首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
基于广义混沌映射切换的混沌同步保密通信   总被引:24,自引:3,他引:24       下载免费PDF全文
张家树  肖先赐 《物理学报》2001,50(11):2121-2125
提出了一种基于广义混沌映射切换的混沌同步保密通信方式.这种通信方式首先构建产生多种混沌序列的广义混沌映射模型,然后在不同时段根据切换策略产生不同混沌序列,在发送端,将信号与混沌载波之和取模运算后再嵌入混沌映射的输入端进行迭代运算以实现调制;在接收端,根据切换协议,用同一个相应的广义混沌映射模型从接收信号中提取混沌载波并进而恢复信息信号.研究结果表明:这种基于广义混沌映射切换的混沌同步通信方式比基于单一混沌系统的保密通信方式具有更强的抗干扰能力,保密性能更好,且实现简单. 关键词: 混沌 混沌映射切换 同步 保密通信  相似文献   

2.
利用状态反馈方法成功地实现了 6维超混沌Chua电路的广义同步建立速度的加快 ,极大地缩短了同步过渡时间。同时 ,在广义同步的基础上设计了一种超混沌保密通信方案 ,有效地提高了通信系统的保密性能。理论分析和数值仿真均取得了显著的效果。  相似文献   

3.
使用GTEM Cell实验系统,研究了连续波电磁辐射对基于混沌同步理论的保密通信系统的电磁干扰。混沌保密通信系统采用由典型的Chua氏混沌电路构造混沌同步系统,采用掩盖法对模拟信号进行加密传输。实验发现:在100MHz~150MHz的频率范围内,超过一定功率密度的电磁辐射会导致系统的混沌加密功能失效,此后即使停止电磁辐射,系统仍无法自行恢复到混沌加密状态。  相似文献   

4.
 使用GTEM Cell实验系统,研究了连续波电磁辐射对基于混沌同步理论的保密通信系统的电磁干扰。混沌保密通信系统采用由典型的Chua氏混沌电路构造混沌同步系统,采用掩盖法对模拟信号进行加密传输。实验发现:在100MHz~150MHz的频率范围内,超过一定功率密度的电磁辐射会导致系统的混沌加密功能失效,此后即使停止电磁辐射,系统仍无法自行恢复到混沌加密状态。  相似文献   

5.
基于一阶时滞混沌系统参数辨识的保密通信方案   总被引:4,自引:0,他引:4       下载免费PDF全文
王明军  王兴元 《物理学报》2009,58(3):1467-1472
基于参数调制原理,针对一阶时滞Logistic混沌系统设计了相应的参数观测器,仅传递单路信号就可以成功辨识出系统中的未知参数,从而恢复出调制在参数中的模拟信号,并在此基础上采用不同频率信号代替“0”或“1”,设计出具体的数字保密通信方案.数值仿真验证了本方法的有效性. 关键词: 观测器 混沌保密通信 参数调制 滤波  相似文献   

6.
于灵慧  房建成 《物理学报》2005,54(9):4012-4018
利用神经网络的学习、逼近能力构造混沌神经网络,提出逆控制混沌同步方法来同步两个混沌神经网络,并基于逆控制和混沌神经网络的同步给出一种新的混沌保密通信系统.理论分析和数值实验结果表明,新系统能够有效地克服信道噪声对信息传输的不良影响,具有较强通用性和柔韧性,且有同步速度快,信号恢复精度高和密钥量大的优点. 关键词: 混沌同步 自适应逆控制 混沌神经网络 保密通信  相似文献   

7.
EMR对混沌同保密通信系统干扰的初步研究   总被引:2,自引:2,他引:0  
使用GTEMcell实验系统,研究了连续波电磁辐射对基于混沌同步理论的保密通信系统的电磁干扰。混沌保密通信系统采用由典型的Chua氏混沌电路构造混沌同步系统,采用掩盖法对模拟信号进行加密传输。实验发现在100MHz~150MHz的频率范围内,超过一定功率密度的电磁辐射会导致系统的混沌加密功能失效,此后即使停止电磁辐射,系统仍无法自行恢复到混沌加密状态。  相似文献   

8.
颜森林 《物理学报》2008,57(5):2819-2826
把量子阱激光混沌耦合反馈同步系统应用于光纤保密通信中,提出光纤混沌双芯双向保密通信设想.通过耦合外部光注入多量子阱激光混沌全光耦合反馈同步系统和光纤传输信道,建立了光纤混沌双芯双向通信系统物理模型.理论和数值证明了激光混沌同步,理论分析指出光纤中的自相位调制是限制激光混沌在光纤传输中同步的主要原因,并推导出混沌信号双芯双向传输中的非线性相移以及混沌激光功率限制和传输距离公式.数值实现了该系统在长距离二根光纤传输中的同步,详细地分析了系统同步时间随光纤传输长度的关系.模拟了调制频率06 GHz的混沌模拟通 关键词: 混沌 同步 光纤 保密通信  相似文献   

9.
约瑟夫森结的混沌行为及其在保密通信中的应用   总被引:1,自引:1,他引:0  
约瑟夫森结的混沌行为在研究和应用方面都具有重要的价值。电阻-电容-电感并联约瑟夫森结在直流电流的驱动下会出现混沌行为,采用数值计算的方法,对混沌行为进行了研究。通过电压波形、频谱、对初始条件的敏感依赖以及奇怪吸引子,证实了混沌的存在,在此基础上首次提出了基于约瑟夫森结混沌行为的保密通信方案。  相似文献   

10.
11.
In this paper, we propose a novel approach to secure communication based on spatiotemporal chaos. At the transmitter end, the state variables of the coupled map lattice system are divided into two groups: one is used as the key to encrypt the plaintext in the N-shift encryption function, and the other is used to mix with the output of the N-shift function to further confuse the information to transmit. At the receiver end, the receiver lattices are driven by the received signal to synchronize with the transmitter lattices and an inverse procedure of the encoding is conducted to decode the information.Numerical simulation and experiment based on the TI TMS320C6713 Digital Signal Processor(DSP) show the feasibility and the validity of the proposed scheme.  相似文献   

12.
利用混沌信号幅值实现混沌同步   总被引:1,自引:0,他引:1       下载免费PDF全文
唐良瑞  樊冰  亢中苗 《物理学报》2012,61(8):80508-080508
构造了一个三维混沌系统, 简要分析了该混沌系统的平衡点性质、混沌吸引子相图和Lyapunov指数等特性. 在此基础上, 利用反馈同步思想设计了一种利用混沌信号部分信息实现混沌同步的方法, 完成了三维混沌系统的同步. 该方法仅利用混沌信号幅值信息即可实现两个混沌系统的同步, 其同步建立与混沌信号的极性无关, 此特性可有效提高混沌通信质量. 通过分析系统的条件Lyapunov指数证实该方法的有效性, 数值仿真表明该方法与利用混沌信号全部信息的线性反馈同步法相比, 同步建立时间基本相同.  相似文献   

13.
A new chaotic communication scheme using adaptive synchronization technique of two unified chaotic systems is proposed. Different from the existing secure communication methods, the transmitted signal is modulated into the parameter of chaotic systems. The adaptive synchronization technique is used to synchronize two identical chaotic systems embedded in the transmitter and the receiver. It is assumed that the parameter of the receiver system is unknown. Based on the Lyapunov stability theory, an adaptive control law is derived to make the states of two identical unified chaotic systems with unknown system parameters asymptotically synchronized; thus the parameter of the receiver system is identified. Then the recovery of the original information signal in the receiver is successfully achieved on the basis of the estimated parameter. It is noticed that the time required for recovering the information signal and the accuracy of the recovered signal very sensitively depends on the frequency of the information signal. Numerical results have verified the effectiveness of the proposed scheme.  相似文献   

14.
《Physics letters. A》2006,358(4):283-288
In this Letter, we introduce a new cryptosystem by integrating the asymptotic model of deterministic randomness with the one-way coupled map lattice (OCML) system. The key space, the encryption efficiency, and the security under various attacks are investigated. With the properties of deterministic randomness and spatiotemporal dynamics, the new scheme can improve the security to the order of computational precision, even when the lattice size is three only. Meanwhile, all the lattices can be fully utilized to increase the encryption speed.  相似文献   

15.
郭迎  陈志刚  曾贵华 《中国物理》2007,16(9):2549-2556
Based on the techniques of the quantum remote state preparation via a deterministic way, this paper proposes a quantum communication scheme to distribute the secret messages in two phases, i.e., the carrier state checking phase and the message state transmitting phase. In the first phase, the secret messages are encoded by the sender using a stabilizer quantum code and then transmitted to the receiver by implementing three CNOT gates. In the second phase, the communicators check the perfectness of the entanglement of the transmitted states. The messages can be distributed to the receiver even if some of the transmitted qubits are destroyed.  相似文献   

16.
Secure communication through synchronization of chaotic signals is experimentally demonstrated using a nonlinear hybrid optical system. We use a small-time continuous feedback method to achieve synchronization. This method does not require that the system under study be divided into subsystems.  相似文献   

17.
Phase synchronization of chaotic systems with both weak and strong couplings has recently been investigated extensively. Similar to complete synchronization, this type of synchronization can also be applied in secure communications. We develop a digital secure communication scheme that utilizes the instantaneous phase as the signal transmitted from the drive to the response subsystems. Simulation results show that the scheme is difficult to be broken by some traditional attacks. Moreover, it operates with a weak positive conditional Lyapunov exponent in the response subsystem.  相似文献   

18.
This paper proposes a unified framework to achieve chaos synchronization of both classes of chaotic discrete-time systems, namely maps involving polynomial nonlinearities and piecewise linear maps. It is shown that all of those chaotic systems can be rewritten as a polytopic Linear Parameter Varying (LPV) system. A unified approach to tackle chaos synchronization problems encountered in communication is derived.  相似文献   

19.
In this paper, a bidirectional chaos secret communication system, based on mutually coupled semiconductor lasers (MCSLs) with asymmetrical bias currents, is proposed, and the synchronization characteristics and the communication performances of such a system are numerically investigated. The results show that the stable leader-laggard chaos synchronization can be achieved under relatively large asymmetrical bias current levels. Meantime, the influence of the intrinsic parameter variations of the laser on the synchronization quality is also considered, and the simulation reveals that this system still possesses good robustness to the parameter variations. Moreover, the influences of delay time and mutually coupling strength between the two lasers on chaos communication performance have also been discussed. Finally, unidirectional and bidirectional secret communication performances of such a system are examined under the chaos masking (CMS) encryption scheme, and the security of this system is also discussed.  相似文献   

20.
A security analysis of a recently proposed secure communication scheme based on the phase synchronization of chaotic systems is presented. It is shown that the system parameters directly determine the cipher text waveform, hence it can be readily broken by system parameter estimation from the cipher text signal.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号