A method of secure information transmission based on photon noise aliasing multi-ary transformation

A photon noise and transmission method technology, applied in the field of optical information security transmission, can solve the problems of insufficient confidentiality, data content being cracked, and the inability to eliminate optical communication network eavesdropping, etc., so as to enhance the difficulty of analysis and realize the effect of information security transmission

Active Publication Date: 2022-04-15
GUILIN UNIV OF ELECTRONIC TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The main problems include: first, the signal encrypted by the algorithm is still a digital signal expressed by "0" and "1", which is transmitted in the optical fiber channel, and eavesdroppers can intercept the optical signal in the optical cable line and at the node, extract The encrypted digital signal is stored and analyzed in the electrical domain, which cannot eliminate the threat of "eavesdropping" on the ultra-high-speed and ultra-large-capacity information transmitted by the optical communication network; the second is the rapid development of quantum theory and supercomputing theory. Traditional The confidentiality based on the computational complexity of the encryption system appears to be stretched by the powerful cracking capabilities of future quantum computing, and there is a major hidden danger of "cracking" the data content transmitted in optical communications.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method of secure information transmission based on photon noise aliasing multi-ary transformation
  • A method of secure information transmission based on photon noise aliasing multi-ary transformation
  • A method of secure information transmission based on photon noise aliasing multi-ary transformation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0037] The sender will be as figure 2 The binary signal shown in (a) is jointly modulated with the random key signal as follows figure 2 The high-order signal shown in (b) utilizes the characteristic that the high-order signal is sensitive to noise, and hides the low-order signal in the photon noise, forming the figure 2 (c) For the secret signal shown in the solid line, due to the reciprocity of the optical fiber channel, the receiving end and the transmitting end measure the characteristics of the optical fiber channel by sending synchronization information, so as to realize the matching of the synchronizing signal at the transmitting end and the synchronizing signal at the receiving end to generate a synchronization key, and then generated as figure 2 The multi-ary system threshold judgment signal shown in (d) is finally compared bit by bit by receiving the confidential signal and the multi-ary system threshold judgment signal, and the recovery is as follows: figure ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an information security transmission method based on photon noise aliasing multi-ary transformation. Firstly, by sending synchronous information between the sending end and the receiving end to measure the characteristics of the optical fiber channel, the communication between the sending end and the receiving end is realized. The signal is synchronized, and then the sending end jointly modulates the binary signal and the random key signal into a high-order signal, and uses the characteristic that the high-order signal is sensitive to noise to hide the high-order signal in the photon noise to form a confidential signal; according to the optical fiber channel Reciprocity, the receiving end generates a key that is fully matched and synchronized with the sending end, produces a multi-ary threshold judgment signal, and finally compares the received secret signal and the multi-ary threshold judgment signal bit by bit to restore the correct received signal. The method is simple to implement, has good communication network compatibility, strong anti-eavesdropping ability, and low communication cost. It can be applied to information protection of backbone optical networks and dedicated optical networks, and has certain application potential in the field of optical network physical layer confidential communication.

Description

technical field [0001] The invention relates to the technical field of optical information security transmission, in particular to an information security transmission method based on photon noise aliasing multi-ary transformation. Background technique [0002] At present, in view of the characteristics of large information transmission capacity, long transmission distance, and wide distribution of optical fiber communication networks, a variety of eavesdropping methods have been developed internationally and are constantly being renovated. Coupling interception and fused tapered embedded coupling, etc., through these methods, a third party can make a part of the light leak from the conduction mode to the leakage mode without affecting normal communication, and restore the communication information through the captured leaked light. [0003] The security of the existing optical fiber communication network on the physical layer still relies on the traditional single electroni...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04B10/85H04B10/516H04B10/075H04L9/08
CPCH04B10/85H04B10/5167H04B10/075H04L9/0819
Inventor 樊亚仙李沼云刘欢苏煜佟成国陶智勇
Owner GUILIN UNIV OF ELECTRONIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products