CN105763311A - Multicast multiuser voice chaotic secret communication method - Google Patents

Multicast multiuser voice chaotic secret communication method Download PDF

Info

Publication number
CN105763311A
CN105763311A CN201610079628.4A CN201610079628A CN105763311A CN 105763311 A CN105763311 A CN 105763311A CN 201610079628 A CN201610079628 A CN 201610079628A CN 105763311 A CN105763311 A CN 105763311A
Authority
CN
China
Prior art keywords
voice
encryption
data
speech
chaos
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610079628.4A
Other languages
Chinese (zh)
Inventor
林卓胜
禹思敏
甘秋业
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong University of Technology
Original Assignee
Guangdong University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong University of Technology filed Critical Guangdong University of Technology
Priority to CN201610079628.4A priority Critical patent/CN105763311A/en
Publication of CN105763311A publication Critical patent/CN105763311A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/04Protocols for data compression, e.g. ROHC

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a multicast multiuser voice chaotic secret communication method. A voice transmitting side acquires voice and transmits the voice data to a compression module to be compressed. An encryption module completes chaotic encryption of the voice data and then transmits the voice data to a transmission module. The transmission module transmits the encrypted voice data to multiple corresponding receiving sides through the network. Each voice receiving side is connected with the voice transmitting side and receives the encrypted voice stream data transmitted by the transmission module, and decrypts and decompresses the received encrypted voice data and plays the voice data at the receiving sides. The multicast multiuser voice chaotic secret communication method has the characteristics of high security of voice communication so that security of voice communication can be enhanced.

Description

A kind of speech chaotic security communication method of multicast multi-user
Technical field
The present invention relates to Speech Chaotic encryption communication method and technology field, particularly to a kind of speech chaotic security communication method of multicast multi-user.
Background technology
In recent years, along with the fast development of network transmission technology, and lacking protection mechanism in voice communication course, voice communication information the problem such as is easily ravesdropping and increasingly causes the concern of people.Cryptographic means for voice communication information is also widely studied, and is suggested to protect all or part of speech data based on the cryptographic means of nonlinear system in a large number.A big research direction as nonlinear system, from nineteen ninety 0GY after method is suggested, chaos controlling has become as one of study hotspot of speech security aspect, chaos because of its have positive Liapunov exponent, pseudo-randomness, to characteristics such as initial condition and systematic parameter extreme sensitivity, be widely used in secret communication aspect.But, current speech ciphering method, safety still suffers from deficiency, it is impossible to meet the requirement of voice communication safety.
Therefore, not enough for prior art, it is provided that the high multicast multi-user voice Development of Chaotic Secure Communication Method of a kind of safety is to overcome prior art deficiency very necessary.
Summary of the invention
It is an object of the invention to provide a kind of speech chaotic security communication method of multicast multi-user, have the advantages that voice messaging confidentiality is high, it is possible to increase the safety of speech communication.
The above-mentioned purpose of the present invention is realized by following technological means:
A kind of speech chaotic security communication method of multicast multi-user is provided, undertaken by speech secret communication system, described speech secret communication system includes voice transmitting terminal and the multiple phonetic incepting ends being mutually matched with described voice transmitting terminal, and described voice transmitting terminal is provided with voice acquisition module, compression module, encrypting module and transport module;
In communication process, described voice transmitting terminal comprises the steps:
SA. voice acquisition module Real-time Collection voice speech data is sent to compression module;
SB. the speech data that voice acquisition module is carried is compressed and by the voice data transmission after after compression to encrypting module by compression module;
SC. encrypting module is sent to transport module after the speech data after compression is carried out chaos encryption;
SD. the speech data after encryption is transmitted through the network to the receiving terminal of multiple correspondence by transport module in real time;
In communication process, each phonetic incepting end comprises the steps:
RA. it is connected to voice transmitting terminal and receives the encryption voice stream data of transport module conveying;
RB. the encrypted voice data received is decrypted decompression processing;
RC. the voice messaging after receiving terminal plays deciphering decompression.
The cipher mode of above-mentioned steps SC is three grades of chaos encryptions.
It is 16bit that above-mentioned steps SA gathers the quantization bit position of voice mode.
The compress mode of above-mentioned steps SB is IMA-ADPAM voice compression algorithm.
Above-mentioned steps SD with WIFI multicast form by encryption after voice data transmission.
Above-mentioned steps RA is specifically connected to voice transmitting terminal in UDP mode.
The decoding process adopted in above-mentioned steps RB is IMA-ADPAM voice decompression algorithm, and the manner of decryption adopted is chaos deciphering.
In above-mentioned steps SC, a receiving terminal reduces by correct secret key decryption and plays voice wherein, at another receiving terminal broadcasting voice signal of mismatch secret key decryption.
Preferably, above-mentioned three grades of chaos encryption processes include: in first order chaos encryption, utilize sextuple chaotic maps, each bit data in compress speech data are carried out scramble;In the chaos encryption of the second level, utilize 7 degree of freedom chaotic maps, the position of each byte voice compression data in packet is carried out scramble;In third level chaos encryption, utilize chaos stream cipher to carry out taking turns iterative cryptographic to the value of compress speech data more.
Preferably, three grades of chaos encryption processes, specifically:
SC1. first order cryptographic calculation
Utilizing sextuple chaotic maps, each bit data in compress speech data are carried out scrambling encryption, the number obtaining position scramble is 4096, choosesMake n=6:
A 6 = 1 5 18 52 121 197 1 6 22 64 149 242 1 5 19 55 128 208 1 4 13 38 88 144 1 3 8 20 48 80 1 2 4 8 16 32 ;
Raw tone being compressed data and is temporarily stored in inbuf relief area, the data after encryption are temporarily stored in outbuf relief area, and before encryption, all bit data in outbuf relief area are all 0;
Chaos encryption algorithm is as follows:
(1) according to above-mentioned steps SC1, can encrypt the serial number S of front compress speech data corresponding be mapped as coordinate corresponding to E (S), E (S) be (i, j);
(2) the 1bit data extracted in inbuf in ith row and jth column corresponding unit, according to formula (inbuf [i] > > j) &1 ∈ { 0,1} operation;
(3) utilizing 6D chaotic maps table to carry out position mapping, obtaining the coordinate after mapping is:
{ x = f l o o r ( 6 D - m a p - t a b l e [ i × 8 + j ] / 8 ) y = mod ( 6 D - m a p - t a b l e [ i × 8 + j ] , 8 ) ;
(4) will (i, j) the 1bit data in corresponding unit replace (x, y) in corresponding unit:
Outbuf [x]=(((inbuf [i]>>j) &1)<<y) ∨ outbuf [x];
Symbol ">in formula>j " represent and move to right j position, "<<y " represents and moves to left y position, and " & " represents that press bit position and computing, and bit position is pressed in " ∨ " expression or computing, " mod " represents modular arithmetic, and " floor " represents round numbers part;
SC2. second level cryptographic calculation
Using 7 dimension chaotic maps, adopt the position scrambled scheme of 8bits data that the position of one frame compress speech data is encrypted, the number obtaining position scramble is 16348, chooses A i , j ( 12 ) = 1 , A j , i ( 21 ) = 1 , A j , j ( 22 ) = 2 , Make n=7:
A 7 = 1 6 25 84 237 550 903 1 7 30 102 289 671 1100 1 6 26 88 249 578 948 1 5 19 63 176 408 672 1 4 13 38 104 240 400 1 3 8 20 48 112 192 1 2 4 8 16 32 64 ;
The position of the compress speech data that one frame is 16384 is encrypted, and raw tone compression data are temporarily stored in inbuf relief area, and the data after encryption are temporarily stored in outbuf relief area;
Encryption before compress speech data serial number S (S=0,1,2 ..., 214-1) it is:
S=x1,k×27×2-2+x2,k×27×2-4+…+xn-1,k×22+xn,k×20
After encryption, the position of corresponding each serial number S is mapped as:
E (S)=E (S, α1)×27×2-2+E(S,α2)×27×2-4+…+E(S,α6)×22+E(S,α7)×20
α in formulai(i=1,2 ..., 7) ∈ 1,2 ..., and 7}, α1≠α2≠…≠α7
SC3. third level cryptographic calculation
In third level chaos encryption, utilize chaos stream cipher to carry out taking turns iterative cryptographic to the value of compress speech data more;
Setting up 3 d-dem type chaos system kinetics equation, formula is:
x 1 ( k + 1 ) = a 11 x 1 ( k ) + a 12 x 2 ( k ) + a 13 x 3 ( k ) x 2 ( k + 1 ) = a 21 x 1 ( k ) + a 22 x 2 ( k ) + a 23 x 3 ( k ) x 3 ( k + 1 ) = a 31 x 1 ( k ) + a 32 x 2 ( k ) + a 33 x 3 ( k ) + &epsiv; sin ( &sigma;x 1 ( k ) ) ;
In formula A = a 11 a 12 a 13 a 21 a 22 a 23 a 31 a 32 a 33 = 0.205 - 0.595 0.265 - 0.265 - 0.125 0.595 0.33 - 0.33 0.47 , Characteristic of correspondence root is respectively positioned in unit circle, nominal system Asymptotic Stability;g(σx1(k), ε)=ε sin (σ x1(k)) for uniformly bounded revertive control device, ε and σ is for controlling parameter;
Choose ε=3 × 108, σ=2 × 105, obtaining Liapunov exponent is LE1=14.9, LE2=14.8, LE3=0.19;
Taking turns in encryption situation 1, the iterative equation obtaining voice transmitting terminal Chaotic Encryption System is:
x 1 ( d ) ( k + 1 ) = a 11 ( d ) x 1 ( d ) ( k ) + a 12 ( d ) x 2 ( d ) ( k ) + a 13 ( d ) x 3 ( d ) ( k ) x 2 ( d ) ( k + 1 ) = a 21 ( d ) p ( k ) + a 22 ( d ) x 2 ( d ) ( k ) + a 23 ( d ) x 3 ( d ) ( k ) x 3 ( d ) ( k + 1 ) = a 31 ( d ) p ( k ) + a 32 ( d ) x 2 ( d ) ( k ) + a 33 ( d ) x 3 ( d ) ( k ) + &epsiv; ( d ) sin ( &sigma; ( d ) p ( k ) ) ;
In formulaS (k) is the voice signal of input, and symbol " " represents step-by-step XOR;
This discrete time chaos system kinetics equation is along with the increase of k, at transmitting terminal, by including the closed loop feedback method of voice signal, output signal p (k) is fed back, substitutes in the 2nd~3 equation of transmitting terminal chaos system respectivelyContinuous iteration, by by generationDouble precision real numbers value is converted to 32 for integer, then takes its least-significant byte, carries out XOR with 8 voice signals and obtain ciphertext value;
Also include carrying out taking turns stream cipher encrypting in units of frame to each frame speech data more, at transmitting terminal, each frame voice signal is carried out M (M=1,2,3, ...) wheel encryption: first K1 is positioned at 1, inputs a frame voice signal and be encrypted, secondly, K1 is positioned at 2, a frame voice signal after encryption one being taken turns takes turns encryption by carrying out second again after K1 feedback, and so forth, carries out M wheel encryption altogether;After completing M wheel encryption, K2 connects, and last takes turns a frame voice signal channel output of encryption;Then K1 is positioned at 1 again, then inputs next frame voice signal and be encrypted, and completes the wheel encryption of the M to voice signal one by one so again and again;
Corresponding, in RB, the process of deciphering is as follows:
First the third level described in step SC3 being added ciphertext data to be decrypted, when 1 takes turns deciphering, the iterative equation obtaining phonetic incepting end chaos decryption system is
x 1 ( r ) ( k + 1 ) = a 11 ( r ) x 1 ( r ) ( k ) + a 12 ( r ) x 2 ( r ) ( k ) + a 13 ( r ) x 3 ( r ) ( k ) x 2 ( r ) ( k + 1 ) = a 21 ( r ) p ( k ) + a 22 ( r ) x 2 ( r ) ( k ) + a 23 ( r ) x 3 ( r ) ( k ) x 3 ( r ) ( k + 1 ) = a 31 ( r ) p ( k ) + a 32 ( r ) x 2 ( r ) ( k ) + a 33 ( r ) x 3 ( r ) ( k ) + &epsiv; ( r ) sin ( &sigma; ( r ) p ( k ) ) ;
In formulaS (k) is the voice signal of input, and symbol " " represents step-by-step XOR;
The voice encryption signal having encrypted M wheel received is substituted in the 2nd~3 equation of receiving terminal chaos system respectivelyCarry out corresponding M and take turns voice signal deciphering so that two Synchronization of Chaotic Systems of transmitting terminal and receiving terminal, thus realizing the deciphering of voice encryption signal;
At phonetic incepting end, the speech data that each frame is encrypted carries out M (M=1,2,3 ...) wheel deciphering: first K3 is positioned at 1, inputs a frame encrypted voice data and be decrypted, secondly, K3 is positioned at 2, and the frame speech data after deciphering one being taken turns takes turns deciphering by carrying out second again after K3 feedback, carries out M wheel deciphering and so forth altogether.After completing M wheel deciphering, K4 connects, and last takes turns a frame speech data output of deciphering;Then K3 is positioned at 1 again, then the speech data inputting next frame encryption is decrypted, and completes the wheel deciphering of the M to encrypted voice data one by one so again and again;
Again the second level described in step SC2 is encrypted and be decrypted, when receiving terminal puts in order with the submatrix of transmitting terminal and to mate completely, 8bits data can be set to and gain correct position, add confidential information can correctly decrypt, otherwise, being displaced to the position of mistake, namely receiving terminal correctly cannot decrypt adding confidential information;
Finally the first order described in step SC1 is encrypted and be decrypted, when receiving terminal puts in order with the submatrix of transmitting terminal and to mate completely, 1bits data can be set to and gain correct position, add confidential information can correctly decrypt, otherwise, being displaced to the position of mistake, namely receiving terminal correctly cannot decrypt adding confidential information.
The speech chaotic security communication method of the multicast multi-user of the present invention, undertaken by speech secret communication system, described speech secret communication system includes voice transmitting terminal and the multiple phonetic incepting ends being mutually matched with described voice transmitting terminal, and described voice transmitting terminal is provided with voice acquisition module, compression module, deciphering module and transport module.Voice transmitting terminal gathers voice and speech data is sent to compression module is compressed, encrypting module is transferred to transport module after speech data is completed chaos encryption, transport module the speech data after encryption is transmitted through the network to the receiving terminal of multiple correspondence in real time.Each phonetic incepting end is connected respectively to voice transmitting terminal and receives the encryption voice stream data of transport module conveying;And the encrypted voice data received is decrypted decompression processing and plays out at receiving terminal.The speech chaotic security communication method of the multicast multi-user of the present invention, has the advantages that speech communication confidentiality is high, it is possible to increase the safety of speech communication.
Accompanying drawing explanation
The present invention is further illustrated to utilize accompanying drawing, but the content in accompanying drawing does not constitute any limitation of the invention.
Fig. 1 is the flow chart of the speech chaotic security communication method of a kind of multicast multi-user of the present invention;
Fig. 2 is the embodiment of the present invention 2 block diagram based on the speech chaotic security communication system of multicast multi-user;
Fig. 3 is the position scramble schematic diagram of the 1bit data in the embodiment of the present invention 2;
Fig. 4 be in the embodiment of the present invention 2 based on 8bits compress speech data position scramble with invert random schematic diagram;
Fig. 5 is the three-dimensional chaotic system chaos attractor phasor in the embodiment of the present invention 2;
Fig. 6 is the design principle figure of the many wheels stream cipher encrypting in the embodiment of the present invention 2 and deciphering;
Fig. 7 is the decrypted result of two clients and transmitting terminal cipher key match;
Fig. 8 is that first client does not mate decrypted result with transmitting terminal key;
Fig. 9 is that second client does not mate decrypted result with transmitting terminal key.
Detailed description of the invention
The invention will be further described in conjunction with specific embodiments.
Embodiment 1.
As shown in Figure 1, a kind of speech chaotic security communication method of multicast multi-user, undertaken by speech secret communication system, speech secret communication system includes voice transmitting terminal and the multiple phonetic incepting ends being mutually matched with voice transmitting terminal, and voice transmitting terminal is provided with voice acquisition module, compression module, encrypting module and transport module.
In communication process, voice transmitting terminal comprises the steps:
SA. voice acquisition module Real-time Collection voice speech data is sent to compression module;
SB. the speech data that voice acquisition module is carried is compressed and by the voice data transmission after after compression to encrypting module by compression module;
SC. encrypting module is sent to transport module after the speech data after compression is carried out chaos encryption;
SD. the speech data after encryption is transmitted through the network to the receiving terminal of multiple correspondence by transport module in real time;
In communication process, each phonetic incepting end comprises the steps:
RA. it is connected to voice transmitting terminal and receives the encryption voice stream data of transport module conveying;
RB. the encrypted voice data received is decrypted decompression processing;
RC. the voice messaging after receiving terminal plays deciphering decompression.
Wherein, step SA gathers the quantization bit position of voice mode is 16bit.The compress mode of step SB is IMA-ADPAM voice compression algorithm.The cipher mode of step SC is three grades of chaos encryptions, and three grades of chaos encryption processes include: in first order chaos encryption, utilizes sextuple chaotic maps, each bit data in compress speech data are carried out scramble;In the chaos encryption of the second level, utilize 7 degree of freedom chaotic maps, the position of each byte voice compression data in packet is carried out scramble;In third level chaos encryption, utilize chaos stream cipher to carry out taking turns iterative cryptographic to the value of compress speech data more.Step SD with WIFI multicast form by encryption after voice data transmission.
Step RA is specifically connected to voice transmitting terminal in UDP mode.The decoding process adopted in step RB is IMA-ADPAM voice decompression algorithm, and the manner of decryption adopted is chaos deciphering.In step SC, can reduce by correct secret key decryption and play voice by a receiving terminal wherein, at another receiving terminal broadcasting voice signal of mismatch secret key decryption.
The speech chaotic security communication method of the multicast multi-user of the present invention, has the advantages that speech communication confidentiality is high, it is possible to increase the safety of speech communication.
Embodiment 2.
Adopt following hardware configuration as the hardware configuration of the speech chaotic security communication method of multicast multi-user of the present invention: with the ARM development board of one piece of Super4412 as voice transmitting terminal, with the ARM development board of two pieces of Super4412 as two phonetic incepting ends, the point-to-points network that multicast protocol realizes between voice transmitting terminal with phonetic incepting end is adopted to be connected.
As in figure 2 it is shown, the collection of ARM development board primary responsibility speech data of voice transmitting terminal, compression, speech data encryption, and by encryption after speech data be sent to multiple phonetic incepting end by wireless channel.The ARM development board of phonetic incepting end is responsible for the encrypted voice data that receiving end/sending end ARM development board sends, and is deciphered, and utilizes sound equipment to play back simultaneously.
In the present embodiment, speech data adopt the mode of three grades of chaos encryptions carry out.Speech data after compression carries out chaos encryption to reduce redundance and increase unicity distance.The method adopting three grades of chaos encryptions can further enhance the safety of whole system, and disclosure satisfy that the requirement of real-time that speech data is encrypted, transmitted, deciphers three links.It addition, the framework of multicast and IGMP agreement in employing subnet, it is achieved that ARM transmitting terminal is to the function of ARM receiving terminal member multicasts in net.
Concrete, the communication means of Speech Chaotic encryption is as follows:
SA. voice acquisition module Real-time Collection voice speech data is sent to compression module.
SB. compression module adopts the 16bits data stream compression that sound card is sampled by IMA-ADPCM voice compression algorithm every time to become 4bits, owing to not storing 4bits data type in C language, therefore the data after using char type to compress two are stored in a variable.Specifically, PCM data is compressed in chronological order successively and writes in relief area, the data after compressing containing 2 in each BYTE, the wherein data after low 4 correspondences the 1st compression, the data after high 4 correspondences the 2nd compression.
SC. encrypting module is sent to transport module after the speech data after compression is carried out three grades of chaos encryptions.
Three grades of chaos encryption processes are specific as follows:
SC1. first order cryptographic calculation
Utilizing sextuple chaotic maps, each bit data in compress speech data are carried out scrambling encryption, the number that can obtain position scramble isChoose A j , i ( 21 ) = 1 , A j , j ( 22 ) = 2 , Make n=6:
A 6 = 1 5 18 52 121 197 1 6 22 64 149 242 1 5 19 55 128 208 1 4 13 38 88 144 1 3 8 20 48 80 1 2 4 8 16 32 .
Owing to the frame data after compress speech are 16384, therefore needing to be divided into is 32 groups, and each group is 512, has 512 × 8=4096bits data, then the position of these 4096bits data is entered scramble and inverts unrest.Complete the encryption to the frame data after compress speech and deciphering in this way, need to carry out 32 altogether and take turns.Raw tone compression data are temporarily stored in inbuf relief area, and the data after encryption are temporarily stored in outbuf relief area, and before encryption, all bit data in outbuf relief area are all 0.
As it is shown on figure 3, chaos encryption algorithm is as follows:
(1) according to above-mentioned steps SC1, can encrypt the serial number S of front compress speech data corresponding be mapped as coordinate corresponding to E (S), E (S) be (i, j);
(2) the 1bit data extracted in inbuf in ith row and jth column corresponding unit, according to formula (inbuf [i] > > j) &1 ∈ { 0,1} operation;
(3) utilizing 6D chaotic maps table to carry out position mapping, obtaining the coordinate after mapping is:
{ x = f l o o r ( 6 D - m a p - t a b l e &lsqb; i &times; 8 + j &rsqb; / 8 ) y = mod ( 6 D - m a p - t a b l e &lsqb; i &times; 8 + j &rsqb; , 8 ) ;
(4) will (i, j) the 1bit data in corresponding unit replace (x, y) in corresponding unit:
Outbuf [x]=(((inbuf [i]>>j) &1)<<y) ∨ outbuf [x];
Symbol ">in formula>j " represent and move to right j position, "<<y " represents and moves to left y position, and " & " represents that press bit position and computing, and bit position is pressed in " ∨ " expression or computing, " mod " represents modular arithmetic, and " floor " represents round numbers part.
SC2. second level cryptographic calculation
Using 7 dimension chaotic maps, adopt the position scrambled scheme of 8bits data that the position of one frame compress speech data is encrypted, the number that can obtain position scramble is N = 2 n &times; N 0 = 2 7 &times; 2 = 16384. Choose A i , i ( 11 ) = 1 , A i , j ( 12 ) = 1 , A j , i ( 21 ) = 1 , A j , j ( 22 ) = 2 , Make n=7:
A 7 = 1 6 25 84 237 550 903 1 7 30 102 289 671 1100 1 6 26 88 249 578 948 1 5 19 63 176 408 672 1 4 13 38 104 240 400 1 3 8 20 48 112 192 1 2 4 8 16 32 64 .
Utilize 7 dimension chaotic maps, adopt the position scramble of 8bits data and invert random scheme, the position of the compress speech data that a frame is 16384 is encrypted, as shown in Figure 4, k in figurei(i=0,1,2 ..., 16383) ∈ 0,1,2 ..., and 16383}, k1≠k2≠…≠k16383.In the diagram, raw tone compression data are temporarily stored in inbuf relief area, and the data after encryption are temporarily stored in outbuf relief area.
Must encrypt front compress speech data serial number S (S=0,1,2 ..., 214-1) it is:
S=x1,k×27×2-2+x2,k×27×2-4+…+xn-1,k×22+xn,k×20
After must encrypting, the position of corresponding each serial number S is mapped as:
E (S)=E (S, α1)×27×2-2+E(S,α2)×27×2-4+…+E(S,α6)×22+E(S,α7)×20
α in formulai(i=1,2 ..., 7) ∈ 1,2 ..., and 7}, α1≠α2≠…≠α7
SC3. third level cryptographic calculation
In third level chaos encryption, utilize chaos stream cipher to carry out taking turns iterative cryptographic to the value of compress speech data more.
Setting up 3 d-dem type chaos system kinetics equation, formula is:
x 1 ( k + 1 ) = a 11 x 1 ( k ) + a 12 x 2 ( k ) + a 13 x 3 ( k ) x 2 ( k + 1 ) = a 21 x 1 ( k ) + a 22 x 2 ( k ) + a 23 x 3 ( k ) x 3 ( k + 1 ) = a 31 x 1 ( k ) + a 32 x 2 ( k ) + a 33 x 3 ( k ) + &epsiv; sin ( &sigma;x 1 ( k ) ) ;
In formula A = a 11 a 12 a 13 a 21 a 22 a 23 a 31 a 32 a 33 = 0.205 - 0.595 0.265 - 0.265 - 0.125 0.595 0.33 - 0.33 0.47 , Characteristic of correspondence root is respectively positioned in unit circle, nominal system Asymptotic Stability;g(σx1(k), ε)=ε sin (σ x1(k)) for uniformly bounded revertive control device, ε and σ is for controlling parameter.
Choose ε=3 × 108, σ=2 × 105, obtaining Liapunov exponent is LE1=14.9, LE2=14.8, LE3=0.19.Corresponding chaos attractor phasor is as shown in Figure 5.Taking turns in encryption situation 1, the iterative equation obtaining voice transmitting terminal Chaotic Encryption System is:
x 1 ( d ) ( k + 1 ) = a 11 ( d ) x 1 ( d ) ( k ) + a 12 ( d ) x 2 ( d ) ( k ) + a 13 ( d ) x 3 ( d ) ( k ) x 2 ( d ) ( k + 1 ) = a 21 ( d ) p ( k ) + a 22 ( d ) x 2 ( d ) ( k ) + a 23 ( d ) x 3 ( d ) ( k ) x 3 ( d ) ( k + 1 ) = a 31 ( d ) p ( k ) + a 32 ( d ) x 2 ( d ) ( k ) + a 33 ( d ) x 3 ( d ) ( k ) + &epsiv; ( d ) sin ( &sigma; ( d ) p ( k ) ) ;
In formulaS (k) is the voice signal of input, and symbol " " represents step-by-step XOR.
This discrete time chaos system kinetics equation is along with the increase of k, at transmitting terminal, by including the closed loop feedback method of voice signal, output signal p (k) is fed back, substitutes in the 2nd~3 equation of transmitting terminal chaos system respectivelyContinuous iteration, by by generationDouble precision real numbers value is converted to 32 for integer, then takes its least-significant byte, carries out XOR with 8 voice signals and obtain ciphertext value.
For further enhancing the ability resisting differential attack, carry out taking turns stream cipher encrypting in units of frame to each frame speech data more.
To take turns the basic functional principle of chaos stream cipher encrypting as follows more for voice signal as shown in Figure 6:
At transmitting terminal, each frame voice signal is carried out M (M=1,2,3 ...) take turns the operation principle encrypted: first K1 is positioned at 1, input a frame voice signal to be encrypted, secondly, K1 is positioned at 2, and the frame voice signal after encryption one being taken turns takes turns encryption by carrying out second again after K1 feedback, and so forth, M wheel encryption is carried out altogether.After completing M wheel encryption, K2 connects, and last takes turns a frame voice signal channel output of encryption.Then K1 is positioned at 1 again, then inputs next frame voice signal and be encrypted, and completes the wheel encryption of the M to voice signal one by one so again and again.
SD. information transmission: adopt framework and the IGMP agreement of multicast in subnet, it is achieved the audio data stream after encryption is sent to multiple receiving terminal by wireless channel by voice transmitting terminal.
RA. each receiving terminal is connected to voice transmitting terminal and receives the encryption voice stream data of transport module conveying;
The each receiving terminal of RB utilizes the inverse operation of cryptographic calculation that the ciphertext data received are carried out chaos deciphering.First the third level described in step SC3 is added ciphertext data to be decrypted.When 1 takes turns deciphering, the iterative equation obtaining receiving terminal chaos decryption system is
x 1 ( r ) ( k + 1 ) = a 11 ( r ) x 1 ( r ) ( k ) + a 12 ( r ) x 2 ( r ) ( k ) + a 13 ( r ) x 3 ( r ) ( k ) x 2 ( r ) ( k + 1 ) = a 21 ( r ) p ( k ) + a 22 ( r ) x 2 ( r ) ( k ) + a 23 ( r ) x 3 ( r ) ( k ) x 3 ( r ) ( k + 1 ) = a 31 ( r ) p ( k ) + a 32 ( r ) x 2 ( r ) ( k ) + a 33 ( r ) x 3 ( r ) ( k ) + &epsiv; ( r ) sin ( &sigma; ( r ) p ( k ) ) ;
In formulaS (k) is the voice signal of input, and symbol " " represents step-by-step XOR.
The voice encryption signal having encrypted M wheel received is substituted in the 2nd~3 equation of receiving terminal chaos system respectivelyCarry out corresponding M and take turns voice signal deciphering so that two Synchronization of Chaotic Systems of transmitting terminal and receiving terminal, thus realizing the deciphering of voice encryption signal.
As shown in Figure 6 voice signal take turns more chaos stream cipher deciphering basic functional principle as follows:
At receiving terminal, the speech data that each frame is encrypted carries out M (M=1,2,3 ...) take turns the operation principle deciphered: first K3 is positioned at 1, inputs a frame encrypted voice data and be decrypted, secondly, K3 is positioned at 2, and the frame speech data after deciphering one being taken turns takes turns deciphering by carrying out second again after K3 feedback, carries out M wheel deciphering and so forth altogether.After completing M wheel deciphering, K4 connects, and last takes turns a frame speech data output of deciphering.Then K3 is positioned at 1 again, then the speech data inputting next frame encryption is decrypted, and completes the wheel deciphering of the M to encrypted voice data one by one so again and again.
Again the second level described in step SC2 is encrypted and be decrypted, decipher time-division cipher key match and two kinds of situations of key mismatch.With 21 submatrix TijTo put in order as key be example, when receiving terminal puts in order with the submatrix of transmitting terminal and to mate completely, 8bits data can be set to and gain correct position, add confidential information can correctly decrypt, otherwise, being displaced to the position of mistake, namely receiving terminal correctly cannot decrypt adding confidential information.
Finally the first order described in step SC1 is encrypted and be decrypted, be also classified into cipher key match and two kinds of situations of key mismatch during deciphering, with 15 submatrix TijTo put in order as key be example, when receiving terminal puts in order with the submatrix of transmitting terminal and to mate completely, 1bits data can be set to and gain correct position, add confidential information can correctly decrypt, otherwise, being displaced to the position of mistake, namely receiving terminal correctly cannot decrypt adding confidential information.
As it is shown in fig. 7, only when above-mentioned three level decryption keys all mate, could correctly decrypt original speech data;As shown in Figure 8, Figure 9, as long as there being the key of any one-level not mate, the data decrypted are all wrong, thereby ensure that the safety of whole system.
RC. deliver to speaker after the data acquisition IMA-ADPCM voice compression algorithm after deciphering being decompressed to play.
The speech chaotic security communication method of the multicast multi-user of the present invention, three grades of Speech Chaotic cipher modes are adopted to be encrypted transmission, only have during three grades of key couplings during deciphering and just can obtain correct speech data, therefore there is the feature that speech communication confidentiality is high, it is possible to increase the safety of speech communication.
It should be noted that; above example is merely to illustrate the bright technical scheme of the present invention but not limiting the scope of the invention; although the present invention being explained in detail with reference to preferred embodiment; it will be understood by those within the art that; technical scheme can be modified or equivalent replacement, without deviating from the spirit and scope of technical solution of the present invention.

Claims (10)

1. the speech chaotic security communication method of a multicast multi-user, it is characterized in that: undertaken by speech secret communication system, described speech secret communication system includes voice transmitting terminal and the multiple phonetic incepting ends being mutually matched with described voice transmitting terminal, and described voice transmitting terminal is provided with voice acquisition module, compression module, encrypting module and transport module;
In communication process, described voice transmitting terminal comprises the steps:
SA. voice acquisition module Real-time Collection voice speech data is sent to compression module;
SB. the speech data that voice acquisition module is carried is compressed and by the voice data transmission after after compression to encrypting module by compression module;
SC. encrypting module is sent to transport module after the speech data after compression is carried out chaos encryption;
SD. the speech data after encryption is transmitted through the network to the receiving terminal of multiple correspondence by transport module in real time;
In communication process, each phonetic incepting end comprises the steps:
RA. it is connected to voice transmitting terminal and receives the encryption voice stream data of transport module conveying;
RB. the encrypted voice data received is decrypted decompression processing;
RC. the voice messaging after receiving terminal plays deciphering decompression.
2. the speech chaotic security communication method of multicast multi-user according to claim 1, it is characterised in that: the cipher mode of described step SC is three grades of chaos encryptions.
3. the speech chaotic security communication method of multicast multi-user according to claim 1, it is characterised in that: it is 16bit that described step SA gathers the quantization bit position of voice mode.
4. the speech chaotic security communication method of multicast multi-user according to claim 1, it is characterised in that: the compress mode of described step SB is IMA-ADPAM voice compression algorithm.
5. the speech chaotic security communication method of multicast multi-user according to claim 1, it is characterised in that: described step SD with WIFI multicast form by encryption after voice data transmission.
6. the speech chaotic security communication method of multicast multi-user according to claim 1, it is characterised in that: described step RA is specifically connected to voice transmitting terminal in UDP mode.
7. the speech chaotic security communication method of multicast multi-user according to claim 1, it is characterised in that: the decoding process adopted in described step RB is IMA-ADPAM voice decompression algorithm, and the manner of decryption adopted is chaos deciphering.
8. the speech chaotic security communication method of multicast multi-user according to claim 1, it is characterized in that: in described step SC, a receiving terminal reduces by correct secret key decryption and plays voice wherein, at another receiving terminal broadcasting voice signal of mismatch secret key decryption.
9. the speech chaotic security communication method of multicast multi-user according to claim 2, it is characterised in that:
Three grades of chaos encryption processes include: in first order chaos encryption, utilize sextuple chaotic maps, each bit data in compress speech data are carried out scramble;In the chaos encryption of the second level, utilize 7 degree of freedom chaotic maps, the position of each byte voice compression data in packet is carried out scramble;In third level chaos encryption, utilize chaos stream cipher to carry out taking turns iterative cryptographic to the value of compress speech data more.
10. the speech chaotic security communication method of multicast multi-user according to claim 9, it is characterised in that:
Three grades of chaos encryption processes, specifically:
SC1. first order cryptographic calculation
Utilizing sextuple chaotic maps, each bit data in compress speech data are carried out scrambling encryption, the number obtaining position scramble is 4096, choosesMake n=6:
A 6 = 1 5 18 52 121 197 1 6 22 64 149 242 1 5 19 55 128 208 1 4 13 38 88 144 1 3 8 20 48 80 1 2 4 8 16 32 ;
Raw tone being compressed data and is temporarily stored in inbuf relief area, the data after encryption are temporarily stored in outbuf relief area, and before encryption, all bit data in outbuf relief area are all 0;
Chaos encryption algorithm is as follows:
(1) according to above-mentioned steps SC1, can encrypt the serial number S of front compress speech data corresponding be mapped as coordinate corresponding to E (S), E (S) be (i, j);
(2) the 1bit data extracted in inbuf in ith row and jth column corresponding unit, according to formula (inbuf [i] > > j) &1 ∈ { 0,1} operation;
(3) utilizing 6D chaotic maps table to carry out position mapping, obtaining the coordinate after mapping is:
x = f l o o r ( 6 D - m a p - t a b l e &lsqb; i &times; 8 + j &rsqb; / 8 ) y = mod ( 6 D - m a p - t a b l e &lsqb; i &times; 8 + j &rsqb; , 8 ) ;
(4) will (i, j) the 1bit data in corresponding unit replace (x, y) in corresponding unit:
Outbuf [x]=(((inbuf [i]>>j) &1)<<y) ∨ outbuf [x];
Symbol ">in formula>j " represent and move to right j position, "<<y " represents and moves to left y position, and " & " represents that press bit position and computing, and bit position is pressed in " ∨ " expression or computing, " mod " represents modular arithmetic, and " floor " represents round numbers part;
SC2. second level cryptographic calculation
Using 7 dimension chaotic maps, adopt the position scrambled scheme of 8bits data that the position of one frame compress speech data is encrypted, the number obtaining position scramble is 16348, chooses A i , j ( 12 ) = 1 , A j , i ( 21 ) = 1 , A j , j ( 22 ) = 2 , Make n=7:
A 7 = 1 6 25 84 237 550 903 1 7 30 102 289 671 1100 1 6 26 88 249 578 948 1 5 19 63 176 408 672 1 4 13 38 104 240 400 1 3 8 20 48 112 192 1 2 4 8 16 32 64 ;
The position of the compress speech data that one frame is 16384 is encrypted, and raw tone compression data are temporarily stored in inbuf relief area, and the data after encryption are temporarily stored in outbuf relief area;
Encryption before compress speech data serial number S (S=0,1,2 ..., 214-1) it is:
S=x1,k×27×2-2+x2,k×27×2-4+…+xn-1,k×22+xn,k×20
After encryption, the position of corresponding each serial number S is mapped as:
E (S)=E (S, α1)×27×2-2+E(S,α2)×27×2-4+…+E(S,α6)×22+E(S,α7)×20
α in formulai(i=1,2 ..., 7) ∈ 1,2 ..., and 7}, α1≠α2≠…≠α7
SC3. third level cryptographic calculation
In third level chaos encryption, utilize chaos stream cipher to carry out taking turns iterative cryptographic to the value of compress speech data more;
Setting up 3 d-dem type chaos system kinetics equation, formula is:
x 1 ( k + 1 ) = a 11 x 1 ( k ) + a 12 x 2 ( k ) + a 13 x 3 ( k ) x 2 ( k + 1 ) = a 21 x 1 ( k ) + a 22 x 2 ( k ) + a 23 x 3 ( k ) x 3 ( k + 1 ) = a 31 x 1 ( k ) + a 32 x 2 ( k ) + a 33 x 3 ( k ) + &epsiv; sin ( &sigma;x 1 ( k ) ) ;
In formula A = a 11 a 12 a 13 a 21 a 22 a 23 a 31 a 32 a 33 = 0.205 - 0.595 0.265 - 0.265 - 0.025 0.595 0.33 - 0.33 0.47 , Characteristic of correspondence root is respectively positioned in unit circle, nominal system Asymptotic Stability;g(σx1(k), ε)=ε sin (σ x1(k)) for uniformly bounded revertive control device, ε and σ is for controlling parameter;
Choose ε=3 × 108, σ=2 × 105, obtaining Liapunov exponent is LE1=14.9, LE2=14.8, LE3=0.19;
Taking turns in encryption situation 1, the iterative equation obtaining voice transmitting terminal Chaotic Encryption System is:
x 1 ( d ) ( k + 1 ) = a 11 ( d ) x 1 ( d ) ( k ) + a 12 ( d ) x 2 ( d ) ( k ) + a 13 ( d ) x 3 ( d ) ( k ) x 2 ( d ) ( k + 1 ) = a 21 ( d ) p ( k ) + a 22 ( d ) x 2 ( d ) ( k ) + a 23 ( d ) x 3 ( d ) ( k ) x 3 ( d ) ( k + 1 ) = a 31 ( d ) p ( k ) + a 32 ( d ) x 2 ( d ) ( k ) + a 33 ( d ) x 3 ( d ) ( k ) + &epsiv; ( d ) s i n ( &sigma; ( d ) p ( k ) ) ;
In formulaS (k) is the voice signal of input, and symbol " " represents step-by-step XOR;
This discrete time chaos system kinetics equation is along with the increase of k, at transmitting terminal, by including the closed loop feedback method of voice signal, output signal p (k) is fed back, substitutes in the 2nd~3 equation of transmitting terminal chaos system respectivelyContinuous iteration, by by generationDouble precision real numbers value is converted to 32 for integer, then takes its least-significant byte, carries out XOR with 8 voice signals and obtain ciphertext value;
Also include carrying out taking turns stream cipher encrypting in units of frame to each frame speech data more, at transmitting terminal, each frame voice signal is carried out M (M=1,2,3, ...) wheel encryption: first K1 is positioned at 1, inputs a frame voice signal and be encrypted, secondly, K1 is positioned at 2, a frame voice signal after encryption one being taken turns takes turns encryption by carrying out second again after K1 feedback, and so forth, carries out M wheel encryption altogether;After completing M wheel encryption, K2 connects, and last takes turns a frame voice signal channel output of encryption;Then K1 is positioned at 1 again, then inputs next frame voice signal and be encrypted, and completes the wheel encryption of the M to voice signal one by one so again and again;
Corresponding, in RB, the process of deciphering is as follows:
First the third level described in step SC3 being added ciphertext data to be decrypted, when 1 takes turns deciphering, the iterative equation obtaining phonetic incepting end chaos decryption system is
x 1 ( r ) ( k + 1 ) = a 11 ( r ) x 1 ( r ) ( k ) + a 12 ( r ) x 2 ( r ) ( k ) + a 13 ( r ) x 3 ( r ) ( k ) x 2 ( r ) ( k + 1 ) = a 21 ( r ) p ( k ) + a 22 ( r ) x 2 ( r ) ( k ) + a 23 ( r ) x 3 ( r ) ( k ) x 3 ( r ) ( k + 1 ) = a 31 ( r ) p ( k ) + a 32 ( r ) x 2 ( r ) ( k ) + a 33 ( r ) x 3 ( r ) ( k ) + &epsiv; ( r ) s i n ( &sigma; ( r ) p ( k ) ) ;
In formulaS (k) is the voice signal of input, and symbol " " represents step-by-step XOR;
The voice encryption signal having encrypted M wheel received is substituted in the 2nd~3 equation of receiving terminal chaos system respectivelyCarry out corresponding M and take turns voice signal deciphering so that two Synchronization of Chaotic Systems of transmitting terminal and receiving terminal, thus realizing the deciphering of voice encryption signal;
At phonetic incepting end, the speech data that each frame is encrypted carries out M (M=1,2,3 ...) wheel deciphering: first K3 is positioned at 1, inputs a frame encrypted voice data and be decrypted, secondly, K3 is positioned at 2, and the frame speech data after deciphering one being taken turns takes turns deciphering by carrying out second again after K3 feedback, carries out M wheel deciphering and so forth altogether.After completing M wheel deciphering, K4 connects, and last takes turns a frame speech data output of deciphering;Then K3 is positioned at 1 again, then the speech data inputting next frame encryption is decrypted, and completes the wheel deciphering of the M to encrypted voice data one by one so again and again;
Again the second level described in step SC2 is encrypted and be decrypted, when receiving terminal puts in order with the submatrix of transmitting terminal and to mate completely, 8bits data can be set to and gain correct position, add confidential information can correctly decrypt, otherwise, being displaced to the position of mistake, namely receiving terminal correctly cannot decrypt adding confidential information;
Finally the first order described in step SC1 is encrypted and be decrypted, when receiving terminal puts in order with the submatrix of transmitting terminal and to mate completely, 1bits data can be set to and gain correct position, add confidential information can correctly decrypt, otherwise, being displaced to the position of mistake, namely receiving terminal correctly cannot decrypt adding confidential information.
CN201610079628.4A 2016-02-04 2016-02-04 Multicast multiuser voice chaotic secret communication method Pending CN105763311A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610079628.4A CN105763311A (en) 2016-02-04 2016-02-04 Multicast multiuser voice chaotic secret communication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610079628.4A CN105763311A (en) 2016-02-04 2016-02-04 Multicast multiuser voice chaotic secret communication method

Publications (1)

Publication Number Publication Date
CN105763311A true CN105763311A (en) 2016-07-13

Family

ID=56330621

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610079628.4A Pending CN105763311A (en) 2016-02-04 2016-02-04 Multicast multiuser voice chaotic secret communication method

Country Status (1)

Country Link
CN (1) CN105763311A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106357623A (en) * 2016-08-30 2017-01-25 韦嘉志 Audio transmission system
CN107087213A (en) * 2017-05-12 2017-08-22 广东工业大学 A kind of system and method for video chaotic secret communication
CN107566345A (en) * 2017-08-07 2018-01-09 中译语通科技(青岛)有限公司 A kind of voice safe transmission method of sequential encryption
CN108075891A (en) * 2018-02-02 2018-05-25 成都动视时代科技有限公司 A kind of conference system based on digital voice encryption
CN108337080A (en) * 2018-02-02 2018-07-27 成都动视时代科技有限公司 A kind of virtual reality system of information security environment
CN108390860A (en) * 2018-01-24 2018-08-10 北京奇艺世纪科技有限公司 A kind of encryption and decryption method and device of data packet
CN110460424A (en) * 2019-08-19 2019-11-15 兰州理工大学 A kind of voice data encryption method and system for supporting secret protection
CN113257260A (en) * 2021-04-09 2021-08-13 中国质量认证中心 Transmission method and terminal equipment for secret communication of mobile phone

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1564504A (en) * 2004-03-23 2005-01-12 南京大学 Chaos coding/decoding method of data stream and modularized circuit
US20070055861A1 (en) * 2005-08-24 2007-03-08 Wen-Wei Lin System and method for hyper-chaos secure communication
CN101330634A (en) * 2008-07-04 2008-12-24 金法银 Multifunctional digital ciphering walkie-talkie and implementing method thereof

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1564504A (en) * 2004-03-23 2005-01-12 南京大学 Chaos coding/decoding method of data stream and modularized circuit
US20070055861A1 (en) * 2005-08-24 2007-03-08 Wen-Wei Lin System and method for hyper-chaos secure communication
CN101330634A (en) * 2008-07-04 2008-12-24 金法银 Multifunctional digital ciphering walkie-talkie and implementing method thereof

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106357623A (en) * 2016-08-30 2017-01-25 韦嘉志 Audio transmission system
CN107087213A (en) * 2017-05-12 2017-08-22 广东工业大学 A kind of system and method for video chaotic secret communication
CN107566345A (en) * 2017-08-07 2018-01-09 中译语通科技(青岛)有限公司 A kind of voice safe transmission method of sequential encryption
CN108390860A (en) * 2018-01-24 2018-08-10 北京奇艺世纪科技有限公司 A kind of encryption and decryption method and device of data packet
CN108390860B (en) * 2018-01-24 2021-09-14 北京奇艺世纪科技有限公司 Data packet encryption and decryption method and device
CN108075891A (en) * 2018-02-02 2018-05-25 成都动视时代科技有限公司 A kind of conference system based on digital voice encryption
CN108337080A (en) * 2018-02-02 2018-07-27 成都动视时代科技有限公司 A kind of virtual reality system of information security environment
CN110460424A (en) * 2019-08-19 2019-11-15 兰州理工大学 A kind of voice data encryption method and system for supporting secret protection
CN110460424B (en) * 2019-08-19 2020-07-31 兰州理工大学 Voice data encryption method and system supporting privacy protection
CN113257260A (en) * 2021-04-09 2021-08-13 中国质量认证中心 Transmission method and terminal equipment for secret communication of mobile phone

Similar Documents

Publication Publication Date Title
CN105763311A (en) Multicast multiuser voice chaotic secret communication method
CN105556880A (en) Method and apparatus for secure communication
CN105262772A (en) Data transmission method, data transmission system and related apparatus for data transmission method and system
CN101262341A (en) A mixed encryption method in session system
KR20020016620A (en) Method for encrypting information and device for realization of the method
CN109861809B (en) Practical grouping random encryption and decryption method
CN207234973U (en) Video conferencing system based on quantum cryptography
CN106453391A (en) Long repeating data encryption and transmission method and system
CN102208976A (en) Coding vector encryption based secure network coding method
CN103580851A (en) Information encryption and decryption method
CN101707767A (en) Data transmission method and devices
CN107911354A (en) A kind of compound parallel data encryption method
RU2459367C2 (en) Method to generate alternating key for unit coding and transfer of coded data
CN111556004A (en) Hybrid dual network encryption system
JPH09312643A (en) Key sharing method and ciphering communication method
CN101621661B (en) Audio-video encryption and decryption transmission system
JPH10107832A (en) Cipher multi-address mail system
CN111385088A (en) Efficient satellite quantum key pairing generation method
CN110730366B (en) Bit operation-based lightweight video stream encryption and decryption method and encryption and decryption method
Assafli et al. Generation and Evaluation of a New Time-Dependent Dynamic S-Box Algorithm for AES Block Cipher Cryptosystems
CN105024800A (en) Random security communication method and Bluetooth device
CN111355587B (en) Authenticated encryption secure communication system and method based on countermeasure network
EP2571192A1 (en) Hybrid encryption schemes
US20100014670A1 (en) One-Way Hash Extension for Encrypted Communication
CN102571281B (en) A kind of secure network coding and transmission method and device that uses cache node

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information

Inventor after: Lin Zhuosheng

Inventor after: Yu Simin

Inventor after: Lv Jinhu

Inventor after: Gan Qiuye

Inventor before: Lin Zhuosheng

Inventor before: Yu Simin

Inventor before: Gan Qiuye

COR Change of bibliographic data
RJ01 Rejection of invention patent application after publication

Application publication date: 20160713

RJ01 Rejection of invention patent application after publication