[go: up one dir, main page]

TWI360320B - - Google Patents

Download PDF

Info

Publication number
TWI360320B
TWI360320B TW97123138A TW97123138A TWI360320B TW I360320 B TWI360320 B TW I360320B TW 97123138 A TW97123138 A TW 97123138A TW 97123138 A TW97123138 A TW 97123138A TW I360320 B TWI360320 B TW I360320B
Authority
TW
Taiwan
Prior art keywords
signal
chaotic
module
square wave
wave voltage
Prior art date
Application number
TW97123138A
Other languages
Chinese (zh)
Other versions
TW201001966A (en
Original Assignee
Univ Shu Te
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Univ Shu Te filed Critical Univ Shu Te
Priority to TW97123138A priority Critical patent/TW201001966A/en
Publication of TW201001966A publication Critical patent/TW201001966A/en
Application granted granted Critical
Publication of TWI360320B publication Critical patent/TWI360320B/zh

Links

Landscapes

  • Near-Field Transmission Systems (AREA)

Description

1360320 « 九、發明說明: 【發明所屬之技術領域】 一種通訊系統及其方法’特別是指一種利用混沌訊號 進行資料加解密的保密通訊系統及其資料傳輪方法。 【先前技術】 先前技術中,傳統的數位通訊系統為達到資料保密的 效果,通常以下列方式進行加密: 一為利用一特定金鍮進行加密,將所有傳輸資料協同 此特定金鑰輸出’接收端具有此特定金鑰的裝置或用戶才 得以接收或開啟。 二為將傳輸資料利用特疋金输、或是將傳輪資料作互 斥或、位移、加總等多種加密手段,接收端具有此特定金 鑰、或是得知解密手段的裝置才得以解開已.加密的傳輸資 料。 然先前技術具有無法避免之缺失: 其一,若以特定金鑰進行加密,若特定金鑰流出,傳 輸資料的加密行為如同虛設。 其二,雖傳輸資料為加密過的資料,若有心者截取傳 輸資料,並反覆實驗加密規則,傳輸資料亦可能被破解而 還原成原始資料。 【發明内容】 有鑑於此,本發明所欲解決之問題係在於提供一種結 合混先系統狀態不可預測之特性,透過系統控制的觀念, 1360320 使兩個混沌系統狀態響應達到同步,有效加解密數位訊號 的數位訊號通訊系統及其方法。 為解決上述方法問題,本發明所提供之技術手段係揭 露一種數位訊號通訊系統之資料傳輸方法,係先利用一傳 輸端之第一混沌模組產生第一混沌訊號;利用傳輸端之第 一壓控振盪模組根據第一混沌訊號產生對應之第一調變方 波電壓;根據第一調變方波電壓對一原始數位訊號加密為 一傳輸訊號,並傳送傳輸訊號與第一混沌訊號;利用一接 收端之第二混沌模組產生第二混沌訊號;根據第一混沌訊 號與第二混沌訊號利用接收端之一設定模組計算出一設定 參數,再根據設計參數推算出一控制參數;根據控制參數 控制該第二混泡模組,令該第二混泡訊號與該第一混洗訊 號同步;利用接收端之第二壓控振盪模組根據同步之第二 混沌訊號產生第二調變方波電壓;以及根據第二調變方波 電壓對傳輸訊號解密。 本發明係揭露一種保密通訊系統,此系統包含一傳輸 端與一接收端。 傳輸端包含一第一混、;屯模組、一第一壓控振盪模組、 一加密模組與一傳輸模組。第一混沌模組產生一第一混沌 訊號,供第一壓控振盪模組產生一第一調變方波電壓,令 加密模組根據第一調變方波電壓對一原始數位訊號加密形 成一傳輸訊號。傳輸模組傳送第一混沌訊號與傳輸訊號。 接收端包含一接收模組、一設定模組、一第二混沌模 1360320 . 組、一第二壓控振盪模組與一解密模組。接收模組係接收 第一混沌訊號與傳輸訊號。第二混沌模組產生一第二混泥 訊號’設定模組根據第一混沌訊號與第二混沌訊號計算出 一設定參數’再根據設定參數推算出一控制訊號,以利用 控制訊號控制第二混沌模組,令第二混沌訊號與第一混沌 訊號同步。第二壓控振盪模組根據同步之第二混沌訊號產 生一第二調變方波電壓。解密模組根據第二調變方波電壓 鲁 以將傳輸訊5虎解毯、為原始數位訊號。 本發明具有先前技術無法達到之功效: 其一’混洗訊號本身具有執跡不可預測性、白色雜訊 般寬的頻譜,以及對初始條件敏感等特性。故此系統產生 的調變方波電壓即為隨機頻率及大小的電壓,因此以此調 變方波電壓為輸入的壓控振盪模組所產生調變方波電壓, 同樣具有頻率隨機,無法預測之特性。 其一 ’接收端在取得傳輸端混沌訊號時’隨即建構傳 鲁輸端所有狀態並達到雙端同步,也代表著接收端產生的調 4方波電壓會與傳輸端—致,只需根據接收端產生的調變 #波電壓調整傳輸訊號’即可還原原來的原始數位訊號。 然而竊取者即使榻取到傳輪訊號,若是無法建構出整個系 統的響應狀態’报難解回原始數位訊號。 其二’因疋利用壓控振盪模組產生調變方波電壓,因 此可視輸出結果來調整輪入的混池訊號,進而控制調變方 波電壓的頻㈣化的範圍,解決了誠f路在頻率上-直 7 1360320 無法突破的問題。 【實施方式】 為使對本發明的目的、構造特徵及其功能有進一步的 了解,茲配合相關實施例及圖式詳細說明如下: 清參照圖1’其為未發明之保密通訊系統之方塊架構 ®。此系統包含一傳輸嘴100與一接收端200。 #輸端1GG包含〜第—混縫組nQ…第一壓控振 φ 盪模組I20、二加密模麵130與一傳輸模組140。接收端 200包含一接£模'组24〇、一設定模组25〇、一第二混死模 組210、一第二壓控振逯模組220與一解密模組230。 t傳送端欲傳送1始數位訊號時,n屯模組係 I生-第-混>屯訊號’第—壓控振盪模組12Q以第一混池 m號作為輸入訊號,產走一第一調變方波電壓。加密模組 130根據第@變方波電壓對原始數位訊號進行加密,形 成一傳輸訊號。傳輸模級14〇與接收模組24〇建立一資訊 # 通道,以傳送傳輸訊號與第一混沌訊號至接收端200。 第二混沌模組210係隨機產生一第二混沌訊號,設定 模組250根據第一混沌訊號與第二混沌訊號之差異計算出 一設定參數’再根據設定參數產生一控制參數來控制第二 混沌模組210 ’令第二混沌模組210產生的第二混沌訊號 同步於第一混沌訊號。第二壓控振盪模組220以同步後的 第二混、;屯訊號為輸入,產生一第二調變方波電壓,解密模 組230以第二調變方波電壓為條件,對傳輸訊號解密,還 1360320 , 原為原始數位訊號。 . 請參照圖2,其為本發明實施例之保密通訊系統之資 料傳輸方法,請同時參照圖1以利了解。此方法包含. 利用一傳輸端100之第/混沌模組Π0產生第、屯 訊號(步驟S210)。如前所述’傳輸端100在取得原始數 位訊號時,係利用第一混沌模組110產生第一混洗訊號。 第一混沌模組110為類比遙沌電路,其數學模式,以一階 微分方程可表示為心’ 弋3=-1.2〜1-〜2-〇.6^13+21«挪>^1)’其中:^1、:^2、;^3為第狀W 屯核 組110之三個狀態電壓,吻仅J為一函數,定義為’當Xml>〇 ’ ^炉(〜1) = 1 ;當^>1=0,妙(〜ι) = 0 當 Xml<0 ’ 幻^^卜一1 利用傳輸端100之第一壓控振盪模組120根據第一混 .沌訊號產生對應之第一調變方波電壓(步驟s220 )°第一 壓控振盪模組120以第一混沌訊號作為輸入’產生相對應 的電壓輸出,形成第一調變方波電壓。如圖3’上方曲線 • 為第一混沌訊號,下方即為第一調變方波電壓’然而混、/屯 訊號具有不可預測執跡的特性,而且頻率說異多變’因此 第一調變方波電壓為一隨機頻率方波。 根據第一調變方波電壓對一原始數位訊號加密為一傳 輸訊號,並傳送傳輸訊號與第一混沌訊號(步驟S230)° 此步驟中,傳輸端100之加密模組130係為一互斥或問 (EXCLUSIVE OR Gate ; X〇R Gate)。加密模組 130 係先 取得原始數位訊號,再取得第一調變方波電壓’之後將原 9 1360320 始數位訊號與第一調變方波電壓進行互斥或邏輯運算,以 形成傳輸訊號。之後,傳輸模組140透過資訊通道傳送傳 輸訊號與第一混洗訊號。如圖4,上方為原始數位訊號, 下方即為利用第一調變方波電壓作為加密條件的傳輸訊 號。 利用接收端200之第二混沌模組210產生一第二混沌 訊號(步驟S240 )。接收端200啟動時’係利用第二混沌 模組210產生第二混沌訊號’第二混沌模組210亦為類比 鲁 混沌電路’其數學模式,以一階微分方程可表示為勾=x,2, xs2=xsi+u 5 xsi=-\2χλ - xsl - 0.6xi3 + 2sign(xsX) » 其中 h 為此 第二混沌模組210之三個狀態電壓,吨《(〜)為一函數,定義 為,當〜>〇,ί妙(〜)=1 ;當'1=〇 ’ 吨《(〜) = 〇當〜<0,。 M為設定模組250輸出的控制訊號。本實施例中,給予第一 混沌模組110與第二混沌模組210不同的初始值,依混沌 系統之特性,故第一混沌模組110與第二混沌模組210開 • 始運行的訊號曲線即為相異。 根據第一混沌訊號與第二混沌訊號利用接收端200之 一設定模組250計算出一設定參數,再根據設定參數推算 出一控制訊號(步驟S250 )。設定模組250為一比例-積分 -微分控制器,係利用一進化演算法根據第一混沌訊號與第 二混沌訊號計算此設定參數。 本實施例中,將人W]=[ft;0」a;]視為第一混沌模組 110的初值,-2 i]為第二混池模組210的初 1360.320 值。設定模組250輸出的控制訊號,其計算公式為 ⑹+ ,其中為訊號誤差,設定參 數包含& =20.000000、尤,=0.003434、4=4.807194,\、尺,、心分別 代表比例常數,積分常數及微分常數。 根據控制訊號控制第二混沌模組210,令第二混沌訊 號與第一混沌訊號同步(步驟S260 )。第二混沌模組210 根據上述的控制訊號調整第二混沌模組210,以將第二混 • 沌訊號與第一混沌訊號形成同步響應,如圖5。於調整後, 第二混沌訊號逐漸同步於第一混沌訊號。如圖6,第二混 沌訊號與第一混沌訊號同步後,其訊號誤差幾乎趨近零。 圖 6 中的誤差定義如 el = xml =Xm -xi2(4e3 = -xs3。 利用接收端200之一第二壓控振盪模組220根據同步 之第二混沌訊號產生一第二調變方波電壓(步驟S270)。 如圖3,前述中,第二混沌訊號與第一混沌訊號已同步, Φ 因此以第二混、;屯訊號為輸入條件下,第二壓控振盪模組220 產生的第二調變方波電壓即同等於第一調變方波電壓,同 為隨機頻率方波’且波型完全相同。 根據第二調變方波電壓對傳輸訊號解密(步驟S280)。 此步驟中,接收端200之解密模組230也是一互斥或閘 (EXCLUSIVE OR Gate ; XOR Gate)。解密模組 230 係先 取得該傳輸訊號,再取得該第二調變方波電壓,最後將該 傳輸訊號與該第二調變方波電壓進行互斥或邏輯運算’以 11 1360320 還原為該原始數位訊號。如圖7,第二調變方波電壓與第 一調變方波電壓為相同波型,故傳輸訊號透過第二調變方 波電壓解密後,即為原始數位訊號。 雖然本發明以前述之較佳實施例揭露如上,然其並非 用以限定本發明,任何熟習相像技藝者,在不脫離本發明 之精神和範圍内,所作更動與潤飾之等效替換,仍為本發 明之專利保護範圍内。 【圖式簡單說明】 圖1係本發明實施例之保密通訊系統之方塊架構圖;. 圖2係本發明實施例之保密通訊系統之資料傳輸方法; 圖3係本發明實施例之第一調變電壓示意圖; 圖4係本發明實施例之原始數位訊號加密波形圖; 圖5係本發明實施例之混沌訊號同步示意圖; 圖6係本發明實施例之混沌訊號差異示意圖;以及 圖7係本發明實施例之原始數位訊號傳輸前後比較圖。 【主要元件符號說明】 100 傳輸端 110 第一混;屯模組 120 第一壓控振盪模組 130 加密模組 140 傳輸模組 200 接收端 210 第二混沌模組 12 1360320 220 第二壓控振盪模組 230 解密模組 240 接收模組 250 設定模組 131360320 « Nine, invention description: [Technical field of invention] A communication system and method thereof specifically refers to a secure communication system for data encryption and decryption using chaotic signals and a data transmission method thereof. [Prior Art] In the prior art, in order to achieve the effect of data confidentiality, the conventional digital communication system usually performs encryption in the following manner: First, encryption is performed by using a specific key, and all transmission data is coordinated with the specific key to output 'receiver'. A device or user with this particular key can be received or turned on. The second is to use the special data transfer or the transfer data to be mutually exclusive or displaced, offset, summed, etc., and the receiver has the specific key or the device that knows the decryption means. Opened. Encrypted transmission data. However, the prior art has unavoidable deficiencies: First, if encryption is performed with a specific key, if a specific key flows out, the encryption behavior of the transmitted data is as illusory. Second, although the transmitted data is encrypted data, if the person intercepts the transmitted data and repeats the experimental encryption rules, the transmitted data may be cracked and restored to the original data. SUMMARY OF THE INVENTION In view of this, the problem to be solved by the present invention is to provide an unpredictable characteristic of the state of the hybrid system. Through the concept of system control, 1360320 synchronizes the state responses of two chaotic systems, effectively encrypting and decrypting digits. Signal digital signal communication system and method thereof. In order to solve the above method problem, the technical means provided by the present invention discloses a data transmission method of a digital signal communication system, which first uses a first chaotic module of a transmission end to generate a first chaotic signal; and uses a first voltage of a transmission end. The control oscillation module generates a corresponding first modulated square wave voltage according to the first chaotic signal; encrypts a raw digital signal into a transmission signal according to the first modulated square wave voltage, and transmits the transmission signal and the first chaotic signal; a second chaotic module of the receiving end generates a second chaotic signal; and according to the first chaotic signal and the second chaotic signal, a setting parameter is calculated by using one of the receiving end setting modules, and then a control parameter is calculated according to the design parameter; The control parameter controls the second bubble mixing module to synchronize the second bubble mixing signal with the first shuffling signal; and the second voltage control oscillation module of the receiving end generates a second modulation according to the synchronized second chaotic signal a square wave voltage; and decrypting the transmission signal according to the second modulated square wave voltage. The invention discloses a secure communication system, which system comprises a transmission end and a receiving end. The transmission end comprises a first mixing module, a first voltage controlled oscillation module, an encryption module and a transmission module. The first chaotic module generates a first chaotic signal, and the first voltage-controlled oscillation module generates a first modulated square wave voltage, so that the encryption module encrypts an original digital signal according to the first modulated square wave voltage to form a Transmit the signal. The transmission module transmits the first chaotic signal and the transmission signal. The receiving end comprises a receiving module, a setting module, a second chaotic module 1360320, a second voltage controlled oscillation module and a decryption module. The receiving module receives the first chaotic signal and the transmitted signal. The second chaotic module generates a second mud signal 'setting module to calculate a setting parameter according to the first chaotic signal and the second chaotic signal', and then deriving a control signal according to the setting parameter to control the second chaos by using the control signal The module synchronizes the second chaotic signal with the first chaotic signal. The second voltage controlled oscillation module generates a second modulated square wave voltage according to the synchronized second chaotic signal. The decryption module unmasks the transmitted signal according to the second modulated square wave voltage, and uses the original digital signal. The present invention has the inefficiency that the prior art cannot achieve: its 'shuffling signal itself has characteristics such as unpredictability, white noise-like spectrum, and sensitivity to initial conditions. Therefore, the modulated square wave voltage generated by the system is a random frequency and a magnitude of the voltage. Therefore, the modulated square wave voltage generated by the voltage controlled oscillation module with the square wave voltage as the input is also randomly random and unpredictable. characteristic. When the 'receiver receives the chaotic signal at the transmission end', it constructs all the states of the transmission and achieves double-end synchronization. It also means that the modulated 4 square wave voltage generated by the receiver will be transmitted with the transmission terminal, only according to the reception. The modulation generated by the terminal #wave voltage adjustment transmission signal can restore the original original digital signal. However, even if the stealer takes the pass signal, if it is unable to construct the response state of the entire system, it is difficult to solve the original digital signal. Secondly, because the voltage-controlled oscillating module is used to generate the modulated square wave voltage, the visual output result is used to adjust the rounded mixing pool signal, thereby controlling the frequency (four) range of the modulated square wave voltage, and solving the Cheng F road. On the frequency - straight 7 1360320 can not break through the problem. [Embodiment] In order to further understand the object, structural features and functions of the present invention, the following detailed description is given in conjunction with the related embodiments and drawings: Refer to FIG. 1 for the block architecture of the uninvented secure communication system. . The system includes a transmission nozzle 100 and a receiving end 200. #输端1GG includes a first-mixing group nQ... a first voltage-controlled vibration φ swaying module I20, a second encryption die surface 130 and a transmission module 140. The receiving end 200 includes a receiving module group 24, a setting module 25A, a second mixed die group 210, a second voltage controlled vibrating module 220 and a decrypting module 230. When the transmitting end wants to transmit the 1st digital signal, the n屯 module is the I-first-mixing > 屯 signal 'the first voltage-controlled oscillating module 12Q takes the first mixed pool m number as the input signal, and produces a first A variable square wave voltage. The encryption module 130 encrypts the original digital signal according to the @@variant square wave voltage to form a transmission signal. The transmission module 14A and the receiving module 24A establish an information # channel for transmitting the transmission signal and the first chaotic signal to the receiving end 200. The second chaotic module 210 randomly generates a second chaotic signal, and the setting module 250 calculates a set parameter according to the difference between the first chaotic signal and the second chaotic signal, and generates a control parameter according to the set parameter to control the second chaos. The module 210' synchronizes the second chaotic signal generated by the second chaotic module 210 with the first chaotic signal. The second voltage-controlled oscillating module 220 generates a second modulating square wave voltage by using the second mixed signal; the 屯 signal is input, and the decrypting module 230 is configured to transmit the signal according to the second modulating square wave voltage. Decrypted, also 1360320, originally the original digital signal. Referring to FIG. 2, which is a data transmission method of a secure communication system according to an embodiment of the present invention, please refer to FIG. 1 to understand. The method includes: generating a first and a second signal by using a chaotic module Π0 of the transmitting end 100 (step S210). As described above, the transmitting end 100 generates the first shuffling signal by using the first chaotic module 110 when obtaining the original digital signal. The first chaotic module 110 is an analogous chaotic circuit, and its mathematical mode can be expressed as a heart by a first-order differential equation 弋3=-1.2~1-~2-〇.6^13+21«诺>^1 ) where: ^1, :^2, ;^3 are the three state voltages of the first W nucleus group 110, and the kiss only J is a function, defined as 'when Xml> 〇' ^ furnace (~1) = 1; when ^>1=0, Miao (~ι) = 0 When Xml<0' 幻^^b-1 uses the first voltage-controlled oscillation module 120 of the transmission terminal 100 to generate a correspondence according to the first mixed-shadow signal The first modulated square wave voltage (step s220). The first voltage controlled oscillation module 120 uses the first chaotic signal as an input to generate a corresponding voltage output to form a first modulated square wave voltage. As shown in Fig. 3's upper curve, it is the first chaotic signal, and the lower part is the first modulated square wave voltage. However, the mixed//signal signal has unpredictable characteristics, and the frequency is different. Therefore, the first modulation The square wave voltage is a random frequency square wave. And encrypting a raw digital signal into a transmission signal according to the first modulated square wave voltage, and transmitting the transmission signal and the first chaotic signal (step S230). In this step, the encryption module 130 of the transmission end 100 is mutually exclusive. Or ask (EXCLUSIVE OR Gate; X〇R Gate). The encryption module 130 first obtains the original digital signal, and then obtains the first modulated square wave voltage', and then mutually exclusive or logically operates the original 9 1360320 initial digital signal and the first modulated square wave voltage to form a transmission signal. Then, the transmission module 140 transmits the transmission signal and the first shuffling signal through the information channel. As shown in Fig. 4, the upper part is the original digital signal, and the lower part is the transmission signal using the first modulated square wave voltage as the encryption condition. A second chaotic signal is generated by the second chaotic module 210 of the receiving end 200 (step S240). When the receiving end 200 is started, the second chaotic module 210 is generated by the second chaotic module 210. The second chaotic module 210 is also a mathematical model of the analogous chaotic circuit. The first-order differential equation can be expressed as a hook=x, 2 , xs2=xsi+u 5 xsi=-\2χλ - xsl - 0.6xi3 + 2sign(xsX) » where h is the three state voltages of the second chaotic module 210, ton "(~) is a function, defined as When ~>〇, 妙妙(~)=1; when '1=〇' tons "(~) = jingle ~ <0,. M is a control signal output by the setting module 250. In this embodiment, the initial values of the first chaotic module 110 and the second chaotic module 210 are given, and according to the characteristics of the chaotic system, the first chaotic module 110 and the second chaotic module 210 are started to run. The curves are different. According to the first chaotic signal and the second chaotic signal, a setting module 250 of the receiving end 200 is used to calculate a setting parameter, and then a control signal is calculated according to the setting parameter (step S250). The setting module 250 is a proportional-integral-derivative controller, and uses an evolution algorithm to calculate the setting parameter according to the first chaotic signal and the second chaotic signal. In this embodiment, the person W]=[ft;0"a;] is regarded as the initial value of the first chaotic module 110, and -2 i] is the initial 1360.320 value of the second pool module 210. The control signal outputted by the module 250 is calculated as (6)+, where is the signal error, and the setting parameters include &=20.000000, especially,=0.003434, 4=4.807194, \, ruler, and heart respectively represent proportional constants, integral Constant and differential constant. The second chaotic module 210 is controlled according to the control signal to synchronize the second chaotic signal with the first chaotic signal (step S260). The second chaotic module 210 adjusts the second chaotic module 210 according to the control signal to form a synchronous response between the second chaotic signal and the first chaotic signal, as shown in FIG. 5. After the adjustment, the second chaotic signal is gradually synchronized with the first chaotic signal. As shown in Fig. 6, after the second chaotic signal is synchronized with the first chaotic signal, the signal error is almost zero. The error in FIG. 6 is defined as el = xml = Xm - xi2 (4e3 = -xs3. The second voltage-controlled oscillating module 220 of the receiving end 200 generates a second modulating square wave voltage according to the synchronized second chaotic signal. (Step S270). As shown in FIG. 3, in the foregoing, the second chaotic signal is synchronized with the first chaotic signal, and Φ is thus generated by the second voltage-controlled oscillation module 220 under the condition that the second mixed signal is used as the input condition. The second modulated square wave voltage is equal to the first modulated square wave voltage, and is the same as the random frequency square wave 'and the wave pattern is exactly the same. The transmission signal is decrypted according to the second modulated square wave voltage (step S280). The decryption module 230 of the receiving end 200 is also a EXCLUSIVE OR Gate (XOR Gate). The decryption module 230 first obtains the transmission signal, and then obtains the second modulated square wave voltage, and finally transmits the transmission. The signal and the second modulated square wave voltage are mutually exclusive or logically operated to restore the original digital signal by 11 1360320. As shown in Figure 7, the second modulated square wave voltage is the same as the first modulated square wave voltage. Therefore, the transmission signal is decrypted by the second modulated square wave voltage The present invention is the original digital signal. Although the present invention has been disclosed above in the above preferred embodiments, it is not intended to limit the invention, and any modification and retouching can be made without departing from the spirit and scope of the invention. FIG. 1 is a block diagram of a secure communication system according to an embodiment of the present invention; FIG. 2 is a secure communication system according to an embodiment of the present invention. FIG. 3 is a schematic diagram of a first modulated voltage according to an embodiment of the present invention; FIG. 4 is a schematic diagram of an original digital signal encrypted waveform according to an embodiment of the present invention; FIG. 5 is a schematic diagram of synchronization of a chaotic signal according to an embodiment of the present invention; A schematic diagram of the difference of the chaotic signal in the embodiment of the present invention; and FIG. 7 is a comparison diagram before and after the transmission of the original digital signal in the embodiment of the present invention. [Description of the main components] 100 first transmission of the transmission end 110; first voltage control oscillation of the 屯 module 120 Module 130 encryption module 140 transmission module 200 receiving end 210 second chaotic module 12 1360320 220 second voltage controlled oscillation module 230 decryption mode Module setting module 240 receives 250 13

Claims (1)

1360320 十、申請專利範圍: 1. 一種保密通訊系統之資料傳輸方法,其至少包含下列步 驟: 利用一傳輪端之第一混沌模組產生第一混沌訊號; 利用該傳輪端之第一壓控振盪模組根據該第一混沌 訊號產生第一調變方波電壓; 根據該第一調變方波電壓對一原始數位訊號加密為 一傳輸訊號,並傳送該傳輸訊號與該第一混沌訊號; 利用一接收端之第二混沌模組產生第二混沌訊號; 根據該第一混沌訊號與該第二混沌訊號利用該接收 端之設定模組計算出一設定參數,再根據該設定參數推 算出一控制參數; 根據該控制參數控制該第二混沌模組,令該第二混 沌訊號與該第一混沌訊號同步; 利用該接收端之第二壓控振盪模組根據同步之該第 二混沌訊號產生第二調變方波電壓;以及 根據該第二調變方波電壓對該傳輸訊號解密。 2. 如申請專利範圍第1項所述之保密通訊系統之資料傳輸 方法,其中該第一調變方波電壓為一隨機頻率方波。 3. 如申請專利範圍第1項所述之保密通訊系統之資料傳輸 方法,其中該第二調變方波電壓為一隨機頻率方波。 4. 如申請專利範圍第1項所述之保密通訊系統之資料傳輸 方法,其中該第一混、;屯模,組產生該第一混洗訊號,所使 1360320 用為類比混沌電路,其數學模式,可示為;,弋2 , 之3 =-1.2¾-42-0.6¾+ 25^(:0,其中 h、xm2、為該第一混 沌模組之三個狀態電壓,為一函數,定義為,當 ,^71^) = 1 ;當 xml=0,^72(xml) = 0 當;^<0,hg«(xml) = -l。 5. 如申請專利範圍第1項所述之保密通訊系統之資料傳輸 方法,其中該第二混沌模組產生該第二混沌訊號,所使 用為類比混沌電路,其數學模式,以一階微分方程可表 示為払= xi2,ii2 =xi3+w,毛3 = -1.2:^-:^2-0.6:^3+2^71(¾),其中〜、 χί2、\3為該第二混沌模組之三個狀態電壓,ί吻(¾)為一函 數,定義為,當〜>0,57如〇^)=1 ;當;^=0,57_例>^) = 0 當;£^<0, sign(O = -1。w為設定模組輸出之該控制訊號。 6. 如申請專利範圍第1項所述之保密通訊系統之資料傳輸 方法,其中該設定模組為一比例-積分-微分控制器,係 利用一進化演算法根據該第一混沌訊號與該第二混沌訊 號計算該控制參數,該控制參數之計算公式係為 + ,其中外為訊號誤差,該設 〇 定參數係為心=2〇·〇〇〇〇〇〇、尾=〇.〇〇3434 與心=4.8〇7194 ’ 、尺,與 心分別代表比例常數,積分常數及微分常數。 7. 如申請專利範圍第1項所述之保密通訊系統之資料傳輸 方法,其中該根據該第一調變方波電壓對一原始數位訊 號加密為一傳輸訊號步驟係包含下列步驟: 取得該原始數位訊號; 15 1360320 取得該第一調變方波電壓;以及 將該原始數位訊號與該第一調變方波電壓進行互斥 或邏輯運算,以形成該傳輸訊號。 8. 如申請專利範圍第1項所述之保密通訊系統之資料傳輸 方法,其中該根據該第二調變方波電壓對該傳輸訊號解 密步驟係包含下列步驟: 取得該傳輸訊號; 取得該第二調變方波電壓;以及 將該傳輸訊號與該第二調變方波電壓進行互斥或邏 輯運算,以還原為該原始數位訊號。 9. 一種保密通訊系統,其包含: 一傳輸端’係包含: 一第一混洗模組,產生一第一混洗訊號; 一第一壓控振盪模組,以該第一混沌訊號為輸 入,產生一第一調變方波電壓; 一加密模組,根據該第一調變方波電壓對一原始 數位訊號加密為一傳輸訊號;及 一傳輸模組,係輸出該第一混沌訊號與該傳輸訊 號;以及 一接收端,其包含: 一接收模組,係接收該第一混沌訊號與該傳輸訊 號; 一第二混沌模組,產生一第二混沌訊號; 16 1360320 一設定模組,根據該接收模組取得之該第一混沌 訊號與該第二混沌訊號計算出一設定參數,根據該設 定參數產生一控制參數,再根據該控制參數控制該第 二混洗模組,令該第二混屯訊號與該第一混洗訊號同 步; 一第二壓控振盪模組,根據同步之該第二混沌訊 號產生對應之一第二調變方波電壓;及 一解密模組,根據該第二調變方波電壓對該傳輸 訊號加密為該原始數位訊號。 10. 如申請專利範圍第9項所述之保密通訊系統,其中該第 一調變方波電壓為一隨機頻率方波。 11. 如申請專利範圍第9項所述之保密通訊系統,其中該第 二調變方波電壓為一隨機頻率方波。 12. 如申請專利範圍第9項所述之保密通訊系統,其中該第 一混沌模組產生該第一混沌訊號之計算式為可示為 4 ’ 弋2 =〜3 ’ 弋3 = —1.2¾ -- 〇.6〜3 + 2S吻’ 其中〜、〜2、 為該第一混沌模組之三個狀態電壓,^如(¾)為一函 數,定義為,當Xml>0,吨《00 = 1 ;當〜=〇,初i(xml) = 〇當 xml<0,吨《(〜) = -1。 13. 如申請專利範圍第9項所述之保密通訊系統,其中該第 二混沌模組產生該第二混沌訊號,其數學模式,以一階 微分方程可表不為;^ = χί2 , xs2 =xs3+u , 元3 =-1.2:^-,其中 、χί2、xi3為該第二混 17 rI360320 - 沌模組之三個狀態電壓,细《(Xj為一函數,定義為,當 • ^1>0 5 Sign(xsl) = l ; #χ5ΐ=0 > sign(xsl) = 0^ xsl<0 » = ° w為該設定核組輸出之該控制訊號。 14. 如申請專利範圍第9項所述之保密通訊系統,其中該設 定模組為一比例-積分-微分控制器,係利用一進化演算 法根據該第一混沌訊號與該第二混沌訊號計算該控制 參數,該控制參數之計算公式係為 • ,其中= 為訊號誤差,該 設定參數係為 A =20.000000、尤,=0.003434 與 & =4.807194,&、火, 與&分別代表比例常數,積分常數及微分常數。 15. 如申請專利範圍第9項所述之保密通訊系統,其中該加 密模組係將該原始數位訊號與該第一調變方波電壓進 行互斥或邏輯運算,以形成該傳輸訊號。 16. 如申請專利範圍第9項所述之保密通訊系統,其中該解 φ 密模組係將該傳輸訊號與該第二調變方波電壓進行互 斥或邏輯運算,以還原為該原始數位訊號。 181360320 X. Patent application scope: 1. A data transmission method for a secure communication system, comprising at least the following steps: generating a first chaotic signal by using a first chaotic module of a transmitting wheel end; using the first pressure of the transmitting end The control oscillating module generates a first modulated square wave voltage according to the first chaotic signal; encrypts a raw digital signal into a transmission signal according to the first modulated square wave voltage, and transmits the transmission signal and the first chaotic signal Generating a second chaotic signal by using a second chaotic module at the receiving end; calculating a setting parameter according to the first chaotic signal and the second chaotic signal by using the setting module of the receiving end, and then calculating according to the setting parameter a control parameter; controlling the second chaotic module according to the control parameter to synchronize the second chaotic signal with the first chaotic signal; and using the second voltage controlled oscillation module of the receiving end to synchronize the second chaotic signal Generating a second modulated square wave voltage; and decrypting the transmitted signal according to the second modulated square wave voltage. 2. The data transmission method of the secure communication system according to claim 1, wherein the first modulated square wave voltage is a random frequency square wave. 3. The data transmission method of the secure communication system according to claim 1, wherein the second modulated square wave voltage is a random frequency square wave. 4. The data transmission method of the secure communication system according to claim 1, wherein the first mixed mode and the first hybrid signal are generated, and the 1360320 is used as an analog chaotic circuit, and the mathematical The mode can be shown as; 弋2, 3 = -1.23⁄4-42-0.63⁄4+ 25^(:0, where h, xm2 are the three state voltages of the first chaotic module, which is a function, Defined as, when, ^71^) = 1; when xml=0,^72(xml) = 0 when; ^<0,hg«(xml) = -l. 5. The data transmission method of the secure communication system according to claim 1, wherein the second chaotic module generates the second chaotic signal, and the analogy is a chaotic circuit, and the mathematical mode is a first order differential equation. It can be expressed as 払= xi2, ii2 = xi3+w, hair 3 = -1.2:^-:^2-0.6:^3+2^71(3⁄4), where ~, χί2, \3 are the second chaotic modes The three state voltages of the group, ί kiss (3⁄4) is a function, defined as when ~>0,57 as 〇^)=1; when;^=0,57_example>^) = 0 when; £^<0, sign(O = -1.w is the control signal outputted by the setting module. 6. The data transmission method of the secure communication system according to claim 1, wherein the setting module is A proportional-integral-derivative controller calculates an operation parameter according to the first chaotic signal and the second chaotic signal by using an evolutionary algorithm, wherein the calculation formula of the control parameter is +, wherein the external signal is a signal error, and the setting is The parameters are defined as heart = 2 〇 · 〇〇〇〇〇〇, tail = 〇. 〇〇 3434 and heart = 4.8 〇 7194 ', ruler, and heart respectively represent proportional constants, integral constants 7. The data transmission method of the secure communication system according to claim 1, wherein the step of encrypting a raw digital signal into a transmission signal according to the first modulated square wave voltage comprises the following steps : obtaining the original digital signal; 15 1360320 obtaining the first modulated square wave voltage; and mutually exclusive or logically computing the original digital signal with the first modulated square wave voltage to form the transmission signal. The data transmission method of the secure communication system of claim 1, wherein the decrypting the transmission signal according to the second modulated square wave voltage comprises the steps of: obtaining the transmission signal; obtaining the second modulation The square wave voltage; and the mutually exclusive or logical operation of the transmission signal and the second modulated square wave voltage to be restored to the original digital signal. 9. A secure communication system, comprising: a transmission end system comprising: a first shuffling module generates a first shuffling signal; a first voltage controlled oscillating module, the first chaotic signal is input as an input a first modulated square wave voltage; an encryption module that encrypts a raw digital signal into a transmission signal according to the first modulated square wave voltage; and a transmission module that outputs the first chaotic signal and the transmission signal And a receiving end, comprising: a receiving module, receiving the first chaotic signal and the transmission signal; a second chaotic module, generating a second chaotic signal; 16 1360320 a setting module, according to the receiving The first chaotic signal obtained by the module and the second chaotic signal calculate a set parameter, generate a control parameter according to the set parameter, and then control the second shuffling module according to the control parameter, so that the second shuffle The signal is synchronized with the first shuffling signal; a second voltage-controlled oscillating module generates a corresponding second modulating square wave voltage according to the second chaotic signal that is synchronized; and a decryption module according to the second modulating The variable square wave voltage encrypts the transmission signal into the original digital signal. 10. The secure communication system of claim 9, wherein the first modulated square wave voltage is a random frequency square wave. 11. The secure communication system of claim 9, wherein the second modulated square wave voltage is a random frequency square wave. 12. The secure communication system according to claim 9, wherein the first chaotic module generates the first chaotic signal to be expressed as 4 ' 弋 2 = ~ 3 ' 弋 3 = - 1.23⁄4 -- 〇.6~3 + 2S kiss' where ~, ~2, for the three state voltages of the first chaotic module, ^such as (3⁄4) is a function, defined as, when Xml> 0, ton "00 = 1; when ~=〇, initial i(xml) = jingle xml<0, ton "(~) = -1. 13. The secure communication system according to claim 9, wherein the second chaotic module generates the second chaotic signal, and the mathematical mode is expressed by a first order differential equation; ^ = χί2 , xs2 = Xs3+u, element 3 =-1.2:^-, where χί2, xi3 is the second mixed 17 rI360320 - three state voltages of the chaotic module, fine "(Xj is a function, defined as when ^ ^1&gt ;0 5 Sign(xsl) = l ; #χ5ΐ=0 > sign(xsl) = 0^ xsl<0 » = ° w is the control signal output by the set core group. The secure communication system, wherein the setting module is a proportional-integral-derivative controller, wherein the control parameter is calculated according to the first chaotic signal and the second chaotic signal by an evolution algorithm, and the control parameter is calculated. The formula is • , where = is the signal error. The set parameters are A = 20.000000, especially, = 0.003434 and & =4.807194, &, fire, and & represent the proportional constant, integral constant, and differential constant, respectively. For example, the secure communication system described in claim 9 of the patent scope, wherein The cryptographic module mutually exclusive or logically operates the original digital signal with the first modulating square wave voltage to form the transmission signal. 16. The secure communication system according to claim 9 of the patent application, wherein the solution The φ module is mutually exclusive or logically operated by the transmission signal and the second modulated square wave voltage to be restored to the original digital signal.
TW97123138A 2008-06-20 2008-06-20 Secure communication system and data transmission method thereof TW201001966A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW97123138A TW201001966A (en) 2008-06-20 2008-06-20 Secure communication system and data transmission method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW97123138A TW201001966A (en) 2008-06-20 2008-06-20 Secure communication system and data transmission method thereof

Publications (2)

Publication Number Publication Date
TW201001966A TW201001966A (en) 2010-01-01
TWI360320B true TWI360320B (en) 2012-03-11

Family

ID=44825020

Family Applications (1)

Application Number Title Priority Date Filing Date
TW97123138A TW201001966A (en) 2008-06-20 2008-06-20 Secure communication system and data transmission method thereof

Country Status (1)

Country Link
TW (1) TW201001966A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI552563B (en) * 2014-01-13 2016-10-01 林文偉 Encryption and decryption system and method using chaotic mapping with spatial-temporal perturbation

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI571092B (en) * 2015-09-04 2017-02-11 崑山科技大學 Encryption system for safe transmission of network data with adaptive synchronization of hyperchaotic signals free from external interference and parameter disturbance, and method for the same

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI552563B (en) * 2014-01-13 2016-10-01 林文偉 Encryption and decryption system and method using chaotic mapping with spatial-temporal perturbation

Also Published As

Publication number Publication date
TW201001966A (en) 2010-01-01

Similar Documents

Publication Publication Date Title
US8897446B2 (en) Methods for the generation of identical symmetrical cryptographic keys
EP2320621B1 (en) Method for establishing cryptographic communications between a remote device and a medical device and system for carrying out the method
WO2009025459A3 (en) Method of and apparatus for sharing secret information between devices in home network
CN108698563A (en) Secure smartphone based access and start authorization system for vehicles
CN103957109A (en) Cloud data privacy protection security re-encryption method
CN112398894B (en) Vehicle safety verification method and device
CN102769620A (en) An Attribute-Based Encryption Method for Secure Outsourcing
CN113572607B (en) Secure communication method adopting unbalanced SM2 key exchange algorithm
US20030053629A1 (en) USB authentication interface
CN113225371A (en) Electric power Internet of things terminal control instruction encryption and decryption system and method
TWI360320B (en)
CN108337087B (en) Diffie-Hellman encryption method based on cryptographic vectors and Fibonacci matrices
CN103607275B (en) A kind of encryption system of safety speed-adaptive change
CN114244513B (en) Key negotiation method, device and storage medium
US12010247B2 (en) Implementation of a butterfly key expansion scheme
CN115842625A (en) Encryption method and system based on PKI system real-time negotiation key
US8484471B2 (en) Multi-party distributed multiplication device, multi-party distributed multiplication system and method
CN104902471B (en) The key of identity-based exchanges design method in wireless sensor network
KR101793528B1 (en) Certificateless public key encryption system and receiving terminal
CN108429737A (en) A kind of data transmission method based on NB-IOT networks
CN104079516B (en) Multi-system continuous phase phase shift keyed signal generating meanss
CN106357403A (en) Device and method for encryption protection of link communication and safety message processing system
US20020196945A1 (en) Key sharing system, public key cryptosystem, signature system, key sharing apparatus, encryption apparatus, decryption apparatus, signature apparatus, authentication apparatus, key sharing method, encryption method, decryption method, signature method, authentication method, and programs
TWI376924B (en)
CN103812644A (en) Information configuration method, device and system

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees