+

CN118353601B - Chaotic secret communication system and method based on multilayer complex network - Google Patents

Chaotic secret communication system and method based on multilayer complex network Download PDF

Info

Publication number
CN118353601B
CN118353601B CN202410513409.7A CN202410513409A CN118353601B CN 118353601 B CN118353601 B CN 118353601B CN 202410513409 A CN202410513409 A CN 202410513409A CN 118353601 B CN118353601 B CN 118353601B
Authority
CN
China
Prior art keywords
chaotic
network
sequence
information
driving
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202410513409.7A
Other languages
Chinese (zh)
Other versions
CN118353601A (en
Inventor
刘慧�
周渭人
金宇
郑俊
王小平
曾志刚
胡汉平
万海波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huazhong University of Science and Technology
Original Assignee
Huazhong University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huazhong University of Science and Technology filed Critical Huazhong University of Science and Technology
Priority to CN202410513409.7A priority Critical patent/CN118353601B/en
Publication of CN118353601A publication Critical patent/CN118353601A/en
Application granted granted Critical
Publication of CN118353601B publication Critical patent/CN118353601B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/12Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/08Randomization, e.g. dummy operations or using noise

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Synchronisation In Digital Transmission Systems (AREA)

Abstract

The invention discloses a chaotic secret communication system and a method based on a multilayer complex network, belonging to the technical field of chaotic secret communication, first, a first chaotic driving network and a second chaotic driving network are arranged at a transmitting end and a first chaotic response network and a second chaotic response network are arranged at a receiving end, and information encryption safety is high in consideration of utilizing parameter sensitivity of a chaotic sequence. And secondly, each chaotic driving and responding network comprises a plurality of nodes, and the complexity of the whole system architecture can be improved by combining the characteristics of huge node number and various connection side relations to design the communication system. And a first synchronous controller arranged at the receiving end controls the first chaotic driving network and the first chaotic response network to achieve generalized synchronization, so that noise robustness is improved. Finally, even if the first chaotic driving and response network is cracked, the data recovery can not be completed under the condition of missing the random sequence, and the system safety is further improved.

Description

Chaotic secret communication system and method based on multilayer complex network
Technical Field
The invention belongs to the technical field of chaotic secret communication, and particularly relates to a chaotic secret communication system and method based on a multi-layer complex network.
Background
With the rapid development of the industrial internet, the types and amounts of data involved have also increased exponentially. Including sensitive information such as production plans, process parameters, equipment status, etc., which, once leaked, can lead to production interruptions, reduced commercial competitiveness, and even loss of intellectual property. Therefore, the secret communication has wide application scenes in the industrial Internet, firstly, the security of data transmission is reflected, and the risks that data are intercepted maliciously, tampered or stolen can be effectively prevented by adopting an advanced encryption algorithm and a communication protocol. And secondly, a safe and trusted communication channel is established between industrial equipment, so that the information is not interfered in the transmission process, and the accuracy of real-time control and monitoring is ensured. Meanwhile, the proportion of multimedia information such as images, videos, sounds and the like in network transmission is rapidly increasing under the background of big data age, and the requirements of the computer such as calculation speed, storage capacity and the like are high due to the large data information quantity, so that the quick and efficient encryption is difficult to realize by using the traditional encryption method. To solve this problem, researchers have been looking for new encryption ways to improve information security.
On one hand, the chaos has the characteristics of initial value sensitivity, spatial hybridization, intermittent periodicity and the like, is favorable for increasing the complexity of transmission signals, and has important significance for improving the system performances such as spectrum analysis resistance, cracking resistance and the like of secret communication. On the other hand, complex networks have characteristics of small world and no scale, and the complexity of the network is manifested in the following aspects. Firstly, the connection structure of the network is complex, secondly, the nodes of the network may have the same or different dynamics, and furthermore, the interaction of the interconnected nodes with each other makes the dynamics of the nodes themselves more complex. How to combine chaos and the characteristics of a complex network to improve the complexity of a secret communication system is a problem to be solved in a wireless communication environment.
Disclosure of Invention
Aiming at the defects or improvement demands of the prior art, the invention provides a chaotic secret communication system and a chaotic secret communication method based on a multi-layer complex network, which aim to firstly consider that the high parameter sensitivity of a chaotic sequence is utilized to realize strong information encryption security, secondly utilize two heterogeneous chaotic networks to increase the complexity of chaotic signals, further improve the communication security, and finally relate to a method of using the chaotic networks to realize generalized synchronization to reduce the influence of noise on chaotic encryption, thereby solving the technical problem of how to combine the characteristics of the chaotic and complex networks to improve the complexity of the secret communication system.
To achieve the above object, according to one aspect of the present invention, there is provided a chaotic secret communication system based on a multi-layer complex network, comprising:
The transmitting end comprises a preprocessing module, a first chaotic driving network and a second chaotic driving network; the preprocessing module is used for scrambling binary original plaintext message with the same length by utilizing a random sequence seq to obtain a binary information sequence m, the first chaotic driving network is used for encrypting the information sequence m to obtain a first chaotic sequence, elements in the information sequence m are system parameters of the first chaotic driving network, and the second chaotic driving network is used for encrypting the random sequence seq to obtain a second chaotic sequence;
The receiving end comprises a first synchronous controller, a second synchronous controller, a first chaotic response network, a second chaotic response network and a post-processing module, wherein the first synchronous controller is used for controlling the first chaotic driving network to be synchronous with the first chaotic response network when a first bit binary number m (l) =0 in the information sequence m and controlling the first chaotic driving network to be asynchronous with the first chaotic response network when a first bit binary number m (l) =1, the second synchronous controller is used for controlling the second chaotic response network to be completely synchronous with the second chaotic response network, and the first chaotic response network is used for decrypting the first chaotic sequence according to the magnitude relation between the value of the synchronous error of the first synchronous controller and a preset threshold value to obtain first decryption information The second chaotic response network is used for decrypting the second chaotic sequence to obtain second decryption information seq, and the post-processing module is used for utilizing the first decryption informationAnd reverse recovering the second decryption information seq to obtain decryption information message.
In one embodiment, the first chaotic driving network adopts a unified chaotic system, the first chaotic response network adopts a Lorenz chaotic system, and the control law expression of the first synchronous controller is as follows:
wherein i is a node sequence number, i=1, 2, & gt, N is the node number of the first chaotic driving network, u i1,ui2,ui3 is a state variable of the first synchronous controller, x i1,xi2,xi3 is chaotic data output by the first chaotic driving network respectively, y i1,yi2,yi3 is chaotic data output by the first chaotic response network respectively, e i=(ei1,ei2,ei3)T is a generalized synchronous error existing between the first chaotic driving network and the first chaotic response network, a first error parameter e i1=yi1-d1xi1, a second error parameter e i2=yi2-d2xi2 and a third error parameter e i3=yi3-d3xi3,d1,d2,d3 are three parameters of the first synchronous controller, h 1,h2,h3 is a preset constant, and h 1≥0,h2≥0,h3 is more than or equal to 0.
In one embodiment, the three parameters d 1,d2,d3 of the first synchronization controller are updated with a period, denoted as d 1(k),d2(k),d3 (k);
the parameter d 1(1),d2(1),d3 (1) corresponding to the 1 st period is preset;
The parameter of the kth period is expressed as d s (k) =mod (temp(s), R) +1;
wherein s is a parameter sequence number, and takes values of 1,2 and 3, and the intermediate parameters temp (1), temp (2) and temp (3) are as follows: bin2dec (·) represents converting binary digits into decimal digits, mod (temp(s), R) represents temp(s) taking the remainder of the constant R, dlen =floor (N/3), floor (·) represents a rounding down operation.
In one embodiment, the first chaotic response network is used for calculating the integral of the synchronization error e i (T) of the time interval [ (k-1) T+Δt, kT ] in the kth transmission periodWherein the time interval delta T and the period T are preset constants;
If it is The decryption information of the i-th node isIf it isThe decryption information of the i-th node isThe threshold e th is a preset constant;
arranging decryption information of each node according to the order of node priority, and selecting data positioned between [1, length ] in the sequence as the first decryption information Length is the length of the information sequence m.
In one embodiment, the second chaotic driving network and the second chaotic response network both adopt memristive chaotic systems, and the second chaotic driving network is used for merging the random sequence seq into own network parameters and carrying out parameter modulation to obtain the second chaotic sequence;
the relevant mapping function of the r parameter a ir of the i-th node in the second chaotic driving network is as follows:
wherein r is a parameter sequence number, r=1, 2,3,4, max r,minr is a preset constant, the mapping function limits the value range of a ir to [ min r,maxr ], p is the maximum value of the elements in the sequence seq, and q is the minimum value of the elements in the sequence seq.
In one embodiment, the control law expression of the second synchronous controller is:
the parameter self-adaption law is as follows:
Wherein i represents the node serial number of the second chaotic response network, i=1, 2,., M is the number of nodes of the second chaotic driving network, u i1,ui2,ui3,ui4 is the state variable of the second synchronous controller, four state errors are respectively expressed as :ei1=yi1-xi1,ei2=yi2-xi2,ei3=yi3-xi3,ei4=yi4-xi4;xi1,xi2,xi3,xi4 and y i1,yi2,yi3,yi4 are respectively the chaotic data output by the second chaotic driving network, and the intermediate variable is the chaotic data output by the second chaotic response network AndRespectively isConstant h 1,h2,h3,h4 is greater than or equal to 0, and constant k 1,k2,k3,k4 is greater than 0.
In one embodiment, the second chaotic response network is configured to utilizeAnd decrypting to obtain second decryption information seq i which is the node sequence number of the second chaotic response network, wherein round (·) represents rounding operation.
In one embodiment, the post-processing module is based on the first decryption informationAnd said second decryption information seq, using the formulaReverse recovery results in decryption information message, i denotes the sequence number, i=1, 2.
In one embodiment, the first chaotic driving network and the first chaotic response network have equal node numbers, and the node number N is more than or equal to 4;
the second chaotic driving network and the second chaotic response network have equal node numbers, and the relation between the node number M and the length of the information sequence M is as follows: Where the function ceil (·) represents a round-up.
According to another aspect of the present invention, there is provided a chaotic secret communication method based on a multi-layer complex network, applied to the chaotic secret communication system, including:
Scrambling binary original plaintext message with the same length by utilizing a random sequence seq to obtain a binary information sequence m, inputting the information sequence m into a first chaotic driving network for encryption to obtain a first chaotic sequence, and inputting the random sequence seq into a second chaotic driving network for encryption to obtain a second chaotic sequence, wherein elements in the information sequence m are system parameters of the first chaotic driving network;
The operations executed at the receiving end comprise that when the first bit binary number m (l) =0, the first synchronization controller controls the first chaotic driving network and the first chaotic response network to realize synchronization, when m (l) =1, the first synchronization controller controls the first chaotic driving network and the first chaotic response network to be asynchronous, and then the first chaotic driving network is utilized to decrypt the first chaotic sequence according to the magnitude relation between the value of the synchronization error of the first synchronization controller and a preset threshold value to obtain first decryption information The second synchronous controller is utilized to enable the second chaotic response network and the second chaotic driving network to achieve complete synchronization, the second chaotic sequence is decrypted by utilizing the second chaotic driving network to obtain second decryption information seq, and the first decryption information is utilizedAnd reverse recovering the second decryption information seq to obtain decryption information message.
In general, the above technical solutions conceived by the present invention, compared with the prior art, enable the following beneficial effects to be obtained:
(1) The invention provides a chaotic secret communication system based on a multilayer complex network, which is characterized in that a first chaotic driving network and a second chaotic driving network are arranged at a transmitting end of the chaotic secret communication system, a first chaotic response network and a second chaotic response network are correspondingly arranged at a receiving end of the chaotic secret communication system, and the high parameter sensitivity of a chaotic sequence is utilized to realize strong information encryption security. And secondly, each chaotic driving network and each chaotic response network comprise a plurality of nodes, and the communication system is designed by combining the characteristics of huge number of nodes and various connection side relations of the two layers of networks, so that the complexity of the overall architecture of the system can be improved. And a first synchronization controller arranged at the receiving end controls the first chaotic driving network and the first chaotic response network to achieve generalized synchronization according to binary information transmitted by the current link, and judges whether the transmission information is 0 or 1 by judging errors among corresponding nodes based on the generalized synchronization of the complex network, so that noise robustness is improved. And finally, utilizing the random sequence transmitted by the second chaotic drive and response network, even if the first chaotic drive and response network is cracked, the data recovery can not be completed under the condition of missing the random sequence, and the system safety is further improved.
(2) In this scheme, the control laws of the first synchronous controller are respectively:
It may be realized that the first chaotic driving network and the first chaotic response network are controlled to realize synchronization when a first bit binary number m (l) =0 in the information sequence m, and the first chaotic driving network and the first chaotic response network are controlled to be asynchronous when the first bit binary number m (l) =1.
(3) In the scheme, three parameters d 1,d2,d3 of the first synchronization controller are updated along with the period, the parameter of the kth period is expressed as d s (k) =mod (temp(s), R) +1, and the operation of adding 1 to the remainder of the constant R by temp(s) is to avoid d s (k) =0 to cause that the generalized synchronization condition is not met, and the communication security can be enhanced while the first chaotic driving network and the first chaotic response network are controlled to realize generalized synchronization.
(4) First chaotic response network utilization in this schemeAnd calculating an integral value of a synchronization error e i (T) of a time interval [ (k-1) T+delta T, kT ] in the kth transmission period, wherein the information decryption in each transmission period depends on the information of the previous transmission period, so that the difficulty of cracking by an attacker is improved.
(5) In the scheme, the second chaotic driving network is used for merging the random sequence seq into own network parameters and carrying out parameter modulation to obtain the second chaotic sequence, and the encryption mode is simple to operate and can realize higher calculation complexity, so that the communication safety is improved.
(6) The scheme provides a control law expression of a preferable second synchronous controller, which can enable the second chaotic driving network and the second chaotic response network to achieve complete synchronization, and control parameters of the second chaotic driving network and the second chaotic response network can be adaptively updated, so that communication safety is improved.
(7) The scheme provides a preferred decryption mode for the second chaotic response network, and utilizesAnd the second decryption information seq is obtained through decryption, different value ranges can be set for different parameters, and the parameter leakage risk is reduced.
(8) In this embodiment, the first decryption information is based onAnd said second decryption information seq, using the formulaThe reverse recovery obtains the decryption information message *, so that the coupling relation of two systems is increased, and the safety performance of the whole system is comprehensively improved.
(9) In the scheme, node dynamics of the transmitting end and the receiving end are not required to be kept consistent, so that the flexibility of design and the wide applicability of the system are improved.
(10) In the scheme, the transmission end of the system utilizes the first and second chaotic driving networks to encrypt the information sequence to be transmitted and the random sequence, and the receiving end utilizes the first and second chaotic response networks to correspondingly decrypt the information sequence, so that the information encryption safety is high in consideration of the high parameter sensitivity of the chaotic sequence. And secondly, a first synchronization controller is utilized at a receiving end to control a first chaotic driving network and a first chaotic response network to achieve generalized synchronization according to binary information transmitted by a current link, the generalized synchronization of a complex network is based, and the transmitted information is judged to be 0 or 1 by judging errors among corresponding nodes, so that noise robustness is improved. And finally, utilizing the random sequence transmitted by the second chaotic drive and response network, even if the first chaotic drive and response network is cracked, the data recovery can not be completed under the condition of missing the random sequence, and the system safety is further improved.
Drawings
Fig. 1 is a schematic structural diagram of a chaotic secret communication system provided in embodiment 1 of the present invention;
Fig. 2 is a secure communication frame diagram of a first chaotic driving network and a first chaotic response network provided in embodiment 1 of the present invention;
Fig. 3 is a schematic diagram of allocation rules and parameter updating rules of sequence information m to be transmitted in embodiment 1 of the present invention;
fig. 4 is a secret communication frame diagram of a second chaotic driving network and a second chaotic response network provided in embodiment 1 of the present invention;
FIG. 5 is a schematic diagram of bit error rates of the chaotic secret communication method provided in embodiment 2 of the present invention under different signal to noise ratios;
FIG. 6 is a schematic diagram of an information error without recovery through a subsystem sequence after decryption error of the 7 th node of the 5 th period provided in embodiment 2 of the present invention;
FIG. 7 is a schematic diagram of information error recovered by subsystem sequence after decryption error of the 7 th node of the 5 th period provided in embodiment 2 of the present invention;
FIG. 8 is a schematic diagram of a state variable error of a node when information is correctly transmitted according to embodiment 2 of the present invention;
Fig. 9 is a schematic diagram of the correct transmission information provided in embodiment 2 of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention. In addition, the technical features of the embodiments of the present invention described below may be combined with each other as long as they do not collide with each other.
Example 1
As shown in fig. 1, the present embodiment provides a chaotic secret communication system, which includes a transmitting end and a receiving end.
The transmitting end comprises a preprocessing module, a first chaotic driving network and a second chaotic driving network. The preprocessing module is used for scrambling binary original plaintext message with the same length by utilizing the random sequence seq to obtain a binary information sequence m. And the first chaotic driving network is used for encrypting the information sequence m to obtain a first chaotic sequence. The element in the information sequence m is a system parameter of the first chaotic driving network. And the second chaotic driving network is used for encrypting the random sequence seq to obtain a second chaotic sequence.
The receiving end comprises a first synchronous controller, a second synchronous controller, a first chaotic response network, a second chaotic response network and a post-processing module. And the first synchronous controller is used for controlling the first chaotic driving network and the first chaotic response network to be synchronous when the first bit binary number m (l) =0 in the information sequence m, and controlling the first chaotic driving network and the first chaotic response network to be asynchronous when the first bit binary number m (l) =0. The second synchronous controller is used for controlling the second chaotic response network and the second chaotic driving network to achieve complete synchronization. The first chaotic response network is used for decrypting the first chaotic sequence according to the magnitude relation between the value of the synchronous error of the first synchronous controller and a preset threshold value to obtain first decryption informationThe second chaotic response network is used for decrypting the second chaotic sequence to obtain second decryption information seq. The post-processing module is used for utilizing the first decryption informationAnd reverse recovering the second decryption information seq to obtain decryption information message.
For the preprocessing module, the original information is converted into a string of binary sequence messages, firstly, the binary sequence messages are scrambled according to a rule, taking message= [0,0,1,0,1,1] as an example, the random sequence is seq= [1,3,6,4,2,5], that is, m (1) =message (1) =0, m (2) =message (3) =1 and so on, and finally m= [0,1,1,0,0,1] is obtained through arrangement, then m is transmitted by the first chaotic driving network, and the seq is transmitted by the second chaotic driving network.
For the first chaotic driving network and the first chaotic response network, an encryption/decryption scheme structure as shown in fig. 2 is shown. The first chaotic response network of the receiving end is symmetrically provided with N nodes under the assumption that the first chaotic driving network is provided with N nodes. The first chaotic driving network is composed of N chaotic systems with nodes, wherein state variables of the nodes are used as driving signals, parameters of the driving system are replaced by binary codes m (l), l=1, 2, and length, encryption information is further generated, the first chaotic driving network and the first chaotic response network are controlled by a synchronous controller to realize generalized synchronization, generalized errors of corresponding nodes of the two-layer network are calculated, and the generalized errors are compared with error thresholds, so that original information is recovered.
The first chaotic driving network adopts a unified parameter chaotic system for self dynamics, and is described as the following equation:
i denotes different nodes, i=1, 2,..n; k denotes a transmission period, M (N x (k-1) +i) is information transmitted by the ith node in the kth transmission period, and takes a value of 0 or 1.
The first chaotic response network adopts a Lorenz system, and then a kinetic equation can be described as follows:
i represents a different node from the one in question, i=1, 2,. -%, N; u i(t)=[ui1,ui2,ui3]T is a synchronous controller.
Preferably, the first chaotic driving network adopts a unified chaotic system, and the first chaotic response network adopts a Lorenz chaotic system. The control law expression of the first synchronous controller is:
Where i is the node number, i=1, 2,..n. N is the number of nodes of the first chaotic driving network, and u i1,ui2,ui3 is the state variable of the first controller. x i1,xi2,xi3 are respectively chaotic data output by the first chaotic driving network. y i1,yi2,yi3 is respectively chaotic data output by the first chaotic response network. Defining the state error ei1=yi1-d1xi1,ei2=yi2-d2xi2,ei3=yi3-d3xi3, so that the generalized synchronization error existing between the driving and chaotic response networks is expressed as Where the variable d 1,d2,d3 noteq 0 is a generalized synchronization functionCorresponding parameters, nodes are consistent in each transmission period, but different periods are updated according to rules. When the information m (l) =0 to be transmitted, the invention designs a synchronous controller as follows to realize generalized synchronization of the chaotic driving network and the chaotic response network. h 1,h2,h3 is a preset constant and h 1≥0,h2≥0,h3 is not less than 0.
Preferably, the three parameters d 1,d2,d3 of the first synchronization controller are updated with the period, denoted as d 1(k),d2(k),d3 (k). The parameter d 1(1),d2(1),d3 (1) corresponding to the 1 st period is preset. The update rule of the three parameters d 1(k),d2(k),d3 (k) of the synchronization controller is shown in fig. 3, and the information transmitted in the previous period is used to update the parameters of the next period, where the parameters of the first period may be defined as d 1(1)=d2(1)=d3 (1) =1. The parameters of the kth period are expressed as:
d s (k) =mod (temp(s), R) +1. Wherein s is a parameter sequence number, and takes values of 1, 2 and 3. The intermediate parameters temp (1), temp (2) and temp (3) are:
bin2dec (·) represents converting binary digits into decimal digits, mod (temp(s), R) represents temp(s) taking the remainder of the constant R, dlen =floor (N/3), floor (·) represents a rounding down operation.
Preferably, the first chaotic response network is used for calculating an integrated value of a synchronization error e i (T) of a period interval [ (k-1) t+Δt, kT ] in the kth transmission periodWherein the time interval deltat and the period T are preset constants. If it isDecryption information of the i-th nodeIf it isDecryption information of the i-th nodeThe threshold e th is a preset constant. Arranging decryption information of each node according to the order of node priority, and selecting data positioned between [1, length ] in the sequence as first decryption informationLength is the length of the information sequence m.
Specifically, the first chaotic response network extracts x i from the transmission channel, further generates a required chaotic sequence y i in the first chaotic response network according to the first synchronous controller, and then calculates the generalized synchronous error of the states of corresponding nodes of the first chaotic response network and the first chaotic driving networkAssuming that the transmission information m (l) =0 at the transmitting end, the two-layer network is synchronized, i.e., Δt time passes before ||e i (t) |→0. For the kth transmission period, the integral of the synchronization error in [ (k-1) T+Δt, kT ] is calculatedSince m (l) =0, thenIf the transmission information m (l) =1, thenTherefore, the synchronization error integrated value is compared with the threshold value e th =10, and then it is judged whether or not synchronization is achieved, thereby determining that the transmitted information m (l) is 0 or 1. And finally, recombining the information obtained after decryption of each node according to the order of node priority, and removing the last redundant transmission information according to the sequence length to obtain
For the second chaotic driving network and the second chaotic response network, the structural framework is shown in fig. 4. The second chaotic driving network is used for secret communication of the seq, has a structure similar to that of the first chaotic driving network and the first chaotic response network and is also divided into a transmitting end, a receiving end and a transmission channel. The second chaotic driving network of the transmitting end is provided with M nodes, and the second chaotic response network of the receiving end is provided with M nodes. The random sequence seq is fused into the system parameters and modulated under the assumption that the driving signal is a node state variable of the network, and the chaos driving network of the transmitting end and the chaos response network of the receiving end are synchronized by designing corresponding synchronous controllers and parameter updating rules so as to further perform parameter identification and restore original information.
The kinetic equation of the second chaotic driving network adopts a memristive chaotic system, and the chaotic driving network is described by the following equation:
Where i represents the number of different nodes, i=1, 2, M, a i1,ai2,ai3,ai4 is a system parameter.
Preferably, the second chaotic driving network and the second chaotic response network both adopt memristive chaotic systems. The second chaotic driving network is used for merging the random sequence seq into the network parameters and carrying out parameter modulation to obtain a second chaotic sequence. The relevant mapping function of the r parameter a ir of the i-th node in the second chaotic driving network is as follows:
wherein r is a parameter sequence number, r=1, 2,3,4, max r,minr is a preset constant, the mapping function limits the value range of a ir to [ min r,maxr ], p is the maximum value of the elements in the sequence seq, and q is the minimum value of the elements in the sequence seq.
Regarding the dynamics equation of the second chaotic response network, assuming that the dynamics of the chaotic response network node itself is different from the chaotic driving network, the chaotic response network can be described as:
Where i represents the number of different nodes, i=1, 2, M, u i(t)=[ui1,ui2,ui3,ui4]T is a synchronous controller.
Preferably, the control law expressions of the second synchronous controller are respectively:
the parameter self-adaption laws are respectively as follows: Wherein u i1,ui2,ui3,ui4 are all state variables of the second controller. The four state errors are respectively expressed as :ei1=yi1-xi1,ei2=yi2-xi2,ei3=yi3-xi3,ei4=yi4-xi4.xi1,xi2,xi3,xi4 and are respectively chaotic data output by the second chaotic driving network. y i1,yi2,yi3,yi4 is respectively chaotic data output by the second chaotic response network. Intermediate variable AndRespectively is I represents the node sequence number of the second chaotic response network. Constant h 1,h2,h3,h4 is greater than or equal to 0, and constant k 1,k2,k3,k4 is greater than 0.
Preferably, the second chaotic response network is for utilizingAnd decrypting to obtain second decryption information seq i which is the node sequence number of the second chaotic response network, wherein round (·) represents rounding operation. Namely, the second chaotic response network is arranged at the receiving end and is obtained by receiving the chaotic signal and synchronizing by utilizing the synchronous controller and the parameter identification ruleAnd further obtaining the sequence seq by using a recovery function:
preferably, the post-processing module is based on the first decryption information And second decryption information seq, using the formulaReverse recovery results in decryption information message, i denotes sequence number, i=1, 2.
Preferably, the first chaotic driving network and the first chaotic response network have equal node numbers, and the node number N is more than or equal to 4. The nodes of the second chaotic driving network and the second chaotic response network are equal, and the relation between the node number M and the length of the information sequence M is as follows: Where the function ceil (·) represents a round-up. Wherein the information m (l) is allocated in order of preferentially satisfying the node arrangement, and a plurality of period transmission is performed, for example, the information transmitted by the ith node in the kth transmission period is m (n× (k-1) +i). When the m (l) last bit allocation is completed, the remaining nodes of the period will randomly transmit either 0 or 1. The total transmission cycle number is Where the function ceil (·) represents a round-up. The relation between the number of the second chaotic driving network nodes and the length of the binary information sequence is as follows: Where the function ceil (·) represents a round-up.
Example 2
The embodiment provides a chaotic secret communication method, which is applied to the chaotic secret communication system and comprises the following steps:
The operation executed at the transmitting end comprises the steps of scrambling binary original plaintext message with the same length by utilizing a random sequence seq to obtain a binary information sequence m, inputting the information sequence m into a first chaotic driving network for encryption to obtain a first chaotic sequence, and inputting the random sequence seq into a second chaotic driving network for encryption to obtain a second chaotic sequence. The element in the information sequence m is a system parameter of the first chaotic driving network.
The operations executed at the receiving end comprise that when the first bit binary number m (l) =0, the first synchronous controller controls the first chaotic driving network and the first chaotic response network to realize synchronization, when the m (l) =1, the first synchronous controller controls the first chaotic driving network and the first chaotic response network to be asynchronous, and then the first chaotic driving network is utilized to decrypt the first chaotic sequence according to the magnitude relation between the value of the synchronous error of the first synchronous controller and a preset threshold value to obtain first decryption informationThe second chaotic response network and the second chaotic driving network are completely synchronized by using the second synchronous controller, the second chaotic sequence is decrypted by using the second chaotic driving network to obtain second decryption information seq, and the first decryption information is usedAnd reverse recovering the second decryption information seq to obtain decryption information message.
Assuming that 100 bits of information are transmitted, the number of nodes of the main system including the first chaotic driving network and the first chaotic response network is 10, the transmission period of the main system is 10. According to the invention, a noise component is added to a transmission channel, and a receiving end acquires actual information { x i1+ni1,xi2+ni2,xi3+ni3 }, wherein a superimposed component n i1,ni2,ni3 is noise.
The embodiment uses Gaussian white noise for simulation, and whether the scheme is effective in the case that the channel has noise or not is researched according to experiments. The Gaussian white noise is subjected to normal distribution, power spectrums on different frequencies are equal after Fourier transformation, and meanwhile, correlation does not exist among all moments. In the communication field, the signal-to-noise ratio refers to the effective power ratio of signal to noise, and the calculation formula is as follows: wherein P s,Pn represents the effective power of the signal and noise, respectively, in W and SNR in dB. The invention changes the power of noise, tests the error rate of system transmission information under different signal to noise ratios, and partial results are shown in figure 5. It can be seen that the higher the noise, i.e. the lower the signal-to-noise ratio, the higher the system error rate, but the signal-to-noise ratio is above 29dB, which enables efficient decryption.
Here, the transmission period is set to a dimensionless time t=1, and assuming that the decryption information is erroneous at the 5 th transmission period node 7, the main system decryption result is shown in fig. 6. It can be seen that the information transmitted by the node 7 of the 5 th transmission period does not match the correct information, and the decryption error of the variable d 1(6),d2(6),d3 (6) after the period causes that the first chaotic driving network of the 6 th period and the receiving end cannot be synchronized, so that the decrypted data is 1, and a chain reaction is caused, and the decryption information of the subsequent period is all 1. The final decrypted data is further recovered by subsystem information, as shown in fig. 7, the subsystem includes a second chaotic driving network and a second chaotic response network. It can be concluded that for an attacker, as long as there are few node cracking errors, the subsequent transmission cycle will have the decryption information 1, resulting in errors, and that after recovery of the random sequence through the subsystem will have the errors spread over the whole transmission sequence.
The two-stage system correctly transmits information, and randomly selects a certain main system node to calculate the synchronization errorThe results are shown in FIG. 8. It can be seen that if the previous cycle is not synchronized and the next cycle is synchronized, a larger error is caused at the initial time of the synchronization cycle, but the subsequent cycle can still be reduced. In the 1 st, 5 th and 7 th transmission periods, the node transmission error is approximately reduced to 0, and the node error in the rest transmission periods is far greater than 0, so that the node transmission information is judged to be [0,1,1,1,0,1,0,1,1,1], and the experimental verification result is correct. The entire information sequence of the final decryption is shown in fig. 9. In conclusion, the two-stage chaotic secret system designed by the invention can effectively improve the anti-cracking capability, so that the information transmission is safer and more effective.
It will be readily appreciated by those skilled in the art that the foregoing description is merely a preferred embodiment of the invention and is not intended to limit the invention, but any modifications, equivalents, improvements or alternatives falling within the spirit and principles of the invention are intended to be included within the scope of the invention.

Claims (8)

1.一种基于多层复杂网络的混沌保密通信系统,其特征在于,包括:1. A chaotic secure communication system based on a multi-layer complex network, characterized by comprising: 发射端,包括预处理模块、第一混沌驱动网络和第二混沌驱动网络;所述预处理模块,用于利用随机序列seq对相同长度的二进制原始明文message进行置乱,得到二进制的信息序列m;所述第一混沌驱动网络,用于加密所述信息序列m得到第一混沌序列;所述信息序列m中元素为所述第一混沌驱动网络的系统参数;所述第二混沌驱动网络,用于加密所述随机序列seq得到第二混沌序列;The transmitting end includes a preprocessing module, a first chaos driving network and a second chaos driving network; the preprocessing module is used to scramble the binary original plaintext message of the same length using a random sequence seq to obtain a binary information sequence m; the first chaos driving network is used to encrypt the information sequence m to obtain a first chaotic sequence; the elements in the information sequence m are system parameters of the first chaos driving network; the second chaos driving network is used to encrypt the random sequence seq to obtain a second chaotic sequence; 接收端,包括第一同步控制器、第二同步控制器、第一混沌响应网络、第二混沌响应网络和后处理模块;所述第一同步控制器,用于当所述信息序列m中第l位二进制数m(l)=0时控制所述第一混沌驱动网络和所述第一混沌响应网络同步,当第l位二进制数m(l)=1时控制所述第一混沌驱动网络和所述第一混沌响应网络不同步;所述第二同步控制器用于控制所述第二混沌响应网络和所述第二混沌驱动网络达到完全同步;所述第一混沌响应网络用于根据所述第一同步控制器的同步误差的数值与预设阈值的大小关系解密所述第一混沌序列得到第一解密信息所述第二混沌响应网络用于解密所述第二混沌序列得到第二解密信息所述后处理模块用于利用所述第一解密信息和所述第二解密信息反向恢复得到解密信息message*;The receiving end includes a first synchronization controller, a second synchronization controller, a first chaotic response network, a second chaotic response network and a post-processing module; the first synchronization controller is used to control the first chaotic driving network and the first chaotic response network to be synchronized when the l-th binary number m(l) in the information sequence m is 0, and to control the first chaotic driving network and the first chaotic response network to be asynchronous when the l-th binary number m(l) is 1; the second synchronization controller is used to control the second chaotic response network and the second chaotic driving network to achieve complete synchronization; the first chaotic response network is used to decrypt the first chaotic sequence according to the relationship between the value of the synchronization error of the first synchronization controller and the preset threshold value to obtain the first decrypted information The second chaotic response network is used to decrypt the second chaotic sequence to obtain second decrypted information The post-processing module is used to utilize the first decryption information and the second decrypted information Reverse recovery to obtain the decrypted information message*; 所述第一混沌驱动网络采用统一混沌系统,表示为:所述第一混沌响应网络采用Lorenz混沌系统为:所述第一同步控制器的控制律:i为节点序号,i=1,2,...,N;N为第一混沌驱动网络的节点数目;k表示传输周期,ui(t)=[ui1,ui2,ui3]T为同步控制器,m(N×(k-1)+i)为第k个传输周期第i个节点传输的信息;ui1,ui2,ui3均为第一同步控制器的状态变量;The first chaotic driving network adopts a unified chaotic system, which is expressed as: The first chaotic response network adopts the Lorenz chaotic system as: The control law of the first synchronous controller is: i is the node number, i=1,2,...,N; N is the number of nodes in the first chaotic driving network; k represents the transmission period, u i (t)=[u i1 ,u i2 ,u i3 ] T is the synchronization controller, m(N×(k-1)+i) is the information transmitted by the i-th node in the k-th transmission period; u i1 ,u i2 ,u i3 are all state variables of the first synchronization controller; xi1,xi2,xi3分别为所述第一混沌驱动网络输出的混沌数据;yi1,yi2,yi3分别为所述第一混沌响应网络输出的混沌数据;ei=(ei1,ei2,ei3)T表示所述第一混沌驱动网络和所述第一混沌响应网络之间存在的广义同步误差,第一误差参量ei1=yi1-d1xi1,第二误差参量ei2=yi2-d2xi2,第三误差参量ei3=yi3-d3xi3,d1,d2,d3为第一同步控制器的三个参数,h1,h2,h3为预设常数且h1≥0,h2≥0,h3≥0;x i1 , x i2 , x i3 are chaotic data output by the first chaotic driving network respectively; y i1 , y i2 , y i3 are chaotic data output by the first chaotic response network respectively; e i =(e i1 ,e i2 ,e i3 ) T represents the generalized synchronization error between the first chaotic driving network and the first chaotic response network, the first error parameter e i1 =y i1 -d 1 x i1 , the second error parameter e i2 =y i2 -d 2 x i2 , the third error parameter e i3 =y i3 -d 3 x i3 , d 1 , d 2 , d 3 are three parameters of the first synchronization controller, h 1 , h 2 , h 3 are preset constants and h 1 ≥0, h 2 ≥0, h 3 ≥0; 所述第二混沌驱动网络和所述第二混沌响应网络均采用忆阻混沌系统;所述第二混沌驱动网络的表示:所述第二混沌响应网络为:所述第二同步控制器的控制律为:参数自适应律表达式为:i代表所述第二混沌响应网络的节点序号,i=1,2,...,M;M为第二混沌驱动网络的节点数目;ai1,ai2,ai3,ai4为系统参数;ui1,ui2,ui3,ui4均为第二同步控制器的状态变量;四个状态误差分别表示为:ei1=yi1-xi1,ei2=yi2-xi2,ei3=yi3-xi3,ei4=yi4-xi4;xi1,xi2,xi3,xi4分别为所述第二混沌驱动网络输出的混沌数据;yi1,yi2,yi3,yi4分别为所述第二混沌响应网络输出的混沌数据;中间变量 分别为常数h1,h2,h3,h4≥0,常数k1,k2,k3,k4>0。The second chaos driving network and the second chaos response network both adopt memristor chaos system; the representation of the second chaos driving network is: The second chaotic response network is: The control law of the second synchronous controller is: The parameter adaptation law expression is: i represents the node number of the second chaotic response network, i=1,2,...,M; M is the number of nodes of the second chaotic driving network; a i1 , a i2 , a i3 , a i4 are system parameters; u i1 , u i2 , u i3 , u i4 are all state variables of the second synchronous controller; the four state errors are respectively expressed as: e i1 = y i1 - x i1 , e i2 = y i2 - x i2 , e i3 = y i3 - x i3 , e i4 = y i4 - x i4 ; x i1 , x i2 , x i3 , x i4 are respectively the chaotic data output by the second chaotic driving network; y i1 , y i2 , y i3 , y i4 are respectively the chaotic data output by the second chaotic response network; the intermediate variables and They are Constants h 1 ,h 2 ,h 3 ,h 4 ≥0, and constants k 1 ,k 2 ,k 3 ,k 4 >0. 2.如权利要求1所述的基于多层复杂网络的混沌保密通信系统,其特征在于,所述第一同步控制器的三个参数d1,d2,d3随周期更新,记为d1(k),d2(k),d3(k);2. The chaotic secure communication system based on a multi-layer complex network according to claim 1, characterized in that the three parameters d 1 , d 2 , and d 3 of the first synchronization controller are updated periodically and are denoted as d 1 (k), d 2 (k), and d 3 (k); 第1个周期对应的参数d1(1),d2(1),d3(1)通过预先设置;The parameters d 1 (1), d 2 (1), and d 3 (1) corresponding to the first cycle are preset; 第k个周期的参数表示为:ds(k)=mod(temp(s),R)+1;The parameters of the kth cycle are expressed as: d s (k) = mod (temp (s), R) + 1; 其中,s为参数序号,取值1、2、3;中间参量temp(1)、temp(2)和temp(3)为:bin2dec(·)表示将二进制数字转换成十进制数字,mod(temp(s),R)表示temp(s)对常数R取余数,dlen=floor(N/3),floor(·)表示向下取整运算。Where s is the parameter number, which can be 1, 2, or 3. The intermediate parameters temp(1), temp(2), and temp(3) are: bin2dec(·) means converting a binary number into a decimal number, mod(temp(s), R) means taking the remainder of temp(s) with respect to the constant R, dlen=floor(N/3), and floor(·) means rounding down. 3.如权利要求1所述的基于多层复杂网络的混沌保密通信系统,其特征在于,所述第一混沌响应网络用于计算第k个传输周期内时段区间[(k-1)T+Δt,kT]的同步误差ei(t)的积分其中,时间间隔Δt、周期T为预设常数;3. The chaotic secure communication system based on a multi-layer complex network according to claim 1, characterized in that the first chaotic response network is used to calculate the integral of the synchronization error e i (t) of the time interval [(k-1)T+Δt, kT] within the kth transmission cycle Among them, the time interval Δt and the period T are preset constants; 则第i个节点的解密信息则第i个节点的解密信息阈值eth为预设常数。like Then the decrypted information of the i-th node like Then the decrypted information of the i-th node The threshold value e th is a preset constant. 将各节点的解密信息按照节点优先的顺序排列,选取序列中位置处于[1,length]之间的数据作为所述第一解密信息length为所述信息序列m长度。Arrange the decryption information of each node in the order of node priority, and select the data between [1, length] in the sequence as the first decryption information length is the length of the information sequence m. 4.如权利要求1所述的基于多层复杂网络的混沌保密通信系统,其特征在于,所述第二混沌驱动网络用于将所述随机序列seq融入自身网络参数当中并进行参数调制得到所述第二混沌序列;4. The chaotic secure communication system based on a multi-layer complex network according to claim 1, characterized in that the second chaotic driving network is used to integrate the random sequence seq into its own network parameters and perform parameter modulation to obtain the second chaotic sequence; 所述第二混沌驱动网络中第i个节点的第r个参数air的相关映射函数为:The relevant mapping function of the rth parameter a ir of the ith node in the second chaotic driving network is: 其中,r为参数序号,r=1,2,3,4,maxr,minr为预设常数,所述映射函数将air的取值范围限定为[minr,maxr],p为序列seq中元素的最大值;q为序列seq中元素的最小值。Wherein, r is the parameter number, r=1, 2, 3, 4, max r , min r are preset constants, the mapping function limits the value range of a ir to [min r , max r ], p is the maximum value of the elements in the sequence seq; q is the minimum value of the elements in the sequence seq. 5.如权利要求4所述的基于多层复杂网络的混沌保密通信系统,其特征在于,所述第二混沌响应网络用于利用进行解密得到第二解密信息i为第二混沌响应网络的节点序号,round(·)表示四舍五入取整操作。5. The chaotic secure communication system based on a multi-layer complex network as claimed in claim 4, characterized in that the second chaotic response network is used to utilize Decrypt to obtain the second decrypted information i is the node number of the second chaotic response network, and round(·) indicates rounding operation. 6.如权利要求1所述的基于多层复杂网络的混沌保密通信系统,其特征在于,所述后处理模块用于基于所述第一解密信息和所述第二解密信息利用公式反向恢复得到解密信息message*,l表示序列序号,l=1,2,...,length,length为所述信息序列m的总长度。6. The chaotic secure communication system based on a multi-layer complex network according to claim 1, characterized in that the post-processing module is used to and the second decrypted information Using the formula Reverse recovery obtains the decrypted information message*, where l represents the sequence number, l=1, 2, ..., length, and length is the total length of the information sequence m. 7.如权利要求1-6任一项所述的基于多层复杂网络的混沌保密通信系统,其特征在于,所述第一混沌驱动网络和所述第一混沌响应网络的节点数相等,节点数N≥4;7. The chaotic secure communication system based on a multi-layer complex network according to any one of claims 1 to 6, characterized in that the number of nodes in the first chaotic driving network and the first chaotic response network is equal, and the number of nodes N is ≥ 4; 所述第二混沌驱动网络和所述第二混沌响应网络的节点数相等,节点数M与信息序列m长度length的关系为:其中函数ceil(·)表示向上取整。The number of nodes of the second chaotic driving network and the second chaotic response network is equal, and the relationship between the number of nodes M and the length of the information sequence m is: The function ceil(·) represents rounding up. 8.一种基于多层复杂网络的混沌保密通信方法,其特征在于,应用于权利要求1-7任一项所述的基于多层复杂网络的混沌保密通信系统,包括:8. A chaotic secure communication method based on a multi-layer complex network, characterized in that it is applied to the chaotic secure communication system based on a multi-layer complex network as described in any one of claims 1 to 7, comprising: 在发射端执行的操作包括:利用随机序列seq对相同长度的二进制原始明文message进行置乱,得到二进制的信息序列m,将所述信息序列m输入第一混沌驱动网络进行加密得到第一混沌序列,将所述随机序列seq输入第二混沌驱动网络进行加密得到第二混沌序列;其中,所述信息序列m中元素为所述第一混沌驱动网络的系统参数;The operation performed at the transmitting end includes: using a random sequence seq to scramble the binary original plaintext message of the same length to obtain a binary information sequence m, inputting the information sequence m into the first chaotic driving network for encryption to obtain a first chaotic sequence, and inputting the random sequence seq into the second chaotic driving network for encryption to obtain a second chaotic sequence; wherein the elements in the information sequence m are system parameters of the first chaotic driving network; 在接收端执行的操作包括:当第l位二进制数m(l)=0时所述第一同步控制器控制所述第一混沌驱动网络和所述第一混沌响应网络实现同步,当m(l)=1所述第一同步控制器控制所述第一混沌驱动网络和所述第一混沌响应网络不同步,再利用所述第一混沌驱动网络根据所述第一同步控制器的同步误差的数值与预设阈值的大小关系对所述第一混沌序列进行解密得到第一解密信息利用所述第二同步控制器使得第二混沌响应网络和所述第二混沌驱动网络达到完全同步,并利用所述第二混沌驱动网络对所述第二混沌序列进行解密得到第二解密信息利用所述第一解密信息和所述第二解密信息反向恢复得到解密信息message*。The operation performed at the receiving end includes: when the l-th binary number m(l)=0, the first synchronization controller controls the first chaotic driving network and the first chaotic response network to achieve synchronization; when m(l)=1, the first synchronization controller controls the first chaotic driving network and the first chaotic response network to be out of synchronization; and then the first chaotic driving network is used to decrypt the first chaotic sequence according to the relationship between the value of the synchronization error of the first synchronization controller and the preset threshold value to obtain the first decryption information The second chaotic response network and the second chaotic driving network are completely synchronized by using the second synchronous controller, and the second chaotic driving network is used to decrypt the second chaotic sequence to obtain second decrypted information. Using the first decrypted information and the second decrypted information Reverse recovery obtains the decrypted information message*.
CN202410513409.7A 2024-04-26 2024-04-26 Chaotic secret communication system and method based on multilayer complex network Active CN118353601B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410513409.7A CN118353601B (en) 2024-04-26 2024-04-26 Chaotic secret communication system and method based on multilayer complex network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410513409.7A CN118353601B (en) 2024-04-26 2024-04-26 Chaotic secret communication system and method based on multilayer complex network

Publications (2)

Publication Number Publication Date
CN118353601A CN118353601A (en) 2024-07-16
CN118353601B true CN118353601B (en) 2025-04-29

Family

ID=91824255

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410513409.7A Active CN118353601B (en) 2024-04-26 2024-04-26 Chaotic secret communication system and method based on multilayer complex network

Country Status (1)

Country Link
CN (1) CN118353601B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103346875A (en) * 2013-05-08 2013-10-09 东南大学 Method for generating digital chaos code in chaotic secure communication system
CN113556223A (en) * 2021-07-19 2021-10-26 郑州轻工业大学 Image encryption method based on fractional order drive response system finite time synchronization

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109104544B (en) * 2018-08-07 2020-09-22 东北大学 A chaotic image encryption method based on complex network synchronization
CN112258520B (en) * 2020-10-16 2022-03-29 齐鲁工业大学 Image encryption and decryption communication method based on two-dimensional lag complex logistic map
US11734435B2 (en) * 2020-10-16 2023-08-22 Qilu University Of Technology Image encryption and decryption communication algorithm based on two-dimensional lag complex logistic map
CN114302270B (en) * 2021-12-29 2024-02-09 杭州电子科技大学 OFDM-PON physical layer encryption method and system based on multi-chaotic system and hierarchical scrambling
CN117131909A (en) * 2023-07-12 2023-11-28 安徽大学 Memristive neural network-based synchronous control and method thereof in image encryption

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103346875A (en) * 2013-05-08 2013-10-09 东南大学 Method for generating digital chaos code in chaotic secure communication system
CN113556223A (en) * 2021-07-19 2021-10-26 郑州轻工业大学 Image encryption method based on fractional order drive response system finite time synchronization

Also Published As

Publication number Publication date
CN118353601A (en) 2024-07-16

Similar Documents

Publication Publication Date Title
CN110377002B (en) An adaptive in-vehicle CAN bus safety control method and system
US9503257B2 (en) Quantum key distribution device, quantum key distribution system, and quantum key distribution method
US20200259651A1 (en) Multi-party threshold authenticated encryption
CN115694815B (en) Communication encryption method and device for power distribution terminal
WO2021000329A1 (en) Multi-party quantum key agreement method, computer terminal and storage device
WO2023005734A1 (en) Vehicle data uploading method and apparatus, and vehicle, system and storage medium
CN105407483A (en) Method for safe aggregation model communication based on public-state key in wireless sensor network
CN118523934A (en) Secure communication method for equipment data of Internet of things
CN117955096A (en) Power grid automation dispatching method based on data security technology
Jiang et al. Lightweight data security protection method for AMI in power Internet of Things
CN116886295A (en) A data processing method and system based on the Internet of Things
CN110278068B (en) LoRa communication encryption system based on chaotic sequence
US9191324B2 (en) MAC aggregation with message multiplicity for use in a multi-node data network
CN118353601B (en) Chaotic secret communication system and method based on multilayer complex network
CN109104401B (en) Secure real-time based data transmission
CN112332988B (en) An agile quantum privacy query method based on anti-rotation noise
CN119544210A (en) A method for secure transmission of digital information in the Internet of Things
CN106341256B (en) Software-defined network-based V2G system and its secure communication method
CN113517980A (en) Key processing method, device and storage medium
CN112804049B (en) Hexagonal CAP optical transmission method based on dynamic compression and multi-chaos encryption
CN113746642B (en) A computer-to-computer communication method and system
CN112911599B (en) Low-energy-consumption data fusion recessive method supporting integrity verification of wireless sensor network
TWI511509B (en) Advanced metering infrastructure network system and message broadcasting method
JP2018516019A (en) Method for generating a secret or key in a network
Kushwaha et al. Enhancing Selective Encryption Algorithm for Secured MANET

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载