Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A High Security Transmission Method Based on Double Encryption of Three-Dimensional Constellation

A double encryption, secure transmission technology, applied in the field of communication, can solve the problems of rarely considering three-dimensional or even higher dimensions, and the encryption method is not flexible enough, and achieve the effect of improving transmission capacity, high gain index, and improving security performance.

Active Publication Date: 2020-12-25
NANJING UNIV OF INFORMATION SCI & TECH
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At the same time, most traditional chaotic systems encrypt the physical layer based on two-dimensional QAM constellation diagrams. The positions of the constellation points are relatively fixed, and the encryption method is not flexible enough.
Most of the current research is done in 2D constellation diagrams, rarely considering 3D or even higher dimensions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A High Security Transmission Method Based on Double Encryption of Three-Dimensional Constellation
  • A High Security Transmission Method Based on Double Encryption of Three-Dimensional Constellation
  • A High Security Transmission Method Based on Double Encryption of Three-Dimensional Constellation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] A high-security transmission method based on three-dimensional constellation double encryption described in this embodiment, the flow chart is as follows figure 1 shown, including the following steps:

[0027] (1) Serial-to-parallel conversion is performed on the binary data at the transmitter, and the one-dimensional data stream is converted into three-dimensional data for transmission.

[0028] (2) Constellation mapping is performed on the 3D data, and the original data flow is mapped to the 3D constellation diagram to form constellation points. The model of the 3D constellation diagram is as follows: figure 2 As shown, the number of constellation points in the figure is 8, and one constellation point in the bit stream corresponds to three bits. The constellation gain index of the three-dimensional constellation diagram is:

[0029]

[0030] Among them, d min (C) represents the minimum Euclidean distance in the constellation diagram, and P(C) represents the ave...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a high-security transmission method based on double encryption of three-dimensional constellations, which comprises the following steps: performing serial-to-parallel conversion on the binary data at the transmitting end; performing constellation mapping on the three-dimensional data to form constellation points; using Cai's chaotic model The chaotic sequence generates the displacement vector and rotation vector of the constellation point, and performs displacement transformation and rotation transformation on the three-dimensional constellation point; uses three-dimensional carrier-free amplitude phase modulation to process the encrypted three-dimensional signal, and superimposes the processed three-dimensional signal into a single-channel signal. Enter the channel transmission; demodulate the received signal at the receiving end, and finally obtain the original data. The invention utilizes the Chua's circuit model to generate a chaotic sequence to change the position of the constellation point by displacement and rotation, realizes two encryptions of the constellation diagram, and effectively improves the security performance of the system; utilizes the high gain index and high anti-noise performance of the constellation to effectively improve the system transmission capacity.

Description

technical field [0001] The invention relates to optical transmission technology in the communication field, in particular to a high-security transmission method based on three-dimensional constellation double encryption. Background technique [0002] With the rapid development of 5G, 4K video, cloud computing and other services, the communication field will face a wider space, more new space needs to be expanded, and more new services will be developed. The huge demand for information capacity makes communication security issues have attracted increasing attention. [0003] Traditional encryption methods based on advanced layers cannot effectively resist physical layer attacks such as interception and illegal eavesdropping, and encryption processing based on advanced layers does not have the characteristics of high speed and low delay, so it is difficult to meet the current needs of high-speed optical communication. The current method for improving the security of the physi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L9/14H04L9/16
CPCH04L9/001H04L9/14H04L9/16
Inventor 刘博忻向军任建新毛雅亚陈帅东王瑞春沈磊李良川周锐王光全吴泳锋孙婷婷赵立龙
Owner NANJING UNIV OF INFORMATION SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products