CN114221786A - Novel communication hardware encryption system and method based on pulse compression - Google Patents

Novel communication hardware encryption system and method based on pulse compression Download PDF

Info

Publication number
CN114221786A
CN114221786A CN202111363609.1A CN202111363609A CN114221786A CN 114221786 A CN114221786 A CN 114221786A CN 202111363609 A CN202111363609 A CN 202111363609A CN 114221786 A CN114221786 A CN 114221786A
Authority
CN
China
Prior art keywords
pulse
narrow
signal
encryption
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111363609.1A
Other languages
Chinese (zh)
Other versions
CN114221786B (en
Inventor
李立
方进勇
吴江牛
翟畅
黄惠军
张浩亮
孙静
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Institute of Space Radio Technology
Original Assignee
Xian Institute of Space Radio Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Institute of Space Radio Technology filed Critical Xian Institute of Space Radio Technology
Priority to CN202111363609.1A priority Critical patent/CN114221786B/en
Publication of CN114221786A publication Critical patent/CN114221786A/en
Application granted granted Critical
Publication of CN114221786B publication Critical patent/CN114221786B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Dc Digital Transmission (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A novel communication hardware encryption system and method based on pulse compression comprises a sending system, a hardware encryption system, an encoding system, a radiation antenna, a receiving antenna, a hardware decryption system, a decoding system and a receiving and displaying system. The invention realizes the transmission of the signal by transmitting the signal of a certain random sequence, but the signal does not carry encryption information. After receiving the transmitted signal, the receiving party performs encryption hardware response processing on the received signal to obtain a certain narrow pulse combination, and the obtained narrow pulse combination performs information extraction according to a certain transmission protocol to obtain the transmitted information. The communication hardware encryption method realizes the transmission of encryption information through random combination of various random signals. Because various random signals do not carry any information (dominance) and appear in the form of random noise, the transmission signals do not carry any (dominance) information in the transmission process, and the encryption communication can be effectively realized.

Description

Novel communication hardware encryption system and method based on pulse compression
Technical Field
The invention belongs to the technical field of encryption communication, and particularly relates to a communication hardware encryption technical method, which is used for solving the problem that the carried encryption information is easy to intercept and tamper and realizing encryption communication.
Background
An important link for constructing a secure and reliable communication environment is information confidentiality technology. The information encryption technology based on the cryptology theory is to encrypt the information data, so that the information data is not exposed in a plaintext state, and only appears in a ciphertext state. According to the cipher theory, if an attacker tries to acquire plaintext data by only attacking ciphertext, the attacker is basically unrealizable, and if the attacker needs to acquire plaintext, the corresponding cipher algorithm and decryption key must be known, so that once the cipher algorithm or the key data is acquired by the attacker, the attacker can acquire the plaintext data through ciphertext information.
Currently, the encryption communication technologies that have been researched are mainly classified into software-based encryption technologies and hardware-based encryption technologies. The software-based encryption mode is divided into three types of classic password encryption, quantum password encryption and chaotic password encryption, while the hardware-based encryption mode generally utilizes the randomness of physics to generate an encryption key, and has higher anti-cracking capability. Hardware encryption is generally divided into key-based physical layer encrypted communication and chaotic secure communication. However, both software-based encryption techniques and hardware-based encryption techniques are signal-based information encryption, defined as end-to-end encryption. End-to-end encryption is done in the application layer, providing an encryption means for data information to be transmitted from one end to the other, the data being encrypted at the transmitting end and decrypted at the final destination (receiving end), the intermediate node not appearing in the clear, so the information is protected throughout the transmission. This encryption method is done before the signal is sent, the signal itself carrying the encryption information.
Another encryption method corresponding to end-to-end encryption is transmission encryption technology, that is, information is loaded on a transmission signal, and the transmission signal is difficult to detect or even cannot be detected by a specific means (such as pseudo-random sequence or spread spectrum communication), so that encrypted transmission of the information is realized. There is also a transmission encryption technology to achieve the purpose of encrypting and concealing the communication by concealing the receiving party, but the above two transmission encryption methods are not absolutely secure, because the signal carries the encryption information during the transmission process and can be stolen.
Disclosure of Invention
The technical problem solved by the invention is as follows: the communication hardware encryption system and method based on pulse compression and without bearing secret information (linearity) are provided to overcome the defects of the prior art, and the problem that the information leakage is easy to occur due to the fact that the existing encryption technology bears encrypted information in the signal transmission process is solved, so that the effective interception performance (the possibility that effective information is intercepted) of the secret information is greatly reduced.
The technical solution of the invention is as follows: a novel communication hardware encryption system based on pulse compression comprises a sending system, a hardware encryption system, an encoding system, a radiation antenna, a receiving antenna, a hardware decryption system, a decoding system and a receiving and displaying system, wherein:
the sending system converts the information to be sent into a data string with a format of 0, 1 according to a specific coding rule;
the encoding system converts the data string with the format of 0, 1 into a microwave narrow pulse string according to a 0, 1 encoding transmission protocol;
the hardware encryption system excites the pulse compression cavity by utilizing the microwave narrow pulse train and converts the microwave narrow pulse train into a long pulse train expressed in a random signal combination form;
the radiation antenna is used for transmitting the radio electromagnetic wave of the long pulse train in the random signal combination form through a wireless transmission link;
a reception antenna that receives the propagated radio electromagnetic wave signal;
the hardware decryption system is used for carrying out time domain inversion normalization processing on the received radio electromagnetic wave signals, compressing and converting the radio electromagnetic wave signals into a microwave narrow pulse string form, wherein the compression and conversion method is opposite to the process of generating the long pulse string by the hardware encryption system;
the decoding system converts the narrow pulse string obtained by the hardware decryption system into a data string with a format of 0, 1 according to the 0, 1 coding transmission protocol;
the receiving and displaying system translates the data string with format 0, 1 into the original information to be sent according to the specific coding rule.
A novel communication hardware encryption method based on pulse compression,
converting information to be transmitted into a data string with a format of 0, 1 according to a specific coding rule; selecting a system carrier frequency f1Generating a carrier frequency of f1The narrow pulses with different pulse widths form a narrow pulse signal library;
according to a 0, 1 coding transmission protocol, randomly selecting narrow pulses with different pulse widths in a narrow pulse signal library, and converting a data string with a format of 0, 1 into a microwave narrow pulse string;
exciting a pulse compression cavity by using a microwave narrow pulse train to obtain a long pulse train expressed in a random signal combination form;
sending the long pulse string at a sending end, and receiving the long pulse string at a receiving end;
carrying out time domain inversion normalization processing on the long pulse train at a receiving end, and then compressing and converting the long pulse train into a microwave narrow pulse train form by using a pulse compression cavity;
converting the narrow pulse string obtained by conversion into a data string with a format of 0, 1 according to the 0, 1 coding transmission protocol;
the data string of format 0, 1 is translated into the original information to be sent.
The microwave narrow pulse train has a narrow pulse width T1In ns magnitude, N narrow pulses correspond to a signal number 0 or 1, wherein N is more than or equal to 2, and the pulse width T of the N narrow pulses1Are different from each other.
The long pulse train, the pulse width T of the long pulse2In the order of us, perA long pulse corresponds to a signal number 0, or 1.
The time domain inversion normalization processing specifically comprises the following steps: according to the time length T2And carrying out time domain inversion normalization processing to obtain an inversion normalization response signal.
The pulse compression cavity adopts a rectangular metal cavity.
Compared with the prior art, the invention has the advantages that:
(1) the novel communication hardware encryption method based on pulse compression completes the transmission of specific information by adopting the random combination of various random signals. Because various random signals do not carry any information per se and appear in the form of random noise, the transmission signals do not carry any information in the transmission process, and the safety is extremely high;
(2) the novel communication hardware encryption method based on pulse compression is based on the inherent randomness of response processing of special hardware on excitation narrow pulse signals, so that the method has uniqueness which can be flexibly changed;
(3) the novel communication hardware encryption method based on pulse compression can enable the dominant content of the transmission signal to have various randomness and various signal forms through the random combination of various random signals, and the dominant content is represented in a continuous wave signal form in a time domain, so that the stable transmission of secret information can be effectively realized, and the possibility of intercepting and capturing effective information is greatly reduced.
Drawings
FIG. 1 is a schematic block diagram of the hardware encryption system of the present invention;
FIG. 2 is a graph of the relationship between received pulses and transmitted information in an embodiment of the present invention;
fig. 3 is a schematic diagram of an electromagnetic physical encryption process based on pulse compression according to the present invention.
Reference numerals:
1-sending system, 2-hardware encryption system, 3-coding system, 4-radiating antenna, 5-receiving antenna, 6-hardware decryption system, 7-decoding system, 8-receiving and display system, 9-microwave narrow pulse pair, 10-arbitrary waveform generator, 11-transmitting end large metal cavity, 12-microwave narrow pulse response signal, 13-microwave narrow pulse response reversal signal, 14-receiving end large metal cavity and 15-compressed narrow pulse pair.
Detailed Description
Based on the transmission encryption idea, the invention provides a novel pulse compression-based communication hardware encryption scheme, which has the principle that information to be transmitted is converted into a narrow pulse combined signal with a certain random sequence, then the narrow pulse combined signal is converted into a long pulse signal by using a pulse compression cavity, signal transmission is realized by transmitting and receiving the long pulse signal, and the transmission signal does not bear encrypted information (explicit information). After receiving the transmitted signal, the receiving party performs encryption hardware decompression processing on the transmission signal to obtain a certain narrow pulse combination, and the obtained narrow pulse combination performs information extraction according to a certain transmission protocol to obtain the transmitted information. The communication hardware encryption scheme is similar to the inverse application of an unclonable function, namely, the transmission of encryption information is realized by random combination of various random signals. Because various random signals do not carry any information (dominance) and appear in the form of random noise, the transmission signals do not carry any (dominance) information in the transmission process, and the encryption communication can be effectively realized.
In order to make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention will be described in detail with reference to the accompanying drawings.
Firstly, an encryption communication system as shown in fig. 1 is established, which mainly comprises a sending system 1, a hardware encryption system 2, an encoding system 3, a radiation antenna 4, a receiving antenna 5, a hardware decryption system 6, a decoding system 7 and a receiving and displaying system 8.
The transmission system 1 converts the information to be transmitted into english text information, that is, realizes the alphabetization of the information, and simultaneously converts the english text information into a data string with a format of 0, 1 according to the alphabetical coding of table 1.
The coding system 3 converts the data string with format 0, 1 into microwave narrow pulse string according to the 0, 1 coding transmission protocol. The 0, 1 coding transmission protocol is the corresponding relation between digital 0 or 1 and microwave narrow pulse(i.e., a codebook of numbers 0 or 1 and microwave narrow pulses). Here, the microwave has a narrow pulse width T1In the order of ns. N microwave narrow pulses correspond to a signal number 0 or 1, wherein N is more than or equal to 2, and the pulse width T of the N narrow pulses1Are different from each other. Preferably, the value of T1 ranges from 2ns to 10ns, so that the amplitude variation range of the response signal of the microwave narrow pulse (i.e. the long pulse in the following description) is not too large, and the measurement is easier.
The hardware encryption system 2 encrypts the microwave narrow burst into a long burst that is represented as a combination of random signals. The long-pulse train signal, which is obtained by encrypting the microwave narrow-pulse train, is a response signal for exciting the hardware encryption system 2 for the microwave narrow-pulse train signal, which is expressed in the form of a pulse width T2Is a random signal of us magnitude and has no display information (only carrier frequency information). N microwave narrow pulses correspond to a signal number 0 or 1, so that during encoding, at time T2Only N microwave narrow pulses corresponding to the number 0 or 1 are coded in the hardware encryption system 2, so that the output length is T when the microwave narrow pulse signals excite the hardware encryption system2In the form of a random signal, with a pulse length T2Corresponds to a signal number 0, or 1.
The random signal combination is transmitted by the radiation antenna 4, and the transmission is carried out through a wireless transmission link. The radiation antenna 4 is a broadband antenna, and the bandwidth of the broadband antenna covers the working frequency band of the long pulse train.
The receiving antenna 5 receives the propagated radio wave signal, and its bandwidth is the same as that of the radiating antenna 4.
The hardware decryption system 6 compresses the received electromagnetic wave signal into the form of a narrow pulse train corresponding to the sequence of the narrow pulse train generated by the encoding system 3.
The decoding system 7 converts the narrow pulse string output by the hardware decryption system 6 into a 0, 1 data string according to a 0, 1 transmission protocol. The 0, 1 coding transmission protocol according to which the decoding system 7 is based and the 0, 1 coding transmission protocol according to which the encoding system 3 is based are the same 0, 1 coding transmission protocol.
The receiving and display system 8 translates the 0, 1 data string into a communication transmission.
Therefore, the core of the system is the hardware encryption system 2 and the hardware decryption system 6, the core of the hardware encryption system 2 and the hardware decryption system 6 is the pulse compression cavity, and the hardware encryption of the invention is mainly realized by the pulse compression method.
The system and the method are realized based on electromagnetic wave pulse compression, and the core is to realize the correspondence between compressed pulse waveforms and transmission information. The pulse extraction can be realized only by a specific pulse compression method, and the corresponding 0-1 transmission signal is obtained according to the transmission protocol, so that the transmitted encrypted information is obtained.
As shown in fig. 3, the transmission hardware encryption process comprises the following steps: firstly, selecting the carrier frequency f of the system1Then generating a carrier frequency f1Various microwave narrow pulses (pulse width T)1In ns order) and then converts the information to be transmitted into different microwave narrow pulse combined signals according to the transmission protocol, and then the combined narrow pulse signals are used for exciting the encryption hardware. The encryption hardware is a pulse compression cavity, when the pulse compression cavity is excited by microwave narrow pulse, the output response signal is a long pulse signal (the pulse width is T) with widened pulse width and reduced amplitude2) The long pulse signal appears as random noise. When the pulse compression cavity is excited by narrow pulses with different pulse widths, the response signals of the pulse compression cavity are different. Because the narrow pulse response signals with different pulse widths are represented as random signals, and the signals are in the form of random noise, the hardware encryption of the signals is realized.
The pulse compression cavity is a rectangular metal cavity, and the size of the rectangular metal cavity is carrier frequency f to ensure the compression effect1In order to reduce the influence of loss by more than 10 times the wavelength, it is preferable that the inner surface of the metal cavity is a low-loss surface, and gold plating or silver plating is performed.
The receiving hardware decryption process comprises the steps of: firstly, the receiving antenna receives the received combined long-pulse random response signal, and the received long-pulse random response signalThe signal being in accordance with the length of time T2Perform a time domain inversion normalization process (i.e., by a time length T)2And intercepting the received signal, carrying out sequence inversion processing, and flattening the signal amplitude) to obtain an inversion normalization response signal. And feeding the obtained reverse normalized response signal into decryption hardware (a pulse compression cavity, which can compress the response signal of the microwave narrow pulse excitation pulse compression cavity into a corresponding narrow pulse signal) for decryption. When different narrow impulse response signals are combined, the impulse compression cavity can compress the combined response into a combination of corresponding narrow impulse signals.
Examples
The principle of encrypted communication and the decryption method are described below by way of specific implementation examples.
0-1 transport protocol:
according to the most traditional encryption method, a simplest codebook is first constructed, which can be considered as the first encryption of information, and is set as key 1, and 26 English letters are represented by different numbers, as shown in Table 1.
Table 1: key 1 alphanumeric correspondence table (i.e. 0-1 transmission protocol)
00000 00001 00010 00011 00100 00101 00110 00111 01000
A B C D E F G H I
01001 01010 01011 01100 01101 01110 01111 10000 10001
J K L M N O P Q R
10010 10011 10100 10101 10110 10111 11000 11001
S T U V W X Y Z
Assuming that the data rate to be transmitted is 1Mbit/s, 1us can be selected as one output unit in the time dimension, and if two 1ns pulses are continuously output within 1us time and the pulse interval is less than 100ns, the signal is set to "0"; if a 1ns pulse and a 2ns pulse are output consecutively within 1us of time and the pulse interval is less than 100ns, the signal is set to "1". If it is desired to transmit the word "OK", the receiver receives the pulse as shown in fig. 2.
Observing the relationship between the received pulses and the transmitted information in fig. 2, it can be seen that the common rule is that at the end of each us, if the output pulse width is 1ns, the corresponding digit is "0", and if the output pulse width is 2ns, the corresponding digit is "1". However, it is observed that, no matter the output of the 1us terminal is 1ns or 2ns, the output of the front terminal is 1ns different from the time interval thereof, which can be randomly changed in a large range, but in order to avoid confusion of output pulses in two connected time periods, assuming that the output interval of two consecutive pulses is set to be 100ns at most, an arbitrary interval within 100ns can be selected theoretically, which means that there are an infinite number of encoding modes corresponding to "0" and an infinite number of encoding modes corresponding to "1".
The encryption method comprises the following steps:
if two ns-level narrow pulses with different intervals and continuously output within 1us are considered as original codes and are not called pulse pairs, the next most important step is the most core step, namely, the pulse pairs are physically encrypted by using an electromagnetic wave path coding method. Firstly, the central carrier frequency of ns-level narrow pulses can be determined, theoretically, the frequency can be selected from several GHz to several hundred GHz, 2.85GHz is taken as the central carrier frequency, and two pulse pairs with continuous output of 1ns are taken as an example to perform physical coding encryption.
Firstly, a pulse pair with a central carrier frequency of 2.85GHz and a pulse width of 1ns is compiled by a computer, the distance t between two pulses can be randomly selected within 100ns, if t1 and t2.. tn are selected, data are input into an arbitrary waveform generator for each pulse pair with a fixed spacing, the pulse pair compiled by the computer is generated by the arbitrary waveform generator and is input into a metal scattering cavity, a long pulse (generally, several us) with gradually attenuated amplitude is obtained at an output port, the long pulse is sampled by a high-speed oscilloscope, 1us length data are intercepted and input into the computer for time sequence inversion, frequency phase information is kept unchanged, the amplitude of a signal is leveled with the maximum value, and an encrypted signal corresponding to the pulse pair with the spacing t1 and the spacing t2.. tn can be obtained, and the whole encryption process is finished.
There are two significant features in the encryption process: first, there may be numerous encrypted pulses corresponding to the digital "0" with a pulse width of 1us and completely different phase information; secondly, the frequency and phase information of the encryption pulse is random, and even the encryptor himself does not know a specific key. Similarly, it is possible to generate a plurality of encrypted pulses having a frequency of 1us and completely different phase information corresponding to the number "1".
As previously described, when transmitting the word "OK", the recipient eventually needs to obtain the information of "0111001010". Corresponding to key 1, the pulse pair information shown in fig. 2 needs to be obtained. The sender randomly selects to continuously send long pulses with the pulse width of 1us corresponding to '0' or '1', and both the receiver and the burglar can obtain an electromagnetic wave with the pulse width of 10us, and the electromagnetic wave with the length of 10us can have countless combination modes, but the long pulses correspond to the same information '0111001010'. As shown in fig. 3, the core of decryption is to recover 10 pulse pairs with output time interval less than 100ns from an electromagnetic wave with length of 10us, and since the 10us long pulse is randomly encrypted, the pulse pair recurrence by mathematical method has only theoretical possibility, and thus has very reliable encryption performance.
The only efficient and unique method for restoring the 10us long pulse shown in fig. 3 to a pulse pair similar to that shown in fig. 2 is that the receiver has a metal scattering cavity with the same structure as the sender, and contrary to the encryption time sequence, the original input and output ends of the cavity are exchanged, and the 10us long pulse is input into the metal scattering cavity, so that the pulse pair expressing the relevant "0" and "1" information can be restored, and then the information really transmitted by the sender is further decoded by combining the key 1.
Those skilled in the art will appreciate that those matters not described in detail in the present specification are well known in the art.

Claims (10)

1. A novel communication hardware encryption system based on pulse compression is characterized in that: the system comprises a sending system (1), a hardware encryption system (2), an encoding system (3), a radiation antenna (4), a receiving antenna (5), a hardware decryption system (6), a decoding system (7) and a receiving and displaying system (8), wherein:
the sending system (1) converts the information to be sent into a data string with a format of 0, 1 according to a specific coding rule;
the coding system (3) converts the data string with the format of 0, 1 into a microwave narrow pulse string according to a 0, 1 coding transmission protocol;
the hardware encryption system (2) excites the pulse compression cavity by utilizing the microwave narrow pulse train and converts the microwave narrow pulse train into a long pulse train expressed in a random signal combination form;
a radiation antenna (4) for transmitting the radio electromagnetic wave of the long pulse train in the form of random signal combination through a wireless transmission link;
a receiving antenna (5) for receiving the propagated radio-electromagnetic wave signal;
the hardware decryption system (6) is used for carrying out time domain reversal normalization processing on the received radio electromagnetic wave signals, compressing and converting the radio electromagnetic wave signals into a microwave narrow pulse string form, and the compression and conversion method is opposite to the process of generating the long pulse string by the hardware encryption system (2);
the decoding system (7) converts the narrow pulse string obtained by the hardware decryption system (6) into a data string with a format of 0, 1 according to the 0, 1 coding transmission protocol;
the receiving and display system (8) translates the data string with format 0, 1 into the original information to be transmitted according to the specific coding rule.
2. The novel communication hardware encryption system based on pulse compression as claimed in claim 1, characterized in that: the microwave narrow pulse train has a narrow pulse width T1In ns magnitude, N narrow pulses correspond to a signal number 0 or 1, wherein N is more than or equal to 2, and the pulse width T of the N narrow pulses1Are different from each other.
3. The novel communication hardware encryption system based on pulse compression as claimed in claim 1, characterized in that: the long pulse train, the pulse width T of the long pulse2Each long pulse corresponds to a signal number 0, or 1, of the order of us.
4. The novel communication hardware encryption system based on pulse compression as claimed in claim 3, characterized in that: the time domain inversion normalization processing specifically comprises the following steps: according to the time length T2And carrying out time domain inversion normalization processing to obtain an inversion normalization response signal.
5. The novel communication hardware encryption system based on pulse compression as claimed in claim 1, characterized in that: the pulse compression cavity adopts a rectangular metal cavity.
6. A novel communication hardware encryption method based on pulse compression is characterized in that:
converting information to be transmitted into a data string with a format of 0, 1 according to a specific coding rule; selecting a system carrier frequency f1Generating a carrier frequency of f1The narrow pulses with different pulse widths form a narrow pulse signal library;
according to a 0, 1 coding transmission protocol, randomly selecting narrow pulses with different pulse widths in a narrow pulse signal library, and converting a data string with a format of 0, 1 into a microwave narrow pulse string;
exciting a pulse compression cavity by using a microwave narrow pulse train to obtain a long pulse train expressed in a random signal combination form;
sending the long pulse string at a sending end, and receiving the long pulse string at a receiving end;
carrying out time domain inversion normalization processing on the long pulse train at a receiving end, and then compressing and converting the long pulse train into a microwave narrow pulse train form by using a pulse compression cavity;
converting the narrow pulse string obtained by conversion into a data string with a format of 0, 1 according to the 0, 1 coding transmission protocol;
the data string of format 0, 1 is translated into the original information to be sent.
7. The novel communication hardware encryption method based on pulse compression as claimed in claim 6, characterized in that: the width T of the narrow pulse1In ns magnitude, N narrow pulses correspond to a signal number 0 or 1, wherein N is more than or equal to 2, and the pulse width T of the N narrow pulses1Are different from each other.
8. The novel communication hardware encryption method based on pulse compression as claimed in claim 6, characterized in that: the long pulse train, the pulse width T of the long pulse2On the order of us, each long pulse corresponds to a signal number 0, or 1.
9. The novel communication hardware encryption method based on pulse compression according to claim 8, characterized in that: the time domain inversion normalization processing specifically comprises the following steps: according to the time length T2And carrying out time domain inversion normalization processing to obtain an inversion normalization response signal.
10. The novel communication hardware encryption method based on pulse compression as claimed in claim 6, characterized in that: the pulse compression cavity adopts a rectangular metal cavity.
CN202111363609.1A 2021-11-17 2021-11-17 Novel communication hardware encryption system and method based on pulse compression Active CN114221786B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111363609.1A CN114221786B (en) 2021-11-17 2021-11-17 Novel communication hardware encryption system and method based on pulse compression

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111363609.1A CN114221786B (en) 2021-11-17 2021-11-17 Novel communication hardware encryption system and method based on pulse compression

Publications (2)

Publication Number Publication Date
CN114221786A true CN114221786A (en) 2022-03-22
CN114221786B CN114221786B (en) 2024-03-26

Family

ID=80697420

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111363609.1A Active CN114221786B (en) 2021-11-17 2021-11-17 Novel communication hardware encryption system and method based on pulse compression

Country Status (1)

Country Link
CN (1) CN114221786B (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB1279224A (en) * 1969-02-06 1972-06-28 Nokia Oy Ab Method of and apparatus for enciphering and deciphering signals
CN1937008A (en) * 2005-09-22 2007-03-28 富士通株式会社 Encryption method, cryptogram decoding method, encryptor, cryptogram decoder, transmission/reception system, and communication system
CN101014060A (en) * 2007-02-02 2007-08-08 东南大学 Voice encryption method for GoTone handset with anti longterm prediction rule pulse excitation compression coding
CN102932142A (en) * 2012-10-08 2013-02-13 中国科学院西安光学精密机械研究所 Optical data signal encryption and decryption method in optical fiber communication system
CN103427978A (en) * 2012-05-17 2013-12-04 哈尔滨职业技术学院 Wireless Chinese character transmitting device based on chaotic encryption system
CN108462538A (en) * 2018-03-07 2018-08-28 桂林电子科技大学 A kind of Laser Underwater cause sound digital communication system and method for jumping time slot
JP2019158670A (en) * 2018-03-14 2019-09-19 株式会社東芝 Radar system and radar signal processing method
CN111246469A (en) * 2020-03-05 2020-06-05 北京花兰德科技咨询服务有限公司 Artificial intelligence secret communication system and communication method
CN111585744A (en) * 2020-05-26 2020-08-25 广东工业大学 Video transmission method and system based on hardware codec
US20200389206A1 (en) * 2019-06-05 2020-12-10 Dirac Solutions Inc. Pulse Based Wideband Signaling
CN113225048A (en) * 2021-03-31 2021-08-06 西安空间无线电技术研究所 GW (ground wire) high-power microwave pulse generation device and generation method
CN113258907A (en) * 2021-03-31 2021-08-13 西安空间无线电技术研究所 Device and method for acquiring ultrahigh repetition frequency and high power microwaves based on pulse compression technology

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB1279224A (en) * 1969-02-06 1972-06-28 Nokia Oy Ab Method of and apparatus for enciphering and deciphering signals
CN1937008A (en) * 2005-09-22 2007-03-28 富士通株式会社 Encryption method, cryptogram decoding method, encryptor, cryptogram decoder, transmission/reception system, and communication system
CN101014060A (en) * 2007-02-02 2007-08-08 东南大学 Voice encryption method for GoTone handset with anti longterm prediction rule pulse excitation compression coding
CN103427978A (en) * 2012-05-17 2013-12-04 哈尔滨职业技术学院 Wireless Chinese character transmitting device based on chaotic encryption system
CN102932142A (en) * 2012-10-08 2013-02-13 中国科学院西安光学精密机械研究所 Optical data signal encryption and decryption method in optical fiber communication system
CN108462538A (en) * 2018-03-07 2018-08-28 桂林电子科技大学 A kind of Laser Underwater cause sound digital communication system and method for jumping time slot
JP2019158670A (en) * 2018-03-14 2019-09-19 株式会社東芝 Radar system and radar signal processing method
US20200389206A1 (en) * 2019-06-05 2020-12-10 Dirac Solutions Inc. Pulse Based Wideband Signaling
CN111246469A (en) * 2020-03-05 2020-06-05 北京花兰德科技咨询服务有限公司 Artificial intelligence secret communication system and communication method
CN111585744A (en) * 2020-05-26 2020-08-25 广东工业大学 Video transmission method and system based on hardware codec
CN113225048A (en) * 2021-03-31 2021-08-06 西安空间无线电技术研究所 GW (ground wire) high-power microwave pulse generation device and generation method
CN113258907A (en) * 2021-03-31 2021-08-13 西安空间无线电技术研究所 Device and method for acquiring ultrahigh repetition frequency and high power microwaves based on pulse compression technology

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
TAMAS NAGY;PETER SIMON;LASZLO VEISZ: "High-energy few-cycle pulses: post-compression techniques", 《ADVANCES IN PHYSICS: X》, vol. 6, no. 1, 30 November 2021 (2021-11-30), pages 1 - 41, XP055849730, DOI: 10.1080/23746149.2020.1845795 *
朱秋晨: "宽带线性调频信号的光学生成技术及脉冲压缩性能分析", 《中国优秀硕士学位论文全文数据库 信息科技辑》, 15 February 2019 (2019-02-15), pages 136 - 1397 *
翟畅;方进勇;吴江牛;黄惠军;邱卓越: "基于新型高功率微波的雷达探测技术研究", 《微波学报》, 23 April 2023 (2023-04-23), pages 1 - 5 *

Also Published As

Publication number Publication date
CN114221786B (en) 2024-03-26

Similar Documents

Publication Publication Date Title
US9742557B2 (en) Compressing encrypted data without the encryption key
JP3963280B2 (en) Apparatus and method for ensuring communication safety based on channel characteristics
US20070028088A1 (en) Polymorphic encryption method and system
US20030191950A1 (en) Constructions of variable input length cryptographic primitives for high efficiency and high security
Lü et al. A new spatiotemporally chaotic cryptosystem and its security and performance analyses
CN105120453A (en) Secret key generation method
US7349542B2 (en) Systems, methods and computer program products for encryption and decryption using wavelet transforms
CN116669022A (en) Data safety transmission method for wireless communication system
Choi et al. Secure image encryption based on compressed sensing and scrambling for internet-of-multimedia things
Barros et al. Strong secrecy for wireless channels (invited talk)
Ferrara et al. Implementation and experimental evaluation of reed-solomon identification
CN114221786B (en) Novel communication hardware encryption system and method based on pulse compression
US20120281832A1 (en) Secure wireless communication transceiver
Rahim SMS encryption using word auto key encryption
CN112332971B (en) Safe and efficient data transmission method based on superlattice and compressed sensing
He et al. Beidou short message communication encryption scheme with improved SM4 algorithm
Makala et al. A fast encryption and compression technique on SMS data
Kadam et al. Comparative Analysis of Quantization Schemes for Physical Layer Key generation
CN110380812A (en) A kind of effective scrambling method improving tapping channel safety of physical layer
IE20010317A1 (en) Keyless Encryption System and Method
Lu et al. Performance of lattice coset codes on Universal Software Radio Peripherals
Massey On probabilistic encipherment
Matalgah et al. Alleviating the effect of the strict avalanche criterion (SAC) of symmetric-key encryption in wireless communication channels
Girdhar et al. Role of data compression in cyber security
Aziz et al. Research Article A Noise-Tolerant Audio Encryption Framework Designed by the Application of S8 Symmetric Group and Chaotic Systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant