CN118353601B - Chaotic secret communication system and method based on multilayer complex network - Google Patents
Chaotic secret communication system and method based on multilayer complex network Download PDFInfo
- Publication number
- CN118353601B CN118353601B CN202410513409.7A CN202410513409A CN118353601B CN 118353601 B CN118353601 B CN 118353601B CN 202410513409 A CN202410513409 A CN 202410513409A CN 118353601 B CN118353601 B CN 118353601B
- Authority
- CN
- China
- Prior art keywords
- chaotic
- network
- sequence
- information
- driving
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/001—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/12—Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Synchronisation In Digital Transmission Systems (AREA)
Abstract
The invention discloses a chaotic secret communication system and a method based on a multilayer complex network, belonging to the technical field of chaotic secret communication, first, a first chaotic driving network and a second chaotic driving network are arranged at a transmitting end and a first chaotic response network and a second chaotic response network are arranged at a receiving end, and information encryption safety is high in consideration of utilizing parameter sensitivity of a chaotic sequence. And secondly, each chaotic driving and responding network comprises a plurality of nodes, and the complexity of the whole system architecture can be improved by combining the characteristics of huge node number and various connection side relations to design the communication system. And a first synchronous controller arranged at the receiving end controls the first chaotic driving network and the first chaotic response network to achieve generalized synchronization, so that noise robustness is improved. Finally, even if the first chaotic driving and response network is cracked, the data recovery can not be completed under the condition of missing the random sequence, and the system safety is further improved.
Description
Technical Field
The invention belongs to the technical field of chaotic secret communication, and particularly relates to a chaotic secret communication system and method based on a multi-layer complex network.
Background
With the rapid development of the industrial internet, the types and amounts of data involved have also increased exponentially. Including sensitive information such as production plans, process parameters, equipment status, etc., which, once leaked, can lead to production interruptions, reduced commercial competitiveness, and even loss of intellectual property. Therefore, the secret communication has wide application scenes in the industrial Internet, firstly, the security of data transmission is reflected, and the risks that data are intercepted maliciously, tampered or stolen can be effectively prevented by adopting an advanced encryption algorithm and a communication protocol. And secondly, a safe and trusted communication channel is established between industrial equipment, so that the information is not interfered in the transmission process, and the accuracy of real-time control and monitoring is ensured. Meanwhile, the proportion of multimedia information such as images, videos, sounds and the like in network transmission is rapidly increasing under the background of big data age, and the requirements of the computer such as calculation speed, storage capacity and the like are high due to the large data information quantity, so that the quick and efficient encryption is difficult to realize by using the traditional encryption method. To solve this problem, researchers have been looking for new encryption ways to improve information security.
On one hand, the chaos has the characteristics of initial value sensitivity, spatial hybridization, intermittent periodicity and the like, is favorable for increasing the complexity of transmission signals, and has important significance for improving the system performances such as spectrum analysis resistance, cracking resistance and the like of secret communication. On the other hand, complex networks have characteristics of small world and no scale, and the complexity of the network is manifested in the following aspects. Firstly, the connection structure of the network is complex, secondly, the nodes of the network may have the same or different dynamics, and furthermore, the interaction of the interconnected nodes with each other makes the dynamics of the nodes themselves more complex. How to combine chaos and the characteristics of a complex network to improve the complexity of a secret communication system is a problem to be solved in a wireless communication environment.
Disclosure of Invention
Aiming at the defects or improvement demands of the prior art, the invention provides a chaotic secret communication system and a chaotic secret communication method based on a multi-layer complex network, which aim to firstly consider that the high parameter sensitivity of a chaotic sequence is utilized to realize strong information encryption security, secondly utilize two heterogeneous chaotic networks to increase the complexity of chaotic signals, further improve the communication security, and finally relate to a method of using the chaotic networks to realize generalized synchronization to reduce the influence of noise on chaotic encryption, thereby solving the technical problem of how to combine the characteristics of the chaotic and complex networks to improve the complexity of the secret communication system.
To achieve the above object, according to one aspect of the present invention, there is provided a chaotic secret communication system based on a multi-layer complex network, comprising:
The transmitting end comprises a preprocessing module, a first chaotic driving network and a second chaotic driving network; the preprocessing module is used for scrambling binary original plaintext message with the same length by utilizing a random sequence seq to obtain a binary information sequence m, the first chaotic driving network is used for encrypting the information sequence m to obtain a first chaotic sequence, elements in the information sequence m are system parameters of the first chaotic driving network, and the second chaotic driving network is used for encrypting the random sequence seq to obtain a second chaotic sequence;
The receiving end comprises a first synchronous controller, a second synchronous controller, a first chaotic response network, a second chaotic response network and a post-processing module, wherein the first synchronous controller is used for controlling the first chaotic driving network to be synchronous with the first chaotic response network when a first bit binary number m (l) =0 in the information sequence m and controlling the first chaotic driving network to be asynchronous with the first chaotic response network when a first bit binary number m (l) =1, the second synchronous controller is used for controlling the second chaotic response network to be completely synchronous with the second chaotic response network, and the first chaotic response network is used for decrypting the first chaotic sequence according to the magnitude relation between the value of the synchronous error of the first synchronous controller and a preset threshold value to obtain first decryption information The second chaotic response network is used for decrypting the second chaotic sequence to obtain second decryption information seq, and the post-processing module is used for utilizing the first decryption informationAnd reverse recovering the second decryption information seq to obtain decryption information message.
In one embodiment, the first chaotic driving network adopts a unified chaotic system, the first chaotic response network adopts a Lorenz chaotic system, and the control law expression of the first synchronous controller is as follows:
wherein i is a node sequence number, i=1, 2, & gt, N is the node number of the first chaotic driving network, u i1,ui2,ui3 is a state variable of the first synchronous controller, x i1,xi2,xi3 is chaotic data output by the first chaotic driving network respectively, y i1,yi2,yi3 is chaotic data output by the first chaotic response network respectively, e i=(ei1,ei2,ei3)T is a generalized synchronous error existing between the first chaotic driving network and the first chaotic response network, a first error parameter e i1=yi1-d1xi1, a second error parameter e i2=yi2-d2xi2 and a third error parameter e i3=yi3-d3xi3,d1,d2,d3 are three parameters of the first synchronous controller, h 1,h2,h3 is a preset constant, and h 1≥0,h2≥0,h3 is more than or equal to 0.
In one embodiment, the three parameters d 1,d2,d3 of the first synchronization controller are updated with a period, denoted as d 1(k),d2(k),d3 (k);
the parameter d 1(1),d2(1),d3 (1) corresponding to the 1 st period is preset;
The parameter of the kth period is expressed as d s (k) =mod (temp(s), R) +1;
wherein s is a parameter sequence number, and takes values of 1,2 and 3, and the intermediate parameters temp (1), temp (2) and temp (3) are as follows: bin2dec (·) represents converting binary digits into decimal digits, mod (temp(s), R) represents temp(s) taking the remainder of the constant R, dlen =floor (N/3), floor (·) represents a rounding down operation.
In one embodiment, the first chaotic response network is used for calculating the integral of the synchronization error e i (T) of the time interval [ (k-1) T+Δt, kT ] in the kth transmission periodWherein the time interval delta T and the period T are preset constants;
If it is The decryption information of the i-th node isIf it isThe decryption information of the i-th node isThe threshold e th is a preset constant;
arranging decryption information of each node according to the order of node priority, and selecting data positioned between [1, length ] in the sequence as the first decryption information Length is the length of the information sequence m.
In one embodiment, the second chaotic driving network and the second chaotic response network both adopt memristive chaotic systems, and the second chaotic driving network is used for merging the random sequence seq into own network parameters and carrying out parameter modulation to obtain the second chaotic sequence;
the relevant mapping function of the r parameter a ir of the i-th node in the second chaotic driving network is as follows:
wherein r is a parameter sequence number, r=1, 2,3,4, max r,minr is a preset constant, the mapping function limits the value range of a ir to [ min r,maxr ], p is the maximum value of the elements in the sequence seq, and q is the minimum value of the elements in the sequence seq.
In one embodiment, the control law expression of the second synchronous controller is:
the parameter self-adaption law is as follows:
Wherein i represents the node serial number of the second chaotic response network, i=1, 2,., M is the number of nodes of the second chaotic driving network, u i1,ui2,ui3,ui4 is the state variable of the second synchronous controller, four state errors are respectively expressed as :ei1=yi1-xi1,ei2=yi2-xi2,ei3=yi3-xi3,ei4=yi4-xi4;xi1,xi2,xi3,xi4 and y i1,yi2,yi3,yi4 are respectively the chaotic data output by the second chaotic driving network, and the intermediate variable is the chaotic data output by the second chaotic response network AndRespectively isConstant h 1,h2,h3,h4 is greater than or equal to 0, and constant k 1,k2,k3,k4 is greater than 0.
In one embodiment, the second chaotic response network is configured to utilizeAnd decrypting to obtain second decryption information seq i which is the node sequence number of the second chaotic response network, wherein round (·) represents rounding operation.
In one embodiment, the post-processing module is based on the first decryption informationAnd said second decryption information seq, using the formulaReverse recovery results in decryption information message, i denotes the sequence number, i=1, 2.
In one embodiment, the first chaotic driving network and the first chaotic response network have equal node numbers, and the node number N is more than or equal to 4;
the second chaotic driving network and the second chaotic response network have equal node numbers, and the relation between the node number M and the length of the information sequence M is as follows: Where the function ceil (·) represents a round-up.
According to another aspect of the present invention, there is provided a chaotic secret communication method based on a multi-layer complex network, applied to the chaotic secret communication system, including:
Scrambling binary original plaintext message with the same length by utilizing a random sequence seq to obtain a binary information sequence m, inputting the information sequence m into a first chaotic driving network for encryption to obtain a first chaotic sequence, and inputting the random sequence seq into a second chaotic driving network for encryption to obtain a second chaotic sequence, wherein elements in the information sequence m are system parameters of the first chaotic driving network;
The operations executed at the receiving end comprise that when the first bit binary number m (l) =0, the first synchronization controller controls the first chaotic driving network and the first chaotic response network to realize synchronization, when m (l) =1, the first synchronization controller controls the first chaotic driving network and the first chaotic response network to be asynchronous, and then the first chaotic driving network is utilized to decrypt the first chaotic sequence according to the magnitude relation between the value of the synchronization error of the first synchronization controller and a preset threshold value to obtain first decryption information The second synchronous controller is utilized to enable the second chaotic response network and the second chaotic driving network to achieve complete synchronization, the second chaotic sequence is decrypted by utilizing the second chaotic driving network to obtain second decryption information seq, and the first decryption information is utilizedAnd reverse recovering the second decryption information seq to obtain decryption information message.
In general, the above technical solutions conceived by the present invention, compared with the prior art, enable the following beneficial effects to be obtained:
(1) The invention provides a chaotic secret communication system based on a multilayer complex network, which is characterized in that a first chaotic driving network and a second chaotic driving network are arranged at a transmitting end of the chaotic secret communication system, a first chaotic response network and a second chaotic response network are correspondingly arranged at a receiving end of the chaotic secret communication system, and the high parameter sensitivity of a chaotic sequence is utilized to realize strong information encryption security. And secondly, each chaotic driving network and each chaotic response network comprise a plurality of nodes, and the communication system is designed by combining the characteristics of huge number of nodes and various connection side relations of the two layers of networks, so that the complexity of the overall architecture of the system can be improved. And a first synchronization controller arranged at the receiving end controls the first chaotic driving network and the first chaotic response network to achieve generalized synchronization according to binary information transmitted by the current link, and judges whether the transmission information is 0 or 1 by judging errors among corresponding nodes based on the generalized synchronization of the complex network, so that noise robustness is improved. And finally, utilizing the random sequence transmitted by the second chaotic drive and response network, even if the first chaotic drive and response network is cracked, the data recovery can not be completed under the condition of missing the random sequence, and the system safety is further improved.
(2) In this scheme, the control laws of the first synchronous controller are respectively:
It may be realized that the first chaotic driving network and the first chaotic response network are controlled to realize synchronization when a first bit binary number m (l) =0 in the information sequence m, and the first chaotic driving network and the first chaotic response network are controlled to be asynchronous when the first bit binary number m (l) =1.
(3) In the scheme, three parameters d 1,d2,d3 of the first synchronization controller are updated along with the period, the parameter of the kth period is expressed as d s (k) =mod (temp(s), R) +1, and the operation of adding 1 to the remainder of the constant R by temp(s) is to avoid d s (k) =0 to cause that the generalized synchronization condition is not met, and the communication security can be enhanced while the first chaotic driving network and the first chaotic response network are controlled to realize generalized synchronization.
(4) First chaotic response network utilization in this schemeAnd calculating an integral value of a synchronization error e i (T) of a time interval [ (k-1) T+delta T, kT ] in the kth transmission period, wherein the information decryption in each transmission period depends on the information of the previous transmission period, so that the difficulty of cracking by an attacker is improved.
(5) In the scheme, the second chaotic driving network is used for merging the random sequence seq into own network parameters and carrying out parameter modulation to obtain the second chaotic sequence, and the encryption mode is simple to operate and can realize higher calculation complexity, so that the communication safety is improved.
(6) The scheme provides a control law expression of a preferable second synchronous controller, which can enable the second chaotic driving network and the second chaotic response network to achieve complete synchronization, and control parameters of the second chaotic driving network and the second chaotic response network can be adaptively updated, so that communication safety is improved.
(7) The scheme provides a preferred decryption mode for the second chaotic response network, and utilizesAnd the second decryption information seq is obtained through decryption, different value ranges can be set for different parameters, and the parameter leakage risk is reduced.
(8) In this embodiment, the first decryption information is based onAnd said second decryption information seq, using the formulaThe reverse recovery obtains the decryption information message *, so that the coupling relation of two systems is increased, and the safety performance of the whole system is comprehensively improved.
(9) In the scheme, node dynamics of the transmitting end and the receiving end are not required to be kept consistent, so that the flexibility of design and the wide applicability of the system are improved.
(10) In the scheme, the transmission end of the system utilizes the first and second chaotic driving networks to encrypt the information sequence to be transmitted and the random sequence, and the receiving end utilizes the first and second chaotic response networks to correspondingly decrypt the information sequence, so that the information encryption safety is high in consideration of the high parameter sensitivity of the chaotic sequence. And secondly, a first synchronization controller is utilized at a receiving end to control a first chaotic driving network and a first chaotic response network to achieve generalized synchronization according to binary information transmitted by a current link, the generalized synchronization of a complex network is based, and the transmitted information is judged to be 0 or 1 by judging errors among corresponding nodes, so that noise robustness is improved. And finally, utilizing the random sequence transmitted by the second chaotic drive and response network, even if the first chaotic drive and response network is cracked, the data recovery can not be completed under the condition of missing the random sequence, and the system safety is further improved.
Drawings
Fig. 1 is a schematic structural diagram of a chaotic secret communication system provided in embodiment 1 of the present invention;
Fig. 2 is a secure communication frame diagram of a first chaotic driving network and a first chaotic response network provided in embodiment 1 of the present invention;
Fig. 3 is a schematic diagram of allocation rules and parameter updating rules of sequence information m to be transmitted in embodiment 1 of the present invention;
fig. 4 is a secret communication frame diagram of a second chaotic driving network and a second chaotic response network provided in embodiment 1 of the present invention;
FIG. 5 is a schematic diagram of bit error rates of the chaotic secret communication method provided in embodiment 2 of the present invention under different signal to noise ratios;
FIG. 6 is a schematic diagram of an information error without recovery through a subsystem sequence after decryption error of the 7 th node of the 5 th period provided in embodiment 2 of the present invention;
FIG. 7 is a schematic diagram of information error recovered by subsystem sequence after decryption error of the 7 th node of the 5 th period provided in embodiment 2 of the present invention;
FIG. 8 is a schematic diagram of a state variable error of a node when information is correctly transmitted according to embodiment 2 of the present invention;
Fig. 9 is a schematic diagram of the correct transmission information provided in embodiment 2 of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention. In addition, the technical features of the embodiments of the present invention described below may be combined with each other as long as they do not collide with each other.
Example 1
As shown in fig. 1, the present embodiment provides a chaotic secret communication system, which includes a transmitting end and a receiving end.
The transmitting end comprises a preprocessing module, a first chaotic driving network and a second chaotic driving network. The preprocessing module is used for scrambling binary original plaintext message with the same length by utilizing the random sequence seq to obtain a binary information sequence m. And the first chaotic driving network is used for encrypting the information sequence m to obtain a first chaotic sequence. The element in the information sequence m is a system parameter of the first chaotic driving network. And the second chaotic driving network is used for encrypting the random sequence seq to obtain a second chaotic sequence.
The receiving end comprises a first synchronous controller, a second synchronous controller, a first chaotic response network, a second chaotic response network and a post-processing module. And the first synchronous controller is used for controlling the first chaotic driving network and the first chaotic response network to be synchronous when the first bit binary number m (l) =0 in the information sequence m, and controlling the first chaotic driving network and the first chaotic response network to be asynchronous when the first bit binary number m (l) =0. The second synchronous controller is used for controlling the second chaotic response network and the second chaotic driving network to achieve complete synchronization. The first chaotic response network is used for decrypting the first chaotic sequence according to the magnitude relation between the value of the synchronous error of the first synchronous controller and a preset threshold value to obtain first decryption informationThe second chaotic response network is used for decrypting the second chaotic sequence to obtain second decryption information seq. The post-processing module is used for utilizing the first decryption informationAnd reverse recovering the second decryption information seq to obtain decryption information message.
For the preprocessing module, the original information is converted into a string of binary sequence messages, firstly, the binary sequence messages are scrambled according to a rule, taking message= [0,0,1,0,1,1] as an example, the random sequence is seq= [1,3,6,4,2,5], that is, m (1) =message (1) =0, m (2) =message (3) =1 and so on, and finally m= [0,1,1,0,0,1] is obtained through arrangement, then m is transmitted by the first chaotic driving network, and the seq is transmitted by the second chaotic driving network.
For the first chaotic driving network and the first chaotic response network, an encryption/decryption scheme structure as shown in fig. 2 is shown. The first chaotic response network of the receiving end is symmetrically provided with N nodes under the assumption that the first chaotic driving network is provided with N nodes. The first chaotic driving network is composed of N chaotic systems with nodes, wherein state variables of the nodes are used as driving signals, parameters of the driving system are replaced by binary codes m (l), l=1, 2, and length, encryption information is further generated, the first chaotic driving network and the first chaotic response network are controlled by a synchronous controller to realize generalized synchronization, generalized errors of corresponding nodes of the two-layer network are calculated, and the generalized errors are compared with error thresholds, so that original information is recovered.
The first chaotic driving network adopts a unified parameter chaotic system for self dynamics, and is described as the following equation:
i denotes different nodes, i=1, 2,..n; k denotes a transmission period, M (N x (k-1) +i) is information transmitted by the ith node in the kth transmission period, and takes a value of 0 or 1.
The first chaotic response network adopts a Lorenz system, and then a kinetic equation can be described as follows:
i represents a different node from the one in question, i=1, 2,. -%, N; u i(t)=[ui1,ui2,ui3]T is a synchronous controller.
Preferably, the first chaotic driving network adopts a unified chaotic system, and the first chaotic response network adopts a Lorenz chaotic system. The control law expression of the first synchronous controller is:
Where i is the node number, i=1, 2,..n. N is the number of nodes of the first chaotic driving network, and u i1,ui2,ui3 is the state variable of the first controller. x i1,xi2,xi3 are respectively chaotic data output by the first chaotic driving network. y i1,yi2,yi3 is respectively chaotic data output by the first chaotic response network. Defining the state error ei1=yi1-d1xi1,ei2=yi2-d2xi2,ei3=yi3-d3xi3, so that the generalized synchronization error existing between the driving and chaotic response networks is expressed as Where the variable d 1,d2,d3 noteq 0 is a generalized synchronization functionCorresponding parameters, nodes are consistent in each transmission period, but different periods are updated according to rules. When the information m (l) =0 to be transmitted, the invention designs a synchronous controller as follows to realize generalized synchronization of the chaotic driving network and the chaotic response network. h 1,h2,h3 is a preset constant and h 1≥0,h2≥0,h3 is not less than 0.
Preferably, the three parameters d 1,d2,d3 of the first synchronization controller are updated with the period, denoted as d 1(k),d2(k),d3 (k). The parameter d 1(1),d2(1),d3 (1) corresponding to the 1 st period is preset. The update rule of the three parameters d 1(k),d2(k),d3 (k) of the synchronization controller is shown in fig. 3, and the information transmitted in the previous period is used to update the parameters of the next period, where the parameters of the first period may be defined as d 1(1)=d2(1)=d3 (1) =1. The parameters of the kth period are expressed as:
d s (k) =mod (temp(s), R) +1. Wherein s is a parameter sequence number, and takes values of 1, 2 and 3. The intermediate parameters temp (1), temp (2) and temp (3) are:
bin2dec (·) represents converting binary digits into decimal digits, mod (temp(s), R) represents temp(s) taking the remainder of the constant R, dlen =floor (N/3), floor (·) represents a rounding down operation.
Preferably, the first chaotic response network is used for calculating an integrated value of a synchronization error e i (T) of a period interval [ (k-1) t+Δt, kT ] in the kth transmission periodWherein the time interval deltat and the period T are preset constants. If it isDecryption information of the i-th nodeIf it isDecryption information of the i-th nodeThe threshold e th is a preset constant. Arranging decryption information of each node according to the order of node priority, and selecting data positioned between [1, length ] in the sequence as first decryption informationLength is the length of the information sequence m.
Specifically, the first chaotic response network extracts x i from the transmission channel, further generates a required chaotic sequence y i in the first chaotic response network according to the first synchronous controller, and then calculates the generalized synchronous error of the states of corresponding nodes of the first chaotic response network and the first chaotic driving networkAssuming that the transmission information m (l) =0 at the transmitting end, the two-layer network is synchronized, i.e., Δt time passes before ||e i (t) |→0. For the kth transmission period, the integral of the synchronization error in [ (k-1) T+Δt, kT ] is calculatedSince m (l) =0, thenIf the transmission information m (l) =1, thenTherefore, the synchronization error integrated value is compared with the threshold value e th =10, and then it is judged whether or not synchronization is achieved, thereby determining that the transmitted information m (l) is 0 or 1. And finally, recombining the information obtained after decryption of each node according to the order of node priority, and removing the last redundant transmission information according to the sequence length to obtain
For the second chaotic driving network and the second chaotic response network, the structural framework is shown in fig. 4. The second chaotic driving network is used for secret communication of the seq, has a structure similar to that of the first chaotic driving network and the first chaotic response network and is also divided into a transmitting end, a receiving end and a transmission channel. The second chaotic driving network of the transmitting end is provided with M nodes, and the second chaotic response network of the receiving end is provided with M nodes. The random sequence seq is fused into the system parameters and modulated under the assumption that the driving signal is a node state variable of the network, and the chaos driving network of the transmitting end and the chaos response network of the receiving end are synchronized by designing corresponding synchronous controllers and parameter updating rules so as to further perform parameter identification and restore original information.
The kinetic equation of the second chaotic driving network adopts a memristive chaotic system, and the chaotic driving network is described by the following equation:
Where i represents the number of different nodes, i=1, 2, M, a i1,ai2,ai3,ai4 is a system parameter.
Preferably, the second chaotic driving network and the second chaotic response network both adopt memristive chaotic systems. The second chaotic driving network is used for merging the random sequence seq into the network parameters and carrying out parameter modulation to obtain a second chaotic sequence. The relevant mapping function of the r parameter a ir of the i-th node in the second chaotic driving network is as follows:
wherein r is a parameter sequence number, r=1, 2,3,4, max r,minr is a preset constant, the mapping function limits the value range of a ir to [ min r,maxr ], p is the maximum value of the elements in the sequence seq, and q is the minimum value of the elements in the sequence seq.
Regarding the dynamics equation of the second chaotic response network, assuming that the dynamics of the chaotic response network node itself is different from the chaotic driving network, the chaotic response network can be described as:
Where i represents the number of different nodes, i=1, 2, M, u i(t)=[ui1,ui2,ui3,ui4]T is a synchronous controller.
Preferably, the control law expressions of the second synchronous controller are respectively:
the parameter self-adaption laws are respectively as follows: Wherein u i1,ui2,ui3,ui4 are all state variables of the second controller. The four state errors are respectively expressed as :ei1=yi1-xi1,ei2=yi2-xi2,ei3=yi3-xi3,ei4=yi4-xi4.xi1,xi2,xi3,xi4 and are respectively chaotic data output by the second chaotic driving network. y i1,yi2,yi3,yi4 is respectively chaotic data output by the second chaotic response network. Intermediate variable AndRespectively is I represents the node sequence number of the second chaotic response network. Constant h 1,h2,h3,h4 is greater than or equal to 0, and constant k 1,k2,k3,k4 is greater than 0.
Preferably, the second chaotic response network is for utilizingAnd decrypting to obtain second decryption information seq i which is the node sequence number of the second chaotic response network, wherein round (·) represents rounding operation. Namely, the second chaotic response network is arranged at the receiving end and is obtained by receiving the chaotic signal and synchronizing by utilizing the synchronous controller and the parameter identification ruleAnd further obtaining the sequence seq by using a recovery function:
preferably, the post-processing module is based on the first decryption information And second decryption information seq, using the formulaReverse recovery results in decryption information message, i denotes sequence number, i=1, 2.
Preferably, the first chaotic driving network and the first chaotic response network have equal node numbers, and the node number N is more than or equal to 4. The nodes of the second chaotic driving network and the second chaotic response network are equal, and the relation between the node number M and the length of the information sequence M is as follows: Where the function ceil (·) represents a round-up. Wherein the information m (l) is allocated in order of preferentially satisfying the node arrangement, and a plurality of period transmission is performed, for example, the information transmitted by the ith node in the kth transmission period is m (n× (k-1) +i). When the m (l) last bit allocation is completed, the remaining nodes of the period will randomly transmit either 0 or 1. The total transmission cycle number is Where the function ceil (·) represents a round-up. The relation between the number of the second chaotic driving network nodes and the length of the binary information sequence is as follows: Where the function ceil (·) represents a round-up.
Example 2
The embodiment provides a chaotic secret communication method, which is applied to the chaotic secret communication system and comprises the following steps:
The operation executed at the transmitting end comprises the steps of scrambling binary original plaintext message with the same length by utilizing a random sequence seq to obtain a binary information sequence m, inputting the information sequence m into a first chaotic driving network for encryption to obtain a first chaotic sequence, and inputting the random sequence seq into a second chaotic driving network for encryption to obtain a second chaotic sequence. The element in the information sequence m is a system parameter of the first chaotic driving network.
The operations executed at the receiving end comprise that when the first bit binary number m (l) =0, the first synchronous controller controls the first chaotic driving network and the first chaotic response network to realize synchronization, when the m (l) =1, the first synchronous controller controls the first chaotic driving network and the first chaotic response network to be asynchronous, and then the first chaotic driving network is utilized to decrypt the first chaotic sequence according to the magnitude relation between the value of the synchronous error of the first synchronous controller and a preset threshold value to obtain first decryption informationThe second chaotic response network and the second chaotic driving network are completely synchronized by using the second synchronous controller, the second chaotic sequence is decrypted by using the second chaotic driving network to obtain second decryption information seq, and the first decryption information is usedAnd reverse recovering the second decryption information seq to obtain decryption information message.
Assuming that 100 bits of information are transmitted, the number of nodes of the main system including the first chaotic driving network and the first chaotic response network is 10, the transmission period of the main system is 10. According to the invention, a noise component is added to a transmission channel, and a receiving end acquires actual information { x i1+ni1,xi2+ni2,xi3+ni3 }, wherein a superimposed component n i1,ni2,ni3 is noise.
The embodiment uses Gaussian white noise for simulation, and whether the scheme is effective in the case that the channel has noise or not is researched according to experiments. The Gaussian white noise is subjected to normal distribution, power spectrums on different frequencies are equal after Fourier transformation, and meanwhile, correlation does not exist among all moments. In the communication field, the signal-to-noise ratio refers to the effective power ratio of signal to noise, and the calculation formula is as follows: wherein P s,Pn represents the effective power of the signal and noise, respectively, in W and SNR in dB. The invention changes the power of noise, tests the error rate of system transmission information under different signal to noise ratios, and partial results are shown in figure 5. It can be seen that the higher the noise, i.e. the lower the signal-to-noise ratio, the higher the system error rate, but the signal-to-noise ratio is above 29dB, which enables efficient decryption.
Here, the transmission period is set to a dimensionless time t=1, and assuming that the decryption information is erroneous at the 5 th transmission period node 7, the main system decryption result is shown in fig. 6. It can be seen that the information transmitted by the node 7 of the 5 th transmission period does not match the correct information, and the decryption error of the variable d 1(6),d2(6),d3 (6) after the period causes that the first chaotic driving network of the 6 th period and the receiving end cannot be synchronized, so that the decrypted data is 1, and a chain reaction is caused, and the decryption information of the subsequent period is all 1. The final decrypted data is further recovered by subsystem information, as shown in fig. 7, the subsystem includes a second chaotic driving network and a second chaotic response network. It can be concluded that for an attacker, as long as there are few node cracking errors, the subsequent transmission cycle will have the decryption information 1, resulting in errors, and that after recovery of the random sequence through the subsystem will have the errors spread over the whole transmission sequence.
The two-stage system correctly transmits information, and randomly selects a certain main system node to calculate the synchronization errorThe results are shown in FIG. 8. It can be seen that if the previous cycle is not synchronized and the next cycle is synchronized, a larger error is caused at the initial time of the synchronization cycle, but the subsequent cycle can still be reduced. In the 1 st, 5 th and 7 th transmission periods, the node transmission error is approximately reduced to 0, and the node error in the rest transmission periods is far greater than 0, so that the node transmission information is judged to be [0,1,1,1,0,1,0,1,1,1], and the experimental verification result is correct. The entire information sequence of the final decryption is shown in fig. 9. In conclusion, the two-stage chaotic secret system designed by the invention can effectively improve the anti-cracking capability, so that the information transmission is safer and more effective.
It will be readily appreciated by those skilled in the art that the foregoing description is merely a preferred embodiment of the invention and is not intended to limit the invention, but any modifications, equivalents, improvements or alternatives falling within the spirit and principles of the invention are intended to be included within the scope of the invention.
Claims (8)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202410513409.7A CN118353601B (en) | 2024-04-26 | 2024-04-26 | Chaotic secret communication system and method based on multilayer complex network |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202410513409.7A CN118353601B (en) | 2024-04-26 | 2024-04-26 | Chaotic secret communication system and method based on multilayer complex network |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN118353601A CN118353601A (en) | 2024-07-16 |
| CN118353601B true CN118353601B (en) | 2025-04-29 |
Family
ID=91824255
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202410513409.7A Active CN118353601B (en) | 2024-04-26 | 2024-04-26 | Chaotic secret communication system and method based on multilayer complex network |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN118353601B (en) |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103346875A (en) * | 2013-05-08 | 2013-10-09 | 东南大学 | Method for generating digital chaos code in chaotic secure communication system |
| CN113556223A (en) * | 2021-07-19 | 2021-10-26 | 郑州轻工业大学 | Image encryption method based on fractional order drive response system finite time synchronization |
Family Cites Families (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109104544B (en) * | 2018-08-07 | 2020-09-22 | 东北大学 | A chaotic image encryption method based on complex network synchronization |
| CN112258520B (en) * | 2020-10-16 | 2022-03-29 | 齐鲁工业大学 | Image encryption and decryption communication method based on two-dimensional lag complex logistic map |
| US11734435B2 (en) * | 2020-10-16 | 2023-08-22 | Qilu University Of Technology | Image encryption and decryption communication algorithm based on two-dimensional lag complex logistic map |
| CN114302270B (en) * | 2021-12-29 | 2024-02-09 | 杭州电子科技大学 | OFDM-PON physical layer encryption method and system based on multi-chaotic system and hierarchical scrambling |
| CN117131909A (en) * | 2023-07-12 | 2023-11-28 | 安徽大学 | Memristive neural network-based synchronous control and method thereof in image encryption |
-
2024
- 2024-04-26 CN CN202410513409.7A patent/CN118353601B/en active Active
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103346875A (en) * | 2013-05-08 | 2013-10-09 | 东南大学 | Method for generating digital chaos code in chaotic secure communication system |
| CN113556223A (en) * | 2021-07-19 | 2021-10-26 | 郑州轻工业大学 | Image encryption method based on fractional order drive response system finite time synchronization |
Also Published As
| Publication number | Publication date |
|---|---|
| CN118353601A (en) | 2024-07-16 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN110377002B (en) | An adaptive in-vehicle CAN bus safety control method and system | |
| US9503257B2 (en) | Quantum key distribution device, quantum key distribution system, and quantum key distribution method | |
| US20200259651A1 (en) | Multi-party threshold authenticated encryption | |
| CN115694815B (en) | Communication encryption method and device for power distribution terminal | |
| WO2021000329A1 (en) | Multi-party quantum key agreement method, computer terminal and storage device | |
| WO2023005734A1 (en) | Vehicle data uploading method and apparatus, and vehicle, system and storage medium | |
| CN105407483A (en) | Method for safe aggregation model communication based on public-state key in wireless sensor network | |
| CN118523934A (en) | Secure communication method for equipment data of Internet of things | |
| CN117955096A (en) | Power grid automation dispatching method based on data security technology | |
| Jiang et al. | Lightweight data security protection method for AMI in power Internet of Things | |
| CN116886295A (en) | A data processing method and system based on the Internet of Things | |
| CN110278068B (en) | LoRa communication encryption system based on chaotic sequence | |
| US9191324B2 (en) | MAC aggregation with message multiplicity for use in a multi-node data network | |
| CN118353601B (en) | Chaotic secret communication system and method based on multilayer complex network | |
| CN109104401B (en) | Secure real-time based data transmission | |
| CN112332988B (en) | An agile quantum privacy query method based on anti-rotation noise | |
| CN119544210A (en) | A method for secure transmission of digital information in the Internet of Things | |
| CN106341256B (en) | Software-defined network-based V2G system and its secure communication method | |
| CN113517980A (en) | Key processing method, device and storage medium | |
| CN112804049B (en) | Hexagonal CAP optical transmission method based on dynamic compression and multi-chaos encryption | |
| CN113746642B (en) | A computer-to-computer communication method and system | |
| CN112911599B (en) | Low-energy-consumption data fusion recessive method supporting integrity verification of wireless sensor network | |
| TWI511509B (en) | Advanced metering infrastructure network system and message broadcasting method | |
| JP2018516019A (en) | Method for generating a secret or key in a network | |
| Kushwaha et al. | Enhancing Selective Encryption Algorithm for Secured MANET |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |