due to the imbalanced ratio of zeroes to ones in the information source. At this time, the ratio of positive to negative values in is not balanced. The larger the SNR, the closer the is to 1 or −1. Otherwise, the probability of the equation is 0.5. The value of hovers around 0.

##### 3.2. Solution of the Discriminant Threshold

For the statistical characteristics of the average check conformity, the corresponding discriminant threshold needs to be introduced to complete the identification of the feedback polynomial.

Remember , and suppose the number of taps equal to one is and the corresponding set of tap positions is . Currently, the scrambling hard decision sequence participating in the check equation is .

When the check equation is established, the symbol 1 modulo-2 plus zero in participating in the check equation is equal to zero. At this time, the number of corresponding symbol 1 is an even number, and all possible composition conditions can be expressed aswhere means round down, and .

The mean and variance of each possible situation are statistically averaged, and the results are as follows:

Otherwise, the code element 1 modulo-2 plus one in participating in the check equation is equal to one. At this time, the number of corresponding code element 1 is an odd number, and all possible composition conditions can be expressed as

The mean and variance of each possible situation are statistically averaged, and the results are as follows:

When the traversed polynomial is scrambled to generate the polynomial, the number of valid and the number of invalid of the check equation are consistent with the source imbalance, namely,

Otherwise, the number of symbol 1 in the sequence participating in the check equation is random, and all compositions can be expressed as

The mean and variance of each possible situation are statistically averaged, and the results are as follows:

There is no analytical solution for the integral expressions in equations (23)–(32). To complete fast calculations and achieve higher calculation accuracy, this paper uses numerical integration to solve them.

First, the following two hypothesis tests are given: : The traversed polynomial is not the synchronous scrambler feedback polynomial. : The traversed polynomial is the synchronous scrambler feedback polynomial.

According to the law of large numbers, when the intercepted scrambler sequence length is large and the traversed polynomial is not the feedback polynomial, obeys the Gaussian distribution with mean and variance . can be expressed as

Otherwise, obeys the Gaussian distribution with mean and variance , that is,where and .

Supposing the discrimination threshold is , then the false alarm probability and the missed alarm probability are, respectively,

In practical application, using the Neyman Pearson criterion, it is first necessary to determine *P*_{f}, and then, according to equation (33), obtain the discrimination threshold

When , is established; otherwise, is established.

##### 3.3. Steps for Reconstructing the Feedback Polynomial

The steps for reconstructing the feedback polynomial of the synchronous scrambler based on the average check conformity are as follows.

*Step 1. *Convert the intercepted scrambler soft decision sequence into a posterior probability sequence according to equation (19).

*Step 2. *Construct and store 3-tap and 5-tap polynomials of order 3–60.

*Step 3. *Determine the false alarm probability .

*Step 4. *Traverse the polynomial in step 2, and construct an error-containing check equation according to equation (8).

*Step 5. *Calculate the average check conformity according to equations (21) and (22).

*Step 6. *Calculate the discriminant threshold according to equation (37). If , the feedback polynomial is identified; otherwise, return to step 4 until .

The flowchart of the algorithm is shown in Figure 3.

##### 3.4. Analysis of the Computational Complexity of Reconstructing the Feedback Polynomial

Assume that the length of the intercepted scrambler sequence is , the number of terms of the scrambler polynomial is , the order of the scrambling polynomial is , and the number of traversed polynomials is .

The computational complexity of the algorithm in this study is mainly focused on the calculation of the check conformity. In the process of traversing the polynomial for the first time, multiplication operations and addition operations are required. Considering the worst case, the feedback polynomial is not recognized until the last polynomial is traversed. The maximum calculation amount is multiplications and additions. The computational complexity of the Walsh–Hadamard method mainly focuses on the Hadamard transformation. The computational complexity is addition operations. In the case of fast algorithms, the computational complexity still requires addition operations. At the same time, to obtain the statistical vector, row vectors are converted from binary to decimal. The complexity of the algorithm increases exponentially with the order of the scrambling polynomial. As the order of the polynomial increases, the computational complexity of the algorithm proposed in this paper becomes much smaller than that of the Walsh–Hadamard method.

#### 4. Estimation of the Initial State

##### 4.1. Establishment of Average Check Conformity

From the scrambling of the synchronous scrambler in Figure 1, the initial state of the synchronous scrambler is .

The state at each moment satisfies the following relation:

The recurrence relation on GF(2) of the LFSR state can be obtained as

Among them, is the state transition matrix of LFSR, and the matrix is expressed as follows:

According to the definition of linear block code, the LFSR sequence of length can be regarded as an linear block code whose information vector is . The generator matrix of the linear block code can be expressed as follows:where , and represents the column of the state transition matrix raised to the power of on GF(2).

Therefore, the LFSR sequence and the information vector satisfy the following equation:

Transposing equation (42), we obtain

For the received scrambling sequence , the error-containing equations for the initial state of the synchronous scrambler can be established as follows:

According to Section 3.1, the check conformity is established to verify whether the possibility of equation (44) is correct:

The statistical average is taken for the check conformity, and the average check conformity is obtained as follows

##### 4.2. Subsection Optimization at High Order

The number of initial states of the synchronous scrambler that need to be traversed is . When the order of the feedback polynomial is high, the number of polynomials that need to be traversed increases exponentially. The idea of solving the error-containing equations in segments is introduced to reduce the number of initial states that need to be traversed, thereby reducing the computational complexity of the algorithm.

First, estimate the initial state of the first bits of the initial state, find the column in the column of the generator matrix of the linear block code, and then establish the following check equation

In equation (47), represents the number of established verification equations, and in binary vector .

According to the verification equation, equation (47), the following equation can be obtained

From equation (48), is a linear combination of. So, the following expression holds:

According to equation (49), the following error-containing equations can be established

After the error-containing equations are established, the optimal solution of can be obtained by solving the error-containing equation according to the method of establishing the degree of agreement in Section 4.1 so that the first position of the initial state can be estimated.

The second step estimates and finds the column in the column of the generator matrix , and establishes the following check equation

In equation (51), .

According to the verification equation, equation (51), the following equation can be obtained

From equation (52), the following equation can be established

Then, a system of equations containing errors can be established

The equation can be solved by checking the degree of conformity to complete the estimation of . If the number of digits is large, we can continue to estimate according to the method of the second step until the entire initial state is estimated, and the estimated number of steps is determined according to the series of the LFSR. When , it is not necessary to solve the equation piecewise. When , it is enough to solve the system of equations containing errors in two steps. Assuming that the identification of the initial states is completed in two steps, the number of initial states that need to be traversed to solve the equation without using subsections is , whereas the number of initial states to be traversed to solve the error-containing equation in subsections is only . Hence, the number of states to be traversed is greatly reduced. Since it is necessary to find and solve the check equation in sections, the required amount of intercepted scrambled data will increase when solving in subsections. Therefore, when using subsections, the amount of intercepted data is increased in exchange for a reduction in computational complexity.

##### 4.3. Analysis of the Computational Complexity of Estimating the Initial State

When , the algorithm in this paper does not need to solve the equation in sections. It is assumed that the length of the intercepted scrambling code sequence is , the number of taps of the scrambling code polynomial is , and the number of initial states to be traversed is . The computational complexity of the algorithm in this paper is mainly focused on the calculation of the check compliance. In the process of traversing the initial state, addition and multiplication of the magnitude of need to be performed. When , the number of initial states traversed is . Then -scale additions and multiplications need to be performed.

The computational complexity of Viterbi decoding is about , where is the fixed constraint length of the constructed convolutional code, the code rate is , and the complexity of finding the check equation is approximately . When , since the algorithm in this paper does not need to find the check equation, the computational complexity is lower than that Viterbi decoding. When , due to the need to solve the equation in sections, this paper also looks for the check equation. The algorithm complexity is mainly reflected in the calculation of the Viterbi decoding and check compliance. The computational complexity in this paper is slightly higher than that Viterbi decoding, but the algorithm complexity in this paper is within the affordable range.

#### 5. Experiments and Discussion

##### 5.1. Analysis of Recognition Rate of Feedback Polynomial

Without special instructions, the following simulation check defaults to a given false alarm probability , the feedback polynomial is , the SNR is varied from 0 dB to 14 dB with an interval of 2 dB, and the number of Monte Carlo simulations is 1000.

###### 5.1.1. Verification of the Effectiveness of the Algorithm

When the SNR is 8 dB, and . The statistics, ergodic polynomials, and discriminant threshold distribution diagrams after all polynomials are traversed are shown in Figures 4(a) and 4(b).

**(a)**

**(b)**

It can be seen from Figure 4 that when the traversed polynomial is correct, the statistics have an obvious prominent spectrum, and the average verification conformity spectrum is significantly higher than the discrimination threshold; otherwise, the average verification conformity spectrum is lower than the discrimination threshold. Therefore, the algorithm proposed in this paper can effectively identify the feedback polynomial.

###### 5.1.2. Effect of Bit Error Rate on the Algorithm

The source imbalance degree of the intercepted synchronous scrambler set in the simulation is 0.1. The lengths of the intercepted synchronous scrambler are set as , , and ; the relationship between the bit error rate (BER) and the probability of correct recognition of the feedback polynomial is determined, and the results are shown in Figure 5.

It can be seen from Figure 5 that the recognition rate of the algorithm can be significantly improved by increasing the length of the intercepted synchronous scrambler sequence. It can be seen from the simulation results that the recognition rate of the feedback polynomial can reach over 90%.

###### 5.1.3. Effect of the Intercepted Scramble Sequence Length on the Algorithm

The source imbalance is 0.1 and the length of the intercepted synchronous scrambler sequence is set to , , and . Figure 5 shows the relationship between and the probability of correct recognition of the feedback polynomial under different SNRs.

It can be seen from Figure 6 that the recognition rate of the algorithm can be significantly improved by increasing . When the source imbalance is low, can be increased to overcome the decrease in algorithm recognition performance caused by the decrease in . The algorithm has better recognition performance under low SNR. When , , and the SNR is 3 dB, the recognition rate of the feedback polynomial can reach over 90%.

###### 5.1.4. Effect of Source Imbalance on the Algorithm

The sequence length is set to , , and , the SNR is set to 6 dB, and the source imbalance is varied from 0 to 0.2 with an interval of 0.01. The relationship between the source imbalance and the recognition rate of the algorithm is shown in Figure 7.

It can be seen from Figure 7 that under the same SNR, with the increase of the source imbalance, the probability of correct recognition of the algorithm increases. The more imbalanced the source, the higher the recognition rate of the algorithm. With the increase of , the number of samples required to reach a certain recognition rate is also reduced.

###### 5.1.5. Effect of the Order of the Feedback Polynomial on the Algorithm

The source imbalance is 0.1 and the sequence length is set to . The feedback polynomials are , , and . The relationship between the order of the feedback polynomial and the recognition rate is determined, and the result is shown in Figure 8.

With the same intercept sequence length and the same SNR, the lower the order of the feedback polynomial, the higher the recognition rate of the algorithm. Additionally, the recognition rates of the three algorithms increase with the increase of the SNR. The lower the order, the earlier the recognition rate reaches 100%. When the SNR is 4 dB, the probability of correct recognition of the algorithm can reach over 90%, and it has good polynomial order fault tolerance.

###### 5.1.6. Comparison with Other Algorithms

The algorithm in this study is compared with the algorithm based on bit imbalance [13], the real-time detection algorithm based on Walsh–Hadamard transform [15], the Clzeau algorithm [12], the Walsh–Hadamard transform [16], and the greatest common divisor [17]. The intercepted sequence length is set as and the source imbalance is 0.1. Through a Monte Carlo simulation experiment, the probability of correct recognition is determined for each of the four algorithms under different SNRs, and the results are shown in Figure 9.

It can be seen from the figure that the algorithm proposed in this study has an SNR gain of about 1–2 dB at a low SNR. The main reason is that the proposed algorithm makes better use of the soft decision sequence to construct the conformity degree, and it makes great use of the information reliability in the soft sequence. The performance improvement is more obvious under the condition of low SNR.

##### 5.2. Analysis of the Recognition Rate of the Initial State

The following simulations verify that each initial state is randomly generated (excluding all zeroes), the feedback polynomials are , , , and , and the number of Monte Carlo simulations is 1000.

###### 5.2.1. Influence of SNR on the Initial State Recognition Rate

When and , the curve of probability of correct recognition corresponding to different orders and tap numbers with SNR is shown in Figure 10.

It can be seen from the figure that with the increase of SNR, the probability of correct recognition of the initial state gradually increases, and it has a good ability to adapt to low SNR. At , the probability of correct recognition of the algorithm can reach 90%. Under the same SNR, the lower the order, the higher the estimation rate of the algorithm. Under the same order, the number of taps has little effect on the estimation rate.

###### 5.2.2. Influence of Source Imbalance Degree on the Initial State Recognition Rate

When and , the variation curve of the probability of correct recognition corresponding to different orders and tap numbers with the source imbalance is shown in Figure 11.

It can be seen from the figure that with the increase of , the probability of correct recognition of the initial state gradually increases. Under the same , the lower the order, the higher the estimation rate of the algorithm. The number of taps has little effect on the estimation rate. When is low, the probability of correct recognition can be improved by increasing the length of the synchronous scrambler sequence. According to Figures 10 and 11, the algorithm is greatly affected by the order of the feedback polynomial, and the number of taps does not affect the performance of the algorithm. The lower the order, the higher the estimation rate of the algorithm.

###### 5.2.3. Influence of BER on the Initial State Recognition Rate

When and , the curves of the probability of correct recognition versus the BER corresponding to different orders and numbers of taps are shown in Figure 12.

It can be seen from the figure that with the increase of the BER, the probability of correct recognition of the initial state gradually decreases. When the intercepted scrambled data are only 1000 and the BER is , the probability of correct recognition of the algorithm can reach over 90%.

#### 6. Conclusion

In this paper, we propose a blind reconstruction method for the synchronous scrambler. We introduce the average verification conformity degree to determine the probability of the verification equation being correctly established. The average verification conformity degree obeys different distributions when the correct polynomial is traversed and when the incorrect polynomial is traversed. Then, the optimal discrimination threshold is established by analyzing the statistical characteristics of the average verification conformity degree to complete the identification of the feedback polynomial. Finally, we propose a method for finding the check equation and solving the error-containing equation when the order of the feedback polynomial is greater than 15, which greatly reduces the number of initial states that need to be traversed. Simulation results show that the proposed algorithm has fairly good performance under the influences of different factors. Moreover, the new method is extremely robust to BER and low SNR. Compared with the existing algorithms, the performance of the proposed algorithm is significantly improved, and its computational complexity is reasonable.

#### Data Availability

The data used to support the findings of this study are included within the article.

#### Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this article.

#### Acknowledgments

This work was financially supported by the National Natural Science Foundation of China (91538201), Taishan Scholar Special Foundation (ts201511020), and the Chinese National Key Laboratory of Science and Technology on Information System Security (6142111190404).