Unlock instant, AI-driven research and patent intelligence for your innovation.

A secure communication method of utilizing an amplitude to realize chaos synchronization

A technology of chaotic synchronization and secure communication, applied in the field of information security, can solve the problems of low bandwidth utilization rate and poor security of signal transmission rate, and achieve the effect of ensuring transmission bandwidth utilization rate and high-speed transmission.

Inactive Publication Date: 2011-08-31
NORTH CHINA ELECTRIC POWER UNIV (BAODING)
View PDF2 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to propose a secure communication method that uses amplitude to realize chaos synchronization, so as to overcome the shortcomings of the signal transmission rate in the CSK method being restricted by the synchronization time and the DCSK method with low bandwidth utilization and poor security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secure communication method of utilizing an amplitude to realize chaos synchronization
  • A secure communication method of utilizing an amplitude to realize chaos synchronization
  • A secure communication method of utilizing an amplitude to realize chaos synchronization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0022] figure 1 It is a schematic diagram of a secure communication method using amplitude to realize chaos synchronization provided by the present invention. figure 1 In , at the sending end, a three-dimensional chaotic system is used, and its state equation is as follows:

[0023]

[0024] The parameters are taken as: a=25, b=16, c=40, d=4, e=5, f=5, g=7, choose x 2 variable as a chaotic signal, the sent signal is:

[0025] s ( t ) = x 2 ( t ) Σ k = 0 ( 2 b k - 1 ) [ u ( t - kΔt ) - u ( t - ( k ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secure communication method of utilizing an amplitude to realize chaos synchronization of the information security technology field, and the method is used for overcoming the disadvantages that the signal transmission rate in a CSK method is restricted by a synchronization time and the bandwidth utilization rate in a DCSK method is low. The method comprises the steps of modulating a chaos signal generated by a chaos system to generate a sending signal at a sending end, according to a binary information symbol value; recovering the chaos signal prior to the modulation by employing a chaos synchronization system at a receiving end; carrying out an operating of the recovered chaos signal prior to the modulation and the sending signal; and demodulating the binary information symbol value. By the secure communication method of utilizing the amplitude to realize chaos synchronization, a high-speed transmission of the information symbol is realized, meanwhile, the utilization rate of the transmission bandwidth is guaranteed.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a secret communication method for realizing chaos synchronization by using amplitude. Background technique [0002] Chaotic signals have characteristics such as ergodicity, aperiodicity, continuous broadband spectrum, and noise-like characteristics, which make them very suitable for secure communication systems. Since Pecora and Carroll realized the synchronization of two chaotic systems for the first time, the research on chaotic synchronization theory has made great progress, and the application of chaotic synchronization in secure communication has become a new research hotspot, and many chaotic communication methods have been proposed one after another. Among them, the chaotic keying method proposed by H.Dedieu and M.P.Kennedy has the most development prospect. This method has a strong ability to resist noise and parameter mismatch, and overcomes the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L7/00H04L9/00
Inventor 唐良瑞祈兵孙毅樊冰亢中苗
Owner NORTH CHINA ELECTRIC POWER UNIV (BAODING)