Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Robust chaos keying secure communication system, communication method, terminal and storage medium

A technology for secure communication and chaotic signals, which is applied in the fields of terminals and storage media, communication methods, and robust chaotic keying secure communication systems. Increase the chaotic carrier bandwidth, resist return mapping attack, and increase the effect of system delay line

Active Publication Date: 2022-05-20
CHINA UNIV OF GEOSCIENCES (WUHAN) +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the design of the adaptive controller at the receiving end is complex, and its practicability is limited
(3) Chaos keying has the attribute of spread spectrum, so it has better anti-noise performance, but it is vulnerable to the attack of return mapping analysis
[0005] (1) When the non-coherent chaotic security communication strategy is adopted, the receiver does not need to recover the chaotic carrier generated by the transmitter through high-quality chaotic synchronization, which has high anti-noise performance, but at the same time means that it does not need to consider Chaotic synchronization and parameter sensitivity, so the sensitivity of chaotic systems to initial values ​​and parameters is difficult to be directly and effectively applied to security enhancement
[0006] (2) Chaos concealment is easy to implement, but because the power change of the synthesized signal will lead to weak security, the power of the information signal must be much smaller than the power of the chaotic carrier, which makes it relatively sensitive to channel noise and has a high bit error rate
[0007] (3) When designing a chaotic parameter modulation communication system, it is necessary to design an adaptive controller with a certain mathematical form for a given chaotic system, which weakens its practicability to a certain extent
[0008] (4) Chaos keying essentially has the attribute of spread spectrum, so it naturally has better anti-noise performance, but it is vulnerable to the attack of return mapping analysis
[0009] (5) The basis for the realization of coherent chaotic secure communication decryption is chaotic synchronization. For this reason, both communication parties must use lasers with the same structural parameters to ensure high-quality synchronization, which brings obstacles to the practical application of laser chaotic secure communication.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Robust chaos keying secure communication system, communication method, terminal and storage medium
  • Robust chaos keying secure communication system, communication method, terminal and storage medium
  • Robust chaos keying secure communication system, communication method, terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0093] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

[0094] 1. In view of the problems existing in the prior art, the present invention provides a robust chaotic keying secure communication system, a communication method, a terminal and a storage medium. The present invention is described in detail below with reference to the accompanying drawings.

[0095] like figure 1 As shown, the neural network-based robust chaotic keying secure communication device provided by the embodiment of the present invention includes:

[0096] Nonlinear transformation module 1, delay keying modulation module 2, plaintext electrical signal module 3, relationship establishment module 4, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of chaos security, and discloses a robust chaos keying security communication system, a communication method, a terminal and a storage medium. At the sending end, a double delay feedback chaos keying system is designed, and a fixed delay feedback is used for To ensure the chaotic characteristics of the system, another channel of controllable delay feedback is used to carry 0 and 1 bit information, and the 0 or 1 state is used to control the closure and opening of the delay feedback; when the transmitter is in the open / close state of the delay keying modulation module, The chaotic signal output by the system and its delayed signal are used to train the neural network to establish two relationship models; at the receiving end, the two models are used to verify the mapping relationship between the modulated chaotic signal and the delayed signal segmentally. Decryption is performed under the premise of chaotic carrier at the terminal. The invention can effectively resist the return mapping attack on chaotic keying, and provides the possibility for safe transmission under severe communication conditions.

Description

technical field [0001] The invention belongs to the technical field of chaotic security, and in particular relates to a robust chaotic keying security communication system, a communication method, a terminal and a storage medium. Background technique [0002] Since the optical chaotic secure communication with a communication rate of 1Gb / s was realized in the 120km metropolitan area network of Athens in 2005, the research on optical chaotic secure communication has attracted worldwide attention and has made great progress. Its transmission rate, transmission distance , security have been significantly improved, and gradually become one of the most feasible physical layer encryption methods. A large number of experiments have realized and reported long-distance (greater than 100km) high-speed optical fiber chaotic secure communications. It is worth noting that in some practical communication environments, such as wireless communication, underwater communication, and free-spa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L27/00
CPCH04L9/001H04L27/001Y02D30/50
Inventor 高孝婧陈庆李珊曾德泽程孟凡
Owner CHINA UNIV OF GEOSCIENCES (WUHAN)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products