FH/DS电台中跳频图案设计与跳频加密技术的研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
跳频通信以其抗干扰、抗衰落、抗截获、多址性能好等优点,在现代军事通信中得到了广泛的应用。作为跳频通信的三大关键技术之一,跳频序列(跳频图案)的产生对跳频通信的系统性能有着重大的影响,本文根据实际情况,设计出了多频段、多模式机载数字超短波FH/DS电台和软件无线数传电台所需的跳频图案。
     另外,军用电台需要高保密性,虽然跳频通信具有一定的保密性,但保密性相对较低。通过利用序列密码对跳频系统进行加密,可寻求到具有较好密码强度的跳频序列和更为安全的信息传输。
     本文利用混沌技术,通过对混沌映射的选取,选取出了易于实现,且性能优良的混沌映射;通过初始参数的加扰,使有限精度下混沌的短周期行为得以改善;通过利用混沌序列与m序列异或构成了混合混沌序列,在混合混沌序列的基础上构造出了双混沌系统,从而提高系统的抗破译能力,设计出了混沌序列密钥生成器。大量的对比分析试验表明,该密钥生成器生成的混沌序列密码的密码学特性良好。
     同时,本文还努力的寻求一种在有限精度条件下混沌加密的可实现方案,并利用混沌序列密码对跳频系统进行加密。一方面,本文利用混沌序列密码对跳频序列进行加密,仿真验证结果表明,电台系统的跳频序列的安全性能得到了一定程度的改善。另一方面,本文还对电台系统待传输信息进行加密,保证了在跳频图案被侦破的情况下,敌方也难以获知我方的通信信息。
Possessing the strong ability of anti-jamming, anti-fading, anti-interception as well as the application of multiple access,frequency hopping(FH) communication is widely used in the modern military communication.As one of three essential technical factors of FH communication system,frequency hopping pattern plays great part in FH communication system.Based on practical applications,this thesis presents the FH patterns what FH/DS radio needs.
     For meeting the military radio needs,we encrypt the FH system with stream cipher to enhance it’s security.It is a good way to guarantee information safety and improve the properties of FH sequences .
     Fairly good chaos map,which is of high performance and be implement easily is selected.With the introducing of appropriate perturbation aimed to change the initial conditions ,we may enlarge the chaotic sequence period under finite precision in practical applications. Mixed chaotic model is constructed by combining Logistic sequences and m-sequences in form of exclusive-OR.And we ,by adding two mixed chaotic model,constructed double chaotic system to generate the key generator,which provides with excerllent cryptographic properties.
     Under finite precision ,ways we always seek is easy to implement.And we encrypt the FH system with chaotic stream cipher.Simulation results show that the security properties of FH sequence have been improved and the security of information is guaranteed even the FH patterns are broken.
引文
[1] D.R.Frey. Chaotic digital encoding an approach to secure communication. IEEE Trans,On circuits and systems(II),1993,40(10):660-666
    [2] SIMON M K, OMURA J K, SCHOLTZ R A, etal. Spread Spectrum Communications [M]. Rockville, MD,Computer Science Press
    [3] 梅文华, 杨义先.基于 GF ( p k)上 m 序列的最佳跳频序列族[J].通信学报,1996,17(2):12-16
    [4] 梅文华, 杨义先. 跳频通信地址编码理论[M]. 北京:国防工业出版社, 1996
    [5] BLUESTEIN L I. A New Technique for Generating Good Frequency Hopping Patterns for Multiple Access[R]. Technical Note 28
    [6] YANG Y X. Enumeration results for the codewords having no inner periods in Reed-Solomon codes[J]. Chinese Science Bulletin,1991, 36(19): 1650-1655
    [7] TITLEBAUM E L. Time-frequency hop signals part I: coding based upon the theory of linear congruences[J]. IEEE Trans, 1981,AES-17(4): 490-493
    [8] KUMAR P V. Frequency hopping code sequence designs having large linear span[A]. IEEE GLOBECOM'84[C]. 1984:989-993
    [9] 梅文华, 杨义先. 基于 GMW 序列构造最佳跳频序列族[J]. 通信学报, 1997, 18(11):20-24
    [10] 李文化, 王智顺, 何振亚. 用于跳频多址通信的混沌跳频码[J]. 通信学报, 1996, 17(6):12-16
    [11] 陈文德. 宽间隔的跳频图样[J]. 系统科学与数学, 1983, 3(4): 295-303
    [12] 洪福明, 张世平. 宽间隔跳频图案的探讨[J]. 成都电讯工程学院学报, 1985, (增刊 2): 6-12
    [13] 李斌, 赖仪一. 一种宽间隔码序列的研究[J]. 通信工程学院学报, 1989, (2): 84-89
    [14] 梅文华. 宽间隔的非重复跳频序列族[J]. 通信学报, 1994, 15(6): 63-68
    [15] 梅文华, 张志刚. 一类新的宽间隔跳频序列族的构造[J]. 电波科学学报, 2002, 17(1): 16-20
    [16] 周红,凌燮亭.混沌保密通信原理及其保密性分析.电路与系统学报.1996,1(3):57-62
    [17] 周红,凌燮亭.有限精度混沌系统的m序列的扰动实现.电子学报.1997,25(7):95-97
    [18] 周红,罗杰,凌燮亭.混沌非线性反馈密码序列的理论设计和有限精度实现.电子学报.1997,25(10):57-61
    [19] 周红,俞军,凌燮亭.混沌前馈型流密码的设计.电子学报 1998,26(1):98-101
    [20] 胡国杰,冯正进.一类新型混沌密码序列的理论设计.通信技术.2003,4:73-74
    [21] 桑涛,王汝笠,严义埙.一类新型混沌反馈密码序列的理论设计.电子学报.1999,27(7):47-50
    [22] 李红达,冯登国.基于复合离散混沌动力系统的序列密码算法.软件学报.2003,14(5):991-998
    [23] 王相生,甘骏人.一种基于混沌的序列密码生成方法.计算机学报.2002,25(4):351-356
    [24] 查光明,熊贤祚. 扩频通信,西安,西安电子科技大学出版社,2004,37- 44
    [25] 甘良才,包永强,杨桂文,茹国宝,一类新的宽间隔跳频码的实现,武汉大学学报(自然科学版),1999,45(1):95-98
    [26] 李超,谢端强.钟控序列的研究[J].密码与信息,1992,40(2):1-8
    [27] 王永澄,采用 Reed-Solomon 码的跳频图样[J].南京航空学院学报 1981,(3):36-46
    [28] 梅文华,杨义先,周炯槃.跳频序列设计理论的研究进展.通信学报.Vol.24 No.22,2003,24(22):93-98
    [29] LEMPEL A, GREENBERGER H. Families of sequences with optimal Hamming correlation properties[J]. IEEE Trans, 1974,IT-20(1):90-94.
    [30] SEAYTS.Hopping patterns for bounded mutual interference in frequency hopping multiple access[A].Proc 1982 IEEE MILCOM Conference[C]. Boston, Massachusetts, 1982,22(3):1-22
    [31] 梅文华. 非重复跳频序列族的理论限制[J]. 电子科学学刊, 1995, 17(3):238-242
    [32] 张世平, 洪福明. 限定汉明相关条件下用户数目的界限[A]. 信息论与通信理论学术会议记录[C]. 福建, 1985:18-22.
    [33] 王衍波,薛通,应用密码学.北京:机械工业出版社,2003
    [34] National Bureau of Standards, NBS FLPS PUB46.Data Encryption Standard. National Bureau of Standards,U.S.Department of Commerce,Jan 1997
    [35] R.L.Lifster,A.Shamir,and L.M.Adleman.A Method for Obtaining Digital Signature and Public Key Cryptosystems Communications of the ACM,Feb 1978, 21(2):120-126
    [36] A.Menezes,P.van Oorschot,and S.Vanstone,“Handbook of Applied Cryptography” CRC Press.1996:198
    [37] Janson, Boekee ,“The shortest feekback shift register,that can generate a given sequence”,Advances in Cryptology-CRYPTO’89(LNCS 435),1990:90-99
    [38] J.LMASSY,“Shift-register synthesis and BCH decoding”,IEEE Transactions on Information Theory ,Vol.IT-15,Jan 1969:122-127
    [39] R . A . RUEPPEL , “Linear Complexity and Random Sequences” , Advances in Cryptology-EURO-CRYPT’85(LNCS 219),1986:167-188
    [40] R.A.Rueppel,“Analysis and Design of Stream Cipers”,Springer-Verlag,1986
    [41] Massy J L.Shift-register synthesis and BCH decoding . IEEE Trans.on IT,1969,IT-15(1):122-127
    [42] 关新平,范正平.混沌控制及其在保密通信中的应用. 北京 国防工业出版社 2002:3-16
    [43] 翁贻方,鞠 磊.基于混沌的序列密码加密算法.计算机工程. 2002,28(11):79-83
    [44] Stojanovski,T,Kocarev,L.Chaos based random number Generators partI Analysis IEEE Trans Circuits and SystemsI :Fundamental Theory and Applications,2001,48(3):281~188.
    [45] Tohru Kohda,Akio Tsuneda Pseudonoise sequences by chaotic nonlinear map sand their correlation properties[J].IEIC Trans.Commun,1993,E762B(8):855~862.
    [46] Yongxiang Xia,Xiuming Shan,Yong Ren.Correlation Properties of Binary Spatiotemporal Chaotic Sequences and their Application to Multiple Access Communication.Physical Review E,2001:64
    [47] 桑涛,王汝笠,严义埙.一类新型混沌反馈密码序列的理论设计.电子学报.1999,27(7):47-50.
    [48] 王相生 甘骏人.一种基于混沌的序列密码生成方法.计算机学报.2002,25(4):351-355
    [49] 鞠磊,翁贻方.主动-被动混沌同步保密通信系统设计[J].北京工商大学学报(自然科学版).2002,20(1):33-36
    [50] 饶妮妮.一类混合混沌序列及其特性分析.电子科技大学学报.2001,30(2):115-118
    [51] 张小红,黄剑,谢斐.混沌时间序列在密码学应用中的随机性测试.信息技术.2005,(8):1-4
    [52] 刘向东,焉德军,段晓东,王光兴,中间多比特量化混沌跳频序列及其性能分析.微电子学与计算机.2004,21(8):5-9
    [53] 朱甫臣.关于密码和跳频相结合技术方案的三种设想.通信保密.2000,(2):1-5
    [54] 陈春,甘良才.短波混沌跳频码的 FPGA 实现.电波科学学报.2002,17(16):656-660
    [55] M.sushchik,L.S.Tsimring and A.R.Volkovskii.Performance analysis of correlation-based communication schemes utilizing chaos IEEE Trans.on CAS-I FTAA.2001,47(12).12:1684-1691
    [56] Z.Jako,G.Kis.Application of noise reduction to chaotic communication systems.IEEE Trans.onCAS-I FTAA. 2001.47(12):1720-1725

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700