CN102111178A - Synchronous capturing based on sequence correlation property under very low signal-to-noise ratio - Google Patents
Synchronous capturing based on sequence correlation property under very low signal-to-noise ratio Download PDFInfo
- Publication number
- CN102111178A CN102111178A CN2009102650037A CN200910265003A CN102111178A CN 102111178 A CN102111178 A CN 102111178A CN 2009102650037 A CN2009102650037 A CN 2009102650037A CN 200910265003 A CN200910265003 A CN 200910265003A CN 102111178 A CN102111178 A CN 102111178A
- Authority
- CN
- China
- Prior art keywords
- sequence
- centerdot
- capturing
- probability
- output
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Synchronisation In Digital Transmission Systems (AREA)
Abstract
The invention provides a novel long sequence capturing method based on sequence fast correlation attacks. The target of the sequence capturing is to find an initial state of the current sequence from a receiving signal; in most actual solutions, only the long sequences are visible; therefore, the sequence capturing problem can be described as follows: under the condition that the visible sequence Z of a given M-length and noise is {zi} (t=0, 1,..., M-1), the initial state of the sequence is estimated and generated; the traditional sequence capturing technology uses self-correlation characteristics of pseudo codes to locally generate a pseudo code copy and receive the pseudo code to perform correlation operation; if a threshold detection identifies the correlation peak, the capturing is finished. The novel long sequence capturing method based on sequence fast correlation attack provided by the invention has the following fundamental principle: the key information is used as the initial state of a linear feedback shifting register; an output sequence of the linear feedback shifting register is taken as output for encoding a code word; the output code word is decoded by the fast correlation attack algorithm at a receiving end via a channel; and the key information is recovered as the initial state of the linear feedback shifting register so as to realize the sequence capturing. The method is low in complicatedness and fast in capturing speed; moreover, the method not only can be used for capturing linear sequences but also can be used for capturing nonlinear sequences.
Description
Technical field
The invention belongs to electronic technology field,, particularly adopt simultaneous techniques to improve the mobile radio system that communication reliability communicates as fields such as radio communication, mobile communication, deep space communications.
Background technology
Simultaneous techniques is an important problem in the communication, in communication system, the transmitting terminal of signal and receiving terminal will reach temporal acting in agreement, often relate to synchronously for reaching this purpose of acting in agreement, the reduction of synchro system performance, the reduction that can directly cause communication system performance for the reliable transmission of guarantee information, requires synchro system that higher reliability should be arranged Just because of this.In direct sequence spread spectrum communication,, must make that at first (PN, Pseudo-noise) sequence and received signal PN sequence realize regularly synchronous for local pseudorandom in the receiver for realizing communication.Two steps that generally were divided into synchronously of direct sequence realize, promptly catch synchronously and follow the tracks of synchronously, and the pseudo random sequence of communication starting stage to catch be the top priority of spread spectrum communication.The attack of stream cipher is exactly to obtain the initial condition that it respectively generates feedback shift register (LFSR) by the sequence flows of intercepting and capturing, and it is the most effective a kind of in the Sequence Cipher Attack method that fast correlation is attacked.Recovery initial information algorithm during fast correlation is attacked has shown the good performance that restPoses under low signal-to-noise ratio.And the pseudo random sequence of communication starting stage is caught the initial condition of seeking communication sequence just.
This patent provides a kind of long sequence capturing new method of attacking based on fast correlation.Traditional sequence capturing technology is all utilized the autocorrelation performance of pseudo-code, produces a pseudo-code copy by this locality and carries out related operation with the reception pseudo-code, if Threshold detection identifies relevant peaks then catches and finish.The basic thought of the long sequence capturing method of attacking based on fast correlation is the initial information of searching formation sequence from the sequence flows that receives, with the initial state of key message as linear feedback shift register, the output sequence of linear feedback shift register is regarded the output of coding codeword as, the output code word is through channel, decipher with the fast correlation attack algorithm at receiving terminal, recover key message, i.e. the initial state of linear feedback shift register realizes sequence capturing thus.This method complexity is low, acquisition speed is fast, and both can be used for catching of linear order, can be used for catching of non-linear sequence again.
Summary of the invention
This patent provides a kind of long sequence capturing new method of attacking based on fast correlation.For sequence generator shown in Figure 1, (u
1, u
2... u
i... u
s) be the output sequence of linear shift register (LFSR), z
iBe the output after comprehensive through function f (f can be that linear function also can be a nonlinear function); The model attacked of fast correlation as shown in Figure 2, sequence (u
1, u
2... u
i... u
s) by bit be the BSC channel of 1-p by error probability, obtain sequence z=(z
1... z
i, z
I+1... z
N), the dependent probability p of definition channel output sequence and list entries is p=P (u
i=z
i), the thought that fast correlation is attacked is exactly the sequence z in the length N of known channel output, and recovers original sequence (u under the situation of dependent probability p
1, u
2... u
i, u
s), thereby recover initial condition (a
1, a
2... a
k).
With the basic principle of the PN sequence capturing of lucid and lively fast correlation attack algorithm as the linear feedback shift register of Fig. 3, the linear feedback shift register of Fig. 3 is the linear feedback shift register on binary system r rank, establishes u
t=a
tBe the output of moment t, then a
T+i, 0≤i≤r-1 is the value of i register, and constraints is
Wherein
Expression mould 2 adds g
i∈ 0, and 1}, 0≤i≤r is a feedback factor.Generator polynomial is g (x)=g
0+ g
1X+ ... + g
R-1x
R-1+ g
rx
rAs g (x) is the initial condition a=(a of primitive polynomial and register
0, a
1..., a
R-1), a
i{ 0, when 1} was not zero entirely, the maximum cycle of the linear feedback shift register on r rank was N=2 to ∈
r-1.
The target of sequence capturing is to find the initial condition a of current sequence from received signal z.In most practical solution, the part of having only long sequence as seen, so the problem of sequence capturing can be described as: at the visible sequence Z={z of the long band of given M noise
t, t=0,1 ..., under the M-1 situation, estimate formation sequence initial condition a, acquisition procedure is:
The naive model that step 1 is set up acquisition sequence is
E wherein
cBe every chip signal energy, n
tBe that average is that zero variance is N
0/ 2 additive white Gaussian noise (AWGN).A formula mistake! Do not find Reference source.In model be expressed as with vector form
N=(n wherein
0, n
1..., n
M-1)
TBe that average is that null covariance matrix is N
0/ 2I
MGauss's vector, I
MIt is the unit matrix of M * M.
The step 2 iteration probability calculation stage
(1) establishes proper polynomial g (x)=1+g of LFSR
1X+g
2x
2+ ... + g
rx
rTap number be t, weight is t+1.Because
Repetition power by g (x) can obtain the check polynomial that new weight is t+1, and each check polynomial is again corresponding to a verification equation.
(2) be provided with one about u
iWeight be the verification equation of t+1
Translation feature by LFSR can obtain other t about u
iDifferent verification equatioies:
.
. (5)
.
Obtain M altogether about u by last method
iThe verification equation, the element substitution of correspondence position among the z is had:
z
i+y
1=L
1
z
i+y
2=L
2 (6)
.
.
.
z
i+y
M=L
M
y
jThe value correct probability of middle t diverse location is respectively p
1, p
2..., p
t,
So, z
iTotal h the establishment of total M verification equation, Probability p
*=P (u
i=z
i| u
i) following calculating:
The step 3 verification stage in stage
Work as p
*These new probability are less than given thresholding p
ThrNumber N
wSurpass another set-point N
Thr, the iterations that perhaps calculates new probability surpasses certain value, just new probability is got benefit less than the bit of set-point, then replaces former sequence with new sequence, and the probability of each bit is changed to former dependent probability p again, obtains (u
1, u
2... u
i... u
s)
*
The iteration capture of step 4 sequence
(u with step 3 output
1, u
2... u
i... u
s)
*Recover initial information (a
1, a
2... a
k)
*, catching of verification sequence if realize catching, stops; Otherwise repeat above-mentioned steps two, three, surpass certain value up to reproducing former LFSR sequence or iterations.
Accompanying drawing and description of drawings
Fig. 1 composite sequence maker
(a
1, a
2... u
k) be the initial condition of input, (u
1, u
2... u
i, u
s) be the output sequence of linear shift register (LFSR), z
iBe the output after comprehensive through function f;
The model that Fig. 2 fast correlation is attacked
Sequence (u
1, u
2... u
i... u
s) by bit be the BSC channel of 1-p by error probability, obtain sequence z=(z
1, z
i, z
I+1... z
N), the dependent probability p=P (u of definition channel output sequence and list entries
i=z
i), p is the metastasis model of channel.
The generation block diagram of Fig. 3 r-rank LFSR
u
t=a
tBe the output of moment t, then a
T+i, 0≤i≤r-1 is the value of i register, and constraints is,
Wherein
Expression mould 2 adds g
i∈ 0, and 1}, 0≤i≤r is a feedback factor.The initial condition of register is a=(a
0, a
1..., a
R-1), a
i∈ 0, when 1} is not zero entirely.
Fig. 4 sequence iteration capture
(u with step 3 output
1, u
2... u
i, u
s)
*Recover initial information (a
1, a
2... a
k)
*, catching of verification sequence if realize catching, changes tracking over to; Otherwise with (u
1, u
2... u
i... u
s)
*Replace z
i, repeating step two, three.
The performance of each catching method relatively when Fig. 5 caught length 256
When catching length 256 constantly, iterations is that 20 times new method is being dwindled with gap parallel, the serial catching method, and new catching method performance has surpassed iterative message and transmitted catching method.
Claims (3)
1. this patent provides a kind of long sequence capturing method of attacking based on sequence fast correlation, the basic thought of this method is an initial information of seeking formation sequence from the sequence flows that receives, with the initial state of key message as linear feedback shift register, the output sequence of linear feedback shift register is regarded the output of coding codeword as, the output code word is through channel, decipher with the fast correlation attack algorithm at receiving terminal, recover key message, be the initial state of linear feedback shift register, realize sequence capturing thus.
2. the long sequence capturing method that a kind of sequence fast correlation according to claim 1 is attacked comprises following step:
The naive model that step 1 is set up acquisition sequence is
E wherein
cBe every chip signal energy, n
tBe that average is that zero variance is N
0/ 2 additive white Gaussian noise (AWGN).A formula mistake! Do not find Reference source.In model be expressed as with vector form
N=(n wherein
0, n
1..., n
M-1)
TBe that average is that null covariance matrix is N
0/ 2I
MGauss's vector, I
MIt is the unit matrix of M * M.
The step 2 iteration probability calculation stage
(1) establishes proper polynomial g (x)=1+g of LFSR
1X+g
2x
2+ ... + g
rx
rTap number be t, weight is t+1.Because
Repetition power by g (x) can obtain the check polynomial that new weight is t+1, and each check polynomial is again corresponding to a verification equation.
(2) be provided with one about u
iWeight be the verification equation of t+1
Translation feature by LFSR can obtain other t about u
iDifferent verification equatioies:
.
. (4)
.
Obtain M altogether about u by last method
iThe verification equation, the element substitution of correspondence position among the z is had:
z
i+y
1=L
1
z
i+y
2=L
2 (5)
.
.
.
z
i+y
M=L
M
y
jThe value correct probability of middle t diverse location is respectively p
1, p
2..., p
t,
So, z
iTotal h the establishment of total M verification equation, Probability p
*=P (u
i=z
i| u
i) following calculating:
The step 3 verification stage in stage
Work as p
*These new probability are less than given thresholding p
ThrNumber N
wSurpass another set-point N
Thr, the iterations that perhaps calculates new probability surpasses certain value, just new probability is got benefit less than the bit of set-point, then replaces former sequence with new sequence, and the probability of each bit is changed to former dependent probability p again, obtains (u
1, u
2... u
i... u
s)
*
The iteration capture of step 4 sequence
(u with step 3 output
1, u
2... u
i... u
s)
*Recover initial information (a
1, a
2... a
k)
*, catching of verification sequence if realize catching, stops; Otherwise repeat above-mentioned steps two, three, surpass certain value up to reproducing former LFSR sequence or iterations.
3. a kind of long sequence capturing method of attacking based on sequence fast correlation according to claim 2, it is characterized in that: this method both can be used for catching of linear order, can be used for catching of non-linear sequence again.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2009102650037A CN102111178A (en) | 2009-12-28 | 2009-12-28 | Synchronous capturing based on sequence correlation property under very low signal-to-noise ratio |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2009102650037A CN102111178A (en) | 2009-12-28 | 2009-12-28 | Synchronous capturing based on sequence correlation property under very low signal-to-noise ratio |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102111178A true CN102111178A (en) | 2011-06-29 |
Family
ID=44175220
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2009102650037A Pending CN102111178A (en) | 2009-12-28 | 2009-12-28 | Synchronous capturing based on sequence correlation property under very low signal-to-noise ratio |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102111178A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102571136A (en) * | 2012-01-29 | 2012-07-11 | 北京航空航天大学 | Correlated peak detection method of double channel pn code acquisition system |
CN104579414A (en) * | 2015-01-29 | 2015-04-29 | 长安大学 | Method for adaptively acquiring P codes on basis of averaging technology |
-
2009
- 2009-12-28 CN CN2009102650037A patent/CN102111178A/en active Pending
Non-Patent Citations (1)
Title |
---|
王苏灵: "基于序列密码相关攻击的通信可靠性研究", 《基于序列密码相关攻击的通信可靠性研究》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102571136A (en) * | 2012-01-29 | 2012-07-11 | 北京航空航天大学 | Correlated peak detection method of double channel pn code acquisition system |
CN102571136B (en) * | 2012-01-29 | 2014-01-22 | 北京航空航天大学 | Correlated peak detection method of double channel pn code acquisition system |
CN104579414A (en) * | 2015-01-29 | 2015-04-29 | 长安大学 | Method for adaptively acquiring P codes on basis of averaging technology |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101297486B (en) | Information carrying synchronization code and method for frame timing synchronization | |
CN100531016C (en) | Method for decoding identification code transmitted by mobile station to base station in CDMA cellular communication system | |
CN100501442C (en) | Multiuser detector based on iterative message transfer algorithm | |
NO20065174L (en) | Procedures and structures for fast code acquisition in spread spectrum communication | |
CN109936520B (en) | Low-complexity GMSK demodulation timing synchronization method in burst communication | |
CN103490860A (en) | Iterative demodulating and decoding method for high-performance shortwave orthogonal spectrum spreading | |
CN104539310A (en) | Direct sequence spread spectrum signal hiding method | |
WO2022247082A1 (en) | Transmission method in which pseudo-random sequence and sparse concatenated code are superimposed in bit field | |
Carroll | Chaos for low probability of detection communications | |
CN105763205A (en) | Spiral interleaver parameter blind estimation method based on Gauss column elimination | |
CN102111178A (en) | Synchronous capturing based on sequence correlation property under very low signal-to-noise ratio | |
CN105406897A (en) | High data rate direct sequence spread spectrum coding and decoding method | |
CN104734814B (en) | A kind of LDPC codings and interpretation method suitable for non-coherent ultra-broad band communication system | |
CN107786296A (en) | A kind of reconstructing method for GOLD sequences | |
CN105812023A (en) | Sequence cross correlation property-based spectrum spreading and modulating as well as spectrum despreading and demodulating method and device | |
Bychenkov et al. | Fast acquisition of PN sequences in DS/CDMA systems | |
Mikhaylov et al. | A Noise Immunity Estimation of the Gold Sequence Ensembles Fast Delay Acquisition Devices | |
CN103501187A (en) | Interference cancellation-based short wave multi-path signal synchronization method | |
TWI510002B (en) | Synchronization device and synchronization method thereof | |
Liu et al. | Application of Soft-Decision Decoding Algorithm for Convolution Coding of M-ary Spread Spectrum Signals | |
CN113676215B (en) | double-M-element coding spread spectrum method and system in high dynamic environment | |
Des Noes et al. | Improving the decoding of m-sequences by exploiting their decimation property | |
Hua et al. | Self-encoded spread spectrum synchronization with genetic algorithm and markov chain analysis | |
Du et al. | RFID multi-channel design method based on CDMA | |
Kim et al. | Robust noncoherent PN-code acquisition for CDMA communication systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20110629 |