Secret communication method based on double-end deployment multi-layer time-delay reserve pool calculation

A technology of secure communication and reserve pool, which is applied in secure communication, calculation, and calculation model through chaotic signals, and can solve the problems of complex coupling mechanism, difficult and low-cost replacement, inflexible selection of encryption system and security system, etc. The effect of secure transmission, improved reliability, and fast chaotic synchronization speed

Pending Publication Date: 2022-05-10
NANJING UNIV OF POSTS & TELECOMM
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the traditional mechanism has the following disadvantages: 1. The selection of the encryption system and the security system is not flexible. Once implemented in hardware, it is difficult to replace it at low cost; 2. The implementation of the coupling mechan

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret communication method based on double-end deployment multi-layer time-delay reserve pool calculation
  • Secret communication method based on double-end deployment multi-layer time-delay reserve pool calculation
  • Secret communication method based on double-end deployment multi-layer time-delay reserve pool calculation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The present invention is described in further detail now in conjunction with accompanying drawing.

[0051] It should be noted that terms such as "upper", "lower", "left", "right", "front", and "rear" quoted in the invention are only for clarity of description, not for Limiting the practicable scope of the present invention, and the change or adjustment of the relative relationship shall also be regarded as the practicable scope of the present invention without substantive changes in the technical content.

[0052] image 3 It is a flowchart of a secure communication method based on dual-terminal deployment and multi-layer delay reserve pool calculation according to an embodiment of the present invention. see figure 1 and image 3 , the secure communication method includes the following steps:

[0053] S1, use the chaotic system at the sending end to generate a multidimensional chaotic sequence, generate a training set L(t) containing three dimensions Lx(t), Ly(t) a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secret communication method based on double-end deployment multi-layer time-delay reserve pool calculation, which comprises the following steps of: simultaneously deploying a time-delay reserve pool calculation model formed by a plurality of series-connected time-delay reserve pools to a receiving end and a sending end, and simultaneously training the time-delay reserve pool calculation models of the receiving end and the sending end by adopting a training set L (t); the sending end chaotic system continuously generates a new chaotic signal, the Ux (t) is reserved as a drive set to drive the time-delay reserve pool calculation model of the sending end to obtain a chaotic sequence Uz (t) for encryption, and meanwhile, the Ux (t) is sent to the time-delay reserve pool calculation model of the receiving end to synchronously generate a chaotic sequence for decryption consistent with the Uz (t); the sending end encrypts communication data to be transmitted by adopting the chaos sequence for encryption; and the receiving end decrypts the received encrypted communication data by adopting the chaotic sequence for decryption. According to the invention, high-quality chaos synchronization of the transmitting end and the receiving end can be realized, so that transmitted useful information can be stably demodulated.

Description

technical field [0001] The invention relates to the cross-technical field of machine learning and chaotic secure communication, in particular to a secure communication method based on dual-end deployment and multi-layer time-delay reserve pool calculation. Background technique [0002] The core of chaotic secure communication lies in the chaotic synchronization between encryption system and decryption system. In the traditional mechanism, the transmitter and the receiver generally need to configure the chaotic dynamic system separately, and through the design of the coupling mechanism, the chaos synchronization is realized, so as to demodulate the useful information transmitted. However, the traditional mechanism has the following disadvantages: 1. The selection of the encryption system and the security system is not flexible. Once implemented in hardware, it is difficult to replace it at low cost; 2. The implementation of the coupling mechanism is relatively complicated, an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00H04L9/40G06N20/00
CPCH04L9/001H04L63/0428G06N20/00
Inventor 靳雷生
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products