CN105846947B - A kind of encryption in physical layer method introducing Latin battle array - Google Patents
A kind of encryption in physical layer method introducing Latin battle array Download PDFInfo
- Publication number
- CN105846947B CN105846947B CN201610162614.9A CN201610162614A CN105846947B CN 105846947 B CN105846947 B CN 105846947B CN 201610162614 A CN201610162614 A CN 201610162614A CN 105846947 B CN105846947 B CN 105846947B
- Authority
- CN
- China
- Prior art keywords
- latin
- key
- battle array
- encryption
- physical layer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
- H04K1/04—Secret communication by frequency scrambling, i.e. by transposing or inverting parts of the frequency band or by inverting the whole band
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
- H04K1/06—Secret communication by transmitting the information or elements thereof at unnatural speeds or in jumbled order or backwards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/001—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention relates to a kind of encryption in physical layer methods introducing Latin battle array.Key of good performance is generated using chaos system and Latin battle array; then key scramble planisphere is utilized; the distribution of the constellation point of different modulating mode on a complex plane is set to tend to be uniform; and then personal characteristics parameter possessed by different modulating mode tends to be identical, achievees the purpose that set about protecting modulation system and modulation intelligence from physical layer.Complex plane information after mapping is made full use of, achievees the purpose that greatly extended secret key space.By introducing Extract functions, the relevance between chaos sequence is fully eliminated, under the premise of ensureing key space and a large amount of keys need not be generated, substantially reduce hardware realization complexity, and NIST Randomness tests are carried out to the key of generation, verify its unpredictability.
Description
Technical field
The present invention relates to a kind of encryption in physical layer method, it particularly relates to a kind of based on Latin battle array and width phase inversion
Encryption in physical layer method.
Background technology
Commercial activity, transaction and government services higher and higher with the level of informatization of today's society, traditional
More and more by open computer and communication network, the tool of WWW is based particularly on to implement and provide, is believed
Breath safety has become the important guarantee condition of people's survival and development in information space.In terms of safety perspective, information security
Main feature include confidentiality, integrality, authentication property and non-repudiation.At this stage, ensure to believe based on cryptographic technique
Breath safety is still main security strategy.But in a communication network, the upper layer encryption mechanism based on traditional cryptography is faced with
New challenge.
The flattening of mobile radio system develops, the open nature of Radio Link, the dynamic topology of mobile network and
The micromation of node so that it is new that some are faced based on the conventional security strategy that cryptography is encrypted on the communication such as link layer upper layer
Challenge.On the one hand, the fast development of supercomputer so that there is be decrypted for the conventional cryptography mechanism based on macrooperation amount
Possibility;Increasing key length, extended secret key space can be passed with resisting the exhaustive thinking cracked by key management and broadband again
The limitation of defeated system high transfer rate.On the other hand, the fast development of cognitive radio technology so that listener-in is stolen by some
Listen technology that can intercept and capture the information that the conventional securities strategy such as frequency, bandwidth and modulation system of wireless channel is not protected.
Based on the present situation of the above communication network, part eavesdropping behavior evolves as listener-in, and not steal communication data etc. broken
The larger information of difficulty is translated, but according to unprotected physical layer information, it is whom to eavesdrop out the double hairs of communication, respective geographical location
Deng the decoding relatively small information of difficulty, this method is referred to as flow analysis attack (Traffic analysis attack).
Listener-in attacks stolen information by flow analysis can reflect communication conditions, this is in military affairs although not being communication data
Very big threat is still constituted in communication.Thus how to be studied as current in physical layer guarantee modulation system and the safety of modulation intelligence
One importance of mobile communication safety.
Realize communication security mainly there are two direction from physical layer, when using the physical characteristic of wireless channel come generate,
Management and distribution key and the physical layer certification based on wireless channel;Second is that the physical layer peace based on tapping channel model
Entirely, i.e. the concept for the secrecy capacity that Wyner is proposed based on Shannon information theories.And the safety of physical layer based on secrecy capacity
Technology requires the channel quality of main channel to be better than tapping channel, then there is the reliable communication that scrambling coding had both ensured validated user,
Make listener-in that can not obtain information again, achievees the purpose that secret communication, including man made noise, wave beam not to can be realized by key
The safety of physical layer transmission technologys such as forming.But this safety of physical layer technology based on information theory depends on channel information, surreptitiously
Hearer can not ensure safety when similar with legal person's channel.Thus the present invention is based on chaos system in physical layer, proposes a kind of
Utilize the encryption method using Latin battle array and chaos sequence scramble planisphere.
Invention content
It is of good performance using chaos system and the generation of Latin battle array that technical problem to be solved by the invention is to provide a kind of
Then key utilizes key scramble planisphere, the distribution of the constellation point of different modulating mode on a complex plane is made to tend to be uniform, into
And personal characteristics parameter possessed by different modulating mode tends to be identical, reaches and sets about protecting modulation system and modulation from physical layer
The purpose of information.To solve the above problems, the present invention proposes the encryption in physical layer side that a kind of Latin battle array and width phase inversion are combined
Method generates key set by chaos system, achievees the purpose that encrypt planisphere.
The encryption in physical layer algorithm includes:
S1:The various parameters of setting system:Carrier frequency, modulation system etc.;
S2:System input binary information sequence is converted to complex vector located C, wherein C=through serial to parallel conversion, constellation mapping
[c1,c2,c3,…cn]T, wherein []TIt indicates to the transposition of matrix, then to obtain confidential information plain_data to be added, wherein plain_
Data=C;
S3:Key set { K1, K2, Latin battle array } is generated using chaos sequence, with K1's and confidential information plain_data to be added
Phase is added, and obtains ciphertext E1;It is multiplied with ciphertext E1 corresponding elements with K2, obtains ciphertext E2;Finally according to the member in Latin battle array
Element value, accordingly converts ciphertext E2, obtains final ciphertext E;
The generating process of key set { K1, K2, Latin battle array } is as follows:
1) a kind of chaos system of selection and initial value start_data, generate chaos sequence xi;
2) although chaos sequence has the characteristics that long-term unpredictable that its acts and efforts for expediency has certain correlation, for this
Problem introduces Extract functions and Latin battle array herein, is generated in key and Latin battle array is structurally innovated, accomplish to control
Under the premise of complexity processed, safety is further increased;
Dxi=mod (Extract (xi, 12,13,14), 256)/512
Wherein Extract functions are to extract input value xi12nd, 13,14 data of fractional part, it is good to obtain key
Good unpredictability.According to above formula, one group of random data D between [0,0.5] can be obtainedxi, by K1=Dxi× 4 π and
K2=Dxi+ 0.75 obtain for phase place key K1 (π of 0≤K1≤2) and amplitude convert key K2 (0.75≤K2≤
1.25);
3) it is the correlation eliminated between data, to xiIt is handled as follows to obtain yi;
yi=106xi-floor(106xi) i=1,2 ... n
To yiAscending order arrangement is carried out, obtains yiThe arrangement information of corresponding serial number i, as Latin battle array.Latin battle array is mainly characterized by
Per a line, either the element of each row is 1 to matrix line number or the random distribution of columns;
S4:Parallel serial conversion is carried out to ciphertext E, then through D/A conversion process, is sent into wireless channel and transmits;
Physical layer decryption method is the inverse process of encryption method, it is last it is encrypted decrypt at first, decrypt layer by layer one by one to get
To original plaintext message.
Above-mentioned technical proposal is used, beneficial effects of the present invention are:The essence of modulation is by information from binary bits domain
It is mapped to complex field, this process brings some redundancies, and it is additional that conventional cryptography mode does not make full use of mapping to bring
Information.Carried algorithm makes full use of the complex plane information after mapping herein, achievees the purpose that greatly extended secret key space.It is logical
Introducing Extract functions are crossed, the relevance between chaos sequence is fully eliminated, under the premise of ensureing key space and need not give birth to
At a large amount of keys, hardware realization complexity is substantially reduced, and NIST Randomness tests are carried out to the key of generation, verify it not
Predictability.Latin battle array is introduced, constellation point coordinate information is thoroughly upset, and is adjusted from key space, key sensibility and identification
The several respects such as mode processed analyze the safety of this algorithm, and analysis result shows that this algorithm has prodigious key space, hardly
Possible Brute Force.Algorithm has very strong safety under the premise of required extra computation amount very little, is passed in safety of physical layer
Defeated aspect has broad application prospects.
Description of the drawings
Fig. 1 is the encryption in physical layer method flow diagram that Latin battle array and width phase inversion proposed by the present invention are combined;
Fig. 2 is planisphere before transmitting terminal encryption;
Fig. 3 is planisphere after transmitting terminal encryption;
Fig. 4 is legal person's planisphere;
Fig. 5 is listener-in's planisphere;
When Fig. 6 is legal person and listener-in's key difference very little, bit error rate comparison diagram;
Fig. 7 is bit error rate comparison diagram before and after applying the present invention;
Fig. 8 is to be based on Higher Order Cumulants recognizer success rate comparison diagram.
Specific implementation mode
Below by example, the present invention is described further, it is however noted that, publicize and implement the purpose of example
It is to help to further understand the present invention, but it will be appreciated by those skilled in the art that:It is of the invention and appended not departing from
In spirit and scope by the claims, various substitutions and modifications are all possible.Therefore, it is public to should not be limited to example institute by the present invention
The content opened, the scope of protection of present invention is subject to the scope defined in the claims.
The technical scheme is that on ofdm system, a kind of constellation disorder method introducing Latin battle array is specific to send
End ciphering process includes the following steps:
S1:The various parameters of setting system:Sub-carrier number N, cyclic prefix CP, modulation system etc.;
S2:System input binary information sequence is converted to complex vector located C, wherein C=through serial to parallel conversion, constellation mapping
[c1,c2,c3,…cn]T, wherein []TIt indicates to the transposition of matrix, then to obtain confidential information plain_data to be added, wherein plain_
Data=C;
S3:Key set { K1, K2, Latin battle array } is generated using chaos sequence, with K1's and confidential information plain_data to be added
Phase is added, and obtains ciphertext E1;It is multiplied with ciphertext E1 corresponding elements with K2, obtains ciphertext E2;Finally according to the member in Latin battle array
Element value, accordingly converts ciphertext E2, obtains final ciphertext E;The generating process of key set is as follows:
1) a kind of chaos system of selection and initial value start_data, generate chaos sequence xi;
2) although chaos sequence has the characteristics that long-term unpredictable that its acts and efforts for expediency has certain correlation, for this
Problem introduces Extract functions and Latin battle array herein, is generated in key and Latin battle array is structurally innovated, accomplish to control
Under the premise of complexity processed, safety is further increased;
Dxi=mod (Extract (xi, 12,13,14), 256)/512
Wherein Extract functions are to extract input value xi12nd, 13,14 data of fractional part, it is good to obtain key
Good unpredictability.According to above formula, one group of random data D between [0,0.5] can be obtainedxi, by K1=Dxi× 4 π and
K2=Dxi+ 0.75 obtain for phase place key K1 (π of 0≤K1≤2) and amplitude convert key K2 (0.75≤K2≤
1.25);
3) it is the correlation eliminated between data, to xiIt is handled as follows to obtain yi;
yi=106xi-floor(106xi) i=1,2 ... n
To yiAscending order arrangement is carried out, obtains yiThe arrangement information of corresponding serial number i, as Latin battle array.Latin battle array is mainly characterized by
Per a line, either the element of each row is 1 to matrix line number or the random distribution of columns.
Using Latin battle array to the coordinate information after width phase inversion into line shuffle.Scrambling process is by taking following matrix as an example:Matrix A
For plaintext matrix, matrix B is Latin battle array, and Matrix C is the ciphertext after Latin battle array scramble.For each element of plaintext battle array A,
Latin battle array B respective element values are the transformation of corresponding element, such as B (2,1)=4 in Latin battle array B, then the A (2,4) in matrix A is first
Element is put into C (2,1), is converted successively to each row in this way, obtains ciphertext battle array C;
Plaintext battle array to be encrypted
Latin matrix
Through the encrypted ciphertext battle array of Latin battle array
S4:Parallel serial conversion is carried out to ciphertext E, then through inserting pilot tone, drop peak-to-average force ratio, cyclic prefix, D/A transformation etc.
Reason is sent into wireless channel and is transmitted.
It is that theory analysis is carried out to the anti-attack ability of inventive algorithm below:
A chaos sequences are tested as the Cryptographic Properties of key
Chaos sequence can be used as key, inevitable requirement its meet cryptography to the requirement of the randomness of key.It uses herein
Two-value quantization method quantifies the chaos sequence of generation, then carries out NIST Randomness tests to examine its unpredictable
Property;
NIST tests are the marks for a set of detection randomness for including 16 indexs formulated by American National Standards Institute
It is accurate.The standard from different perspectives carries out detection sequence with ideal random sequence by different indexs the comparison of departure degree.It should
Indices in standard are as a result, be all to obtain the P-value of indices by certain testing algorithm to be used as test result
To embody.P-value ∈ [0,1], by test if P-value >=0.01, and P-value is bigger, is tested sequence
Pseudo-randomness is better.Following table is that the chaotic key sequence after quantization carries out NIST test results, this test is chosen wherein several
Typical index, it can be seen that all P-value values meet randomness standard, i.e., the key generated by chaos sequence meets good
Good unpredictability.
1 chaos sequence NIST test results of table
B key sensitivity analyses
Perfect Encryption Algorithm should have very strong key sensibility, i.e., when the key of listener-in and legal person's key exist
When very small difference, listener-in can not recover source information.In carried algorithm herein, when legitimate secret K1 for [1,
1,1], Eve keys are [1,1,1+1 × 10-14], planisphere and bit error rate the comparison diagram difference that legal person and listener-in obtain
Such as attached drawing 6, shown in 7,8, key precision when can must similarly generate Latin battle array is 10-8.Even if key difference very little listener-in
Any valuable information cannot be obtained, so key has very strong sensibility;
C key spaces analyze (calculation amount analysis)
In face of brute force attack (brute-force attack), there should be sufficiently large key for the encrypted key of information
Space.In view of amplitude transformation only obscures constellation diagram shape, without changing constellation point quadrant where complex field, therefore amplitude
Alternate key K2 is not involved in key space analysis.Assuming that key value range be (0,20], be far above this range certainly, in three-dimensional
Under Lorentz chaos sequence, key space is (3 × 20 × 108)×(3×20×1014)=3.6 × 1025.With operation 100 per second
It is 3.8 the time required to decoding if the information that listener-in decodes one third thinks to eavesdrop successfully for hundred million computers
×107Year, far beyond accountable time, it is seen that the key space of the algorithm is very big, so it is very to want breaking cryptographic keys
Difficult;
D Modulation Mode Recognitions are analyzed
Modulation Identification based on reconstruct planisphere.K- means Data Cluster Algorithms are to choose cluster centre, non-cluster center object
It is divided into the highest cluster centre of similarity degree according to similarity degree, then all objects are averaged, is obtained in new cluster
The heart.It goes on successively, until measure function is restrained.But as shown in Figure 2, after this Encryption Algorithm, constellation point is in plane model
In enclosing, substantially conform to random distribution, constellation point phase information also irregularities, with the constellation template of existing modulation system can not
Match.It can not restore information by reconstructing planisphere.
Modulation Identification based on Higher Order Cumulants
High-order statistic is abbreviated as HOS (Higher order statics), is mainly used for modulation Recognition of Digital Signals.Make
With the absolute value of Higher Order Cumulants, the influence of phase jitter can be eliminated;Using its ratio as identification parameter, moreover it is possible to eliminate amplitude
Influence to parameter.Relative to instantaneous statistic, Higher Order Cumulants have good anti-fading characteristic;Compared with High Order Moment, it
Also have the advantages that inhibit Gaussian noise.The steady complex random process of zero-mean is denoted as y (k), its p rank mixed moments are defined as:
Mpq=E (y (k)(p-q)y*(k)q)
Content in relation to cumulant provides the definition for each rank cumulant used here:
C20=Cum (y (k), y (k))=M20
C21=Cum (y (k), y*(k))=M21
C40=Cum (y (k), y (k), y (k), y (k))=M40-3(M20)2
Without make an uproar, symbol transmitting etc. is general, mean power is normalized under the conditions of, acquire under different modulating mode, high-order is tired
The theoretical value of accumulated amount, as shown in the table.To eliminate the influence of phase jitter, the absolute value of Higher Order Cumulants is used.Wherein E is letter
Number mean power;
The theoretical value of 2 Higher Order Cumulants of table
Utilize upper table construction mpsk signal property invariant FMIt can be used for the identification of modulation system:
By the theoretical value of formula (10), it can be deduced that modulation system judgement standard, as shown in formula (11):
Under different signal-to-noise ratio, 500 independent emulation is carried out, obtains the recognition success rate such as attached drawing 8 under the judgement standard
It is shown.As can be seen that the identification modulation system method based on Higher Order Cumulants can effectively identify not encrypted modulation system, letter
When making an uproar than being more than 4dB, identify that not encrypted modulation system, success rate are up to 95% or more.And to the identification of this algorithm success
Rate is always below 5%, it can be seen that in the case of correct key, the recognition methods based on Higher Order Cumulants cannot not identify
Go out the modulation system after this algorithm for encryption.I.e. this paper algorithms have very strong anti-identification advantage.
It is the explanation to Fig. 1 Encryption Algorithm flow charts of the present invention below:
This Encryption Algorithm is carried out on planisphere after constellation mapping, by using chaos sequence and Latin battle array, multiple
Plane converts planisphere.Redundancy caused by constellation mapping is made full use of, with extended secret key space, reaches safety
The purpose of communication.
It is the analysis to the corresponding planisphere of Fig. 2 transmitting-receiving two-ends and Fig. 6,7 bit error rate comparison diagrams below
Fig. 2 is once the planisphere at legitimate receipt end and eavesdropping end before and after the encryption of legal transmitting terminal.Due to chaos system pair
The sensibility of initial value, even if initial value difference very little is arranged, by the long-term evolution of chaos system, obtained result is also complete
It is complete different.Here key used in listener-in only has 10 with correct key-14Difference, obtained planisphere also sees not completely
Which kind of modulation system goes out is, corresponding bit error rate is also always near 0.5.And the legitimate receipt end for possessing correct key can
Constellation information is recovered well, and bit error rate does not also deteriorate significantly, plays good cipher round results.
Fig. 8 is the success rate comparison diagram that modulation system is identified using Higher Order Cumulants.As seen from the figure, by this algorithm for encryption
Information afterwards, the recognizer based on Higher Order Cumulants fail substantially, and recognition success rate is less than 5%, it is believed that cannot identify
Out.
The foregoing is merely one embodiment of the present invention, and the invention is not limited in the above embodiments, are implementing
There may be the small structural modifications in part in the process, if the various changes or modifications of the present invention are not departed from the essence of the present invention
God and range, and belong within the scope of the claim and equivalent technologies of the present invention, then the present invention is also intended to comprising these changes
And modification.
Claims (1)
1. a kind of encryption in physical layer method introducing Latin battle array generates key set by chaos system, reach encryption planisphere
Purpose, which is characterized in that the encryption in physical layer method is as follows:
S1:The various parameters of setting system:Such as carrier frequency, modulation system;
S2:System input binary information sequence is converted to complex vector located C, wherein C=[c through serial to parallel conversion, constellation mapping1,
c2,c3,…cn]T, wherein []TIt indicates to the transposition of matrix, then to obtain confidential information plain_data to be added, wherein plain_data
=C;
S3:Key set { K1, K2, Latin battle array } is generated using chaos sequence, with the phase of K1 and confidential information plain_data to be added
It is added, obtains ciphertext E1;It is multiplied with ciphertext E1 corresponding elements with K2, obtains ciphertext E2;Finally according to the element value in Latin battle array,
Ciphertext E2 is accordingly converted, final ciphertext E is obtained;
S4:Parallel serial conversion is carried out to ciphertext E, then through D/A conversion process, is sent into wireless channel and transmits,
Physical layer decryption method is the inverse process of encryption method, it is last it is encrypted decrypt at first, decrypted layer by layer one by one to get to original
Beginning cleartext information;
The generating process of the key set { K1, K2, Latin battle array } is as follows:
1) a kind of chaos system of selection and initial value start_data, generate chaos sequence xi;
2) Extract functions and Latin battle array are introduced,
Dxi=mod (Extract (xi, 12,13,14), 256)/512
Wherein Extract functions are to extract input value xi12nd, 13,14 data of fractional part, can not be pre- with obtain key
The property surveyed, according to above formula, obtains one group of random data D between [0,0.5]xi, by K1=Dxi× 4 π and K2=Dxi+0.75
Obtain the key K2 (0.75≤K2≤1.25) converted for the key K1 (π of 0≤K1≤2) and amplitude of phase place;
3) it is the correlation eliminated between data, to xiIt is handled as follows to obtain yi
yi=106xi-floor(106xi) i=1,2 ... n
To yiAscending order arrangement is carried out, obtains yiThe arrangement information of corresponding serial number i, as Latin battle array, Latin battle array are every a line or every
The element of one row is 1 to matrix line number or the random distribution of columns.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610162614.9A CN105846947B (en) | 2016-03-22 | 2016-03-22 | A kind of encryption in physical layer method introducing Latin battle array |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610162614.9A CN105846947B (en) | 2016-03-22 | 2016-03-22 | A kind of encryption in physical layer method introducing Latin battle array |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105846947A CN105846947A (en) | 2016-08-10 |
CN105846947B true CN105846947B (en) | 2018-11-09 |
Family
ID=56587831
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610162614.9A Active CN105846947B (en) | 2016-03-22 | 2016-03-22 | A kind of encryption in physical layer method introducing Latin battle array |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105846947B (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108833390B (en) * | 2018-06-05 | 2021-01-26 | 中国人民解放军国防科技大学 | Matrix transformation-based packet physical layer encryption method |
CN108964910B (en) * | 2018-09-17 | 2021-09-17 | 中国人民解放军战略支援部队信息工程大学 | Network time synchronization message secure transmission method and device |
CN109768990B (en) * | 2019-03-04 | 2022-09-16 | 中国人民解放军国防科技大学 | Physical layer secure transmission method based on asymmetric key |
CN109996215A (en) * | 2019-03-31 | 2019-07-09 | 南京信息工程大学 | A kind of multi-path communications method based on privacy sharing under vehicular ad hoc network network environment |
CN109889338A (en) * | 2019-04-22 | 2019-06-14 | 苏州大学 | Quantum encryption method based on chaos sequence |
CN110336667B (en) * | 2019-07-26 | 2022-04-08 | 电子科技大学 | Communication physical layer encryption communication method and device based on pseudo-random sequence control |
CN111447054B (en) * | 2020-05-28 | 2021-05-14 | 北京邮电大学 | FBMC passive optical network physical layer encryption method and device based on five-dimensional hyperchaos |
US20230336979A1 (en) * | 2022-04-14 | 2023-10-19 | Qualcomm Incorporated | Signal modification for control channel physical layer security |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1359211A (en) * | 2002-01-10 | 2002-07-17 | 张红雨 | Chaotic encipher series generator |
CN101145901A (en) * | 2007-07-06 | 2008-03-19 | 哈尔滨工程大学 | Ultra-chaos pseudo random sequence generator |
CN105120453A (en) * | 2015-07-15 | 2015-12-02 | 中国科学院信息工程研究所 | Secret key generation method |
-
2016
- 2016-03-22 CN CN201610162614.9A patent/CN105846947B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1359211A (en) * | 2002-01-10 | 2002-07-17 | 张红雨 | Chaotic encipher series generator |
CN101145901A (en) * | 2007-07-06 | 2008-03-19 | 哈尔滨工程大学 | Ultra-chaos pseudo random sequence generator |
CN105120453A (en) * | 2015-07-15 | 2015-12-02 | 中国科学院信息工程研究所 | Secret key generation method |
Also Published As
Publication number | Publication date |
---|---|
CN105846947A (en) | 2016-08-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105846947B (en) | A kind of encryption in physical layer method introducing Latin battle array | |
CN101447870B (en) | Safe storage method of private key based on technology of distributed password | |
CN111132153B (en) | Endogenous safety communication method based on wireless channel characteristics | |
Zhou et al. | Security analysis and new models on the intelligent symmetric key encryption | |
CN108833390B (en) | Matrix transformation-based packet physical layer encryption method | |
Rajput et al. | Towards the growth of image encryption and authentication schemes | |
Zhao et al. | One-time password authentication scheme based on the negative database | |
CN109743155B (en) | Physical layer secure transmission method based on antenna selection differential chaos keying | |
CN109768990A (en) | Physical layer secure transmission method based on asymmetric key | |
Aziz et al. | A Noise‐Tolerant Audio Encryption Framework Designed by the Application of S8 Symmetric Group and Chaotic Systems | |
CN114915401A (en) | Verifiable homomorphic proxy re-encryption method and system | |
Albu-Rghaif et al. | A data structure encryption algorithm based on circular queue to enhance data security | |
Ni et al. | PHY‐Aided Secure Communication via Weighted Fractional Fourier Transform | |
Jamil et al. | Image Encryption Based on Multi-Level Keys on RC5 Algorithm. | |
Singh | An advance cryptosystem using extended polybius square with qwerty pattern | |
Gadicha et al. | A Novel approach towards Implicit Authentication System by using Multi-share visual key Cryptography Mechanism | |
Pushpa | Enhancing Data Security by Adapting Network Security and Cryptographic Paradigms | |
Abduljabbar et al. | Robust scheme to protect authentication code of message/image documents in cloud computing | |
EP3883178A1 (en) | Encryption system and method employing permutation group-based encryption technology | |
Kumar et al. | Invo-substitute: Three layer encryption for enhanced e-commerce website security using substitution cipher and involution function | |
Venkateswarlu et al. | Password security by encryption using an extended ADFGVX cipher | |
Krishna | Improved Elliptic Curve Image Cryptography Using Genetic Algorithm based Key Selection for Securely Data Transmission | |
CN117134904B (en) | Method based on identity recognition and dynamic encryption and decryption communication | |
CN115589299B (en) | Quantum double-signature protocol with high fidelity | |
Aziz et al. | Research Article A Noise-Tolerant Audio Encryption Framework Designed by the Application of S8 Symmetric Group and Chaotic Systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |