Ultra-chaos pseudo random sequence generator

A pseudo-random sequence and ultra-chaotic technology, which is applied in digital transmission systems, electrical components, transmission systems, etc., can solve the problems of chaotic signals that are difficult to decipher and decipher

Inactive Publication Date: 2008-03-19
HARBIN ENG UNIV
View PDF0 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009]Due to the random nature of chaotic signals, sensitive dependence on initial conditions and noise-like broadband power spectral density, chaotic signals are diff...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ultra-chaos pseudo random sequence generator
  • Ultra-chaos pseudo random sequence generator
  • Ultra-chaos pseudo random sequence generator

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0056] Let's take the application of HC-PRBG in image encryption as an example. In order to protect image data from being stolen, illegally copied and disseminated during transmission, various encryption schemes have been proposed to protect the security of image data. A common characteristic of these encryption technologies is that the encrypted data is transformed into a set of meaningless codes. Once interceptors spot code like this, they know they have very valuable information. In order to protect the security of image data and avoid exposing the value of image data, the information redundancy of images can be used to hide one image in another image. For image encryption, possible monitors or illegal interceptors can intercept and decipher the ciphertext, or destroy the ciphertext before sending it, thereby affecting the security of confidential information; but for image information hiding , it is difficult for a possible monitor or illegal interceptor to judge whether...

example 2

[0058] An important field of random sequence application is frequency hopping communication. The carrier frequency of the frequency hopping communication system is controlled by a set of code sequences. In a frequency band much wider than the information bandwidth, it randomly hops according to a certain rule. This hopping rule is called is the frequency hopping pattern. The code sequence that controls the frequency hopping pattern is called a frequency hopping sequence. Since there is no difference between the frequency hopping pattern and the frequency hopping sequence in essence, the two are no longer distinguished. The frequency hopping sequence is generally generated by a pseudo-random sequence. The most effective way to counter frequency hopping is to decipher the frequency hopping pattern, so as to realize tracking interference. A good frequency hopping sequence has better randomness, as long a period as possible, uniform distribution in the working frequency band, and ...

example 3

[0061] Ultra-wideband (UWB) technology is a new type of short-distance high-speed wireless communication technology that has attracted much attention. This technology has been used by the military for many years. After UWB is opened in the civilian field, it is expected to inject new vitality into the short-distance wireless access market by virtue of its advantages such as ultra-high transmission speed, low power, and low cost. Pulse radio vividly illustrates the characteristics of UWB transmitting narrow pulses directly for communication. In view of the relatively high requirements of the system on power efficiency, the modulation method of pulse radio generally adopts binary pulse phase modulation (PPM). In order to improve the confidentiality of communication, Chaotic Pulse Phase Modulation (CPPM) is adopted. This communication scheme is based on chaotic pulse sequences, and the time interval between pulses is determined by HC-PRBH. This pulse train with chaotic pulse s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method of hyperchaos pseudorandom sequence generation. (1) select hyperchaos mapping and set initial values thereof x (0) and y(0); (2) carry out iterative computation by input values x(i) and y(i), and obtain output values x(i+1) and y(i+1); (3) undergo nonlinear transformation of x(i+1) and y(i+1), the transformation method is to take the odd bits of x(i+1) and the even bits of y(i+1) to be combined and then take the reverse sequence thereof as the value of the new sequence z(i+1), and at this time the sequence z(i+1) is a real-value sequence; (4) the real-value sequence z is binarized to be a 0-1 sequence, i.e. the pseudorandom sequence output is obtained. The hyperchaos pseudorandom sequence provided in the invention is characterized by strong safety and security, good random properties, simple and rapid generation, and a plurality of autocorrelation properties close to Delta function and cross correlation properties close to zero, being able to be widely applied to the fields like data encryption, secure communication and information safety and so on.

Description

technical field [0001] The invention belongs to the password generating technology in information security, specifically, it utilizes electronic computer technology, information coding technology and a super chaotic system to generate a super chaotic pseudo-random sequence. Background technique [0002] The mode of warfare in the 21st century is information warfare. Communication is the key and the soul to obtain information superiority, so as to ensure the safety and smoothness of communication and prevent it from being deciphered by the enemy. Therefore, communication anti-jamming and security technologies have become key technologies to be solved urgently in information warfare. [0003] Cryptography is the core technology to ensure information security. With the progress of cryptography and the rapid development of modern digital technology, cryptography has been more widely used in military communications, computer networks, and e-commerce. [0004] Cryptography (Crypt...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00H04L9/22
Inventor 林金秋司锡才
Owner HARBIN ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products