Secure communication method based on memristor chaotic system

A technology of chaotic system and secure communication, applied in secure communication, transmission system, digital transmission system through chaotic signals, etc., can solve the problems of difficult to guarantee security, vulnerable to attack, etc., and achieve convenient physical implementation, difficult to crack, dimension high effect

Active Publication Date: 2017-01-04
南京广顺网络通信设备有限公司
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, there are many schemes using different chaotic systems to realize secure communication, but these schemes are mainly based on two-dimensional chaotic systems or three-dimensional chaotic systems, and some scholars have given corresponding methods for cracking secure communication, which are difficult to guarantee in terms of security and easy to implement. being attacked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure communication method based on memristor chaotic system
  • Secure communication method based on memristor chaotic system
  • Secure communication method based on memristor chaotic system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to better understand the technical solution of the present invention, the implementation manner is further described in detail below, and an application example is used to illustrate the specific implementation manner, but is not limited thereto.

[0025] The plaintext signal to be encrypted is designed as m(t)=3sin(0.1πt)+2cos(0.8πt), where t represents time. The overall structural block diagram of the inventive method is as figure 1 As shown, the specific implementation method can be divided into the following steps:

[0026] (1) Description of four-dimensional memristive chaotic system

[0027] a. Establish memristive chaotic driving system

[0028] The memristive chaotic driving system is selected as

[0029] x · 1 = 10 ( x ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a secure communication method based on a memristor chaotic system. The method comprises the following steps: establishing a driving system and a response system by using a four-dimensional memristor chaotic system, and designing a synchronous controller to enable the driving system and the response system to be in synchronization so as to ensure that the transmission of a to-be-encrypted plaintext signal can achieve a secure communication effect. According to the secure communication method disclosed by the invention, the disadvantages that a three-dimensional chaotic system is poor in security performance and does not transmit signals in a single variable mode can be overcome, and a new solution idea is provided for the secure communication transmission of the signals.

Description

technical field [0001] The invention relates to the field of chaotic system and secure communication, in particular to a method for secure communication based on memristive chaotic system. Background technique [0002] Chaos phenomenon is a seemingly irregular movement in a deterministic system. The system with chaotic characteristics has complex dynamic characteristics, and the chaotic signals generated by it are not repeatable and unpredictable. Chaotic phenomena have been extensively studied in physics, chemistry, information science, meteorology and other disciplines, and the great prospect of applying secure communication in chaotic systems has attracted more and more scholars' attention. In 1971, Cai Shaotang, a Chinese scientist at the University of California, Berkeley, theoretically predicted the fourth basic electronic component, the memristor, which described the relationship between charge and magnetic flux. block this device. In 2008, Hewlett-Packard's laborat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00
CPCH04L9/001
Inventor 楼旭阳段飞腾廖芳
Owner 南京广顺网络通信设备有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products