CN113949503B - WFRFT (Wireless Fidelity-rft) secure communication method based on DNA dynamic coding - Google Patents

WFRFT (Wireless Fidelity-rft) secure communication method based on DNA dynamic coding Download PDF

Info

Publication number
CN113949503B
CN113949503B CN202111197034.0A CN202111197034A CN113949503B CN 113949503 B CN113949503 B CN 113949503B CN 202111197034 A CN202111197034 A CN 202111197034A CN 113949503 B CN113949503 B CN 113949503B
Authority
CN
China
Prior art keywords
matrix
dna
encryption
wfrft
block
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111197034.0A
Other languages
Chinese (zh)
Other versions
CN113949503A (en
Inventor
孟庆微
王西康
杨建广
张馨予
仇铭阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Air Force Engineering University of PLA
Original Assignee
Air Force Engineering University of PLA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Air Force Engineering University of PLA filed Critical Air Force Engineering University of PLA
Publication of CN113949503A publication Critical patent/CN113949503A/en
Application granted granted Critical
Publication of CN113949503B publication Critical patent/CN113949503B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N7/00Computing arrangements based on specific mathematical models
    • G06N7/08Computing arrangements based on specific mathematical models using chaos models or non-linear system models
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • Algebra (AREA)
  • Data Mining & Analysis (AREA)
  • Bioethics (AREA)
  • Nonlinear Science (AREA)
  • Health & Medical Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Computational Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Evolutionary Computation (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Pure & Applied Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Storage Device Security (AREA)

Abstract

The present disclosure relates to a WFRFT secure communication method based on DNA dynamic coding, which comprises the following steps: encrypting the bit stream information by using a DNA dynamic encryption system to obtain an encrypted signal; constellation transformation is carried out on the modulated encrypted signal by using WFRFT, and a mixed carrier signal is generated; after the mixed carrier signal is transmitted to a receiving end through a channel, the receiving end carries out WFRFT inverse transformation on the mixed carrier signal and completes symbol demodulation; and performing DNA decryption on the data subjected to symbol demodulation to obtain the bit stream information. The method and the device can effectively improve the safety transmission capacity of the WFRFT communication system.

Description

WFRFT (Wireless Fidelity-rft) secure communication method based on DNA dynamic coding
Technical Field
The disclosure relates to the technical field of secure communication, in particular to a WFRFT secure communication method based on DNA dynamic coding.
Background
Information security is an important component of national security, and covers multiple aspects of communication security, system security, network security and the like. The wireless communication physical layer safety communication technology overturns the method that an upper encryption scheme is replaced by calculation complexity to obtain safety, and the safety of information in the wireless transmission process can be ensured through physical layer encryption, artificial noise, beam forming and other modes, so that an eavesdropper cannot effectively steal and decipher legal information, and the method is a hotspot problem in the current wireless communication field.
The fractional fourier transform (Fractional Fourier Transform, FRFT) has been widely used in the fields of radar, communication, etc., since it was proposed to receive general attention from researchers. Different from the traditional classical FRFT, the weighted fractional Fourier transform (Weighted Fractional Fourier Transform, WFRFT) is a novel time-frequency optical tool, has the characteristics of simple engineering realization, low peak-to-average ratio, compatibility with the existing single-carrier and multi-carrier systems and the like, and can improve the hidden communication capacity of a communication system to a certain extent. However, due to WFRFT system parameters, i.e., WFRFT transform order α and scale vector V m ,V n The number of the (4) is limited, so that the unauthorized user can still obtain the demodulation parameters such as WFRFT conversion order and the like through the modes such as parameter scanning and the like. Accordingly, there is a need to improve one or more of the problems in the related art described above to further increase the secure transmission capability of WFRFT communication systems.
It should be noted that the information disclosed in the above background section is only for enhancing understanding of the background of the present disclosure and thus may include information that does not constitute prior art known to those of ordinary skill in the art.
Disclosure of Invention
An object of an embodiment of the present disclosure is to provide a WFRFT secure communication method based on DNA dynamic coding, so as to further improve a secure transmission capability of a WFRFT communication system.
The embodiment of the disclosure provides a WFRFT secure communication method based on DNA dynamic coding, which comprises the following steps:
encrypting the bit stream information by using a DNA dynamic encryption system to obtain an encrypted signal;
constellation transformation is carried out on the modulated encrypted signal by using WFRFT, and a mixed carrier signal is generated;
after the mixed carrier signal is transmitted to a receiving end through a channel, the receiving end carries out WFRFT inverse transformation on the mixed carrier signal and completes symbol demodulation;
and performing DNA decryption on the data subjected to symbol demodulation to obtain the bit stream information.
In an exemplary embodiment of the disclosure, the step of encrypting the bit stream information by using the DNA dynamic encryption system to obtain an encrypted signal includes:
converting the bit stream information into a plurality of matrixes with preset sizes;
calculating a ciphertext template matrix of the matrix;
performing DNA coding and DNA operation on the matrix and the ciphertext template matrix to obtain an encryption matrix;
and decoding and converting the encryption matrix to obtain the encrypted signal.
In an exemplary embodiment of the present disclosure, the step of calculating a ciphertext template matrix of the matrix includes:
calculating a ciphertext template key of each matrix;
generating a corresponding encryption sequence according to the ciphertext template key;
the encryption sequence is converted into a ciphertext template matrix.
In an exemplary embodiment of the disclosure, the step of generating a corresponding encryption sequence according to the ciphertext template key includes:
and generating an encryption sequence of the Logistic chaotic system according to the ciphertext template key.
In an exemplary embodiment of the disclosure, the step of performing DNA encoding and DNA operation on the matrix and the ciphertext template matrix to obtain an encryption matrix includes:
the matrix partitioning processing is carried out to obtain at least one first partition;
the ciphertext template matrix is subjected to block processing to obtain at least one second block;
respectively encoding the first block and the second block according to a preset DNA encoding rule;
and carrying out preset DNA operation on the encoded first block and second block to obtain an encryption matrix.
In an exemplary embodiment of the disclosure, the step of performing DNA encoding and DNA operation on the matrix and the ciphertext template matrix to obtain an encryption matrix includes:
generating a control sequence according to the LSS, the LTS and the TSS chaotic system of the matrix;
selecting corresponding DNA coding rules according to the control sequences to respectively code the first block and the second block;
and selecting corresponding DNA operation rules according to the control sequences to perform DNA operation on the encoded first and second blocks.
In an exemplary embodiment of the present disclosure, the step of generating the control sequence according to the LSS, LTS, and TSS chaotic system of the matrix includes:
respectively calculating initial values of LSS, LTS and TSS chaotic systems of the matrix;
and generating a control sequence by using the initial value.
In an exemplary embodiment of the present disclosure, the step of generating the control sequence according to the LSS, LTS, and TSS chaotic system of the matrix includes:
the initial values comprise four, and four control sequences are respectively generated by using the four initial values.
In an exemplary embodiment of the present disclosure, the four control sequences are a first control sequence, a second control sequence, a third control sequence, and a fourth control sequence, wherein,
the first control sequence is used for determining a DNA coding rule of the first block;
the second control sequence is used for determining a DNA coding rule of the second block;
the third control sequence is used for determining DNA operation rules carried out by the first block and the second block;
the fourth control sequence is used to determine a decoding rule of the encryption matrix.
The technical scheme provided by the disclosure can comprise the following beneficial effects:
the method combines chaos, DNA coding and WFRFT technology, utilizes the characteristic that a chaos system is sensitive to an initial value and has the advantages of huge key space, combines the outstanding characteristics of large biological DNA coding capacity and high storage efficiency, provides a method for effectively improving the safe transmission performance of the system, dynamically selects a DNA coding and decoding mode and an operation process by the four constructed one-dimensional chaos systems, avoids key interpretation caused by exhaustive attack, combines the constellation fission characteristic of WFRFT conversion, realizes the high-strength data encryption of a physical layer under the condition of low complexity, and can effectively improve the safe transmission capability of the WFRFT communication system.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure. It will be apparent to those of ordinary skill in the art that the drawings in the following description are merely examples of the disclosure and that other drawings may be derived from them without undue effort.
FIG. 1 shows a schematic diagram of steps of a WFRFT secure communication method based on DNA dynamic encoding in an exemplary embodiment of the disclosure;
FIG. 2 shows a schematic diagram of a dynamic encryption process for DNA in an exemplary embodiment of the present disclosure;
FIG. 3 illustrates a block diagram of an implementation of WFRFT in an exemplary embodiment of the disclosure;
FIG. 4 illustrates a system block diagram of a WFRFT secure communication method based on DNA dynamic encoding in an exemplary embodiment of the disclosure;
FIG. 5 illustrates a chaotic system performance analysis graph in an exemplary embodiment of the present disclosure;
fig. 6 illustrates WFRFT signal constellations in an exemplary embodiment of the present disclosure;
fig. 7 illustrates an original image lena, a histogram, and an encrypted image, and a histogram in an exemplary embodiment of the present disclosure;
FIG. 8 illustrates an image decrypted by an illegitimate user and decrypted by a legitimate user in an exemplary embodiment of the present disclosure;
FIG. 9 illustrates DNA-WFRFT signal statistics in an exemplary embodiment of the present disclosure;
fig. 10 illustrates a system bit error rate curve in an exemplary embodiment of the present disclosure.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. However, the exemplary embodiments may be embodied in many forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus a repetitive description thereof will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities may be implemented in software or in one or more hardware modules or integrated circuits or in different networks and/or processor devices and/or microcontroller devices.
In this exemplary embodiment, there is provided a WFRFT secure communication method based on DNA dynamic coding first, referring to fig. 1, the method may include the steps of:
step S101: encrypting the bit stream information by using a DNA dynamic encryption system to obtain an encrypted signal;
step S102: constellation transformation is carried out on the modulated encrypted signal by using WFRFT, and a mixed carrier signal is generated;
step S103: after the mixed carrier signal is transmitted to a receiving end through a channel, the receiving end carries out WFRFT inverse transformation on the mixed carrier signal and completes symbol demodulation;
step S104: and performing DNA decryption on the data subjected to symbol demodulation to obtain the bit stream information.
In the embodiment of the disclosure, chaos, DNA coding and WFRFT technology are combined, the characteristic that a chaos system is sensitive to an initial value and the advantage of huge key space are utilized, the outstanding characteristics of large biological DNA coding capacity and high storage efficiency are combined, a method for effectively improving the safe transmission performance of the system is provided, the constructed four one-dimensional chaos systems dynamically select a DNA coding and decoding mode and an operation process, key decoding caused by exhaustive attack is avoided, the constellation fission characteristic of WFRFT transformation is combined, the high-strength data encryption of a physical layer is realized under the condition of low complexity, and the safe transmission capacity of the WFRFT communication system can be effectively improved.
Next, each step of the above-described method in the present exemplary embodiment will be described in more detail.
The deoxyribonucleic acid (DNA) code in the step S101 has the characteristics of huge storage space, strong parallel processing capability, ultra-low power consumption and the like, shows excellent performance in the fields of image encryption and the like, and can obviously improve the safety of a physical layer from a bit coding layer by introducing the DNA code into signal encryption. The core of the DNA encryption algorithm is DNA encoding, decoding and DNA computation, which consists of algebraic and biological operations, such as complementary rules for bases, DNA addition, DNA subtraction and DNA XOR operations; the chaotic system can enhance the safety of information science by combining with DNA due to the sensitivity of the chaotic system to an initial value and good pseudo-randomness of the sequence.
In one embodiment, referring to the DNA dynamic encryption process shown in fig. 2, step S101 may include the following steps S201-S204:
step S201: converting the bit stream information into a plurality of matrixes with preset sizes;
step S202: calculating a ciphertext template matrix of the matrix;
step S203: performing DNA coding and DNA operation on the matrix and the ciphertext template matrix to obtain an encryption matrix;
step S204: and decoding and converting the encryption matrix to obtain the encrypted signal.
In step S201, the original bit stream information is converted into a plurality of matrices of the same size in units of a preset bit value in parallel. The specific matrix size is related to the preset bit value unit, for example, every 1024 bits, and is serial-parallel converted into a matrix D of size 32×32 i
In step S202, the matrices D may be calculated by equation (1) i Ciphertext template key pk i
pk i Regeneration of D i Corresponding encryption sequence G i Specifically, pk i Generating an encryption sequence G of the Logistic chaotic system through a formula (2) i
G i =mod(floor(Logistic(pk i ,r)*10 4 ),2) (2)
The Logistic chaotic map is a nonlinear dynamics discrete chaotic system which is very widely applied, has good chaotic characteristics and initial value sensitivity, LSS, TSS and TLS are one-dimensional chaotic maps which are evolved from the Logistic map, have the same characteristics and larger chaotic parameter intervals, and the equation of each chaotic map is defined as follows:
x n+1 =Logistic(r,x n )=rx n (1-x n ) (3)
wherein x, y, z and q are state variables, r is a bifurcation parameter, the value range is (0, 4), in the Logistic mapping, when r is in [3.6,4], the system enters a chaotic state, and in the LSS, LTS and TSS mapping, the system is always in the chaotic state when r is in the (0, 4) interval, the initial values of the 4 chaotic systems and the state values of each stage are always in the (0, 1).
The resulting encrypted sequence G i Is 1024 bits in length, takes a value of 0 or 1, and then encrypts the sequence G i The serial-parallel conversion is also carried out to a ciphertext template matrix T with the size of 32 multiplied by 32 i
In step S203, matrix D i Performing block processing to obtain at least one first block D with size of 4×4 ij Ciphertext template matrix T i Performing block processing to obtain at least one second block T with size of 4×4 ij Then according to the preset DNA coding rule, respectively corresponding to D ij And T ij Coding and decoding the coded first block D ij A second sub-block D ij And carrying out a preset DNA operation to obtain an encryption matrix.
In one embodiment, the preset DNA encoding rules are determined by the following method:
the DNA molecule consists of 4 deoxynucleotides, adenine (A), cytosine (C), guanine (G), thymine (T), respectively. Due to the specificity of the DNA coding type and the regularity of the information processing, the method is suitable for processing 0,1 digital information, and adopts 2 numbers such as '00', '01', '10', '11' as a group of data elements for operation. Furthermore, 8 kinds of regular pairing modes can be found out through the principle of DNA base complementary pairing, as shown in Table 1.
TABLE 1 DNA encoding and decoding rules
In manipulating the DNA encoded data, 3 ways are provided to further enhance the degree of encoding, DNA addition, DNA subtraction, and DNA exclusive or, respectively, see tables 2,3, and 4. Encryption of the original information stream data is accomplished by the above DNA encoding and DNA operations, where scrambling and obfuscating these 2 operations often occur implicitly, including in the above process.
TABLE 2 DNA addition operations
TABLE 3 DNA subtraction procedure
TABLE 4 DNA exclusive OR operation
Calculating the initial values(s) of the LSS, the LTS and the TSS chaotic system of the matrix respectively through a formula (7) 1 ,s 2 ,s 3 ,s 4 ) For generating 64 floating point numbers c for controlling encoding, operation and decoding i (i=1, 2,3, 4). Wherein c 1 And c 2 From s 1 ,s 2 Respectively through LSS chaotic system, c 3 From s 3 Generated by LTS chaotic system, c 4 From s 4 Generated by a TSS chaotic system.
According to tables 1 to 4, since there are 8 encoding and decoding methods and 3 operation methods, the chaotic system is generated in c in the interval (0, 1) by the formula (8) i (i=1, 2,3, 4) onto the sets {1,2,3,4,5,6,7,8} and {1,2,3} to get e i (i=1, 2,3, 4) is 64 control sequence codes.
Then e 1 For the first control sequence, for determining the first partition D ij According to the DNA encoding rules of e 1 One of the 8 rules of table 1 was determined; e, e 2 For the second control sequence, for determining the second block T ij According to the DNA encoding rules of e 2 One of the 8 rules of table 1 was determined; e, e 3 For the third control sequence, for determining the first partition D ij A second sub-block T ij Rules of DNA operations performed, i.e. according to e 3 Determining which calculation mode in tables 1-3 to use; e, e 4 For the fourth control sequence, the decoding rule for determining the final encryption matrix is also based on e 4 One of the 8 rules of table 1 was determined.
In one embodiment, e 3 Control D ij And T ij The operation mode of the two matrixes to calculate to obtain an encryption matrix V j In the operation process, V is used every time j And V is equal to j-1 Performing a secondary operation to implement a diffusion effect.
In step S204, the matrix V is encrypted j According to e 4 The determined decoding mode obtains the encryption information M ij Finally M is ij And then converted into an encrypted information stream, i.e., an encrypted signal.
In step S102, after performing QPSK modulation on the encrypted signal obtained after DNA encryption, rotation and diffusion are generated on the original QPSK constellation by using 4-WFRFT transform. And adding a cyclic prefix CP to the converted signal, performing parallel-serial conversion, and transmitting the converted signal to an AWGN channel. The discrete form of 4-WFRFT is used as a method of signal transformation, and can process any input complex sequence, such as MPSK, MQAM and the like, and ensures that the input and output signals have the same power spectrum, and the transformed signals can be modulated and demodulated in a traditional way.
In one embodiment, assuming that the encrypted signal obtained after DNA encryption is x, the process of generating rotation and diffusion for the original QPSK constellation using 4-WFRFT transform is:
X=Fx (9)
wherein,
called DFT matrix, where W N =e -2πi/N
The definition of 4-WFRFT is expressed as:
taking the above formula in the form of a matrix can be expressed as:
F (α) is a single parameter weighted fractional fourier transform matrix, wherein the weighting coefficients are calculated as:
where l=0, 1,2,3. The period of the parameter alpha is 4, and the value interval is usually selected from [ -2,2]The weighting coefficient is influenced by adjusting the value of the transformation order alpha, therebyThe signal constellation diagram is enabled to be along the angle theta l Rotation splitting occurs, and the rotation angle of each weighting coefficient is:
because each weighting function corresponds to theta l Different, a relative rotation between constellation points is formed, and with further increase of the parameter alpha, the boundary between constellation points is more fuzzy, and finally constellations are aliased together and cannot be distinguished, so that a Gaussian-like distribution condition is shown on a complex plane.
The flow chart of WFRFT is shown in fig. 3, and can be seen from fig. 3: the signals are divided into 4 paths after serial-parallel conversion, wherein the signals of the 1 branch and the 3 branch are subjected to FFT and then inversion and weighting, and belong to frequency domain signals, and the signals of the 0 branch and the 2 branch are directly subjected to inversion and weighting, and belong to time domain signals. Therefore, the WFRFT signal belongs to a time-frequency domain signal, the energy distribution is more uniform, and the anti-interference performance is stronger.
In step S103, after the mixed carrier signal is transmitted to the receiving end through the channel, the receiving end performs serial-parallel conversion processing on the received signal, and recovers the QPSK modulation constellation by using the 4-WFRFT inverse transform module.
In step S104, the data subjected to QPSK demodulation is subjected to DNA decryption operation, and an original information stream is obtained through parallel-to-serial conversion.
A system block diagram of the entire process described above may be referred to fig. 4.
Performing performance analysis on the WFRFT secure communication method based on the DNA dynamic coding:
1. chaotic system performance analysis
To test the performance of the chaotic system, we first simulated the initial sensitivity of Logistic, LSS, LTS and TLS. The value of r is set to 3.9, and the values of x, y, z, q are set to 0.7. In fig. 5, when x, y, z, q4 initial values exist Δ=1e -15 After several tens of iterations, each two chaotic sequences are completely different. The detailed performance of Logistic, LSS, LTS and TLS is shown in FIG. 5 (a), FIG. 5 (d), FIG. 5 (g) and FIG. 5 (k). Furthermore, we tested the autocorrelation and cross-correlation properties of the 4 chaotic systems used. We obtain a chaotic sequence of length 1000 from fig. 5 (b), 5 (e), 5 (h) and 5 (l), the autocorrelation value is equal to 1 only when the value is equal to 0, and the autocorrelation values are all close to 0 at other times, which indicates that they have good autocorrelation performance. When we give Δ=1e -15 The cross-correlation performance of the chaotic system can be as in fig. 5 (c), fig. 5 (f), fig. 5 (i) and fig. 5 (m). All values vary by [ -0.1,0.1]In turn, this suggests that they have good performance in terms of cross-correlation.
To further investigate the performance of the chaotic system used, some comparisons between it and other high-dimensional chaotic systems are shown in table 5. The chaotic system used by the user can be found to have lower computational complexity and higher safety, and the key space is larger.
Table 5 comparison of different chaotic systems
2. Constellation fission characteristic analysis
To test and verify the feasibility of the proposed encryption scheme, the proposed DNA-WFRFT system was simulated using matlab. The length of the simulation signal is 1024 bits, the size of the blocking matrix is set to be 32×32, and QPSK is adopted for modulation. The 4-WFRFT parameter α is selected 0,0.05,0.2 and 0.4, respectively, to obtain a corresponding signal constellation as shown in FIG. 6.
As can be seen from fig. 6, the QPSK constellation undergoes phase rotation and aliasing after WFRFT transformation, and as the modulation order α increases, the rotation and aliasing degree of the constellation also increases, and the random distribution becomes more apparent.
DNA encryption Performance analysis
Compared with the traditional 0-1 bit stream, the image is more visual and the information is more abundant, so the superiority of the algorithm is illustrated by using the image data.
3.1 histogram analysis
First, in order to qualitatively evaluate the DNA dynamic encryption scheme we proposed, a classical image Lena used in an image processing system was tested. As shown in fig. 7, which shows histograms of the original image and the encrypted image data, fig. 7 (b) can easily obtain a rough histogram distribution characteristic of the original data, and uneven lines in the figure represent irregular gray value information. At the same time, we also give images and histograms for the case after encryption, as shown in fig. 7 (c), (d). No irregular image gray scale distribution is observed compared to the original image.
Furthermore, we demonstrate that there are different conditions of decrypted image information for illegal and legal users, as shown in fig. 8. For an illegal user, the original image data cannot be restored, and only indistinguishable images are displayed, as shown in fig. 8 (a) - (d). For a legitimate user, it is easy to find that the original image data can be almost completely restored with almost no distortion, as shown in fig. 8 (d). These features indicate that the scheme proposed by the present disclosure has a high encryption capability.
3.2 entropy analysis of information
In order to test the disturbing effect of the DNA dynamic encryption method on signal distribution, information entropy analysis is carried out in the image, entropy is an important measure for testing the randomness of the image, and the entropy value of a real random image with 256 gray scales is 8. The calculation formula of the entropy is as follows:
table 6 shows the entropy of different normal images and the entropy of corresponding password images respectively encrypted by different schemes. The maximum information entropy at different sizes is shown in bold. It can be seen from the table that most of the entropy of the cryptographic image encrypted by this scheme is closer to 8 than the entropy of the other schemes. Therefore, the scheme provided by the disclosure can encrypt the image with high-intensity data.
TABLE 6 entropy comparison of common and password images under different encryption schemes
DNA-WFRFT Signal statistical Property analysis
Fig. 9 shows complex envelope, phase statistics and in-phase component distribution of the DNA-WFRFT signal when the modulation order α is 1, and the bar graphs in fig. 9 (a), (b), (c) show statistics of the complex envelope, in-phase component and phase of the signal, and the blue dotted line is the rayleigh distribution, gaussian distribution and uniform distribution probability density curve with the same mean and variance, as known from the above signal statistics: the complex envelope of the DNA-WFRFT signal is fitted to Rayleigh distribution, the phase distribution is uniform, the same-phase component amplitude has good approaching effect on Gaussian distribution, is very beneficial to anti-interception and anti-interference of communication signals, and can achieve the purposes of low-probability interception and low-probability detection communication.
5. Secure transmission performance analysis
TABLE 7 System simulation parameters
FIG. 10 is a graph showing the bit error rate of a signal subjected to DNA dynamic encoding and 4-WFRFT conversion at an illegal user receiving end compared with that of a legal user receiving end, wherein the illegal user cannot correctly demodulate the signal due to the lack of encryption keys at each stage, and the error of the key at each stage is 10 -15 In the case of (2) the bit error rate is always maintained between 0.4 and 0.5, the key space size of the algorithm is 6.4X 10111.4, 10 per millisecond 6 The time required to crack the scheme at the sub-calculated speed is 5.1X10 95 The new approach presented herein was described as significantly improving the security of WFRFT systems.
In summary, the disclosure provides a WFRFT secure communication method based on DNA dynamic coding, which combines a four-dimensional chaotic DNA dynamic coding process to realize information scrambling and spreading, expands a key space of a system, and avoids key decoding caused by exhaustive attack, and the 4-WFRFT changes the distribution of useful signals on a complex plane, so that an eavesdropper cannot demodulate correct signals.
Experiments and performance analysis show that the method greatly reduces the interception probability of illegal users under the condition of ensuring the quality of the received signals of legal users, and can effectively solve the safety problem in wireless communication.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any adaptations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.

Claims (6)

1. The WFRFT secure communication method based on DNA dynamic coding is characterized by comprising the following steps:
encrypting the bit stream information by using a DNA dynamic encryption system to obtain an encrypted signal;
constellation transformation is carried out on the modulated encrypted signal by using WFRFT, and a mixed carrier signal is generated;
after the mixed carrier signal is transmitted to a receiving end through a channel, the receiving end carries out WFRFT inverse transformation on the mixed carrier signal and completes symbol demodulation;
performing DNA decryption on the data subjected to symbol demodulation to obtain the bit stream information;
the step of encrypting the bit stream information by using the DNA dynamic encryption system to obtain an encrypted signal comprises the following steps: converting the bit stream information into a plurality of matrixes with preset sizes;
calculating a ciphertext template matrix of the matrix; performing DNA coding and DNA operation on the matrix and the ciphertext template matrix to obtain an encryption matrix; decoding and converting the encryption matrix to obtain the encryption signal;
the step of calculating the ciphertext template matrix of the matrix comprises the following steps: calculating a ciphertext template key of each matrix; generating a corresponding encryption sequence according to the ciphertext template key; converting the encryption sequence into a ciphertext template matrix;
the step of generating a corresponding encryption sequence according to the ciphertext template key comprises the following steps:
and generating an encryption sequence based on the Logistic chaotic system according to the ciphertext template key.
2. The communication method according to claim 1, wherein the step of performing DNA encoding and DNA operation on the matrix and the ciphertext template matrix to obtain an encryption matrix comprises:
the matrix partitioning processing is carried out to obtain at least one first partition;
the ciphertext template matrix is subjected to block processing to obtain at least one second block;
respectively encoding the first block and the second block according to a preset DNA encoding rule;
and carrying out preset DNA operation on the encoded first block and second block to obtain an encryption matrix.
3. The communication method according to claim 2, wherein the step of performing DNA encoding and DNA operation on the matrix and the ciphertext template matrix to obtain an encryption matrix comprises:
generating a control sequence based on the LSS, the LTS and the TSS chaotic system according to the matrix;
selecting corresponding DNA coding rules according to the control sequences to respectively code the first block and the second block;
and selecting corresponding DNA operation rules according to the control sequences to perform DNA operation on the encoded first and second blocks.
4. The communication method of claim 3, wherein the step of generating a control sequence based on the LSS, LTS, and TSS chaotic system according to the matrix comprises:
respectively calculating initial values based on LSS, LTS and TSS chaotic systems according to the matrix;
and generating a control sequence by using the initial value.
5. The communication method according to claim 4, wherein the step of calculating initial values based on the LSS, LTS, and TSS chaotic system, respectively, according to the matrix includes:
the initial values comprise four, and four control sequences are respectively generated by using the four initial values.
6. The communication method of claim 5, wherein the four control sequences are a first control sequence, a second control sequence, a third control sequence, and a fourth control sequence, wherein,
the first control sequence is used for determining a DNA coding rule of the first block;
the second control sequence is used for determining a DNA coding rule of the second block;
the third control sequence is used for determining DNA operation rules carried out by the first block and the second block;
the fourth control sequence is used to determine a decoding rule of the encryption matrix.
CN202111197034.0A 2021-09-16 2021-10-14 WFRFT (Wireless Fidelity-rft) secure communication method based on DNA dynamic coding Active CN113949503B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111084885 2021-09-16
CN2021110848854 2021-09-16

Publications (2)

Publication Number Publication Date
CN113949503A CN113949503A (en) 2022-01-18
CN113949503B true CN113949503B (en) 2024-01-23

Family

ID=79330406

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111197034.0A Active CN113949503B (en) 2021-09-16 2021-10-14 WFRFT (Wireless Fidelity-rft) secure communication method based on DNA dynamic coding

Country Status (1)

Country Link
CN (1) CN113949503B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105046634A (en) * 2015-07-06 2015-11-11 北京电子科技学院 Image encryption method based on information entropy and a spatiotemporal chaotic system
CN107798708A (en) * 2017-11-16 2018-03-13 深圳大学 A kind of out of order codings of DNA and the image encryption and decryption method of chaotic maps
WO2018153317A1 (en) * 2017-02-24 2018-08-30 陈伟 Chaotic map-based digital chaotic encryption method
WO2019066007A1 (en) * 2017-09-29 2019-04-04 望 谷内江 Encryption method, decryption method, encryption system and decryption system
CN112422268A (en) * 2020-11-10 2021-02-26 郑州轻工业大学 Image encryption method based on block scrambling and state conversion
CN112583574A (en) * 2020-12-04 2021-03-30 中国人民解放军空军工程大学 WFRFT transmission method and system based on two-dimensional chaotic mapping amplitude phase encryption
CN112600663A (en) * 2021-01-05 2021-04-02 电子科技大学 Multilayer encryption method for reconstructed chaotic sequence

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20140032307A (en) * 2012-09-06 2014-03-14 삼성전자주식회사 Methods and system for multilevel data security
US20200151356A1 (en) * 2017-08-11 2020-05-14 Duality Technologies, Inc. System and method for fast and efficient searching of encrypted ciphertexts
US20200287704A1 (en) * 2020-05-22 2020-09-10 Qiang Zhang Color Image Encryption Method Based on DNA Strand Displacement Analog Circuit

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105046634A (en) * 2015-07-06 2015-11-11 北京电子科技学院 Image encryption method based on information entropy and a spatiotemporal chaotic system
WO2018153317A1 (en) * 2017-02-24 2018-08-30 陈伟 Chaotic map-based digital chaotic encryption method
WO2019066007A1 (en) * 2017-09-29 2019-04-04 望 谷内江 Encryption method, decryption method, encryption system and decryption system
CN107798708A (en) * 2017-11-16 2018-03-13 深圳大学 A kind of out of order codings of DNA and the image encryption and decryption method of chaotic maps
CN112422268A (en) * 2020-11-10 2021-02-26 郑州轻工业大学 Image encryption method based on block scrambling and state conversion
CN112583574A (en) * 2020-12-04 2021-03-30 中国人民解放军空军工程大学 WFRFT transmission method and system based on two-dimensional chaotic mapping amplitude phase encryption
CN112600663A (en) * 2021-01-05 2021-04-02 电子科技大学 Multilayer encryption method for reconstructed chaotic sequence

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
FBMC/OQAM Security Strategy Based on Diversity DNA Encryption;Rong Tang et al.;《IEEE Photonics Journal》;全文 *
Security Improvement for OFDM-PON via DNA Extension Code and Chaotic Systems;TINGWEI WU et al.;《IEEE ACCESS》;正文第I-III节 *
倪磊 等.基于改进Logistic相位扰码的抗截获通信.《华中科技大学学报(自然科学版)》.2019,全文. *
基于OFDM 系统的物理层加密方法研究;孙颖;《中国优秀硕士学位论文全文数据库 信息科技辑》;正文第3.3节,图3.7 *
王宏达.一种基于混沌系统的新型图像加密算法.《光学技术》.2017,全文. *

Also Published As

Publication number Publication date
CN113949503A (en) 2022-01-18

Similar Documents

Publication Publication Date Title
CN110677236B (en) OFDM encryption method based on composite chaotic system and XOR operation
CN112019321B (en) Five-dimensional optical probability shaping encryption method based on high-dimensional chaotic system
CN101719908A (en) Image encryption method based on chaos theory and DNA splice model
CN105577359A (en) OOFDM (Optical Orthogonal Frequency Division Multiplexing) encryption system based on chaos sequence pilot frequency mapping
CN108833390B (en) Matrix transformation-based packet physical layer encryption method
Zhou et al. Physical layer dynamic key encryption in OFDM-PON system based on cellular neural network
CN112600663A (en) Multilayer encryption method for reconstructed chaotic sequence
CN114928435B (en) Quantum noise stream encryption method and system based on DNA coding and SLM
CN111600661B (en) Three-dimensional encryption OFDM optical system based on real-time updated chaotic key distribution
CN112597519A (en) Non-key decryption method based on convolutional neural network in OFDM (orthogonal frequency division multiplexing) encryption system
CN103427980B (en) A kind of ofdm system safety of physical layer algorithm based on two-matrix transformation
CN110336657A (en) A kind of light OFDM dynamic key production method based on the characteristic of channel
Som et al. A colour image encryption based on DNA coding and chaotic sequences
Noura et al. A physical encryption scheme for low-power wireless M2M devices: a dynamic key approach
CN117082502B (en) Data acquisition and signal identification method based on data information encryption method
CN112583574B (en) WFRFT transmission method and system based on two-dimensional chaotic mapping amplitude phase encryption
CN113271201A (en) Dynamic AES physical layer data encryption method
CN113949503B (en) WFRFT (Wireless Fidelity-rft) secure communication method based on DNA dynamic coding
CN102208975B (en) Signal encoding/encryption transmission method
CN114142987B (en) OCDM system based on novel Logistic chaotic encryption mode
CN114302270B (en) OFDM-PON physical layer encryption method and system based on multi-chaotic system and hierarchical scrambling
Tang et al. FBMC/OQAM security strategy based on diversity DNA encryption
CN115225249A (en) MP-WFRFT communication method and system based on multi-cascade chaotic encryption
CN114615119B (en) SCBT transmission method and system based on two-dimensional chaotic mapping constellation encryption
Jiang et al. Security-enhanced CO-OFDM based on dynamic DNA encoding and frequency domain scrambling

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant