High-security transmission method based on three-dimensional constellation dual encryption

A double encryption and secure transmission technology, applied in the field of communication, can solve problems such as seldom considering three-dimensional or even higher dimensions, and the encryption method is not flexible enough to achieve the effect of improving transmission capacity, high gain index, and improving security performance

Active Publication Date: 2020-10-30
NANJING UNIV OF INFORMATION SCI & TECH
View PDF1 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At the same time, most traditional chaotic systems encrypt the physical layer based on two-dimensional QAM constellation diagrams. The positions of the constellation points are relatively fixed, and the encryption method is not flexible enough.
Most of the current research is done in 2D constellation diagrams, rarely considering 3D or even higher dimensions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • High-security transmission method based on three-dimensional constellation dual encryption
  • High-security transmission method based on three-dimensional constellation dual encryption
  • High-security transmission method based on three-dimensional constellation dual encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] A high-security transmission method based on three-dimensional constellation double encryption described in this embodiment, the flow chart is as follows figure 1 shown, including the following steps:

[0027] (1) Serial-to-parallel conversion is performed on the binary data at the transmitter, and the one-dimensional data stream is converted into three-dimensional data for transmission.

[0028] (2) Constellation mapping is performed on the 3D data, and the original data flow is mapped to the 3D constellation diagram to form constellation points. The model of the 3D constellation diagram is as follows: figure 2 As shown, the number of constellation points in the figure is 8, and one constellation point in the bit stream corresponds to three bits. The constellation gain index of the three-dimensional constellation diagram is:

[0029]

[0030] Among them, d min (C) represents the minimum Euclidean distance in the constellation diagram, and P(C) represents the ave...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a high-security transmission method based on three-dimensional constellation dual encryption. The method comprises the following steps ofperforming serial-parallel conversion on binary data of a transmitting end,performing constellation mapping on the three-dimensional data to form constellation points,generating a constellation point displacement vector and a rotation vector by using a chaotic sequence of the Chua's chaotic model, and performing displacement transformation and rotation transformation on the three-dimensional constellation point,processing the encryptedthree-dimensional signal by utilizing three-dimensional carrier-free amplitude phase modulation, superposing the processed three-dimensional signal into a single-path signal, and transmitting the single-path signal in a channel,and demodulating the received signal at a receiving end to finally obtain original data. A Chua's circuit model is utilized to generate a chaotic sequence to perform displacement and rotation change on the position of a constellation point, so that twice encryption of a constellation diagram is realized, and the safety performance of the system is effectively improved;and the transmission capability of the system is effectively improved by utilizing the high gain index and the high anti-noise performance of the constellation.

Description

technical field [0001] The invention relates to optical transmission technology in the communication field, in particular to a high-security transmission method based on three-dimensional constellation double encryption. Background technique [0002] With the rapid development of 5G, 4K video, cloud computing and other services, the communication field will face a wider space, more new space needs to be expanded, and more new services will be developed. The huge demand for information capacity makes communication security issues have attracted increasing attention. [0003] Traditional encryption methods based on advanced layers cannot effectively resist physical layer attacks such as interception and illegal eavesdropping, and encryption processing based on advanced layers does not have the characteristics of high speed and low delay, so it is difficult to meet the current needs of high-speed optical communication. The current method for improving the security of the physi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00H04L9/14H04L9/16
CPCH04L9/001H04L9/14H04L9/16
Inventor 刘博忻向军任建新毛雅亚陈帅东王瑞春沈磊李良川周锐王光全吴泳锋孙婷婷赵立龙
Owner NANJING UNIV OF INFORMATION SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products