CN114221786B - Novel communication hardware encryption system and method based on pulse compression - Google Patents

Novel communication hardware encryption system and method based on pulse compression Download PDF

Info

Publication number
CN114221786B
CN114221786B CN202111363609.1A CN202111363609A CN114221786B CN 114221786 B CN114221786 B CN 114221786B CN 202111363609 A CN202111363609 A CN 202111363609A CN 114221786 B CN114221786 B CN 114221786B
Authority
CN
China
Prior art keywords
pulse
narrow
signal
information
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111363609.1A
Other languages
Chinese (zh)
Other versions
CN114221786A (en
Inventor
李立
方进勇
吴江牛
翟畅
黄惠军
张浩亮
孙静
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Institute of Space Radio Technology
Original Assignee
Xian Institute of Space Radio Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Institute of Space Radio Technology filed Critical Xian Institute of Space Radio Technology
Priority to CN202111363609.1A priority Critical patent/CN114221786B/en
Publication of CN114221786A publication Critical patent/CN114221786A/en
Application granted granted Critical
Publication of CN114221786B publication Critical patent/CN114221786B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Dc Digital Transmission (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A novel communication hardware encryption system and method based on pulse compression, wherein the system comprises a sending system, a hardware encryption system, a coding system, a radiation antenna, a receiving antenna, a hardware decryption system, a decoding system and a receiving and display system. The invention realizes the transmission of the signal by transmitting the signal with a certain random sequence, but the signal itself does not bear encryption information. After receiving the transmitted signal, the receiver performs encryption hardware response processing on the received signal to obtain a certain narrow pulse combination, and the obtained narrow pulse combination performs information extraction according to a certain transmission protocol to obtain the transmitted information. The communication hardware encryption method realizes the transmission of encryption information through the random combination of a plurality of random signals. Since the random signals do not bear any information (dominant) and the signals are in the form of random noise, the signals are transmitted in the transmission process without bearing any information (dominant), and the encrypted communication can be effectively realized.

Description

Novel communication hardware encryption system and method based on pulse compression
Technical Field
The invention belongs to the technical field of encryption communication, and particularly relates to a communication hardware encryption technical method which is used for solving the problem that bearing encryption information is easy to intercept and tamper and realizing encryption communication.
Background
An important link in constructing a secure and reliable communication environment is information security technology. The information encryption technology based on the cipher theory is to encrypt the information data so that the information data is not exposed in a plaintext state and only appears in a ciphertext state. According to the cryptographic theory, if an attacker attempts to acquire plaintext data by only attacking ciphertext, if the attacker needs to know the corresponding cryptographic algorithm and decryption key to acquire the plaintext, the attacker can acquire the plaintext data through ciphertext information once the cryptographic algorithm or the key data is acquired by the attacker.
The encryption communication technology which has been studied at present is mainly divided into a software-based encryption technology and a hardware-based encryption technology. The encryption mode based on software is divided into three types of classical password encryption, quantum password encryption and chaotic password encryption, and the encryption mode based on hardware generally utilizes physical randomness to generate an encryption key, and the hardware encryption mode has higher anti-cracking capability. Hardware encryption is generally classified into physical layer encryption communication based on a key and chaotic secret communication. But whether a software-based encryption technique or a hardware-based encryption technique is a signal-based encryption of information, defined as end-to-end encryption. The end encryption is accomplished in the application layer, the encryption mode provided by the data information transmitted from one end to the other end, the data is encrypted at the sending end, decrypted at the final destination (receiving end), and the intermediate node does not appear in the form of plaintext, so the information is protected in the whole transmission process. The encryption method is that encryption is completed before the signal is sent, and the signal itself carries encryption information.
Another encryption method corresponding to end-to-end encryption is a transmission encryption technology, namely, information is loaded on a transmission signal, and the transmission signal is difficult to detect or even cannot be detected by specific means (such as pseudo random sequence or spread spectrum communication), so that encrypted transmission of the information is realized. Still another transmission encryption technique is to conceal the receiver so as to achieve the purpose of encrypting the concealed communication, but the above two transmission encryption methods are not absolutely safe, because the signal is carried with encrypted information during transmission and possibly stolen.
Disclosure of Invention
The invention solves the technical problems that: aiming at solving the problems that the prior encryption technology has the functions of bearing encryption information and easily causing information leakage in the signal transmission process, the communication hardware encryption system and method without bearing secret information (linearity) based on pulse compression are provided, so that the effective interception of the secret information (the possibility of interception of the effective information) is greatly reduced.
The technical scheme of the invention is as follows: the utility model provides a novel communication hardware encryption system based on pulse compression, includes transmitting system, hardware encryption system, coding system, radiation antenna, receiving antenna, hardware decryption system, decoding system, receipt and display system, wherein:
the transmitting system converts the information to be transmitted into a data string with the format of 0,1 according to a specific coding rule;
the coding system converts a data string with the format of 0,1 into a microwave narrow pulse string according to a 0,1 coding transmission protocol;
the hardware encryption system utilizes a microwave narrow pulse train excitation pulse compression cavity to convert the microwave narrow pulse train into a long pulse train expressed in a random signal combination mode;
a radiation antenna for transmitting the long pulse train in the form of random signal combination by wireless electromagnetic wave through a wireless transmission link;
a receiving antenna for receiving the radio electromagnetic wave signal propagated by the antenna;
the hardware decryption system performs time domain inversion normalization processing on the received wireless electromagnetic wave signals, compresses and converts the received wireless electromagnetic wave signals into a microwave narrow pulse train form, and the compression and conversion method is opposite to the process of generating a long pulse train by the hardware encryption system;
the decoding system converts the narrow pulse string obtained by the hardware decryption system into a data string with the format of 0,1 according to the 0,1 coding transmission protocol;
the receiving and displaying system translates the data string with the format of 0,1 into the original information to be transmitted according to the specific coding rule.
A novel communication hardware encryption method based on pulse compression,
converting the information to be transmitted into a data string with the format of 0,1 according to a specific coding rule; selecting a system carrier frequency f 1 Generating carrier frequency f 1 The narrow pulse with different pulse width forms a narrow pulse signal library;
according to the 0,1 coding transmission protocol, randomly selecting narrow pulses with different pulse widths in a narrow pulse signal library, and converting a data string with the format of 0,1 into a microwave narrow pulse string;
utilizing a microwave narrow pulse train to excite a pulse compression cavity to obtain a long pulse train expressed in a random signal combination mode;
the long pulse string is sent at a sending end, and a receiving end receives the long pulse string;
performing time domain inversion normalization processing on the long pulse train at a receiving end, and then compressing and converting the long pulse train into a microwave narrow pulse train form by using a pulse compression cavity;
converting the converted narrow pulse string into a data string with the format of 0,1 according to the 0,1 coding transmission protocol;
the data string in format 0,1 is translated into the original information to be transmitted.
The microwave narrow pulse train has a narrow pulse width T 1 In the order of ns, N narrow pulses correspond to a signal number 0, or 1, where N.gtoreq.2, and the pulse width T of N narrow pulses 1 Different from each other.
The long pulse train and the pulse width T of the long pulse 2 In the order of us, each long pulse corresponds to a signal number 0, or 1.
The time domain inversion normalization process specifically comprises the following steps: length in time T 2 And performing time domain inversion normalization processing to obtain an inversion normalization response signal.
The pulse compression cavity adopts a rectangular metal cavity.
Compared with the prior art, the invention has the advantages that:
(1) The novel communication hardware encryption method based on pulse compression completes the transmission of specific information by adopting the random combination of a plurality of random signals. Because the random signals do not bear any information, the signals are in the form of random noise, and therefore the transmission signals do not bear any information in the transmission process, and the safety is extremely high;
(2) The novel communication hardware encryption method based on pulse compression is based on the inherent randomness of response processing of special hardware to the excitation narrow pulse signal, so that the method has uniqueness, and the uniqueness can be flexibly changed;
(3) According to the novel communication hardware encryption method based on pulse compression, through random combination of various random signals, dominant content of a transmission signal can have various randomness and various signal forms, and the transmission signal is expressed in a continuous wave signal form in a time domain, so that stable transmission of secret information can be effectively realized, and the possibility of interception of effective information is greatly reduced.
Drawings
FIG. 1 is a block diagram of the hardware encryption system of the present invention;
FIG. 2 is a diagram showing the relationship between the received pulse and the transmission information according to the embodiment of the present invention;
fig. 3 is a schematic diagram of an electromagnetic physical encryption process based on pulse compression in the present invention.
Reference numerals:
1-transmitting system, 2-hardware encryption system, 3-coding system, 4-radiation antenna, 5-receiving antenna, 6-hardware decryption system, 7-decoding system, 8-receiving and displaying system, 9-microwave narrow pulse pair, 10-arbitrary waveform generator, 11-transmitting end large-scale metal cavity, 12-microwave narrow pulse response signal, 13-microwave narrow pulse response inversion signal, 14-receiving end large-scale metal cavity, 15-compressed narrow pulse pair.
Detailed Description
Based on the transmission encryption idea, the invention provides a novel communication hardware encryption scheme based on pulse compression, which is based on the principle that information to be transmitted is converted into a narrow pulse combined signal with a certain random sequence, then the narrow pulse combined signal is converted into a long pulse signal by utilizing a pulse compression cavity, signal transmission is realized through the transmission and the reception of the long pulse signal, and the transmission signal does not bear encryption information (dominant information). After receiving the transmitted signal, the receiver performs encryption hardware decompression processing on the transmitted signal to obtain a certain narrow pulse combination, and the obtained narrow pulse combination performs information extraction according to a certain transmission protocol to obtain the transmitted information. The communication hardware encryption scheme is similar to the inverse application of unclonable functions, namely, the transmission of encryption information is realized through random combination of various random signals. Since the random signals do not bear any information (dominant) and the signals are in the form of random noise, the signals are transmitted in the transmission process without bearing any information (dominant), and the encrypted communication can be effectively realized.
For the purpose of making the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention will be described in further detail below with reference to the accompanying drawings.
An encrypted communication system as shown in fig. 1 is first established, which mainly comprises a transmission system 1, a hardware encryption system 2, an encoding system 3, a radiation antenna 4, a receiving antenna 5, a hardware decryption system 6, a decoding system 7, and a receiving and displaying system 8.
The transmission system 1 converts the information to be transmitted into english text information, i.e. alphabetically, and simultaneously converts the english text information into a data string with format of 0,1 according to the alphabetic codes of table 1.
The encoding system 3 converts the data string in 0,1 format into a microwave narrow burst according to the 0,1 code transmission protocol. The 0,1 code transmission protocol is the corresponding relation between the number 0 or 1 and the microwave narrow pulse (namely the code book of the number 0 or 1 and the microwave narrow pulse). The microwave here has a narrow pulse width T 1 On the order of ns. N microwave narrow pulses correspond to a signal number 0, or 1, where N.gtoreq.2, and the pulse width T of N narrow pulses 1 Different from each other. Preferably, T1 has a value in the range of 2ns to 10nsThe amplitude variation range of the response signal (namely the long pulse in the following description) of the microwave narrow pulse can be kept not too large, and the response signal is easier to measure and obtain.
The hardware encryption system 2 encrypts the microwave narrow pulse train into a long pulse train, which is represented in the form of a random signal combination. The long pulse train signal obtained by encrypting the microwave narrow pulse train is a response signal of the microwave narrow pulse signal for exciting the hardware encryption system 2, and the response signal is expressed as pulse width T 2 For a random signal of the order us, no information is displayed (carrier frequency information only). N microwave narrow pulses correspond to a signal number 0, or 1, and thus, at time T when encoded 2 N microwave narrow pulses corresponding to the number 0 or 1 are encoded therein, so that when the microwave narrow pulse signal excites the hardware encryption system 2, the output length is T 2 Is a random signal, and has a pulse length T 2 Corresponds to a signal number 0, or 1.
The radiating antenna 4 transmits the random signal combination for transmission over a wireless transmission link. The radiation antenna 4 is a broadband antenna, and the bandwidth thereof covers the working frequency band of the long pulse train.
The receiving antenna 5 receives the propagated radio wave signal with the same bandwidth as the radiating antenna 4.
The hardware decryption system 6 compresses and converts the received electromagnetic wave signal into the form of a narrow pulse train corresponding to the narrow pulse train sequence generated by the encoding system 3.
The decoding system 7 converts the narrow burst output by the hardware decryption system 6 into a 0,1 data burst according to the 0,1 transmission protocol. The 0,1 code transmission protocol according to which the decoding system 7 is based and the 0,1 code transmission protocol according to which the encoding system 3 is based are the same 0,1 code transmission protocol.
The receiving and display system 8 translates the 0,1 data string into a communication transmission of information.
Therefore, the hardware encryption system is characterized in that the hardware encryption system 2 and the hardware decryption system 6 are arranged at the core of the system, the hardware encryption system 2 and the hardware decryption system 6 are pulse compression cavities, and the hardware encryption is mainly realized by a pulse compression method.
The communication hardware encryption system and method based on pulse compression are realized based on electromagnetic wave pulse compression, and the key point is to realize the correspondence between the compressed pulse waveform and the transmission information. Pulse extraction can be realized only by a specific pulse compression method, and corresponding 0-1 transmission signals are obtained according to a transmission protocol, so that transmitted encryption information is obtained.
As shown in fig. 3, the transmit hardware encryption process includes the steps of: first, the carrier frequency f of the system is selected 1 Then generates carrier frequency f 1 Is a microwave narrow pulse (pulse width T) 1 On the order of ns) and then converts the information to be transmitted into a different microwave narrow pulse combined signal according to the transmission protocol, after which the combined narrow pulse signal is used to excite the encryption hardware. The encryption hardware is a pulse compression cavity, and when the pulse compression cavity is excited by microwave narrow pulse, the output response signal is a long pulse signal with wide pulse width and reduced amplitude (the pulse width is T) 2 ) The long pulse signal is in the form of random noise. The narrow pulses of different pulse widths excite the pulse compression chambers in response to the difference in signals. Since the narrow impulse response signals of a plurality of different pulse widths appear as random signals, the signals themselves appear as random noise, thus realizing hardware encryption of the signals.
The pulse compression cavity is a rectangular metal cavity, and the size of the rectangular metal cavity is carrier frequency f to ensure the compression effect 1 The wavelength is 10 times or more, and in order to reduce the influence of loss, it is preferable that the inner surface of the metal cavity is a low-loss surface, and gold plating or silver plating is performed.
The receiving hardware decryption process comprises the following steps: firstly, a receiving antenna receives a received combined long-pulse random response signal, and the received long-pulse random response signal is in time length T 2 Performing time-domain inversion normalization (i.e. time length T 2 Intercepting the received signal, performing sequence inversion processing, and leveling the signal amplitude to obtain an inversion normalization response signal. Will obtain the inverse normalized response signal, which is fed into the decryption hardware (pulseAnd the compression cavity is punched, so that a response signal of the microwave narrow pulse excitation pulse compression cavity can be compressed into a corresponding narrow pulse signal). When different narrow pulse response signals are combined, the pulse compression chamber may compress the combined response into a combination of corresponding narrow pulse signals.
Examples
The encryption communication principle and the decryption method are described below in a specific embodiment example.
0-1 transport protocol:
according to the most conventional encryption method, a simplest codebook is first constructed, which can be considered as the first encryption of information, set as a key 1, and 26 english letters are represented by different numbers, as shown in table 1.
Table 1: key 1 alpha-numeric correspondence table (i.e., 0-1 transmission protocol)
00000 00001 00010 00011 00100 00101 00110 00111 01000
A B C D E F G H I
01001 01010 01011 01100 01101 01110 01111 10000 10001
J K L M N O P Q R
10010 10011 10100 10101 10110 10111 11000 11001
S T U V W X Y Z
Assuming that the data rate to be transmitted is 1Mbit/s, 1us can be selected as one output unit in the time dimension, and if two 1ns pulses are continuously output within 1us time and the pulse interval is less than 100ns, the signal is set to be '0'; if a 1ns pulse and a 2ns pulse are continuously output for 1us time and the pulse interval is less than 100ns, the signal is set to "1". If a word "OK" needs to be transmitted, the pulse received by the receiver is as shown in fig. 2.
Looking at the received pulse versus transmitted information graph of fig. 2, it can be found that at the end of each us, the corresponding number is "0" if the output pulse width is 1ns, and the corresponding number is "1" if the output pulse width is 2 ns. However, it is observed that, whether the 1us end outputs 1ns or 2ns, the front end outputs 1ns at a different time interval from the front end, and this time interval may be randomly varied within a wide range, but in order to avoid confusion between output pulses in two connection periods, assuming that the output interval of two consecutive pulses is set to be 100ns at maximum, any interval within 100ns is theoretically selectable, thus meaning that there are infinite encoding modes corresponding to "0" and infinite encoding modes corresponding to "1".
The encryption method comprises the following steps:
if two ns-level narrow pulses with different pitches continuously output within 1us are considered as the original codes, which are not called pulse pairs, the most important step is the most central step in the next, namely, the pulse pairs are physically encrypted by using an electromagnetic wave path coding method. The center carrier frequency of ns-level narrow pulses can be determined first, which can be selected in theory between several GHz and several hundred GHz, here taking 2.85GHz as the center carrier frequency, and taking two pulse pairs with continuous output of 1ns as an example, physical coding encryption is performed.
Firstly, a central carrier frequency 2.85GHz pulse pair with a pulse width of 1ns is compiled by a computer, the distance t between the two pulses can be arbitrarily selected within 100ns, if t1 and t2 … tn are selected, data are input to any waveform generator for each pulse pair with fixed spacing, the random waveform generator generates the pulse pair compiled by the computer, the pulse pair is input to a metal scattering cavity, a long pulse (usually with a plurality of us) with gradually attenuated amplitude is obtained at an output port, sampling is carried out by a high-speed oscilloscope, 1us length data are intercepted and input to the computer for time sequence inversion, frequency phase information is kept unchanged, the amplitude of the signal is leveled with the maximum value, and an encrypted signal corresponding to the pulse pair with the spacing t1 and t2 … tn can be obtained.
There are two significant features in the encryption process: first, there may be countless encryption pulses corresponding to the number "0" with a pulse width of 1us and with completely different phase information; second, the frequency and phase information of the encrypted pulse is random, and even the encryptor does not know the specific key. Likewise, it is also possible to generate a very large number of encrypted pulses having a pulse width of 1us and having completely different phase information, corresponding to the number "1".
As previously described, when transmitting a word "OK", the recipient eventually needs to obtain the information of "01110 01010". Corresponding to key 1, then the pulse pair information as shown in fig. 2 needs to be obtained. The sender randomly selects to continuously send long pulses with the pulse width of 1us corresponding to 0 or 1, and the receiver or the stealer can obtain an electromagnetic wave with the pulse width of 10us, and the electromagnetic wave with the length of 10us can be combined in countless ways, but the electromagnetic wave corresponds to the same information 01110 01010. As shown in fig. 3, the core of decryption is to restore an electromagnetic wave of 10us length to 10 pulse pairs with output time intervals less than 100ns, and since the 10us long pulse is randomly encrypted, pulse pair reproduction by mathematical methods only has theoretical possibility and thus has very reliable encryption performance.
The only efficient way to restore the 10us long pulse shown in fig. 3 to a pulse pair similar to that shown in fig. 2 is that the receiver has a metal scattering cavity with exactly the same structure as the sender, the original input and output ends of the cavity are interchanged, and the 10us long pulse is input into the metal scattering cavity, so that the pulse pair expressing relevant '0' and '1' information can be restored, and then the information to be truly transmitted by the sender is further decoded by combining the key 1.
What is not described in detail in the present specification is a well known technology to those skilled in the art.

Claims (10)

1. A novel communication hardware encryption system based on pulse compression is characterized in that: the system comprises a sending system (1), a hardware encryption system (2), an encoding system (3), a radiation antenna (4), a receiving antenna (5), a hardware decryption system (6), a decoding system (7) and a receiving and displaying system (8), wherein:
the transmitting system (1) converts the information to be transmitted into a data string with the format of 0,1 according to a specific coding rule; selecting a system carrier frequency f 1 Generating carrier frequency f 1 The narrow pulse with different pulse width forms a narrow pulse signal library;
the coding system (3) randomly selects narrow pulses with different pulse widths in the narrow pulse signal library according to a 0,1 coding transmission protocol, and converts a data string with the format of 0,1 into a microwave narrow pulse string;
the hardware encryption system (2) utilizes the microwave narrow pulse train to excite the pulse compression cavity to convert the microwave narrow pulse train into a long pulse train expressed in a random signal combination mode;
a radiation antenna (4) for transmitting the long pulse train in the form of random signal combination by wireless electromagnetic wave through a wireless transmission link;
a receiving antenna (5) for receiving the radio electromagnetic wave signal propagated;
the hardware decryption system (6) performs time domain inversion normalization processing on the received wireless electromagnetic wave signals, compresses and converts the received wireless electromagnetic wave signals into a microwave narrow pulse train form, and the compression and conversion method is opposite to the process of generating the long pulse train by the hardware encryption system (2);
the decoding system (7) converts the narrow pulse string obtained by the hardware decryption system (6) into a data string with the format of 0,1 according to the 0,1 coding transmission protocol;
the receiving and displaying system (8) translates the data string in format 0,1 into the original information to be transmitted according to specific coding rules.
2. The novel pulse compression-based communication hardware encryption system of claim 1, wherein: the microwave narrow pulse train has a narrow pulse width T 1 In the order of ns, N narrow pulses correspond to a signal number 0, or 1, where N.gtoreq.2, and the pulse width T of N narrow pulses 1 Different from each other.
3. The novel pulse compression-based communication hardware encryption system of claim 1, wherein: the long pulse train and the pulse width T of the long pulse 2 In the order of us, each long pulse corresponds to a signal number 0, or 1.
4. A novel communication hardware encryption system based on pulse compression according to claim 3, characterized in that: the time domain inversion normalization process specifically comprises the following steps: length in time T 2 And performing time domain inversion normalization processing to obtain an inversion normalization response signal.
5. The novel pulse compression-based communication hardware encryption system of claim 1, wherein: the pulse compression cavity adopts a rectangular metal cavity.
6. A novel communication hardware encryption method based on pulse compression is characterized in that:
converting the information to be transmitted into a data string with the format of 0,1 according to a specific coding rule; selecting a system carrier frequency f 1 Generating carrier frequency f 1 The narrow pulse with different pulse width forms a narrow pulse signal library;
according to the 0,1 coding transmission protocol, randomly selecting narrow pulses with different pulse widths in a narrow pulse signal library, and converting a data string with the format of 0,1 into a microwave narrow pulse string;
utilizing a microwave narrow pulse train to excite a pulse compression cavity to obtain a long pulse train expressed in a random signal combination mode;
the long pulse string is sent at a sending end, and a receiving end receives the long pulse string;
performing time domain inversion normalization processing on the long pulse train at a receiving end, and then compressing and converting the long pulse train into a microwave narrow pulse train form by using a pulse compression cavity;
converting the converted narrow pulse string into a data string with the format of 0,1 according to the 0,1 coding transmission protocol;
the data string in format 0,1 is translated into the original information to be transmitted.
7. The pulse compression-based novel communication hardware encryption method according to claim 6, wherein: the width T of the narrow pulse 1 In the order of ns, N narrow pulses correspond to a signal number 0, or 1, where N.gtoreq.2, and the pulse width T of N narrow pulses 1 Different from each other.
8. The pulse compression-based novel communication hardware encryption method according to claim 6, wherein: the long pulse train and the pulse width T of the long pulse 2 In the order of us, each long pulse corresponds to a signal number 0, or 1.
9. Novel pulse compression-based communication hard as claimed in claim 8The piece encryption method is characterized in that: the time domain inversion normalization process specifically comprises the following steps: length in time T 2 And performing time domain inversion normalization processing to obtain an inversion normalization response signal.
10. The pulse compression-based novel communication hardware encryption method according to claim 6, wherein: the pulse compression cavity adopts a rectangular metal cavity.
CN202111363609.1A 2021-11-17 2021-11-17 Novel communication hardware encryption system and method based on pulse compression Active CN114221786B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111363609.1A CN114221786B (en) 2021-11-17 2021-11-17 Novel communication hardware encryption system and method based on pulse compression

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111363609.1A CN114221786B (en) 2021-11-17 2021-11-17 Novel communication hardware encryption system and method based on pulse compression

Publications (2)

Publication Number Publication Date
CN114221786A CN114221786A (en) 2022-03-22
CN114221786B true CN114221786B (en) 2024-03-26

Family

ID=80697420

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111363609.1A Active CN114221786B (en) 2021-11-17 2021-11-17 Novel communication hardware encryption system and method based on pulse compression

Country Status (1)

Country Link
CN (1) CN114221786B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB1279224A (en) * 1969-02-06 1972-06-28 Nokia Oy Ab Method of and apparatus for enciphering and deciphering signals
CN1937008A (en) * 2005-09-22 2007-03-28 富士通株式会社 Encryption method, cryptogram decoding method, encryptor, cryptogram decoder, transmission/reception system, and communication system
CN102932142A (en) * 2012-10-08 2013-02-13 中国科学院西安光学精密机械研究所 Optical data signal encryption and decryption method in optical fiber communication system
CN103427978A (en) * 2012-05-17 2013-12-04 哈尔滨职业技术学院 Wireless Chinese character transmitting device based on chaotic encryption system
CN108462538A (en) * 2018-03-07 2018-08-28 桂林电子科技大学 A kind of Laser Underwater cause sound digital communication system and method for jumping time slot
JP2019158670A (en) * 2018-03-14 2019-09-19 株式会社東芝 Radar system and radar signal processing method
CN111246469A (en) * 2020-03-05 2020-06-05 北京花兰德科技咨询服务有限公司 Artificial intelligence secret communication system and communication method
CN111585744A (en) * 2020-05-26 2020-08-25 广东工业大学 Video transmission method and system based on hardware codec
CN113225048A (en) * 2021-03-31 2021-08-06 西安空间无线电技术研究所 GW (ground wire) high-power microwave pulse generation device and generation method
CN113258907A (en) * 2021-03-31 2021-08-13 西安空间无线电技术研究所 Device and method for acquiring ultrahigh repetition frequency and high power microwaves based on pulse compression technology

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101014060B (en) * 2007-02-02 2010-05-19 东南大学 Voice encryption method for GSM handset with anti longterm prediction rule pulse excitation compression coding
US11387864B2 (en) * 2019-06-05 2022-07-12 Farid Dowla Pulse based wideband signaling

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB1279224A (en) * 1969-02-06 1972-06-28 Nokia Oy Ab Method of and apparatus for enciphering and deciphering signals
CN1937008A (en) * 2005-09-22 2007-03-28 富士通株式会社 Encryption method, cryptogram decoding method, encryptor, cryptogram decoder, transmission/reception system, and communication system
CN103427978A (en) * 2012-05-17 2013-12-04 哈尔滨职业技术学院 Wireless Chinese character transmitting device based on chaotic encryption system
CN102932142A (en) * 2012-10-08 2013-02-13 中国科学院西安光学精密机械研究所 Optical data signal encryption and decryption method in optical fiber communication system
CN108462538A (en) * 2018-03-07 2018-08-28 桂林电子科技大学 A kind of Laser Underwater cause sound digital communication system and method for jumping time slot
JP2019158670A (en) * 2018-03-14 2019-09-19 株式会社東芝 Radar system and radar signal processing method
CN111246469A (en) * 2020-03-05 2020-06-05 北京花兰德科技咨询服务有限公司 Artificial intelligence secret communication system and communication method
CN111585744A (en) * 2020-05-26 2020-08-25 广东工业大学 Video transmission method and system based on hardware codec
CN113225048A (en) * 2021-03-31 2021-08-06 西安空间无线电技术研究所 GW (ground wire) high-power microwave pulse generation device and generation method
CN113258907A (en) * 2021-03-31 2021-08-13 西安空间无线电技术研究所 Device and method for acquiring ultrahigh repetition frequency and high power microwaves based on pulse compression technology

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
High-energy few-cycle pulses: post-compression techniques;Tamas Nagy;Peter Simon;Laszlo Veisz;《Advances in Physics: X》;20211130;第第6卷卷(第第1期期);1-41页 *
宽带线性调频信号的光学生成技术及脉冲压缩性能分析;朱秋晨;《中国优秀硕士学位论文全文数据库 信息科技辑》;20190215;I136-1397页 *
翟畅 ; 方进勇 ; 吴江牛 ; 黄惠军 ; 邱卓越.基于新型高功率微波的雷达探测技术研究 .《微波学报》.2023,1-5页. *

Also Published As

Publication number Publication date
CN114221786A (en) 2022-03-22

Similar Documents

Publication Publication Date Title
Jeeva et al. Comparative analysis of performance efficiency and security measures of some encryption algorithms
JP3963280B2 (en) Apparatus and method for ensuring communication safety based on channel characteristics
Rahim Combination of the Blowfish and Lempel-Ziv-Welch algorithms for text compression
US20070028088A1 (en) Polymorphic encryption method and system
Lü et al. A new spatiotemporally chaotic cryptosystem and its security and performance analyses
WO2012046463A1 (en) Optical transmission device and receiving device for yuen encryption, optical transmission method and receiving method for yuen encryption, and encrypted communication system
Peng et al. An Ultra‐Lightweight Encryption Scheme in Underwater Acoustic Networks
Holenstein et al. One-way secret-key agreement and applications to circuit polarization and immunization of public-key encryption
CN116669022A (en) Data safety transmission method for wireless communication system
Barros et al. Strong secrecy for wireless channels (invited talk)
Ashila et al. Hybrid AES-Huffman coding for secure lossless transmission
Pérez-Resa et al. A new method for format preserving encryption in high-data rate communications
Zibideh et al. Modified data encryption standard encryption algorithm with improved error performance and enhanced security in wireless fading channels
CN114221786B (en) Novel communication hardware encryption system and method based on pulse compression
Nagaraj et al. Re-visiting the One-Time Pad
Rahim SMS encryption using word auto key encryption
Habib et al. A hybrid cryptosystem based on latin square and the modified BB84 quantum key distribution
Bloch et al. Wireless information-theoretic security-part i: Theoretical aspects
Wang Using secret spreading codes to enhance physical layer security in wireless communication
He et al. Beidou short message communication encryption scheme with improved SM4 algorithm
IE20010317A1 (en) Keyless Encryption System and Method
Lu et al. Performance of lattice coset codes on Universal Software Radio Peripherals
Makala et al. A fast encryption and compression technique on SMS data
CN115276824B (en) Quantum noise stream encryption transmitter, receiver, communication system and method
Abdelgader et al. Design of a secure file transfer system using hybrid encryption techniques

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant