Robust chaos keying secret communication system and communication method, terminal and storage medium

A technology of secure communication and chaotic signals, which is applied in the field of chaotic security, can solve the problems of weak security of synthetic signals, return mapping analysis attacks, security enhancement, etc., to increase the bandwidth of chaotic carriers, resist return mapping attacks, and increase system delay line effect

Active Publication Date: 2021-06-08
CHINA UNIV OF GEOSCIENCES (WUHAN) +1
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the design of the adaptive controller at the receiving end is complex, and its practicability is limited
(3) Chaos keying has the attribute of spread spectrum, so it has better anti-noise performance, but it is vulnerable to the attack of return mapping analysis
[0005] (1) When the non-coherent chaotic security communication strategy is adopted, the receiver does not need to recover the chaotic carrier generated by the transmitter through high-quality chaotic synchronization, which has high anti-noise performance, but at the same time means that it does not need to consider Chaotic synchronization and parameter sensitivity, so the sensitivity of chaotic systems to initial values ​​and parameters is difficult to be directly and effectively applied to security enhancement
[0006] (2) Chaos concealment is easy to implement, but because the power change of the synthesized signal will lead to weak security, the power of the information signal must be much smaller than the power of the chaotic carrier, which makes it relatively sensitive to channel noise and has a high bit error rate
[0007] (3) When designing a chaotic parameter modulation communication system, it is necessary to design an adaptive controller with a certain mathematical form for a given chaotic system, which weakens its practicability to a certain extent
[0008] (4) Chaos keying essentially has the attribute of spread spectrum, so it has good anti-noise performance naturally, but it is vulnerable to the attack of return mapping analysis
[0009] (5) The basis for the realization of coherent chaotic secure communication decryption is chaotic synchronization. For this reason, both communication parties must use lasers with the same structural parameters to ensure high-quality synchronization, which brings obstacles to the practical application of laser chaotic secure communication.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Robust chaos keying secret communication system and communication method, terminal and storage medium
  • Robust chaos keying secret communication system and communication method, terminal and storage medium
  • Robust chaos keying secret communication system and communication method, terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0093] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0094] 1. For the problems existing in the prior art, the present invention provides a robust chaotic keying secure communication system, communication method, terminal and storage medium. The present invention will be described in detail below in conjunction with the accompanying drawings.

[0095] like figure 1 As shown, the neural network-based robust chaos keying secure communication device provided in the embodiment of the present invention includes:

[0096] Nonlinear transformation module 1, delay keying modulation module 2, plaintext electrical signal module 3, relationship establishment module 4, channel 5, first del...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of chaos secrecy, and discloses a robust chaos keying secure communication system and communication method, a terminal and a storage medium. At a sending end, a double-delay feedback chaos keying system is designed, one fixed delay feedback is used for guaranteeing the chaos characteristic of the system, the other controllable delay feedback is used for bearing 0 and 1 bit information, and uses a 0 or 1 state for controlling on / off state of delay feedback; the sending end respectively trains a neural network by using a chaotic signal output by a system and a delay signal thereof to establish two relation models in an on / off state of a delay keying modulation module. At a receiving end, segmented verification is performed on the mapping relation between the modulated chaotic signal and the delay signal by using the two models, and decryption is performed on the premise of not recovering the chaotic carrier of the sending end. The secure communication system based on robust chaos keying comprises a nonlinear transformation module, a delay keying modulation module, a plaintext electric signal module, a relation model establishment module, a channel, a first delay prediction module, a second delay prediction module, an analog-to-digital conversion module, a clock control module, a segmentation similarity comparison module and a demodulation module. The method can effectively resist the return mapping attack for chaos keying, and provides possibility for secure transmission under severe communication conditions.

Description

technical field [0001] The invention belongs to the technical field of chaos security, and in particular relates to a robust chaos keying security communication system, a communication method, a terminal and a storage medium. Background technique [0002] Since the optical chaos secure communication with a communication rate of 1Gb / s was realized in the 120km metropolitan area network of Athens in 2005, the research on optical chaos secure communication has attracted worldwide attention and has made great progress. , security have been significantly improved, and gradually become one of the most feasible physical layer encryption methods. A large number of experiments have realized and reported long-distance (greater than 100km) high-speed optical fiber chaotic secure communication. It is worth noting that in some practical communication environments, such as wireless communication, underwater communication and free space communication, signal degradation will inevitably oc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L27/00
CPCH04L9/001H04L27/001Y02D30/50
Inventor 高孝婧陈庆李珊曾德泽程孟凡
Owner CHINA UNIV OF GEOSCIENCES (WUHAN)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products