CN113949503A - WFRFT (WFRFT) safety communication method based on DNA dynamic coding - Google Patents
WFRFT (WFRFT) safety communication method based on DNA dynamic coding Download PDFInfo
- Publication number
- CN113949503A CN113949503A CN202111197034.0A CN202111197034A CN113949503A CN 113949503 A CN113949503 A CN 113949503A CN 202111197034 A CN202111197034 A CN 202111197034A CN 113949503 A CN113949503 A CN 113949503A
- Authority
- CN
- China
- Prior art keywords
- matrix
- dna
- wfrft
- encryption
- block
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 40
- 238000004891 communication Methods 0.000 title claims abstract description 26
- 230000005540 biological transmission Effects 0.000 claims abstract description 14
- 230000009466 transformation Effects 0.000 claims abstract description 11
- 239000011159 matrix material Substances 0.000 claims description 70
- 230000000739 chaotic effect Effects 0.000 claims description 39
- 230000000903 blocking effect Effects 0.000 claims description 6
- 238000005192 partition Methods 0.000 claims description 6
- 102000053602 DNA Human genes 0.000 description 73
- 108020004414 DNA Proteins 0.000 description 73
- 238000009826 distribution Methods 0.000 description 13
- 238000004458 analytical method Methods 0.000 description 11
- 238000006243 chemical reaction Methods 0.000 description 8
- 230000008569 process Effects 0.000 description 8
- 238000010586 diagram Methods 0.000 description 7
- 238000013507 mapping Methods 0.000 description 6
- 238000004422 calculation algorithm Methods 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 238000012360 testing method Methods 0.000 description 4
- 238000004364 calculation method Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000035945 sensitivity Effects 0.000 description 3
- 238000013459 approach Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 230000000295 complement effect Effects 0.000 description 2
- OPTASPLRGRRNAP-UHFFFAOYSA-N cytosine Chemical compound NC=1C=CNC(=O)N=1 OPTASPLRGRRNAP-UHFFFAOYSA-N 0.000 description 2
- 238000009792 diffusion process Methods 0.000 description 2
- UYTPUPDQBNUYGX-UHFFFAOYSA-N guanine Chemical compound O=C1NC(N)=NC2=C1N=CN2 UYTPUPDQBNUYGX-UHFFFAOYSA-N 0.000 description 2
- 230000001788 irregular Effects 0.000 description 2
- 238000004088 simulation Methods 0.000 description 2
- RWQNBRDOKXIBIV-UHFFFAOYSA-N thymine Chemical compound CC1=CNC(=O)NC1=O RWQNBRDOKXIBIV-UHFFFAOYSA-N 0.000 description 2
- 229930024421 Adenine Natural products 0.000 description 1
- GFFGJBXGBJISGV-UHFFFAOYSA-N Adenine Chemical compound NC1=NC=NC2=C1N=CN2 GFFGJBXGBJISGV-UHFFFAOYSA-N 0.000 description 1
- 102100026758 Serine/threonine-protein kinase 16 Human genes 0.000 description 1
- 101710184778 Serine/threonine-protein kinase 16 Proteins 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 229960000643 adenine Drugs 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 239000013256 coordination polymer Substances 0.000 description 1
- 125000004122 cyclic group Chemical group 0.000 description 1
- 229940104302 cytosine Drugs 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000002474 experimental method Methods 0.000 description 1
- 230000004992 fission Effects 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 238000005312 nonlinear dynamic Methods 0.000 description 1
- 230000003252 repetitive effect Effects 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 230000007480 spreading Effects 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
- 229940113082 thymine Drugs 0.000 description 1
- 238000009827 uniform distribution Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/001—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N7/00—Computing arrangements based on specific mathematical models
- G06N7/08—Computing arrangements based on specific mathematical models using chaos models or non-linear system models
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Abstract
The present disclosure relates to a WFRFT secure communication method based on DNA dynamic coding, which comprises the following steps: encrypting the bit stream information by using a DNA dynamic encryption system to obtain an encrypted signal; carrying out constellation transformation on the modulated encrypted signal by using WFRFT to generate a mixed carrier signal; after the mixed carrier signal is transmitted to a receiving end through a channel, the receiving end carries out WFRFT inverse transformation on the mixed carrier signal and completes symbol demodulation; and performing DNA decryption on the data which completes the symbol demodulation to obtain the bit stream information. The method can effectively improve the safety transmission capability of the WFRFT communication system.
Description
Technical Field
The disclosure relates to the technical field of secure communication, in particular to a WFRFT secure communication method based on DNA dynamic coding.
Background
Information security is an important component of national security, and covers a plurality of aspects such as communication security, system security, network security and the like. The wireless communication physical layer safety communication technology subverts the method of changing the upper layer encryption scheme into the calculation complexity for the safety, can ensure the safety of information in the wireless transmission process through the modes of physical layer encryption, artificial noise, beam forming and the like, and leads an eavesdropper not to effectively steal and decipher legal information, thereby being a hot problem in the current wireless communication field.
Fractional Fourier Transform (FRFT) has been widely used in the fields of radar, communication, and the like since it has been proposed to receive the general attention of researchers. Different from the traditional classical FRFT, the Weighted Fractional Fourier Transform (WFRFT) is a novel time-frequency mathematical tool, has the characteristics of simple engineering realization, low peak-to-average ratio, compatibility with the existing single carrier and multi-carrier systems and the like, and can improve the covert communication capability of a communication system to a certain extent. However, due to the WFRFT system parameters, i.e., the WFRFT transformation order α and the scale vector Vm,VnThe number of the conversion order is limited, so that an unauthorized user can still obtain demodulation parameters such as WFRFT conversion order by means of parameter scanning and the like. Therefore, there is a need to improve one or more problems in the related art solutions to further improve the security transmission capability of the WFRFT communication system.
It is to be noted that the information disclosed in the above background section is only for enhancement of understanding of the background of the present disclosure, and thus may include information that does not constitute prior art known to those of ordinary skill in the art.
Disclosure of Invention
The embodiment of the disclosure aims to provide a WFRFT secure communication method based on DNA dynamic coding to further improve the security transmission capability of a WFRFT communication system.
The embodiment of the disclosure provides a WFRFT (WFRFT secure communication) method based on DNA dynamic coding, which comprises the following steps:
encrypting the bit stream information by using a DNA dynamic encryption system to obtain an encrypted signal;
carrying out constellation transformation on the modulated encrypted signal by using WFRFT to generate a mixed carrier signal;
after the mixed carrier signal is transmitted to a receiving end through a channel, the receiving end carries out WFRFT inverse transformation on the mixed carrier signal and completes symbol demodulation;
and performing DNA decryption on the data which completes the symbol demodulation to obtain the bit stream information.
In an exemplary embodiment of the disclosure, the step of encrypting the bitstream information by using the DNA dynamic encryption system to obtain the encrypted signal includes:
converting the bitstream information into a plurality of matrices of preset sizes;
calculating a ciphertext template matrix of the matrix;
carrying out DNA encoding and DNA operation on the matrix and the ciphertext template matrix to obtain an encryption matrix;
and decoding and converting the encryption matrix to obtain the encrypted signal.
In an exemplary embodiment of the present disclosure, the step of calculating the ciphertext template matrix of the matrix includes:
calculating a ciphertext template key of each matrix;
generating a corresponding encryption sequence according to the ciphertext template key;
and converting the encrypted sequence into a ciphertext template matrix.
In an exemplary embodiment of the disclosure, the step of generating a corresponding encryption sequence according to the ciphertext template key includes:
and generating an encryption sequence of the Logistic chaotic system according to the ciphertext template key.
In an exemplary embodiment of the present disclosure, the step of performing DNA encoding and DNA operation on the matrix and the ciphertext template matrix to obtain an encryption matrix includes:
the matrix is processed in a blocking mode to obtain at least one first block;
the ciphertext template matrix is processed in a blocking mode to obtain at least one second block;
respectively encoding the first block and the second block according to a preset DNA encoding rule;
and carrying out preset DNA operation on the encoded first block and the encoded second block to obtain an encryption matrix.
In an exemplary embodiment of the present disclosure, the step of performing DNA encoding and DNA operation on the matrix and the ciphertext template matrix to obtain an encryption matrix includes:
generating a control sequence according to the LSS, LTS and TSS chaotic systems of the matrix;
selecting corresponding DNA coding rules according to the control sequences to code the first block and the second block respectively;
and selecting a corresponding DNA operation rule according to the control sequence to perform DNA operation on the encoded first partition and the encoded second partition.
In an exemplary embodiment of the present disclosure, the step of generating a control sequence according to the LSS, LTS and TSS chaotic systems of the matrix includes:
respectively calculating initial values of the LSS, the LTS and the TSS chaotic system of the matrix;
and generating a control sequence by using the initial value.
In an exemplary embodiment of the present disclosure, the step of generating a control sequence according to the LSS, LTS and TSS chaotic systems of the matrix includes:
the initial values comprise four, and four control sequences are respectively generated by utilizing the four initial values.
In an exemplary embodiment of the present disclosure, the four control sequences are a first control sequence, a second control sequence, a third control sequence, and a fourth control sequence, wherein,
the first control sequence is used for determining a DNA coding rule of the first block;
the second control sequence is used for determining the DNA coding rule of the second block;
the third control sequence is used for determining a DNA operation rule performed by the first block and the second block;
the fourth control sequence is used to determine a decoding rule of the encryption matrix.
The technical scheme provided by the disclosure can comprise the following beneficial effects:
the chaos, DNA coding and WFRFT technology are combined, the characteristic that a chaotic system is sensitive to an initial value and the advantage of a huge key space are utilized, the outstanding characteristics of large capacity and high storage efficiency of biological DNA coding are combined, and a method for effectively improving the safe transmission performance of the system is provided.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure. It is apparent that the drawings in the following description are only some embodiments of the disclosure, and that other drawings may be derived from those drawings by a person of ordinary skill in the art without inventive effort.
FIG. 1 is a schematic diagram illustrating steps of a WFRFT secure communication method based on DNA dynamic coding in an exemplary embodiment of the present disclosure;
FIG. 2 shows a schematic diagram of a DNA dynamic encryption process in an exemplary embodiment of the present disclosure;
FIG. 3 shows a block diagram of an implementation of a WFRFT in an exemplary embodiment of the present disclosure;
FIG. 4 shows a system block diagram of a WFRFT secure communication method based on DNA dynamic coding in an exemplary embodiment of the present disclosure;
FIG. 5 illustrates a graph of chaotic system performance analysis in an exemplary embodiment of the present disclosure;
FIG. 6 illustrates a WFRFT signal constellation in an exemplary embodiment of the present disclosure;
fig. 7 illustrates an original image lena, a histogram, and an encrypted image and histogram in an exemplary embodiment of the present disclosure;
FIG. 8 illustrates an image decrypted by an illegal user and a decrypted by a legal user in an exemplary embodiment of the disclosure;
FIG. 9 shows the DNA-WFRFT signal statistics in exemplary embodiments of the present disclosure;
fig. 10 shows a system bit error rate curve in an exemplary embodiment of the present disclosure.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus their repetitive description will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
First, the WFRFT secure communication method based on DNA dynamic coding is provided in this example embodiment, and referring to fig. 1, the method may include the following steps:
step S101: encrypting the bit stream information by using a DNA dynamic encryption system to obtain an encrypted signal;
step S102: carrying out constellation transformation on the modulated encrypted signal by using WFRFT to generate a mixed carrier signal;
step S103: after the mixed carrier signal is transmitted to a receiving end through a channel, the receiving end carries out WFRFT inverse transformation on the mixed carrier signal and completes symbol demodulation;
step S104: and performing DNA decryption on the data which completes the symbol demodulation to obtain the bit stream information.
In the embodiment of the disclosure, chaos, DNA coding and WFRFT technologies are combined, the characteristic that a chaotic system is sensitive to an initial value and the advantage of a huge key space are utilized, the outstanding characteristics of large capacity and high storage efficiency of biological DNA coding are combined, and a method for effectively improving the safety transmission performance of the system is provided.
Hereinafter, each step of the above-described method in the present exemplary embodiment will be described in more detail.
The deoxyribonucleic acid (DNA) codes in the step S101 have the characteristics of huge storage space, strong parallel processing capability, ultralow power consumption and the like, show excellent performance in the fields of image encryption and the like, and can remarkably improve the safety of a physical layer from a bit coding level by introducing the DNA codes into signal encryption. The core of the DNA encryption algorithm is DNA coding, decoding and DNA calculation, which consists of some algebraic operations and biological operations, such as the complementary rules of bases, DNA addition operations, DNA subtraction operations and DNA XOR operations; the chaos system can enhance the safety of information science by combining with DNA due to the sensitivity to the initial value and the good pseudo-randomness of the sequence.
In one embodiment, referring to the dynamic encryption process for DNA shown in fig. 2, step S101 may include the following steps S201-S204:
step S201: converting the bitstream information into a plurality of matrices of preset sizes;
step S202: calculating a ciphertext template matrix of the matrix;
step S203: carrying out DNA encoding and DNA operation on the matrix and the ciphertext template matrix to obtain an encryption matrix;
step S204: and decoding and converting the encryption matrix to obtain the encrypted signal.
In step S201, the original bitstream information is converted into a plurality of matrices of the same size in serial-to-parallel manner in units of preset bit values. The specific matrix size is related to the predetermined bit value unit, for example, every 1024 bits, the matrix size is converted into matrix D of 32 × 32i。
In step S202, each matrix D may be calculated by formula (1)iCiphertext template key pki;
pkiTo regenerate DiCorresponding encryption sequence GiSpecifically, pkiGenerating an encryption sequence G of the Logistic chaotic system through a formula (2)i;
Gi=mod(floor(Logistic(pki,r)*104),2) (2)
The Logistic chaotic mapping is a nonlinear dynamics discrete chaotic system widely applied, and has good chaotic characteristics and initial value sensitivity, the LSS, the TSS and the TLS are one-dimensional chaotic mappings evolved from the Logistic mapping, and have the same characteristics and larger chaotic parameter intervals, and equations of the chaotic mappings are defined as follows:
xn+1=Logistic(r,xn)=rxn(1-xn) (3)
wherein x, y, z and q are state variables, r is a bifurcation parameter, the value range is (0, 4), in the Logistic mapping, when r is in [3.6,4], the system enters a chaotic state, and in the LSS, LTS and TSS mapping, the system is always in the chaotic state when r is in the (0,4] interval, the initial values of 4 chaotic systems and the state values of each stage are always in (0, 1).
The resulting encrypted sequence GiIs 1024 bits, takes a value of 0 or 1, and then the encryption sequence G is appliediThe same is carried out to convert the serial-parallel into a ciphertext template matrix T with the size of 32 multiplied by 32i。
In step S203, matrix D is divided intoiPerforming a blocking process to obtain at least one first 4 × 4 block DijThe ciphertext template matrix TiPerforming blocking processing to obtain at least one second block T with 4 × 4 sizeijThen, the D pairs are respectively coded according to the preset DNA coding ruleijAnd TijEncoding is carried out, and the encoded first block D is divided intoijAnd a second partition DijAnd carrying out preset DNA operation to obtain an encryption matrix.
In one embodiment, the predetermined DNA coding rule is determined by:
the DNA molecule consists of 4 kinds of deoxynucleotides, adenine (A), cytosine (C), guanine (G) and thymine (T). Due to the specificity of the DNA coding type and the regularity of information processing, the method is suitable for processing 0 and 1 digital information, and takes 2 numbers such as '00', '01', '10', '11' as a group of data elements for operation. Furthermore, the principle of DNA base complementary pairing can be used to find 8 regular pairing modes, as shown in Table 1.
TABLE 1 DNA encoding and decoding rules
In manipulating the data encoded by the DNA, 3 ways are provided to further enhance the degree of encoding, DNA addition, DNA subtraction, and DNA exclusive-or, respectively, see tables 2,3, and 4. The encryption of the original information stream data is completed by the above DNA coding and DNA operations, wherein the 2 operations of scrambling and obfuscating are often implicit and involved in the above process.
TABLE 2 DNA addition operation
TABLE 3 DNA subtraction operation
TABLE 4 DNA XOR operations
Respectively calculating initial values(s) of the LSS, LTS and TSS chaotic systems of the matrix through a formula (7)1,s2,s3,s4) For generating 64 floating-point numbers c for controlling encoding, operation and decodingi(i ═ 1,2,3, 4). Wherein c is1And c2From s1,s2Respectively generated by an LSS chaotic system, c3From s3Generated by LTS chaotic system, c4From s4Generated by a TSS chaotic system.
According to tables 1 to 4, since there are 8 encoding and decoding methods and 3 operation methods, the chaotic system is generated in c of the interval (0,1) by the formula (8)i(i ═ 1,2,3,4) to the sets {1,2,3,4,5,6,7,8} and {1,2,3}, to give eiAnd (i is 1,2,3,4) is 64 control sequence codes.
Then, e1For a first control sequence, for determining a first partition DijThe DNA coding rule of (a), i.e. according to e1One is identified in the 8 rules of table 1; e.g. of the type2For a second control sequence, for determining a second block TijThe DNA coding rule of (a), i.e. according to e2One is identified in the 8 rules of table 1; e.g. of the type3Is a third control sequence for determining the first block DijAnd a second block TijThe rule of DNA operation carried out, i.e. according to e3Determining which of the calculations in tables 1-3 are used; e.g. of the type4Is a fourth control sequence for determining the decoding rule of the final encryption matrix, also according to e4One is identified in the 8 rules of table 1.
In one embodiment, e3Control DijAnd TijThe operation mode of the two matrixes is operated to obtain an encryption matrix VjIn the operation process, V is used each timejAnd Vj-1And performing secondary operation to implement diffusion effect.
In step S204, the matrix V is encryptedjAccording to e4Obtaining the encrypted information M by the determined decoding modeijFinally, M will beijAnd converted into an encrypted information stream, i.e., an encrypted signal.
In step S102, the encrypted signal obtained by DNA encryption is QPSK modulated, and then the original QPSK constellation is rotated and spread by 4-WFRFT transform. And adding a cyclic prefix CP to the converted signal, then carrying out parallel-to-serial conversion, and transmitting the converted signal to an AWGN channel. Discrete 4-WFRFT is used as a method for signal transformation, any complex sequence of input, such as MPSK and MQAM, can be processed, the input and output signals are guaranteed to have the same power spectrum, and the transformed signal can be modulated and demodulated in a conventional mode.
In one embodiment, assuming that the encrypted signal obtained after DNA encryption is x, the process of generating rotation and diffusion for the original QPSK constellation using 4-WFRFT transform is:
X=Fx (9)
wherein the content of the first and second substances,
called DFT matrix, where WN=e-2πi/N。
The definition of 4-WFRFT is expressed as:
taking the above equation in the form of a matrix can be expressed as:
F4ω(α) is a single parameter weighted fractional fourier transform matrix, wherein the computational expression of the weighting coefficients is:
wherein l is 0,1,2, 3. The period of the parameter alpha is 4, and the value range is usually selected from [ -2,2 [ -2 [ ]]The weighting coefficient is influenced by adjusting the value of the transformation order alpha, so that the signal constellation diagram as a whole is along the angle thetalRotational splitting occurs, the rotational angle of each weighting coefficient being:
because of the theta corresponding to each weighting functionlIn contrast, relative rotation between constellation points is formed, and as the parameter α is further increased, the boundary between constellation points is more blurred, and finally, the constellation points are mixed together and cannot be distinguished, and a gaussian-like distribution condition is shown on a complex plane.
The flow chart of the WFRFT is shown in FIG. 3, and it can be seen from FIG. 3 that: the signal is divided into 4 paths after serial-parallel conversion, wherein 1 and 3 branch signals are subjected to FFT (fast Fourier transform) and then are subjected to inversion and weighting, and belong to frequency domain signals, and 0 and 2 branch signals are directly subjected to inversion and weighting and belong to time domain signals. Therefore, the WFRFT signal belongs to a time-frequency domain signal, the energy distribution is more uniform, and the anti-interference performance is stronger.
In step S103, after the mixed carrier signal is transmitted to the receiving end through the channel, the receiving end performs serial-to-parallel conversion on the received signal, and recovers the QPSK modulation constellation by using the 4-WFRFT inverse conversion module.
In step S104, DNA decryption is performed on the QPSK-demodulated data, and the original information stream is obtained through parallel-to-serial conversion.
The system block diagram of the whole process can refer to fig. 4.
Performing performance analysis on the WFRFT safety communication method based on the DNA dynamic coding:
1. chaotic system performance analysis
To test the performance of chaotic systems, we first simulated the initial sensitivities of Logistic, LSS, LTS and TLS. The value of r is set to 3.9 and the values of x, y, z, q are set to 0.7. In fig. 5, when x, y, z, q4 initial values exist, Δ ═ 1e-15When the difference is large, several tens of timesAfter iteration, every two chaotic sequences are completely different. The detailed performance of Logistic, LSS, LTS and TLS is listed in fig. 5(a), 5(d), 5(g) and 5 (k). In addition, we tested the autocorrelation and cross-correlation performance of the 4 chaotic systems used. We obtain a length 1000 of the chaotic sequence, and from fig. 5(b), fig. 5(e), fig. 5(h) and 5(l), the autocorrelation values are equal to 1 only when the values are equal to 0, and are all close to 0 at other times, which indicates that they have good autocorrelation properties. When we give Δ ═ 1e-15The cross-correlation performance of the chaotic system can be as shown in fig. 5(c), fig. 5(f), fig. 5(i) and fig. 5(m) with a small difference. All the values are changed in [ -0.1, 0.1 [ ]]This indicates that they have good performance in cross-correlation.
To further study the performance of the chaotic system used, some comparisons with other high-dimensional chaotic systems are shown in table 5. The chaotic system used by the user has lower computational complexity, higher safety and larger key space.
TABLE 5 comparison of different chaotic systems
2. Constellation fission characteristic analysis
To test and verify the feasibility of the proposed encryption scheme, the proposed DNA-WFRFT system was simulated using matlab. The length of the simulation signal is 1024 bits, the size of the block matrix is set to be 32 x 32, and QPSK modulation is adopted. The 4-WFRFT parameter α is selected to be 0, 0.05, 0.2, and 0.4, respectively, and the corresponding signal constellation can be obtained as shown in fig. 6.
As can be seen from fig. 6, after the QPSK constellation is subjected to WFRFT transform, phase rotation and aliasing occur, and as the modulation order α increases, the degree of rotation and aliasing of the constellation also increases, and the random distribution becomes more obvious.
DNA Cryptographic Performance analysis
Compared with the traditional 0-1 bit stream, the image is more visual and richer in information, so the image data is used for explaining the superiority of the algorithm disclosed by the invention.
3.1 histogram analysis
First, to qualitatively evaluate our proposed DNA dynamic encryption scheme, a classical image Lena used in an image processing system was tested. As shown in fig. 7, we show histograms of the original image and the encrypted image data, and fig. 7(b) can easily derive the rough histogram distribution characteristic of the original data, and the uneven lines in the graph represent irregular gray value information. Meanwhile, for the encrypted case, we also present the image and histogram, as shown in fig. 7(c), (d). Compared to the original image, no irregular image gray distribution was observed.
Furthermore, we demonstrate that there are different conditions for decrypting image information for illegal and legitimate users, as shown in fig. 8. For an illegal user, the original image data cannot be restored, and only indistinguishable images are displayed, as shown in fig. 8(a) - (d). For a legitimate user, it is easy to find that the original image data can be almost completely restored with almost no distortion, as shown in fig. 8 (d). These features indicate that the proposed scheme of the present disclosure has a high encryption capability.
3.2 entropy analysis of information
In order to test the disturbing effect of the DNA dynamic encryption method on signal distribution, information entropy analysis is carried out in the image, entropy is an important measure for testing the randomness of the image, and the entropy value of a real random image with 256 gray levels is 8. The formula for calculating the entropy is:
table 6 shows the entropy of different general images and the entropy of the corresponding password images respectively encrypted by different schemes. The maximum information entropy at different sizes is shown in bold. As can be seen from the table, most of the entropy of the cryptographic image encrypted by this scheme is closer to 8 than the entropy of the other schemes. Therefore, the scheme provided by the disclosure can perform high-intensity data encryption on the image.
TABLE 6 comparison of information entropy of a generic image and a cryptographic image under different encryption schemes
Analysis of statistical Properties of DNA-WFRFT signals
Fig. 9 shows the complex envelope, the phase statistical property and the in-phase component distribution of the DNA-WFRFT signal when the modulation order α is 1, the histograms in fig. 9(a), (b) and (c) show the statistical results of the complex envelope, the in-phase component and the phase of the signal, and the blue dotted line is the rayleigh distribution, gaussian distribution and uniform distribution probability density curve having the same mean and variance, and the signal statistical property is known as follows: the complex envelope of the DNA-WFRFT signal is fitted to Rayleigh distribution, the phase distribution is uniform, the approach effect of the amplitude of the in-phase component on Gaussian distribution is good, the interception resistance and the interference resistance of a communication signal are very beneficial, and the purposes of low-probability interception and low-probability detection communication can be achieved.
5. Analysis of safe transport performance
TABLE 7 System simulation parameters
FIG. 10 is a graph showing the comparison of the bit error rates of signals subjected to dynamic DNA encoding and 4-WFRFT conversion at the receiving end of an illegal user and the receiving end of a legal user, where the illegal user cannot correctly demodulate the signals due to lack of encryption keys at various stages, and the error of the keys at various stages is 10-15In the case of (1), the bit error rate is always maintained between 0.4 and 0.5, the size of the key space of the algorithm is 6.4 multiplied by 10111.4, and the algorithm is performed at 10 per millisecond6The time required to break the scheme at sub-computational speed is 5.1 × 1095The new approach presented herein was demonstrated over the years to significantly improve the safety of WFRFT systems.
In summary, the present disclosure provides a WFRFT secure communication method based on DNA dynamic coding, which combines a four-dimensional chaotic DNA dynamic coding process to achieve scrambling and spreading of information, expand a key space of a system, avoid key deciphering caused by exhaustive attack, and change distribution of useful signals on a complex plane by 4-WFRFT, so that an eavesdropper cannot demodulate correct signals.
Experiments and performance analysis show that the method greatly reduces the probability of interception by illegal users under the condition of ensuring the quality of signals received by the legal users, and can effectively solve the safety problem in wireless communication.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
Claims (9)
1. A WFRFT secure communication method based on DNA dynamic coding is characterized by comprising the following steps:
encrypting the bit stream information by using a DNA dynamic encryption system to obtain an encrypted signal;
carrying out constellation transformation on the modulated encrypted signal by using WFRFT to generate a mixed carrier signal;
after the mixed carrier signal is transmitted to a receiving end through a channel, the receiving end carries out WFRFT inverse transformation on the mixed carrier signal and completes symbol demodulation;
and performing DNA decryption on the data which completes the symbol demodulation to obtain the bit stream information.
2. The transmission method according to claim 1, wherein the step of encrypting the bitstream information by using the DNA dynamic encryption system to obtain the encrypted signal comprises:
converting the bitstream information into a plurality of matrices of preset sizes;
calculating a ciphertext template matrix of the matrix;
carrying out DNA encoding and DNA operation on the matrix and the ciphertext template matrix to obtain an encryption matrix;
and decoding and converting the encryption matrix to obtain the encrypted signal.
3. The transmission method according to claim 2, wherein the step of calculating the ciphertext template matrix of the matrix comprises:
calculating a ciphertext template key of each matrix;
generating a corresponding encryption sequence according to the ciphertext template key;
and converting the encrypted sequence into a ciphertext template matrix.
4. The transmission method according to claim 3, wherein the step of generating the corresponding encryption sequence according to the ciphertext template key comprises:
and generating an encryption sequence of the Logistic chaotic system according to the ciphertext template key.
5. The transmission method according to claim 2, wherein the step of performing DNA encoding and DNA operation on the matrix and the ciphertext template matrix to obtain an encryption matrix comprises:
the matrix is processed in a blocking mode to obtain at least one first block;
the ciphertext template matrix is processed in a blocking mode to obtain at least one second block;
respectively encoding the first block and the second block according to a preset DNA encoding rule;
and carrying out preset DNA operation on the encoded first block and the encoded second block to obtain an encryption matrix.
6. The transmission method according to claim 5, wherein the step of performing DNA encoding and DNA operation on the matrix and the ciphertext template matrix to obtain an encryption matrix comprises:
generating a control sequence according to the LSS, LTS and TSS chaotic systems of the matrix;
selecting corresponding DNA coding rules according to the control sequences to code the first block and the second block respectively;
and selecting a corresponding DNA operation rule according to the control sequence to perform DNA operation on the encoded first partition and the encoded second partition.
7. The transmission method according to claim 6, wherein the step of generating a control sequence according to the LSS, LTS and TSS chaotic systems of the matrix comprises:
respectively calculating initial values of the LSS, the LTS and the TSS chaotic system of the matrix;
and generating a control sequence by using the initial value.
8. The transmission method according to claim 7, wherein the step of generating a control sequence according to the LSS, LTS and TSS chaotic systems of the matrix comprises:
the initial values comprise four, and four control sequences are respectively generated by utilizing the four initial values.
9. The transmission method according to claim 8, wherein the four control sequences are a first control sequence, a second control sequence, a third control sequence, and a fourth control sequence, wherein,
the first control sequence is used for determining a DNA coding rule of the first block;
the second control sequence is used for determining the DNA coding rule of the second block;
the third control sequence is used for determining a DNA operation rule performed by the first block and the second block;
the fourth control sequence is used to determine a decoding rule of the encryption matrix.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111084885 | 2021-09-16 | ||
CN2021110848854 | 2021-09-16 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113949503A true CN113949503A (en) | 2022-01-18 |
CN113949503B CN113949503B (en) | 2024-01-23 |
Family
ID=79330406
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111197034.0A Active CN113949503B (en) | 2021-09-16 | 2021-10-14 | WFRFT (Wireless Fidelity-rft) secure communication method based on DNA dynamic coding |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113949503B (en) |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140064479A1 (en) * | 2012-09-06 | 2014-03-06 | Samsung Electronics Co., Ltd | Method and systems for multilevel data security |
CN105046634A (en) * | 2015-07-06 | 2015-11-11 | 北京电子科技学院 | Image encryption method based on information entropy and a spatiotemporal chaotic system |
CN107798708A (en) * | 2017-11-16 | 2018-03-13 | 深圳大学 | A kind of out of order codings of DNA and the image encryption and decryption method of chaotic maps |
WO2018153317A1 (en) * | 2017-02-24 | 2018-08-30 | 陈伟 | Chaotic map-based digital chaotic encryption method |
WO2019066007A1 (en) * | 2017-09-29 | 2019-04-04 | 望 谷内江 | Encryption method, decryption method, encryption system and decryption system |
US20200151356A1 (en) * | 2017-08-11 | 2020-05-14 | Duality Technologies, Inc. | System and method for fast and efficient searching of encrypted ciphertexts |
US20200287704A1 (en) * | 2020-05-22 | 2020-09-10 | Qiang Zhang | Color Image Encryption Method Based on DNA Strand Displacement Analog Circuit |
CN112422268A (en) * | 2020-11-10 | 2021-02-26 | 郑州轻工业大学 | Image encryption method based on block scrambling and state conversion |
CN112583574A (en) * | 2020-12-04 | 2021-03-30 | 中国人民解放军空军工程大学 | WFRFT transmission method and system based on two-dimensional chaotic mapping amplitude phase encryption |
CN112600663A (en) * | 2021-01-05 | 2021-04-02 | 电子科技大学 | Multilayer encryption method for reconstructed chaotic sequence |
-
2021
- 2021-10-14 CN CN202111197034.0A patent/CN113949503B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140064479A1 (en) * | 2012-09-06 | 2014-03-06 | Samsung Electronics Co., Ltd | Method and systems for multilevel data security |
CN105046634A (en) * | 2015-07-06 | 2015-11-11 | 北京电子科技学院 | Image encryption method based on information entropy and a spatiotemporal chaotic system |
WO2018153317A1 (en) * | 2017-02-24 | 2018-08-30 | 陈伟 | Chaotic map-based digital chaotic encryption method |
US20200151356A1 (en) * | 2017-08-11 | 2020-05-14 | Duality Technologies, Inc. | System and method for fast and efficient searching of encrypted ciphertexts |
WO2019066007A1 (en) * | 2017-09-29 | 2019-04-04 | 望 谷内江 | Encryption method, decryption method, encryption system and decryption system |
CN107798708A (en) * | 2017-11-16 | 2018-03-13 | 深圳大学 | A kind of out of order codings of DNA and the image encryption and decryption method of chaotic maps |
US20200287704A1 (en) * | 2020-05-22 | 2020-09-10 | Qiang Zhang | Color Image Encryption Method Based on DNA Strand Displacement Analog Circuit |
CN112422268A (en) * | 2020-11-10 | 2021-02-26 | 郑州轻工业大学 | Image encryption method based on block scrambling and state conversion |
CN112583574A (en) * | 2020-12-04 | 2021-03-30 | 中国人民解放军空军工程大学 | WFRFT transmission method and system based on two-dimensional chaotic mapping amplitude phase encryption |
CN112600663A (en) * | 2021-01-05 | 2021-04-02 | 电子科技大学 | Multilayer encryption method for reconstructed chaotic sequence |
Non-Patent Citations (5)
Title |
---|
RONG TANG ET AL.: "FBMC/OQAM Security Strategy Based on Diversity DNA Encryption", 《IEEE PHOTONICS JOURNAL》 * |
TINGWEI WU ET AL.: "Security Improvement for OFDM-PON via DNA Extension Code and Chaotic Systems", 《IEEE ACCESS》 * |
倪磊;达新宇;胡航;梁源;: "基于改进Logistic相位扰码的抗截获通信", 华中科技大学学报(自然科学版), no. 06 * |
孙颖: "基于OFDM 系统的物理层加密方法研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》, pages 3 * |
王宏达;: "一种基于混沌系统的新型图像加密算法", 光学技术, no. 03 * |
Also Published As
Publication number | Publication date |
---|---|
CN113949503B (en) | 2024-01-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Abdelfatah | Audio encryption scheme using self-adaptive bit scrambling and two multi chaotic-based dynamic DNA computations | |
CN110677236B (en) | OFDM encryption method based on composite chaotic system and XOR operation | |
CN112019321B (en) | Five-dimensional optical probability shaping encryption method based on high-dimensional chaotic system | |
CN108183786A (en) | Based on the encrypted N-continuous orthogonal frequency division multiplexing methods of chaotic maps | |
Huo et al. | A new efficient physical layer OFDM encryption scheme | |
CN109768990B (en) | Physical layer secure transmission method based on asymmetric key | |
Zhou et al. | Physical layer dynamic key encryption in OFDM-PON system based on cellular neural network | |
CN112597519A (en) | Non-key decryption method based on convolutional neural network in OFDM (orthogonal frequency division multiplexing) encryption system | |
CN114928435B (en) | Quantum noise stream encryption method and system based on DNA coding and SLM | |
Noura et al. | A physical encryption scheme for low-power wireless M2M devices: a dynamic key approach | |
Ameen et al. | Securing Physical Layer of 5G Wireless Network System over GFDM Using Linear Precoding Algorithm for Massive MIMO and Hyperchaotic QRDecomposition. | |
El Assad | Chaos based information hiding and security | |
CN103427980B (en) | A kind of ofdm system safety of physical layer algorithm based on two-matrix transformation | |
CN112583574B (en) | WFRFT transmission method and system based on two-dimensional chaotic mapping amplitude phase encryption | |
CN113271201A (en) | Dynamic AES physical layer data encryption method | |
CN113949503B (en) | WFRFT (Wireless Fidelity-rft) secure communication method based on DNA dynamic coding | |
CN115225249A (en) | MP-WFRFT communication method and system based on multi-cascade chaotic encryption | |
Dhanya et al. | Speech scrambling based on chaotic mapping and random permutation for modern mobile communication systems | |
Loginov et al. | Information Scrambling by Lorenz System Based Sequences in OFDM | |
Tang et al. | FBMC/OQAM security strategy based on diversity DNA encryption | |
CN114615119B (en) | SCBT transmission method and system based on two-dimensional chaotic mapping constellation encryption | |
Jiang et al. | Security-enhanced CO-OFDM based on dynamic DNA encoding and frequency domain scrambling | |
CN109327478B (en) | Chaotic physical layer secret access method | |
CN113541821A (en) | Physical layer encryption method and system for optical communication of intelligent substation | |
Deng et al. | A novel image encryption algorithm based on hyperchaotic system and shuffling scheme |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |