CN108683462A - A kind of encryption method and system of free space optical communication data - Google Patents
A kind of encryption method and system of free space optical communication data Download PDFInfo
- Publication number
- CN108683462A CN108683462A CN201810859564.9A CN201810859564A CN108683462A CN 108683462 A CN108683462 A CN 108683462A CN 201810859564 A CN201810859564 A CN 201810859564A CN 108683462 A CN108683462 A CN 108683462A
- Authority
- CN
- China
- Prior art keywords
- channel
- key
- training sequence
- communication
- time
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B10/00—Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
- H04B10/80—Optical aspects relating to the use of optical transmission for specific applications, not provided for in groups H04B10/03 - H04B10/70, e.g. optical power feeding or optical transmission through water
- H04B10/85—Protection from unauthorised access, e.g. eavesdrop protection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0875—Generation of secret information including derivation or calculation of cryptographic keys or passwords based on channel impulse response [CIR]
Abstract
The present invention is suitable for optic communication encryption technology improvement areas, provides a kind of encryption method of free space optical communication data, the encryption method includes the following steps:S1, the characteristic value for extracting atmospheric channel obtain and complete two-way communication estimation progress channel detection in channel coherency time;S2, quantization value acquisition received signal strength amplitude is carried out by signal graph and using double level quantization algorithms to generate key;S3, the correction that information reconciliation generate cipher consistency is carried out to the binary bits string that receiving-transmitting sides obtain;S4, the binary bits string transformation shared using Hash function pair receiving-transmitting sides carry out secrecy enhancing.Atmospheric turbulance in channel changes constantly, ensure that the randomness of key, therefore communicating pair can obtain different data encryption key in each communication, ensure that communication security.
Description
Technical field
The invention belongs to optic communication encryption technology improvement areas more particularly to a kind of utilization atmospheric channel reciprocity to freedom
The encryption method of space optical communication data.
Background technology
Free space optical communication is a kind of communication using laser as carrier, transmitted in free space.With
Traditional Radio-Frequency Wireless Communication is compared, and free space optical communication has available frequency spectrum width, good confidentiality, anti-electromagnetic interference capability
By force, transmission capacity is big, it is easy to install the advantages that.Therefore, free space optical communication is in survey of deep space, navigation space industry and city office
Domain network planning stroke etc. is widely used.Due to the high directivity of laser beam, free space optical communication can be penetrated than traditional
Frequency communication security, but due to the opening of Channel of Free-space Optical Communication, listener-in can still accomplish not break beam propagation
Eavesdropping, there are still the possibility being ravesdropping for free space optical communication.Some researches show that, use laser or LED as light source
Satellite and ground high data rate communication free space optical communication in, even if listener-in not connect two expected communication parties
Beam range in, there is also caused by atmospheric scattering leakage of information generate information security hidden danger, as shown in Figure 1.
Traditional free space optical communication network is the safety for ensureing data, can be added using the data based on upper-layer protocol
Close, this is also the optimized integration of most security mechanisms.Communication system prevents information leakage, mistake by Source Encryption mode
Journey is as shown in Figure 2.The information of transmission is transformed to ciphertext by information source using encryption key, and the stay of two nights is sent to by overt channel;So
Afterwards, ciphertext is reduced to raw information by the stay of two nights by decruption key again.There are two premises for the safety of this cipher mode:1)
Communicating pair must distribute key in advance by cryptochannel, ensure that listener-in can not know any key information;2) encryption intensity
Safe enough, even if listener-in knows can not restore information from ciphertext if Encryption Algorithm.
Therefore, as long as key is not cracked, then the information instantaneous safety that transmits.But free space optical communication is big
Gas channel is open, this causes signal to be easier to be trapped, if encryption key remains unchanged whithin a period of time, eavesdropping
Third party be then readily available matched plaintext and ciphertext sample.Then, it is counted using advanced cryptanalysis technology and high speed
Calculation is cracked, to the content transmitted in communication interception system.Want to improve encryption intensity, it is necessary to it is long to be constantly increasing key
Degree and key generate iterations, to increase the complexity that third party's key cracks.But this method also increases simultaneously
Communicating pair is encrypted and the complexity of decryption, and realization is more difficult, can not achieve the maintaining complete secrecy property of " one-time pad " system.
In twireless radio-frequency communication, generates key using channel reciprocity and be used for the existing research of data encryption.According to channel
Reciprocity, within the coherence time of channel, the uplink to work on a same frequency, downlink signal can undergo identical channel and decline
Weak, receiving-transmitting sides can obtain identical channel status.In addition to this, any third party cannot obtain identical channel status letter
Breath.The channel status that receiving-transmitting sides can use these shared as a result, generates key shared each other for protecting as secret
Communication security later.And Massachusetts Institute of Technology's Lincoln laboratory also demonstrates free-space optical communication system by experiment recently
Atmospheric channel also have reciprocity, i.e., within the coherence time of atmospheric turbulance, the laser of free space optical communication receiving-transmitting sides
It can also undergo caused by identical turbulent flow and flicker when signal transmits in atmospheric channel, decay, rising and falling influences, and receiving-transmitting sides are considerable
Measure consistent channel state information.
Invention content
The purpose of the present invention is to provide a kind of encryption methods of free space optical communication data, it is intended to solve above-mentioned skill
Art problem.
The invention is realized in this way a kind of encryption method of free space optical communication data, the encryption method include
Following steps:
S1, the characteristic value for extracting atmospheric channel are obtained completes two-way communication estimation progress channel spy in channel coherency time
It surveys;
S2, it is carried out quantization value acquisition received signal strength amplitude next life by signal graph and using double level quantization algorithms
At key;
S3, the correction that information reconciliation generate cipher consistency is carried out to the binary bits string that receiving-transmitting sides obtain;
S4, the binary bits string transformation shared using Hash function pair receiving-transmitting sides carry out secrecy enhancing.
The present invention further technical solution be:The step S1 is further comprising the steps of:
S11, recipient receive the training sequence that sender of communications is sent, and utilize TC=p/v,
K=2 π/λ estimate the coherence time of channel;
S12, probe interval value t is calculated using the channel detection factorAB, calculating formula:tAB=β Tc;
S13, comparison detection spacing value and transmitting training sequence required time, if tAB>=2 δ, entire key product process after
It is continuous to carry out;If tAB≤ 2 δ, adjustment systematic training sequence length are L ';
S14, it receives direction communication initiator request update training sequence length and re-initiates communication;
S15, transmitting and receiving terminal are communicated according to updated probe interval and training sequence, in channel coherency time
Complete two-way channel estimation;
Wherein, v is wind speed, and λ is wavelength, and L is link range,For Refractive-index-structure parameter, for describing turbulent flow
Power, β be the channel detection factor, δ be transmitting training sequence the time required to, TcFor channel coherency time, k is wave number.
The present invention further technical solution be:Detectable signal process ensures to communicate using iterative processing in the step S1
Both sides complete two-way channel estimation in channel coherency time.
The present invention further technical solution be:It is further comprising the steps of in the step S2:
S21, it averages to the received signal strength in same time window and variance;
S22, the upper and lower bound for calculating decision threshold, calculating formula:
S23, key, calculating formula are generated according to key function:
Wherein, quFor the upper limit of decision threshold, mean (y) is system selection parameter to take mean value, α to y, and σ (y) is y's
Mean square deviation, qlFor the lower limit of decision threshold.
The present invention further technical solution be:Information reconciliation in the step S3 include Cascade schemes and
Secure Sketch schemes.
The present invention further technical solution be:Make output does not reflect to appoint by Hash functional transformations in the step S4
What information related with input data.
Another object of the present invention is to provide a kind of encryption system of free space optical communication data, the encryption systems
Including:
Channel detection module, the characteristic value for extracting atmospheric channel is obtained completes two-way communication in channel coherency time
Estimation carries out channel detection;
Feature database extracts key production module, for passing through signal graph and carrying out quantization value using double level quantization algorithms
Received signal strength amplitude is obtained to generate key;
Information reconciliation module, the binary bits string for being obtained to receiving-transmitting sides carry out information reconciliation and carry out generation key
The correction of consistency;
Secrecy enhancing module, the binary bits string transformation for being shared using Hash function pair receiving-transmitting sides are maintained secrecy
Enhancing.
The present invention further technical solution be:The channel detection module further includes:
Coherence time evaluation unit receives the training sequence that sender of communications is sent for recipient, utilizes TC=p/v,K=2 π/λ estimate the coherence time of channel;
Probe interval value cell, for calculating probe interval value t using the channel detection factorAB, calculating formula:tAB=
β·Tc;
Comparing unit, for comparison detection spacing value and transmitting training sequence required time, if tAB>=2 δ, entire key life
Continue at flow;If tAB≤ 2 δ, adjustment systematic training sequence length are L ';
Updating unit, for receiving direction communication initiator request update training sequence length and re-initiating communication;
Channel estimation unit is communicated for transmitting and receiving terminal according to updated probe interval and training sequence,
Two-way channel estimation is completed in channel coherency time;
Wherein, v is wind speed, and λ is wavelength, and L is link range,For Refractive-index-structure parameter, for describing turbulent flow
Power, β be the channel detection factor, δ be transmitting training sequence the time required to, TCFor channel coherency time, k is wave number.
Detectable signal process ensures that communicating pair is completed in channel coherency time using iterative processing in the step S1
Two-way channel is estimated.
The present invention further technical solution be:Further include in the feature database extraction key production module:
Evaluation unit, for averaging to the received signal strength in same time window and variance;
Judge threshold computation unit, the upper and lower bound for calculating decision threshold, calculating formula:
Key generating unit, for generating key, calculating formula according to key function:
Wherein, quFor the upper limit of decision threshold, mean (y) is system selection parameter to take mean value, α to y, and σ (y) is y's
Mean square deviation, qlFor the lower limit of decision threshold.
The present invention further technical solution be:Described information reconciliation mould information reconciliation in the block includes Cascade schemes
And Secure Sketch schemes;
By Hash functional transformations to export in secrecy enhancing module do not reflect it is any related with input data
Information.
The beneficial effects of the invention are as follows:Atmospheric turbulance in channel changes constantly, ensure that the randomness of key, because
This communicating pair can obtain different data encryption key in each communication, ensure that communication security.
Description of the drawings
Fig. 1 is that free space optical communication is ravesdropping schematic diagram.
Fig. 2 is general data encryption system schematic diagram.
Fig. 3 is encryption technique scheme schematic diagram provided in an embodiment of the present invention.
Fig. 4 is channel detection schematic diagram provided in an embodiment of the present invention.
Fig. 5 is training sequence signal waveform schematic diagram provided in an embodiment of the present invention.
Fig. 6 is that A receiving terminals provided in an embodiment of the present invention obtain signal waveform schematic diagram.
Fig. 7 is that B receiving terminals provided in an embodiment of the present invention obtain signal waveform schematic diagram.
Fig. 8 is that listener-in provided in an embodiment of the present invention obtains signal waveform schematic diagram.
Fig. 9 is binary bits string schematic diagram after the signal waveform quantization of the both ends A provided in an embodiment of the present invention.
Figure 10 is binary bits string schematic diagram after the signal waveform quantization of the both ends B provided in an embodiment of the present invention.
Figure 11 is that listener-in provided in an embodiment of the present invention obtains binary bits string schematic diagram after signal waveform quantization.
Figure 12 is encryption system overall schematic provided in an embodiment of the present invention.
Figure 13 is encryption technique scheme schematic diagram provided in an embodiment of the present invention.
Specific implementation mode
As shown in Figure 1, the encryption method of free space optical communication data provided by the invention, details are as follows:
The present invention provides a kind of key generation method ensuring free space optical communication safety, and this method utilizes atmospheric channel
Reciprocity generate and ensure the key of communication security, this method can be widely used in the practical application scene of various complexity,
It ensures communication safety.
It is a kind of using atmospheric channel reciprocity to the technical solution of free-space optical communication system data encryption, program base
In the reciprocity of atmospheric channel, it is followed by by extracting communication user both sides transmitting training sequence from shared atmospheric channel state
The signal strength received generates shared key to ensure communication safety, including channel detection, Characteristic Extraction, information are reconciled, protected
Four parts of close enhancing realize that process is as shown in Figure 3.
Step S1, extract atmospheric channel characteristic value obtain in channel coherency time complete two-way communication estimation carry out letter
Road detects;Channel detection is mainly the extraction to atmospheric channel characteristic value, and most of free-space optical communication system is all base
In IM/DD, therefore we can generate key using received signal strength (RSS).Coherence time is that description channel variation is fast
Slow characteristic parameter, it is believed that channel response is slowly varying within coherence time.In order to ensure the consistent of channel estimation
Property, communicating pair at least must be concerned with into primary information in channel and interact, therefore, we determined that two crucial parameters:Channel
Bi-directional probing interval tABValue and training sequence length L.It is communication initiator to enable Alice, and Bob is recipient, system
The initial value of training sequence length is L, symbol period Ts, then it is δ=LT the time required to emitting training sequences.Channel is set to visit
Survey factor initial value β=0.5 (number for being less than 1).Flow diagram, as shown in Figure 4.
During channel detection, it is as follows:S11, recipient receive the training sequence that sender of communications is sent,
Utilize TC=p/v,K=2 π/λ estimate the coherence time of channel;S12, using channel detection because
Son calculates probe interval value tAB, calculating formula:tAB=β Tc;Needed for S13, comparison detection spacing value and transmitting training sequence
Time, if tAB>=2 δ, entire key product process continue;If tAB≤ 2 δ, adjustment systematic training sequence length are L ';
S14, it receives direction communication initiator request update training sequence length and re-initiates communication;S15, transmitting and receiving terminal are according to more
Probe interval and training sequence after new are communicated, and two-way channel estimation is completed in channel coherency time;
Wherein, v is wind speed, and λ is wavelength, and L is link range,For Refractive-index-structure parameter, for describing turbulent flow
Power, β be the channel detection factor, δ be transmitting training sequence the time required to, TCFor channel coherency time, k is wave number;Finally,
Transmitting and receiving terminal is communicated according to updated probe interval and training sequence, and whole flow process iteration carries out, to ensure to communicate
Both sides complete two-way channel estimation in channel coherency time, then carry out subsequent key product process again.
Step S2 by signal graph and carries out quantization value using double level quantization algorithms and obtains received signal strength amplitude
To generate key;We use the training sequence feature of received signal strength (RSS) as channel after atmospheric channel influences.
We can obtain the signal graph after training sequence deformation to receiving terminal, we carry out it quantization using double level quantization algorithms and take
Value.The oscillogram of training signal, receives signal waveforms and listener-in obtains binary system after signal waveforms and last quantization
Bit stream, as shown in Figure 11-Figure 5;First, it averages to the RSS in same time window and variance;Then, according to formula:Determine the upper and lower bound of decision threshold;Finally, according to formula
Generate key.When RSS is more than the upper limit, key 1;When RSS is less than lower limit, key 0;Between upper and lower limit then by
It abandons.Each channel measurement, the communicating pair bottom that need to make an uproar to atmospheric environment measure, and with the suitable value of determination, and then determine
Rational decision threshold, the influence by noise to channel measurement minimize.
Step S3 carries out the school that information reconciliation generate cipher consistency to the binary bits string that receiving-transmitting sides obtain
Just;Information reconciles for ensureing the consistency of both sides' key, and due to the strong coherence of legal both sides' channel estimation, what is generated is first
In beginning key sequence, only small part key bit mismatches.Receiving-transmitting sides are to obtained binary bits string into row information
Coordinate, the mismatch position between two binary bits strings is positioned and correct, to make receiving-transmitting sides that can be shared each other
Bit String.The information reconciliation includes Cascade schemes and Secure Sketch schemes.
Step S4, the binary bits string transformation shared using Hash function pair receiving-transmitting sides carry out secrecy enhancing;In order to
Ensure that the randomness of key meets security requirements, receiving-transmitting sides carry out Privacy amplification operations to shared binary bits string, main
Wanting method is converted using Hash function pair binary bits strings.One-way Hash function is the key concept in contemporary cryptology,
For in communication process authentication and information integrity verification.The effect of function is the list entries random length, is turned
Change the output sequence of regular length into.The safety of Hash functions refers to its one-way, that is, exports and do not reflect any and input
The related information of data.
The key that this patent proposes generates scheme, for eavesdropping user, it is necessary to obtain the channel consistent with communicating pair
The key of data encryption during feature can just be communicated.If listener-in wants to obtain consistent channel characteristics, listener-in must pole
It is easy to be found in this way close to communicating pair, and eavesdropping is caused to fail.In addition, when being due to the atmospheric turbulance in channel
Variation is carved, i.e., atmospheric channel feature is also time-varying, ensure that the randomness of key, therefore communicating pair can lead to every time
Different data encryption key can be obtained when letter, ensure that communication security.
As shown in figure 12, another object of the present invention is to provide a kind of encryption system of free space optical communication data,
The encryption system includes:
Channel detection module, the characteristic value for extracting atmospheric channel is obtained completes two-way communication in channel coherency time
Estimation carries out channel detection;
Feature database extracts key production module, for passing through signal graph and carrying out quantization value using double level quantization algorithms
Received signal strength amplitude is obtained to generate key;
Information reconciliation module, the binary bits string for being obtained to receiving-transmitting sides carry out information reconciliation and carry out generation key
The correction of consistency;
Secrecy enhancing module, the binary bits string transformation for being shared using Hash function pair receiving-transmitting sides are maintained secrecy
Enhancing.
The channel detection module further includes:
Coherence time evaluation unit receives the training sequence that sender of communications is sent for recipient, utilizes TC=p/v,K=2 π/λ estimate the coherence time of channel;
Probe interval value cell, for calculating probe interval value t using the channel detection factorAB, calculating formula:tAB=
β·Tc;
Comparing unit, for comparison detection spacing value and transmitting training sequence required time, if tAB>=2 δ, entire key life
Continue at flow;If tAB≤ 2 δ, adjustment systematic training sequence length are L ';
Updating unit, for receiving direction communication initiator request update training sequence length and re-initiating communication;
Channel estimation unit is communicated for transmitting and receiving terminal according to updated probe interval and training sequence,
Two-way channel estimation is completed in channel coherency time;
Wherein, v is wind speed, and λ is wavelength, and L is link range,For Refractive-index-structure parameter, for describing turbulent flow
Power, β be the channel detection factor, δ be transmitting training sequence the time required to, TCFor channel coherency time, k is wave number.
Detectable signal process ensures that communicating pair is completed in channel coherency time using iterative processing in the step S1
Two-way channel is estimated.
Further include in the feature database extraction key production module:
Evaluation unit, for averaging to the received signal strength in same time window and variance;
Judge threshold computation unit, the upper and lower bound for calculating decision threshold, calculating formula:
Key generating unit, for generating key, calculating formula according to key function:
Wherein, quFor the upper limit of decision threshold, mean (y) is system selection parameter to take mean value, α to y, and σ (y) is y's
Mean square deviation, qlFor the lower limit of decision threshold.
Described information reconciliation mould information reconciliation in the block includes Cascade schemes and Secure Sketch schemes;
By Hash functional transformations to export in secrecy enhancing module do not reflect it is any related with input data
Information.
Since the atmospheric turbulance in channel changes constantly, i.e., atmospheric channel feature is also time-varying, ensure that key
Randomness, therefore communicating pair can obtain different data encryption key in each communication, ensure that communication
Safety.
It can be directly used on existing free-space optical communication system, improve free space optical communication data transmission anti-intercepting and capturing
Ability solves the leaking data hidden danger that free-space optical communication system is brought due to channel open, improves the peace of communication system
Full performance.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention
All any modification, equivalent and improvement etc., should all be included in the protection scope of the present invention made by within refreshing and principle.
Claims (10)
1. a kind of encryption method of free space optical communication data, which is characterized in that the encryption method includes the following steps:
S1, the characteristic value for extracting atmospheric channel are obtained completes two-way communication estimation progress channel detection in channel coherency time;
S2, quantization value is carried out by signal graph and using double level quantization algorithms, and to obtain received signal strength amplitude close to generate
Key;
S3, the correction that information reconciliation generate cipher consistency is carried out to the binary bits string that receiving-transmitting sides obtain;
S4, the binary bits string transformation shared using Hash function pair receiving-transmitting sides carry out secrecy enhancing.
2. encryption method according to claim 1, which is characterized in that the step S1 is further comprising the steps of:
S11, recipient receive the training sequence that sender of communications is sent, and utilize TC=p/v,k
=2 π/λ estimate the coherence time of channel;
S12, probe interval value t is calculated using the channel detection factorAB, calculating formula:tAB=β Tc;
S13, comparison detection spacing value and transmitting training sequence required time, if tAB>=2 δ, entire key product process continue into
Row;If tAB≤ 2 δ, adjustment systematic training sequence length are L ';
S14, it receives direction communication initiator request update training sequence length and re-initiates communication;
S15, transmitting and receiving terminal are communicated according to updated probe interval and training sequence, are completed in channel coherency time
Two-way channel is estimated;
Wherein, v is wind speed, and λ is wavelength, and L is link range,For Refractive-index-structure parameter, for describing the strong of turbulent flow
Weak, β is the channel detection factor, the time required to δ is transmitting training sequence, TcFor channel coherency time, k is wave number.
3. encryption method according to claim 2, which is characterized in that detectable signal process uses iteration in the step S1
Processing ensures that communicating pair completes two-way channel estimation in channel coherency time.
4. encryption method according to claim 3, which is characterized in that further comprising the steps of in the step S2:
S21, it averages to the received signal strength in same time window and variance;
S22, the upper and lower bound for calculating decision threshold, calculating formula:
S23, key, calculating formula are generated according to key function:
Wherein, quFor the upper limit of decision threshold, mean (y) is system selection parameter to take mean value, α to y, and σ (y) is the square of y
Difference, qlFor the lower limit of decision threshold.
5. encryption method according to claim 4, which is characterized in that the information reconciliation in the step S3 includes
Cascade schemes and Secure Sketch schemes.
6. encryption method according to claim 5, which is characterized in that make by Hash functional transformations in the step S4
Output does not reflect any information related with input data.
7. a kind of encryption system of free space optical communication data, which is characterized in that the encryption system includes:
Channel detection module, the characteristic value for extracting atmospheric channel is obtained completes two-way communication estimation in channel coherency time
Carry out channel detection;
Feature database extracts key production module, is obtained for passing through signal graph and carrying out quantization value using double level quantization algorithms
Received signal strength amplitude generates key;
Information reconciliation module, the binary bits string for being obtained to receiving-transmitting sides carry out information reconciliation and carry out generation key agreement
The correction of property;
Secrecy enhancing module, the binary bits string transformation for being shared using Hash function pair receiving-transmitting sides carry out secrecy increasing
By force.
8. encryption system according to claim 7, which is characterized in that the channel detection module further includes:
Coherence time evaluation unit receives the training sequence that sender of communications is sent for recipient, utilizes TC=p/v,K=2 π/λ estimate the coherence time of channel;
Probe interval value cell, for calculating probe interval value t using the channel detection factorAB, calculating formula:tAB=β Tc;
Comparing unit, for comparison detection spacing value and transmitting training sequence required time, if tAB>=2 δ, entire key generate stream
Journey continues;If tAB≤ 2 δ, adjustment systematic training sequence length are L ';
Updating unit, for receiving direction communication initiator request update training sequence length and re-initiating communication;
Channel estimation unit is communicated for transmitting and receiving terminal according to updated probe interval and training sequence, in channel
Two-way channel estimation is completed in coherence time;
Wherein, vFor wind speed, λFor wavelength, L is link range,For Refractive-index-structure parameter, for describing the power of turbulent flow, β is
The channel detection factor, the time required to δ is transmitting training sequence, TcFor channel coherency time, k is wave number.
Detectable signal process uses iterative processing to ensure that communicating pair is completed in channel coherency time two-way in the step S1
Channel estimation.
9. encryption system according to claim 8, which is characterized in that also wrapped in the feature database extraction key production module
It includes:
Evaluation unit, for averaging to the received signal strength in same time window and variance;
Judge threshold computation unit, the upper and lower bound for calculating decision threshold, calculating formula:
Key generating unit, for generating key, calculating formula according to key function:
Wherein, quFor the upper limit of decision threshold, mean (y) is system selection parameter to take mean value, α to y, and σ (y) is the square of y
Difference, qlFor the lower limit of decision threshold.
10. encryption system according to claim 8, which is characterized in that described information reconciliation mould information reconciliation packet in the block
Include Cascade schemes and Secure Sketch schemes;
Output is made not reflect any information related with input data by Hash functional transformations in the secrecy enhancing module.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810859564.9A CN108683462A (en) | 2018-07-31 | 2018-07-31 | A kind of encryption method and system of free space optical communication data |
PCT/CN2018/110752 WO2020024440A1 (en) | 2018-07-31 | 2018-10-18 | Encryption method and system for free space optical communication data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810859564.9A CN108683462A (en) | 2018-07-31 | 2018-07-31 | A kind of encryption method and system of free space optical communication data |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108683462A true CN108683462A (en) | 2018-10-19 |
Family
ID=63815932
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810859564.9A Pending CN108683462A (en) | 2018-07-31 | 2018-07-31 | A kind of encryption method and system of free space optical communication data |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN108683462A (en) |
WO (1) | WO2020024440A1 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110061834A (en) * | 2019-03-01 | 2019-07-26 | 中国电子科技集团公司第三十研究所 | A kind of wireless channel fingerprint generation method |
CN110492991A (en) * | 2019-04-18 | 2019-11-22 | 上海循态信息科技有限公司 | Method for parameter estimation and system based on free space CVQKD system |
CN111555867A (en) * | 2020-04-10 | 2020-08-18 | 中国人民解放军国防科技大学 | Measuring equipment independent quantum key distribution method based on threshold selection technology |
CN112491547A (en) * | 2020-12-03 | 2021-03-12 | 长春理工大学 | Atmospheric turbulence optical channel shared random bit extraction system based on space diversity time-sharing gating |
CN113938274A (en) * | 2021-10-13 | 2022-01-14 | 北京积木信创数据技术有限公司 | Data security transmission method for wearable equipment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103402200A (en) * | 2013-07-11 | 2013-11-20 | 北京邮电大学 | Secret key generation method based on wireless channel characteristics in frequency division duplex system |
CN104010299A (en) * | 2014-05-21 | 2014-08-27 | 中国人民解放军信息工程大学 | Mobile communication conversion privacy enhancing mehtod based on physical layer safety |
CN104640110A (en) * | 2015-01-15 | 2015-05-20 | 南京邮电大学 | Symmetric key generating method based on channel characteristics in terminal direct communication |
US20180103481A1 (en) * | 2012-02-02 | 2018-04-12 | Department 13, LLC | LPI/LPD Communication Systems |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201821352U (en) * | 2009-10-10 | 2011-05-04 | 刘奕辉 | Free space photo-communication device based on passive optical network |
MX355252B (en) * | 2012-01-09 | 2018-03-27 | Attochron Llc | Uspl-fso lasercom point-to-point and point-to-multipoint optical wireless communication. |
CN106506138A (en) * | 2016-11-11 | 2017-03-15 | 深圳大学 | The cross-layer encryption method of space optical communication system and system |
-
2018
- 2018-07-31 CN CN201810859564.9A patent/CN108683462A/en active Pending
- 2018-10-18 WO PCT/CN2018/110752 patent/WO2020024440A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180103481A1 (en) * | 2012-02-02 | 2018-04-12 | Department 13, LLC | LPI/LPD Communication Systems |
CN103402200A (en) * | 2013-07-11 | 2013-11-20 | 北京邮电大学 | Secret key generation method based on wireless channel characteristics in frequency division duplex system |
CN104010299A (en) * | 2014-05-21 | 2014-08-27 | 中国人民解放军信息工程大学 | Mobile communication conversion privacy enhancing mehtod based on physical layer safety |
CN104640110A (en) * | 2015-01-15 | 2015-05-20 | 南京邮电大学 | Symmetric key generating method based on channel characteristics in terminal direct communication |
Non-Patent Citations (1)
Title |
---|
周百鹏: "基于无线信道特征提取的密钥生成技术研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110061834A (en) * | 2019-03-01 | 2019-07-26 | 中国电子科技集团公司第三十研究所 | A kind of wireless channel fingerprint generation method |
CN110492991A (en) * | 2019-04-18 | 2019-11-22 | 上海循态信息科技有限公司 | Method for parameter estimation and system based on free space CVQKD system |
CN110492991B (en) * | 2019-04-18 | 2022-05-06 | 上海循态量子科技有限公司 | Parameter estimation method and system based on free space CVQKD system |
CN111555867A (en) * | 2020-04-10 | 2020-08-18 | 中国人民解放军国防科技大学 | Measuring equipment independent quantum key distribution method based on threshold selection technology |
CN112491547A (en) * | 2020-12-03 | 2021-03-12 | 长春理工大学 | Atmospheric turbulence optical channel shared random bit extraction system based on space diversity time-sharing gating |
CN112491547B (en) * | 2020-12-03 | 2022-06-28 | 长春理工大学 | Atmospheric turbulence optical channel shared random bit extraction system |
CN113938274A (en) * | 2021-10-13 | 2022-01-14 | 北京积木信创数据技术有限公司 | Data security transmission method for wearable equipment |
CN113938274B (en) * | 2021-10-13 | 2024-03-22 | 北京积木信创数据技术有限公司 | Data security transmission method for wearable equipment |
Also Published As
Publication number | Publication date |
---|---|
WO2020024440A1 (en) | 2020-02-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108683462A (en) | A kind of encryption method and system of free space optical communication data | |
JP7158380B2 (en) | Apparatus and method for quantum enhanced physical layer security | |
KR100631242B1 (en) | Cryptographic communication apparatus | |
US9634835B2 (en) | Apparatus and method for the detection of attacks taking control of the single photon detectors of a quantum cryptography apparatus by randomly changing their efficiency | |
CN108847939B (en) | MDI-QKD method based on quantum network | |
CN110493010B (en) | Mail receiving and sending method of mail system based on quantum digital signature | |
Pljonkin et al. | The review of the commercial quantum key distribution system | |
Wang et al. | Secure key distribution system based on optical channel physical features | |
CN107493168A (en) | Quanta identity authentication method and its application process during quantum key distribution | |
Wang et al. | MobiKey: Mobility-based secret key generation in smart home | |
CN108365954B (en) | Control code multiplexing method | |
Chamon et al. | Deterministic random number generator attack against the Kirchhoff-law-Johnson-noise secure key exchange protocol | |
Chan et al. | Multi-photon quantum key distribution based on double-lock encryption | |
Tan et al. | Performance analysis of physical-layer security in ISK quantum-noise randomized cipher based on wiretap channel | |
CN104993927B (en) | A kind of Symmetric key generation method | |
CN108683500B (en) | WBAN privacy protection method based on channel characteristics | |
US11818258B2 (en) | Method and system for quantum key distribution | |
Hughes et al. | Secure communications using quantum cryptography | |
Etengu et al. | Performance comparison of BB84 and B92 satellite-based free space quantum optical communication systems in the presence of channel effects | |
KR20220045910A (en) | Method, apparatus, computer program and data carrier for determining a shared secret cryptographic key | |
Ling et al. | Experimental E91 quantum key distribution | |
Sharma et al. | Impact of mutual influence between bob and eve on the secrecy of diffusion-based molecular timing channels | |
Lasota et al. | Quantum communication improved by spectral entanglement and supplementary chromatic dispersion | |
Hajomer et al. | Key Generation and Distribution Using Phase Fluctuation in Classical Fiber Channel | |
Rumyantsev et al. | Modeling of quantum key distribution system for secure information transfer |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181019 |
|
RJ01 | Rejection of invention patent application after publication |