CN113691369B - Optical fiber channel safe transmission system based on neural network - Google Patents

Optical fiber channel safe transmission system based on neural network Download PDF

Info

Publication number
CN113691369B
CN113691369B CN202110772016.4A CN202110772016A CN113691369B CN 113691369 B CN113691369 B CN 113691369B CN 202110772016 A CN202110772016 A CN 202110772016A CN 113691369 B CN113691369 B CN 113691369B
Authority
CN
China
Prior art keywords
data
neural network
pseudo
key
secret key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110772016.4A
Other languages
Chinese (zh)
Other versions
CN113691369A (en
Inventor
纪越峰
吴坤
王宏祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Posts and Telecommunications
Original Assignee
Beijing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Posts and Telecommunications filed Critical Beijing University of Posts and Telecommunications
Priority to CN202110772016.4A priority Critical patent/CN113691369B/en
Publication of CN113691369A publication Critical patent/CN113691369A/en
Application granted granted Critical
Publication of CN113691369B publication Critical patent/CN113691369B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/045Combinations of networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • H04B10/60Receivers
    • H04B10/66Non-coherent receivers, e.g. using direct detection
    • H04B10/69Electrical arrangements in the receiver
    • H04B10/691Arrangements for optimizing the photodetector in the receiver
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • H04B10/80Optical aspects relating to the use of optical transmission for specific applications, not provided for in groups H04B10/03 - H04B10/70, e.g. optical power feeding or optical transmission through water
    • H04B10/85Protection from unauthorised access, e.g. eavesdrop protection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Biophysics (AREA)
  • Mathematical Physics (AREA)
  • Data Mining & Analysis (AREA)
  • Evolutionary Computation (AREA)
  • General Health & Medical Sciences (AREA)
  • Molecular Biology (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computational Linguistics (AREA)
  • Software Systems (AREA)
  • Biomedical Technology (AREA)
  • Artificial Intelligence (AREA)
  • Electromagnetism (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Optical Communication System (AREA)

Abstract

The invention discloses a safe transmission system of an optical fiber channel based on a neural network. The system comprises five steps: 1) legal directions send a section of appointed sending data to each other and receive the data at a receiver; 2) a legal party carries out data post-processing on the received data and trains a neural network by locally combining the transmitted data and the processed received data; 3) a sending end locally generates a section of pseudo key, combines the pseudo key with a trained neural network to obtain a key, and then encrypts a plaintext; 4) the sending end combines the pseudo key and the ciphertext into new data and transmits the new data to the receiving end, and the receiving end adopts a channel compensation algorithm when receiving; 5) and the receiving end combines the received pseudo secret key with the trained neural network to generate a secret key and decrypts the plaintext. The safe transmission system not only realizes the simultaneous transmission of the through encryption and the dynamic adjustment of the secret key, but also keeps the safety, and the length of the optical fiber used by a legal party is cracked, namely the secret key space of the system is very large.

Description

Optical fiber channel safe transmission system based on neural network
Technical Field
The invention relates to an information security technology, in particular to a scheme for preventing an illegal eavesdropper from eavesdropping on transmission information under optical fiber channel transmission.
Background
Optical transmission is widely used in personal, commercial, and military communications because of its advantages such as high speed, large bandwidth, and long reach. However, with the 5G era and the advent of various intelligent devices, the data requirement in the optical link has increased explosively, so that the data security transmission of the optical link becomes more and more important. In point-to-point transmission systems, optical fiber is often used as the system communication link, but optical fiber is very vulnerable to many eavesdropping, so how to guarantee the secure transmission of optical communication systems attracts more and more attention.
The traditional security technology mainly guarantees the security of the system by means of the complexity of a physical layer and a high-level algorithm, but along with the development of a quantum computer, the traditional security technology is no longer secure. The theoretically completely safe quantum key technology also has the disadvantages of short transmission distance, low key generation rate, expensive device and the like. Although the chaotic security system can improve the security of data transmission, the key space of the system is relatively small, i.e. the security is not high, because the security is established in the randomness and unpredictability of the initial value, so that the secure transmission scheme based on the physical layer becomes a hot field of research in recent years.
In recent years, many physical layer-based security schemes have been proposed, such as random phase fluctuation based on polarization-maintaining fibers, polarization film dispersion based on random spliceable maintaining fibers, characteristics of ultra-long fiber lasers, random film-mixing extraction keys in multimode fibers. Although these schemes can improve the confidentiality and privacy of data transmission from the perspective of the physical layer, these schemes do not consider that the received data of the legitimate party is not completely consistent due to the non-ideal environment, a post-processing algorithm is required to perform the consistency of the received data of the legitimate party and the differential amplification of the received data of the illegitimate party, the common transmission of information and a secret key cannot be realized, and the secure communication cannot be performed even when the length of a legitimate channel optical fiber is matched by the eavesdropping party.
Neural networks have been proven to fit many data curves well even with only one hidden layer, so that neural networks are increasingly studied in channel modeling, and we need to study a secure transmission system that is safely established in channel characteristic estimation neural networks, considering that the polarization film dispersion of fiber channels is a variable and the time for matching the legal fiber length by eavesdropping method cannot be made zero.
Disclosure of Invention
In order to solve the technical problem, the invention provides a fiber channel secure transmission system based on a neural network, and a legal party can locally obtain a neural network model which cannot be obtained by an illegal eavesdropping party through a method for locally estimating the characteristics of a transmission channel through the neural network, so that the eavesdropping party cannot obtain a secret key used for plaintext encryption.
The invention provides a fiber channel safe transmission system based on a neural network,
firstly, a legal method trains a neural network model locally, then a sending end generates a section of pseudo key locally, a real key is generated by using the pseudo key and the neural network model, a plaintext is encrypted by using the key, a ciphertext and the pseudo key are transmitted to a receiving end after encryption, and the receiving end receives and decrypts data.
The training neural network model refers to that detection data and data of received data which are sent by a sending end and are subjected to post-processing are used as training data of a neural network, wherein the sent data are used as input data, and the received data which are subjected to post-processing are used as tag data. The post-processing is used for received data consistency of a legal party and received data differential amplification of an illegal eavesdropper, because a fiber channel is not ideal, the received data after the same transmitted data of the legal party is transmitted are not necessarily identical, so that the received data of the legal party is required to be consistent by adopting information negotiation, and in order to further expand the data difference of the legal party and the illegal party, the received data differential amplification of the legal party and the illegal eavesdropper is carried out by adopting privacy amplification after the information negotiation.
The generation of a pseudo key is to locally generate a pseudo random number as a pseudo key before the encryption is performed at the receiving end.
The generation of the real key means that the pseudo key is input into a local trained neural network, and data output by the neural network is the real key at the moment.
The encryption of the plaintext refers to the encryption of the plaintext needing to be transmitted in a secret manner according to a secret key.
The communication means that the sending end combines the ciphertext and the pseudo key into a group of new data, and then transmits the new data to the receiving end in a standard single mode optical fiber.
The receiving and decrypting of the data means that a receiving end receives lossless signals through a channel compensation algorithm, then ciphertext and a pseudo key are respectively obtained through a predetermined combination mode, the pseudo key is input into a locally trained neural network to generate a key, and a process opposite to encryption is carried out on the ciphertext according to the key to obtain a plaintext.
Compared with the existing safe transmission system, the system not only realizes the simultaneous transmission of the open cipher, the one-time cipher and the real-time key adjustment, but also can ensure the safety of most conditions of the system under the condition that the eavesdropping method perfectly matches the length of the legal channel optical fiber, and because of the time-varying property and the randomness of the polarization membrane coefficient in the channel and the diversity of the neural network structure, the key space of the scheme is very large and is difficult to crack.
In the embodiment of the method, an implementation case of a fiber channel secure transmission system based on a neural network is given.
Drawings
The above and other features and advantages of the present invention will become more apparent to those of ordinary skill in the art by describing in detail exemplary embodiments thereof with reference to the attached drawings, in which:
fig. 1 is a diagram of a secure fiber channel transmission system based on a neural network according to an embodiment of the present invention.
Fig. 2 is a flow chart of the secure transmission of the fiber channel based on the neural network according to an embodiment of the present invention.
Fig. 3 is a schematic diagram of channel characteristic detection according to an embodiment of the present invention.
Fig. 4 is a schematic diagram of the training of the neural network for channel characteristic estimation according to an embodiment of the present invention.
Fig. 5 is a schematic diagram of a pseudo key generation key according to an embodiment of the present invention.
Fig. 6 is a schematic diagram of communication according to an embodiment of the present invention.
Detailed Description
The present solution is described in further detail below with reference to the accompanying drawings
Fig. 1 and fig. 2 are a diagram and a flowchart of a secure fiber channel transmission system based on a neural network according to an embodiment of the present invention, in the secure fiber channel transmission system, the total steps are five:
the first step is that the legitimate users Alice and Bob in step S201 simultaneously send a predetermined probing signal data to each other, where the probing signal is a 40Gbps NRZ electrical signal, and in order to amplify the loss of the channel, we set an EDFA of 20db and load the electrical signal onto the optical signal using MZM. The detection signal is transmitted through the local optical fiber and the exposed optical fiber and then received by the receiver, the received signal is subjected to photoelectric conversion through the photoelectric detector, and then digital signal processing is performed to obtain received data, as shown in fig. 3.
In the second step, the received signal of the legal party in step S202 needs to be post-processed, in this case, the information negotiation technique of Cascade is adopted, and in the information negotiation process, the legal party only transmits the parity value of the received signal on the common channel and corrects the local data. And after the information negotiation, the difference amplification of the eavesdropper and the legal party is carried out by adopting a hash function. In step S203, the local neural network is trained according to the probe signal sent in S201 and the post-processed received data obtained in S202, where the input data is the sent data and the tag data is the post-processed received data. As shown in fig. 4, a four-layer fully-connected layer neural network is used in this case, in which the number of neurons in the input layer is 51, which represents that a single symbol in the channel will receive interference from the surrounding 50 symbols, the numbers of neurons in the second, third and fourth hidden layers are 128 × 8, 128 × 4 and 128 × 2, respectively, and the number of neurons in the output layer is 2, which represents the probability of two symbols in NRZ. The activation functions of the hidden layer and the output layer of the neural network are Relu and Softmax, batchsize and epoch are all 100, the learning rate is 0.0001, the training set and the testing set are all 4096 bits, Adam is used as a training optimizer, a dropout function is not adopted, the error function is a cross dead error function for characterizing two probability similarities in an information theory, and a flow chart of the hidden layer is also shown in figure 4.
The third step first needs to generate a pseudo random number, i.e. a pseudo key, locally at the sending end in step S204, and step S205 is to generate a real key by using the pseudo key through the neural network model trained in step S203, as shown in fig. 5.
In the fourth step, step S206 is first required to be performed, that is, the sending end uses the locally generated key to encrypt the plaintext information that needs to be sent, and in this case, a standard AES encryption algorithm is used. After encryption, the ciphertext and the pseudo key need to be sent to the receiving end together, in the scheme, a combination mode that the first half is the ciphertext and the second half is the pseudo key is adopted, and the combined data is transmitted to the receiving end through a standard single-mode optical fiber. In step S207, the receiving end may obtain a lossless transmission signal after compensating the transmission channel, and may obtain a lossless ciphertext and a pseudo key by using a predetermined method, as shown in fig. 6.
Step S208 is firstly needed to be carried out in the fifth step, after the receiving end receives the ciphertext and the pseudo key, the receiving end needs to input the pseudo key into a neural network model which is trained locally by the receiving end, and the output is the real key. Step S209 needs to decrypt the plaintext information sent from the sender by combining the key generated in step S208 with the ciphertext obtained in step S207.
The above description is only an example of the present disclosure, and is not intended to limit the present disclosure, and any modifications, equivalent replacements, improvements, etc. within the spirit and principle of the present disclosure should be included in the protection scope of the present disclosure.

Claims (3)

1. A secure transmission system of optical fiber channel based on neural network, characterized in that:
firstly, legal communication parties need to send detection signals agreed in advance to each other; then, the legal communication parties carry out the consistency operation on the signals received by the receiving ends according to the negotiation algorithm, wherein the information negotiation operation is used for ensuring the consistency of the data received by the legal communication parties and the data processed by the negotiation algorithm, and then the privacy amplification operation is carried out on the data processed by the negotiation algorithm by utilizing a hash function, wherein the privacy amplification operation is used for amplifying the inconsistency rate of the data received by the legal communication parties and the data received by the illegal communication parties, and the information negotiation operation and the privacy amplification operation jointly form a data post-processing process; then, the detection data and the post-processed received data are used as training data of a local neural network, the neural network adopted in the system is used for estimating channel characteristics, the detection data is used as input data of the neural network, and the received data is used as label data; after the neural network is trained, a legal sender locally generates a pseudo-random number as a pseudo-secret key, and then the pseudo-secret key is input into the locally trained neural network to generate a real secret key; at the moment, a legal sender has a secret key and plaintext information to be transmitted, then the legal sender encrypts the plaintext by using the secret key, after encryption, a ciphertext and a pseudo-secret key are combined into a group of new data, then the new data is transmitted to the legal receiver through a standard single mode fiber, the legal receiver obtains the lossless pseudo-secret key and the ciphertext after a receiving end passes through a channel compensation algorithm, then the pseudo-secret key is input into a trained neural network to generate the secret key, and finally the ciphertext is decrypted by using the secret key to obtain the plaintext transmitted by the legal sender.
2. The secure fibre channel transmission system based on neural network as claimed in claim 1, wherein the pseudo key generation key requires inputting the pseudo key into the locally trained neural network, and then the output of the neural network is the true key.
3. The secure fibre channel transmission system based on neural network as claimed in claim 1, wherein the combination form of the pseudo-secret key and the cipher text requires a predetermined agreement by a legal party.
CN202110772016.4A 2021-07-08 2021-07-08 Optical fiber channel safe transmission system based on neural network Active CN113691369B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110772016.4A CN113691369B (en) 2021-07-08 2021-07-08 Optical fiber channel safe transmission system based on neural network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110772016.4A CN113691369B (en) 2021-07-08 2021-07-08 Optical fiber channel safe transmission system based on neural network

Publications (2)

Publication Number Publication Date
CN113691369A CN113691369A (en) 2021-11-23
CN113691369B true CN113691369B (en) 2022-09-27

Family

ID=78576788

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110772016.4A Active CN113691369B (en) 2021-07-08 2021-07-08 Optical fiber channel safe transmission system based on neural network

Country Status (1)

Country Link
CN (1) CN113691369B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108365951A (en) * 2018-01-19 2018-08-03 中国人民解放军陆军工程大学 A kind of high consistency physical key generation method based on neural network
CN112422226A (en) * 2020-11-11 2021-02-26 天津大学 Key generation method and device based on polarization mode dispersion of optical fiber communication link
CN112906035A (en) * 2021-03-24 2021-06-04 东南大学 Deep learning-based frequency division duplex system key generation method

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11556799B2 (en) * 2018-01-02 2023-01-17 Nokia Technologies Oy Channel modelling in a data transmission system
LT6793B (en) * 2020-05-18 2020-12-28 Timofey Mochalov Method for protecting data transfer using neural cryptography

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108365951A (en) * 2018-01-19 2018-08-03 中国人民解放军陆军工程大学 A kind of high consistency physical key generation method based on neural network
CN112422226A (en) * 2020-11-11 2021-02-26 天津大学 Key generation method and device based on polarization mode dispersion of optical fiber communication link
CN112906035A (en) * 2021-03-24 2021-06-04 东南大学 Deep learning-based frequency division duplex system key generation method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
《Secret Key Generation Scheme Based on Deep Learning in FDD MIMO Systems》;Zheng WAN;《IEICE Transactions on Information and Systems》;20210701;第E104.D卷(第7期);第1058-1062页 *
神经网络与密码学的交叉研究;葛钊成;《密码学报》;20210430;第8卷(第2期);第215-231页 *

Also Published As

Publication number Publication date
CN113691369A (en) 2021-11-23

Similar Documents

Publication Publication Date Title
CN110225016B (en) Data hidden transmission method based on block chain network
EP2281361B1 (en) Quantum key distribution involving moveable key device
US20070140495A1 (en) Qkd with classical bit encryption
KR20110057448A (en) A method of user-authenticated quantum key distribution
CN112422226B (en) Key generation method and device based on polarization mode dispersion of optical fiber communication link
Wu et al. Channel-based dynamic key generation for physical layer security in OFDM-PON systems
Lakshmi et al. Comparison of classical and quantum cryptography using QKD simulator
Liang et al. Secure key distribution and synchronization method in an OFDM-PON based on chaos
US20220294618A1 (en) Improvements to qkd methods
CN111600661B (en) Three-dimensional encryption OFDM optical system based on real-time updated chaotic key distribution
Al‐Ghamdi et al. On the security and confidentiality of quantum key distribution
Tang et al. High security OFDM-PON based on an iterative cascading chaotic model and 4-D joint encryption
CN113691369B (en) Optical fiber channel safe transmission system based on neural network
GB2586235A (en) Improvements to QKD methods
Eriksson et al. Secret key rates for intensity-modulated dual-threshold detection key distribution under individual beam splitting attacks
Gilbert et al. Secrecy, computational loads and rates in practical quantum cryptography
Harrison et al. Security through uncertainty
CN112187460A (en) Master-slave network-oriented root key hidden symmetric encryption algorithm
Wu et al. Channel characteristics estimation based on a secure optical transmission system with deep neural networks
Rumyantsev et al. Modeling of quantum key distribution system for secure information transfer
Bhosale et al. Polarization based secure AES key transmission over optical fiber
CN115884172B (en) Information encryption and decryption method based on countermeasure sample technology
Abbade et al. Signal encryption opportunities for photonic networks
Iwakoshi Potentially Information-theoretic Secure Y00 Quantum Stream Cipher with Limited Key Lengths beyond One-Time Pad
Kishor 17 Application of quantum computing for digital forensic investigation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant