Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Chaotic secret communication system based on digital chaotic coding algorithm

A coding algorithm and technology of chaotic ciphers, which are applied in the field of secure communication systems, can solve problems such as digital chaotic cipher methods and technologies that have not been reported, and effectively generate complex and unsolved problems

Active Publication Date: 2013-09-11
SOUTHEAST UNIV
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (2) In the current chaotic security research, chaotic waves are transmitted in the channel. Because chaotic waves are sensitive to external factors such as noise, the technology of using chaos synchronization for information decryption in long-distance information transmission has not yet been solved.
[0005] (3) There are no secure communication schemes and technologies that use digital chaotic signals to encrypt digital information and use chaotic synchronization technology to decrypt
In particular, the digital chaos security technology that is compatible with modern digital information technology and has been applied has not been reported yet.
[0006] (4) The methods and techniques for effectively generating complex and practical digital chaos ciphers have not been reported yet
However, because the traditional algorithm password is not a one-time password, the risk of being cracked is very high. In fact, some traditional algorithm passwords have been cracked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Chaotic secret communication system based on digital chaotic coding algorithm
  • Chaotic secret communication system based on digital chaotic coding algorithm
  • Chaotic secret communication system based on digital chaotic coding algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] In order to describe the digital chaos security technology more clearly, then the figure introduces the principle and method of the digital chaos security technology in detail.

[0065] figure 1 It is a full-duplex two-way digital chaos security communication system of the invention technology. The information sender and the receiver each have two (same or different) chaotic networks for chaotic encryption and chaotic decryption. The encryption and decryption passwords of one party are generated by different chaotic networks, but the corresponding pair of both parties (such as figure 1 14 and 17 and 15 and 16) Encryption and decryption chaotic networks must have the same topology and dynamics. encryption function F i (i=1,2) satisfy F i f i -1 =I. The digital information M is encrypted by the chaotic cipher through the F function operation and the ciphertext C is transmitted to the receiving end through the channel (including digital multiplexer, modulator, demodu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A chaotic secret communication system based on a digital chaotic coding algorithm comprises (1) a channel used for enabling an information sending end A to be communicated with an information receiving end B and (2) digital chaotic networks connected with the channel and used for generating chaotic numerical codes. A function g1 is generated through codes of chaotic coding according to the selected chaotic numerical codes with certain lengths from the numerical codes generated in the digital chaotic networks and converted to a chaotic code k1(t), wherein an equation that k1(t)=g1(X, p) is satisfied. The digital chaotic networks are characterized in that (1) the digital chaotic networks are identical in topologic and dynamics structures, driven by common signals and in a chaotic synchronic state, the digital chaotic networks comprise a complex chaotic network which is of a random topologic structure, a regular network, a random network, a small-world network, a freedom scaling network and a module network; (2) the information sending end A is used for complex chaotic networks which generate the chaotic numerical codes and a kinetic equation is decrypted by a differential kinetic equation.

Description

1. Technical field: [0001] The invention relates to the technical field of electronic information security, in particular to a security communication system and method. 2. Background technology: [0002] In recent years, secure communication based on chaos synchronization has aroused great international research interest. People have done a lot of theoretical and experimental research on chaotic secure communication, and carried out high-speed long-distance (120km) experiments in commercial optical fiber communication networks. In the chaotic secure communication scheme, the transmitted information is covered by the chaotic signal at the sending end, and the chaotic signal is removed and decrypted at the receiving end by using chaos synchronization. Because the chaotic dynamics is extremely sensitive to the initial value conditions of the system and the dynamic parameters of the system, it is extremely difficult to reconstruct and reproduce the chaotic dynamics, so it is di...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00
Inventor 黄洪斌邱灿灿
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products