CN103580849A - Spatiotemporal chaos secret communication method - Google Patents

Spatiotemporal chaos secret communication method Download PDF

Info

Publication number
CN103580849A
CN103580849A CN201310511398.0A CN201310511398A CN103580849A CN 103580849 A CN103580849 A CN 103580849A CN 201310511398 A CN201310511398 A CN 201310511398A CN 103580849 A CN103580849 A CN 103580849A
Authority
CN
China
Prior art keywords
signal
formula
ocoml
frame
trellis system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310511398.0A
Other languages
Chinese (zh)
Inventor
任海鹏
白超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian University of Technology
Original Assignee
Xian University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian University of Technology filed Critical Xian University of Technology
Priority to CN201310511398.0A priority Critical patent/CN103580849A/en
Publication of CN103580849A publication Critical patent/CN103580849A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Error Detection And Correction (AREA)

Abstract

The invention discloses a spatiotemporal chaos secret communication method. The spatiotemporal chaos secret communication method comprises the steps that (1), the states of a space lattice of a one-way coupling image lattice system at a sending end are divided into odd-dimensional states and even-dimensional states, (2) displacement mapping iteration is carried out on a plaintext frame and vectors in the odd-dimensional states N times, (3) a transmission signal is obtained, (4) a driving signal of the one-way coupling image lattice system at the sending end is calculated, (5) a synchronizing signal of the one-way coupling image lattice system at a receiving end is obtained, (6) the displacement mapping iteration is decoded to obtain a decryption frame corresponding to the plaintext frame, and then spatiotemporal chaos secret communication is achieved. According to the spatiotemporal chaos secret communication method, signals are coded and decoded by means of spatiotemporal chaos, the spatial state values of the one-way coupling image lattice system are grouped, iteration and aliasing of a plaintext secret key are carried out, better confidentiality is achieved, the method can be achieved easily by means of a microprocessor, integration can be achieved easily.

Description

A kind of space-time chaos secret communication method
Technical field
The invention belongs to private communication technology field, relate to a kind of space-time chaos secret communication method.
Background technology
The appearance of computer and progressively universally make day by day information-based, society's networking day by day of epoch, information security and the privacy problem ever more important that seems.Chaos due to its to the essential characteristics such as the sensitiveness of initial value, interior randomness, broadband power spectrum make its in anti-interference, intercepting and capturing rate, signal is hidden and the aspect such as confidentiality has potential advantage, becomes the study hotspot in secure communication field.Along with chaotic communication successfully applies to commercial fiber channel, obtained higher transmission rate, the research of chaotic communication is gradually to practical development.Simultaneously, the research of the safety analysis of existing chaos encrypting method and attack technology is also subject to extensive concern, comprises use nonlinear prediction (NLD), return the decoding that the methods such as mapping, short-time zero-crossing rate, analysis of spectrum, generalized synchronization, the identification of self adaptation keying are carried out secure communication.Existing Development of Chaotic Secure Communication Method, security performance can't meet the requirement on utilization.
Summary of the invention
The object of this invention is to provide a kind of space-time chaos secret communication method, the chaos time sequence that shines upon trellis system generation by unidirectional couplings is encrypted cleartext information, secrete key signal and expressly dynamics and the statistical property of signal, increase and decode difficulty, security performance is got a promotion.
The technical solution adopted in the present invention is, a kind of space-time chaos secret communication method, the spatiality of unidirectional couplings being shone upon to trellis system generation is divided into very, occasionally ties up state vector as key sequence, key and plaintext obtain ciphertext signal through N displacement iteration, with this ciphertext signal, drive the unidirectional couplings reflection trellis system of transmitting terminal and receiving terminal to realize synchronously and modulate next state of chaotic system constantly simultaneously; Signal after encryption receives through common signal channel receiving end, and receiving terminal unidirectional couplings reflection trellis system can Complete Synchronization under the driving effect identical with transmitting terminal trellis system; Finally, the state vector after employing is synchronous, as decruption key, through N corresponding displacement iteration map, obtains the plaintext frame of transmission.
The invention has the beneficial effects as follows, utilize space-time chaos to carry out encoding and decoding to signal, unidirectional couplings is shone upon to the spatiality value grouping of trellis system, and carry out clear text key iteration aliasing, realize encryption and decryption, feature comprises: 1) in channel, transmission information does not comprise key and direct information expressly, can resist better the attack of the methods such as phase space reconfiguration, obtains better confidentiality; 2) ciphering process algorithm is relatively simple, is easy to microprocessor realization and integrated.
Accompanying drawing explanation
Fig. 1 is space-time chaos secret communication method theory diagram of the present invention;
Fig. 2 is the space-time chaos state diagram of the unidirectional couplings mapping trellis system in the inventive method;
Fig. 3 is that two unidirectional couplings in the inventive method are shone upon the trellis system state change map of the lower corresponding grid of sequence driving at one time;
Fig. 4 is that two unidirectional couplings in Fig. 3 are shone upon the trellis system error change figure of the lower corresponding the same space state of sequence driving at one time;
Fig. 5 is the displacement nonlinear mapping plot in the inventive method;
Fig. 6 is the sinusoidal signal transmitted signal in the inventive method;
Fig. 7 is the signal transmitting in the channel while sending signal in Fig. 6;
Fig. 8 is the decrypted signal of corresponding diagram 6 transmitted signals in the inventive method;
Fig. 9 is the primary signal in the synchronous transient process in the inventive method;
Figure 10 is the decrypted signal in the synchronous transient process in Fig. 9;
Figure 11 is while comprising noise in channel, the decrypted signal waveform that Fig. 6 transmitted signal is corresponding;
Figure 12 is the voice signal sending in the inventive method;
Figure 13 is the noisy ciphertext signal of tool transmitting in channel while sending Figure 12 signal;
Figure 14 is the decrypted signal of Figure 13;
Figure 15 is the waveform enlarged drawing that the voice primary signal when channel contains noise in the inventive method is conciliate cipher tone signal;
Figure 16 is the DSP experiment block diagram in the inventive method;
Figure 17 is the ciphertext signal in the DSP speech secure communication experiment in the inventive method;
Figure 18 is the primary signal in the DSP speech secure communication experiment in Figure 17;
Figure 19 is the decrypted signal in the DSP speech secure communication experiment in Figure 18.
Embodiment
Below in conjunction with the drawings and specific embodiments, the present invention is described in detail.
Space-time chaos secret communication method overall work process of the present invention is, the spatiality of unidirectional couplings being shone upon to trellis system generation is divided into very, occasionally ties up state vector as key sequence, key and plaintext obtain ciphertext signal through N displacement iteration, with this ciphertext signal, drive the unidirectional couplings reflection trellis system of transmitting terminal and receiving terminal to realize synchronously and modulate next state of chaotic system constantly simultaneously; Signal after encryption receives through common signal channel receiving end, and receiving terminal unidirectional couplings reflection trellis system can Complete Synchronization under the driving effect identical with transmitting terminal trellis system; Finally, the state vector after employing is synchronous, as decruption key, through N corresponding displacement iteration map, obtains the plaintext frame sending.
As Fig. 1, the model construction that space-time chaos secret communication method of the present invention relies on is, signal transmitting terminal and signal receiving end unidirectional couplings reflection trellis system are respectively provided with a m dimension coupled oscillator, be designated as respectively OCOML-L and OCOML-R, unidirectional couplings reflection trellis system (1) is under the effect of drive sequences, obtain space-time chaos, each is t constantly, completes a plaintext frame p t = [ p ( mt 2 + 1 ) , p ( mt 2 + 2 ) , . . . , p ( m ( t + 1 ) 2 ) ] Middle m/2 encryption expressly, obtains ciphertext frame v Rt = [ v R ( mt 2 + 1 ) , v R ( mt 2 + 2 ) , . . . , v R ( m ( t + 1 ) 2 ) ] , The driving signal that calculates transmitting terminal unidirectional couplings reflection next moment of trellis system is x t + 1 ( 0 ) = V R ( t + 1 ) = 1 ( m / 2 ) Σ l = 1 m / 2 v R ( mt 2 + l ) Be used for driving transmitting terminal unidirectional couplings reflection trellis system, the ciphertext frame receiving after transmission is
Figure BDA0000401864100000044
calculate
Figure BDA0000401864100000045
during as next, the drive receiving terminal unidirectional couplings of etching system reflection trellis system realizes synchronously, and the grid state after utilizing synchronously decrypts transmitted signal through the process contrary with transmitting terminal
Figure BDA0000401864100000046
Space-time chaos secret communication method of the present invention, utilizes above-mentioned model, according to following steps, specifically implements:
Step 1, the space lattice state of transmitting terminal unidirectional couplings reflection trellis system is divided into odd number peacekeeping Even-dimensional
The expression formula of encrypting end m dimension (establishing m is even number) unidirectional couplings mapping trellis system OCOML-L is suc as formula (1):
x 0(i)=init(i)
x t(0)=d(t)
x t+1(i)=(1-ε i)f[x t(i)]+ε if[x t(i-1)]’ (1)
i=1,2...,m
By t (t >=0) constantly m the spatiality of OCOML-L be divided into two groups of odd number peacekeeping Even-dimensionals, the every group of vector that is length m/2, is expressed as:
Odd number dimension state vector: v 2t=[ax t(1), ax t(3) ..., ax t(m-1)],
Even-dimensional state vector: v 1t=[ax t(2), ax t(4) ..., ax t(m)],
Wherein, x t(i) be i locus of transmitting terminal at t state constantly, gain a is a constant that is less than 1,
Utilize formula (1) to produce space-time chaos, f in the embodiment of the present invention (x) is taken as Logistic mapping, that is: f (x)=4x (1-x), stiffness of coupling ε i=0.85 (i=1,2 ..., m); Choose unidirectional couplings oscillator quantity m=10, its initial value init l=[0.3,0.6,0.2,0.9,0.6,0.8,0.1,0.3,0.4,0.2], as drive sequences x t(0) for being chosen as while obeying equally distributed random sequence, obtain the space-time chaos state diagram (see figure 2) of unidirectional couplings reflection trellis system, the coordinate i in Fig. 2 is space dimensionality, and t is discrete time, x t(i) be state amplitude.
If transmitting terminal OCOML-L model is formula (2):
x t+1(i)=(1-ε i)f[x t(i)]+ε if[x t(i-1)] (2)
Receiving terminal OCOML-R model is formula (3):
y t+1(i)=(1-ε i)f[y t(i)]+ε if[y t(i-1)] (3)
In parameter in above-mentioned OCOML-L and OCOML-R, the definition of parameter is in full accord;
As stiffness of coupling ε i=0.85 (i=1,2 ..., in the time of m), two systems are at identical 0 bit time sequence (x t(0)=y t(0) under driving), can reach synchronous, in order to prove this point, it is init that above-described embodiment is established transmitting terminal unidirectional couplings oscillator initial value l=[0.3,0.6,0.2,0.9,0.6,0.8,0.1,0.3,0.4,0.2], establish receiving terminal unidirectional couplings oscillator initial value is init simultaneously r=[0.1,0.4,0.8,0.6,0.3,0.9,0.2,0.7,0.5,0.8], obeys equally distributed random sequence if drive sequences is chosen as, and can realize the synchronous of two unidirectional couplings mapping trellis system.
Fig. 3 is the tenth spatiality temporal evolution figure of two unidirectional couplings mapping trellis system, and Fig. 4 is the synchronous error of these two corresponding spatialities.From Fig. 3 and Fig. 4, can find out, under the effect of identical drive sequences, can Complete Synchronization through the corresponding spatiality of very short time latter two systems.
Suppose to be engraved under the driving of identical drive sequences 0 to t-1 time, transmitting terminal is realized and being synchronizeed with receiving terminal unidirectional couplings reflection trellis system, by t (t >=0) constantly m the spatiality of OCOML-L be divided into two groups of odd number peacekeeping Even-dimensionals, the every group of vector that is length m/2, is expressed as:
Odd number dimension state vector: v 2t=[ax t(1), ax t(3) ..., ax t(m-1)]
Even-dimensional state vector: v 1t=[ax t(2), ax t(4) ..., ax t(m)]
Wherein, x t(i) be i locus of transmitting terminal at t state constantly, gain a is a constant that is less than 1;
In above-described embodiment, establish a=0.4, the vector that t encrypts the individual spatiality formation of end m (m=10) is constantly x t=[0,0.858,0.912,0.598,0.45,0.912,0.598,0.432,0.858,0.912], odd number peacekeeping Even-dimensional is respectively: odd number dimension state vector: v 2t=[0,0.3648,0.18,0.2392,0.3432],
Even-dimensional state vector: v 1t=[0.3432,0.2392,0.3648,0.1728,0.3648];
Step 2, plaintext frame and odd number dimension state vector is carried out to the iteration of maps that is shifted for N time
Take out successively m/2 expressly as t plaintext frame constantly to be encrypted, expression formula is:
p t = [ p ( mt 2 + 1 ) , p ( mt 2 + 2 ) , . . . , p ( m ( t + 1 ) 2 ) ] , Subscript t is consistent with the discrete time of unidirectional couplings mapping trellis system,
M/2 element in plaintext frame tieed up to corresponding being done as follows in state vector with t moment odd number:
E(p t, v 2t), wherein, every couple of element computing function e (z 1, z 2) suc as formula (4):
Figure BDA0000401864100000061
F 1(z 1, z 2) be following nonlinear function formula (5):
f 1 ( z 1 , z 2 ) = ( z 1 + z 2 ) + 2 h , - 2 h &le; ( z 1 + z 2 ) &le; - h ( z 1 + z 2 ) , - h < ( z 1 + z 2 ) < h ( z 1 + z 2 ) - 2 h , h &le; ( z 1 + z 2 ) &le; 2 h - - - ( 5 )
As shown in Figure 5, the mapping that is shifted, e (z 1, z 2) be N iterative cryptographic function f 1, N is any positive integer, selects suitable threshold value h to make z 1and z 2codomain scope in (h, h), have:
z i > h z i = h z i < - h z i = - h i = 1,2 - - - ( 6 )
For above-described embodiment, first suppose that transmitted signal is the sinusoidal signal of 0.2 cycles 2 of amplitude π, the sampling period is 100Hz, expressly signal is:
P=[0,0.0126,0.0251,0.0375,0.0497,0.0618,0.0736,0.0852,0.0964,0.1072 ..., 0.2,0.1996 ...] take out successively m/2 and expressly form expressly frame p t = [ p ( mt 2 + 1 ) , p ( mt 2 + 2 ) , . . . , p ( m ( t + 1 ) 2 ) ] , Suppose that t plaintext frame is constantly p t=[0,0.0126,0.0251,0.0375,0.0497], by the plaintext frame with m/2 element and t, m/2 element is corresponding in odd number dimension state vector constantly according to formula (4), operates, and gets h=0.7, and N=30, obtains e (p t, v 2t)=[0 ,-0.2434 ,-0.1749,0.2135,0.545];
Step 3, acquisition signal transmission
The ciphertext frame transmitting in channel is:
v Rt = 1 2 ( v 1 t - e ( p t , v 2 t ) + b ) - - - ( 7 )
Wherein, the corresponding discrete time of t, b is a constant that is less than 1, the ciphertext frame of transmission comprises m/2 element equally v Rt = [ v R ( mt 2 + 1 ) , v R ( mt 2 + 2 ) , . . . , v R ( m ( t + 1 ) 2 ) ] , So far, utilize OCOML-L t m spatiality value constantly completed to a frame (
Figure BDA0000401864100000075
individual) encryption expressly, formed a ciphertext frame;
For above-described embodiment, by formula (7), get b=0.4, the ciphertext frame that obtains transmission is:
v Rt = [ v R ( mt 2 + 1 ) , v R ( mt 2 + 2 ) , . . . , v R ( m ( t + 1 ) 2 ) ] = [ 0.3716,0.4413,0.4699,0.1797,0.1095 ] ;
Step 4, calculating transmitting terminal unidirectional couplings mapping trellis system are at t+1 driving signal constantly
Driving signal at t+1 moment OCOML-L is x t + 1 ( 0 ) = V R ( t + 1 ) = 1 ( m / 2 ) &Sigma; l = 1 m / 2 v R ( mt 2 + l ) ,
For above-described embodiment, according to above-mentioned computational methods, the driving signal that constantly sends coupling reflection grid OCOML-L at t+1 is x t + 1 ( 0 ) = V R ( t + 1 ) = 1 ( m / 2 ) &Sigma; l = 1 m / 2 v R ( mt 2 + l ) = 0.3144 ;
The synchronous signal obtaining of step 5, receiving terminal unidirectional couplings mapping trellis system
Receiving terminal has m dimension unidirectional couplings mapping trellis system OCOML-R equally, and its parameter is identical with OCOML-L, and its system model is suc as formula (3), and the driving signal of OCOML-R is:
y t + 1 ( 0 ) = V ~ R ( t + 1 ) = 1 ( m / 2 ) &Sigma; l = 1 m / 2 v ~ R ( mt 2 + l ) , Wherein v ~ R ( mt 2 + l ) For v R ( mt 2 + l ) By the reception signal after transmission,
For above-described embodiment, due to two unidirectional couplings reflection trellis system Complete Synchronizations, the individual grid state of m (m=10) of receiving terminal unidirectional couplings Map Lattices system is identical with transmitting terminal grid state, i.e. y t=[0,0.858,0.912,0.598,0.45,0.912,0.598,0.432,0.858,0.912],
Figure BDA0000401864100000084
Step 6, deciphering displacement iteration of maps
The spatiality of t moment OCOML-R is also pressed to odd number peacekeeping Even-dimensional separately, obtains state vector:
Odd number dimension state vector is: v ~ 2 t = [ a y t ( 1 ) , a y t ( 3 ) , . . . , a y t ( m - 1 ) ] ,
Even-dimensional state vector is:
Figure BDA0000401864100000086
parameter a in this two formula is identical with step 1,
By the ciphertext frame receiving
Figure BDA0000401864100000087
do lower rank transformation:
w t = v ~ 1 t - ( 2 v ~ Rt - b ) , - - - ( 8 )
Equally to vector w t = [ w ( mt 2 + 1 ) , w ( mt 2 + 2 ) , . . . , w ( m ( t + 1 ) 2 ) ] A middle m/2 element is with h value amplitude limit:
w ( mt 2 + l ) > h w ( mt 2 + l ) = h w ( mt 2 + l ) < - h w ( mt 2 + l ) = - h l = 1,2 , . . . , m 2 , - - - ( 9 )
The plaintext of deciphering is:
Figure BDA0000401864100000091
F 1, N, h is identical with the value of transmitting terminal,
For above-described embodiment, can access:
Odd number dimension state vector: v ~ 2 t = [ 0,0.3648,0.18,0.2392,0.3432 ] ,
Even-dimensional state vector: v ~ 1 t = [ 0.3432,0.2392,0.3648,0.1728,0.3648 ] ,
By the ciphertext frame receiving do lower rank transformation:
w t = v ~ 1 t - ( 2 v ~ Rt - b ) ,
Plaintext frame for above-described embodiment, obtains w t=[0 ,-0.2434 ,-0.1749,0.2135,0.5457];
Equally to vectorial w tm/2 element with h value amplitude limit:
w ( mt 2 + l ) > h w ( mt 2 + l ) = h w ( mt 2 + l ) < - h w ( mt 2 + l ) = - h l = 1,2 , . . . , m 2 ,
The plaintext of deciphering is:
For the plaintext frame of above-described embodiment, f 1, N, h is identical with the value of transmitting terminal, obtains
Figure BDA0000401864100000098
so just, obtained the plaintext frame p that t sends constantly tcorresponding deciphering frame
Figure BDA0000401864100000099
.
By that analogy, along with the evolution of the discrete time t of unidirectional couplings oscillator, above-mentioned encrypting and decrypting process can complete the encrypted transmission of more plaintext frames.
Fig. 6-Fig. 8 is the result figure that the sinusoidal signal of the present embodiment sends, and wherein Fig. 6 is transmitted signal, and Fig. 7 is the signal transmitting in channel, and Fig. 8 is decrypted signal.From Fig. 6-Fig. 8, in visible channel, signal transmission waveform is completely different from original signal waveform, and primary signal and decrypted signal waveform are almost identical.
Fig. 9-Figure 10 is the enlarged drawing in the time period of 0s to 5s for t, and Fig. 9 is primary signal, and Figure 10 is decrypted signal, and visible decrypted signal is identical after synchronous transient process with original signal.When actual secure communication, can wait for after synchronous transient process completes and carry out again useful data transmission.
Consider to contain noise in actual channel, therefore in channel, adding scope is (0.05A, even noise 0.05A) (A is the amplitude of transmission sinusoidal signal), as shown in figure 11, Figure 11 is the decrypted signal waveform that Fig. 6 transmitted signal obtains while there is even noise in channel to result.Can find out, even if still can recover preferably after adding noise expressly.Although noise can produce and disturb the plaintext recovering, restoring signal can the impact to reduce to disturb by simple filtering.
The one section of speech data of take carries out test transmission as example, further verifies the validity of this programme, obtains result with reference to Figure 12-Figure 14, and wherein Figure 12 is the voice signal of transmission, and Figure 13 is the ciphertext signal transmitting in channel, and Figure 14 is corresponding decrypted signal.Interchannel noise is even noise, and its amplitude is signal transmission maximum amplitude 10%.After synchronously completing, send waveform that primary signal and (existing in channel in the situation of above-mentioned noise) obtain decrypted signal as shown in figure 15.As seen from Figure 15, original waveform is basic identical with deciphering waveform overall trend, although add the deciphering waveform after noise to have certain deviation with original waveform, for the almost not impact of auditory effect that decrypts the voice of signal.
Adopt the Floating-point DSP TMS320C6713DSK of TI company to carry out hardware experiments, experimental principle block diagram as shown in figure 16.At transmitting terminal, voice signal is by A/D sampling and the coding of Codec, primary voice data is sent into DSP, in DSP, move cryptographic algorithm of the present invention, signal after encryption is through voice-grade channel transmission, receiving terminal receives after signal transmission, and recycling decipherment algorithm is realized deciphering in DSP, by the D/A recovery voice signal of Codec.Experimental result is as shown in Figure 17-19.Figure 17 is ciphertext signal, the primary signal of Figure 18 for sending, and Figure 19 is decrypted signal.Relatively Figure 18 figure and Figure 19 figure can find out, primary signal and decrypted signal are almost identical, completely different from the ciphertext signal transmitting, and the signal transmitting in channel has been covered cleartext information completely, and sounding is exactly noise.Result has proved that the empty chaos speech security of now the present invention method had both had good confidentiality, can recover original signal again well.

Claims (3)

1. a space-time chaos secret communication method, it is characterized in that, the spatiality of unidirectional couplings being shone upon to trellis system generation is divided into very, occasionally ties up state vector as key sequence, key and plaintext obtain ciphertext signal through N displacement iteration, with this ciphertext signal, drive the unidirectional couplings reflection trellis system of transmitting terminal and receiving terminal to realize synchronously and modulate next state of chaotic system constantly simultaneously; Signal after encryption receives through common signal channel receiving end, and receiving terminal unidirectional couplings reflection trellis system can Complete Synchronization under the driving effect identical with transmitting terminal trellis system; Finally, the state vector after employing is synchronous, as decruption key, through N corresponding displacement iteration map, obtains the plaintext frame sending.
2. space-time chaos secret communication method according to claim 1, is characterized in that, specific implementation process is, first adopts a kind of unidirectional couplings mapping trellis system model, suc as formula (1):
x 0(i)=init(i)
x t(0)=d(t)
x t+1(i)=(1-ε i)f[x t(i)]+ε if[x t(i-1)]’ (1)
i=1,2...,m
Wherein, t represents discrete time, and m is the space dimensionality of unidirectional couplings mapping trellis system, and init (i) is space i dimension grid initial value, ε ifor stiffness of coupling satisfied 0 < ε i< 1, x t(0)=d (t) is the drive sequences of position 0 grid, t=0, and 1,2..., f (x) is non-linear chaotic maps operator,
Unidirectional couplings mapping trellis system OCOML-L and the OCOML-R of transmitting terminal and receiving terminal are expressed as:
x t+1(i)=(1-ε i)f[x t(i)]+ε if[x t(i-1)], (2)
y t+1(i)=(1-ε i)f[y t(i)]+ε if[y t(i-1)], (3)
The definition of the middle parameter of the parameter in formula (3) and formula (2) is in full accord, as stiffness of coupling ε iwhen identical, two systems shown in formula (2) and formula (3) are at identical 0 bit time sequence (x t(0)=y t(0) driving) is issued to synchronously, and this time series is called drive sequences,
Model structure based on above-mentioned, this space-time chaos secret communication method, according to following steps, implement:
Step 1, the spatiality of transmitting terminal unidirectional couplings mapping trellis system is divided into odd number peacekeeping Even-dimensional
Encrypt end m dimension unidirectional couplings mapping trellis system OCOML-L suc as formula shown in (1), establishing m is even number, by t constantly m the grid state of OCOML-L be divided into two groups of odd number peacekeeping Even-dimensionals, the moment, t was more than or equal to 0, the every group of vector that is length m/2, is expressed as:
Odd number dimension state vector: v 2t=[ax t(1), ax t(3) ..., ax t(m-1)],
Even-dimensional state vector: v 1t=[ax t(2), ax t(4) ..., ax t(m)],
Wherein, x t(i) be i locus of transmitting terminal at t state constantly, gain a is less than 1 constant;
Step 2, plaintext frame and odd number dimension state vector is carried out to the iteration of maps that is shifted for N time
Take out successively m/2 expressly as t plaintext frame constantly to be encrypted, expression formula is:
p t = [ p ( mt 2 + 1 ) , p ( mt 2 + 2 ) , . . . , p ( m ( t + 1 ) 2 ) ] , Subscript t is consistent with the discrete time of unidirectional couplings mapping trellis system,
M/2 element in plaintext frame tieed up to corresponding being done as follows in state vector with t moment odd number: e (p t, v 2t), wherein, every couple of element computing function e (z 1, z 2) suc as formula (4):
Figure FDA0000401864090000022
F 1(z 1, z 2) be following nonlinear function formula (5):
f 1 ( z 1 , z 2 ) = ( z 1 + z 2 ) + 2 h , - 2 h &le; ( z 1 + z 2 ) &le; - h ( z 1 + z 2 ) , - h < ( z 1 + z 2 ) < h ( z 1 + z 2 ) - 2 h , h &le; ( z 1 + z 2 ) &le; 2 h , - - - ( 5 )
The mapping that is shifted, e (z 1, z 2) be N iterative cryptographic function f 1, N is any positive integer, selects suitable threshold value h to make z 1and z 2codomain scope in (h, h), have:
z i > h z i = h z i < - h z i = - h , i = 1,2 ; - - - ( 6 )
Step 3, acquisition signal transmission
The ciphertext frame transmitting in channel is:
v Rt = 1 2 ( v 1 t - e ( p t , v 2 t ) + b ) , - - - ( 7 )
The corresponding discrete time of t wherein, b is less than 1 constant, and the ciphertext frame of transmission comprises m/2 element equally v Rt = [ v R ( mt 2 + 1 ) , v R ( mt 2 + 2 ) , . . . , v R ( m ( t + 1 ) 2 ) ] , So far, utilize OCOML-L to complete a frame at t m state value constantly
Figure FDA0000401864090000034
the encryption of individual plaintext, has formed a ciphertext frame;
Step 4, calculating transmitting terminal unidirectional couplings mapping trellis system are at t+1 driving signal constantly
Driving signal at t+1 moment OCOML-L is:
x t + 1 ( 0 ) = V R ( t + 1 ) = 1 ( m / 2 ) &Sigma; l = 1 m / 2 v R ( mt 2 + l ) ;
The synchronous signal obtaining of step 5, receiving terminal unidirectional couplings mapping trellis system
Receiving terminal has m dimension unidirectional couplings mapping trellis system OCOML-R equally, and its parameter is identical with OCOML-L, and its system model is suc as formula (3), and the driving signal of OCOML-R is:
y t + 1 ( 0 ) = V ~ R ( t + 1 ) = 1 ( m / 2 ) &Sigma; l = 1 m / 2 v ~ R ( mt 2 + l ) , Wherein v ~ R ( mt 2 + l ) For v R ( mt 2 + l ) By the reception signal after transmission;
Step 6, deciphering displacement iteration of maps
The spatiality of t moment OCOML-R is also separately obtained to state vector by odd number peacekeeping Even-dimensional:
Odd number dimension state vector is: v ~ 2 t = [ a y t ( 1 ) , a y t ( 3 ) , . . . , a y t ( m - 1 ) ] ,
Even-dimensional state vector is: v ~ 1 t = [ a y t ( 2 ) , a y t ( 4 ) , . . . , a y t ( m ) ] , Parameter a in this two formula is identical with step 1;
By the ciphertext frame receiving
Figure FDA0000401864090000041
do lower rank transformation:
w t = v ~ 1 t - ( 2 v ~ Rt - b ) , - - - ( 8 )
Equally to vector w t = [ w ( mt 2 + 1 ) , w ( mt 2 + 2 ) , . . . , w ( m ( t + 1 ) 2 ) ] A middle m/2 element is with h value amplitude limit:
w ( mt 2 + l ) > h w ( mt 2 + l ) = h w ( mt 2 + l ) < - h w ( mt 2 + l ) = - h l = 1,2 , . . . , m 2 , - - - ( 9 )
The plaintext of deciphering is:
Figure FDA0000401864090000045
F 1, N, h is identical with the value of transmitting terminal, has obtained deciphering frame corresponding to plaintext frame that t sends constantly.
3. space-time chaos secret communication method according to claim 2, is characterized in that: in described formula (1), f (x) is taken as Logistic mapping, that is: f (x)=4x (1-x), stiffness of coupling ε i=0.85, i=1,2 ..., m.
CN201310511398.0A 2013-10-25 2013-10-25 Spatiotemporal chaos secret communication method Pending CN103580849A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310511398.0A CN103580849A (en) 2013-10-25 2013-10-25 Spatiotemporal chaos secret communication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310511398.0A CN103580849A (en) 2013-10-25 2013-10-25 Spatiotemporal chaos secret communication method

Publications (1)

Publication Number Publication Date
CN103580849A true CN103580849A (en) 2014-02-12

Family

ID=50051847

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310511398.0A Pending CN103580849A (en) 2013-10-25 2013-10-25 Spatiotemporal chaos secret communication method

Country Status (1)

Country Link
CN (1) CN103580849A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104680476A (en) * 2015-03-03 2015-06-03 河南大学 Color image lossless encryption method on basis of two-dimensional discrete wavelet transform and spatiotemporal chaos
CN105119706A (en) * 2015-09-09 2015-12-02 *** Self-adaptive synchronization method and circuit for Lorenz hyperchaotic system including y squaredbased on memristor
CN106301736A (en) * 2016-08-04 2017-01-04 中国地质大学(武汉) A kind of space-time coding method based on OCML and device
CN108449297A (en) * 2018-02-08 2018-08-24 西安理工大学 PHASE SEPARATION differential Chaos Shift Keying communication means based on hybrid system
CN108650074A (en) * 2018-05-08 2018-10-12 烟台大学 A kind of single channel chaos system encryption communication method based on parameter identification
CN110601813A (en) * 2019-09-17 2019-12-20 湖南科技大学 Chaotic secret communication method based on signal high-dimensional decomposition
CN110661572A (en) * 2019-09-24 2020-01-07 北京无线电计量测试研究所 Novel microwave frequency transmission device
CN113190865A (en) * 2021-05-25 2021-07-30 华中科技大学 Coupled chaotic system and application thereof
CN115618498A (en) * 2022-11-08 2023-01-17 中国空气动力研究与发展中心计算空气动力研究所 Prediction method, device, equipment and medium for cross-basin flow field of aircraft

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101345615A (en) * 2008-08-05 2009-01-14 广东工业大学 Design method for chaos digital secret communication system based on FPGA
CN101414904A (en) * 2008-11-04 2009-04-22 北京师范大学 Hash function method with single-wheel time anti-collision
CN102904715A (en) * 2012-09-27 2013-01-30 北京邮电大学 Parallel pseudorandom bit generator based on coupling chaotic mapping system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101345615A (en) * 2008-08-05 2009-01-14 广东工业大学 Design method for chaos digital secret communication system based on FPGA
CN101414904A (en) * 2008-11-04 2009-04-22 北京师范大学 Hash function method with single-wheel time anti-collision
CN102904715A (en) * 2012-09-27 2013-01-30 北京邮电大学 Parallel pseudorandom bit generator based on coupling chaotic mapping system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
房建等: "基于时空混沌序列的数字图像加密方法", 《东南大学学报(自然科学版)》, vol. 33, 30 September 2003 (2003-09-30) *
殷佳: "混沌同步及其在保密通信中的应用研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》, 15 August 2007 (2007-08-15), pages 136 - 145 *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104680476B (en) * 2015-03-03 2017-11-17 河南大学 The lossless encryption method of coloured image based on two-dimensional discrete wavelet conversion and space-time chaos
CN104680476A (en) * 2015-03-03 2015-06-03 河南大学 Color image lossless encryption method on basis of two-dimensional discrete wavelet transform and spatiotemporal chaos
CN105119706A (en) * 2015-09-09 2015-12-02 *** Self-adaptive synchronization method and circuit for Lorenz hyperchaotic system including y squaredbased on memristor
CN106301736B (en) * 2016-08-04 2019-07-23 中国地质大学(武汉) A kind of space-time coding method and device based on OCML
CN106301736A (en) * 2016-08-04 2017-01-04 中国地质大学(武汉) A kind of space-time coding method based on OCML and device
CN108449297A (en) * 2018-02-08 2018-08-24 西安理工大学 PHASE SEPARATION differential Chaos Shift Keying communication means based on hybrid system
CN108449297B (en) * 2018-02-08 2020-09-25 西安理工大学 Phase separation differential chaos keying communication method based on hybrid system
US11075783B2 (en) 2018-02-08 2021-07-27 Xi'an University Of Technology Communication method for phase separation differential chaos shift keying based on second order hybrid system
CN108650074A (en) * 2018-05-08 2018-10-12 烟台大学 A kind of single channel chaos system encryption communication method based on parameter identification
CN108650074B (en) * 2018-05-08 2020-10-27 烟台大学 Single-channel chaotic system encryption communication method based on parameter identification
CN110601813A (en) * 2019-09-17 2019-12-20 湖南科技大学 Chaotic secret communication method based on signal high-dimensional decomposition
CN110601813B (en) * 2019-09-17 2023-03-24 湖南科技大学 Chaotic secret communication method based on signal high-dimensional decomposition
CN110661572A (en) * 2019-09-24 2020-01-07 北京无线电计量测试研究所 Novel microwave frequency transmission device
CN113190865A (en) * 2021-05-25 2021-07-30 华中科技大学 Coupled chaotic system and application thereof
CN115618498A (en) * 2022-11-08 2023-01-17 中国空气动力研究与发展中心计算空气动力研究所 Prediction method, device, equipment and medium for cross-basin flow field of aircraft

Similar Documents

Publication Publication Date Title
CN103580849A (en) Spatiotemporal chaos secret communication method
Zhang et al. A review of compressive sensing in information security field
CN102822816B (en) For the efficient homomorphic encryption scheme of bilinear form
CN105490802B (en) The parallel encryption and decryption communication means of improvement SM4 based on GPU
CN103259643B (en) Matrix fully homomorphic encryption method
CN101447870B (en) Safe storage method of private key based on technology of distributed password
CN102811125B (en) Certificateless multi-receiver signcryption method with multivariate-based cryptosystem
WO2007076712A1 (en) A system and method for generating the analog-digital mixed chaotic signal, a encryption communication method thereof
WO2012139919A3 (en) Method and apparatus for public-key cryptography based on error correcting codes
CN106375346A (en) Condition-based broadcast agent re-encryption data protection method for cloud environment
CN106533656B (en) A kind of key multilayer mixing method for encryption/decryption based on WSN
CN105577357A (en) Intelligent household data privacy protection method based on full homomorphic encryption
CN101702117A (en) Method for generating random pseudorandom sequence based on discrete progressive determinacy
CN106604270B (en) A kind of message encryption method of the information using radio physical layer
CN103888637A (en) Method for chaotic encryption of multi-path image digital information
CN104519071A (en) Group encryption and decryption method and system with selection and exclusion functions
CN102801521A (en) Quantum steganography protocol based on quantum electrodynamics (QED)
CN103607278A (en) Safe data cloud storage method
CN103346878B (en) A kind of secret communication method based on FPGA high-speed serial I/O
CN103812658B (en) A kind of secure communication protocols based on stream cipher
CN103269272B (en) A kind of key encapsulation method based on short-lived certificates
CN110535633A (en) Quantum secret communication network system
CN110535634A (en) Audio-video transmission system based on quantum cryptography
CN102938698A (en) Security data transmission method based on compressive sensing theory
CN116827518A (en) Approximate homomorphic encryption method based on ring model error learning problem

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20140212

RJ01 Rejection of invention patent application after publication