CN109039576A - A kind of communication encrypting method and a kind of communication decryption method - Google Patents
A kind of communication encrypting method and a kind of communication decryption method Download PDFInfo
- Publication number
- CN109039576A CN109039576A CN201810852851.7A CN201810852851A CN109039576A CN 109039576 A CN109039576 A CN 109039576A CN 201810852851 A CN201810852851 A CN 201810852851A CN 109039576 A CN109039576 A CN 109039576A
- Authority
- CN
- China
- Prior art keywords
- signal
- chaotic
- communication
- unified
- chaos
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/001—Modulated-carrier systems using chaotic signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/001—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Digital Transmission Methods That Use Modulated Carrier Waves (AREA)
- Measuring Volume Flow (AREA)
Abstract
The invention discloses a kind of communication encrypting methods and a kind of communication decryption method, pass through chaotic modulation and chaotic mask technology, multi-level encryption is realized, the characteristics of using unified chaotic system, passes through modulating system parameter, switch unified chaotic system between inhomogeneity chaos system, the property of system is increasingly complex, while synchronous with transmitting terminal system by being realized using coded signal, and utilizes the system after synchronizing, using the decrypting process opposite with transmitting terminal, decryption signal is obtained.Method of the invention can be used for the secret communication in national defense communication field, be equally applicable for civil confidential communication service industry, the anti-forge random property of chaos system enable secret signal can random white noise in disguise as reality, there is preferable application value.
Description
Technical field
The present invention relates to secret communication field more particularly to a kind of communication encrypting methods and a kind of communication decryption method.
Background technique
Chaos refers to the general name of the uncertain behavior showed in deterministic system.Since chaotic signal has from phase
Like complexities such as property, initial value sensitivity, positive Lee's index and pseudo-randomness, the extensive concern of people is received.Especially by
In chaotic signal pseudorandom, similar to the white noise in reality, it is difficult to be decoded by the person of stealing secret information.Currently, existing chaotic secret
Communication mechanism cipher mode is simple, and system form is fixed, can be by phase space reconstruction technique come the behavior of hypothetical system.
Problem of the existing technology is as follows: the transmitting terminal of single system construction and receiving end safety are lower;Using system
Form is fixed, and system is no longer changed during secret communication;Transmitting terminal and receiving end cipher mode are simple, only with mixed
One of ignorant cover, chaotic modulation, chaos shift keying method carry out coded signal.
Summary of the invention
A kind of communication encrypting method is provided it is an object of the invention to avoid in place of the deficiencies in the prior art and one kind is logical
Believe decryption method.
The purpose of the present invention can be realized by using following technical measures, design a kind of communication encrypting method, packet
Include: starting Lorenz chaos system generates the first chaotic signal;The the first chaotic signal tune generated by Lorenz chaos system
Unified chaotic system parameter processed, and unified chaotic system is run, generate the second chaotic signal;By the second chaotic signal to communication
Original signal encrypted, generate the first coded signal, and by Lorenz chaos system to the first coded signal at
Reason generates the second coded signal;Second coded signal is exported by common signal channel.
Wherein, the state equation of Lorenz chaos system is as follows:
Wherein, when parameter is a=10, b=8/3 and c=28, there is Lorenz chaos system positive Lyapunov to refer to
Number is in chaos state;
It is to unified chaotic system by the first chaotic signal that the Lorenz chaos system in chaos state exports
System parameter is modulated.
Wherein, the state equation of unified chaotic system is as follows:
Wherein, α be unified chaotic system system parameter, and when α ∈ [0,0.8) when, unified chaotic system belongs to broad sense
Lorenz system;When α ∈ (0.8,1] when, unified chaotic system belongs to generalized Chen system;As α=0.8, system belongs to extensively
Adopted L ü system.
Wherein, after the completion of modulation, the system state equation of Lorenz chaos system and unified chaotic system is respectively as follows:
Wherein, s (t)=cxs1-xs1zs1+ r (t) indicates that the second obtained coded signal, r (t) are to include original signal
First coded signal.
The purpose of the present invention can be realized by using following technical measures, design a kind of communication decryption method, packet
Include: from common signal channel receiving enciphered signals, and the coded signal by receiving drives a Lorenz chaos system, generates third
Chaotic signal;A unified chaotic system is driven and modulated by third chaotic signal, and unified chaotic system is made to generate the 4th chaos
Signal;After the starting of Lorenz chaos system, first time decryption is carried out to received coded signal, obtains the first decryption signal;It is logical
It crosses the first decryption signal to be modulated unified chaotic system signal, obtains signal after the second decryption, and to the second decryption signal
It is corrected and handles, obtain decrypting signal completely.
Wherein, Lorenz chaos system and the state equation of unified chaotic system indicate are as follows:
Wherein s ' (t) is the coded signal received.
It is different from the prior art, communication encrypting method of the invention and communication decryption method are covered by chaotic modulation and chaos
Lid technology, realizes multi-level encryption, the characteristics of using unified chaotic system, by modulating system parameter, makes unified chaotic system
Switch between inhomogeneity chaos system, the property of system is increasingly complex, while by utilizing coded signal realization and transmitting terminal system
Synchronization, and decryption signal is obtained using the decrypting process opposite with transmitting terminal using the system after synchronizing.Side of the invention
Method can be used for the secret communication in national defense communication field, be equally applicable for civil confidential communication service industry, the puppet of chaos system
Random nature enable secret signal can disguise as reality in random white noise, have preferable application value.
Detailed description of the invention
Fig. 1 is a kind of flow diagram of communication encrypting method provided by the invention.
Fig. 2 is a kind of flow diagram for communicating decryption method provided by the invention.
Fig. 3 is Lorenz system phasor in a kind of communication encrypting method provided by the invention and a kind of communication decryption method
And the schematic diagram of projection planar.
Fig. 4 is a kind of state of unified chaotic system in a kind of communication encrypting method that invention provides and communication decryption method
The schematic diagram of conversion.
Fig. 5 is a kind of communication encrypting method and a kind of logical schematic for communicating decryption method that invention provides.
Specific embodiment
Further more detailed description is made to technical solution of the present invention With reference to embodiment.Obviously, it is retouched
The embodiment stated is only a part of the embodiments of the present invention, instead of all the embodiments.Based on the embodiments of the present invention,
Those of ordinary skill in the art's every other embodiment obtained without creative labor, all should belong to
The scope of protection of the invention.
Refering to fig. 1, Fig. 1 is a kind of flow diagram of communication encrypting method provided by the invention.The step of this method, wraps
It includes:
S110: starting Lorenz chaos system generates the first chaotic signal.
S120: unified chaotic system parameter is modulated by the first chaotic signal that Lorenz chaos system generates, and is run
Unified chaotic system generates the second chaotic signal.
S130: being encrypted by original signal of second chaotic signal to communication, generates the first coded signal, and pass through
Lorenz chaos system handles the first coded signal, generates the second coded signal.
S140: the second coded signal is exported by common signal channel.
In addition, as shown in Fig. 2, Fig. 2 provides a kind of communication decryption method, the step of this method, includes:
S210: from common signal channel receiving enciphered signals, and the coded signal by receiving drives a Lorenz chaos system
System generates third chaotic signal.
S220: being driven by third chaotic signal and modulates a unified chaotic system, and unified chaotic system is made to generate the 4th
Chaotic signal.
After the starting of S230:Lorenz chaos system, first time decryption is carried out to received coded signal, obtains the first decryption
Signal.
S240: being modulated unified chaotic system signal by the first decryption signal, obtain signal after the second decryption, and
Second decryption signal is corrected and is handled, obtains decrypting signal completely.
For convenience of description, combining encryption and the method for decryption are illustrated simultaneously.Its logical schematic is as shown in Figure 5.
The present invention, which is broadly divided into, transmitting terminal and receives two parts of end system, due to transmitting terminal and receiving terminal be it is symmetrical,
So first considering the transmitting terminal of secret communication.Transmitting terminal is made of two chaos systems, and main system is a Lorenz chaos system
System, the state equation of system are as follows:
Wherein, when parameter is a=10, b=8/3 and c=28, system has positive Lyapunov index, is in chaos
State, system phasor are as shown in Figure 3 in the projection of each plane.
On the basis of Lorenz system, one unified chaotic system is joined with the first chaotic signal of Lorenz chaos system
Number is modulated.Unified chaotic system model is as follows:
It can be seen that in unified chaotic system only contain a parameter alpha, when α ∈ [0,0.8) when, unified chaotic system category
In general Lucas number;When α ∈ (0.8,1] when, unified chaotic system belongs to generalized Chen system;As α=0.8, system
Belong to generalized L ü system.It will be cut between three classes generalized ensemble as above using the unified chaotic system of chaos system signal modulation
It changes, increases the complexity of system signal, the unified chaotic system corresponding to different parameters is as shown in Figure 4.
Using Lorenz system and unified chaotic system, the transmitting terminal and the receiving end that obtain secret communication can be constructed.Hair
Sending is as follows:
Wherein s (t)=cxs1-xs1zs1+ r (t) indicates that transmitting terminal sends signal, and r (t) is that the primary comprising original signal adds
Secret letter number.Similarly, receiving terminal system is expressed as follows:
Wherein s ' (t) is the signal that receiving end receives.In view of limited noise will not influence and be during secret communication
The synchronized result of system sends end signal ys1With receiving end signal ys2Synchronization will be realized under the action of secret communication signal.Definition
Error signal esx=xs2-xs1, esz=zs2-zs1, then the error system isWithIn transmitting terminal
After Lorenz system is synchronous with the realization of receiving end Lorenz system, there is xs2=xs1、ys2=ys1And zs2=zs1.Use ys1And ys2Point
The unified chaotic system at secret communication end Qu Dong not be corresponded to, and unified chaotic system signal is modulated with its dependent variable, makes α
(t) variation in [0,1] range.Define error signal emx=xm2-xm1, emz=zm2-zm1, then the error system isWithFinal transmitting terminal system is synchronous with receiving end realization.
Ending phase, storage decryption signal, closes secret signalling, completes decrypting process.
In chaos system secret communication, multiple chaos systems will increase the complexity of transmitting terminal system and receiving terminal system
Property, so that chaotic secret communication is difficult to realize or even is cannot achieve.Unified chaotic system only has a parameter, but represents three classes
The complexity of Classical Chaos system as controlled chaos system and modulates its parameter with Lorenz system signal and goes forward side by side
Row driving, can effectively construct secret communication transmitting terminal and the receiving end of multi-chaos system.In transmitting terminal and receiving terminal system
Multisystem mechanism provides the irrelevant chaotic signal of multiple groups, to realize that the multi-level encryption of original signal provides carrier wave and matchmaker
It is situated between.Multisystem does not need to send multi-unit message signal, and signal of communication is under the action of to one group of chaos Lorenz system
Realize that transmitting terminal is synchronous between the multiple groups system of receiving end.
The transmitting terminal and receiving end being made of multisystem are symmetrically that is, transmitting terminal and receiving end can be converted mutually, into
One step realizes two-way communication, saves the resource of secret communication.The encryption and decryption processes of original signal use combined ciphering
Method, i.e., signal does not use only chaotic mask technology during secret communication, applies chaotic modulation technology yet, enhances
The reliability and safety of secret communication.
It should be pointed out that each stage of secret communication be not it is completely serial, each stage is only to entire communication
The simple division of scheme, in addition to incipient stage and ending phase, the encryption of signal, transmission, synchronous and decryption may be same stepping
Capable.Further, since system, which synchronizes, needs the time, so encrypted useful letter should not be sent at the very start in secret communication
Number, it need to start to send after synchronism stability.
It is different from the prior art, communication encrypting method of the invention and communication decryption method are covered by chaotic modulation and chaos
Lid technology, realizes multi-level encryption, the characteristics of using unified chaotic system, by modulating system parameter, makes unified chaotic system
Switch between inhomogeneity chaos system, the property of system is increasingly complex, while by utilizing coded signal realization and transmitting terminal system
Synchronization, and decryption signal is obtained using the decrypting process opposite with transmitting terminal using the system after synchronizing.Side of the invention
Method can be used for the secret communication in national defense communication field, be equally applicable for civil confidential communication service industry, the puppet of chaos system
Random nature enable secret signal can disguise as reality in random white noise, have preferable application value.
The above is only embodiments of the present invention, are not intended to limit the scope of the invention, all to utilize the present invention
Equivalent structure or equivalent flow shift made by specification and accompanying drawing content is applied directly or indirectly in other relevant technologies
Field is included within the scope of the present invention.
Claims (6)
1. a kind of communication encrypting method characterized by comprising
Start Lorenz chaos system, generates the first chaotic signal;
Unified chaotic system parameter is modulated by the first chaotic signal that Lorenz chaos system generates, and runs unified chaos system
System generates the second chaotic signal;
It is encrypted by original signal of second chaotic signal to communication, generates the first coded signal, and mixed by Lorenz
Ignorant system handles the first coded signal, generates the second coded signal;
Second coded signal is exported by common signal channel.
2. communication encrypting method according to claim 1, which is characterized in that the state equation of Lorenz chaos system is as follows
It is shown:
Wherein, when parameter is a=10, b=8/3 and c=28, Lorenz chaos system has positive Lyapunov index, place
In chaos state;
The first chaotic signal exported by the Lorenz chaos system in chaos state joins the system of unified chaotic system
Number is modulated.
3. communication encrypting method according to claim 2, which is characterized in that the following institute of the state equation of unified chaotic system
Show:
Wherein, α be unified chaotic system system parameter, and when α ∈ [0,0.8) when, unified chaotic system belongs to broad sense
Lorenz system;When α ∈ (0.8,1] when, unified chaotic system belongs to generalized Chen system;As α=0.8, system belongs to extensively
Adopted L ü system.
4. communication encrypting method according to claim 3, which is characterized in that after the completion of modulation, Lorenz chaos system and
The system state equation of unified chaotic system is respectively as follows:
Wherein, s (t)=cxs1-xs1zs1+ r (t) indicates that the second obtained coded signal, r (t) are first comprising original signal
Coded signal.
5. a kind of communication decryption method characterized by comprising
A Lorenz chaos system is driven from common signal channel receiving enciphered signals, and by the coded signal that receives, generates the
Three chaotic signals;
A unified chaotic system is driven and modulated by third chaotic signal, and unified chaotic system is made to generate the 4th chaotic signal;
After the starting of Lorenz chaos system, first time decryption is carried out to received coded signal, obtains the first decryption signal;
Unified chaotic system signal is modulated by the first decryption signal, obtains signal after the second decryption, and solve to second
Secret letter number is corrected and handles, and obtains decrypting signal completely.
6. communication decryption method according to claim 5, which is characterized in that Lorenz chaos system and unified chaotic system
State equation indicate are as follows:
Wherein s ' (t) is the coded signal received.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810852851.7A CN109039576A (en) | 2018-07-30 | 2018-07-30 | A kind of communication encrypting method and a kind of communication decryption method |
CN201910533297.0A CN110120865A (en) | 2018-07-30 | 2019-06-19 | A kind of encryption and decryption approaches based on unified chaotic system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810852851.7A CN109039576A (en) | 2018-07-30 | 2018-07-30 | A kind of communication encrypting method and a kind of communication decryption method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109039576A true CN109039576A (en) | 2018-12-18 |
Family
ID=64646662
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810852851.7A Pending CN109039576A (en) | 2018-07-30 | 2018-07-30 | A kind of communication encrypting method and a kind of communication decryption method |
CN201910533297.0A Pending CN110120865A (en) | 2018-07-30 | 2019-06-19 | A kind of encryption and decryption approaches based on unified chaotic system |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910533297.0A Pending CN110120865A (en) | 2018-07-30 | 2019-06-19 | A kind of encryption and decryption approaches based on unified chaotic system |
Country Status (1)
Country | Link |
---|---|
CN (2) | CN109039576A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112217628A (en) * | 2020-10-10 | 2021-01-12 | 黄山学院 | Chaotic encryption method for communication signals |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112910625B (en) * | 2021-01-26 | 2023-02-28 | 南京邮电大学 | Confidential communication method and system based on machine learning reserve pool calculation |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101714917A (en) * | 2009-08-24 | 2010-05-26 | 黑龙江大学 | Chaotic key-based data encryption transmission card |
CN103441835A (en) * | 2013-08-30 | 2013-12-11 | 河南工业职业技术学院 | Device and method for chaotic encryption communication experiment |
CN104680476B (en) * | 2015-03-03 | 2017-11-17 | 河南大学 | The lossless encryption method of coloured image based on two-dimensional discrete wavelet conversion and space-time chaos |
CN206865467U (en) * | 2017-05-31 | 2018-01-09 | 哈尔滨理工大学 | A kind of sextuple Fractional Order Hyperchaotic analog circuit |
-
2018
- 2018-07-30 CN CN201810852851.7A patent/CN109039576A/en active Pending
-
2019
- 2019-06-19 CN CN201910533297.0A patent/CN110120865A/en active Pending
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112217628A (en) * | 2020-10-10 | 2021-01-12 | 黄山学院 | Chaotic encryption method for communication signals |
Also Published As
Publication number | Publication date |
---|---|
CN110120865A (en) | 2019-08-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109587132B (en) | Data transmission method and device based on alliance chain | |
CN111669399B (en) | Symmetric encryption system and method for vehicle Bluetooth key identity authentication mode | |
CN101335615B (en) | Method used in key consultation of USB KEY audio ciphering and deciphering device | |
CN105376261B (en) | Encryption method and system for instant messaging message | |
CN106453246B (en) | Equipment identity information distribution method, device and system | |
CN104683291B (en) | Session key negotiation method based on IMS system | |
CN112491550B (en) | Mobile terminal equipment credibility authentication method and system based on Internet of vehicles | |
CN103986583A (en) | Dynamic encryption method and encryption communication system thereof | |
CN108306732A (en) | A kind of random digit generation method, relevant device and system | |
CN110120865A (en) | A kind of encryption and decryption approaches based on unified chaotic system | |
CN113542428B (en) | Vehicle data uploading method and device, vehicle, system and storage medium | |
Aziz et al. | SecureAIS-securing pairwise vessels communications | |
CN112332986B (en) | Private encryption communication method and system based on authority control | |
CN106533656A (en) | Key multilayer mixed encryption/decryption method based on WSN | |
CN103297230B (en) | Information encipher-decipher method, Apparatus and system | |
CN111788836B (en) | Data transmission method and BLE equipment | |
CN112367165A (en) | Serial port communication method and device, electronic equipment and computer readable medium | |
CN112911588A (en) | Lightweight narrowband Internet of things secure transmission method and system | |
CN103167494B (en) | Method for sending information and system | |
US20180199191A1 (en) | Method and apparatus for key management of end encrypted transmission | |
CN101222326B (en) | Communications security and decipherment method based on four-weighted score Fourier transform | |
Shen et al. | Secure in-band bootstrapping for wireless personal area networks | |
Hong et al. | Research on fusion encryption algorithm for internet of things monitoring equipment | |
JP2002152189A (en) | Open key distributing method, and open key transmitting device and open key receiving device used for the same method | |
CN102694652A (en) | Method for realizing lightweight authenticated encryption by using symmetric cryptographic algorithm |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20181218 |