Method for generating digital chaos code in chaotic secure communication system

A technology of chaotic cryptography and secure communication, which is applied in transmission systems, digital transmission systems, secure communication devices, etc., and can effectively solve problems such as complex, unsolved, digital chaotic cryptography methods and techniques that have not been reported.

Active Publication Date: 2013-10-09
SOUTHEAST UNIV
View PDF3 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (2) In the current chaotic security research, chaotic waves are transmitted in the channel. Because chaotic waves are sensitive to external factors such as noise, the technology of using chaos synchronization for information decryption in long-distance information transmission has not yet been solved.
[0005] (3) There are no secure communication schemes and technologies that use digital chaotic signals to encrypt digital information and use chaotic synchronization technology...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for generating digital chaos code in chaotic secure communication system
  • Method for generating digital chaos code in chaotic secure communication system
  • Method for generating digital chaos code in chaotic secure communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0098] In order to describe the digital chaos security technology more clearly, then the figure introduces the principle and method of the digital chaos security technology in detail.

[0099] figure 1 It is a full-duplex two-way digital chaos security communication system of the invention technology. The information sender and the receiver each have two (same or different) chaotic networks for chaotic encryption and chaotic decryption. The encryption and decryption passwords of one party are generated by different chaotic networks, but the corresponding pair of both parties (such as figure 1 14 and 17 and 15 and 16) Encryption and decryption chaotic networks must have the same topology and dynamics. encryption function F i (i=1,2) satisfy F i f i -1 =I. The digital information M is encrypted by the chaotic cipher through the F function operation and the ciphertext C is transmitted to the receiving end through the channel (including digital multiplexer, modulator, demodu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for generating a digital chaos code in a chaotic secure communication system. The digital chaotic secure communication system comprises a channel for communication between an information sending terminal A and an information receiving terminal B and a digital chaotic network that is connected with the channel and is used for generating a chaotic digital numerical code; and a chaotic numerical code with a certain length is selected in numerical codes generated by the digital chaotic network and is converted into a chaotic code k1(t) by a code generation function g1 of chaotic coding, wherein the k1 (t) is expressed by the following formula: k1 (t)= g1 (X, p). The complex receiving and sending chaotic networks employ an identical method to carry out calculation so as to obtain a chaotic synchronous digital numerical code. A chaotic code is generated or decoded from the digital chaotic network based on chaotic code generation and a clear chaotic coding or decoding module by using the following method: a code k1 has the length of one bit or multiple bits, a certain amount P of digital construction codes are selected from chaotic numerical codes generated by the chaotic network according to a random or regular way and the k1 is expressed by the following formula: k1=g1 [X,p], wherein the p is less than or equal to the q; and a series of function bi operation is carried out on all original codes generated by the complex networks so as to generate a series of new digital functions.

Description

1. Technical field: [0001] The invention relates to the technical field of electronic information security, in particular to a security communication system and method. 2. Background technology: [0002] In recent years, secure communication based on chaos synchronization has aroused great international research interest. People have done a lot of theoretical and experimental research on chaotic secure communication, and carried out high-speed long-distance (120km) experiments in commercial optical fiber communication networks. In the chaotic secure communication scheme, the transmitted information is covered by the chaotic signal at the sending end, and the chaotic signal is removed and decrypted at the receiving end by using chaos synchronization. Because the chaotic dynamics is extremely sensitive to the initial value conditions of the system and the dynamic parameters of the system, it is extremely difficult to reconstruct and reproduce the chaotic dynamics, so it is di...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00
Inventor 黄洪斌邱灿灿
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products