CN115801238A - Communication method, communication apparatus, electronic device, and storage medium - Google Patents

Communication method, communication apparatus, electronic device, and storage medium Download PDF

Info

Publication number
CN115801238A
CN115801238A CN202211364307.0A CN202211364307A CN115801238A CN 115801238 A CN115801238 A CN 115801238A CN 202211364307 A CN202211364307 A CN 202211364307A CN 115801238 A CN115801238 A CN 115801238A
Authority
CN
China
Prior art keywords
sequence
encryption
artificial noise
identity authentication
cluster
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211364307.0A
Other languages
Chinese (zh)
Inventor
徐晓娥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Financial Technology Co Ltd
Original Assignee
Bank of China Financial Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Financial Technology Co Ltd filed Critical Bank of China Financial Technology Co Ltd
Priority to CN202211364307.0A priority Critical patent/CN115801238A/en
Publication of CN115801238A publication Critical patent/CN115801238A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a communication method, a communication device, electronic equipment and a storage medium. The method applied to the sending terminal equipment comprises the following steps: performing artificial noise signal injection on one or more signals to be transmitted to obtain one or more encryption sequences, and storing the artificial noise signal injection positions; randomly clustering a total codebook consisting of one or more encrypted sequences to obtain a plurality of non-empty clusters, and randomly dividing each non-empty cluster into a plurality of sub-clusters; randomly coding the serial number of the non-empty cluster where each encryption sequence is located to obtain a first serial number corresponding to each encryption sequence, and sending the first serial number and the encryption sequence to receiving end equipment so that the receiving end equipment can perform identity authentication according to the first serial number; and generating a private key corresponding to the encryption sequence based on the artificial noise signal injection position so that the receiving end equipment decodes the encryption sequence according to the private key after passing the identity authentication. The invention adopts the key generation mode, thereby improving the randomness and the transmission security of the key.

Description

Communication method, communication apparatus, electronic device, and storage medium
Technical Field
The present invention relates to the field of communications technologies, and in particular, to an application communication method, an application communication apparatus, an electronic device, and a storage medium.
Background
In a communication system, the randomness of a key is an important index for evaluating the predictability of the key, and more specifically, the keys generated by two communication parties have enough randomness to support their secret communication. In the prior art, a technical scheme for generating a secret key based on a signal impulse response is mostly adopted, and the scheme is based on a shared random source, such as the impulse response, the frequency selectivity, the received signal strength and the like of a reciprocal channel. Under this scheme, an eavesdropper can easily predict the content in the key once it has obtained a pattern of keys. The eavesdropper has infinite calculation capability, and if the eavesdropper obtains the impulse response rule of the channel, the safety of information transmission is reduced.
Disclosure of Invention
The invention provides a communication method, a communication device, electronic equipment and a storage medium, which aim to overcome the defect of low information transmission safety caused by generating a key mode based on signal impulse response in the prior art and realize the increase of the randomness of generating a key and the safety of information transmission.
In a first aspect, the present invention provides a communication method, applied to a sending end device, including:
injecting artificial noise signals into one or more signals to be transmitted to obtain one or more encryption sequences, and storing injection positions of the artificial noise signals;
randomly clustering a total codebook formed by the one or more encrypted sequences to obtain a plurality of non-empty clusters, and randomly dividing each non-empty cluster into a plurality of sub-clusters;
randomly coding the serial number of the non-empty cluster where each encryption sequence is located to obtain a first serial number corresponding to each encryption sequence, and sending the first serial number and the encryption sequence to receiving end equipment so that the receiving end equipment can perform identity authentication according to the first serial number;
and generating a private key corresponding to the encryption sequence based on the injection position of the artificial noise signal, so that the receiving end equipment can decode the encryption sequence according to the private key after passing the identity authentication.
In some embodiments, the injecting artificial noise signals into the one or more signals to be transmitted to obtain one or more encryption sequences includes:
one or more signals to be transmitted are randomly coded to obtain one or more code word sequences;
and injecting an artificial noise signal into each code word sequence, and performing confusion processing on each code word sequence injected with the artificial noise signal to generate one or more encryption sequences.
In some embodiments, the generating a secret key corresponding to the encryption sequence based on the injection position of the artificial noise signal includes:
and taking the injection position of the artificial noise signal as a random source, and mapping the random source to be a private key corresponding to the encryption sequence through a consistent uniform hash function.
In some embodiments, the storing the injection location of the artificial noise signal comprises:
storing the injection position of the artificial noise signal in a first-in first-out queue;
before the injecting position of the artificial noise signal is used as a random source and is mapped to a private key corresponding to the encryption sequence through a consistent uniform hash function, the method further includes:
and reading the injection position of the artificial noise signal from the first-in first-out queue.
In a second aspect, the present invention provides a communication method, applied to a receiving end device, including:
receiving an encryption sequence and a first sequence number, determining a target sequence in the received encryption sequence, and determining a sequence number of a non-empty cluster where the target sequence is located based on the first sequence number;
determining the sequence number of a sub-cluster where the target sequence is located according to the sequence number of a non-empty cluster where the target sequence is located and a random clustering process, and performing identity authentication according to the sequence number of the sub-cluster where the target sequence is located;
and after the identity authentication is passed, decoding the target sequence according to the private key provided by the sending end equipment to obtain a signal sent by the sending end equipment.
In some embodiments, the performing identity authentication according to the sequence number of the sub-cluster in which the target sequence is located includes:
and if the serial number of the sub-cluster where the target sequence is located is consistent with the serial number of the sub-cluster of the sending end equipment as the identity authentication, determining that the identity authentication between the receiving end equipment and the sending end equipment is passed.
In some embodiments, the decoding, according to the secret key provided by the sending end device, the encrypted sequence to obtain a signal sent by the sending end device includes:
and according to the private key provided by the sending end equipment, removing the artificial noise signals in the target sequence bit by bit to obtain the signals sent by the sending end equipment.
In a third aspect, the present invention provides a sending end apparatus, including:
the noise injection unit is used for injecting artificial noise signals into one or more signals to be transmitted to obtain one or more encryption sequences and storing injection positions of the artificial noise signals;
a random clustering unit, configured to perform random clustering on a total codebook formed by the one or more encrypted sequences to obtain a plurality of non-empty clusters, and randomly divide each non-empty cluster into a plurality of sub-clusters;
the first sending unit is used for randomly coding the serial number of the non-empty cluster where each encryption sequence is located to obtain a first serial number corresponding to each encryption sequence, and sending the first serial number and the encryption sequence to receiving end equipment so that the receiving end equipment can perform identity authentication according to the first serial number;
and the key generation unit is used for generating a private key corresponding to the encryption sequence based on the injection position of the artificial noise signal so that the receiving end equipment can decode the encryption sequence according to the private key after passing the identity authentication.
In a fourth aspect, the present invention provides a receiving end apparatus, including:
the first determining unit is used for receiving the encrypted sequence and the first sequence number, determining a target sequence in the received encrypted sequence, and determining the sequence number of a non-empty cluster where the target sequence is located based on the first sequence number;
the identity authentication unit is used for determining the sequence number of the sub-cluster where the target sequence is located according to the sequence number of the non-empty cluster where the target sequence is located and the random clustering process, and performing identity authentication according to the sequence number of the sub-cluster where the target sequence is located;
and the decoding unit is used for decoding the target sequence according to the private key provided by the sending end equipment after the identity authentication is passed, so as to obtain a signal sent by the sending end equipment.
In a fifth aspect, the present invention also provides an electronic device, which includes a memory, a processor and a computer program stored in the memory and executable on the processor, wherein the processor implements the communication method according to any one of the first aspect or the second aspect when executing the program.
In a sixth aspect, the present invention also provides a non-transitory computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the communication method according to any one of the first or second aspects described above.
In a seventh aspect, the present invention also provides a computer program product comprising a computer program which, when executed by a processor, performs the method of any of the first or second aspects described above.
According to the communication method, the communication device, the electronic equipment and the storage medium, the artificial noise signal is injected into the sending signal, and the position of the artificial noise in the sequence is used as a random source, so that the randomness of generating the key and the safety of information transmission are increased.
Drawings
In order to more clearly illustrate the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the description of the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a flow chart of a communication method provided by the present invention;
FIG. 2 is a second flowchart of a communication method provided by the present invention;
fig. 3 is a schematic structural diagram of a transmitting end apparatus provided in the present invention;
fig. 4 is a schematic structural diagram of a receiving end device provided in the present invention;
fig. 5 is a schematic structural diagram of an electronic device provided in the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings, and it is obvious that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Aiming at the defects of low randomness of key generation and low information transmission safety in the prior art, the invention provides a communication method, a communication device, electronic equipment and a storage medium, so that the randomness of key generation and the information transmission safety are increased. The noise source of the underwater acoustic channel is complex, and has the characteristics of high delay and low speed, compared with a land communication system, the underwater acoustic communication system is more complex, and the invention takes the complex underwater acoustic communication system as an example of an application environment. The invention is described below in connection with fig. 1-5.
Fig. 1 is a schematic flow chart of a communication method provided by the present invention, as shown in fig. 1, the communication method includes:
step 100, injecting artificial noise signals into one or more signals to be transmitted to obtain one or more encryption sequences, and storing injection positions of the artificial noise signals;
step 101, performing random clustering on a total codebook formed by the one or more encryption sequences to obtain a plurality of non-empty clusters, and randomly dividing each non-empty cluster into a plurality of sub-clusters;
step 102, randomly encoding a serial number of a non-empty cluster in which each encryption sequence is located to obtain a first serial number corresponding to each encryption sequence, and sending the first serial number and the encryption sequence to a receiving end device so that the receiving end device can perform identity authentication according to the first serial number;
and 103, generating a private key corresponding to the encrypted sequence based on the injection position of the artificial noise signal, so that the receiving end equipment decodes the encrypted sequence according to the private key after passing the identity authentication.
In particular, in an underwater acoustic communication system, researchers mostly adopt underwater sound as a communication carrier, and although the propagation speed of an underwater acoustic signal is low, the attenuation of the acoustic wave under water is small, which is beneficial to the complete transmission of the signal. The artificial noise technology solves the problem that a transmitting base station and a legal receiving user cannot obtain the channel state of an eavesdropper, and the eavesdropper is interfered by injecting artificial noise into one or more transmitted signals, the signal-to-noise ratio of the eavesdropper is attenuated, the channel condition of the eavesdropper is damaged, and the signal reception of a legal receiving end is not greatly influenced. The artificial noise reduces the signal-to-noise ratio of the eavesdropping channel, destroys the channel condition of the eavesdropper, and ensures that the secret key is generated at a positive rate under the assistance of the artificial noise. Even if the accurate channel state of an eavesdropper cannot be obtained, the safe transmission of the information can be realized through the interference of artificial noise, and the information leakage rate is reduced.
Herein, artificial noise refers to audio segments such as: car horns, broadcasts, and any sound segments of an audio clip.
An eavesdropper generally has high computational power, and if the encryption sequence is directly transmitted in an underwater acoustic channel, the eavesdropper may reject the encrypted sequence or destroy the encrypted sequence by a legal receiving end. The invention therefore proposes to divide the total codebook of one or more encrypted sequences randomly and independently into a number of unequal non-empty clusters by random clustering, i.e. each non-empty cluster is composed of a number of sub-clusters. Each non-empty cluster is again randomly and independently divided into a plurality of sub-clusters.
Methods of random clustering are disclosed. In the invention, the random clustering mechanism is assumed to be jointly agreed by the transmitting party and the receiving party. The purpose of random clustering is to generate a sequence number for identity authentication and to protect the encryption sequence. And sending the serial number position information of the encryption sequence by a random clustering method, and receiving the encryption sequence only after a legal receiving end passes the identity authentication of the sending end.
And the legal sending end randomly encodes the serial number of the non-empty cluster where each encryption sequence is located to obtain a first serial number corresponding to each encryption sequence, and sends the first serial number and the encryption sequence to a receiving end device so that the receiving end device can perform identity authentication according to the first serial number. An eavesdropper may listen to the channel and receive the serial number.
And the legal sending end generates a private key corresponding to the encrypted sequence based on the injection position of the artificial noise signal, and the receiving end equipment decodes the encrypted sequence according to the private key after passing the identity authentication, namely, eliminates the artificial noise symbols in the received sequence bit by bit according to the key. After one-time communication is completed, the two parties of legal communication agree on the generation mode of the secret key. And when the identity authentication is completed, the receiving end determines the information of the legal transmitting end. The key is not transmitted publicly through a channel and is known only by an authenticated recipient.
In the embodiment, an artificial noise signal is injected into the transmission signal to generate interference on an eavesdropper, so that the signal-to-noise ratio of an eavesdropping channel is attenuated to destroy the channel condition of the eavesdropper, the safe transmission of information is realized, and the information leakage rate is reduced. Meanwhile, the injection position of the artificial noise signal is used as a random source, so that the randomness of the generated key is increased.
In some embodiments, the injecting artificial noise signals into the one or more signals to be transmitted to obtain one or more encryption sequences includes:
one or more signals to be transmitted are randomly coded to obtain one or more code word sequences;
and injecting an artificial noise signal into each code word sequence, and performing confusion processing on each code word sequence injected with the artificial noise signal to generate one or more encryption sequences.
Specifically, a legal transmitting end randomly encodes one or more signals to be transmitted into a codeword by using a shannon coding method, so as to obtain one or more codeword sequences.
The set of the code word sequences is a subcodebook, the code word sequences of artificial noise signals injected into each code word sequence in the subcodebook are subjected to confusion processing, and a new encryption sequence is generated by using a confusion function. The idea of the confusion function here is: randomly injecting part of data in an input sequence into another sequence to generate a new sequence in an obfuscated mode, and storing the injected position information in a specific array.
In the embodiment, the confusion processing of artificial noise is added in the encoding process, the information concealment is improved, and the stealing difficulty of an eavesdropper is increased.
In some embodiments, the generating a secret key corresponding to the encryption sequence based on the injection position of the artificial noise signal includes:
and taking the injection position of the artificial noise signal as a random source, and mapping the random source to be a private key corresponding to the encryption sequence through a consistent uniform hash function.
And the legal sending end takes the injection position of the artificial noise signal as a random source and maps the random source to a private key corresponding to the encryption sequence through a consistent uniform hash function. Therefore, the possibility that an eavesdropper will steal a message without knowing the private key is low.
And after the identity authentication is passed, the receiving end equipment decodes the encrypted sequence according to the private key, namely, the artificial noise symbols in the receiving sequence are removed bit by bit according to the key. The unidirectionality of the global hash function prevents an eavesdropper from obtaining any relevant information about the secret key during the key verification process of the two communication parties. After one communication is completed, both parties of legal communication agree on the generation mode of the secret key. And when the identity authentication is completed, the receiving end determines the information of the legal transmitting end. The key is not transmitted publicly through a channel and is known only by an authenticated recipient.
In this embodiment, a random source of a key is generated by using randomly injected position information of artificial noise as a key codebook for key generation, so as to improve the randomness of the key.
In some embodiments, the storing the injection location of the artificial noise signal comprises:
storing the injection position of the artificial noise signal in a first-in first-out queue;
before the injecting position of the artificial noise signal is used as a random source and is mapped to a private key corresponding to the encryption sequence through a consistent uniform hash function, the method further includes:
and reading the injection position of the artificial noise signal from the first-in first-out queue.
Specifically, the injection position of the artificial noise is stored in a first-in first-out queue as a random source for subsequent key generation. And the legal sending end reads the injection position of the artificial noise signal from the first-in first-out queue, takes the injection position as a random source, and maps the random source to a private key corresponding to the encryption sequence through a consistent uniform hash function.
In this embodiment, the injection position of the artificial noise signal is stored in a first-in first-out queue, the injection position of the artificial noise signal is read from the first-in first-out queue, and the injection position of the artificial noise signal is used as a random source and is mapped to a secret key corresponding to the encryption sequence through a uniform hash function, so that the randomness of key generation and the security of signal transmission are increased.
Fig. 2 is a second schematic flow chart of the communication method provided by the present invention, as shown in fig. 2, the communication method includes:
step 200, receiving an encryption sequence and a first sequence number, determining a target sequence in the received encryption sequence, and determining a sequence number of a non-empty cluster where the target sequence is located based on the first sequence number;
step 201, determining the sequence number of a sub-cluster where the target sequence is located according to the sequence number of a non-empty cluster where the target sequence is located and a random clustering process, and performing identity authentication according to the sequence number of the sub-cluster where the target sequence is located;
step 202, after the identity authentication is passed, decoding the target sequence according to the private key provided by the sending end device to obtain a signal sent by the sending end device.
Specifically, the legal receiving end searches for a unique sequence which belongs to the same typical sequence as the received encrypted sequence in the observed sequence, and the unique sequence is the target sequence. And decoding the first sequence number to determine the non-empty cluster sequence number of the target sequence.
Methods of random clustering are disclosed. In the invention, the random clustering mechanism is assumed to be jointly agreed by the transmitting party and the receiving party. And the receiving terminal determines the sequence number of the sub-cluster of the target sequence according to the sequence number of the non-empty cluster of the target sequence and the random clustering process, and performs identity authentication between the receiving terminal and the transmitting terminal according to the sequence number of the sub-cluster of the target sequence.
And after the identity authentication is passed, decoding the target sequence according to the private key provided by the sending end equipment, namely, performing bit-by-bit elimination on the artificial noise symbols in the receiving sequence according to the private key to obtain a signal sent by the sending end equipment.
In this embodiment, the identity authentication between the sending end and the receiving end is effectively completed according to the sequence number of the sub-cluster where the target sequence is located. After the identity authentication is passed, the target sequence is decoded according to the private key provided by the sending end device to obtain a signal sent by the sending end device, an identity authentication module is added in the information transmission process, and in order to ensure the correct transmission of the information, the identity authentication module can prevent the sent information from being intentionally tampered by an eavesdropper.
In some embodiments, the performing identity authentication according to the sequence number of the sub-cluster in which the target sequence is located includes:
and if the serial number of the sub-cluster where the target sequence is located is consistent with the serial number of the sub-cluster of the sending end equipment as the identity authentication, determining that the identity authentication between the receiving end equipment and the sending end equipment is passed.
Specifically, the identity authentication between the sending end and the receiving end is performed by the following judgment, and under the condition that the serial number of the sub-cluster where the target sequence is located is consistent with the serial number of the sub-cluster used as the identity authentication by the sending end, the identity authentication between the sending end and the receiving end is completed.
For example, the legal sending end a determines that the serial number of the non-empty cluster where the encryption sequence is located is a1 and the serial number of the sub-cluster is b1, and then randomly encodes the serial number a1 of the non-empty cluster and sends the encoded serial number to the receiving end.
The sequence observed by the legal receiving end B is V, after the serial number a1 of the non-empty cluster sent by the legal sending end is received, a unique sequence X1 which belongs to the same typical sequence with the received encryption sequence is searched from the observed sequence, and then the legal receiving end B determines the serial number of a sub-cluster where the unique sequence is located according to the random clustering process as B2, namely the serial number of the non-empty cluster determined by the unique sequence X1 through the random clustering process is a1, and the serial number of the sub-cluster is B2. When b1= b2, both parties of the legal communication complete identity authentication.
In this embodiment, by determining whether the sequence number of the sub-cluster where the target sequence is located is consistent with the sequence number of the sub-cluster used by the sending end device for identity authentication, it is determined whether the identity authentication between the receiving end device and the sending end device passes. If the two parties are consistent, the identity authentication of the two parties passes, and the communication safety is improved.
In some embodiments, the decoding, according to the private key provided by the sending end device, the encrypted sequence to obtain a signal sent by the sending end device includes:
and according to the private key provided by the sending end equipment, removing the artificial noise signals in the target sequence bit by bit to obtain the signals sent by the sending end equipment.
Specifically, according to a private key provided by the sending terminal device, the private key includes a specific position where an artificial noise signal is injected into a signal sequence, and the sending terminal performs bit-by-bit elimination on the artificial noise signal in the target sequence according to the private key to obtain a signal sent by the sending terminal.
In this embodiment, according to the private key provided by the sending end device, the artificial noise signals in the target sequence are removed bit by bit to obtain the signal sent by the sending end device, so that the randomness of generating the key is increased, and meanwhile, the security of communication is improved.
The following describes a communication apparatus provided by the present invention, and the communication apparatus described below and the communication method described above may be referred to correspondingly.
Fig. 3 is a schematic structural diagram of a transmitting end apparatus provided in the present invention, and as shown in fig. 3, the transmitting end apparatus 300 includes:
a noise injection unit 310, configured to perform artificial noise signal injection on one or more signals to be sent, to obtain one or more encryption sequences, and store injection positions of the artificial noise signals;
a random clustering unit 320, configured to perform random clustering on the total codebook formed by the one or more encrypted sequences to obtain a plurality of non-empty clusters, and randomly divide each non-empty cluster into a plurality of sub-clusters;
a first sending unit 330, configured to randomly encode a serial number of a non-empty cluster in which each encryption sequence is located, obtain a first serial number corresponding to each encryption sequence, and send the first serial number and the encryption sequence to a receiving end device, so that the receiving end device performs identity authentication according to the first serial number;
a key generating unit 340, configured to generate a private key corresponding to the encrypted sequence based on the injection position of the artificial noise signal, so that the receiving end device decodes the encrypted sequence according to the private key after passing the identity authentication.
In some embodiments, the injecting artificial noise signals into the one or more signals to be transmitted to obtain one or more encryption sequences includes:
one or more signals to be transmitted are randomly coded to obtain one or more code word sequences;
and injecting an artificial noise signal into each code word sequence, and performing confusion processing on each code word sequence injected with the artificial noise signal to generate one or more encryption sequences.
In some embodiments, the generating a secret key corresponding to the encryption sequence based on the injection position of the artificial noise signal includes:
and taking the injection position of the artificial noise signal as a random source, and mapping the random source to be a private key corresponding to the encryption sequence through a consistent uniform hash function.
In some embodiments, the storing the injection location of the artificial noise signal comprises:
storing the injection position of the artificial noise signal in a first-in first-out queue;
before the injecting position of the artificial noise signal is used as a random source and is mapped to a private key corresponding to the encryption sequence through a consistent uniform hash function, the method further includes:
and reading the injection position of the artificial noise signal from the first-in first-out queue.
It should be noted that the sending-end communication apparatus provided in the embodiment of the present invention can implement all the method steps implemented by the foregoing communication method embodiment, and can achieve the same technical effect, and detailed descriptions of the same parts and beneficial effects as those of the method embodiment in this embodiment are not repeated herein.
Fig. 4 is a schematic structural diagram of a receiving end apparatus provided in the present invention, as shown in fig. 4, the receiving end apparatus 400 includes:
a first determining unit 410, configured to receive an encrypted sequence and a first sequence number, determine a target sequence in the received encrypted sequence, and determine, based on the first sequence number, a sequence number of a non-empty cluster in which the target sequence is located;
an identity authentication unit 420, configured to determine a sequence number of a sub-cluster where the target sequence is located according to a sequence number of a non-empty cluster where the target sequence is located and a random clustering process, and perform identity authentication according to the sequence number of the sub-cluster where the target sequence is located;
and a decoding unit 430, configured to decode the target sequence according to the private key provided by the sending end device after the identity authentication is passed, so as to obtain a signal sent by the sending end device.
In some embodiments, the performing identity authentication according to the sequence number of the sub-cluster in which the target sequence is located includes:
and if the serial number of the sub-cluster where the target sequence is located is consistent with the serial number of the sub-cluster of the sending end equipment as the identity authentication, determining that the identity authentication between the receiving end equipment and the sending end equipment is passed.
In some embodiments, the decoding, according to the secret key provided by the sending end device, the encrypted sequence to obtain a signal sent by the sending end device includes:
and according to the private key provided by the sending end equipment, eliminating the artificial noise signals in the target sequence bit by bit to obtain the signals sent by the sending end equipment.
It should be noted that, the receiving-end communication apparatus provided in the embodiment of the present invention can implement all the method steps implemented in the foregoing communication method embodiment, and can achieve the same technical effects, and detailed descriptions of the same parts and beneficial effects as those in the method embodiment in this embodiment are omitted here.
Fig. 5 illustrates a physical structure diagram of an electronic device, which may include, as shown in fig. 5: a processor (processor) 510, a communication Interface (Communications Interface) 520, a memory (memory) 530 and a communication bus 540, wherein the processor 510, the communication Interface 520 and the memory 530 communicate with each other via the communication bus 540. Processor 510 may invoke logic instructions in memory 530 to perform a communication method comprising:
injecting artificial noise signals into one or more signals to be transmitted to obtain one or more encryption sequences, and storing injection positions of the artificial noise signals;
randomly clustering a total codebook formed by the one or more encryption sequences to obtain a plurality of non-empty clusters, and randomly dividing each non-empty cluster into a plurality of sub-clusters;
randomly coding the serial number of the non-empty cluster where each encryption sequence is located to obtain a first serial number corresponding to each encryption sequence, and sending the first serial number and the encryption sequence to receiving end equipment so that the receiving end equipment can perform identity authentication according to the first serial number;
and generating a private key corresponding to the encryption sequence based on the injection position of the artificial noise signal, so that the receiving end equipment can decode the encryption sequence according to the private key after passing the identity authentication.
Furthermore, the logic instructions in the memory 530 may be implemented in the form of software functional units and stored in a computer readable storage medium when the software functional units are sold or used as independent products. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
In another aspect, the present invention also provides a computer program product, the computer program product comprising a computer program, the computer program being storable on a non-transitory computer-readable storage medium, the computer program, when executed by a processor, being capable of executing the communication method provided by the above methods, the method comprising:
injecting artificial noise signals into one or more signals to be transmitted to obtain one or more encryption sequences, and storing injection positions of the artificial noise signals;
randomly clustering a total codebook formed by the one or more encryption sequences to obtain a plurality of non-empty clusters, and randomly dividing each non-empty cluster into a plurality of sub-clusters;
randomly coding the serial number of the non-empty cluster where each encryption sequence is located to obtain a first serial number corresponding to each encryption sequence, and sending the first serial number and the encryption sequence to receiving end equipment so that the receiving end equipment can perform identity authentication according to the first serial number;
and generating a private key corresponding to the encryption sequence based on the injection position of the artificial noise signal, so that the receiving end equipment can decode the encryption sequence according to the private key after passing the identity authentication.
In yet another aspect, the present invention also provides a non-transitory computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements a communication method provided by performing the above methods, the method including:
injecting artificial noise signals into one or more signals to be transmitted to obtain one or more encryption sequences, and storing injection positions of the artificial noise signals;
randomly clustering a total codebook formed by the one or more encryption sequences to obtain a plurality of non-empty clusters, and randomly dividing each non-empty cluster into a plurality of sub-clusters;
randomly coding the serial number of the non-empty cluster where each encryption sequence is located to obtain a first serial number corresponding to each encryption sequence, and sending the first serial number and the encryption sequence to receiving end equipment so that the receiving end equipment can perform identity authentication according to the first serial number;
and generating a private key corresponding to the encryption sequence based on the injection position of the artificial noise signal, so that the receiving end equipment can decode the encryption sequence according to the private key after passing the identity authentication.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. With this understanding in mind, the above-described technical solutions may be embodied in the form of a software product, which can be stored in a computer-readable storage medium such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (10)

1. A communication method is applied to a sending terminal device, and comprises the following steps:
injecting artificial noise signals into one or more signals to be transmitted to obtain one or more encryption sequences, and storing injection positions of the artificial noise signals;
randomly clustering a total codebook formed by the one or more encrypted sequences to obtain a plurality of non-empty clusters, and randomly dividing each non-empty cluster into a plurality of sub-clusters;
randomly coding the serial number of the non-empty cluster where each encryption sequence is located to obtain a first serial number corresponding to each encryption sequence, and sending the first serial number and the encryption sequence to receiving end equipment so that the receiving end equipment can perform identity authentication according to the first serial number;
and generating a private key corresponding to the encryption sequence based on the injection position of the artificial noise signal, so that the receiving end equipment can decode the encryption sequence according to the private key after passing the identity authentication.
2. The communication method according to claim 1, wherein the injecting artificial noise signals into the one or more signals to be transmitted to obtain one or more encrypted sequences comprises:
one or more signals to be transmitted are randomly coded to obtain one or more code word sequences;
and injecting an artificial noise signal into each code word sequence, and performing confusion processing on each code word sequence injected with the artificial noise signal to generate one or more encryption sequences.
3. The communication method according to claim 1, wherein the generating a secret key corresponding to the encryption sequence based on the injection position of the artificial noise signal comprises:
and taking the injection position of the artificial noise signal as a random source, and mapping the random source to be a private key corresponding to the encryption sequence through a consistent uniform hash function.
4. The communication method of claim 1, wherein the storing the injection location of the artificial noise signal comprises:
storing the injection position of the artificial noise signal in a first-in first-out queue;
before the injecting position of the artificial noise signal is used as a random source and is mapped to a private key corresponding to the encryption sequence through a consistent uniform hash function, the method further includes:
and reading the injection position of the artificial noise signal from the first-in first-out queue.
5. A communication method is applied to a receiving end device, and comprises the following steps:
receiving an encryption sequence and a first sequence number, determining a target sequence in the received encryption sequence, and determining a sequence number of a non-empty cluster where the target sequence is located based on the first sequence number;
determining the sequence number of a sub-cluster of the target sequence according to the sequence number of a non-empty cluster of the target sequence and the random clustering process, and performing identity authentication according to the sequence number of the sub-cluster of the target sequence;
and after the identity authentication is passed, decoding the target sequence according to the private key provided by the sending end equipment to obtain a signal sent by the sending end equipment.
6. The communication method according to claim 5, wherein the performing identity authentication according to the sequence number of the sub-cluster in which the target sequence is located comprises:
and if the serial number of the sub-cluster where the target sequence is located is consistent with the serial number of the sub-cluster of the sending end equipment as the identity authentication, determining that the identity authentication between the receiving end equipment and the sending end equipment is passed.
7. The communication method according to claim 5, wherein the decoding the encrypted sequence according to the private key provided by the sending end device to obtain the signal sent by the sending end device comprises:
and according to the private key provided by the sending end equipment, eliminating the artificial noise signals in the target sequence bit by bit to obtain the signals sent by the sending end equipment.
8. A transmitting end apparatus, comprising:
the noise injection unit is used for injecting artificial noise signals into one or more signals to be transmitted to obtain one or more encryption sequences and storing injection positions of the artificial noise signals;
a random clustering unit, configured to perform random clustering on a total codebook formed by the one or more encrypted sequences to obtain a plurality of non-empty clusters, and randomly divide each non-empty cluster into a plurality of sub-clusters;
the first sending unit is used for randomly coding the serial number of the non-empty cluster where each encryption sequence is located to obtain a first serial number corresponding to each encryption sequence, and sending the first serial number and the encryption sequence to receiving end equipment so that the receiving end equipment can perform identity authentication according to the first serial number;
and the key generation unit is used for generating a private key corresponding to the encryption sequence based on the injection position of the artificial noise signal so that the receiving end equipment can decode the encryption sequence according to the private key after passing the identity authentication.
9. A receiving end apparatus, comprising:
the first determining unit is used for receiving the encrypted sequence and the first sequence number, determining a target sequence in the received encrypted sequence, and determining the sequence number of a non-empty cluster where the target sequence is located based on the first sequence number;
the identity authentication unit is used for determining the sequence number of the sub-cluster of the target sequence according to the sequence number of the non-empty cluster of the target sequence and the random clustering process, and performing identity authentication according to the sequence number of the sub-cluster of the target sequence;
and the decoding unit is used for decoding the target sequence according to the private key provided by the sending end equipment after the identity authentication is passed, so as to obtain a signal sent by the sending end equipment.
10. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the communication method according to any one of claims 1 to 4 or implements the communication method according to any one of claims 5 to 7 when executing the program.
CN202211364307.0A 2022-11-02 2022-11-02 Communication method, communication apparatus, electronic device, and storage medium Pending CN115801238A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211364307.0A CN115801238A (en) 2022-11-02 2022-11-02 Communication method, communication apparatus, electronic device, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211364307.0A CN115801238A (en) 2022-11-02 2022-11-02 Communication method, communication apparatus, electronic device, and storage medium

Publications (1)

Publication Number Publication Date
CN115801238A true CN115801238A (en) 2023-03-14

Family

ID=85434998

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211364307.0A Pending CN115801238A (en) 2022-11-02 2022-11-02 Communication method, communication apparatus, electronic device, and storage medium

Country Status (1)

Country Link
CN (1) CN115801238A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117640256A (en) * 2024-01-25 2024-03-01 深圳市四海伽蓝电子科技有限公司 Data encryption method, recommendation device and storage medium of wireless network card

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117640256A (en) * 2024-01-25 2024-03-01 深圳市四海伽蓝电子科技有限公司 Data encryption method, recommendation device and storage medium of wireless network card
CN117640256B (en) * 2024-01-25 2024-03-26 深圳市四海伽蓝电子科技有限公司 Data encryption method, recommendation device and storage medium of wireless network card

Similar Documents

Publication Publication Date Title
Ekrem et al. Secrecy capacity of a class of broadcast channels with an eavesdropper
CN111669730B (en) Physical layer key generation method and updating method for one-to-one proximity communication
CN107148015B (en) Continuous encryption physical layer secure transmission method based on polarization code structure
US8213616B2 (en) Systems and methods for providing opportunistic security for physical communication channels
CN110336657B (en) Optical OFDM dynamic key generation method based on channel characteristics
CN113810172B (en) Low-redundancy encryption method and system for polarization code quantum noise stream physical layer
CN108696867A (en) Lightweight group key distribution method based on radio channel characteristic
CN115801238A (en) Communication method, communication apparatus, electronic device, and storage medium
CN105846994B (en) A kind of physical layer steganography method and system
CN116506232B (en) High-capacity Internet of things hidden channel construction method based on channel coding
CN111641500B (en) Encryption and decryption method for wireless video transmission safety of unmanned aerial vehicle
CN111294353A (en) IMSI/SUPI physical layer key protection method without channel estimation
CN116017451A (en) IPv6 terminal identity authentication method utilizing 5G NR physical layer information
CN113114455A (en) Symmetric key generation method, device and medium
CN114584407A (en) System for embedding and extracting multilingual hidden data in online message
Wang et al. Mutual anonymous communications: a new covert channel based on splitting tree MAC
CN114337849A (en) Physical layer confidentiality method and system based on mutual information quantity estimation neural network
CN109840776B (en) Transaction certificate authentication method and transaction verification method using ultrasonic verification code
CN113727301B (en) Hash security access method and system for V2N low-delay communication service
Wang et al. A Strong Security Key Agreement Scheme for Underwater Acoustic Networks
CN112887336B (en) Communication safety protection method and device
CN110138564B (en) Method for secure transmission of data from encoder, and storage medium
CN114978711B (en) Dynamic key symmetric encryption data transmission method and system
CN117134904B (en) Method based on identity recognition and dynamic encryption and decryption communication
US20230275741A1 (en) Tamper-resistant data encoding secure against unbounded polynomial size attack complexity

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination