Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Optical fiber web encryption communication system based on time hidden signal channel

An encrypted communication system and covert channel technology, applied in the field of optical fiber network encryption communication system based on time covert channel, can solve problems such as powerlessness, data encryption technology crisis, reduced difficulty in deciphering passwords, etc., to achieve good integrity and reliability, maintain Integrity and reliability, strong anti-interference ability

Inactive Publication Date: 2013-06-05
CHANGSHU RES INSTITUE OF NANJING UNIV OF SCI & TECH
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, ciphertext is easy to attract the attention of attackers, and with the rapid development of deciphering technology and the continuous improvement of computer hardware performance, the difficulty of deciphering passwords is also decreasing, and almost all data encryption technologies are on the verge of crisis.
At the same time, when the data is in normal use, if the legality and property rights of the data need to be tracked and detected, the traditional data encryption technology becomes powerless

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Optical fiber web encryption communication system based on time hidden signal channel
  • Optical fiber web encryption communication system based on time hidden signal channel
  • Optical fiber web encryption communication system based on time hidden signal channel

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] combine figure 1 , the time covert channel adopted by the present invention "replays" previously recorded events through a simple but effective triple strategy:

[0029] An optical fiber network encryption communication system based on time covert channel, comprising the following steps:

[0030] [1] Obtaining the original time series value of the sender;

[0031] [2] The sender sorts the obtained time series values, and divides the sorted time series values ​​into 2 groups, one group corresponds to binary 0, and the other group corresponds to 1;

[0032] [3] The sender makes a one-to-one correspondence between the data to be sent and the sorted and grouped time series values;

[0033] [4] The sender controls the sending rate according to the time series value;

[0034] [5] Decoding of the receiver.

Embodiment 2

[0036] combine figure 1 , the time covert channel adopted by the present invention "replays" previously recorded events through a simple but effective triple strategy:

[0037] An optical fiber network encryption communication system based on time covert channel, comprising the following steps:

[0038] [1] Obtaining the original time series value of the sender;

[0039] [2] The sender sorts the obtained time series values ​​from large to small, finds the median of the sorted sequence values, divides them into two groups according to the median, and divides the sorted time series values ​​into 2 Group, one group corresponds to binary 0, and the other group corresponds to 1;

[0040] [3] The sender makes a one-to-one correspondence between the data to be sent and the sorted and grouped time series values;

[0041] [4] The sender controls the sending rate according to the time series value;

[0042] [5] Decoding of the receiver.

Embodiment 3

[0044] combine figure 2 , after obtaining the previously recorded time series value, sort it from largest to smallest. The median t of the sorted sequence values ​​can then be obtained, in figure 2 The median T1 is this median. Finally, according to the median, both parties use the same rule to divide the sequence into two parts: [0, t) and [t, max], the former part corresponds to binary 0, and the latter part corresponds to binary 1.

[0045] combine image 3 , in order to leak consecutive bits to B, A generates a sequence of packets and encodes the covert information by adjusting the arrival time interval between these packets. To further simulate legitimate behavior and avoid generating normal packet sequences, the packet timing is adjusted according to previously recorded normal sequences. Therefore, the choice of sequence interval directly affects the concealment of the channel, and the more the input arrival sequence interval can imitate legitimate behavior, the be...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of encryption communications of an optical fiber web, and discloses an optical fiber web encryption communication system based on a time hidden signal channel. A sender sorts obtained time sequence value, the time sequence value after sorted is divided into groups, the sender conducts one-to-one correspondence on data to be sent and the time sequence value which is sorted and divided into the groups, the sender controls sending rate, and a receiver conducts decoding. Compared with the prior art, the optical fiber web encryption communication system has the obvious advantages of hiding information which is not easily observed by an observer, not enabling carrier data to generate big changes, not easily attracting attention of an aggressor, being strong in anti-jamming capability, and being capable of well keeping integrity and reliability of information.

Description

technical field [0001] The invention belongs to the field of encrypted communication of an optical fiber network, in particular to an encrypted communication system of an optical fiber network based on a time covert channel. Background technique [0002] Cryptography uses mathematical methods to replace information and convert plaintext into unrecognizable ciphertext to ensure that the connotation of information is not illegally obtained. However, ciphertext is easy to attract the attention of attackers, and with the rapid development of deciphering technology and the continuous improvement of computer hardware performance, the difficulty of deciphering passwords is also decreasing, and almost all data encryption technologies are on the verge of crisis. At the same time, when the data is in normal use, if the legality and property rights of the data need to be tracked and detected, the traditional data encryption technology becomes powerless. In order to solve the problems ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00
Inventor 李千目朱文许昌年
Owner CHANGSHU RES INSTITUE OF NANJING UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products