Coding vector encryption based secure network coding method

A technology of encoding vectors and encoding methods, which is applied in the direction of public keys for secure communication, etc., can solve the problems of increased calculation and large number of encryptions, and achieve the effects of reducing the amount of encryption, ensuring integrity, and reducing complexity

Inactive Publication Date: 2013-08-21
BEIJING UNIV OF POSTS & TELECOMM
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In terms of secure network coding, there have been multiple implementations, but the following problems still exist in the prior art: using cryptographic encryption to realize the confidentiality of network coding, this method is certainly safe, but due to the large amount of encryption required, In the process of encryption and decryption, the amount of calculation is also greatly increased; the method of not using encryption to achieve confidentiality, this method will limit the eavesdropper's eavesdropping ability to certain links, and it will be powerless against opponents with strong eavesdropping capabilities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Coding vector encryption based secure network coding method
  • Coding vector encryption based secure network coding method
  • Coding vector encryption based secure network coding method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] Here, first for Figure three In the classic butterfly network topology shown, a simple implementation method is given, and then generalized to the general form, and secure network coding is also implemented using the method of encrypting coding vectors. There are three types of data packets in the network, which are marked as PACKET1, PACKET2, and PACKET3 in the figure. PACKET3 is a linear combination of PACKET1 and PACKET2.

[0031] According to the introduction of the specific implementation process above, the check code can be obtained at the source S The loads obtained are Z 1 = P 11 (d 11 x 1 +d 12 x 2 )+p 12 (d 21 x 1 +d 22 x 2 ),Z 2 = P 21 (d 11 x 1 +d 12 x 2 )+p 22 (d 21 x 1 +d 22 x 2 ), the encoding vector P will be transmitted 2 =(p 11 p 12 ) And P 2 =(p 21 p 22 ) Are placed at the head of the package, D 1 =(d 11 d 12 ) Encrypted as C 1 =(c 11 c 12 ), D 2 =(d 21 d 22 ) Without encryption, replace C 1 And D 2 Into the second part of the package, and separate t...

Embodiment 2

[0037] Such as Figure Four As shown, the present invention is also applicable to other atypical network topologies. Three channels of data are sent from the source to the three sinks. 1 , T 2 , T 3 Although in the classic butterfly network, only one channel of information can be encrypted to ensure the confidentiality of the network, in the illustrated topology, at least two channels of information need to be encrypted to ensure the confidentiality of the network. It can be seen that if only one channel of information is blocked Encryption, the eavesdropper can obtain the original information of the source through the other two channels of information, which is generalized to the following theorem:

[0038] Theorem: Assuming that the source of information is k and the maximum flow of the network is n, after verification, it is necessary to encrypt at least k-n+1 channels of information to ensure the confidentiality of the network. Here, only the amount of encrypted information ca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a coding vector encryption based secure network coding method, which is characterized in that the confidentiality of a network is achieved by using a method for encrypting coding vectors, wherein the coding vectors comprise two kinds of coding vectors (a transmission coding vector and a source coding vector) so as to achieve the purposes of carrying out network coding on transmission information and randomizing source information; through encrypting part of source coding vectors, the secrecy transmission of the information is ensured, and the encryption quantity is reduced as far as possible; and a check code is added into a packet, and then the integrity of the information is inspected. The method disclosed by the invention is not only applicable for the butterflytopology of classic network coding, but also applicable for general networks, and gives conditions required for achieving the secrecy of the general networks.

Description

Technical field [0001] The present invention relates to the field of communication, in particular to a secure network coding method based on code vector encryption. Background technique [0002] In the existing communication network, the role of the intermediate node is to store and forward, and the network is difficult to achieve the maximum flow requirement proposed by Shannon, until the proposal of network coding changes this situation. The purpose of network coding at the beginning is to increase the maximum flow of the network, but in the subsequent research process, it is found that network coding has a good prospect in network security. [0003] In the traditional multicast method, if an eavesdropper eavesdrops on a certain path of information in the network, it can restore the original data based on the obtained information, because the eavesdropped information is "meaningful", and "meaningful" means that the eavesdropped information is The information transmitted by the s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30
Inventor 顾仁涛张林纪越峰孙咏梅
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products