TW200511788A - Method of modulating and method of encrypting a digital data stream, method of decoding, appliance for implementing a method of this kind, multi-carrier transmission system - Google Patents
Method of modulating and method of encrypting a digital data stream, method of decoding, appliance for implementing a method of this kind, multi-carrier transmission systemInfo
- Publication number
- TW200511788A TW200511788A TW093123942A TW93123942A TW200511788A TW 200511788 A TW200511788 A TW 200511788A TW 093123942 A TW093123942 A TW 093123942A TW 93123942 A TW93123942 A TW 93123942A TW 200511788 A TW200511788 A TW 200511788A
- Authority
- TW
- Taiwan
- Prior art keywords
- mapping
- modulating
- data stream
- digital data
- encryption
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L5/00—Arrangements affording multiple use of the transmission path
- H04L5/003—Arrangements for allocating sub-channels of the transmission path
- H04L5/0044—Arrangements for allocating sub-channels of the transmission path allocation of payload
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Transmission Systems Not Characterized By The Medium Used For Transmission (AREA)
- Digital Transmission Methods That Use Modulated Carrier Waves (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Method of modulating a digital data stream in MC technology, in which the constellation points (X0, X1…XN-1) change their sequence in accordance with a mapping pattern (Ψi) during modulation. This dynamic mapping represents an encryption, since it is not readily possible for an unauthorized subscriber to restore the original sequence. The encryption level is further increased by the use of a set of multiple mapping patterns (Ψi), which is implemented during transmission in the form of a loop. The encryption level is further increased by defining a hop interval (Ihop), indicating the validity of an individual mapping pattern, after the handshake. The encryption key defines a set of mapping patterns (Ψi), a permutation function (Si), which indicates the order of use of the individual elements of the set of mapping patterns, and a hop interval (Ihop).
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP03102525 | 2003-08-13 |
Publications (1)
Publication Number | Publication Date |
---|---|
TW200511788A true TW200511788A (en) | 2005-03-16 |
Family
ID=34178564
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW093123942A TW200511788A (en) | 2003-08-13 | 2004-08-10 | Method of modulating and method of encrypting a digital data stream, method of decoding, appliance for implementing a method of this kind, multi-carrier transmission system |
Country Status (2)
Country | Link |
---|---|
TW (1) | TW200511788A (en) |
WO (1) | WO2005018184A1 (en) |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6501841B1 (en) * | 1998-12-17 | 2002-12-31 | Intel Corporation | Method for providing security for a transmission of information through a plurality of frequency orthogonal subchannels |
DE50013479D1 (en) * | 1999-12-22 | 2006-10-26 | Deutsche Telekom Ag | METHOD AND CIRCUIT ARRANGEMENT FOR SAFE DIGITAL TRANSMISSION |
US7020095B2 (en) * | 2001-06-16 | 2006-03-28 | Maxim Integrated Products, Inc. | System and method for modulation of non-data bearing carriers in a multi-carrier modulation system |
-
2004
- 2004-08-03 WO PCT/IB2004/051364 patent/WO2005018184A1/en active Application Filing
- 2004-08-10 TW TW093123942A patent/TW200511788A/en unknown
Also Published As
Publication number | Publication date |
---|---|
WO2005018184A8 (en) | 2005-08-11 |
WO2005018184A1 (en) | 2005-02-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US4924516A (en) | Method and system for a synchronized pseudo-random privacy modem | |
Zhou et al. | Problems with the chaotic inverse system encryption approach | |
JP2761281B2 (en) | Encrypted communication method for multi-carrier communication system | |
US6078667A (en) | Generating unique and unpredictable values | |
ES2295543T3 (en) | DATA ENCRYPTION ON THE PHYSICAL LAYER OF A DATA TRANSMISSION SYSTEM. | |
CN111342957B (en) | Method and device for distributing CO-OFDM (CO-orthogonal frequency division multiplexing) key based on Y-00 protocol | |
CN110912699B (en) | Optical transmission method based on floating probability forming | |
CN113904770B (en) | Quantum noise stream encryption key updating method and device and storage medium | |
US20150318925A1 (en) | Communication apparatus and method | |
CN112165378A (en) | Low-PAPR high-safety optical access method with high resource utilization rate | |
CN102638436B (en) | Method and system for realizing high-security fast frequency-hopping transmission | |
CA2329889A1 (en) | Encryption during modulation of signals | |
Čelikovský et al. | Message embedded chaotic masking synchronization scheme based on the generalized Lorenz system and its security analysis | |
Al‐Moliki et al. | Chaos‐based physical‐layer encryption for OFDM‐based VLC schemes with robustness against known/chosen plaintext attacks | |
Torres-Figueroa et al. | Experimental evaluation of a modular coding scheme for physical layer security | |
CN102244639A (en) | Method for framing and modulating wireless multimedia broadcast signals | |
TW200511788A (en) | Method of modulating and method of encrypting a digital data stream, method of decoding, appliance for implementing a method of this kind, multi-carrier transmission system | |
CN114024677B (en) | Elliptic curve encrypted OFDM communication system with double keys | |
Wang et al. | A Chaos‐Based Encryption Scheme for DCT Precoded OFDM‐Based Visible Light Communication Systems | |
US11811506B2 (en) | Application of key exchange based physical layer security methods | |
Hou et al. | Physical Layer Encryption Scheme Based on Dynamic Constellation Rotation | |
Abdullah et al. | Two-level secure colored image transmission using novel chaotic map | |
CN102255856B (en) | Method for transmitting radio digital broadcasting signal | |
Geng et al. | Multi-Fold Physical Layer Data Encryption Using Chaotic Frequency Hopping | |
Ameen et al. | Security analysis of encrypted audio based on elliptic curve and hybrid chaotic maps within GFDM modulator in 5G networks |