Safe transmission method based on interference of fountain code key encoding symbol
A coded symbol and safe transmission technology, applied in the field of safe transmission based on fountain code key coded symbol interference, can solve problems such as low safety and reliability, coded symbol interference, etc., achieve strong adaptability and practicability, and improve security Performance, Adaptable Effects
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0041] Such as figure 1 as shown, figure 1 It shows a flow chart of a secure transmission method based on fountain code key code symbol interference provided by Embodiment 1 of the present invention. The secure transmission method specifically includes the following steps:
[0042] Step S101, the sending end initializes the encoding and decoding parameters, including the number of original symbols, degree distribution, etc.;
[0043] Step S102, the sending end designs a judgment mechanism for key coded symbols;
[0044] In step S103, the encoder at the sending end continuously generates encoding symbols according to the originally input encoding and decoding parameters, and makes a key judgment on the generated encoding symbols according to the judgment mechanism in step S102;
[0045] Step S104, the transmission system modulates, transmits, and demodulates the coded symbols, and performs noise interference on the key coded symbols judged in step S103;
[0046] In step S105...
Embodiment 2
[0049] Such as figure 2 as shown, figure 2 It shows a flow chart of a secure transmission method based on fountain code key code symbol interference provided by Embodiment 2 of the present invention. The secure transmission method specifically includes the following steps:
[0050] Step S201, the sending end initializes the encoding and decoding parameters, including the number of original symbols, degree distribution, etc.;
[0051] Step S202, the sending end designs a decision mechanism for key coded symbols;
[0052] The specific implementation process of the step S202 is as follows:
[0053] In step S2021, the transmission system analyzes the real-time decoding process of the classic fountain code, that is, analyzes the change of the decoding symbol at the receiving end after receiving a certain coded symbol;
[0054] In step S2022, the system establishes the correlation between the degree value of the encoded symbol and the decoding result according to the analysis r...
Embodiment 3
[0066] Such as image 3 as shown, image 3 A schematic diagram showing the application of a fountain code key coding symbol interference-based secure transmission method provided by Embodiment 3 of the present invention in an actual communication scenario is shown. The figure shows a classic three-point eavesdropping channel model. The sending end sends private information to the legal receiving end. Because of the openness of the wireless channel, the eavesdropper can easily intervene in the legal channel to eavesdrop. The invention utilizes the independence characteristic of the coding symbols of the fountain code and combines the existing noise interference method to carry out focused interference reception on the key coding symbols of the fountain code, thereby ensuring the safety and reliability of communication. The method includes the following steps:
[0067] Step S301, the sending end initializes the encoding and decoding parameters, including the number of original...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


