Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secret communication method based on fraction order Fourier transform order-multiplexing

A technology of fractional Fourier transform and secure communication, which is applied in the field of information security and can solve the problem that the order of fractional Fourier transform is not fully utilized.

Inactive Publication Date: 2012-05-23
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the existing security communication system based on fractional Fourier transform is just a simple extension of the traditional security communication system based on Fourier transform, that is, the fractional Fourier transform or fractional Fourier domain is used to replace the Fourier transform in the traditional system. Fourier transform or Fourier domain, the order of fractional Fourier transform is not fully utilized

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret communication method based on fraction order Fourier transform order-multiplexing
  • Secret communication method based on fraction order Fourier transform order-multiplexing
  • Secret communication method based on fraction order Fourier transform order-multiplexing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The secure communication method based on fractional Fourier transform proposed by the present invention comprises the following steps

[0037] 1. Design of Fractional Fourier Domain Multiplexer

[0038] (1) According to the number M of users in the designed system, select M that satisfies the invertibility condition of matrix C in formula (3) 2 fractional Fourier transform order, and the multiplexing order p is discussed below i The selection method of , the determinant value of matrix C in formula (3) can be expressed as the form shown in formula (8)

[0039] | C | = Π i = 0 M - 1 e - j · 1 2 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a secret communication method based on fraction order Fourier transform order-multiplexing, belonging to the information safety field. The secret communication method comprises the following steps: establishing linear equations by using the relation among filters in a multiplex transmission multiplexer accurately reestablished by fraction order Fourier domains with different orders and selecting discrete-sampling discrete fraction order Fourier transform as a basic tool, realizing the demodulation of the fraction order Fourier transform order-multiplexing; and realizing effective recovery of transmission information by using the multiplexed fraction order Fourier transform order as a secret in the information decryption. The secret communication method based on the fraction order Fourier transform order-multiplexing completely utilizes the order change characteristic of the fraction order Fourier transform, enlarges the secret space relative to the traditionalsecret communication method based on fraction order Fourier transform, improves the safety of the system, can realize secret communication under a multi-carrier mode, and can provide a new way for the design of a multi-user communication system.

Description

technical field [0001] The invention relates to a secure communication method based on fractional Fourier transform order multiplexing, and belongs to the technical field of information security. Background technique [0002] With the rapid development of modern data communication services, information is illegally intercepted from time to time, so secure communication technology emerges as the times require. In a secure communication system, the two communicating parties encrypt the information before sending it according to the agreed key. After the information is received, they use the set key to decrypt it. Once the decryption key is wrong, the original data cannot be recovered. information. Therefore, the size of the key space of a secure communication system directly determines the level of system security. [0003] The concept of fractional Fourier transform was proposed as early as 1929, applied in the field of optics in the 1980s, and has become one of the researc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/14
Inventor 陶然孟祥意王越
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products