CN113949503A - WFRFT (WFRFT) safety communication method based on DNA dynamic coding - Google Patents

WFRFT (WFRFT) safety communication method based on DNA dynamic coding Download PDF

Info

Publication number
CN113949503A
CN113949503A CN202111197034.0A CN202111197034A CN113949503A CN 113949503 A CN113949503 A CN 113949503A CN 202111197034 A CN202111197034 A CN 202111197034A CN 113949503 A CN113949503 A CN 113949503A
Authority
CN
China
Prior art keywords
matrix
dna
wfrft
encryption
block
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111197034.0A
Other languages
Chinese (zh)
Other versions
CN113949503B (en
Inventor
孟庆微
王西康
杨建广
张馨予
仇铭阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Air Force Engineering University of PLA
Original Assignee
Air Force Engineering University of PLA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Air Force Engineering University of PLA filed Critical Air Force Engineering University of PLA
Publication of CN113949503A publication Critical patent/CN113949503A/en
Application granted granted Critical
Publication of CN113949503B publication Critical patent/CN113949503B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N7/00Computing arrangements based on specific mathematical models
    • G06N7/08Computing arrangements based on specific mathematical models using chaos models or non-linear system models
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The present disclosure relates to a WFRFT secure communication method based on DNA dynamic coding, which comprises the following steps: encrypting the bit stream information by using a DNA dynamic encryption system to obtain an encrypted signal; carrying out constellation transformation on the modulated encrypted signal by using WFRFT to generate a mixed carrier signal; after the mixed carrier signal is transmitted to a receiving end through a channel, the receiving end carries out WFRFT inverse transformation on the mixed carrier signal and completes symbol demodulation; and performing DNA decryption on the data which completes the symbol demodulation to obtain the bit stream information. The method can effectively improve the safety transmission capability of the WFRFT communication system.

Description

WFRFT (WFRFT) safety communication method based on DNA dynamic coding
Technical Field
The disclosure relates to the technical field of secure communication, in particular to a WFRFT secure communication method based on DNA dynamic coding.
Background
Information security is an important component of national security, and covers a plurality of aspects such as communication security, system security, network security and the like. The wireless communication physical layer safety communication technology subverts the method of changing the upper layer encryption scheme into the calculation complexity for the safety, can ensure the safety of information in the wireless transmission process through the modes of physical layer encryption, artificial noise, beam forming and the like, and leads an eavesdropper not to effectively steal and decipher legal information, thereby being a hot problem in the current wireless communication field.
Fractional Fourier Transform (FRFT) has been widely used in the fields of radar, communication, and the like since it has been proposed to receive the general attention of researchers. Different from the traditional classical FRFT, the Weighted Fractional Fourier Transform (WFRFT) is a novel time-frequency mathematical tool, has the characteristics of simple engineering realization, low peak-to-average ratio, compatibility with the existing single carrier and multi-carrier systems and the like, and can improve the covert communication capability of a communication system to a certain extent. However, due to the WFRFT system parameters, i.e., the WFRFT transformation order α and the scale vector Vm,VnThe number of the conversion order is limited, so that an unauthorized user can still obtain demodulation parameters such as WFRFT conversion order by means of parameter scanning and the like. Therefore, there is a need to improve one or more problems in the related art solutions to further improve the security transmission capability of the WFRFT communication system.
It is to be noted that the information disclosed in the above background section is only for enhancement of understanding of the background of the present disclosure, and thus may include information that does not constitute prior art known to those of ordinary skill in the art.
Disclosure of Invention
The embodiment of the disclosure aims to provide a WFRFT secure communication method based on DNA dynamic coding to further improve the security transmission capability of a WFRFT communication system.
The embodiment of the disclosure provides a WFRFT (WFRFT secure communication) method based on DNA dynamic coding, which comprises the following steps:
encrypting the bit stream information by using a DNA dynamic encryption system to obtain an encrypted signal;
carrying out constellation transformation on the modulated encrypted signal by using WFRFT to generate a mixed carrier signal;
after the mixed carrier signal is transmitted to a receiving end through a channel, the receiving end carries out WFRFT inverse transformation on the mixed carrier signal and completes symbol demodulation;
and performing DNA decryption on the data which completes the symbol demodulation to obtain the bit stream information.
In an exemplary embodiment of the disclosure, the step of encrypting the bitstream information by using the DNA dynamic encryption system to obtain the encrypted signal includes:
converting the bitstream information into a plurality of matrices of preset sizes;
calculating a ciphertext template matrix of the matrix;
carrying out DNA encoding and DNA operation on the matrix and the ciphertext template matrix to obtain an encryption matrix;
and decoding and converting the encryption matrix to obtain the encrypted signal.
In an exemplary embodiment of the present disclosure, the step of calculating the ciphertext template matrix of the matrix includes:
calculating a ciphertext template key of each matrix;
generating a corresponding encryption sequence according to the ciphertext template key;
and converting the encrypted sequence into a ciphertext template matrix.
In an exemplary embodiment of the disclosure, the step of generating a corresponding encryption sequence according to the ciphertext template key includes:
and generating an encryption sequence of the Logistic chaotic system according to the ciphertext template key.
In an exemplary embodiment of the present disclosure, the step of performing DNA encoding and DNA operation on the matrix and the ciphertext template matrix to obtain an encryption matrix includes:
the matrix is processed in a blocking mode to obtain at least one first block;
the ciphertext template matrix is processed in a blocking mode to obtain at least one second block;
respectively encoding the first block and the second block according to a preset DNA encoding rule;
and carrying out preset DNA operation on the encoded first block and the encoded second block to obtain an encryption matrix.
In an exemplary embodiment of the present disclosure, the step of performing DNA encoding and DNA operation on the matrix and the ciphertext template matrix to obtain an encryption matrix includes:
generating a control sequence according to the LSS, LTS and TSS chaotic systems of the matrix;
selecting corresponding DNA coding rules according to the control sequences to code the first block and the second block respectively;
and selecting a corresponding DNA operation rule according to the control sequence to perform DNA operation on the encoded first partition and the encoded second partition.
In an exemplary embodiment of the present disclosure, the step of generating a control sequence according to the LSS, LTS and TSS chaotic systems of the matrix includes:
respectively calculating initial values of the LSS, the LTS and the TSS chaotic system of the matrix;
and generating a control sequence by using the initial value.
In an exemplary embodiment of the present disclosure, the step of generating a control sequence according to the LSS, LTS and TSS chaotic systems of the matrix includes:
the initial values comprise four, and four control sequences are respectively generated by utilizing the four initial values.
In an exemplary embodiment of the present disclosure, the four control sequences are a first control sequence, a second control sequence, a third control sequence, and a fourth control sequence, wherein,
the first control sequence is used for determining a DNA coding rule of the first block;
the second control sequence is used for determining the DNA coding rule of the second block;
the third control sequence is used for determining a DNA operation rule performed by the first block and the second block;
the fourth control sequence is used to determine a decoding rule of the encryption matrix.
The technical scheme provided by the disclosure can comprise the following beneficial effects:
the chaos, DNA coding and WFRFT technology are combined, the characteristic that a chaotic system is sensitive to an initial value and the advantage of a huge key space are utilized, the outstanding characteristics of large capacity and high storage efficiency of biological DNA coding are combined, and a method for effectively improving the safe transmission performance of the system is provided.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure. It is apparent that the drawings in the following description are only some embodiments of the disclosure, and that other drawings may be derived from those drawings by a person of ordinary skill in the art without inventive effort.
FIG. 1 is a schematic diagram illustrating steps of a WFRFT secure communication method based on DNA dynamic coding in an exemplary embodiment of the present disclosure;
FIG. 2 shows a schematic diagram of a DNA dynamic encryption process in an exemplary embodiment of the present disclosure;
FIG. 3 shows a block diagram of an implementation of a WFRFT in an exemplary embodiment of the present disclosure;
FIG. 4 shows a system block diagram of a WFRFT secure communication method based on DNA dynamic coding in an exemplary embodiment of the present disclosure;
FIG. 5 illustrates a graph of chaotic system performance analysis in an exemplary embodiment of the present disclosure;
FIG. 6 illustrates a WFRFT signal constellation in an exemplary embodiment of the present disclosure;
fig. 7 illustrates an original image lena, a histogram, and an encrypted image and histogram in an exemplary embodiment of the present disclosure;
FIG. 8 illustrates an image decrypted by an illegal user and a decrypted by a legal user in an exemplary embodiment of the disclosure;
FIG. 9 shows the DNA-WFRFT signal statistics in exemplary embodiments of the present disclosure;
fig. 10 shows a system bit error rate curve in an exemplary embodiment of the present disclosure.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus their repetitive description will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
First, the WFRFT secure communication method based on DNA dynamic coding is provided in this example embodiment, and referring to fig. 1, the method may include the following steps:
step S101: encrypting the bit stream information by using a DNA dynamic encryption system to obtain an encrypted signal;
step S102: carrying out constellation transformation on the modulated encrypted signal by using WFRFT to generate a mixed carrier signal;
step S103: after the mixed carrier signal is transmitted to a receiving end through a channel, the receiving end carries out WFRFT inverse transformation on the mixed carrier signal and completes symbol demodulation;
step S104: and performing DNA decryption on the data which completes the symbol demodulation to obtain the bit stream information.
In the embodiment of the disclosure, chaos, DNA coding and WFRFT technologies are combined, the characteristic that a chaotic system is sensitive to an initial value and the advantage of a huge key space are utilized, the outstanding characteristics of large capacity and high storage efficiency of biological DNA coding are combined, and a method for effectively improving the safety transmission performance of the system is provided.
Hereinafter, each step of the above-described method in the present exemplary embodiment will be described in more detail.
The deoxyribonucleic acid (DNA) codes in the step S101 have the characteristics of huge storage space, strong parallel processing capability, ultralow power consumption and the like, show excellent performance in the fields of image encryption and the like, and can remarkably improve the safety of a physical layer from a bit coding level by introducing the DNA codes into signal encryption. The core of the DNA encryption algorithm is DNA coding, decoding and DNA calculation, which consists of some algebraic operations and biological operations, such as the complementary rules of bases, DNA addition operations, DNA subtraction operations and DNA XOR operations; the chaos system can enhance the safety of information science by combining with DNA due to the sensitivity to the initial value and the good pseudo-randomness of the sequence.
In one embodiment, referring to the dynamic encryption process for DNA shown in fig. 2, step S101 may include the following steps S201-S204:
step S201: converting the bitstream information into a plurality of matrices of preset sizes;
step S202: calculating a ciphertext template matrix of the matrix;
step S203: carrying out DNA encoding and DNA operation on the matrix and the ciphertext template matrix to obtain an encryption matrix;
step S204: and decoding and converting the encryption matrix to obtain the encrypted signal.
In step S201, the original bitstream information is converted into a plurality of matrices of the same size in serial-to-parallel manner in units of preset bit values. The specific matrix size is related to the predetermined bit value unit, for example, every 1024 bits, the matrix size is converted into matrix D of 32 × 32i
In step S202, each matrix D may be calculated by formula (1)iCiphertext template key pki
Figure BDA0003303549960000061
pkiTo regenerate DiCorresponding encryption sequence GiSpecifically, pkiGenerating an encryption sequence G of the Logistic chaotic system through a formula (2)i
Gi=mod(floor(Logistic(pki,r)*104),2) (2)
The Logistic chaotic mapping is a nonlinear dynamics discrete chaotic system widely applied, and has good chaotic characteristics and initial value sensitivity, the LSS, the TSS and the TLS are one-dimensional chaotic mappings evolved from the Logistic mapping, and have the same characteristics and larger chaotic parameter intervals, and equations of the chaotic mappings are defined as follows:
xn+1=Logistic(r,xn)=rxn(1-xn) (3)
Figure BDA0003303549960000062
Figure BDA0003303549960000063
Figure BDA0003303549960000071
wherein x, y, z and q are state variables, r is a bifurcation parameter, the value range is (0, 4), in the Logistic mapping, when r is in [3.6,4], the system enters a chaotic state, and in the LSS, LTS and TSS mapping, the system is always in the chaotic state when r is in the (0,4] interval, the initial values of 4 chaotic systems and the state values of each stage are always in (0, 1).
The resulting encrypted sequence GiIs 1024 bits, takes a value of 0 or 1, and then the encryption sequence G is appliediThe same is carried out to convert the serial-parallel into a ciphertext template matrix T with the size of 32 multiplied by 32i
In step S203, matrix D is divided intoiPerforming a blocking process to obtain at least one first 4 × 4 block DijThe ciphertext template matrix TiPerforming blocking processing to obtain at least one second block T with 4 × 4 sizeijThen, the D pairs are respectively coded according to the preset DNA coding ruleijAnd TijEncoding is carried out, and the encoded first block D is divided intoijAnd a second partition DijAnd carrying out preset DNA operation to obtain an encryption matrix.
In one embodiment, the predetermined DNA coding rule is determined by:
the DNA molecule consists of 4 kinds of deoxynucleotides, adenine (A), cytosine (C), guanine (G) and thymine (T). Due to the specificity of the DNA coding type and the regularity of information processing, the method is suitable for processing 0 and 1 digital information, and takes 2 numbers such as '00', '01', '10', '11' as a group of data elements for operation. Furthermore, the principle of DNA base complementary pairing can be used to find 8 regular pairing modes, as shown in Table 1.
TABLE 1 DNA encoding and decoding rules
Figure BDA0003303549960000072
In manipulating the data encoded by the DNA, 3 ways are provided to further enhance the degree of encoding, DNA addition, DNA subtraction, and DNA exclusive-or, respectively, see tables 2,3, and 4. The encryption of the original information stream data is completed by the above DNA coding and DNA operations, wherein the 2 operations of scrambling and obfuscating are often implicit and involved in the above process.
TABLE 2 DNA addition operation
Figure BDA0003303549960000081
TABLE 3 DNA subtraction operation
Figure BDA0003303549960000082
TABLE 4 DNA XOR operations
Figure BDA0003303549960000083
Respectively calculating initial values(s) of the LSS, LTS and TSS chaotic systems of the matrix through a formula (7)1,s2,s3,s4) For generating 64 floating-point numbers c for controlling encoding, operation and decodingi(i ═ 1,2,3, 4). Wherein c is1And c2From s1,s2Respectively generated by an LSS chaotic system, c3From s3Generated by LTS chaotic system, c4From s4Generated by a TSS chaotic system.
Figure BDA0003303549960000084
According to tables 1 to 4, since there are 8 encoding and decoding methods and 3 operation methods, the chaotic system is generated in c of the interval (0,1) by the formula (8)i(i ═ 1,2,3,4) to the sets {1,2,3,4,5,6,7,8} and {1,2,3}, to give eiAnd (i is 1,2,3,4) is 64 control sequence codes.
Figure BDA0003303549960000091
Then, e1For a first control sequence, for determining a first partition DijThe DNA coding rule of (a), i.e. according to e1One is identified in the 8 rules of table 1; e.g. of the type2For a second control sequence, for determining a second block TijThe DNA coding rule of (a), i.e. according to e2One is identified in the 8 rules of table 1; e.g. of the type3Is a third control sequence for determining the first block DijAnd a second block TijThe rule of DNA operation carried out, i.e. according to e3Determining which of the calculations in tables 1-3 are used; e.g. of the type4Is a fourth control sequence for determining the decoding rule of the final encryption matrix, also according to e4One is identified in the 8 rules of table 1.
In one embodiment, e3Control DijAnd TijThe operation mode of the two matrixes is operated to obtain an encryption matrix VjIn the operation process, V is used each timejAnd Vj-1And performing secondary operation to implement diffusion effect.
In step S204, the matrix V is encryptedjAccording to e4Obtaining the encrypted information M by the determined decoding modeijFinally, M will beijAnd converted into an encrypted information stream, i.e., an encrypted signal.
In step S102, the encrypted signal obtained by DNA encryption is QPSK modulated, and then the original QPSK constellation is rotated and spread by 4-WFRFT transform. And adding a cyclic prefix CP to the converted signal, then carrying out parallel-to-serial conversion, and transmitting the converted signal to an AWGN channel. Discrete 4-WFRFT is used as a method for signal transformation, any complex sequence of input, such as MPSK and MQAM, can be processed, the input and output signals are guaranteed to have the same power spectrum, and the transformed signal can be modulated and demodulated in a conventional mode.
In one embodiment, assuming that the encrypted signal obtained after DNA encryption is x, the process of generating rotation and diffusion for the original QPSK constellation using 4-WFRFT transform is:
X=Fx (9)
wherein the content of the first and second substances,
Figure BDA0003303549960000101
called DFT matrix, where WN=e-2πi/N
The definition of 4-WFRFT is expressed as:
Figure BDA0003303549960000102
taking the above equation in the form of a matrix can be expressed as:
Figure BDA0003303549960000103
F(α) is a single parameter weighted fractional fourier transform matrix, wherein the computational expression of the weighting coefficients is:
Figure BDA0003303549960000104
wherein l is 0,1,2, 3. The period of the parameter alpha is 4, and the value range is usually selected from [ -2,2 [ -2 [ ]]The weighting coefficient is influenced by adjusting the value of the transformation order alpha, so that the signal constellation diagram as a whole is along the angle thetalRotational splitting occurs, the rotational angle of each weighting coefficient being:
Figure BDA0003303549960000105
because of the theta corresponding to each weighting functionlIn contrast, relative rotation between constellation points is formed, and as the parameter α is further increased, the boundary between constellation points is more blurred, and finally, the constellation points are mixed together and cannot be distinguished, and a gaussian-like distribution condition is shown on a complex plane.
The flow chart of the WFRFT is shown in FIG. 3, and it can be seen from FIG. 3 that: the signal is divided into 4 paths after serial-parallel conversion, wherein 1 and 3 branch signals are subjected to FFT (fast Fourier transform) and then are subjected to inversion and weighting, and belong to frequency domain signals, and 0 and 2 branch signals are directly subjected to inversion and weighting and belong to time domain signals. Therefore, the WFRFT signal belongs to a time-frequency domain signal, the energy distribution is more uniform, and the anti-interference performance is stronger.
In step S103, after the mixed carrier signal is transmitted to the receiving end through the channel, the receiving end performs serial-to-parallel conversion on the received signal, and recovers the QPSK modulation constellation by using the 4-WFRFT inverse conversion module.
In step S104, DNA decryption is performed on the QPSK-demodulated data, and the original information stream is obtained through parallel-to-serial conversion.
The system block diagram of the whole process can refer to fig. 4.
Performing performance analysis on the WFRFT safety communication method based on the DNA dynamic coding:
1. chaotic system performance analysis
To test the performance of chaotic systems, we first simulated the initial sensitivities of Logistic, LSS, LTS and TLS. The value of r is set to 3.9 and the values of x, y, z, q are set to 0.7. In fig. 5, when x, y, z, q4 initial values exist, Δ ═ 1e-15When the difference is large, several tens of timesAfter iteration, every two chaotic sequences are completely different. The detailed performance of Logistic, LSS, LTS and TLS is listed in fig. 5(a), 5(d), 5(g) and 5 (k). In addition, we tested the autocorrelation and cross-correlation performance of the 4 chaotic systems used. We obtain a length 1000 of the chaotic sequence, and from fig. 5(b), fig. 5(e), fig. 5(h) and 5(l), the autocorrelation values are equal to 1 only when the values are equal to 0, and are all close to 0 at other times, which indicates that they have good autocorrelation properties. When we give Δ ═ 1e-15The cross-correlation performance of the chaotic system can be as shown in fig. 5(c), fig. 5(f), fig. 5(i) and fig. 5(m) with a small difference. All the values are changed in [ -0.1, 0.1 [ ]]This indicates that they have good performance in cross-correlation.
To further study the performance of the chaotic system used, some comparisons with other high-dimensional chaotic systems are shown in table 5. The chaotic system used by the user has lower computational complexity, higher safety and larger key space.
TABLE 5 comparison of different chaotic systems
Figure BDA0003303549960000111
2. Constellation fission characteristic analysis
To test and verify the feasibility of the proposed encryption scheme, the proposed DNA-WFRFT system was simulated using matlab. The length of the simulation signal is 1024 bits, the size of the block matrix is set to be 32 x 32, and QPSK modulation is adopted. The 4-WFRFT parameter α is selected to be 0, 0.05, 0.2, and 0.4, respectively, and the corresponding signal constellation can be obtained as shown in fig. 6.
As can be seen from fig. 6, after the QPSK constellation is subjected to WFRFT transform, phase rotation and aliasing occur, and as the modulation order α increases, the degree of rotation and aliasing of the constellation also increases, and the random distribution becomes more obvious.
DNA Cryptographic Performance analysis
Compared with the traditional 0-1 bit stream, the image is more visual and richer in information, so the image data is used for explaining the superiority of the algorithm disclosed by the invention.
3.1 histogram analysis
First, to qualitatively evaluate our proposed DNA dynamic encryption scheme, a classical image Lena used in an image processing system was tested. As shown in fig. 7, we show histograms of the original image and the encrypted image data, and fig. 7(b) can easily derive the rough histogram distribution characteristic of the original data, and the uneven lines in the graph represent irregular gray value information. Meanwhile, for the encrypted case, we also present the image and histogram, as shown in fig. 7(c), (d). Compared to the original image, no irregular image gray distribution was observed.
Furthermore, we demonstrate that there are different conditions for decrypting image information for illegal and legitimate users, as shown in fig. 8. For an illegal user, the original image data cannot be restored, and only indistinguishable images are displayed, as shown in fig. 8(a) - (d). For a legitimate user, it is easy to find that the original image data can be almost completely restored with almost no distortion, as shown in fig. 8 (d). These features indicate that the proposed scheme of the present disclosure has a high encryption capability.
3.2 entropy analysis of information
In order to test the disturbing effect of the DNA dynamic encryption method on signal distribution, information entropy analysis is carried out in the image, entropy is an important measure for testing the randomness of the image, and the entropy value of a real random image with 256 gray levels is 8. The formula for calculating the entropy is:
Figure BDA0003303549960000121
table 6 shows the entropy of different general images and the entropy of the corresponding password images respectively encrypted by different schemes. The maximum information entropy at different sizes is shown in bold. As can be seen from the table, most of the entropy of the cryptographic image encrypted by this scheme is closer to 8 than the entropy of the other schemes. Therefore, the scheme provided by the disclosure can perform high-intensity data encryption on the image.
TABLE 6 comparison of information entropy of a generic image and a cryptographic image under different encryption schemes
Figure BDA0003303549960000131
Analysis of statistical Properties of DNA-WFRFT signals
Fig. 9 shows the complex envelope, the phase statistical property and the in-phase component distribution of the DNA-WFRFT signal when the modulation order α is 1, the histograms in fig. 9(a), (b) and (c) show the statistical results of the complex envelope, the in-phase component and the phase of the signal, and the blue dotted line is the rayleigh distribution, gaussian distribution and uniform distribution probability density curve having the same mean and variance, and the signal statistical property is known as follows: the complex envelope of the DNA-WFRFT signal is fitted to Rayleigh distribution, the phase distribution is uniform, the approach effect of the amplitude of the in-phase component on Gaussian distribution is good, the interception resistance and the interference resistance of a communication signal are very beneficial, and the purposes of low-probability interception and low-probability detection communication can be achieved.
5. Analysis of safe transport performance
TABLE 7 System simulation parameters
Figure BDA0003303549960000132
FIG. 10 is a graph showing the comparison of the bit error rates of signals subjected to dynamic DNA encoding and 4-WFRFT conversion at the receiving end of an illegal user and the receiving end of a legal user, where the illegal user cannot correctly demodulate the signals due to lack of encryption keys at various stages, and the error of the keys at various stages is 10-15In the case of (1), the bit error rate is always maintained between 0.4 and 0.5, the size of the key space of the algorithm is 6.4 multiplied by 10111.4, and the algorithm is performed at 10 per millisecond6The time required to break the scheme at sub-computational speed is 5.1 × 1095The new approach presented herein was demonstrated over the years to significantly improve the safety of WFRFT systems.
In summary, the present disclosure provides a WFRFT secure communication method based on DNA dynamic coding, which combines a four-dimensional chaotic DNA dynamic coding process to achieve scrambling and spreading of information, expand a key space of a system, avoid key deciphering caused by exhaustive attack, and change distribution of useful signals on a complex plane by 4-WFRFT, so that an eavesdropper cannot demodulate correct signals.
Experiments and performance analysis show that the method greatly reduces the probability of interception by illegal users under the condition of ensuring the quality of signals received by the legal users, and can effectively solve the safety problem in wireless communication.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.

Claims (9)

1. A WFRFT secure communication method based on DNA dynamic coding is characterized by comprising the following steps:
encrypting the bit stream information by using a DNA dynamic encryption system to obtain an encrypted signal;
carrying out constellation transformation on the modulated encrypted signal by using WFRFT to generate a mixed carrier signal;
after the mixed carrier signal is transmitted to a receiving end through a channel, the receiving end carries out WFRFT inverse transformation on the mixed carrier signal and completes symbol demodulation;
and performing DNA decryption on the data which completes the symbol demodulation to obtain the bit stream information.
2. The transmission method according to claim 1, wherein the step of encrypting the bitstream information by using the DNA dynamic encryption system to obtain the encrypted signal comprises:
converting the bitstream information into a plurality of matrices of preset sizes;
calculating a ciphertext template matrix of the matrix;
carrying out DNA encoding and DNA operation on the matrix and the ciphertext template matrix to obtain an encryption matrix;
and decoding and converting the encryption matrix to obtain the encrypted signal.
3. The transmission method according to claim 2, wherein the step of calculating the ciphertext template matrix of the matrix comprises:
calculating a ciphertext template key of each matrix;
generating a corresponding encryption sequence according to the ciphertext template key;
and converting the encrypted sequence into a ciphertext template matrix.
4. The transmission method according to claim 3, wherein the step of generating the corresponding encryption sequence according to the ciphertext template key comprises:
and generating an encryption sequence of the Logistic chaotic system according to the ciphertext template key.
5. The transmission method according to claim 2, wherein the step of performing DNA encoding and DNA operation on the matrix and the ciphertext template matrix to obtain an encryption matrix comprises:
the matrix is processed in a blocking mode to obtain at least one first block;
the ciphertext template matrix is processed in a blocking mode to obtain at least one second block;
respectively encoding the first block and the second block according to a preset DNA encoding rule;
and carrying out preset DNA operation on the encoded first block and the encoded second block to obtain an encryption matrix.
6. The transmission method according to claim 5, wherein the step of performing DNA encoding and DNA operation on the matrix and the ciphertext template matrix to obtain an encryption matrix comprises:
generating a control sequence according to the LSS, LTS and TSS chaotic systems of the matrix;
selecting corresponding DNA coding rules according to the control sequences to code the first block and the second block respectively;
and selecting a corresponding DNA operation rule according to the control sequence to perform DNA operation on the encoded first partition and the encoded second partition.
7. The transmission method according to claim 6, wherein the step of generating a control sequence according to the LSS, LTS and TSS chaotic systems of the matrix comprises:
respectively calculating initial values of the LSS, the LTS and the TSS chaotic system of the matrix;
and generating a control sequence by using the initial value.
8. The transmission method according to claim 7, wherein the step of generating a control sequence according to the LSS, LTS and TSS chaotic systems of the matrix comprises:
the initial values comprise four, and four control sequences are respectively generated by utilizing the four initial values.
9. The transmission method according to claim 8, wherein the four control sequences are a first control sequence, a second control sequence, a third control sequence, and a fourth control sequence, wherein,
the first control sequence is used for determining a DNA coding rule of the first block;
the second control sequence is used for determining the DNA coding rule of the second block;
the third control sequence is used for determining a DNA operation rule performed by the first block and the second block;
the fourth control sequence is used to determine a decoding rule of the encryption matrix.
CN202111197034.0A 2021-09-16 2021-10-14 WFRFT (Wireless Fidelity-rft) secure communication method based on DNA dynamic coding Active CN113949503B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111084885 2021-09-16
CN2021110848854 2021-09-16

Publications (2)

Publication Number Publication Date
CN113949503A true CN113949503A (en) 2022-01-18
CN113949503B CN113949503B (en) 2024-01-23

Family

ID=79330406

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111197034.0A Active CN113949503B (en) 2021-09-16 2021-10-14 WFRFT (Wireless Fidelity-rft) secure communication method based on DNA dynamic coding

Country Status (1)

Country Link
CN (1) CN113949503B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140064479A1 (en) * 2012-09-06 2014-03-06 Samsung Electronics Co., Ltd Method and systems for multilevel data security
CN105046634A (en) * 2015-07-06 2015-11-11 北京电子科技学院 Image encryption method based on information entropy and a spatiotemporal chaotic system
CN107798708A (en) * 2017-11-16 2018-03-13 深圳大学 A kind of out of order codings of DNA and the image encryption and decryption method of chaotic maps
WO2018153317A1 (en) * 2017-02-24 2018-08-30 陈伟 Chaotic map-based digital chaotic encryption method
WO2019066007A1 (en) * 2017-09-29 2019-04-04 望 谷内江 Encryption method, decryption method, encryption system and decryption system
US20200151356A1 (en) * 2017-08-11 2020-05-14 Duality Technologies, Inc. System and method for fast and efficient searching of encrypted ciphertexts
US20200287704A1 (en) * 2020-05-22 2020-09-10 Qiang Zhang Color Image Encryption Method Based on DNA Strand Displacement Analog Circuit
CN112422268A (en) * 2020-11-10 2021-02-26 郑州轻工业大学 Image encryption method based on block scrambling and state conversion
CN112583574A (en) * 2020-12-04 2021-03-30 中国人民解放军空军工程大学 WFRFT transmission method and system based on two-dimensional chaotic mapping amplitude phase encryption
CN112600663A (en) * 2021-01-05 2021-04-02 电子科技大学 Multilayer encryption method for reconstructed chaotic sequence

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140064479A1 (en) * 2012-09-06 2014-03-06 Samsung Electronics Co., Ltd Method and systems for multilevel data security
CN105046634A (en) * 2015-07-06 2015-11-11 北京电子科技学院 Image encryption method based on information entropy and a spatiotemporal chaotic system
WO2018153317A1 (en) * 2017-02-24 2018-08-30 陈伟 Chaotic map-based digital chaotic encryption method
US20200151356A1 (en) * 2017-08-11 2020-05-14 Duality Technologies, Inc. System and method for fast and efficient searching of encrypted ciphertexts
WO2019066007A1 (en) * 2017-09-29 2019-04-04 望 谷内江 Encryption method, decryption method, encryption system and decryption system
CN107798708A (en) * 2017-11-16 2018-03-13 深圳大学 A kind of out of order codings of DNA and the image encryption and decryption method of chaotic maps
US20200287704A1 (en) * 2020-05-22 2020-09-10 Qiang Zhang Color Image Encryption Method Based on DNA Strand Displacement Analog Circuit
CN112422268A (en) * 2020-11-10 2021-02-26 郑州轻工业大学 Image encryption method based on block scrambling and state conversion
CN112583574A (en) * 2020-12-04 2021-03-30 中国人民解放军空军工程大学 WFRFT transmission method and system based on two-dimensional chaotic mapping amplitude phase encryption
CN112600663A (en) * 2021-01-05 2021-04-02 电子科技大学 Multilayer encryption method for reconstructed chaotic sequence

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
RONG TANG ET AL.: "FBMC/OQAM Security Strategy Based on Diversity DNA Encryption", 《IEEE PHOTONICS JOURNAL》 *
TINGWEI WU ET AL.: "Security Improvement for OFDM-PON via DNA Extension Code and Chaotic Systems", 《IEEE ACCESS》 *
倪磊;达新宇;胡航;梁源;: "基于改进Logistic相位扰码的抗截获通信", 华中科技大学学报(自然科学版), no. 06 *
孙颖: "基于OFDM 系统的物理层加密方法研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》, pages 3 *
王宏达;: "一种基于混沌系统的新型图像加密算法", 光学技术, no. 03 *

Also Published As

Publication number Publication date
CN113949503B (en) 2024-01-23

Similar Documents

Publication Publication Date Title
Abdelfatah Audio encryption scheme using self-adaptive bit scrambling and two multi chaotic-based dynamic DNA computations
CN110677236B (en) OFDM encryption method based on composite chaotic system and XOR operation
CN112019321B (en) Five-dimensional optical probability shaping encryption method based on high-dimensional chaotic system
CN108183786A (en) Based on the encrypted N-continuous orthogonal frequency division multiplexing methods of chaotic maps
Huo et al. A new efficient physical layer OFDM encryption scheme
CN109768990B (en) Physical layer secure transmission method based on asymmetric key
Zhou et al. Physical layer dynamic key encryption in OFDM-PON system based on cellular neural network
CN112597519A (en) Non-key decryption method based on convolutional neural network in OFDM (orthogonal frequency division multiplexing) encryption system
CN114928435B (en) Quantum noise stream encryption method and system based on DNA coding and SLM
Noura et al. A physical encryption scheme for low-power wireless M2M devices: a dynamic key approach
Ameen et al. Securing Physical Layer of 5G Wireless Network System over GFDM Using Linear Precoding Algorithm for Massive MIMO and Hyperchaotic QRDecomposition.
El Assad Chaos based information hiding and security
CN103427980B (en) A kind of ofdm system safety of physical layer algorithm based on two-matrix transformation
CN112583574B (en) WFRFT transmission method and system based on two-dimensional chaotic mapping amplitude phase encryption
CN113271201A (en) Dynamic AES physical layer data encryption method
CN113949503B (en) WFRFT (Wireless Fidelity-rft) secure communication method based on DNA dynamic coding
CN115225249A (en) MP-WFRFT communication method and system based on multi-cascade chaotic encryption
Dhanya et al. Speech scrambling based on chaotic mapping and random permutation for modern mobile communication systems
Loginov et al. Information Scrambling by Lorenz System Based Sequences in OFDM
Tang et al. FBMC/OQAM security strategy based on diversity DNA encryption
CN114615119B (en) SCBT transmission method and system based on two-dimensional chaotic mapping constellation encryption
Jiang et al. Security-enhanced CO-OFDM based on dynamic DNA encoding and frequency domain scrambling
CN109327478B (en) Chaotic physical layer secret access method
CN113541821A (en) Physical layer encryption method and system for optical communication of intelligent substation
Deng et al. A novel image encryption algorithm based on hyperchaotic system and shuffling scheme

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant