CN111865556A - High-safety transmission method based on three-dimensional constellation double encryption - Google Patents

High-safety transmission method based on three-dimensional constellation double encryption Download PDF

Info

Publication number
CN111865556A
CN111865556A CN202010992965.9A CN202010992965A CN111865556A CN 111865556 A CN111865556 A CN 111865556A CN 202010992965 A CN202010992965 A CN 202010992965A CN 111865556 A CN111865556 A CN 111865556A
Authority
CN
China
Prior art keywords
constellation
dimensional
signal
transformation
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010992965.9A
Other languages
Chinese (zh)
Other versions
CN111865556B (en
Inventor
刘博�
忻向军
任建新
毛雅亚
陈帅东
王瑞春
沈磊
李良川
周锐
王光全
吴泳锋
孙婷婷
赵立龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing University of Information Science and Technology
Original Assignee
Nanjing University of Information Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University of Information Science and Technology filed Critical Nanjing University of Information Science and Technology
Priority to CN202010992965.9A priority Critical patent/CN111865556B/en
Publication of CN111865556A publication Critical patent/CN111865556A/en
Application granted granted Critical
Publication of CN111865556B publication Critical patent/CN111865556B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • H04L9/16Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Digital Transmission Methods That Use Modulated Carrier Waves (AREA)

Abstract

The invention discloses a high-safety transmission method based on three-dimensional constellation double encryption, which comprises the following steps: carrying out serial-to-parallel conversion on binary data of a transmitting end; carrying out constellation mapping on the three-dimensional data to form constellation points; generating a constellation point displacement vector and a rotation vector by using a chaos sequence of a Chua's chaos model, and performing displacement transformation and rotation transformation on the three-dimensional constellation point; processing the encrypted three-dimensional signal by using three-dimensional carrier-free amplitude and phase modulation, superposing the processed three-dimensional signal into a single-channel signal, and transmitting the single-channel signal in a channel; and demodulating the received signals at a receiving end to finally obtain original data. According to the invention, the chaos sequence generated by the Chua's circuit model is used for carrying out displacement and rotation change on the position of a constellation point, so that twice encryption of a constellation diagram is realized, and the safety performance of the system is effectively improved; the transmission capability of the system is effectively improved by using the high gain index and the high anti-noise performance of the constellation.

Description

High-safety transmission method based on three-dimensional constellation double encryption
Technical Field
The invention relates to an optical transmission technology in the field of communication, in particular to a high-safety transmission method based on three-dimensional constellation double encryption.
Background
With the rapid development of services such as 5G, 4K video, cloud computing and the like, the communication field is oriented to wider space, more new spaces need to be expanded, more new services are developed, and the safety problem of communication is attracted more and more attention due to the huge information capacity requirement.
The traditional encryption mode based on the high-level layer can not effectively resist the attack of physical layers such as interception, illegal eavesdropping and the like, and the encryption processing based on the high-level layer has the characteristics of high speed and low time delay, so that the requirement of the current high-speed optical communication is difficult to meet. The method for improving the security of the physical layer of the PON network at present mainly introduces an additional security mechanism into the PON network, and transmits original transmitted symbol information after certain encryption processing, so that the difficulty of eavesdropping signals by an eavesdropper can be effectively improved. At present, there are two main methods for security encryption of the physical layer, one is optical domain encryption processing, and the other is electrical domain encryption processing. The optical domain encryption mode utilizes a laser chaos technology, and utilizes a chaotic laser transmission mode to require that lasers at the transmitting end and the receiving end have a fast synchronization function and a larger bandwidth, but the current laser is difficult to meet the requirements. Therefore, scientific researchers turn their attention to a digital signal encryption method for data by generating a key in a digital chaos mode and the like in the electric domain. An encryption communication scheme using the chaotic system has been studied and proved to have superior confidentiality and anti-decryption capabilities, and thus, the use of the chaotic system for physical layer encryption of a communication system is considered to be a promising encryption scheme.
Meanwhile, most of the traditional chaos systems are based on a two-dimensional QAM constellation, the positions of constellation points are relatively fixed, and the encryption mode is not flexible enough. Most of the current research is done on two-dimensional constellations, and three-dimensional and even higher dimensions are rarely considered.
Disclosure of Invention
The purpose of the invention is as follows: in view of the above problems, the present invention aims to provide a high-security transmission method based on three-dimensional constellation dual encryption.
The technical scheme is as follows: the invention relates to a high-safety transmission method based on three-dimensional constellation double encryption, which comprises the following steps:
(1) carrying out serial-parallel conversion on binary data of a transmitting end, and converting a one-dimensional data stream into three-dimensional data for transmission;
(2) carrying out constellation mapping on the three-dimensional data, and mapping an original data stream into a three-dimensional constellation map to form constellation points; (3) generating a constellation point displacement vector and a rotation vector by using a chaos sequence of a Chua's chaos model, and performing displacement transformation and rotation transformation on a three-dimensional constellation point to enable an original constellation point to be changed into a noise-like constellation point for distribution after encryption, wherein the rotation transformation is to realize the rotation encryption of the constellation point by using the transformation relation of an Euler angle and a quaternion;
(4) processing the encrypted three-dimensional signal by using three-dimensional carrier-free amplitude and phase modulation, superposing the processed three-dimensional signal into a single-channel signal, and transmitting the single-channel signal in a channel;
(5) and demodulating the received signal at a receiving end to finally obtain original data.
In the step (2), the number of constellation points in the three-dimensional constellation diagram is at least 8, and one constellation point in the bit stream corresponds to three bits.
And (4) performing signal processing on the three-dimensional carrier-free amplitude and phase modulation by using three mutually orthogonal filters.
The demodulation method in the step (5) comprises the following steps: converting the received single-path signal into three-path signals, respectively carrying out constellation rotation transformation and displacement transformation on the three-path signals, and carrying out demapping and parallel-serial conversion on the transformed data.
Has the advantages that: compared with the prior art, the invention has the following remarkable advantages:
1. the Chua's circuit model is used for generating a chaotic sequence to carry out displacement and rotation change on the position of a constellation point, so that twice encryption of a constellation diagram is realized, and the safety performance of the system is effectively improved;
2. the transmission capability of the system is effectively improved by utilizing the high gain index and the high anti-noise performance of the three-dimensional constellation diagram.
Drawings
FIG. 1 is a flow chart of the present embodiment;
fig. 2 is a three-dimensional constellation point distribution diagram of the present embodiment;
FIG. 3 is a diagram of a bifurcation of the Chua model;
FIG. 4 is a phase diagram of the Chua model;
fig. 5 is a three-dimensional constellation point distribution diagram after displacement transformation encryption according to the present embodiment;
fig. 6 is a three-dimensional constellation point distribution diagram after two encryptions in the present embodiment;
fig. 7 is a flowchart of a receiving method at the receiving end in the present embodiment;
fig. 8 is a three-dimensional constellation diagram after decryption by the receiving end in the embodiment;
fig. 9 is a simulation curve of the present embodiment.
Detailed Description
In this embodiment, a flow chart of the high-security transmission method based on three-dimensional constellation dual encryption is shown in fig. 1, and the method includes the following steps:
(1) and carrying out serial-parallel conversion on the binary data of the transmitting end, and converting the one-dimensional data stream into three-dimensional data for transmission.
(2) The three-dimensional data is subjected to constellation mapping, an original data stream is mapped into a three-dimensional constellation diagram to form constellation points, a model of the three-dimensional constellation diagram is shown in figure 2, the number of the constellation points in the diagram is 8, and one constellation point in a bit stream corresponds to three bits. The constellation gain index of the three-dimensional constellation diagram is as follows:
Figure 202888DEST_PATH_IMAGE001
wherein d ismin(C) Represents the minimum euclidean distance in the constellation, and p (c) represents the average power of the constellation. The CFM value of the three-dimensional constellation diagram of the embodiment is 0.6724, while the CFM value of the conventional 16QAM square constellation diagram is 0.2846, which improves 0.3878, and effectively improves the anti-noise capability and the bit error rate performance of the system.
(3) Generating a constellation point displacement vector and a rotation vector by using a chaos sequence of a Chua's chaos model, and performing displacement transformation and rotation transformation on the three-dimensional constellation point to change the original constellation point into a noise-like constellation point for distribution after encryption;
1) constellation point displacement transformation
Encrypting the constellation points by using a Chua's circuit model, wherein the Chua's circuit model comprises the following steps:
Figure 599234DEST_PATH_IMAGE002
wherein the content of the first and second substances,
Figure 393884DEST_PATH_IMAGE003
is a constant value and is provided with a constant value,
Figure 508470DEST_PATH_IMAGE004
are variables.
Phase diagrams and bifurcation diagrams of the zeiss model are shown in fig. 3 and 4, and are found from the bifurcation diagrams for different parameters
Figure 164711DEST_PATH_IMAGE005
The corresponding chaotic sequences have different corresponding values when
Figure 602514DEST_PATH_IMAGE006
When the value is less than 8.7, the chaos sequence
Figure 443431DEST_PATH_IMAGE007
The value of (A) is relatively less; when in use
Figure 920680DEST_PATH_IMAGE008
When the value is less than a certain value, the chaos will disappear.
In order to improve the key space of the system, in this embodiment, the generated chaotic sequence is sampled, that is, every five values, a number is extracted as a new sequence, and the new sequence is subjected to remainder calculation, where the formula is:
Figure 161037DEST_PATH_IMAGE009
wherein S is a vector of the displacement and,
Figure 672921DEST_PATH_IMAGE010
a series of displacement vectors are generated for the sampled chaotic sequence. The coordinates of the three-dimensional constellation points are
Figure 684739DEST_PATH_IMAGE011
And the coordinates of the constellation points after the displacement vector encryption are expressed as:
Figure 420921DEST_PATH_IMAGE012
the change of the displacement of the original constellation point is realized, because the displacement vectors added by the three dimensions are consistent, the encryption effect is regarded as the movement of the constellation point towards the direction of 45 degrees, the encrypted constellation diagram is shown in fig. 5, the constellation diagram encrypted by the displacement transformation is eight oblique upward line segments, because the displacement change in the embodiment is the same displacement vector added by the three dimensions, namely, the variation of the three dimensions is consistent, namely, the slope is consistent, and the eight straight lines substantially represent the movement on the basis of the original eight constellation points.
2) Constellation point rotation transformation
As shown in fig. 5, the distribution of the constellation points is regular and is easily eavesdropped by an illegal receiving end, so that it is necessary to perform secondary encryption on the constellation points. Therefore, in the present embodiment, the rotational encryption for the constellation point is implemented by using the transformation relationship between the euler angle and the quaternion. A Chua's circuit model is also used in the rotation transformation to generate a chaotic sequence, and the generated chaotic sequence is processed. First, let the original chaotic sequence be
Figure 684544DEST_PATH_IMAGE013
For the rotation of Euler angle of 0-360 degree, the chaos sequence is first amplified in equal proportion and then the remainder is taken to generate the rotation angle of 0-360 degree, that is
Figure 909989DEST_PATH_IMAGE014
Wherein
Figure 217342DEST_PATH_IMAGE015
Representing the angle of the euler angle transform. These generated rotated sequences are used to encrypt the shift transformed constellation points.
The two-dimensional euler angles are converted to quaternions using the following equation:
Figure 793817DEST_PATH_IMAGE016
the displacement-encrypted constellation points are rotated using the following equation:
Figure 595551DEST_PATH_IMAGE017
the message' is the constellation point coordinate after displacement transformation, and the message is the constellation point coordinate after twice encryption. The encrypted constellation is shown in fig. 6. After twice encryption, the three-dimensional constellation diagram is completely disturbed, the distribution is similar to noise, and the anti-noise capability and the transmission performance of the system are greatly improved.
(4) Processing the encrypted three-dimensional signal by using three-dimensional carrierless amplitude phase modulation (CAP), specifically, processing the signal by using three mutually orthogonal filters, superposing the processed three-dimensional signal into a single-path signal, and transmitting the single-path signal in a channel;
(5) and demodulating the received signals at a receiving end to finally obtain original data.
The specific demodulation method comprises the following steps: converting the received single-path signal into three-path signals, performing constellation rotation transformation and displacement transformation on the three-path signals respectively, and performing demapping and parallel-serial conversion on the transformed data, wherein the process is shown in fig. 7.
The constellation rotation transformation process for the receiving end is as follows: the original secret key is used to generate the chaos sequence which is the same as that of the transmitting terminal, but the rotation vector of the receiving terminal is different from that of the transmitting terminal, and the sum of the value of the rotation vector of the receiving terminal and the value of the original rotation vector is 360 degrees, because the transmitting terminal and the receiving terminal rotate twice to enable the original data to be respectively in the original datax,y,zThe three directions are rotated by 360 degrees, so that the data recovery is successfully realized.
The constellation shift transformation process for the receiving end is as follows: the displacement vector is consistent with the original displacement vector, and only the three-dimensional coordinate is used for subtracting the displacement vector in the operation of coordinate change, so that the original mapped coordinate is obtained. The constellation diagram at the receiving end is shown in fig. 8. In order to test the signal transmission quality under different snr conditions, the present embodiment respectively simulates the analog channels with snr of 1-20, and the result is shown in fig. 9. The figure shows that when the value of the signal-to-noise ratio is 13, the bit error rate is 0, which indicates that the encryption method has good effect and has great application prospect in the future short-distance communication.

Claims (4)

1. A high-safety transmission method based on three-dimensional constellation double encryption is characterized by comprising the following steps:
(1) carrying out serial-parallel conversion on binary data of a transmitting end, and converting a one-dimensional data stream into three-dimensional data for transmission;
(2) carrying out constellation mapping on the three-dimensional data, and mapping an original data stream into a three-dimensional constellation map to form constellation points;
(3) generating a constellation point displacement vector and a rotation vector by using a chaos sequence of a Chua's chaos model, and performing displacement transformation and rotation transformation on the three-dimensional constellation point, wherein the rotation transformation is to realize rotation encryption on the constellation point by using the transformation relation of an Euler angle and a quaternion;
(4) processing the encrypted three-dimensional signal by using three-dimensional carrier-free amplitude and phase modulation, superposing the processed three-dimensional signal into a single-channel signal, and transmitting the single-channel signal in a channel;
(5) and demodulating the received signal at a receiving end to finally obtain original data.
2. The high-security transmission method based on three-dimensional constellation double encryption as claimed in claim 1, wherein the number of constellation points in the three-dimensional constellation in step (2) is at least 8, and one constellation point in the bit stream corresponds to three bits.
3. The high-security transmission method based on three-dimensional constellation double encryption as recited in claim 1, wherein the step (4) of three-dimensional carrierless amplitude phase modulation is to perform signal processing by using three mutually orthogonal filters.
4. The high-security transmission method based on three-dimensional constellation double encryption according to claim 1, wherein the demodulation in step (5) is specifically performed by: converting the received single-path signal into three-path signals, respectively carrying out constellation rotation transformation and displacement transformation on the three-path signals, and carrying out demapping and parallel-serial conversion on the transformed data.
CN202010992965.9A 2020-09-21 2020-09-21 High-safety transmission method based on three-dimensional constellation double encryption Active CN111865556B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010992965.9A CN111865556B (en) 2020-09-21 2020-09-21 High-safety transmission method based on three-dimensional constellation double encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010992965.9A CN111865556B (en) 2020-09-21 2020-09-21 High-safety transmission method based on three-dimensional constellation double encryption

Publications (2)

Publication Number Publication Date
CN111865556A true CN111865556A (en) 2020-10-30
CN111865556B CN111865556B (en) 2020-12-25

Family

ID=72967732

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010992965.9A Active CN111865556B (en) 2020-09-21 2020-09-21 High-safety transmission method based on three-dimensional constellation double encryption

Country Status (1)

Country Link
CN (1) CN111865556B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112688725A (en) * 2020-12-18 2021-04-20 西安电子科技大学 MIMO physical layer safe transmission method based on constellation diagram
CN113726500A (en) * 2021-08-02 2021-11-30 北京邮电大学 Five-dimensional hyperchaotic coupling synchronization system and satellite physical layer encryption transmission method
CN114513260A (en) * 2022-02-15 2022-05-17 南京信息工程大学 Multi-core optical fiber transmission method based on high-dimensional constellation multilevel encryption

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111245596A (en) * 2020-03-27 2020-06-05 南京信息工程大学 Chaotic encryption method and system based on three-dimensional probability modeling

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111245596A (en) * 2020-03-27 2020-06-05 南京信息工程大学 Chaotic encryption method and system based on three-dimensional probability modeling

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
JIANXIN REN 等: "Security-Enhanced 3D-CAP-PON Based on Two-Stage Spherical Constellation Masking", 《IEEE ACCESS》 *
陈璐: "《中国优秀硕士学位论文全文数据库》", 31 July 2020 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112688725A (en) * 2020-12-18 2021-04-20 西安电子科技大学 MIMO physical layer safe transmission method based on constellation diagram
CN112688725B (en) * 2020-12-18 2021-09-03 西安电子科技大学 MIMO physical layer safe transmission method based on constellation diagram
CN113726500A (en) * 2021-08-02 2021-11-30 北京邮电大学 Five-dimensional hyperchaotic coupling synchronization system and satellite physical layer encryption transmission method
CN113726500B (en) * 2021-08-02 2023-09-19 北京邮电大学 Five-dimensional hyper-chaotic coupling synchronization system and satellite physical layer encryption transmission method
CN114513260A (en) * 2022-02-15 2022-05-17 南京信息工程大学 Multi-core optical fiber transmission method based on high-dimensional constellation multilevel encryption
CN114513260B (en) * 2022-02-15 2024-03-08 南京信息工程大学 Multi-core optical fiber transmission method based on high-dimensional constellation multi-level encryption

Also Published As

Publication number Publication date
CN111865556B (en) 2020-12-25

Similar Documents

Publication Publication Date Title
CN111865556B (en) High-safety transmission method based on three-dimensional constellation double encryption
EP3994830B1 (en) Systems, methods and apparatuses for modulation-agnostic unitary braid division multiplexing signal transformation
CN111245596B (en) Chaotic encryption method and system based on three-dimensional probability modeling
CN112019321B (en) Five-dimensional optical probability shaping encryption method based on high-dimensional chaotic system
CN111525998B (en) High-reliability optical transmission method based on mode, time slot and frequency composite vector
CN112671529B (en) Few-mode P-bit high-safety transmission method based on constellation disturbance
CN111342957B (en) Method and device for distributing CO-OFDM (CO-orthogonal frequency division multiplexing) key based on Y-00 protocol
CN105577360A (en) OOFDM (Optical Orthogonal Frequency Division Multiplexing) encryption system based on chaos sequence mapping
CN109768990A (en) Physical layer secure transmission method based on asymmetric key
CN111417038A (en) Safe optical access method based on two-stage spherical constellation masking
CN108574574A (en) Physical layer encryption method based on multi-dimensional constellation rotation
CN113271201A (en) Dynamic AES physical layer data encryption method
CN116566579A (en) Method for enhancing dynamics of chaotic encryption system based on echo state network
CN114142987B (en) OCDM system based on novel Logistic chaotic encryption mode
CN116208315A (en) CAP data transmission method and system based on probability shaping and magic cube encryption
Li et al. Design of an energy-efficient multidimensional secure constellation for 5g communications
CN113411178B (en) Two-dimensional intelligent disturbance high-reliability optical probability shaping RoF transmission method
Zhang et al. Physical Layer Security Encryption in CO-OFDM based on Chaotic 3D Constellation Scrambling
CN113660077B (en) Physical layer encryption method and system for coherent light orthogonal frequency division multiplexing system
CN111711587B (en) Physical layer modulation scrambling method based on pseudo-random sequence
Liu et al. Physical Layer Security Enhanced Scheme based on Joint Encryption of Diffusion and Scrambling by Galilean Transformation in CO-OFDM System
CN115102819B (en) Orthogonal time-frequency space safety transmission method, device and equipment based on unitary matrix transformation
CN108234062A (en) A kind of safe transmission method based on signal characteristic complication of eating dishes without rice or wine
Yang et al. Physical-layer Security Improvement Based on 2D-SCL Map and Brownian motion in CO-OFDM System
CN117749278A (en) NOMA transmission system based on constellation diagram transformation and chaos enhancement

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CB03 Change of inventor or designer information

Inventor after: Liu Bo

Inventor after: Sun Tingting

Inventor after: Zhao Lilong

Inventor after: Encourage the army

Inventor after: Ren Jianxin

Inventor after: Mao Yaya

Inventor after: Chen Shuaidong

Inventor after: Wang Ruichun

Inventor after: Shen Lei

Inventor after: Wang Guangquan

Inventor after: Wu Yongfeng

Inventor before: Liu Bo

Inventor before: Wang Guangquan

Inventor before: Wu Yongfeng

Inventor before: Sun Tingting

Inventor before: Zhao Lilong

Inventor before: Encourage the army

Inventor before: Ren Jianxin

Inventor before: Mao Yaya

Inventor before: Chen Shuaidong

Inventor before: Wang Ruichun

Inventor before: Shen Lei

Inventor before: Li Liangchuan

Inventor before: Zhou Rui

CB03 Change of inventor or designer information