CN105846947B - A kind of encryption in physical layer method introducing Latin battle array - Google Patents

A kind of encryption in physical layer method introducing Latin battle array Download PDF

Info

Publication number
CN105846947B
CN105846947B CN201610162614.9A CN201610162614A CN105846947B CN 105846947 B CN105846947 B CN 105846947B CN 201610162614 A CN201610162614 A CN 201610162614A CN 105846947 B CN105846947 B CN 105846947B
Authority
CN
China
Prior art keywords
latin
key
battle array
encryption
physical layer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610162614.9A
Other languages
Chinese (zh)
Other versions
CN105846947A (en
Inventor
李为
岳敖
马东堂
魏急波
雷菁
熊俊
程龙旺
刘潇然
王啸
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
National University of Defense Technology
Original Assignee
National University of Defense Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National University of Defense Technology filed Critical National University of Defense Technology
Priority to CN201610162614.9A priority Critical patent/CN105846947B/en
Publication of CN105846947A publication Critical patent/CN105846947A/en
Application granted granted Critical
Publication of CN105846947B publication Critical patent/CN105846947B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • H04K1/04Secret communication by frequency scrambling, i.e. by transposing or inverting parts of the frequency band or by inverting the whole band
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • H04K1/06Secret communication by transmitting the information or elements thereof at unnatural speeds or in jumbled order or backwards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention relates to a kind of encryption in physical layer methods introducing Latin battle array.Key of good performance is generated using chaos system and Latin battle array; then key scramble planisphere is utilized; the distribution of the constellation point of different modulating mode on a complex plane is set to tend to be uniform; and then personal characteristics parameter possessed by different modulating mode tends to be identical, achievees the purpose that set about protecting modulation system and modulation intelligence from physical layer.Complex plane information after mapping is made full use of, achievees the purpose that greatly extended secret key space.By introducing Extract functions, the relevance between chaos sequence is fully eliminated, under the premise of ensureing key space and a large amount of keys need not be generated, substantially reduce hardware realization complexity, and NIST Randomness tests are carried out to the key of generation, verify its unpredictability.

Description

A kind of encryption in physical layer method introducing Latin battle array
Technical field
The present invention relates to a kind of encryption in physical layer method, it particularly relates to a kind of based on Latin battle array and width phase inversion Encryption in physical layer method.
Background technology
Commercial activity, transaction and government services higher and higher with the level of informatization of today's society, traditional More and more by open computer and communication network, the tool of WWW is based particularly on to implement and provide, is believed Breath safety has become the important guarantee condition of people's survival and development in information space.In terms of safety perspective, information security Main feature include confidentiality, integrality, authentication property and non-repudiation.At this stage, ensure to believe based on cryptographic technique Breath safety is still main security strategy.But in a communication network, the upper layer encryption mechanism based on traditional cryptography is faced with New challenge.
The flattening of mobile radio system develops, the open nature of Radio Link, the dynamic topology of mobile network and The micromation of node so that it is new that some are faced based on the conventional security strategy that cryptography is encrypted on the communication such as link layer upper layer Challenge.On the one hand, the fast development of supercomputer so that there is be decrypted for the conventional cryptography mechanism based on macrooperation amount Possibility;Increasing key length, extended secret key space can be passed with resisting the exhaustive thinking cracked by key management and broadband again The limitation of defeated system high transfer rate.On the other hand, the fast development of cognitive radio technology so that listener-in is stolen by some Listen technology that can intercept and capture the information that the conventional securities strategy such as frequency, bandwidth and modulation system of wireless channel is not protected.
Based on the present situation of the above communication network, part eavesdropping behavior evolves as listener-in, and not steal communication data etc. broken The larger information of difficulty is translated, but according to unprotected physical layer information, it is whom to eavesdrop out the double hairs of communication, respective geographical location Deng the decoding relatively small information of difficulty, this method is referred to as flow analysis attack (Traffic analysis attack). Listener-in attacks stolen information by flow analysis can reflect communication conditions, this is in military affairs although not being communication data Very big threat is still constituted in communication.Thus how to be studied as current in physical layer guarantee modulation system and the safety of modulation intelligence One importance of mobile communication safety.
Realize communication security mainly there are two direction from physical layer, when using the physical characteristic of wireless channel come generate, Management and distribution key and the physical layer certification based on wireless channel;Second is that the physical layer peace based on tapping channel model Entirely, i.e. the concept for the secrecy capacity that Wyner is proposed based on Shannon information theories.And the safety of physical layer based on secrecy capacity Technology requires the channel quality of main channel to be better than tapping channel, then there is the reliable communication that scrambling coding had both ensured validated user, Make listener-in that can not obtain information again, achievees the purpose that secret communication, including man made noise, wave beam not to can be realized by key The safety of physical layer transmission technologys such as forming.But this safety of physical layer technology based on information theory depends on channel information, surreptitiously Hearer can not ensure safety when similar with legal person's channel.Thus the present invention is based on chaos system in physical layer, proposes a kind of Utilize the encryption method using Latin battle array and chaos sequence scramble planisphere.
Invention content
It is of good performance using chaos system and the generation of Latin battle array that technical problem to be solved by the invention is to provide a kind of Then key utilizes key scramble planisphere, the distribution of the constellation point of different modulating mode on a complex plane is made to tend to be uniform, into And personal characteristics parameter possessed by different modulating mode tends to be identical, reaches and sets about protecting modulation system and modulation from physical layer The purpose of information.To solve the above problems, the present invention proposes the encryption in physical layer side that a kind of Latin battle array and width phase inversion are combined Method generates key set by chaos system, achievees the purpose that encrypt planisphere.
The encryption in physical layer algorithm includes:
S1:The various parameters of setting system:Carrier frequency, modulation system etc.;
S2:System input binary information sequence is converted to complex vector located C, wherein C=through serial to parallel conversion, constellation mapping [c1,c2,c3,…cn]T, wherein []TIt indicates to the transposition of matrix, then to obtain confidential information plain_data to be added, wherein plain_ Data=C;
S3:Key set { K1, K2, Latin battle array } is generated using chaos sequence, with K1's and confidential information plain_data to be added Phase is added, and obtains ciphertext E1;It is multiplied with ciphertext E1 corresponding elements with K2, obtains ciphertext E2;Finally according to the member in Latin battle array Element value, accordingly converts ciphertext E2, obtains final ciphertext E;
The generating process of key set { K1, K2, Latin battle array } is as follows:
1) a kind of chaos system of selection and initial value start_data, generate chaos sequence xi
2) although chaos sequence has the characteristics that long-term unpredictable that its acts and efforts for expediency has certain correlation, for this Problem introduces Extract functions and Latin battle array herein, is generated in key and Latin battle array is structurally innovated, accomplish to control Under the premise of complexity processed, safety is further increased;
Dxi=mod (Extract (xi, 12,13,14), 256)/512
Wherein Extract functions are to extract input value xi12nd, 13,14 data of fractional part, it is good to obtain key Good unpredictability.According to above formula, one group of random data D between [0,0.5] can be obtainedxi, by K1=Dxi× 4 π and K2=Dxi+ 0.75 obtain for phase place key K1 (π of 0≤K1≤2) and amplitude convert key K2 (0.75≤K2≤ 1.25);
3) it is the correlation eliminated between data, to xiIt is handled as follows to obtain yi
yi=106xi-floor(106xi) i=1,2 ... n
To yiAscending order arrangement is carried out, obtains yiThe arrangement information of corresponding serial number i, as Latin battle array.Latin battle array is mainly characterized by Per a line, either the element of each row is 1 to matrix line number or the random distribution of columns;
S4:Parallel serial conversion is carried out to ciphertext E, then through D/A conversion process, is sent into wireless channel and transmits;
Physical layer decryption method is the inverse process of encryption method, it is last it is encrypted decrypt at first, decrypt layer by layer one by one to get To original plaintext message.
Above-mentioned technical proposal is used, beneficial effects of the present invention are:The essence of modulation is by information from binary bits domain It is mapped to complex field, this process brings some redundancies, and it is additional that conventional cryptography mode does not make full use of mapping to bring Information.Carried algorithm makes full use of the complex plane information after mapping herein, achievees the purpose that greatly extended secret key space.It is logical Introducing Extract functions are crossed, the relevance between chaos sequence is fully eliminated, under the premise of ensureing key space and need not give birth to At a large amount of keys, hardware realization complexity is substantially reduced, and NIST Randomness tests are carried out to the key of generation, verify it not Predictability.Latin battle array is introduced, constellation point coordinate information is thoroughly upset, and is adjusted from key space, key sensibility and identification The several respects such as mode processed analyze the safety of this algorithm, and analysis result shows that this algorithm has prodigious key space, hardly Possible Brute Force.Algorithm has very strong safety under the premise of required extra computation amount very little, is passed in safety of physical layer Defeated aspect has broad application prospects.
Description of the drawings
Fig. 1 is the encryption in physical layer method flow diagram that Latin battle array and width phase inversion proposed by the present invention are combined;
Fig. 2 is planisphere before transmitting terminal encryption;
Fig. 3 is planisphere after transmitting terminal encryption;
Fig. 4 is legal person's planisphere;
Fig. 5 is listener-in's planisphere;
When Fig. 6 is legal person and listener-in's key difference very little, bit error rate comparison diagram;
Fig. 7 is bit error rate comparison diagram before and after applying the present invention;
Fig. 8 is to be based on Higher Order Cumulants recognizer success rate comparison diagram.
Specific implementation mode
Below by example, the present invention is described further, it is however noted that, publicize and implement the purpose of example It is to help to further understand the present invention, but it will be appreciated by those skilled in the art that:It is of the invention and appended not departing from In spirit and scope by the claims, various substitutions and modifications are all possible.Therefore, it is public to should not be limited to example institute by the present invention The content opened, the scope of protection of present invention is subject to the scope defined in the claims.
The technical scheme is that on ofdm system, a kind of constellation disorder method introducing Latin battle array is specific to send End ciphering process includes the following steps:
S1:The various parameters of setting system:Sub-carrier number N, cyclic prefix CP, modulation system etc.;
S2:System input binary information sequence is converted to complex vector located C, wherein C=through serial to parallel conversion, constellation mapping [c1,c2,c3,…cn]T, wherein []TIt indicates to the transposition of matrix, then to obtain confidential information plain_data to be added, wherein plain_ Data=C;
S3:Key set { K1, K2, Latin battle array } is generated using chaos sequence, with K1's and confidential information plain_data to be added Phase is added, and obtains ciphertext E1;It is multiplied with ciphertext E1 corresponding elements with K2, obtains ciphertext E2;Finally according to the member in Latin battle array Element value, accordingly converts ciphertext E2, obtains final ciphertext E;The generating process of key set is as follows:
1) a kind of chaos system of selection and initial value start_data, generate chaos sequence xi
2) although chaos sequence has the characteristics that long-term unpredictable that its acts and efforts for expediency has certain correlation, for this Problem introduces Extract functions and Latin battle array herein, is generated in key and Latin battle array is structurally innovated, accomplish to control Under the premise of complexity processed, safety is further increased;
Dxi=mod (Extract (xi, 12,13,14), 256)/512
Wherein Extract functions are to extract input value xi12nd, 13,14 data of fractional part, it is good to obtain key Good unpredictability.According to above formula, one group of random data D between [0,0.5] can be obtainedxi, by K1=Dxi× 4 π and K2=Dxi+ 0.75 obtain for phase place key K1 (π of 0≤K1≤2) and amplitude convert key K2 (0.75≤K2≤ 1.25);
3) it is the correlation eliminated between data, to xiIt is handled as follows to obtain yi
yi=106xi-floor(106xi) i=1,2 ... n
To yiAscending order arrangement is carried out, obtains yiThe arrangement information of corresponding serial number i, as Latin battle array.Latin battle array is mainly characterized by Per a line, either the element of each row is 1 to matrix line number or the random distribution of columns.
Using Latin battle array to the coordinate information after width phase inversion into line shuffle.Scrambling process is by taking following matrix as an example:Matrix A For plaintext matrix, matrix B is Latin battle array, and Matrix C is the ciphertext after Latin battle array scramble.For each element of plaintext battle array A, Latin battle array B respective element values are the transformation of corresponding element, such as B (2,1)=4 in Latin battle array B, then the A (2,4) in matrix A is first Element is put into C (2,1), is converted successively to each row in this way, obtains ciphertext battle array C;
Plaintext battle array to be encrypted
Latin matrix
Through the encrypted ciphertext battle array of Latin battle array
S4:Parallel serial conversion is carried out to ciphertext E, then through inserting pilot tone, drop peak-to-average force ratio, cyclic prefix, D/A transformation etc. Reason is sent into wireless channel and is transmitted.
It is that theory analysis is carried out to the anti-attack ability of inventive algorithm below:
A chaos sequences are tested as the Cryptographic Properties of key
Chaos sequence can be used as key, inevitable requirement its meet cryptography to the requirement of the randomness of key.It uses herein Two-value quantization method quantifies the chaos sequence of generation, then carries out NIST Randomness tests to examine its unpredictable Property;
NIST tests are the marks for a set of detection randomness for including 16 indexs formulated by American National Standards Institute It is accurate.The standard from different perspectives carries out detection sequence with ideal random sequence by different indexs the comparison of departure degree.It should Indices in standard are as a result, be all to obtain the P-value of indices by certain testing algorithm to be used as test result To embody.P-value ∈ [0,1], by test if P-value >=0.01, and P-value is bigger, is tested sequence Pseudo-randomness is better.Following table is that the chaotic key sequence after quantization carries out NIST test results, this test is chosen wherein several Typical index, it can be seen that all P-value values meet randomness standard, i.e., the key generated by chaos sequence meets good Good unpredictability.
1 chaos sequence NIST test results of table
B key sensitivity analyses
Perfect Encryption Algorithm should have very strong key sensibility, i.e., when the key of listener-in and legal person's key exist When very small difference, listener-in can not recover source information.In carried algorithm herein, when legitimate secret K1 for [1, 1,1], Eve keys are [1,1,1+1 × 10-14], planisphere and bit error rate the comparison diagram difference that legal person and listener-in obtain Such as attached drawing 6, shown in 7,8, key precision when can must similarly generate Latin battle array is 10-8.Even if key difference very little listener-in Any valuable information cannot be obtained, so key has very strong sensibility;
C key spaces analyze (calculation amount analysis)
In face of brute force attack (brute-force attack), there should be sufficiently large key for the encrypted key of information Space.In view of amplitude transformation only obscures constellation diagram shape, without changing constellation point quadrant where complex field, therefore amplitude Alternate key K2 is not involved in key space analysis.Assuming that key value range be (0,20], be far above this range certainly, in three-dimensional Under Lorentz chaos sequence, key space is (3 × 20 × 108)×(3×20×1014)=3.6 × 1025.With operation 100 per second It is 3.8 the time required to decoding if the information that listener-in decodes one third thinks to eavesdrop successfully for hundred million computers ×107Year, far beyond accountable time, it is seen that the key space of the algorithm is very big, so it is very to want breaking cryptographic keys Difficult;
D Modulation Mode Recognitions are analyzed
Modulation Identification based on reconstruct planisphere.K- means Data Cluster Algorithms are to choose cluster centre, non-cluster center object It is divided into the highest cluster centre of similarity degree according to similarity degree, then all objects are averaged, is obtained in new cluster The heart.It goes on successively, until measure function is restrained.But as shown in Figure 2, after this Encryption Algorithm, constellation point is in plane model In enclosing, substantially conform to random distribution, constellation point phase information also irregularities, with the constellation template of existing modulation system can not Match.It can not restore information by reconstructing planisphere.
Modulation Identification based on Higher Order Cumulants
High-order statistic is abbreviated as HOS (Higher order statics), is mainly used for modulation Recognition of Digital Signals.Make With the absolute value of Higher Order Cumulants, the influence of phase jitter can be eliminated;Using its ratio as identification parameter, moreover it is possible to eliminate amplitude Influence to parameter.Relative to instantaneous statistic, Higher Order Cumulants have good anti-fading characteristic;Compared with High Order Moment, it Also have the advantages that inhibit Gaussian noise.The steady complex random process of zero-mean is denoted as y (k), its p rank mixed moments are defined as:
Mpq=E (y (k)(p-q)y*(k)q)
Content in relation to cumulant provides the definition for each rank cumulant used here:
C20=Cum (y (k), y (k))=M20
C21=Cum (y (k), y*(k))=M21
C40=Cum (y (k), y (k), y (k), y (k))=M40-3(M20)2
Without make an uproar, symbol transmitting etc. is general, mean power is normalized under the conditions of, acquire under different modulating mode, high-order is tired The theoretical value of accumulated amount, as shown in the table.To eliminate the influence of phase jitter, the absolute value of Higher Order Cumulants is used.Wherein E is letter Number mean power;
The theoretical value of 2 Higher Order Cumulants of table
Utilize upper table construction mpsk signal property invariant FMIt can be used for the identification of modulation system:
By the theoretical value of formula (10), it can be deduced that modulation system judgement standard, as shown in formula (11):
Under different signal-to-noise ratio, 500 independent emulation is carried out, obtains the recognition success rate such as attached drawing 8 under the judgement standard It is shown.As can be seen that the identification modulation system method based on Higher Order Cumulants can effectively identify not encrypted modulation system, letter When making an uproar than being more than 4dB, identify that not encrypted modulation system, success rate are up to 95% or more.And to the identification of this algorithm success Rate is always below 5%, it can be seen that in the case of correct key, the recognition methods based on Higher Order Cumulants cannot not identify Go out the modulation system after this algorithm for encryption.I.e. this paper algorithms have very strong anti-identification advantage.
It is the explanation to Fig. 1 Encryption Algorithm flow charts of the present invention below:
This Encryption Algorithm is carried out on planisphere after constellation mapping, by using chaos sequence and Latin battle array, multiple Plane converts planisphere.Redundancy caused by constellation mapping is made full use of, with extended secret key space, reaches safety The purpose of communication.
It is the analysis to the corresponding planisphere of Fig. 2 transmitting-receiving two-ends and Fig. 6,7 bit error rate comparison diagrams below
Fig. 2 is once the planisphere at legitimate receipt end and eavesdropping end before and after the encryption of legal transmitting terminal.Due to chaos system pair The sensibility of initial value, even if initial value difference very little is arranged, by the long-term evolution of chaos system, obtained result is also complete It is complete different.Here key used in listener-in only has 10 with correct key-14Difference, obtained planisphere also sees not completely Which kind of modulation system goes out is, corresponding bit error rate is also always near 0.5.And the legitimate receipt end for possessing correct key can Constellation information is recovered well, and bit error rate does not also deteriorate significantly, plays good cipher round results.
Fig. 8 is the success rate comparison diagram that modulation system is identified using Higher Order Cumulants.As seen from the figure, by this algorithm for encryption Information afterwards, the recognizer based on Higher Order Cumulants fail substantially, and recognition success rate is less than 5%, it is believed that cannot identify Out.
The foregoing is merely one embodiment of the present invention, and the invention is not limited in the above embodiments, are implementing There may be the small structural modifications in part in the process, if the various changes or modifications of the present invention are not departed from the essence of the present invention God and range, and belong within the scope of the claim and equivalent technologies of the present invention, then the present invention is also intended to comprising these changes And modification.

Claims (1)

1. a kind of encryption in physical layer method introducing Latin battle array generates key set by chaos system, reach encryption planisphere Purpose, which is characterized in that the encryption in physical layer method is as follows:
S1:The various parameters of setting system:Such as carrier frequency, modulation system;
S2:System input binary information sequence is converted to complex vector located C, wherein C=[c through serial to parallel conversion, constellation mapping1, c2,c3,…cn]T, wherein []TIt indicates to the transposition of matrix, then to obtain confidential information plain_data to be added, wherein plain_data =C;
S3:Key set { K1, K2, Latin battle array } is generated using chaos sequence, with the phase of K1 and confidential information plain_data to be added It is added, obtains ciphertext E1;It is multiplied with ciphertext E1 corresponding elements with K2, obtains ciphertext E2;Finally according to the element value in Latin battle array, Ciphertext E2 is accordingly converted, final ciphertext E is obtained;
S4:Parallel serial conversion is carried out to ciphertext E, then through D/A conversion process, is sent into wireless channel and transmits,
Physical layer decryption method is the inverse process of encryption method, it is last it is encrypted decrypt at first, decrypted layer by layer one by one to get to original Beginning cleartext information;
The generating process of the key set { K1, K2, Latin battle array } is as follows:
1) a kind of chaos system of selection and initial value start_data, generate chaos sequence xi
2) Extract functions and Latin battle array are introduced,
Dxi=mod (Extract (xi, 12,13,14), 256)/512
Wherein Extract functions are to extract input value xi12nd, 13,14 data of fractional part, can not be pre- with obtain key The property surveyed, according to above formula, obtains one group of random data D between [0,0.5]xi, by K1=Dxi× 4 π and K2=Dxi+0.75 Obtain the key K2 (0.75≤K2≤1.25) converted for the key K1 (π of 0≤K1≤2) and amplitude of phase place;
3) it is the correlation eliminated between data, to xiIt is handled as follows to obtain yi
yi=106xi-floor(106xi) i=1,2 ... n
To yiAscending order arrangement is carried out, obtains yiThe arrangement information of corresponding serial number i, as Latin battle array, Latin battle array are every a line or every The element of one row is 1 to matrix line number or the random distribution of columns.
CN201610162614.9A 2016-03-22 2016-03-22 A kind of encryption in physical layer method introducing Latin battle array Active CN105846947B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610162614.9A CN105846947B (en) 2016-03-22 2016-03-22 A kind of encryption in physical layer method introducing Latin battle array

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610162614.9A CN105846947B (en) 2016-03-22 2016-03-22 A kind of encryption in physical layer method introducing Latin battle array

Publications (2)

Publication Number Publication Date
CN105846947A CN105846947A (en) 2016-08-10
CN105846947B true CN105846947B (en) 2018-11-09

Family

ID=56587831

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610162614.9A Active CN105846947B (en) 2016-03-22 2016-03-22 A kind of encryption in physical layer method introducing Latin battle array

Country Status (1)

Country Link
CN (1) CN105846947B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108833390B (en) * 2018-06-05 2021-01-26 中国人民解放军国防科技大学 Matrix transformation-based packet physical layer encryption method
CN108964910B (en) * 2018-09-17 2021-09-17 中国人民解放军战略支援部队信息工程大学 Network time synchronization message secure transmission method and device
CN109768990B (en) * 2019-03-04 2022-09-16 中国人民解放军国防科技大学 Physical layer secure transmission method based on asymmetric key
CN109996215A (en) * 2019-03-31 2019-07-09 南京信息工程大学 A kind of multi-path communications method based on privacy sharing under vehicular ad hoc network network environment
CN109889338A (en) * 2019-04-22 2019-06-14 苏州大学 Quantum encryption method based on chaos sequence
CN110336667B (en) * 2019-07-26 2022-04-08 电子科技大学 Communication physical layer encryption communication method and device based on pseudo-random sequence control
CN111447054B (en) * 2020-05-28 2021-05-14 北京邮电大学 FBMC passive optical network physical layer encryption method and device based on five-dimensional hyperchaos
US20230336979A1 (en) * 2022-04-14 2023-10-19 Qualcomm Incorporated Signal modification for control channel physical layer security

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1359211A (en) * 2002-01-10 2002-07-17 张红雨 Chaotic encipher series generator
CN101145901A (en) * 2007-07-06 2008-03-19 哈尔滨工程大学 Ultra-chaos pseudo random sequence generator
CN105120453A (en) * 2015-07-15 2015-12-02 中国科学院信息工程研究所 Secret key generation method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1359211A (en) * 2002-01-10 2002-07-17 张红雨 Chaotic encipher series generator
CN101145901A (en) * 2007-07-06 2008-03-19 哈尔滨工程大学 Ultra-chaos pseudo random sequence generator
CN105120453A (en) * 2015-07-15 2015-12-02 中国科学院信息工程研究所 Secret key generation method

Also Published As

Publication number Publication date
CN105846947A (en) 2016-08-10

Similar Documents

Publication Publication Date Title
CN105846947B (en) A kind of encryption in physical layer method introducing Latin battle array
CN101447870B (en) Safe storage method of private key based on technology of distributed password
Zhou et al. Security analysis and new models on the intelligent symmetric key encryption
CN108833390B (en) Matrix transformation-based packet physical layer encryption method
Rajput et al. Towards the growth of image encryption and authentication schemes
CN111132153A (en) Endogenous safety communication method based on wireless channel characteristics
Zhao et al. One-time password authentication scheme based on the negative database
CN109743155B (en) Physical layer secure transmission method based on antenna selection differential chaos keying
CN109768990A (en) Physical layer secure transmission method based on asymmetric key
Aziz et al. A Noise‐Tolerant Audio Encryption Framework Designed by the Application of S8 Symmetric Group and Chaotic Systems
Albu-Rghaif et al. A data structure encryption algorithm based on circular queue to enhance data security
Jamil et al. Image Encryption Based on Multi-Level Keys on RC5 Algorithm.
Singh An advance cryptosystem using extended polybius square with qwerty pattern
Gadicha et al. A Novel approach towards Implicit Authentication System by using Multi-share visual key Cryptography Mechanism
Ni et al. PHY‐Aided Secure Communication via Weighted Fractional Fourier Transform
CN114915401A (en) Verifiable homomorphic proxy re-encryption method and system
Pushpa Enhancing Data Security by Adapting Network Security and Cryptographic Paradigms
Kumar et al. Invo-substitute: Three layer encryption for enhanced e-commerce website security using substitution cipher and involution function
Abduljabbar et al. Robust scheme to protect authentication code of message/image documents in cloud computing
Venkateswarlu et al. Password security by encryption using an extended ADFGVX cipher
Krishna Improved Elliptic Curve Image Cryptography Using Genetic Algorithm based Key Selection for Securely Data Transmission
CN117134904B (en) Method based on identity recognition and dynamic encryption and decryption communication
CN115589299B (en) Quantum double-signature protocol with high fidelity
Aziz et al. Research Article A Noise-Tolerant Audio Encryption Framework Designed by the Application of S8 Symmetric Group and Chaotic Systems
Kevadia et al. A literature survey on image encryption

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant