CN111464284B - 一种基于深度混沌系统的三维光概率整形加密方法 - Google Patents
一种基于深度混沌系统的三维光概率整形加密方法 Download PDFInfo
- Publication number
- CN111464284B CN111464284B CN202010253818.XA CN202010253818A CN111464284B CN 111464284 B CN111464284 B CN 111464284B CN 202010253818 A CN202010253818 A CN 202010253818A CN 111464284 B CN111464284 B CN 111464284B
- Authority
- CN
- China
- Prior art keywords
- disturbance
- encryption
- chaotic
- deep
- perturbation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/001—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B10/00—Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
- H04B10/25—Arrangements specific to fibre transmission
- H04B10/2575—Radio-over-fibre, e.g. radio frequency signal modulated onto an optical carrier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B10/00—Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
- H04B10/50—Transmitters
- H04B10/516—Details of coding or modulation
- H04B10/5161—Combination of different modulation schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B10/00—Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
- H04B10/80—Optical aspects relating to the use of optical transmission for specific applications, not provided for in groups H04B10/03 - H04B10/70, e.g. optical power feeding or optical transmission through water
- H04B10/85—Protection from unauthorised access, e.g. eavesdrop protection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q11/00—Selecting arrangements for multiplex systems
- H04Q11/0001—Selecting arrangements for multiplex systems using optical switching
- H04Q11/0062—Network aspects
- H04Q11/0067—Provisions for optical access or distribution networks, e.g. Gigabit Ethernet Passive Optical Network (GE-PON), ATM-based Passive Optical Network (A-PON), PON-Ring
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Optical Communication System (AREA)
Abstract
Description
Claims (5)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010253818.XA CN111464284B (zh) | 2020-04-02 | 2020-04-02 | 一种基于深度混沌系统的三维光概率整形加密方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010253818.XA CN111464284B (zh) | 2020-04-02 | 2020-04-02 | 一种基于深度混沌系统的三维光概率整形加密方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111464284A CN111464284A (zh) | 2020-07-28 |
CN111464284B true CN111464284B (zh) | 2022-11-29 |
Family
ID=71680467
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010253818.XA Active CN111464284B (zh) | 2020-04-02 | 2020-04-02 | 一种基于深度混沌系统的三维光概率整形加密方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111464284B (zh) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112019321B (zh) * | 2020-08-28 | 2021-02-26 | 南京信息工程大学 | 一种基于高维混沌系统的五维光概率成型加密方法 |
CN112910562B (zh) * | 2021-01-15 | 2022-02-11 | 清华大学深圳国际研究生院 | 一种基于概率整形的通信方法 |
CN112671529B (zh) * | 2021-03-15 | 2021-06-29 | 南京信息工程大学 | 一种基于星座扰动的少模p比特高安全传输方法 |
CN112804047A (zh) * | 2021-03-29 | 2021-05-14 | 南京信息工程大学 | 一种基于多频正弦混沌神经网络的光接入加密方法 |
CN113434892B (zh) * | 2021-06-01 | 2023-01-17 | 北京理工大学 | 一种基于混沌加密的概率整形方法 |
CN118174847B (zh) * | 2024-05-13 | 2024-08-20 | 江苏百卓智能科技有限公司 | 一种灵活谱效率高安全传输方法及系统 |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3588838A4 (en) * | 2017-02-24 | 2020-09-02 | Wei Chen | DIGITAL CHAOTIC ENCRYPTION PROCESS BASED ON A CHAOTIC CARD |
CN110601821B (zh) * | 2019-08-07 | 2022-03-01 | 中国人民解放军战略支援部队信息工程大学 | Ofdm通信信号物理层加密方法及装置 |
CN110677236B (zh) * | 2019-11-01 | 2022-10-21 | 辽宁工程技术大学 | 一种基于复合混沌系统与异或运算的ofdm加密方法 |
CN110912699B (zh) * | 2019-12-18 | 2023-01-03 | 南京信息工程大学 | 一种基于浮动概率成型的光传输方法 |
-
2020
- 2020-04-02 CN CN202010253818.XA patent/CN111464284B/zh active Active
Also Published As
Publication number | Publication date |
---|---|
CN111464284A (zh) | 2020-07-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111464284B (zh) | 一种基于深度混沌系统的三维光概率整形加密方法 | |
CN112019321B (zh) | 一种基于高维混沌系统的五维光概率成型加密方法 | |
Jakimoski et al. | Analysis of some recently proposed chaos-based encryption algorithms | |
Chien et al. | Design of secure digital communication systems using chaotic modulation, cryptography and chaotic synchronization | |
Xiao et al. | A novel hybrid secure method based on DNA encoding encryption and spiral scrambling in chaotic OFDM-PON | |
CN111934848B (zh) | 一种智能优化四维混沌矢量加密正交传输方法 | |
CN110677236B (zh) | 一种基于复合混沌系统与异或运算的ofdm加密方法 | |
CN105577360B (zh) | 一种基于混沌序列映射的oofdm加密系统 | |
CN111245596B (zh) | 一种基于三维概率成型的混沌加密方法和系统 | |
CN111600661B (zh) | 基于实时更新的混沌密钥分发的三维加密ofdm光系统 | |
CN110912699B (zh) | 一种基于浮动概率成型的光传输方法 | |
Shen et al. | Enhancing the reliability and security of OFDM-PON using modified Lorenz chaos based on the linear properties of FFT | |
CN113271201B (zh) | 一种动态的aes物理层数据加密方法 | |
CN111525998A (zh) | 基于模式、时隙和频率复合矢量的高可靠光传输方法 | |
CN111082919B (zh) | 一种动态概率16cap映射加密方法 | |
Al-Arjan et al. | Intelligent security in the era of AI: The key vulnerability of RC4 algorithm | |
CN114928435A (zh) | 基于dna编码和slm的量子噪声流加密方法及系统 | |
CN112804048B (zh) | 一种基于生成对抗网络的物理层混沌加密光传输方法 | |
Wei et al. | Chaotic key generation and application in OFDM-PON using QAM constellation points | |
CN108989036A (zh) | 基于混沌激光分时量化的高速密钥安全分发系统及方法 | |
CN205725790U (zh) | 基于混沌序列映射的oofdm加密系统 | |
Wang et al. | Data Center Secure Communication via DNA Hyperchaotic Encryption | |
CN114142987B (zh) | 一种基于新型Logistic混沌加密方式的OCDM系统 | |
Wang et al. | High-security OFDM-OAM optical transmission scheme based on quad-wing ultra-chaotic encryption | |
CN113411178B (zh) | 一种二维智能扰动的高可靠光概率成型RoF传输方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information |
Inventor after: Liu Bo Inventor after: Sun Tingting Inventor after: Zhao Lilong Inventor after: Encourage the army Inventor after: Ren Jianxin Inventor after: Mao Yaya Inventor after: Li Mingye Inventor after: Wang Ruichun Inventor after: Shen Lei Inventor after: Wang Guangquan Inventor after: Wu Yongfeng Inventor before: Liu Bo Inventor before: Wang Guangquan Inventor before: Wu Yongfeng Inventor before: Sun Tingting Inventor before: Zhao Lilong Inventor before: Encourage the army Inventor before: Ren Jianxin Inventor before: Mao Yaya Inventor before: Li Mingye Inventor before: Wang Ruichun Inventor before: Shen Lei Inventor before: Li Liangchuan Inventor before: Zhou Rui |
|
CB03 | Change of inventor or designer information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |