Secret communication method based on fraction order Fourier transform order-multiplexing

A fractional Fourier, secure communication technology, applied in the field of information security, can solve the problem that the fractional Fourier transform order is not fully utilized and so on

Inactive Publication Date: 2010-03-10
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the existing security communication system based on fractional Fourier transform is just a simple extension of the traditional security communication system based on Fourier transform, that is, the fracti

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret communication method based on fraction order Fourier transform order-multiplexing
  • Secret communication method based on fraction order Fourier transform order-multiplexing
  • Secret communication method based on fraction order Fourier transform order-multiplexing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The present invention will be described in detail below in conjunction with the accompanying drawings and embodiments.

[0037] The secure communication technology based on fractional Fourier transform proposed by the present invention comprises the following steps

[0038] 1. Design of Fractional Fourier Domain Multiplexer

[0039] (1) According to the number M of users in the designed system, select M that satisfies the invertibility condition of matrix C in formula (3) 2 a fractional Fourier transform order, below, we briefly discuss the multiplexing order p i The selection method of , the determinant value of matrix C in formula (3) can be expressed as the form shown in formula (8)

[0040] | C | = Π i = 0 M - 1 e - j ·...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a secret communication method based on fraction order Fourier transform order-multiplexing, belonging to the information safety field. The secret communication method comprises the following steps: establishing linear equations by using the relation among filters in a multiplex transmission multiplexer accurately reestablished by fraction order Fourier domains with different orders and selecting discrete-sampling discrete fraction order Fourier transform as a basic tool, realizing the demodulation of the fraction order Fourier transform order-multiplexing; and realizing effective recovery of transmission information by using the multiplexed fraction order Fourier transform order as a secret in the information decryption. The secret communication method based on thefraction order Fourier transform order-multiplexing completely utilizes the order change characteristic of the fraction order Fourier transform, enlarges the secret space relative to the traditionalsecret communication method based on fraction order Fourier transform, improves the safety of the system, can realize secret communication under a multi-carrier mode, and can provide a new way for thedesign of a multi-user communication system.

Description

technical field [0001] The invention relates to a secure communication method based on fractional Fourier transform order multiplexing, and belongs to the technical field of information security. Background technique [0002] With the rapid development of modern data communication services, information is illegally intercepted from time to time, so secure communication technology emerges as the times require. In a secure communication system, the two communicating parties encrypt the information before sending it according to the agreed key. After the information is received, they use the set key to decrypt it. Once the decryption key is wrong, the original data cannot be recovered. information. Therefore, the size of the key space of a secure communication system directly determines the level of system security. [0003] The concept of fractional Fourier transform was proposed as early as 1929, applied in the field of optics in the 1980s, and has become one of the researc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/14
Inventor 陶然孟祥意王越
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products