CN108234077A - A kind of punctured safe Turbo coding methods of dynamic by cipher control - Google Patents
A kind of punctured safe Turbo coding methods of dynamic by cipher control Download PDFInfo
- Publication number
- CN108234077A CN108234077A CN201711436181.2A CN201711436181A CN108234077A CN 108234077 A CN108234077 A CN 108234077A CN 201711436181 A CN201711436181 A CN 201711436181A CN 108234077 A CN108234077 A CN 108234077A
- Authority
- CN
- China
- Prior art keywords
- safe
- coding
- punctured
- key
- dynamic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0056—Systems characterized by the type of code used
- H04L1/0071—Use of interleaving
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of punctured safe Turbo coding methods of dynamic by cipher control, transmitting terminal generates the length random sequence identical with information source length to be encoded using key by scrambler during encryption, and the safe coding of different punctured sequence progress different modes is generated using different random sequences;Receiving terminal generates random sequence first with key by scrambler during decryption, and decoder is inputted after then the bit information received is distinguished using random sequence into row decoding.The method of the present invention not only has the advantages that and the mobile communication system Seamless integration- such as 3G/4G/5G, and the constraint of tapping channel quality must not be better than in legitimate channel quality by conventional security coding, this method combining information encrypts the advantage with channel coding, the transmission rate of both sides is authorized to approach safe capacity by guarantee in physical layer, and listener-in can not obtain any private information, from physical layer level lifting system safety.
Description
Technical field
The present invention relates to a kind of punctured safe Turbo coding methods of dynamic by cipher control.
Background technology
With the promotion of Computing ability and arithmetic speed, computation complexity is based in 3G/4G mobile communication system
Key cryptosystem safety be just increasingly subject to challenge, safety of physical layer technology for ensure radio network information provide safely it is new
Approach.Wyner has been proven that in the founder document of initial safety of physical layer realizes safety of physical layer transmission coding
Existence, safety of physical layer coding need simultaneously ensure information transmission reliability and security, existing safety of physical layer
Coding basis stresses the difference of above two index, is broadly divided into legitimate channel without the secure coding method under the conditions of making an uproar and conjunction
Method channel has the secure coding method under the conditions of making an uproar.
(1) legitimate channel is without secure coding method when making an uproar
Safety of physical layer coding is initially for wireline communication network.Physical layer information transmitted error rate in the network compared with
It is low, can further by high level verification, the mechanism such as retransmit and realize legitimate channel without making an uproar, therefore while designing does not have to consider reliability
Constraint only need to ensure safety.When applied to cordless communication network, part research thinks that wave beam forming, point can be utilized
Focusing on constant power control method realizes equivalent legitimate channel without the condition of making an uproar.This method needs to ensure legitimate channel without making an uproar, from reality
There are a certain distance for border application.
(2) legitimate channel has safe coding when making an uproar
In practical communication, the design of safe coding will not only ensure safe transmission of the private information in tapping channel, also need
Consider its noiseproof feature in legitimate channel.At present legitimate channel have the safe coding technical research under the conditions of making an uproar be mostly
Legitimate receipt signal-to-noise ratio is better than what is be unfolded under eavesdropping received signal to noise ratio this supposed premise, therefore the design of safe coding is to channel
Condition has very strong dependence.In practice, because characteristic is unknown during the sky of listener-in, the condition of acceptance of tapping channel can not be true
Fixed, tapping channel is likely to be better than authorization channel, and secrecy capacity reduces at this time, and safe coding is also just dangerous.
Invention content
In order to overcome the disadvantages mentioned above of the prior art, the present invention provides a kind of punctured safety of the dynamic by cipher control
Turbo coding methods not only can effectively solve dependency problem of the safe coding to channel condition, can also be with existing mobile communication
System Seamless integration-.The method of the present invention by information encryption and Turbo code integrated design, by key pass through scrambler generate one
Password stream carries out variable element randomization to control punctured mode in Turbo encoder to the interleaver of Turbo code, if
The punctured Turbo encoding schemes of meter safety.Since Turbo decoders are to punctured mode sensitive, Turbo encoder dynamic in this method
Punctured mechanism ensure that check bit more than stochastic censored, therefore remain Turbo code high error correcting capability while realizes secret letter
The safe transmission of breath.
The technical solution adopted by the present invention to solve the technical problems is:A kind of punctured safety of dynamic by cipher control
Turbo coding methods, including following content:
First, safe coding is encrypted:Transmitting terminal generates length and information source length phase to be encoded using key by scrambler
Same random sequence, and different interleaved sequences is generated into interweaving in line.It is generated using different random sequence different punctured
Sequence carries out the safe coding of the punctured output of stochastic and dynamic;
2nd, safe coding is decrypted:Receiving terminal generates random sequence first with key by scrambler, then will receive
Bit information distinguished using random sequence after input decoder into row decoding, deinterleaver is identical with transmitting terminal.
Compared with prior art, the positive effect of the present invention is:
The method of the present invention realizes information encryption and channel error correction integrated design, not only has mobile with 3G/4G/5G etc.
The advantages of communication system Seamless integration-, and tapping channel quality must not be better than in legitimate channel quality by conventional security coding
Constraint, the encryption of this method combining information and the advantage of channel coding pass through the transmission that guarantee authorizes both sides in physical layer
Rate approaches safe capacity, and listener-in can not obtain any private information, from physical layer level lifting system safety.
Description of the drawings
Examples of the present invention will be described by way of reference to the accompanying drawings, wherein:
Fig. 1 is the safe coding principle based on Turbo code;
Fig. 2 is decoder architecture schematic diagram;
Fig. 3 is the error performance of safe Turbo codings under different code checks and modulation system.
Specific embodiment
The punctured safe Turbo coding methods of a kind of dynamic by cipher control, including following content:
First, safe coding encryption flow
Physical layer signal transmitting terminal process flow by the basis of classical signal process flow introduce scrambler and by
The safety function module of the safe Error Correction of Coding of cipher control realizes information encryption and channel error correction integrated design, promotes object
Manage layer security capabilities.
For its safe coding principle as shown in Figure 1, the constraint length of component coder RSC is K, generator polynomial length is M
=K-1, is expressed as G1=[g10,g11,…,g1,K-1], G2=[g20,g21,…,g2,K-1].It can obtain for dkA information source
Bit, exports and is:
Xk=dk
In this encryption method, the puncturer that is controlled by the password in encoder, it is meant that different random sequences can produce
Raw different punctured sequence, in order to ensure the error correction unfailing performance of Turbo code, encoder bit rate becomes from 1/2 to 1/3 into Mobile state
Change.Consider in certain application environments simultaneously, in order to ensure transmission rate, by controlling coding step as follows:
(1) it is k to assume key;
(2) password will be generated by scrambler by the use of key k and is used as initial value, formation sequence mean value is 0, and variance is d's
The length of integer random sequence P, P are identical with information source length to be encoded;
(3) interleaved sequence is generated by scrambler using key k, length is identical with information source length to be encoded, is used for
Turbo code interleaver;
(4) whether it is equal to 0 according to P (i) values, to determine to delete the encoder output sequence of which component code, so as to change
Become the fixed punctured mode of tradition.
Since variance d determines in random sequence P 0 number, d is bigger, it is punctured after code check it is smaller, but also mean simultaneously
It is better security performance, is shown in Table 1.When d is 0, mechanism is just degenerated, code punctured for the periodicity of general Turbo code more than stochastic censored
Rate is 1/2, and information can not be encrypted.Therefore, it is necessary to select a suitable d, it could not only ensure reliability, but also take into account safety
Property.
Corresponding encoder bit rate under different variances in 1 safe coding mode one of table
Standard variance d | 0 | 0.25 | 0.3 | 0.4 |
Code check r | 0.5 | 0493 | 0.482 | 0.461 |
2nd, safe coding decryption flow
Physical layer reception end process flow equally introduces scrambler on the basis of classical signal receiving terminal process flow
And the safe coding unscrambling decoding module by cipher control, realize decrypted signal.
During unscrambling decoding, receiving terminal generates random sequence P by key k first, and in different safe coding modes,
The X received according to P differentiationsi, Y1iAnd Y2i.Then bit information input decoder will be received, structure is as shown in Figure 2.Xi、Y1i
Input first component decoder (DEC1), Xi、Y2iSecond component decoder (DEC2) is inputted, Turbo decoders change
Generation decoding process.Decoding is not being repeated specifically using Log-MAP algorithms, algorithm.During decoding, if recipient is according to one
The random sequence P of a mistake, then X cannot be distinguished in hei, Y1iAnd Y2i, lead to decoding failure.Only legitimate receiver ability
Correct sequence is generated, obtains correctly decoding result.
It is different under conditions of validated user knows encoder bit rate information with the eavesdropping identical signal of user's reception, listener-in
The error performance of safe Turbo coding modes two is as shown in Figure 3 under code check and modulation system.This method is subject to bit error rate performance
Then the safety and reliability of safe Turbo code is analyzed, the safe Turbo code nonexistence on (1) validated user
The loss of energy;(2) even if eavesdropping user is preferable in channel condition, it is still higher to receive the bit error rate, it is difficult to correct extensive
Multiple its eavesdrops information.
Claims (4)
1. a kind of punctured safe Turbo coding methods of dynamic by cipher control, it is characterised in that:Including following content:
First, safe coding is encrypted:Transmitting terminal is identical with information source length to be encoded by scrambler generation length using key
Random sequence generates the safe coding of different punctured sequence progress different modes using different random sequences;
2nd, safe coding is decrypted:Receiving terminal generates random sequence, the ratio that then will be received first with key by scrambler
Special use of information random sequence inputs decoder into row decoding after distinguishing.
2. the punctured safe Turbo coding methods of a kind of dynamic by cipher control according to claim 1, feature exist
In:The safe coding encryption includes the following steps:
(1) key is selected;
(2) password is generated by scrambler by the use of key and is used as initial value, formation sequence mean value is 0, and variance is that the integer of d is random
Sequence P;
(3) judged according to the positive and negative values of random number P (i), delete first via component code when P (i) is more than 0, otherwise delete
Second road component code.
3. the punctured safe Turbo coding methods of a kind of dynamic by cipher control according to claim 2, feature exist
In:The safe coding decryption includes the following steps:
(1) receiving terminal generates random sequence P by key first;
(2) in different safe coding modes, the X received is distinguished according to Pi, Y1iAnd Y2i;
(3) by Xi、Y1iFirst component decoder is inputted, by Xi、Y2iInput second component decoder;
(4) Turbo decoders are iterated decoding.
4. the punctured safe Turbo coding methods of a kind of dynamic by cipher control according to claim 3, feature exist
In:When safe coding is encrypted, the constraint length of component coder is K, and generator polynomial length is M=K-1, is expressed as G1=
[g10,g11,…,g1,K-1], G2=[g20,g21,…,g2,K-1], it obtains for dkA source bits, export and are:
Xk=dk;
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711436181.2A CN108234077A (en) | 2017-12-26 | 2017-12-26 | A kind of punctured safe Turbo coding methods of dynamic by cipher control |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711436181.2A CN108234077A (en) | 2017-12-26 | 2017-12-26 | A kind of punctured safe Turbo coding methods of dynamic by cipher control |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108234077A true CN108234077A (en) | 2018-06-29 |
Family
ID=62649025
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711436181.2A Pending CN108234077A (en) | 2017-12-26 | 2017-12-26 | A kind of punctured safe Turbo coding methods of dynamic by cipher control |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108234077A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112751651A (en) * | 2020-12-29 | 2021-05-04 | 上海瀚芯实业发展合伙企业(有限合伙) | Signal transmission method combining Turbo code and neural network |
CN116566404A (en) * | 2023-07-11 | 2023-08-08 | 北京谷数科技股份有限公司 | Method and device for determining interleaving mapping relation of punctured Turbo codes |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1585321A (en) * | 2004-06-07 | 2005-02-23 | 北京交通大学 | Digital information anti-interference soft encrypted method and system based on Turbo code-encode |
CN101361305A (en) * | 2007-02-02 | 2009-02-04 | 华为技术有限公司 | Power PAR reduction in multi-carrier communication system |
US20090217130A1 (en) * | 2008-02-26 | 2009-08-27 | Samsung Electronics Co., Ltd. | Method and apparatus for channel encoding and decoding in a communication system using low-density parity-check codes |
CN102868478A (en) * | 2011-07-07 | 2013-01-09 | 中国科学院研究生院 | Method for designing Turbo code puncturing device for joint channel safety codes |
CN104980172A (en) * | 2014-04-01 | 2015-10-14 | 中国科学院大学 | Bit-level decoding method of joint channel-security coding based on Turbo codes |
-
2017
- 2017-12-26 CN CN201711436181.2A patent/CN108234077A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1585321A (en) * | 2004-06-07 | 2005-02-23 | 北京交通大学 | Digital information anti-interference soft encrypted method and system based on Turbo code-encode |
CN101361305A (en) * | 2007-02-02 | 2009-02-04 | 华为技术有限公司 | Power PAR reduction in multi-carrier communication system |
US20090217130A1 (en) * | 2008-02-26 | 2009-08-27 | Samsung Electronics Co., Ltd. | Method and apparatus for channel encoding and decoding in a communication system using low-density parity-check codes |
CN102868478A (en) * | 2011-07-07 | 2013-01-09 | 中国科学院研究生院 | Method for designing Turbo code puncturing device for joint channel safety codes |
CN104980172A (en) * | 2014-04-01 | 2015-10-14 | 中国科学院大学 | Bit-level decoding method of joint channel-security coding based on Turbo codes |
Non-Patent Citations (1)
Title |
---|
WU GUANGZHE等: "Bit- level joint channel-security coding", 《中国科学院大学学报》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112751651A (en) * | 2020-12-29 | 2021-05-04 | 上海瀚芯实业发展合伙企业(有限合伙) | Signal transmission method combining Turbo code and neural network |
CN112751651B (en) * | 2020-12-29 | 2021-09-07 | 白盒子(上海)微电子科技有限公司 | Signal transmission method combining Turbo code and neural network |
CN116566404A (en) * | 2023-07-11 | 2023-08-08 | 北京谷数科技股份有限公司 | Method and device for determining interleaving mapping relation of punctured Turbo codes |
CN116566404B (en) * | 2023-07-11 | 2023-09-19 | 北京谷数科技股份有限公司 | Method and device for determining interleaving mapping relation of punctured Turbo codes |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106161012B (en) | A kind of quantum key distribution after-treatment system and method based on polarization code error correction | |
CN107360568B (en) | Method for realizing symmetric encryption and guaranteeing wireless data secure transmission by utilizing fountain codes | |
CN102075931B (en) | Information theoretical security-based key agreement method in satellite network | |
US20130326630A1 (en) | Pre-processor for physical layer security | |
CN110086616B (en) | Forward one-time pad secret communication method based on wireless channel | |
İşcan et al. | Probabilistic shaping using 5G new radio polar codes | |
CN101710852A (en) | LDPC code encoding/decoding method and encoder/decoder with encryption function | |
CN110233728B (en) | Fountain code-based continuous variable quantum key distribution data coordination method | |
Klinc et al. | LDPC for physical layer security | |
CN106341208A (en) | Joint channel security coding method based on balance index and polarization code | |
KR101280142B1 (en) | Secure Communication Using Non-systematic Error Control Codes | |
US20080317243A1 (en) | Low complexity encryption method for content that is coded by a rateless code | |
CN108234077A (en) | A kind of punctured safe Turbo coding methods of dynamic by cipher control | |
CN106789027B (en) | Method and system for confirming consistency of secret key by using unconditional secure transmission | |
CN106789968A (en) | Secure coding method based on polarization code under a kind of reduction tapping channel | |
CN109617655B (en) | Polarization code wireless data secure transmission method based on random scrambling code assistance | |
Zheng et al. | Secure polar coding for the two-way wiretap channel | |
CN110932863B (en) | Generalized signcryption method based on coding | |
CN110266321B (en) | Novel communication method and system based on polarization code | |
Chen et al. | Message Authentication Code over a wiretap channel | |
KR102193004B1 (en) | Apparatus and method for a data encryption in a near field near field communication system | |
CN111198781B (en) | Computer-implemented method for error correction coding and encryption of files | |
CN103475462A (en) | Random modulation-based combined channel and secure coding and decoding design method | |
Jin et al. | Low transmission overhead for polar coding physical-layer encryption | |
US9401806B2 (en) | Data security method used in a wireless communication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180629 |