基于改进祖冲之算法的安全跳频通信系统
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Security frequency hopping communication system based on an improved ZUC algorithm
  • 作者:王潮 ; 霍振坤 ; 刘鹏程 ; 刘瑞 ; 张焕国
  • 英文作者:WANG Chao;HUO Zhenkun;LIU Pengcheng;LIU Rui;ZHANG Huanguo;China Key laboratory of Specialty Fiber Optics and Optical Access Networks,Joint International Research Laboratory of Specialty Fiber Optics and Advanced Communication,Shanghai Institute for Advanced Communication and Data Science,Shanghai University;Shanghai HUAWEI Technology Co.,Ltd;The Third Research Institute of the Ministry of Public Security;School of Computer Science,Wuhan University;
  • 关键词:跳频通信 ; 祖冲之算法 ; 演化DES密码 ; NIST测试
  • 英文关键词:frequency hopping;;ZUC algorithm;;evolutionary DES algorithm;;NIST test
  • 中文刊名:QHXB
  • 英文刊名:Journal of Tsinghua University(Science and Technology)
  • 机构:上海大学特种光纤与光接入网重点实验室特种光纤与先进通信国际合作联合实验室上海先进通信与数据科学研究院;上海华为技术有限公司;公安部第三研究所;武汉大学计算机学院;
  • 出版日期:2018-11-16 15:22
  • 出版单位:清华大学学报(自然科学版)
  • 年:2019
  • 期:v.59
  • 基金:国家自然科学基金资助项目(61332019,61572304)
  • 语种:中文;
  • 页:QHXB201902011
  • 页数:8
  • CN:02
  • ISSN:11-2223/N
  • 分类号:72-79
摘要
跳频通信具有良好的抗干扰和抗拦截特性,因此被广泛地应用于很多通信系统中。密码算法的引入可以增强跳频序列的安全性。该文在祖冲之算法3层结构的基础上,对其进行适当的改进,在第1层引入置换多项式方法来增加序列的线性复杂度,并且将第3层替换为演化DES密码算法来增加安全性,进而提出了基于改进ZUC算法的跳频通信系统实现方案。对本方案所产生的跳频序列进行了多种安全性以及随机性测试,实验结果表明:汉明相关性、随机性和动态局部线性复杂度表现良好,并且通过了NIST随机性测试,而后通过Simulink仿真验证了其可行性。
        Frequency hopping is an important anti-jamming and anti-interception technique that is widely used in communication systems.Frequency hopping is then combined with cryptographic algorithms to offer better security.This paper presents a frequency hopping communication system based on an optimized ZUC algorithm with three layers.The introduction of a permutation polynomial in the top layer increases the linear complexity while the evolutionary DES algorithm in the bottom layer achieves high security of the sequences.Security and randomness tests show that the resultant sequences have good hamming correlations,randomness,and linear complexity and pass the NIST test as well.Finally,the system was successfully implemented in the Simulink system.
引文
[1] OJHA P,GUPTA S K.A study on security issues related to wireless communication[J]. International Journal of AdvancedResearchinElectrical, Electronicsand Instrumentation Engineering,2015,4(8):6956-6958.
    [2] SO J,KIM Y.Interference-aware frequency hopping for Bluetooth in crowded Wi-Fi networks[J]. Electronics Letters,2016,52(17):1503-1505.
    [3] GHATE N R,KALE K V.Smart home safety device using frequency hopping approach based on GSM generation[C]//Proceedings of the 1st International Conference on Intelligent Systems and Information Management.Aurangabad,India:IEEE,2017:341-347.
    [4]梅文华.跳频序列设计[M].北京:国防工业出版社,2016.MEI W H.Frequency hopping sequences design[M].Beijing:National Defense Industry Press,2016.(in Chinese)
    [5]张超,庄奕琪,李振荣,等.基于AES跳频算法的蓝牙WPAN网络数据传输性能[J].吉林大学学报(工学版),2010,40(2):576-580.ZHANG C,ZHUANG Y Q,LI Z R,et al.Bluetooth WPAN throughput based on AES frequency-hopping algorithm[J].Journal of Jilin University(Engineering and Technology Edition),2010,40(2):576-580.(in Chinese)
    [6]王克达,刘瑞,胡风,等.基于演化密码的安全跳频序列研究[J].微型电脑应用,2015,31(10):1-4.WANG K D,LIU R,HU F,et al.Study on safe frequency hopping sequence,based on evolutionary cryptosystem[J].MicrocomputerApplications, 2015, 31(10):1-4.(in Chinese)
    [7] WANG C, ZHANG H G, LIU L L. Evolutionary cryptography theory based generating method for a secure Koblitz elliptic curve and its improvement by a hidden Markov models[J].Science China Information Sciences,2012,55(4):911-920.
    [8]张焕国,冯秀涛,覃中平,等.演化密码与DES密码的演化设计[J].通信学报,2002,23(5):57-64.ZHANG H G,FENG X T,QIN Z P,et al.Evolutionary cryptosystems and evolutionary design for DES[J].Journal of China Institute of Communications,2002,23(5):57-64.(in Chinese)
    [9] SASOUSA J, VILELA J P. A characterization of uncoordinated frequency hopping for wireless secrecy[C]//Proceedings of the 7th IFIP Wireless and Mobile Networking Conference.Vilamoura,Portugal:IEEE,2014:1-4.
    [10]FENG G L, TZENG K K. A generalization of the Berlekamp-Massey algorithm for multisequence shift-register synthesis with applications to decoding cyclic codes[J].IEEE Transactions on Information Theory,1991,37(5):1274-1287.
    [11]DING C S,YIN J X.Sets of optimal frequency-hopping sequences[J].IEEE Transactions on Information Theory,2008,54(8):3741-3745.
    [12]高军涛,胡予濮,李雪莲,等.两类最优跳频序列集的线性复杂度[J].通信学报,2012,33(2):175-181.GAO J T,HU Y P,LI X L,et al.Linear complexity of two classes of optimal sets frequency-hopping sequences[J].Journal on Communications, 2012, 33(2):175-181.(in Chinese)
    [13]汤任君,段竞哲,邓洪敏.Logistic混沌序列和DES算法的图像加密方法[J].计算机应用,2017,37(S1):89-92.TANG R J,DUAN J Z,DENG H M.Image encryption algorithm based on Logistic chaotic sequence and DES[J].Journal of Computer Applications,2017,37(S1):89-92.(in Chinese)
    [14]冯秀涛.祖冲之序列密码算法[J].信息安全研究,2016,2(11):1028-1041.FENG X T.The ZUC stream cipher algorithm[J].Journal of Information Security Research,2016,2(11):1028-1041.(in Chinese)
    [15]UZ ZAMAN J K M S,GHOSH R.Review on fifteen statistical tests proposed by NIST[J].Journal of Theoretical Physics&Cryptography,2012,1:18-31.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700