CN108234077A - A kind of punctured safe Turbo coding methods of dynamic by cipher control - Google Patents

A kind of punctured safe Turbo coding methods of dynamic by cipher control Download PDF

Info

Publication number
CN108234077A
CN108234077A CN201711436181.2A CN201711436181A CN108234077A CN 108234077 A CN108234077 A CN 108234077A CN 201711436181 A CN201711436181 A CN 201711436181A CN 108234077 A CN108234077 A CN 108234077A
Authority
CN
China
Prior art keywords
safe
coding
punctured
key
dynamic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711436181.2A
Other languages
Chinese (zh)
Inventor
王凯燕
张桂祥
王馨
张亘
胡飞
姜永广
田永春
曾浩洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CETC 30 Research Institute
Chengdu Westone Information Industry Inc
Original Assignee
CETC 30 Research Institute
Chengdu Westone Information Industry Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CETC 30 Research Institute, Chengdu Westone Information Industry Inc filed Critical CETC 30 Research Institute
Priority to CN201711436181.2A priority Critical patent/CN108234077A/en
Publication of CN108234077A publication Critical patent/CN108234077A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • H04L1/0071Use of interleaving
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of punctured safe Turbo coding methods of dynamic by cipher control, transmitting terminal generates the length random sequence identical with information source length to be encoded using key by scrambler during encryption, and the safe coding of different punctured sequence progress different modes is generated using different random sequences;Receiving terminal generates random sequence first with key by scrambler during decryption, and decoder is inputted after then the bit information received is distinguished using random sequence into row decoding.The method of the present invention not only has the advantages that and the mobile communication system Seamless integration- such as 3G/4G/5G, and the constraint of tapping channel quality must not be better than in legitimate channel quality by conventional security coding, this method combining information encrypts the advantage with channel coding, the transmission rate of both sides is authorized to approach safe capacity by guarantee in physical layer, and listener-in can not obtain any private information, from physical layer level lifting system safety.

Description

A kind of punctured safe Turbo coding methods of dynamic by cipher control
Technical field
The present invention relates to a kind of punctured safe Turbo coding methods of dynamic by cipher control.
Background technology
With the promotion of Computing ability and arithmetic speed, computation complexity is based in 3G/4G mobile communication system Key cryptosystem safety be just increasingly subject to challenge, safety of physical layer technology for ensure radio network information provide safely it is new Approach.Wyner has been proven that in the founder document of initial safety of physical layer realizes safety of physical layer transmission coding Existence, safety of physical layer coding need simultaneously ensure information transmission reliability and security, existing safety of physical layer Coding basis stresses the difference of above two index, is broadly divided into legitimate channel without the secure coding method under the conditions of making an uproar and conjunction Method channel has the secure coding method under the conditions of making an uproar.
(1) legitimate channel is without secure coding method when making an uproar
Safety of physical layer coding is initially for wireline communication network.Physical layer information transmitted error rate in the network compared with It is low, can further by high level verification, the mechanism such as retransmit and realize legitimate channel without making an uproar, therefore while designing does not have to consider reliability Constraint only need to ensure safety.When applied to cordless communication network, part research thinks that wave beam forming, point can be utilized Focusing on constant power control method realizes equivalent legitimate channel without the condition of making an uproar.This method needs to ensure legitimate channel without making an uproar, from reality There are a certain distance for border application.
(2) legitimate channel has safe coding when making an uproar
In practical communication, the design of safe coding will not only ensure safe transmission of the private information in tapping channel, also need Consider its noiseproof feature in legitimate channel.At present legitimate channel have the safe coding technical research under the conditions of making an uproar be mostly Legitimate receipt signal-to-noise ratio is better than what is be unfolded under eavesdropping received signal to noise ratio this supposed premise, therefore the design of safe coding is to channel Condition has very strong dependence.In practice, because characteristic is unknown during the sky of listener-in, the condition of acceptance of tapping channel can not be true Fixed, tapping channel is likely to be better than authorization channel, and secrecy capacity reduces at this time, and safe coding is also just dangerous.
Invention content
In order to overcome the disadvantages mentioned above of the prior art, the present invention provides a kind of punctured safety of the dynamic by cipher control Turbo coding methods not only can effectively solve dependency problem of the safe coding to channel condition, can also be with existing mobile communication System Seamless integration-.The method of the present invention by information encryption and Turbo code integrated design, by key pass through scrambler generate one Password stream carries out variable element randomization to control punctured mode in Turbo encoder to the interleaver of Turbo code, if The punctured Turbo encoding schemes of meter safety.Since Turbo decoders are to punctured mode sensitive, Turbo encoder dynamic in this method Punctured mechanism ensure that check bit more than stochastic censored, therefore remain Turbo code high error correcting capability while realizes secret letter The safe transmission of breath.
The technical solution adopted by the present invention to solve the technical problems is:A kind of punctured safety of dynamic by cipher control Turbo coding methods, including following content:
First, safe coding is encrypted:Transmitting terminal generates length and information source length phase to be encoded using key by scrambler Same random sequence, and different interleaved sequences is generated into interweaving in line.It is generated using different random sequence different punctured Sequence carries out the safe coding of the punctured output of stochastic and dynamic;
2nd, safe coding is decrypted:Receiving terminal generates random sequence first with key by scrambler, then will receive Bit information distinguished using random sequence after input decoder into row decoding, deinterleaver is identical with transmitting terminal.
Compared with prior art, the positive effect of the present invention is:
The method of the present invention realizes information encryption and channel error correction integrated design, not only has mobile with 3G/4G/5G etc. The advantages of communication system Seamless integration-, and tapping channel quality must not be better than in legitimate channel quality by conventional security coding Constraint, the encryption of this method combining information and the advantage of channel coding pass through the transmission that guarantee authorizes both sides in physical layer Rate approaches safe capacity, and listener-in can not obtain any private information, from physical layer level lifting system safety.
Description of the drawings
Examples of the present invention will be described by way of reference to the accompanying drawings, wherein:
Fig. 1 is the safe coding principle based on Turbo code;
Fig. 2 is decoder architecture schematic diagram;
Fig. 3 is the error performance of safe Turbo codings under different code checks and modulation system.
Specific embodiment
The punctured safe Turbo coding methods of a kind of dynamic by cipher control, including following content:
First, safe coding encryption flow
Physical layer signal transmitting terminal process flow by the basis of classical signal process flow introduce scrambler and by The safety function module of the safe Error Correction of Coding of cipher control realizes information encryption and channel error correction integrated design, promotes object Manage layer security capabilities.
For its safe coding principle as shown in Figure 1, the constraint length of component coder RSC is K, generator polynomial length is M =K-1, is expressed as G1=[g10,g11,…,g1,K-1], G2=[g20,g21,…,g2,K-1].It can obtain for dkA information source Bit, exports and is:
Xk=dk
In this encryption method, the puncturer that is controlled by the password in encoder, it is meant that different random sequences can produce Raw different punctured sequence, in order to ensure the error correction unfailing performance of Turbo code, encoder bit rate becomes from 1/2 to 1/3 into Mobile state Change.Consider in certain application environments simultaneously, in order to ensure transmission rate, by controlling coding step as follows:
(1) it is k to assume key;
(2) password will be generated by scrambler by the use of key k and is used as initial value, formation sequence mean value is 0, and variance is d's The length of integer random sequence P, P are identical with information source length to be encoded;
(3) interleaved sequence is generated by scrambler using key k, length is identical with information source length to be encoded, is used for Turbo code interleaver;
(4) whether it is equal to 0 according to P (i) values, to determine to delete the encoder output sequence of which component code, so as to change Become the fixed punctured mode of tradition.
Since variance d determines in random sequence P 0 number, d is bigger, it is punctured after code check it is smaller, but also mean simultaneously It is better security performance, is shown in Table 1.When d is 0, mechanism is just degenerated, code punctured for the periodicity of general Turbo code more than stochastic censored Rate is 1/2, and information can not be encrypted.Therefore, it is necessary to select a suitable d, it could not only ensure reliability, but also take into account safety Property.
Corresponding encoder bit rate under different variances in 1 safe coding mode one of table
Standard variance d 0 0.25 0.3 0.4
Code check r 0.5 0493 0.482 0.461
2nd, safe coding decryption flow
Physical layer reception end process flow equally introduces scrambler on the basis of classical signal receiving terminal process flow And the safe coding unscrambling decoding module by cipher control, realize decrypted signal.
During unscrambling decoding, receiving terminal generates random sequence P by key k first, and in different safe coding modes, The X received according to P differentiationsi, Y1iAnd Y2i.Then bit information input decoder will be received, structure is as shown in Figure 2.Xi、Y1i Input first component decoder (DEC1), Xi、Y2iSecond component decoder (DEC2) is inputted, Turbo decoders change Generation decoding process.Decoding is not being repeated specifically using Log-MAP algorithms, algorithm.During decoding, if recipient is according to one The random sequence P of a mistake, then X cannot be distinguished in hei, Y1iAnd Y2i, lead to decoding failure.Only legitimate receiver ability Correct sequence is generated, obtains correctly decoding result.
It is different under conditions of validated user knows encoder bit rate information with the eavesdropping identical signal of user's reception, listener-in The error performance of safe Turbo coding modes two is as shown in Figure 3 under code check and modulation system.This method is subject to bit error rate performance Then the safety and reliability of safe Turbo code is analyzed, the safe Turbo code nonexistence on (1) validated user The loss of energy;(2) even if eavesdropping user is preferable in channel condition, it is still higher to receive the bit error rate, it is difficult to correct extensive Multiple its eavesdrops information.

Claims (4)

1. a kind of punctured safe Turbo coding methods of dynamic by cipher control, it is characterised in that:Including following content:
First, safe coding is encrypted:Transmitting terminal is identical with information source length to be encoded by scrambler generation length using key Random sequence generates the safe coding of different punctured sequence progress different modes using different random sequences;
2nd, safe coding is decrypted:Receiving terminal generates random sequence, the ratio that then will be received first with key by scrambler Special use of information random sequence inputs decoder into row decoding after distinguishing.
2. the punctured safe Turbo coding methods of a kind of dynamic by cipher control according to claim 1, feature exist In:The safe coding encryption includes the following steps:
(1) key is selected;
(2) password is generated by scrambler by the use of key and is used as initial value, formation sequence mean value is 0, and variance is that the integer of d is random Sequence P;
(3) judged according to the positive and negative values of random number P (i), delete first via component code when P (i) is more than 0, otherwise delete Second road component code.
3. the punctured safe Turbo coding methods of a kind of dynamic by cipher control according to claim 2, feature exist In:The safe coding decryption includes the following steps:
(1) receiving terminal generates random sequence P by key first;
(2) in different safe coding modes, the X received is distinguished according to Pi, Y1iAnd Y2i
(3) by Xi、Y1iFirst component decoder is inputted, by Xi、Y2iInput second component decoder;
(4) Turbo decoders are iterated decoding.
4. the punctured safe Turbo coding methods of a kind of dynamic by cipher control according to claim 3, feature exist In:When safe coding is encrypted, the constraint length of component coder is K, and generator polynomial length is M=K-1, is expressed as G1= [g10,g11,…,g1,K-1], G2=[g20,g21,…,g2,K-1], it obtains for dkA source bits, export and are:
Xk=dk
CN201711436181.2A 2017-12-26 2017-12-26 A kind of punctured safe Turbo coding methods of dynamic by cipher control Pending CN108234077A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711436181.2A CN108234077A (en) 2017-12-26 2017-12-26 A kind of punctured safe Turbo coding methods of dynamic by cipher control

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711436181.2A CN108234077A (en) 2017-12-26 2017-12-26 A kind of punctured safe Turbo coding methods of dynamic by cipher control

Publications (1)

Publication Number Publication Date
CN108234077A true CN108234077A (en) 2018-06-29

Family

ID=62649025

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711436181.2A Pending CN108234077A (en) 2017-12-26 2017-12-26 A kind of punctured safe Turbo coding methods of dynamic by cipher control

Country Status (1)

Country Link
CN (1) CN108234077A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112751651A (en) * 2020-12-29 2021-05-04 上海瀚芯实业发展合伙企业(有限合伙) Signal transmission method combining Turbo code and neural network
CN116566404A (en) * 2023-07-11 2023-08-08 北京谷数科技股份有限公司 Method and device for determining interleaving mapping relation of punctured Turbo codes

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1585321A (en) * 2004-06-07 2005-02-23 北京交通大学 Digital information anti-interference soft encrypted method and system based on Turbo code-encode
CN101361305A (en) * 2007-02-02 2009-02-04 华为技术有限公司 Power PAR reduction in multi-carrier communication system
US20090217130A1 (en) * 2008-02-26 2009-08-27 Samsung Electronics Co., Ltd. Method and apparatus for channel encoding and decoding in a communication system using low-density parity-check codes
CN102868478A (en) * 2011-07-07 2013-01-09 中国科学院研究生院 Method for designing Turbo code puncturing device for joint channel safety codes
CN104980172A (en) * 2014-04-01 2015-10-14 中国科学院大学 Bit-level decoding method of joint channel-security coding based on Turbo codes

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1585321A (en) * 2004-06-07 2005-02-23 北京交通大学 Digital information anti-interference soft encrypted method and system based on Turbo code-encode
CN101361305A (en) * 2007-02-02 2009-02-04 华为技术有限公司 Power PAR reduction in multi-carrier communication system
US20090217130A1 (en) * 2008-02-26 2009-08-27 Samsung Electronics Co., Ltd. Method and apparatus for channel encoding and decoding in a communication system using low-density parity-check codes
CN102868478A (en) * 2011-07-07 2013-01-09 中国科学院研究生院 Method for designing Turbo code puncturing device for joint channel safety codes
CN104980172A (en) * 2014-04-01 2015-10-14 中国科学院大学 Bit-level decoding method of joint channel-security coding based on Turbo codes

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
WU GUANGZHE等: "Bit- level joint channel-security coding", 《中国科学院大学学报》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112751651A (en) * 2020-12-29 2021-05-04 上海瀚芯实业发展合伙企业(有限合伙) Signal transmission method combining Turbo code and neural network
CN112751651B (en) * 2020-12-29 2021-09-07 白盒子(上海)微电子科技有限公司 Signal transmission method combining Turbo code and neural network
CN116566404A (en) * 2023-07-11 2023-08-08 北京谷数科技股份有限公司 Method and device for determining interleaving mapping relation of punctured Turbo codes
CN116566404B (en) * 2023-07-11 2023-09-19 北京谷数科技股份有限公司 Method and device for determining interleaving mapping relation of punctured Turbo codes

Similar Documents

Publication Publication Date Title
CN106161012B (en) A kind of quantum key distribution after-treatment system and method based on polarization code error correction
CN107360568B (en) Method for realizing symmetric encryption and guaranteeing wireless data secure transmission by utilizing fountain codes
CN102075931B (en) Information theoretical security-based key agreement method in satellite network
US20130326630A1 (en) Pre-processor for physical layer security
CN110086616B (en) Forward one-time pad secret communication method based on wireless channel
İşcan et al. Probabilistic shaping using 5G new radio polar codes
CN101710852A (en) LDPC code encoding/decoding method and encoder/decoder with encryption function
CN110233728B (en) Fountain code-based continuous variable quantum key distribution data coordination method
Klinc et al. LDPC for physical layer security
CN106341208A (en) Joint channel security coding method based on balance index and polarization code
KR101280142B1 (en) Secure Communication Using Non-systematic Error Control Codes
US20080317243A1 (en) Low complexity encryption method for content that is coded by a rateless code
CN108234077A (en) A kind of punctured safe Turbo coding methods of dynamic by cipher control
CN106789027B (en) Method and system for confirming consistency of secret key by using unconditional secure transmission
CN106789968A (en) Secure coding method based on polarization code under a kind of reduction tapping channel
CN109617655B (en) Polarization code wireless data secure transmission method based on random scrambling code assistance
Zheng et al. Secure polar coding for the two-way wiretap channel
CN110932863B (en) Generalized signcryption method based on coding
CN110266321B (en) Novel communication method and system based on polarization code
Chen et al. Message Authentication Code over a wiretap channel
KR102193004B1 (en) Apparatus and method for a data encryption in a near field near field communication system
CN111198781B (en) Computer-implemented method for error correction coding and encryption of files
CN103475462A (en) Random modulation-based combined channel and secure coding and decoding design method
Jin et al. Low transmission overhead for polar coding physical-layer encryption
US9401806B2 (en) Data security method used in a wireless communication system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180629