1360320 « 九、發明說明: 【發明所屬之技術領域】 一種通訊系統及其方法’特別是指一種利用混沌訊號 進行資料加解密的保密通訊系統及其資料傳輪方法。 【先前技術】 先前技術中,傳統的數位通訊系統為達到資料保密的 效果,通常以下列方式進行加密: 一為利用一特定金鍮進行加密,將所有傳輸資料協同 此特定金鑰輸出’接收端具有此特定金鑰的裝置或用戶才 得以接收或開啟。 二為將傳輸資料利用特疋金输、或是將傳輪資料作互 斥或、位移、加總等多種加密手段,接收端具有此特定金 鑰、或是得知解密手段的裝置才得以解開已.加密的傳輸資 料。 然先前技術具有無法避免之缺失: 其一,若以特定金鑰進行加密,若特定金鑰流出,傳 輸資料的加密行為如同虛設。 其二,雖傳輸資料為加密過的資料,若有心者截取傳 輸資料,並反覆實驗加密規則,傳輸資料亦可能被破解而 還原成原始資料。 【發明内容】 有鑑於此,本發明所欲解決之問題係在於提供一種結 合混先系統狀態不可預測之特性,透過系統控制的觀念, 1360320 使兩個混沌系統狀態響應達到同步,有效加解密數位訊號 的數位訊號通訊系統及其方法。 為解決上述方法問題,本發明所提供之技術手段係揭 露一種數位訊號通訊系統之資料傳輸方法,係先利用一傳 輸端之第一混沌模組產生第一混沌訊號;利用傳輸端之第 一壓控振盪模組根據第一混沌訊號產生對應之第一調變方 波電壓;根據第一調變方波電壓對一原始數位訊號加密為 一傳輸訊號,並傳送傳輸訊號與第一混沌訊號;利用一接 收端之第二混沌模組產生第二混沌訊號;根據第一混沌訊 號與第二混沌訊號利用接收端之一設定模組計算出一設定 參數,再根據設計參數推算出一控制參數;根據控制參數 控制該第二混泡模組,令該第二混泡訊號與該第一混洗訊 號同步;利用接收端之第二壓控振盪模組根據同步之第二 混沌訊號產生第二調變方波電壓;以及根據第二調變方波 電壓對傳輸訊號解密。 本發明係揭露一種保密通訊系統,此系統包含一傳輸 端與一接收端。 傳輸端包含一第一混、;屯模組、一第一壓控振盪模組、 一加密模組與一傳輸模組。第一混沌模組產生一第一混沌 訊號,供第一壓控振盪模組產生一第一調變方波電壓,令 加密模組根據第一調變方波電壓對一原始數位訊號加密形 成一傳輸訊號。傳輸模組傳送第一混沌訊號與傳輸訊號。 接收端包含一接收模組、一設定模組、一第二混沌模 1360320 . 組、一第二壓控振盪模組與一解密模組。接收模組係接收 第一混沌訊號與傳輸訊號。第二混沌模組產生一第二混泥 訊號’設定模組根據第一混沌訊號與第二混沌訊號計算出 一設定參數’再根據設定參數推算出一控制訊號,以利用 控制訊號控制第二混沌模組,令第二混沌訊號與第一混沌 訊號同步。第二壓控振盪模組根據同步之第二混沌訊號產 生一第二調變方波電壓。解密模組根據第二調變方波電壓 鲁 以將傳輸訊5虎解毯、為原始數位訊號。 本發明具有先前技術無法達到之功效: 其一’混洗訊號本身具有執跡不可預測性、白色雜訊 般寬的頻譜,以及對初始條件敏感等特性。故此系統產生 的調變方波電壓即為隨機頻率及大小的電壓,因此以此調 變方波電壓為輸入的壓控振盪模組所產生調變方波電壓, 同樣具有頻率隨機,無法預測之特性。 其一 ’接收端在取得傳輸端混沌訊號時’隨即建構傳 鲁輸端所有狀態並達到雙端同步,也代表著接收端產生的調 4方波電壓會與傳輸端—致,只需根據接收端產生的調變 #波電壓調整傳輸訊號’即可還原原來的原始數位訊號。 然而竊取者即使榻取到傳輪訊號,若是無法建構出整個系 統的響應狀態’报難解回原始數位訊號。 其二’因疋利用壓控振盪模組產生調變方波電壓,因 此可視輸出結果來調整輪入的混池訊號,進而控制調變方 波電壓的頻㈣化的範圍,解決了誠f路在頻率上-直 7 1360320 無法突破的問題。 【實施方式】 為使對本發明的目的、構造特徵及其功能有進一步的 了解,茲配合相關實施例及圖式詳細說明如下: 清參照圖1’其為未發明之保密通訊系統之方塊架構 ®。此系統包含一傳輸嘴100與一接收端200。 #輸端1GG包含〜第—混縫組nQ…第一壓控振 φ 盪模組I20、二加密模麵130與一傳輸模組140。接收端 200包含一接£模'组24〇、一設定模组25〇、一第二混死模 組210、一第二壓控振逯模組220與一解密模組230。 t傳送端欲傳送1始數位訊號時,n屯模組係 I生-第-混>屯訊號’第—壓控振盪模組12Q以第一混池 m號作為輸入訊號,產走一第一調變方波電壓。加密模組 130根據第@變方波電壓對原始數位訊號進行加密,形 成一傳輸訊號。傳輸模級14〇與接收模組24〇建立一資訊 # 通道,以傳送傳輸訊號與第一混沌訊號至接收端200。 第二混沌模組210係隨機產生一第二混沌訊號,設定 模組250根據第一混沌訊號與第二混沌訊號之差異計算出 一設定參數’再根據設定參數產生一控制參數來控制第二 混沌模組210 ’令第二混沌模組210產生的第二混沌訊號 同步於第一混沌訊號。第二壓控振盪模組220以同步後的 第二混、;屯訊號為輸入,產生一第二調變方波電壓,解密模 組230以第二調變方波電壓為條件,對傳輸訊號解密,還 1360320 , 原為原始數位訊號。 . 請參照圖2,其為本發明實施例之保密通訊系統之資 料傳輸方法,請同時參照圖1以利了解。此方法包含. 利用一傳輸端100之第/混沌模組Π0產生第、屯 訊號(步驟S210)。如前所述’傳輸端100在取得原始數 位訊號時,係利用第一混沌模組110產生第一混洗訊號。 第一混沌模組110為類比遙沌電路,其數學模式,以一階 微分方程可表示為心’ 弋3=-1.2〜1-〜2-〇.6^13+21«挪>^1)’其中:^1、:^2、;^3為第狀W 屯核 組110之三個狀態電壓,吻仅J為一函數,定義為’當Xml>〇 ’ ^炉(〜1) = 1 ;當^>1=0,妙(〜ι) = 0 當 Xml<0 ’ 幻^^卜一1 利用傳輸端100之第一壓控振盪模組120根據第一混 .沌訊號產生對應之第一調變方波電壓(步驟s220 )°第一 壓控振盪模組120以第一混沌訊號作為輸入’產生相對應 的電壓輸出,形成第一調變方波電壓。如圖3’上方曲線 • 為第一混沌訊號,下方即為第一調變方波電壓’然而混、/屯 訊號具有不可預測執跡的特性,而且頻率說異多變’因此 第一調變方波電壓為一隨機頻率方波。 根據第一調變方波電壓對一原始數位訊號加密為一傳 輸訊號,並傳送傳輸訊號與第一混沌訊號(步驟S230)° 此步驟中,傳輸端100之加密模組130係為一互斥或問 (EXCLUSIVE OR Gate ; X〇R Gate)。加密模組 130 係先 取得原始數位訊號,再取得第一調變方波電壓’之後將原 9 1360320 始數位訊號與第一調變方波電壓進行互斥或邏輯運算,以 形成傳輸訊號。之後,傳輸模組140透過資訊通道傳送傳 輸訊號與第一混洗訊號。如圖4,上方為原始數位訊號, 下方即為利用第一調變方波電壓作為加密條件的傳輸訊 號。 利用接收端200之第二混沌模組210產生一第二混沌 訊號(步驟S240 )。接收端200啟動時’係利用第二混沌 模組210產生第二混沌訊號’第二混沌模組210亦為類比 鲁 混沌電路’其數學模式,以一階微分方程可表示為勾=x,2, xs2=xsi+u 5 xsi=-\2χλ - xsl - 0.6xi3 + 2sign(xsX) » 其中 h 為此 第二混沌模組210之三個狀態電壓,吨《(〜)為一函數,定義 為,當〜>〇,ί妙(〜)=1 ;當'1=〇 ’ 吨《(〜) = 〇當〜<0,。 M為設定模組250輸出的控制訊號。本實施例中,給予第一 混沌模組110與第二混沌模組210不同的初始值,依混沌 系統之特性,故第一混沌模組110與第二混沌模組210開 • 始運行的訊號曲線即為相異。 根據第一混沌訊號與第二混沌訊號利用接收端200之 一設定模組250計算出一設定參數,再根據設定參數推算 出一控制訊號(步驟S250 )。設定模組250為一比例-積分 -微分控制器,係利用一進化演算法根據第一混沌訊號與第 二混沌訊號計算此設定參數。 本實施例中,將人W]=[ft;0」a;]視為第一混沌模組 110的初值,-2 i]為第二混池模組210的初 1360.320 值。設定模組250輸出的控制訊號,其計算公式為 ⑹+ ,其中為訊號誤差,設定參 數包含& =20.000000、尤,=0.003434、4=4.807194,\、尺,、心分別 代表比例常數,積分常數及微分常數。 根據控制訊號控制第二混沌模組210,令第二混沌訊 號與第一混沌訊號同步(步驟S260 )。第二混沌模組210 根據上述的控制訊號調整第二混沌模組210,以將第二混 • 沌訊號與第一混沌訊號形成同步響應,如圖5。於調整後, 第二混沌訊號逐漸同步於第一混沌訊號。如圖6,第二混 沌訊號與第一混沌訊號同步後,其訊號誤差幾乎趨近零。 圖 6 中的誤差定義如 el = xml =Xm -xi2(4e3 = -xs3。 利用接收端200之一第二壓控振盪模組220根據同步 之第二混沌訊號產生一第二調變方波電壓(步驟S270)。 如圖3,前述中,第二混沌訊號與第一混沌訊號已同步, Φ 因此以第二混、;屯訊號為輸入條件下,第二壓控振盪模組220 產生的第二調變方波電壓即同等於第一調變方波電壓,同 為隨機頻率方波’且波型完全相同。 根據第二調變方波電壓對傳輸訊號解密(步驟S280)。 此步驟中,接收端200之解密模組230也是一互斥或閘 (EXCLUSIVE OR Gate ; XOR Gate)。解密模組 230 係先 取得該傳輸訊號,再取得該第二調變方波電壓,最後將該 傳輸訊號與該第二調變方波電壓進行互斥或邏輯運算’以 11 1360320 還原為該原始數位訊號。如圖7,第二調變方波電壓與第 一調變方波電壓為相同波型,故傳輸訊號透過第二調變方 波電壓解密後,即為原始數位訊號。 雖然本發明以前述之較佳實施例揭露如上,然其並非 用以限定本發明,任何熟習相像技藝者,在不脫離本發明 之精神和範圍内,所作更動與潤飾之等效替換,仍為本發 明之專利保護範圍内。 【圖式簡單說明】 圖1係本發明實施例之保密通訊系統之方塊架構圖;. 圖2係本發明實施例之保密通訊系統之資料傳輸方法; 圖3係本發明實施例之第一調變電壓示意圖; 圖4係本發明實施例之原始數位訊號加密波形圖; 圖5係本發明實施例之混沌訊號同步示意圖; 圖6係本發明實施例之混沌訊號差異示意圖;以及 圖7係本發明實施例之原始數位訊號傳輸前後比較圖。 【主要元件符號說明】 100 傳輸端 110 第一混;屯模組 120 第一壓控振盪模組 130 加密模組 140 傳輸模組 200 接收端 210 第二混沌模組 12 1360320 220 第二壓控振盪模組 230 解密模組 240 接收模組 250 設定模組 131360320 « Nine, invention description: [Technical field of invention] A communication system and method thereof specifically refers to a secure communication system for data encryption and decryption using chaotic signals and a data transmission method thereof. [Prior Art] In the prior art, in order to achieve the effect of data confidentiality, the conventional digital communication system usually performs encryption in the following manner: First, encryption is performed by using a specific key, and all transmission data is coordinated with the specific key to output 'receiver'. A device or user with this particular key can be received or turned on. The second is to use the special data transfer or the transfer data to be mutually exclusive or displaced, offset, summed, etc., and the receiver has the specific key or the device that knows the decryption means. Opened. Encrypted transmission data. However, the prior art has unavoidable deficiencies: First, if encryption is performed with a specific key, if a specific key flows out, the encryption behavior of the transmitted data is as illusory. Second, although the transmitted data is encrypted data, if the person intercepts the transmitted data and repeats the experimental encryption rules, the transmitted data may be cracked and restored to the original data. SUMMARY OF THE INVENTION In view of this, the problem to be solved by the present invention is to provide an unpredictable characteristic of the state of the hybrid system. Through the concept of system control, 1360320 synchronizes the state responses of two chaotic systems, effectively encrypting and decrypting digits. Signal digital signal communication system and method thereof. In order to solve the above method problem, the technical means provided by the present invention discloses a data transmission method of a digital signal communication system, which first uses a first chaotic module of a transmission end to generate a first chaotic signal; and uses a first voltage of a transmission end. The control oscillation module generates a corresponding first modulated square wave voltage according to the first chaotic signal; encrypts a raw digital signal into a transmission signal according to the first modulated square wave voltage, and transmits the transmission signal and the first chaotic signal; a second chaotic module of the receiving end generates a second chaotic signal; and according to the first chaotic signal and the second chaotic signal, a setting parameter is calculated by using one of the receiving end setting modules, and then a control parameter is calculated according to the design parameter; The control parameter controls the second bubble mixing module to synchronize the second bubble mixing signal with the first shuffling signal; and the second voltage control oscillation module of the receiving end generates a second modulation according to the synchronized second chaotic signal a square wave voltage; and decrypting the transmission signal according to the second modulated square wave voltage. The invention discloses a secure communication system, which system comprises a transmission end and a receiving end. The transmission end comprises a first mixing module, a first voltage controlled oscillation module, an encryption module and a transmission module. The first chaotic module generates a first chaotic signal, and the first voltage-controlled oscillation module generates a first modulated square wave voltage, so that the encryption module encrypts an original digital signal according to the first modulated square wave voltage to form a Transmit the signal. The transmission module transmits the first chaotic signal and the transmission signal. The receiving end comprises a receiving module, a setting module, a second chaotic module 1360320, a second voltage controlled oscillation module and a decryption module. The receiving module receives the first chaotic signal and the transmitted signal. The second chaotic module generates a second mud signal 'setting module to calculate a setting parameter according to the first chaotic signal and the second chaotic signal', and then deriving a control signal according to the setting parameter to control the second chaos by using the control signal The module synchronizes the second chaotic signal with the first chaotic signal. The second voltage controlled oscillation module generates a second modulated square wave voltage according to the synchronized second chaotic signal. The decryption module unmasks the transmitted signal according to the second modulated square wave voltage, and uses the original digital signal. The present invention has the inefficiency that the prior art cannot achieve: its 'shuffling signal itself has characteristics such as unpredictability, white noise-like spectrum, and sensitivity to initial conditions. Therefore, the modulated square wave voltage generated by the system is a random frequency and a magnitude of the voltage. Therefore, the modulated square wave voltage generated by the voltage controlled oscillation module with the square wave voltage as the input is also randomly random and unpredictable. characteristic. When the 'receiver receives the chaotic signal at the transmission end', it constructs all the states of the transmission and achieves double-end synchronization. It also means that the modulated 4 square wave voltage generated by the receiver will be transmitted with the transmission terminal, only according to the reception. The modulation generated by the terminal #wave voltage adjustment transmission signal can restore the original original digital signal. However, even if the stealer takes the pass signal, if it is unable to construct the response state of the entire system, it is difficult to solve the original digital signal. Secondly, because the voltage-controlled oscillating module is used to generate the modulated square wave voltage, the visual output result is used to adjust the rounded mixing pool signal, thereby controlling the frequency (four) range of the modulated square wave voltage, and solving the Cheng F road. On the frequency - straight 7 1360320 can not break through the problem. [Embodiment] In order to further understand the object, structural features and functions of the present invention, the following detailed description is given in conjunction with the related embodiments and drawings: Refer to FIG. 1 for the block architecture of the uninvented secure communication system. . The system includes a transmission nozzle 100 and a receiving end 200. #输端1GG includes a first-mixing group nQ... a first voltage-controlled vibration φ swaying module I20, a second encryption die surface 130 and a transmission module 140. The receiving end 200 includes a receiving module group 24, a setting module 25A, a second mixed die group 210, a second voltage controlled vibrating module 220 and a decrypting module 230. When the transmitting end wants to transmit the 1st digital signal, the n屯 module is the I-first-mixing > 屯 signal 'the first voltage-controlled oscillating module 12Q takes the first mixed pool m number as the input signal, and produces a first A variable square wave voltage. The encryption module 130 encrypts the original digital signal according to the @@variant square wave voltage to form a transmission signal. The transmission module 14A and the receiving module 24A establish an information # channel for transmitting the transmission signal and the first chaotic signal to the receiving end 200. The second chaotic module 210 randomly generates a second chaotic signal, and the setting module 250 calculates a set parameter according to the difference between the first chaotic signal and the second chaotic signal, and generates a control parameter according to the set parameter to control the second chaos. The module 210' synchronizes the second chaotic signal generated by the second chaotic module 210 with the first chaotic signal. The second voltage-controlled oscillating module 220 generates a second modulating square wave voltage by using the second mixed signal; the 屯 signal is input, and the decrypting module 230 is configured to transmit the signal according to the second modulating square wave voltage. Decrypted, also 1360320, originally the original digital signal. Referring to FIG. 2, which is a data transmission method of a secure communication system according to an embodiment of the present invention, please refer to FIG. 1 to understand. The method includes: generating a first and a second signal by using a chaotic module Π0 of the transmitting end 100 (step S210). As described above, the transmitting end 100 generates the first shuffling signal by using the first chaotic module 110 when obtaining the original digital signal. The first chaotic module 110 is an analogous chaotic circuit, and its mathematical mode can be expressed as a heart by a first-order differential equation 弋3=-1.2~1-~2-〇.6^13+21«诺>^1 ) where: ^1, :^2, ;^3 are the three state voltages of the first W nucleus group 110, and the kiss only J is a function, defined as 'when Xml> 〇' ^ furnace (~1) = 1; when ^>1=0, Miao (~ι) = 0 When Xml<0' 幻^^b-1 uses the first voltage-controlled oscillation module 120 of the transmission terminal 100 to generate a correspondence according to the first mixed-shadow signal The first modulated square wave voltage (step s220). The first voltage controlled oscillation module 120 uses the first chaotic signal as an input to generate a corresponding voltage output to form a first modulated square wave voltage. As shown in Fig. 3's upper curve, it is the first chaotic signal, and the lower part is the first modulated square wave voltage. However, the mixed//signal signal has unpredictable characteristics, and the frequency is different. Therefore, the first modulation The square wave voltage is a random frequency square wave. And encrypting a raw digital signal into a transmission signal according to the first modulated square wave voltage, and transmitting the transmission signal and the first chaotic signal (step S230). In this step, the encryption module 130 of the transmission end 100 is mutually exclusive. Or ask (EXCLUSIVE OR Gate; X〇R Gate). The encryption module 130 first obtains the original digital signal, and then obtains the first modulated square wave voltage', and then mutually exclusive or logically operates the original 9 1360320 initial digital signal and the first modulated square wave voltage to form a transmission signal. Then, the transmission module 140 transmits the transmission signal and the first shuffling signal through the information channel. As shown in Fig. 4, the upper part is the original digital signal, and the lower part is the transmission signal using the first modulated square wave voltage as the encryption condition. A second chaotic signal is generated by the second chaotic module 210 of the receiving end 200 (step S240). When the receiving end 200 is started, the second chaotic module 210 is generated by the second chaotic module 210. The second chaotic module 210 is also a mathematical model of the analogous chaotic circuit. The first-order differential equation can be expressed as a hook=x, 2 , xs2=xsi+u 5 xsi=-\2χλ - xsl - 0.6xi3 + 2sign(xsX) » where h is the three state voltages of the second chaotic module 210, ton "(~) is a function, defined as When ~>〇, 妙妙(~)=1; when '1=〇' tons "(~) = jingle ~ <0,. M is a control signal output by the setting module 250. In this embodiment, the initial values of the first chaotic module 110 and the second chaotic module 210 are given, and according to the characteristics of the chaotic system, the first chaotic module 110 and the second chaotic module 210 are started to run. The curves are different. According to the first chaotic signal and the second chaotic signal, a setting module 250 of the receiving end 200 is used to calculate a setting parameter, and then a control signal is calculated according to the setting parameter (step S250). The setting module 250 is a proportional-integral-derivative controller, and uses an evolution algorithm to calculate the setting parameter according to the first chaotic signal and the second chaotic signal. In this embodiment, the person W]=[ft;0"a;] is regarded as the initial value of the first chaotic module 110, and -2 i] is the initial 1360.320 value of the second pool module 210. The control signal outputted by the module 250 is calculated as (6)+, where is the signal error, and the setting parameters include &=20.000000, especially,=0.003434, 4=4.807194, \, ruler, and heart respectively represent proportional constants, integral Constant and differential constant. The second chaotic module 210 is controlled according to the control signal to synchronize the second chaotic signal with the first chaotic signal (step S260). The second chaotic module 210 adjusts the second chaotic module 210 according to the control signal to form a synchronous response between the second chaotic signal and the first chaotic signal, as shown in FIG. 5. After the adjustment, the second chaotic signal is gradually synchronized with the first chaotic signal. As shown in Fig. 6, after the second chaotic signal is synchronized with the first chaotic signal, the signal error is almost zero. The error in FIG. 6 is defined as el = xml = Xm - xi2 (4e3 = -xs3. The second voltage-controlled oscillating module 220 of the receiving end 200 generates a second modulating square wave voltage according to the synchronized second chaotic signal. (Step S270). As shown in FIG. 3, in the foregoing, the second chaotic signal is synchronized with the first chaotic signal, and Φ is thus generated by the second voltage-controlled oscillation module 220 under the condition that the second mixed signal is used as the input condition. The second modulated square wave voltage is equal to the first modulated square wave voltage, and is the same as the random frequency square wave 'and the wave pattern is exactly the same. The transmission signal is decrypted according to the second modulated square wave voltage (step S280). The decryption module 230 of the receiving end 200 is also a EXCLUSIVE OR Gate (XOR Gate). The decryption module 230 first obtains the transmission signal, and then obtains the second modulated square wave voltage, and finally transmits the transmission. The signal and the second modulated square wave voltage are mutually exclusive or logically operated to restore the original digital signal by 11 1360320. As shown in Figure 7, the second modulated square wave voltage is the same as the first modulated square wave voltage. Therefore, the transmission signal is decrypted by the second modulated square wave voltage The present invention is the original digital signal. Although the present invention has been disclosed above in the above preferred embodiments, it is not intended to limit the invention, and any modification and retouching can be made without departing from the spirit and scope of the invention. FIG. 1 is a block diagram of a secure communication system according to an embodiment of the present invention; FIG. 2 is a secure communication system according to an embodiment of the present invention. FIG. 3 is a schematic diagram of a first modulated voltage according to an embodiment of the present invention; FIG. 4 is a schematic diagram of an original digital signal encrypted waveform according to an embodiment of the present invention; FIG. 5 is a schematic diagram of synchronization of a chaotic signal according to an embodiment of the present invention; A schematic diagram of the difference of the chaotic signal in the embodiment of the present invention; and FIG. 7 is a comparison diagram before and after the transmission of the original digital signal in the embodiment of the present invention. [Description of the main components] 100 first transmission of the transmission end 110; first voltage control oscillation of the 屯 module 120 Module 130 encryption module 140 transmission module 200 receiving end 210 second chaotic module 12 1360320 220 second voltage controlled oscillation module 230 decryption mode Module setting module 240 receives 250 13