Chaotic encryption method and system based on three-dimensional probability forming
A chaotic encryption and probability technology, applied in the field of optical communication transmission, can solve the problems of large available bandwidth, laser synchronization performance and bandwidth can not meet the demand, etc., to achieve the effect of large key space, good encryption effect and high reliability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
specific Embodiment 1
[0071] combine figure 1 , the present invention proposes a kind of chaotic encryption method based on three-dimensional probability shaping, and described chaotic encryption method comprises the following steps:
[0072] S1. After the serial-to-parallel transformation is performed on the data to be encrypted, the data is mapped to each constellation point formed by three-dimensional probability.
[0073] S2, using the chaotic model of Chua's circuit and the Lorentzian chaotic model to mask the 3D probabilistically shaped constellation diagram.
[0074] Among them, according to the different distances from each constellation point to the origin, the Chua's chaotic model and the Lorentz model are respectively used for masking, so that the three-dimensional probability shaped constellation map becomes two spherical shells.
[0075] The invention performs serial-to-parallel transformation and constellation mapping on the original binary data, then performs constellation masking, ...
specific Embodiment 2
[0110] One of the chaotic encryption methods based on three-dimensional probabilistic shaping is shown in the system structure diagram Figure 8 Shown: A continuous laser with a wavelength of 1551.72nm is used as a light source, and we use the original bit stream with a length of 8192 for further mapping, masking and filtering. The entire algorithm part is realized through digital signal processing in MATLAB, and a 50Gs / s digital-to-analog converter (DAC) is used to generate electrical signals. The generated encrypted signal and the light source are electro-optical modulated in the modulator to generate an optical signal. An optical filter (OF) is used for slicing, producing optical SSB modulation. Then, the optical signal enters the 25km single-mode fiber for transmission after passing through the erbium-doped fiber amplifier. At the receiving end, a variable optical attenuator (VOA) is placed after the fiber for bit error rate (BER) measurement. The optical signal is dire...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com