CN108199825A - A kind of file-type read-write secret communication method based on chaos system - Google Patents

A kind of file-type read-write secret communication method based on chaos system Download PDF

Info

Publication number
CN108199825A
CN108199825A CN201810209808.9A CN201810209808A CN108199825A CN 108199825 A CN108199825 A CN 108199825A CN 201810209808 A CN201810209808 A CN 201810209808A CN 108199825 A CN108199825 A CN 108199825A
Authority
CN
China
Prior art keywords
inverse time
signal
file
chaos system
chaotic signal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810209808.9A
Other languages
Chinese (zh)
Inventor
刘立东
李毅
张照仑
郭晨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Changan University
Original Assignee
Changan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Changan University filed Critical Changan University
Priority to CN201810209808.9A priority Critical patent/CN108199825A/en
Publication of CN108199825A publication Critical patent/CN108199825A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of file-types based on chaos system to read and write secret communication method, includes the following steps:1) a series of binary sequence is randomly generated;2) binary sequence caused by will be random becomes bipolar sequence;3) using bipolar sequence and the second order inverse time required initial value of chaos system, corresponding inverse time chaotic signal is generated by corresponding second order inverse time chaos system;4) mask encryption is carried out to wanted coded signal using inverse time chaotic signal, and be stored in a file;5) the inverse time chaotic signal initial value needed for inverse time chaotic signal is generated, bipolar sequence and used second order inverse time chaos system are as key;6) in receiving terminal, receive the file containing coded signal, coded signal is therefrom read out;7) it and then using key with it is decrypted, obtains transmitted original signal.By inverse time chaotic signal caused by second order inverse time chaos system voice signal is encrypted transmission in the present invention.

Description

A kind of file-type read-write secret communication method based on chaos system
Technical field
The invention belongs to chaotic secret communication fields, and in particular to a kind of file-type read-write secrecy based on chaos system is logical Letter method.
Background technology
Influence of the primary condition to chaotic signal is especially big, even if two identical chaos systems, if they There are small differences for primary condition, their movement locus can soon become orthogonal after after a period of time, and This characteristic allows chaotic signal to become difficult to predict and be difficult to be trapped.
Although chaotic signal structure is more complicated, the composition of chaos system is fairly simple.The research of chaotic communication Mutually mainly it is encrypted including the following aspects using chaos technology;Spread spectrum communication chaotic modulation skill is carried out using chaos Art.In recent years, the correlative study in relation to chaotic communication has been obtained for the development advanced by leaps and bounds, the correlation theory of chaotic communication And the related research of chaotic communication has had arrived at the stage of comparative maturity.
Invention content
The object of the present invention is to provide a kind of file-types based on chaos system to read and write secret communication method, inverse by second order When inverse time chaotic signal caused by chaos system voice signal is encrypted transmission.
The present invention adopts the following technical scheme that realize:
A kind of file-type read-write secret communication method based on chaos system, includes the following steps:
1) a series of binary sequence is randomly generated;
2) binary sequence caused by will be random becomes bipolar sequence;
3) using bipolar sequence and the second order inverse time required initial value of chaos system, pass through the corresponding second order inverse time Chaos system generates corresponding inverse time chaotic signal;
4) mask encryption is carried out to wanted coded signal using inverse time chaotic signal, and be stored in a file;
5) the inverse time chaotic signal initial value needed for inverse time chaotic signal, bipolar sequence and used second order are generated Inverse time, chaos system was as key;
6) in receiving terminal, receive the file containing coded signal, coded signal is therefrom read out;
7) it and then using key with it is decrypted, obtains transmitted original signal.
Further improve of the invention is that in step 3), the second order inverse time mathematic(al) representation of chaos system is:
Wherein u is the inverse time chaotic signal of required generation,It is the second-order differential of u,It is the first differential of u, β and ω are The control parameter of the system, ω are angular frequency;
Excitation function s (t) is described as:S (t)=sn, n < t≤n+1 (2)
And have, the general solution expression formula of inverse time chaotic signal is:
The waveform of inverse time chaotic signal is by ugSuperposition composition;By the s of generation0It is updated in formula (2) and obtains s (t);
Obtained s (t) is updated to, corresponding inverse time chaotic signal u (t) is obtained in formula (1).
Further improve of the invention is, in step 4), original voice signal is covered with inverse time chaotic signal Code encryption, i.e.,:
S (t)=u (t)+x (t) (4)
Wherein, s (t) is signal after encryption, and u (t) is inverse time chaotic signal, and x (t) is primary speech signal,
Coded signal s (t) is deposited into the txt file A.txt of a blank, i.e.,:
Fp=fopen (' A.txt', ' a') (5)
Fprintf (Fp, ' %d', s (t)) (6)
fclose(Fp) (7)。
Further improve of the invention is, in step 6), in the initial of the obtained inverse time chaotic signal of receiving terminal The bipolar sequence of value and generation inverse time chaotic signal is brought into the inverse time chaotic signal u that receiving terminal is obtained in formula (2)1 (t)。
Further improve of the invention is, in step 7), u is subtracted with signal g (t) read in file1(t) restore Go out original signal x1(t), i.e.,:
x1(t)=g (t)-u1(t) (10)。
The present invention has following beneficial technique effect:
1) encryption method is simple
Mask encryption directly is carried out to coded signal using chaotic signal, it is at low cost;
2) cipher round results are good, and hardly possible is decoded
Using chaos system it is especially sensitive to initial value the characteristics of, caused by the different initial value of same chaos system There is very big differences for chaotic signal;
3) binary sequence for generating inverse time chaotic signal randomly generates, and is difficult to estimate in advance;
4) a variety of chaos systems can be utilized to encrypt, chaotic signal difference is very big caused by different chaos systems, connects Receiving end is if it is not known that chaos system can not be decrypted used by transmitting terminal.
Description of the drawings
Fig. 1 is the binary sequence randomly generated;
Fig. 2 is the corresponding bipolar sequence of binary sequence;
Fig. 3 is to utilize inverse time chaotic signal caused by bipolar sequence;
Fig. 4 is the encrypted signal of original needs;
Fig. 5 is original signal encryption figure;
Fig. 6 is that coded signal is stored in file data figure;
Fig. 7 is that receiving terminal receives file data conversion gained signal graph;
Fig. 8, which is that decoding gained is primary, penetrates signal graph.
Specific embodiment
The present invention will be described in detail with reference to the accompanying drawings and examples.
The present invention can realize that this sentences second order inverse time chaos system and carry out implementation explanation with a variety of chaos systems;
Of the present invention is second order inverse time chaos system, its mathematic(al) representation is:
Wherein u is the inverse time chaotic signal of required generation,It is the second-order differential of u,It is the first differential of u, β and ω It is the control parameter of the system, ω is angular frequency;
Input function s (t) is described as:S (t)=sn, n < t≤n+1 (2)
The general solution of inverse time chaotic signal can be written as:
The waveform of inverse time chaotic signal can be by ugSuperposition composition.
First generate a series of bipolar sequence s0=[1-1-1 1-1-1-1 1-1 1 1-1 1 1-1-1 -1 1 -1 1 1 -1 -1 1 -1 1 -1 -1 1 1 -1 -1 1 -1 1 1 -1 1 -1 -1 -1 1 -1 -1 1 -1 1 1 -1 -1 1 -1 -1 1 -1 -1 -1 1 -1 1 1 -1 1 1 -1 1 -1 -1 1 -1 -1 -1 1 -1 1 1 - 1 1 1 -1 -1 -1 1 -1 1 1 -1 -1 1 -1 1 -1 -1 1 1 -1 -1 1 -1 1 1 -1 -1 1 -1 -1 - 1 1 -1 1 1 -1 1 1 -1 -1 -1 1 -1 1 1 -1 -1 1 -1 1 -1 -1 1 1 -1 -1 1 -1 1 1 -1 1 -1 -1 -1 1 -1 -1 1 -1 1 1 -1 -1 1 -1 -1 1 -1 -1 -1 1 -1 1 1 -1 1 1 -1 1 -1 -1 1 -1 -1 -1 1 -1 1 1 -1 1 1 -1 -1 -1 1 -1 1 1 -1 -1 1 -1 1 -1 -1 1 1 -1 -1 1 -1 1 1 -1 -1 1 -1 -1 -1 1 -1 1 1 -1 1 1 -1 -1 -1 1 -1 1 1 -1 -1 1 -1 1 -1 - 1 1 1 -1 -1 1 -1 1 1 -1 1 -1 -1 -1 1 -1 -1 1 -1 1 1 -1 -1 1 -1 -1 1 -1 -1 -1 1 -1 1 1 -1 1 1 -1 1 -1 -1 1 -1 -1 -1 1 -1 1 1 -1 1 1 -1 -1 -1 1 -1 1 1 -1 -1 1 -1 1 -1 -1 1 1 -1 -1 1 -1 1 1 -1 -1 1 -1 -1 -1 1 -1 1 1 -1 1 1 -1 -1 -1 1 - 1 1 1 -1 -1 1 -1 1 -1 -1 1 1 -1 -1 1 -1 1 1 -1 1 -1 -1 -1 1 -1 -1 1 -1 1 1 -1 -1 1 -1 -1 1 -1 -1 -1 1 -1 1 1 -1 1 1 -1 1 -1 -1 1 -1 -1 -1 1 -1 1 1 -1 1 1 - 1 -1 -1 1 -1 1 1 -1 -1 1 -1 1 -1 -1 1 1 -1 -1 1 -1 1 1 -1 -1 1 -1 -1 -1 1 -1 1 1 -1 1 1 -1 -1 -1 1 -1 1 1 -1 -1 1 -1 1 -1 -1 1 1 -1 -1 1 -1 1 1 -1 1 -1 -1 -1 1 -1 -1 1 -1 1 1 -1 -1 1 -1 -1 1 -1 -1 -1 1 -1 1 1 -1 1 1 -1 1 -1 -1 1 -1 -1 -1 1 -1 1 1 -1 1 1 -1 -1 -1 1];
By s generated above0It is updated in formula (2) and obtains s (t);
Obtained s (t) is updated to, corresponding inverse time chaotic signal u (t) is obtained in formula (1);
Better cipher round results in order to obtain expand 500 times, i.e., to the amplitude of inverse time chaotic signal u (t):
ui(t)=u (t) × 500 (3)
Wherein, ui(t) it is gained signal after initial inverse time chaotic signal amplitude is expanded 500 times.
Mask encryption is carried out to original voice signal with the inverse time chaotic signal after expansion, i.e.,:
S (t)=ui(t)+x(t) (4)
Wherein, s (t) be encryption after signal, ui(t) be expand after inverse time chaotic signal, x (t) is primary speech signal,
Coded signal s (t) is deposited into the txt file A.txt of a blank, i.e.,:
Fp=fopen (' A.txt', ' a') (5)
Fprintf (Fp, ' %d', s (t)) (6)
fclose(Fp) (7)
Coded signal in receiving terminal reads file A.txt and receive transmitting terminal and generate needed for inverse time chaotic signal Chaotic signal initial value and bipolar sequence;
G (t)=load (' A.txt') (8)
Wherein g (t) is that receiving terminal reads gained signal in file;
In the bipolarity sequence of the receiving terminal initial value of obtained inverse time chaotic signal and generation inverse time chaotic signal Row are brought into the inverse time chaotic signal u that receiving terminal is obtained in formula (2)1(t),
Inverse time chaotic signal caused by receiving terminal is expanded 500 times and obtains uo(t), i.e.,:
uo(t)=u1(t)×500 (9)
U is subtracted with signal g (t) read in fileo(t) original signal x is recovered1(t), i.e.,:
x1(t)=g (t)-uo(t) (10)
The feasibility of test this method is carried out by taking one section of voice signal as an example, Fig. 1 is the binary sequence randomly generated, figure 2 be the corresponding bipolar sequence of binary sequence, and Fig. 3 is using inverse time chaotic signal caused by bipolar sequence, and Fig. 4 is to adopt Coded signal is stored in by primary speech signal of the sample frequency for 11025Hz sampling gained, Fig. 5 raw tone coded signal figures, Fig. 6 File data figure, Fig. 7 receiving terminals receive file data conversion gained signal graph, and Fig. 8 decoding gained is primary to penetrate signal, by above-mentioned several Width figure can be seen that the feasibility for carrying out the encryption method.

Claims (5)

1. a kind of file-type read-write secret communication method based on chaos system, which is characterized in that include the following steps:
1) a series of binary sequence is randomly generated;
2) binary sequence caused by will be random becomes bipolar sequence;
3) using bipolar sequence and the second order inverse time required initial value of chaos system, pass through corresponding second order inverse time chaos System generates corresponding inverse time chaotic signal;
4) mask encryption is carried out to wanted coded signal using inverse time chaotic signal, and be stored in a file;
5) the inverse time chaotic signal initial value needed for inverse time chaotic signal, bipolar sequence and used second order inverse time are generated Chaos system is as key;
6) in receiving terminal, receive the file containing coded signal, coded signal is therefrom read out;
7) it and then using key with it is decrypted, obtains transmitted original signal.
2. a kind of file-type read-write secret communication method based on chaos system according to claim 1, which is characterized in that In step 3), the second order inverse time mathematic(al) representation of chaos system is:
Wherein u is the inverse time chaotic signal of required generation,It is the second-order differential of u,It is the first differential of u, β and ω are that this is The control parameter of system, ω are angular frequency;
Excitation function s (t) is described as:S (t)=sn, n < t≤n+1 (2)
And have, the general solution expression formula of inverse time chaotic signal is:
The waveform of inverse time chaotic signal is by ugSuperposition composition;By the s of generation0It is updated in formula (2) and obtains s (t);
Obtained s (t) is updated to, corresponding inverse time chaotic signal u (t) is obtained in formula (1).
3. a kind of file-type read-write secret communication method based on chaos system according to claim 2, which is characterized in that In step 4), mask encryption is carried out to original voice signal with inverse time chaotic signal, i.e.,:
S (t)=u (t)+x (t) (4)
Wherein, s (t) is signal after encryption, and u (t) is inverse time chaotic signal, and x (t) is primary speech signal,
Coded signal s (t) is deposited into the txt file A.txt of a blank, i.e.,:
Fp=fopen (' A.txt', ' a') (5)
Fpr int f (Fp, ' %d', s (t)) (6)
fclose(Fp) (7)。
4. a kind of file-type read-write secret communication method based on chaos system according to claim 3, which is characterized in that In step 6), in the bipolarity sequence of the receiving terminal initial value of obtained inverse time chaotic signal and generation inverse time chaotic signal Row are brought into the inverse time chaotic signal u that receiving terminal is obtained in formula (2)1(t)。
5. a kind of file-type read-write secret communication method based on chaos system according to claim 3, which is characterized in that In step 7), u is subtracted with signal g (t) read in file1(t) original signal x is recovered1(t), i.e.,:
x1(t)=g (t)-u1(t) (10)。
CN201810209808.9A 2018-03-14 2018-03-14 A kind of file-type read-write secret communication method based on chaos system Pending CN108199825A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810209808.9A CN108199825A (en) 2018-03-14 2018-03-14 A kind of file-type read-write secret communication method based on chaos system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810209808.9A CN108199825A (en) 2018-03-14 2018-03-14 A kind of file-type read-write secret communication method based on chaos system

Publications (1)

Publication Number Publication Date
CN108199825A true CN108199825A (en) 2018-06-22

Family

ID=62595780

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810209808.9A Pending CN108199825A (en) 2018-03-14 2018-03-14 A kind of file-type read-write secret communication method based on chaos system

Country Status (1)

Country Link
CN (1) CN108199825A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109194845A (en) * 2018-08-27 2019-01-11 长安大学 A kind of image encryption method based on inverse time chaos system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070219739A1 (en) * 2006-03-15 2007-09-20 Spears Brian K Mixer measurement system and method using a chaotic signal
CN101345615A (en) * 2008-08-05 2009-01-14 广东工业大学 Design method for chaos digital secret communication system based on FPGA
CN103888637A (en) * 2014-04-08 2014-06-25 广东工业大学 Method for chaotic encryption of multi-path image digital information

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070219739A1 (en) * 2006-03-15 2007-09-20 Spears Brian K Mixer measurement system and method using a chaotic signal
CN101345615A (en) * 2008-08-05 2009-01-14 广东工业大学 Design method for chaos digital secret communication system based on FPGA
CN103888637A (en) * 2014-04-08 2014-06-25 广东工业大学 Method for chaotic encryption of multi-path image digital information

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
LIDONG LIU 等: "Easy encoding and low bit-error-rate chaos communication system based on reverse-time chaotic oscillator", 《IET SIGNAL PROCESSING》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109194845A (en) * 2018-08-27 2019-01-11 长安大学 A kind of image encryption method based on inverse time chaos system

Similar Documents

Publication Publication Date Title
Zaher et al. On the design of chaos-based secure communication systems
Chien et al. Design of secure digital communication systems using chaotic modulation, cryptography and chaotic synchronization
CN110351077B (en) Method, device, computer equipment and storage medium for encrypting data
Renza et al. High-uncertainty audio signal encryption based on the Collatz conjecture
Wang et al. Novel secure communication based on chaos synchronization
CN111259414A (en) Method, device and equipment for encrypting audio stored in file
Limbong et al. Testing the classic caesar cipher cryptography using of matlab
Yang et al. A cubic map chaos criterion theorem with applications in generalized synchronization based pseudorandom number generator and image encryption
Li et al. Chaotic cryptosystem with high sensitivity to parameter mismatch
CN108199825A (en) A kind of file-type read-write secret communication method based on chaos system
Khan et al. An optimized method for concealing data using audio steganography
CN102624521A (en) Scrambler, scramble processing method, and program
He et al. A robust digital secure communication scheme based on sporadic coupling chaos synchronization
Selvan A review of analog audio scrambling methods for residual intelligibility
CN108075878A (en) A kind of Chaotic Secure Speech Communication method based on transmitting terminal
Palaniyandi et al. Secure digital signal transmission by multistep parameter modulation and alternative driving of transmitter variables
Kurian et al. Self-synchronizing chaotic stream ciphers
Xuan Quyen et al. A chaotic pulse‐time modulation method for digital communication
Sathiyamurthi et al. Speech and Audio Cryptography System using Chaotic Mapping and Modified Euler's System
CN108400865A (en) One kind being based on DCSK chaos encrypting methods
Ramakrishnan et al. Wireless security protocol using a low cost pseudo random number generator
Drake et al. Pseudo-chaos for direct-sequence spread-spectrum communication
CN108418672A (en) A kind of voice communication encryption method based on inverse time chaos matched filter
Fawzy et al. A speech cryptosystem based on chaotic modulation technique
KR960006386A (en) Encryption and Decryption Method of Digital Information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180622