CN113541951B - Asymmetric elliptic curve encryption secure communication system based on 5G network - Google Patents

Asymmetric elliptic curve encryption secure communication system based on 5G network Download PDF

Info

Publication number
CN113541951B
CN113541951B CN202110716629.6A CN202110716629A CN113541951B CN 113541951 B CN113541951 B CN 113541951B CN 202110716629 A CN202110716629 A CN 202110716629A CN 113541951 B CN113541951 B CN 113541951B
Authority
CN
China
Prior art keywords
converter
serial
parallel
elliptic curve
public key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110716629.6A
Other languages
Chinese (zh)
Other versions
CN113541951A (en
Inventor
李齐良
白皓若
肖涛
胡淼
唐向宏
曾然
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Dianzi University
Original Assignee
Hangzhou Dianzi University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Dianzi University filed Critical Hangzhou Dianzi University
Priority to CN202110716629.6A priority Critical patent/CN113541951B/en
Publication of CN113541951A publication Critical patent/CN113541951A/en
Application granted granted Critical
Publication of CN113541951B publication Critical patent/CN113541951B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/32Carrier systems characterised by combinations of two or more of the types covered by groups H04L27/02, H04L27/10, H04L27/18 or H04L27/26
    • H04L27/34Amplitude- and phase-modulated carrier systems, e.g. quadrature-amplitude modulated carrier systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention relates to a 5G network-based asymmetric elliptic curve encryption secure communication system: the transmitting end comprises a j-path structure: the signal generator is connected with the mapper, the mapper is connected with two elliptic curve encryptors, a public key receiver is connected between the two encryptors, the encryptors are connected with the adder through the multiplier, and the adder is connected with the serial-parallel converter; the serial-to-parallel converter N ports are connected with the IFFT, the IFFT j multiplied by N ports are connected with the parallel-to-serial converter, and the parallel-to-serial converter is sequentially connected with the 5G transmitting antenna through the cyclic prefix importer, the digital-to-analog converter, the filter and the up-converter to send out signals; the 5G receiving antenna of the receiving end is connected with the serial-parallel converter through the down converter, the filter, the analog-to-digital converter and the pilot frequency removing cyclic prefix device in sequence, j multiplied by N output ports of the serial-parallel converter are connected with the FFT, and the FFT is connected with a j-path structure: the FFTN ports are connected with the parallel-serial converter, the parallel-serial converter is connected with the two multipliers, the multipliers are sequentially connected with the mapper through the integrator and the decryptor, and the public key and private key generator is connected between the two decryptors.

Description

Asymmetric elliptic curve encryption secure communication system based on 5G network
Technical Field
The invention belongs to the technical field of secure communication and information security in a 5G network, and particularly relates to a secure communication system based on asymmetric elliptic curve encryption of the 5G network.
Background
The 5G is the 5 th generation mobile communication technology, which fully utilizes the frequency band resource, the Orthogonal Frequency Division Multiplexing (OFDM) used by the technology is a multi-subcarrier technology which utilizes mutual orthogonality, firstly, the information is subjected to quadrature amplitude modulation (M-QAM) or phase shift keying (M-PSK) modulation, then the information is modulated on each subcarrier, the signal is mapped into complex symbols, the signal is changed into a time domain signal by utilizing Inverse Fast Fourier Transform (IFFT), the pilot frequency and the cyclic prefix are added, and then the signal is transmitted by utilizing a 5G antenna through digital-to-analog conversion and up-conversion. At the receiving end, the received information is converted into frequency domain information by down-conversion and removing pilot frequency and cyclic prefix and Fast Fourier Transform (FFT), and then the original information is demodulated by coherent demodulation and mapping relation. However, in the prior art, there is a problem of communication security.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a 5G network-based asymmetric elliptic curve encryption secure communication system. The invention is innovative in that an elliptic curve algorithm is utilized to generate a public key, a symbol generated by QAM modulation is asymmetrically encrypted, signals are modulated on each subcarrier by utilizing Inverse Fast Fourier Transform (IFFT), superimposed into time domain signals, and the time domain signals are transmitted through a 5G transmitting antenna by leading in prefix, digital-analog conversion, filtering and up-conversion. Thus, an attacker cannot directly recover the information without the private key. At the receiving end, down-converting, filtering, analog-to-digital converting and removing the cyclic prefix, utilizing Fast Fourier Transform (FFT), converting the received information into frequency domain information, utilizing coherent demodulation to recover the encrypted symbol, then utilizing the private key in elliptic curve algorithm to recover the symbol generated by QAM modulation, and then utilizing the mapping relation to demodulate the transmitted information.
In order to achieve the aim of the invention, the invention adopts the following technical scheme:
a 5G network-based asymmetric elliptic curve cryptography secure communication system, comprising:
the transmitting end comprises j paths of structures, and each path of structure is as follows: the signal generator is connected with the first mapper, the first mapper is connected with two elliptic curve encryptors, an elliptic curve public key receiver is connected between the two elliptic curve encryptors, each elliptic curve encryptor is connected with an adder after passing through a first multiplier, the adder is connected with a first serial-parallel converter, the first serial-parallel converter is connected with an IFFT converter through N ports, j multiplied by N output ports of the IFFT converter are connected with the first parallel-serial converter, the first parallel-serial converter is sequentially connected with a 5G transmitting antenna after passing through a cyclic prefix importer, a digital-analog converter, a first filter and an up converter, and the 5G transmitting antenna transmits signals;
a 5G receiving antenna of the receiving end receives signals; the 5G receiving antenna is connected with a second serial-parallel converter through a down converter, a second filter, an analog-to-digital converter and a pilot frequency removing cyclic prefix device in sequence, j multiplied by N output ports of the second serial-parallel converter are connected with an FFT converter, the FFT converter is connected with j paths of structures, and each path of structure is as follows: the N ports of the FFT converter are connected to the second parallel-serial converter, the second parallel-serial converter is connected with two second multipliers, the two multipliers are respectively connected with a second mapper after sequentially passing through an integrator and a decryptor, and an elliptic curve public key and a private key generator are connected between the two decryptors.
As a preferred scheme, the public key and the private key generated by the public key secret key generator are generated by corresponding elliptic curves in a finite field through corresponding algorithms, the public key is sent to the sending end by the receiving end, the sending end encrypts the information by using the public key, and the receiving end decrypts by using the private key.
Preferably, at the transmitting end, the j-path signal generator generates an information sequence mj and transmits the information sequence mj to a corresponding mapper, and various bit combinations are mapped into x according to the mapping rule of Gray codes j ,y j Two symbol data.
Preferably, at the transmitting end, the public key received by the j Lu Gongyao receiver is used for respectively encrypting the symbol x by two elliptic curve encryptors j ,y j Encryption to obtain new encrypted symbol x' j ,y′ j Thus, encryption of information is achieved.
Preferably, at the transmitting end, the output symbol x' j ,y′ j The edges are multiplied by cos ωt and-sin ωt and then added by an adder to produce the complex symbol x' j +iy′ j An encrypted Quadrature Amplitude Modulation (QAM) is completed, plus a pilot training sequence.The transmitting end thus converts the transmitted digital signal into a mapping of subcarrier amplitudes.
Preferably, at the transmitting end, the formed complex symbol sequence is converted into a parallel symbol stream through a first serial-parallel converter; the IFFT transformer performs inverse fast fourier transform to change the frequency domain symbols to the time domain. Every N serial-to-parallel converted symbols are modulated by different subcarriers.
Preferably, at the transmitting end, the time domain symbol output by the IFFT converter is converted into a serial signal by the first parallel-serial converter, and the serial signal is transmitted by the cyclic prefix introducer, the digital-analog converter, the first filter, the up-converter, and then by the 5G transmitting antenna.
Preferably, at the receiving end, the first 5G receiving antenna receives the signal, and then sequentially passes through the first down-converter, the second filter, the first analog-to-digital converter and the first pilot frequency removal cyclic prefix device, and then the second serial-to-parallel converter is used for converting the serial symbols into parallel symbols.
Preferably, at the receiving end, the frequency domain symbols output by the FFT converter are converted into j-path serial symbols (N symbols in each path) through j second parallel-serial converters. Each path of serial symbols is divided into two paths, multiplied by cos omega t and-sin omega t respectively, and integrated in one period by utilizing a corresponding integrator, and the first path is obtained as x' 1 ,y′ 1 The method comprises the steps of carrying out a first treatment on the surface of the Carrying out the following steps; the jth path obtains x' j ,y′ j The pilot training sequence is subtracted.
Preferably, at the receiving end, the private key generated by the elliptic curve public key private key generator is used for carrying out operation in the decryptor to obtain the symbol x' j ,y′ j Decrypting to obtain x j ,y j
Preferably, at the receiving end, x is calculated by a second mapper j ,y j The corresponding original information mj is restored.
The invention relates to a 5G network-based asymmetric elliptic curve encryption secure communication system principle and a process, wherein the principle and the process are as follows: public key generator using elliptic curve generationA finite field. For example: by means of ellipses Y 2 =X 3 +X 2 +1 (modp) (p is prime number) generates finite field, given a private key d, a point G on the finite field, and generates public key q=dg by the point four rule of operation of elliptic curve finite field, which is easy to obtain, but with public key Q, private key d is obtained in turn, and calculation takes very long time. Thus, such encryption is secure. The receiving end generates a public key through a corresponding algorithm in a limited domain and sends the public key to the sending end, the sending end encrypts information by using the public key, and the receiving end decrypts the information by using a private key. At the transmitting end, the 1 st signal generator generates an information sequence m1 and transmits the information sequence m1 to the 1 st mapper, and various bit combinations are mapped into x according to the mapping rule of Gray codes 1 ,y 1 Two symbol data, & gtj, a j-th information generator generates an information sequence mj and transmits the information sequence mj to a j-th mapper, and various bit combinations are mapped into x according to the mapping rule of Gray codes j ,y j Two symbol data. The 1 st public key receiver receives the public key and respectively uses the 1 st elliptic curve encryptor and the 2 nd elliptic curve encryptor to sign x 1 ,y 1 Encryption to obtain new encrypted symbol x' 1 ,y′ 1 The j public key received by the j public key receiver is used for respectively encrypting the symbol x through the 2j-1 and 2j elliptic curve encryptors j ,y j Encryption to obtain new encrypted symbol x' j ,y′ j . Thus, encryption of information is realized. Then the 1 st elliptic curve encryptor and the 2 nd elliptic curve encryptor output symbols x' 1 ,y′ 1 The edges are multiplied by cos ωt and-sin ωt and then added by the 1 st adder to produce the complex symbol x' 1 +iy′ 1 Adding pilot training symbols, and outputting symbols x 'by the 2j-1 and 2j elliptic curve encryptors' j ,y′ j The edges are multiplied by cos ωt and-sin ωt and then added by a j-th adder to produce the complex symbol x' j +iy′ j The pilot training symbols are added, thus completing the encryption of Quadrature Amplitude Modulation (QAM) and encryption and pilot addition, so that the transmitting end converts the transmitted digital signal into the mapping of subcarrier amplitude.
Meanwhile, the complex symbol sequence formed by the 1 st adder is converted into a parallel symbol stream by the 1 st serial-to-parallel converter. The symbol sequence formed by the 2 nd adder converts the serial symbol sequence into a parallel symbol stream through the 2 nd serial-to-parallel converter, the symbol sequence formed by the j th adder converts the serial symbol sequence into the parallel symbol stream through the j th serial-to-parallel converter. An IFFT transformer is used to perform an inverse fast fourier transform to change the frequency domain form of the data to the time domain. Every N serial-to-parallel converted symbols are modulated by different subcarriers. The time domain symbol output by the IFFT converter is converted into a serial signal through the 1 st parallel-serial converter, and the information is transmitted through a cyclic prefix importer, a digital-analog converter, a first filter and an up-converter by using a 5G transmitting antenna.
After transmission through a spatial wireless channel, at a receiving end, a wireless signal is received by using a 5G receiving antenna, and serial symbols are converted into parallel symbols by using a second serial-parallel converter after sequentially passing through a down converter, a second filter, an analog-digital converter (converting analog signals into digital symbols) and a cyclic prefix removing device (removing prefix). The serial symbols are converted to parallel symbols using a j+1th serial-to-parallel converter. The frequency domain symbols output by the FFT converter are converted into j paths of serial symbols (N symbols in each path) through j parallel-serial converters. Each path of serial symbols is divided into two paths, multiplied by cos omega t and-sin omega t respectively, and integrated in one period by utilizing a corresponding integrator, and the first path is obtained as x' 1 ,y′ 1 The training pilot is subtracted. And (3) the same. The jth path obtains x' j ,y′ j The training pilot is subtracted. The 1 st public key and private key generator generates a private key which passes through the 1 st decryptor and the 2 nd decryptor and utilizes the algorithm of the elliptic curve finite field to sign the first path of symbol x' 1 ,y′ 1 Decrypting to obtain x 1 ,y 1 The private key generated by the jth public key private key generator passes through the jth-1 and the jth decryptor to utilize the algorithm of elliptic curve finite field to sign the jth path x 'by the jth public key private key generator' j ,y′ j Decrypting to obtain x j ,y j . The first path passes through the j+1-th mapper to x 1 ,y 1 Restoring original information m1, and enabling the jth path to pass through the jth mapper 2Will x j ,y j The corresponding original information mj is restored.
Compared with the prior art, the invention has the beneficial effects that:
the invention realizes the multiple access wireless safety communication of the asymmetric elliptic curve encryption in the 5G network, and the safety is as follows: the public key generator uses elliptic curves to generate finite fields such as: by means of ellipses Y 2 =X 3 +X 2 +1 (mod p) (p is prime number) generates a finite field, a private key d is given, a point G on the finite field, and a public key q=dg is generated by a point four-rule operation rule of an elliptic curve finite field, which is easily obtained, but with the public key Q, in turn, it is difficult to obtain the private key d, and a large amount of time is required for calculation. Thus, this encryption technique is secure.
Drawings
Fig. 1 is a diagram of a secure communication system with asymmetric elliptic curve encryption based on a 5G network according to an embodiment of the present invention.
Fig. 2 (a) is a constellation diagram before encryption in an embodiment of the present invention, and fig. 2 (b) is a constellation diagram after encryption in an embodiment of the present invention. The figure shows that the encrypted constellation does not recover the transmitted information.
Fig. 3 is a constellation diagram of a receiving end recovered after an OFDM encrypted communication system according to an embodiment of the present invention passes through a rayleigh channel.
Fig. 4 (a) shows the original signal transmitted from the first path, and fig. 4 (b) shows the demodulated signal.
Wherein:
1 st signal generator 1-1 signal generator 1-j;
1 st mapper 2-1, & gtj & ltth & gt, j & ltth mapper 2-j;
1 st encryptor 3-1, 2 nd encryptor 3-2 2j-1 rd encryptor 3- (2 j-1), 2 j-th encryptor 3-2j;
1 st public key receiver 4-1, & gtj, j th public key receiver 4-j;
multiplier 5-1, multiplier 5-2, multiplier 2j-1, multiplier 5- (2 j-1), multiplier 2j 5-2j;
adder 1 6-1-a j-th adder 6-j;
the 1 st serial-to-parallel converter 7-1, the 2 nd serial-to-parallel converter 7-2, & gtj, & ltV & gt, and the j th serial-to-parallel converter 7-j;
an IFFT transformer 8;
the 1 st parallel-serial converter 9-1, the 2 nd parallel-serial converter 9-2, & gtand the j+1th parallel-serial converter 9- (j+1);
cyclic prefix importer 10, digital-to-analog converter 11, 1 st filter 12-1;
an up-converter 13;
a 5G transmit antenna 14;
a 5G receiving antenna 15;
a down converter 16, a 2 nd filter 12-2, an analog-to-digital converter 17, a pilot-removal cyclic prefix 18;
a j+1th serial-to-parallel converter 7- (j+1);
an FFT transformer 19;
2j+1-th multiplier 5- (2j+1),. Cndot.cndot. the 4j-1 th multiplier 5- (4 j-1), the 4 j-th multiplier 5-4j;
1 st integrator 20-1, 2 nd integrator 20-2 a 2 j-th integrator 20-2j;
the j+1th mapper 2- (j+1), the j+2th mapper 2- (j+2), -the 2j mapper 2-2j;
1 st decryptor 21-1, 2 nd decryptor 21-2, & gt1 the 2j-1 th decryptor 21- (2 j-1), the 2j decryptor 21-2j; public key private key generator 22-1, public key private key generator 22-2, public key private key generator 22-j, and public key private key generator 22-1.
Detailed Description
In order to more clearly illustrate the embodiments of the present invention, specific embodiments of the present invention will be described below with reference to the accompanying drawings. It is evident that the drawings in the following description are only examples of the invention, from which other drawings and other embodiments can be obtained by a person skilled in the art without inventive effort.
The embodiment of the invention discloses a 5G network-based asymmetric elliptic curve encryption secure communication system, which comprises a transmitting end and a receiving end, wherein the transmitting end and the receiving end communicate through a wireless channel between a transmitting antenna and a receiving antenna.
The transmitting end comprises a 1 st signal generator, a 1 st mapper, a 1 st encryptor, a 2 nd j-1 st encryptor, a 1 st public key receiver, a 1 st multiplier, a 2 nd j-1 multiplier, a 2 nd multiplier, a 1 st adder, a j adder, a 1 st serial-parallel converter, a 2 nd serial-parallel converter, a j th serial-parallel converter, an IFFT converter, a 1 st parallel-serial converter, a 2 nd parallel-serial converter, a j+1 st parallel-serial converter, a cyclic prefix guide, a digital-to-analog converter, a first filter, an up converter and a 5G transmitting antenna.
The receiving end comprises a 5G receiving antenna, a down converter, a second filter, an analog-to-digital converter, a pilot frequency removing cyclic prefix device, a j+1th serial-to-parallel converter, an FFT converter, a 2j+1st multiplier, & gt4 j-1 st multiplier, a 4j-1 st multiplier, a 1 st integrator, a 2 nd integrator, & gt2 nd integrator, a j+1st mapper, a j+2nd mapper, & gt2 nd mapper, a 2j th mapper, a 1 st decryptor, a 2 nd decryptor, a 2j-1 nd decryptor and a 2j decryptor.
The receiving end is connected with the transmitting end through wireless channels of two transmitting and receiving antennas.
The public key secret key generator utilizes elliptic curve to generate finite field, and is concretely as follows: by means of ellipses Y 2 =X 3 +X 2 +1 (mod p) (p is prime number) generates a finite field, a private key d is given, a point G on the finite field, and a public key q=dg is generated by a point four-rule operation rule of an elliptic curve finite field, which is easy to obtain, but with the public key Q, obtaining the private key d is difficult, and an extra long operation time is required. Such encryption is therefore secure. The receiving end generates a public key through a corresponding algorithm in a limited domain and sends the public key to the sending end, the sending end encrypts information by using the public key, and the receiving end decrypts the information by using a private key. At the transmitting end, the 1 st signal generator generates an information sequence m1 and transmits the information sequence m1 to the 1 st mapper, and various bit combinations are mapped into x according to the mapping rule of Gray codes 1 ,y 1 The data of the two symbols is provided with a plurality of symbols,the j information generator generates an information sequence mj to be transmitted to a j mapper, and various bit combinations are mapped into x according to the mapping rule of Gray codes j ,y j Two symbol data. The 1 st public key receiver receives the public key and respectively uses the 1 st elliptic curve encryptor and the 2 nd elliptic curve encryptor to sign x 1 ,y 1 Encryption to obtain new encrypted symbol x' 1 ,y′ 1 The j public key received by the j public key receiver is used for respectively encrypting the symbol x through the 2j-1 and 2j elliptic curve encryptors j ,y j Encryption to obtain new encrypted symbol x' j ,y′ j . Thus, encryption of information is realized. Then the 1 st elliptic curve encryptor and the 2 nd elliptic curve encryptor output symbols x' 1 ,y′ 1 The edges are multiplied by cos ωt and-sin ωt and then added by the 1 st adder to produce the complex symbol x' 1 +iy′ 1 Plus pilot training symbols, & gt2 j-1, 2j elliptic curve encryptor output symbol x' j ,y′ j The edges are multiplied by cos ωt and-sin ωt and then added by a j-th adder to produce the complex symbol x' j +iy′ j And adding pilot training symbols to complete the encryption of Quadrature Amplitude Modulation (QAM), encryption and pilot addition, and converting the transmitted digital signals into the mapping of subcarrier amplitude by a transmitting end.
The complex symbol sequence formed by the 1 st adder is converted into a parallel symbol stream by the 1 st serial-to-parallel converter. The symbol sequence formed by the 2 nd adder converts the serial symbol sequence into a parallel symbol stream through the 2 nd serial-to-parallel converter, the symbol sequence formed by the j th adder converts the serial symbol sequence into the parallel symbol stream through the j th serial-to-parallel converter. An IFFT transformer is used to perform an inverse fast fourier transform to change the frequency domain form of the data to the time domain. Every N serial-to-parallel converted symbols are modulated by different subcarriers. The time domain symbol output by the IFFT converter is converted into a serial signal through the 1 st parallel-serial converter, and the information is transmitted through a cyclic prefix importer, a digital-analog converter, a first filter and an up-converter by using a 5G transmitting antenna.
Transmission over spatial wireless channelsAt the receiving end, the wireless signal is received by using a 5G receiving antenna, and serial symbols are converted into parallel symbols by using a second serial-parallel converter after sequentially passing through a down converter, a second filter, an analog-digital converter (converting analog signals into digital symbols) and a cyclic prefix removing device (removing prefix). The serial symbols are converted to parallel symbols using a j+1th serial-to-parallel converter. The frequency domain symbols output by the FFT converter are converted into j paths of serial symbols (N symbols in each path) through j parallel-serial converters. Each path of serial symbols is divided into two paths, multiplied by cos omega t and-sin omega t respectively, and integrated in one period by utilizing a corresponding integrator, and the first path is obtained as x' 1 ,y′ 1 The training pilot is subtracted. And (3) the same. The jth path obtains x' j ,y′ j The training pilot is subtracted. The 1 st public key and private key generator generates a private key which passes through the 1 st decryptor and the 2 nd decryptor and utilizes the algorithm of the elliptic curve finite field to sign the first path of symbol x' 1 ,y′ 1 Decrypting to obtain x 1 ,y 1 The private key generated by the jth public key private key generator passes through the jth-1 and the jth decryptor to utilize the algorithm of elliptic curve finite field to sign the jth path x 'by the jth public key private key generator' j ,y′ j Decrypting to obtain x j ,y j . The first path passes through the j+1-th mapper to x 1 ,y 1 Restoring original information m1, and enabling the jth path to pass x through a jth mapper j ,y j The corresponding original information mj is restored.
The above completes the secure communication of 5G-based elliptic curve asymmetric key encryption and decryption.
As shown in fig. 1, the specific connection relationship of the security communication system based on the asymmetric elliptic curve encryption of the 5G network in this embodiment is as follows:
the transmitting end comprises a 1 st signal generator 1-1 signal generator 1-j; 1 st mapper 2-1, & gtj & ltth & gt, j & ltth mapper 2-j; 1 st encryptor 3-1, 2 nd encryptor 3-2 2j-1 rd encryptor 3- (2 j-1), 2 j-th encryptor 3-2j; 1 st public key receiver 4-1, & gtj, j th public key receiver 4-j; multiplier 5-1, multiplier 5-2, multiplier 2j-1, multiplier 5- (2 j-1), multiplier 2j 5-2j; 1 st adder 6-1, j th adder 6-j; the 1 st serial-to-parallel converter 7-1, the 2 nd serial-to-parallel converter 7-2, & gtj, & ltV & gt, and the j th serial-to-parallel converter 7-j; an IFFT transformer 8; a 1 st parallel-to-serial converter 9-1; a cyclic prefix importer 10, a digital-to-analog converter 11, a 1 st filter 12-1, an up-converter 13; a 5G transmit antenna 14.
The right port of the 1 st signal transmitter 1-1 is connected with the left port of the 1 st mapper 2-1, and the first and second ports on the right side of the 1 st mapper 2-1 are respectively connected to the two ports on the left sides of the 1 st encryptor 3-1 and the 2 nd encryptor 3-2. The lower port of the 1 st encryptor 3-1 is connected with the upper port of the 1 st public key receiver 4-1, and the upper port of the 2 nd encryptor 3-2 is connected with the lower port of the 1 st public key receiver 4-1. The right port of the 1 st encryptor 3-1 is connected with the left port of the 1 st multiplier 5-1, the right port of the 2 nd encryptor 3-2 is connected with the left port of the 2 nd multiplier 5-2, the right port of the 1 st multiplier 5-1 is connected with the upper port of the 1 st adder 6-1, and the right port of the 2 nd multiplier 5-2 is connected with the lower port of the 1 st adder 6-1. The right port of the 1 st adder 6-1 is connected with the left port of the 1 st serial-to-parallel converter 7-1, & gtthe right port of the j-th signal transmitter 1-j is connected with the left port of the j-th mapper 2-j, and the first port and the second port on the right side of the j-th mapper 2-j are respectively connected to the two ports on the left sides of the 2j-1 st encryptor 3- (2 j-1) and the 2j encryptor 3-2 j. The lower port of the 2j-1 encryptor 3- (2 j-1) is connected with the upper port of the j-th public key receiver 4-j, the upper port of the 2 j-th encryptor 3-2j is connected with the lower port of the j-th public key receiver 4-j, the right port of the 2j-1 encryptor 3- (2 j-1) is connected with the left port of the 2j-1 multiplier 5- (2 j-1), the right port of the 2 j-th encryptor 3-2j is connected with the left port of the 2j multiplier 5-2j, the right port of the 2j-1 multiplier 5- (2 j-1) is connected with the upper port of the j-th adder 6-j, and the right port of the 2j multiplier 5-2j is connected with the lower port of the j-th adder 6-j. The right port of the j-th adder 6-j is connected to the left port of the j-th serial-to-parallel converter 7-j. The 1 st serial-to-parallel converter 7-1 is divided into N parallel symbols, and the N ports on the right side of the 1 st serial-to-parallel converter 7-1 are connected to the N ports on the left side of the IFFT converter 8. And (3) the same. The N parallel symbols are divided by the j-th serial-to-parallel converter 7-j, and the N ports on the right side of the j-th serial-to-parallel converter 7-j are connected to the N ports on the left side of the IFFT converter 8. The number of ports on the left and right sides of the IFFT transformer 8 is j×n.
The right side j×n ports of the IFFT transformer 8 are connected to the left side j×n ports of the 1 st parallel-to-serial transformer 9-1, the 1 st parallel-to-serial transformer 9-1 converts the parallel sequence into a serial sequence, the right side port of the 1 st parallel-to-serial transformer 9-1 is connected to the left side port of the cyclic prefix introducer 10, the right side port of the cyclic prefix introducer 10 is connected to the left side port of the digital-to-analog transformer 11, the left side port of the digital-to-analog transformer 11 is connected to the left side port of the 1 st filter 12-1, the right side port of the 1 st filter 12-1 is connected to the left side port of the down-converter 13, and the right side port of the down-converter 13 is connected to the 5G transmitting antenna 14.
The signal of the 5G transmitting antenna 14 is transmitted to the 5G receiving antenna 15 of the receiving end through a spatial wireless channel. The receiving end comprises a 5G receiving antenna 15; a down converter 16, a 2 nd filter 12-2, an analog-to-digital converter 17, a pilot-removal cyclic prefix 18; a j+1th serial-to-parallel converter 7- (j+1); an FFT transformer 19; the 2 nd parallel-serial converter 9-2, & gtand the j+1 th parallel-serial converter 9- (j+1); 2j+1-th multiplier 5- (2j+1),. Cndot.cndot. the 4j-1 th multiplier 5- (4 j-1), the 4 j-th multiplier 5-4j; 1 st integrator 20-1, 2 nd integrator 20-2 a 2 j-th integrator 20-2j; the j+1th mapper 2- (j+1), the j+2th mapper 2- (j+2), -the 2j mapper 2-2j; 1 st decryptor 21-1, 2 nd decryptor 21-2, & gt1 the 2j-1 th decryptor 21- (2 j-1), the 2j decryptor 21-2j; public key private key generator 22-1, public key private key generator 22-2, public key private key generator 22-j, and public key private key generator 22-1.
The 5G receiving antenna 15 is connected to the right port of the down converter 16, the left port of the down converter 16 is connected to the right port of the 2 nd filter 12-2, the left port of the 2 nd filter 12-2 is connected to the right port of the analog-to-digital converter 17, the left port of the analog-to-digital converter 17 is connected to the right port of the pilot-removing cyclic prefix 18, the left port of the pilot-removing cyclic prefix 18 is connected to the right port of the j+1th serial-to-parallel converter 7- (j+1), the j+1th serial-to-parallel converter 7- (j+1) converts the serial signal into a parallel signal, and the j+1th serial-to-parallel converter 7- (j+1) left j×N port is connected to the right port of the FFT converter 19.
FFT transformer 19 left 1: the N port is connected with the right N port of the 2 nd parallel-serial converter 9-2, the output signal of the left port of the 2 nd parallel-serial converter 9-2 is divided into two paths, the two paths are respectively connected to the two ports on the right sides of the 2j+1 th multiplier 5- (2j+1) and the 2j+2 th multiplier 5- (2j+2), the two ports on the left sides of the 2j+1 th multiplier 5- (2j+1) and the 2j+2 th multiplier 2- (2j+2) are respectively connected to the two ports on the right sides of the 1 st integrator 20-1 and the 2 nd integrator 20-2, and the two ports on the left sides of the 1 st integrator 20-1 and the 2 nd integrator 20-2 are respectively connected to the two ports on the right sides of the 1 st decryptor 21-1 and the 2 nd decryptor 21-2. The lower port of the 1 st decryptor 21-1 is connected with the upper port of the 1 st public key private key generator 22-1. The upper port of the 2 nd decryptor 21-2 is connected with the lower port of the 1 st public key private key generator 22-1. The two ports on the left of the 1 st decryptor 21-1 and the 2 nd decryptor 21-2 are respectively connected to the two ports on the right of the j+1 th mapper 2- (j+1), and the mapper 2- (j+1) restores the first path information m1.
FFT transformer 19 left side (j-1) N: the jN port is connected with the right N port of the j+1 parallel-serial converter 9- (j+1), the output signal of the left port of the j+1 parallel-serial converter 9- (j+1) is divided into two paths, the two paths are respectively connected to the two ports on the right of the 4j-1 multiplier 5- (4 j-1) and the 4j multiplier 5-4j, the two ports on the left of the 4j-1 multiplier 5- (4 j-1) and the 4j multiplier 5-4j are respectively connected to the two ports on the right of the 2j-1 integrator 20- (2 j-1) and the 2j integrator 20-2j, and the two ports on the left of the 2j-1 integrator 20- (2 j-1) and the 2j integrator 20-2j are respectively connected to the two ports on the right of the 2j-1 decryptor 21- (2 j-1) and the 2j decryptor 21-2 j. The lower port of the 2j-1 decryptor 21- (2 j-1) is connected to the upper port of the j-th public-private key generator 22-j. The upper port of the jth decryptor 21-2j is connected to the lower port of the jth public-private key generator 22-j. The two ports on the left of the 2j-1 st decryptor 21- (2 j-1) and the 2j nd decryptor 22-2j are respectively connected to the two ports on the right of the 2 j-th mapper 2-2j, and the mapper 2-2j restores the first path information mj.
The principle of the secure communication system of the present embodiment will be described below in conjunction with the above-described system configuration.
In the invention, the receiving end and the transmitting end communicate through wireless channels of two 5G transmitting and receiving antennas. Firstly, a public key secret key generator generates a finite field by using an elliptic curve, and then generates a public key and a private keySpecifically: by means of ellipses Y 2 =X 3 +X 2 +1 (modp) (p is prime number) generates finite field, and given a private key, public key is generated by the operation of adding, subtracting, multiplying and dividing the points of elliptic curve finite field, which is easy to obtain, but with public key, private key is obtained in turn, and calculation requires several tens of thousands of years. Thus, such encryption is very secure. The receiving end generates a public key through a corresponding algorithm in a limited domain and sends the public key to the sending end, the sending end encrypts information by using the public key, and the receiving end decrypts the information by using a private key. At the transmitting end, the 1 st signal generator generates an information sequence m1 and transmits the information sequence m1 to the 1 st mapper, and various bit combinations are mapped into x according to the mapping rule of Gray codes 1 ,y 1 Two symbol data, & gtj, a j-th information generator generates an information sequence mj and transmits the information sequence mj to a j-th mapper, and various bit combinations are mapped into x according to the mapping rule of Gray codes j ,y j Two symbol data. The 1 st public key receiver receives the public key and respectively uses the first elliptic curve encryptor and the second elliptic curve encryptor to sign x 1 ,y 1 Encryption to obtain new encrypted symbol x' 1 ,y′ 1 The j public key received by the j public key receiver is used for respectively encrypting the symbol x through the 2j-1 and 2j elliptic curve encryptors j ,y j Encryption to obtain new encrypted symbol x' j ,y′ j . Thus, encryption of information is realized. Then the 1 st elliptic curve encryptor and the 2 nd elliptic curve encryptor output symbols x' 1 ,y′ 1 The edges are multiplied by cos ωt and-sin ωt and then added by the 1 st adder to produce the complex symbol x' 1 +iy′ 1 Adding pilot training symbols, and outputting symbols x 'by the 2j-1 and 2j elliptic curve encryptors' j ,y′ j The edges are multiplied by cos ωt and-sin ωt and then added by a j-th adder to produce the complex symbol x' j +iy′ j The pilot training symbols are added, thus completing the encryption of Quadrature Amplitude Modulation (QAM) and encryption and pilot addition, so that the transmitting end converts the transmitted digital signal into the mapping of subcarrier amplitude.
The complex symbol sequence formed by the 1 st adder is converted into a parallel symbol stream by the 1 st serial-to-parallel converter. The symbol sequence formed by the 2 nd adder converts the serial symbol sequence into a parallel symbol stream through the 2 nd serial-to-parallel converter, the symbol sequence formed by the j th adder converts the serial symbol sequence into the parallel symbol stream through the j th serial-to-parallel converter. An IFFT transformer is used to perform an inverse fast fourier transform to change the frequency domain form of the data to the time domain. Every N serial-to-parallel converted symbols are modulated by different subcarriers. The time domain symbol output by the IFFT converter is converted into a serial signal through a 1 st parallel-serial converter, and the information is transmitted through a cyclic prefix importer, a digital-analog converter, a 1 st filter and an up-converter by using a 5G transmitting antenna.
After transmission through a spatial wireless channel, at a receiving end, a wireless signal is received by a 5G receiving antenna, and serial symbols are converted into parallel symbols by a 2 nd serial-parallel converter after sequentially passing through a down converter, a 2 nd filter, an analog-digital converter (converting analog signals into digital symbols) and a cyclic prefix removing device (removing prefix). The serial symbols are converted to parallel symbols using a j+1th serial-to-parallel converter. The frequency domain symbols output by the FFT converter are converted into j paths of serial symbols (N symbols in each path) through j parallel-serial converters. Each path of serial symbols is divided into two paths, multiplied by cos omega t and-sin omega t respectively, and integrated in one period by utilizing a corresponding integrator, and the first path is obtained as x' 1 ,y′ 1 The training pilot is subtracted. And (3) the same. The jth path obtains x' j ,y′ j The training pilot is subtracted. The 1 st public key and private key generator generates a private key which passes through the 1 st decryptor and the 2 nd decryptor and utilizes the algorithm of the elliptic curve finite field to sign the first path of symbol x' 1 ,y′ 1 Decrypting to obtain x 1 ,y 1 The private key generated by the jth public key private key generator passes through the jth-1 and the jth decryptor to utilize the algorithm of elliptic curve finite field to sign the jth path x 'by the jth public key private key generator' j ,y′ j Decrypting to obtain x j ,y j . The first path passes through the j+1-th mapper to x 1 ,y 1 Restoring original information m1, and enabling the jth path to pass x through a jth mapper j ,y j The corresponding original information mj is restored.
Here, mainly using ellipses Y 2 =X 3 +X 2 +1 (mod p) (p is prime number) generates a finite field, given a private key d, a point G on the finite field, and by a point four-rule operation rule of elliptic curve finite field, a public key q=dg is generated, which is easily obtained, but with the public key Q, the private key d is obtained in turn, even several tens of thousands of years are required for calculation. Thus, the encryption has good security. The receiving end generates a public key through a corresponding algorithm in a limited domain and sends the public key to the sending end, the sending end encrypts information by using the public key, and the receiving end decrypts the information by using a private key.
The symbol sequence is confidential through the correlation algorithm of the elliptic curve. The sending end encrypts by the public key, and the receiving end decrypts by the different private key.
The process of implementing communication is briefly summarized as follows:
1. the sending end generates a public key and a private key, the public key is disclosed to the outside, and the private key is used for decryption.
2. And carrying out QAM modulation on the information.
3. The symbols generated by the QAM modulation are encrypted with a public key.
4. Pilot training symbols are added, IFFT is utilized to carry out Fourier transform, parallel-serial transform is carried out, and cyclic prefix is added.
5. The digital-to-analog conversion converts the digital symbols into analog signals.
6. Up-conversion is performed.
7. The signal is transmitted using a transmit antenna.
8. After receiving the signal, down-conversion is carried out, then analog-to-digital conversion is carried out, cyclic prefix is removed, and FFT is utilized to carry out Fourier transform after serial-to-parallel conversion.
9. The FFT data is decrypted using the private key.
10. And (5) QAM demodulation to obtain a transmission signal.
While the foregoing has been with reference to the preferred embodiments and principles of the present invention, it will be apparent to those skilled in the art that changes in this embodiment may be made without departing from the principles of the invention.

Claims (9)

1. A secure communication system based on asymmetric elliptic curve encryption of a 5G network is characterized in that,
comprising the following steps:
the transmitting end comprises j paths of structures, and each path of structure is as follows: the signal generator is connected with the first mapper, the first mapper is connected with two elliptic curve encryptors, an elliptic curve public key receiver is connected between the two elliptic curve encryptors, each elliptic curve encryptor is connected with an adder after passing through a first multiplier, the adder is connected with a first serial-parallel converter, the first serial-parallel converter is connected with an IFFT converter through N ports, j multiplied by N output ports of the IFFT converter are connected with the first parallel-serial converter, the first parallel-serial converter is sequentially connected with a 5G transmitting antenna after passing through a cyclic prefix importer, a digital-analog converter, a first filter and an up converter, and the 5G transmitting antenna transmits signals;
a 5G receiving antenna of the receiving end receives signals; the 5G receiving antenna is connected with a second serial-parallel converter through a down converter, a second filter, an analog-to-digital converter and a pilot frequency removing cyclic prefix device in sequence, j multiplied by N output ports of the second serial-parallel converter are connected with an FFT converter, the FFT converter is connected with j paths of structures, and each path of structure is as follows: the N ports of the FFT converter are connected to the second parallel-serial converter, the second parallel-serial converter is connected with two second multipliers, the two multipliers are respectively connected with a second mapper after sequentially passing through an integrator and a decryptor, and an elliptic curve public key and private key generator is connected between the two decryptors;
public key and private key generator utilizing elliptic curve Y 2 =X 3 +X 2 +1 (modp) generates a finite field, and a private key is given, and a public key is generated through point addition, subtraction, multiplication and division operation of the elliptic curve finite field; the receiving end generates a public key in a limited domain through a corresponding algorithm and sends the public key to the sending end, the sending end encrypts information by using the public key, the receiving end decrypts by using a private key, and p is a prime number.
2. According toThe security communication system based on asymmetric elliptic curve encryption of 5G network as set forth in claim 1, wherein at the transmitting end, the j-channel signal generator generates an information sequence mj and transmits the information sequence mj to the corresponding mapper to map various bit combinations into x according to the mapping rule of Gray code j ,y j Two symbol data.
3. The secure communication system of claim 2, wherein at the transmitting end, the public key received by the j Lu Gongyao receiver is used to encrypt the symbol x by two elliptic curve encryptors respectively j ,y j Encryption to obtain new encrypted symbol x' j ,y′ j To achieve encryption of the information.
4. A secure communication system based on asymmetric elliptic curve encryption of a 5G network according to claim 3, wherein at the transmitting end, the symbol x 'is output' j ,y′ j The edges are multiplied by cos ωt and-sin ωt and then added by an adder to produce the complex symbol x' j +iy′ j The encrypted quadrature amplitude modulation is completed, and the pilot training sequence is added, so that the transmitting end converts the transmitted digital signal into the mapping of the subcarrier amplitude.
5. The system of claim 4, wherein at the transmitting end, the formed complex symbol sequence is converted into a parallel symbol stream by a first serial-to-parallel converter; performing inverse fast fourier transform (fft) by using an IFFT transformer, and transforming the symbols of the frequency domain to the time domain; every N serial-to-parallel converted symbols are modulated by different subcarriers.
6. The system of claim 5, wherein at the transmitting end, the time domain symbols output by the IFFT transformer are converted into serial signals by the first parallel-to-serial converter, and the signals are transmitted by the cyclic prefix importer, the digital-to-analog converter, the first filter, the up-converter, and then by the 5G transmitting antenna.
7. The system of any one of claims 3-6, wherein at the receiving end, the 5G receiving antenna receives the signal, and then sequentially passes through the down converter, the second filter, the analog-to-digital converter, and the pilot-removed cyclic prefix, and then converts the serial symbols to parallel symbols using the second serial-to-parallel converter.
8. The system of claim 7, wherein at the receiving end, the frequency domain symbols outputted from the FFT converter are converted into j-path serial symbols by j second parallel-serial converters, each path of N symbols, each path of serial symbols is divided into two paths, each path of serial symbols is multiplied by cos ωt and-sin ωt, and integrated in one period by using corresponding integrators, and the j-th path obtains x' j ,y′ j The pilot training sequence is subtracted.
9. The system of claim 8, wherein at the receiving end, the symbol x 'is calculated in the decryptor using the private key generated by the public key and private key generator of the elliptic curve' j ,y′ j Decrypting to obtain x j ,y j X is mapped by a second mapper j ,y j The corresponding information sequence mj is restored.
CN202110716629.6A 2021-06-28 2021-06-28 Asymmetric elliptic curve encryption secure communication system based on 5G network Active CN113541951B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110716629.6A CN113541951B (en) 2021-06-28 2021-06-28 Asymmetric elliptic curve encryption secure communication system based on 5G network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110716629.6A CN113541951B (en) 2021-06-28 2021-06-28 Asymmetric elliptic curve encryption secure communication system based on 5G network

Publications (2)

Publication Number Publication Date
CN113541951A CN113541951A (en) 2021-10-22
CN113541951B true CN113541951B (en) 2024-02-06

Family

ID=78096904

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110716629.6A Active CN113541951B (en) 2021-06-28 2021-06-28 Asymmetric elliptic curve encryption secure communication system based on 5G network

Country Status (1)

Country Link
CN (1) CN113541951B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108768930A (en) * 2018-04-09 2018-11-06 华北水利水电大学 A kind of encrypted transmission method of data
CN109768990A (en) * 2019-03-04 2019-05-17 中国人民解放军国防科技大学 Physical layer secure transmission method based on asymmetric key
CN110505062A (en) * 2019-08-27 2019-11-26 杭州云象网络技术有限公司 A kind of Dynamic Oval curve cryptographic methods applied to alliance's chain

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108768930A (en) * 2018-04-09 2018-11-06 华北水利水电大学 A kind of encrypted transmission method of data
CN109768990A (en) * 2019-03-04 2019-05-17 中国人民解放军国防科技大学 Physical layer secure transmission method based on asymmetric key
CN110505062A (en) * 2019-08-27 2019-11-26 杭州云象网络技术有限公司 A kind of Dynamic Oval curve cryptographic methods applied to alliance's chain

Also Published As

Publication number Publication date
CN113541951A (en) 2021-10-22

Similar Documents

Publication Publication Date Title
Zhang et al. Experimental demonstration of security-enhanced OFDMA-PON using chaotic constellation transformation and pilot-aided secure key agreement
JP2761281B2 (en) Encrypted communication method for multi-carrier communication system
CN111342957B (en) Method and device for distributing CO-OFDM (CO-orthogonal frequency division multiplexing) key based on Y-00 protocol
CN105577359B (en) A kind of OOFDM encryption systems based on the mapping of chaos sequence pilot tone
CA2733205A1 (en) Method and apparatus for encryption of over-the-air communications in a wireless communication system
CN112019321B (en) Five-dimensional optical probability shaping encryption method based on high-dimensional chaotic system
US7752430B2 (en) Data encryption on the physical layer of a data transmission system
CN114208069A (en) System, method and apparatus for modulation independent unitary weave partitioning multiplex signal transformation
CN112165378B (en) Low-PAPR high-safety optical access method with high resource utilization rate
CN105577360B (en) A kind of OOFDM encryption systems based on chaos sequence mapping
KR20220064956A (en) Communication system and method using unitary braid division multiplexing (UBDM) with physical layer security
CN111970693A (en) Low-complexity LoRa Internet of things safety encryption method based on physical layer waveforms
CN111525998A (en) High-reliability optical transmission method based on mode, time slot and frequency composite vector
Sultan et al. Chaotic distribution of QAM symbols for secure OFDM signal transmission
CN113490206B (en) Random number encryption multiple access passive optical network in 5G network
CN101222326B (en) Communications security and decipherment method based on four-weighted score Fourier transform
CN113541951B (en) Asymmetric elliptic curve encryption secure communication system based on 5G network
Sultan et al. Physical-layer data encryption using chaotic constellation rotation in OFDM-PON
CN114024677B (en) Elliptic curve encrypted OFDM communication system with double keys
JP2018137702A (en) Radio transmission method
Ni et al. PHY-aided secure communication via weighted fractional Fourier transform
CN112054902B (en) High-safety asymmetric encryption method based on subcarrier selection masking
CN110430034B (en) Method and device for encrypting data of passive optical network physical layer
CN114024660B (en) Chaotic encryption OFDM system with noise reduction function in 5G network
Jabori et al. Simple 2D chaotic remapping scheme for securing optical communication networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant