[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN113992384B - Secret communication method based on fractional Fourier transform order multiplexing - Google Patents

Secret communication method based on fractional Fourier transform order multiplexing Download PDF

Info

Publication number
CN113992384B
CN113992384B CN202111235700.5A CN202111235700A CN113992384B CN 113992384 B CN113992384 B CN 113992384B CN 202111235700 A CN202111235700 A CN 202111235700A CN 113992384 B CN113992384 B CN 113992384B
Authority
CN
China
Prior art keywords
data
information
transmission
time
communication frame
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111235700.5A
Other languages
Chinese (zh)
Other versions
CN113992384A (en
Inventor
冯强
王荣波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yanan University
Original Assignee
Yanan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yanan University filed Critical Yanan University
Priority to CN202111235700.5A priority Critical patent/CN113992384B/en
Publication of CN113992384A publication Critical patent/CN113992384A/en
Application granted granted Critical
Publication of CN113992384B publication Critical patent/CN113992384B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/10Complex mathematical operations
    • G06F17/14Fourier, Walsh or analogous domain transformations, e.g. Laplace, Hilbert, Karhunen-Loeve, transforms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Computational Mathematics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Theoretical Computer Science (AREA)
  • Algebra (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a secret communication method based on fractional Fourier transform order multiplexing, which belongs to the technical field of communication and comprises the following specific steps: (1) receiving transmission data and recording data information; (2) security detecting the transmission data; (3) encrypting the transmission data to generate a communication frame; (4) monitoring the communication safety environment in real time; (5) receiving the communication frame and data decoding it; the invention can effectively prevent the transmission of illegal information, improve the safety and legal efficiency of maintaining the network environment, and is beneficial to purifying the network environment, ensuring the healthy internet surfing requirement of people, reducing the data leakage probability when the data is attacked by external personnel in the transmission process, ensuring the data safety, positioning the attack source position and being beneficial to maintaining the personal information safety and social security.

Description

一种基于分数阶傅里叶变换阶次复用的保密通信方法A secure communication method based on fractional Fourier transform order multiplexing

技术领域Technical field

本发明涉及通信技术领域,尤其涉及一种基于分数阶傅里叶变换阶次复用的保密通信方法。The present invention relates to the field of communication technology, and in particular to a secure communication method based on fractional Fourier transform order multiplexing.

背景技术Background technique

保密通信是研究通信中信息保密技术的科学,能信学科的分支,其具体是指采取了保密措施的通信,除采用暗号、隐语、密码等保密措施外,现代保密通信主要采用信道保密和信息保密,信道保密是采用使窃密者不易截收到信息的通信信道,如采用专用的线路、瞬间通信和无线电扩频通信等,信息保密是对传输的信息用约定的代码密码等方法加以隐蔽再传送出去,随着电子技术的发展,已采用保密机进行保密,其特点是对传输的信息在发送端进行变换加密处理,接收端按相反过程还原信息,使窃密者即使收到信号,也不明信号所代表的内容,数据通信的迅速发展带来了数据失密问题,信息被非法截取和数据库资料被窃的事例经常发生,在日常生活中信用卡密码被盗是常见的例子。数据失密会造成严重后果,所以数据保密成为十分重要的问题;因此,发明出一种基于分数阶傅里叶变换阶次复用的保密通信方法变得尤为重要。Secure communications is the science that studies information security technology in communications, a branch of the science of trust. It specifically refers to communications that adopt security measures. In addition to using secret codes, lingoes, passwords and other security measures, modern secure communications mainly use channel confidentiality and information security. Confidentiality, channel confidentiality is the use of communication channels that make it difficult for eavesdroppers to intercept information, such as the use of dedicated lines, instantaneous communication and radio spread spectrum communication, etc. Information confidentiality is the use of agreed codes and passwords to conceal the transmitted information. With the development of electronic technology, secret machines have been used for confidentiality. Its characteristic is that the transmitted information is transformed and encrypted at the sending end, and the receiving end restores the information according to the reverse process, so that even if the eavesdropper receives the signal, he will not know it. The content represented by the signal, the rapid development of data communication has brought about the problem of data confidentiality. Instances of illegal interception of information and theft of database data often occur. Stolen credit card passwords are common examples in daily life. Data confidentiality will cause serious consequences, so data confidentiality has become a very important issue; therefore, it is particularly important to invent a secure communication method based on fractional Fourier transform order multiplexing.

经检索,中国专利号CN108768927A公开了保密通信方法和装置,该发明虽然适用于通信带宽较窄且通信双方系统时间有偏差的通信场景,但是无法对用户发送的传输数据进行检测,无法有效的阻止违规信息的传递,无法维护网络环境的安全性以及合法性;此外,现有的基于分数阶傅里叶变换阶次复用的保密通信方法在受到外部人员攻击时,容易造成数据泄露,无法保证数据安全,且无法对攻击来源位置进行定位,不利于维护个人信息安全;为此,我们提出一种基于分数阶傅里叶变换阶次复用的保密通信方法。After searching, Chinese patent number CN108768927A discloses a secure communication method and device. Although this invention is suitable for communication scenarios where the communication bandwidth is narrow and the system times of both communicating parties are deviated, it cannot detect the transmission data sent by the user and cannot effectively prevent it. The transmission of illegal information cannot maintain the security and legality of the network environment; in addition, the existing confidential communication method based on fractional Fourier transform order multiplexing can easily cause data leakage when attacked by external parties, and cannot guarantee The data is secure, and the location of the attack source cannot be located, which is not conducive to maintaining the security of personal information. To this end, we propose a secure communication method based on fractional Fourier transform order multiplexing.

发明内容Contents of the invention

本发明的目的是为了解决现有技术中存在的缺陷,而提出的一种基于分数阶傅里叶变换阶次复用的保密通信方法。The purpose of the present invention is to propose a secure communication method based on fractional Fourier transform order multiplexing in order to solve the defects existing in the prior art.

为了实现上述目的,本发明采用了如下技术方案:In order to achieve the above objects, the present invention adopts the following technical solutions:

一种基于分数阶傅里叶变换阶次复用的保密通信方法,该保密通信方法具体步骤如下:A secure communication method based on fractional Fourier transform order multiplexing. The specific steps of the secure communication method are as follows:

(1)接收传输数据,并记录数据信息:传输模块接收用户发送的传输数据,并收集其相关信息,并对收集到的进行分类处理,同时自行构建加密记录表,并将各组信息进行记录;(1) Receive the transmission data and record the data information: The transmission module receives the transmission data sent by the user, collects its relevant information, and classifies the collected information. At the same time, it builds an encrypted record table by itself and records each group of information. ;

(2)对传输数据进行安全检测:对用户发送的传输数据通过监测、分析并判断传输数据的安全性以及合法性;(2) Security detection of transmitted data: Monitor, analyze and determine the security and legality of the transmitted data sent by users;

(3)对传输数据进行加密处理生成通信帧:对符合传输规则的传输数据进行数据加密,同时将加密完成的传输数据通过数据转换生成通信帧;(3) Encrypt the transmission data to generate a communication frame: Encrypt the transmission data that conforms to the transmission rules, and at the same time convert the encrypted transmission data to generate a communication frame;

(4)实时监测通信安全环境:对通信帧传输环境进行实时监测,并对外部攻击行为进行分析处理,同时对攻击来源进行IP地址定位,并将其反馈给工作人员;(4) Real-time monitoring of the communication security environment: Real-time monitoring of the communication frame transmission environment, analysis and processing of external attack behaviors, while locating the IP address of the source of the attack and feeding it back to the staff;

(5)接收通信帧,并对其进行数据解码:数据接收模块接收通信帧,并将其发送至解密算法模块,解密算法模块利用解密算法对接收到的加密信息进行解密分析,同时将解密后的数据反馈给用户。(5) Receive the communication frame and decode the data: the data receiving module receives the communication frame and sends it to the decryption algorithm module. The decryption algorithm module uses the decryption algorithm to decrypt and analyze the received encrypted information, and at the same time, the decrypted The data is fed back to the user.

进一步地,步骤(1)中所述分类处理具体步骤如下:Further, the specific steps of the classification processing described in step (1) are as follows:

步骤一:对传输数据的数据类型、数据长度以及数据大小进行信息收集,并将其分别录入加密记录表中;Step 1: Collect information on the data type, data length and data size of the transmitted data, and enter them into the encryption record table respectively;

步骤二:对接收到传输数据时的系统时间进行收集,并将其标记为发送时间,同时将其在加密记录表中进行记录。Step 2: Collect the system time when the transmission data is received, mark it as the sending time, and record it in the encrypted record table.

进一步地,步骤(2)中所述监测分析具体步骤如下:Further, the specific steps of monitoring and analysis described in step (2) are as follows:

第一步:对传输数据进行异常排查,若传输数据中存在异常信息,则将其反馈给用户,并停止后续传输过程;Step 1: Check for exceptions in the transmission data. If there is abnormal information in the transmission data, feedback it to the user and stop the subsequent transmission process;

第二步:若传输数据中不存在异常信息,传输模块检测传输数据中是否存在违规信息,若存在,则反馈用户“存在违规信息,无法传输”。Step 2: If there is no abnormal information in the transmitted data, the transmission module detects whether there is illegal information in the transmitted data. If it exists, it will feedback to the user that "there is illegal information and cannot be transmitted."

进一步地,步骤(3)中所述数据加密具体步骤如下:Further, the specific steps of data encryption described in step (3) are as follows:

Ⅰ:构建分数阶傅里叶多路传输复用器,并从加密记录表中提取数据长度,并依据其构建分数阶傅里叶多路传输复用器综合滤波器组;Ⅰ: Construct a fractional-order Fourier multiplexer, extract the data length from the encrypted record table, and construct a comprehensive filter bank for the fractional-order Fourier multiplexer based on it;

Ⅱ:将传输数据导入分数阶傅里叶多路传输复用器综合滤波器组中,并对其进行调制处理生成复用信号;Ⅱ: Import the transmission data into the comprehensive filter bank of the fractional Fourier multiplexer, and modulate it to generate a multiplexed signal;

Ⅲ:从加密记录表中提取发送时间信息,并依据发送时间信息进行时间单元倍数计算,其具体计算公式如下:III: Extract the sending time information from the encrypted record table, and calculate the time unit multiple based on the sending time information. The specific calculation formula is as follows:

Ns=int(Ts/Tu) (1)N s =int(T s /T u ) (1)

其中,Ns代表发送时间单元倍数,Ts代表系统时间,Tu代表设定的时间单元的长度,int()为取整函数;Among them, N s represents the multiple of the sending time unit, T s represents the system time, Tu represents the length of the set time unit, and int() is the rounding function;

Ⅳ:依据计算出的时间单元倍数对复用信号发送时间密钥信息进行确认,并将复用信号通过数据转换处理生成通信帧。IV: Confirm the multiplexed signal transmission time key information based on the calculated time unit multiple, and generate a communication frame through data conversion processing of the multiplexed signal.

进一步地,步骤(4)中所述分析处理具体步骤如下:Further, the specific steps of the analysis and processing described in step (4) are as follows:

S1:当通信帧在传输过程中遭到外部攻击时,启动防火墙对攻击数据进行防御,并通过防火墙对攻击来源IP地址进行确认;S1: When the communication frame is attacked by an external attack during transmission, start the firewall to defend against the attack data, and confirm the attack source IP address through the firewall;

S2:与GPS卫星进行通信连接,并抓取IP地址所在区域图像,同时将抓取到的真实地址反馈给工作人员,同时发送警报信息至相关单位进行处理;S2: Communicate with the GPS satellite and capture the image of the area where the IP address is located. At the same time, the captured real address is fed back to the staff, and alarm information is sent to relevant units for processing;

S3:当防火墙无法阻挡外部数据入侵时,该防火墙会对通信帧进行数据更改或数据销毁处理,避免造成数据泄露,同时将处理信息反馈给工作人员。S3: When the firewall cannot block external data intrusion, the firewall will change or destroy data in the communication frame to avoid data leakage, and at the same time feed back the processing information to the staff.

进一步地,步骤(5)中所述解密分析具体步骤如下:Further, the specific steps of the decryption analysis described in step (5) are as follows:

P1:记录接收到通信帧的时间,并将其记录为接收时间,同时依据接收时间确认发送时间密钥信息;P1: Record the time when the communication frame is received, record it as the reception time, and confirm the sending time key information based on the reception time;

P2:将通信帧导入分数阶傅里叶多路复用器中的分析滤波器组中进行数据转换处理生成输出信号矢量;P2: Import the communication frame into the analysis filter bank in the fractional Fourier multiplexer for data conversion processing to generate an output signal vector;

P3:将各组输出信号矢量通过提取解密转换成输入信号矢量,并依据其进行传输数据恢复,同时将传输数据反馈给用户。P3: Convert each group of output signal vectors into input signal vectors through extraction and decryption, and restore the transmission data based on them, while feeding back the transmission data to the user.

相比于现有技术,本发明的有益效果在于:Compared with the existing technology, the beneficial effects of the present invention are:

1、该基于分数阶傅里叶变换阶次复用的保密通信方法相较于以往直接传输用户数据,该方法在信息传输前,通过安全监测模块对传输数据进行异常排查,若传输数据中存在异常信息,则将其反馈给用户,并停止后续传输过程,若传输数据中不存在异常信息,传输模块检测传输数据中是否存在违规信息,若存在违规信息,则反馈用户“存在违规信息,无法传输”,能够有效的阻止违规信息的传递,提高维护网络环境的安全性以及合法性的效率,同时有利于净化网络环境,保证人们健康上网的需求;1. Compared with the past direct transmission of user data, this secure communication method based on fractional Fourier transform order multiplexing uses a security monitoring module to detect abnormalities in the transmitted data before the information is transmitted. If there are If there is abnormal information, it will be fed back to the user and the subsequent transmission process will be stopped. If there is no abnormal information in the transmission data, the transmission module will detect whether there is any violation information in the transmission data. If there is violation information, it will feed back to the user "There is violation information and cannot "Transmission" can effectively prevent the transmission of illegal information, improve the efficiency of maintaining the security and legality of the network environment, and at the same time help purify the network environment and ensure people's needs for healthy Internet access;

2、该基于分数阶傅里叶变换阶次复用的保密通信方法,传输模块对传输数据检测完成,通过分数阶傅里叶多路传输复用器将传输数据经过数据转换处理生成通信帧进行传输,当通信帧在传输过程中遭到外部攻击时,启动防火墙对攻击数据进行防御,并通过防火墙对攻击来源IP地址进行确认,与GPS卫星进行通信连接,并抓取IP地址所在区域图像,同时将抓取到的真实地址反馈给工作人员,同时发送警报信息至相关单位进行处理,能够保证数据在传输过程中受到外部人员攻击时,降低数据泄露概率,保证数据安全,且能够对攻击来源位置进行定位,有利于维护个人信息安全以及社会治安。2. In this secure communication method based on fractional Fourier transform order multiplexing, the transmission module completes the detection of the transmission data, and the fractional Fourier multiplexer converts the transmission data through data conversion processing to generate a communication frame. Transmission, when the communication frame is attacked by an external attack during the transmission process, the firewall is activated to defend against the attack data, and the IP address of the attack source is confirmed through the firewall, the communication connection is made with the GPS satellite, and the image of the area where the IP address is located is captured. At the same time, the captured real address is fed back to the staff, and alarm information is sent to relevant units for processing. This can ensure that when the data is attacked by external parties during the transmission process, the probability of data leakage is reduced, data security is ensured, and the source of the attack can be identified. Location-based positioning is conducive to maintaining personal information security and social security.

附图说明Description of the drawings

附图用来提供对本发明的进一步理解,并且构成说明书的一部分,与本发明的实施例一起用于解释本发明,并不构成对本发明的限制。The drawings are used to provide a further understanding of the present invention and constitute a part of the specification. They are used to explain the present invention together with the embodiments of the present invention and do not constitute a limitation of the present invention.

图1为本发明提出的一种基于分数阶傅里叶变换阶次复用的保密通信方法的流程框图。Figure 1 is a flow chart of a secure communication method based on fractional Fourier transform order multiplexing proposed by the present invention.

具体实施方式Detailed ways

下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, rather than all the embodiments.

在本发明的描述中,需要理解的是,术语“上”、“下”、“前”、“后”、“左”、“右”、“顶”、“底”、“内”、“外”等指示的方位或位置关系为基于附图所示的方位或位置关系,仅是为了便于描述本发明和简化描述,而不是指示或暗示所指的装置或元件必须具有特定的方位、以特定的方位构造和操作,因此不能理解为对本发明的限制。In the description of the present invention, it should be understood that the terms "upper", "lower", "front", "back", "left", "right", "top", "bottom", "inner", " The orientation or positional relationship indicated by "outside" and so on is based on the orientation or positional relationship shown in the drawings. It is only for the convenience of describing the present invention and simplifying the description, and does not indicate or imply that the device or element referred to must have a specific orientation. Specific orientations of construction and operation are therefore not to be construed as limitations of the invention.

实施例1Example 1

参照图1,一种基于分数阶傅里叶变换阶次复用的保密通信方法,本实施例主要公开了一种监测分析方法:Referring to Figure 1, a secure communication method based on fractional Fourier transform order multiplexing. This embodiment mainly discloses a monitoring and analysis method:

接收传输数据,并记录数据信息:传输模块接收用户发送的传输数据,并收集其相关信息,并对收集到的进行分类处理,同时自行构建加密记录表,并将各组信息进行记录。Receive the transmission data and record the data information: The transmission module receives the transmission data sent by the user, collects its related information, and classifies the collected data. At the same time, it builds an encrypted record table by itself and records each group of information.

具体的,首先,传输模块对传输数据的数据类型、数据长度以及数据大小进行信息收集,并将其分别录入加密记录表中,各组信息记录完成,传输模块对接收到传输数据时的系统时间进行收集,并将其标记为发送时间,同时将其在加密记录表中进行记录。Specifically, first, the transmission module collects information on the data type, data length and data size of the transmission data, and enters them into the encrypted record table respectively. After each group of information is recorded, the transmission module collects the system time when the transmission data is received. Collect it, mark it as the time it was sent, and record it in the encrypted record table.

对传输数据进行安全检测:对用户发送的传输数据通过监测、分析并判断传输数据的安全性以及合法性。Security detection of transmitted data: Monitor, analyze and determine the security and legality of transmitted data sent by users.

具体的,在信息传输前,安全监测模块对传输数据进行异常排查,若传输数据中存在异常信息,则将其反馈给用户,并停止后续传输过程,若传输数据中不存在异常信息,传输模块检测传输数据中是否存在违规信息,若存在违规信息,则反馈用户“存在违规信息,无法传输”。Specifically, before information is transmitted, the security monitoring module performs abnormal inspection on the transmitted data. If there is abnormal information in the transmitted data, it will be fed back to the user and the subsequent transmission process will be stopped. If there is no abnormal information in the transmitted data, the transmission module Detect whether there is any illegal information in the transmitted data. If there is illegal information, it will feedback to the user that "there is illegal information and cannot be transmitted".

需要进一步说明的是,异常信息包括病毒数据以及违规数据。It should be further explained that abnormal information includes virus data and violation data.

对传输数据进行加密处理生成通信帧:对符合传输规则的传输数据进行数据加密,同时将加密完成的传输数据通过数据转换生成通信帧。Encrypt the transmission data to generate a communication frame: Encrypt the transmission data that conforms to the transmission rules, and at the same time convert the encrypted transmission data to generate a communication frame.

具体的,首先,传输模块自行构建分数阶傅里叶多路传输复用器,并从加密记录表中提取数据长度,并依据其构建分数阶傅里叶多路传输复用器综合滤波器组,构建完成后,将传输数据导入分数阶傅里叶多路传输复用器综合滤波器组中,并对其进行调制处理生成复用信号,从加密记录表中提取发送时间信息,并依据发送时间信息进行时间单元倍数计算,并依据计算出的时间单元倍数对复用信号发送时间密钥信息进行确认,并将复用信号通过数据转换处理生成通信帧。Specifically, first, the transmission module constructs a fractional-order Fourier multiplexer by itself, extracts the data length from the encrypted record table, and constructs a comprehensive filter bank of the fractional-order Fourier multiplexer based on it. , after the construction is completed, the transmission data is imported into the comprehensive filter bank of the fractional Fourier multiplexer, and modulated to generate a multiplexed signal. The transmission time information is extracted from the encryption record table, and based on the transmission The time information is calculated as a time unit multiple, and the multiplexed signal transmission time key information is confirmed based on the calculated time unit multiple, and the multiplexed signal is processed through data conversion to generate a communication frame.

需要进一步说明的是,其具体时间单元倍数计算公式如下:What needs further explanation is that the specific time unit multiple calculation formula is as follows:

Ns=int(Ts/Tu) (1)N s =int(T s /T u ) (1)

其中,Ns代表发送时间单元倍数,Ts代表系统时间,Tu代表设定的时间单元的长度,int()为取整函数。Among them, N s represents the multiple of the sending time unit, T s represents the system time, Tu represents the length of the set time unit, and int() is the rounding function.

实施例2Example 2

参照图1,一种基于分数阶傅里叶变换阶次复用的保密通信方法,除与上述实施例相同结构外,本实施例主要公开了一种分析处理方法:Referring to Figure 1, a secure communication method based on fractional Fourier transform order multiplexing is shown. In addition to the same structure as the above embodiment, this embodiment mainly discloses an analysis and processing method:

实时监测通信安全环境:对通信帧传输环境进行实时监测,并对外部攻击行为进行分析处理,同时对攻击来源进行IP地址定位,并将其反馈给工作人员。Real-time monitoring of the communication security environment: Real-time monitoring of the communication frame transmission environment, analysis and processing of external attack behaviors, while locating the IP address of the source of the attack and feeding it back to the staff.

具体的,当通信帧在传输过程中遭到外部攻击时,启动防火墙对攻击数据进行防御,并通过防火墙对攻击来源IP地址进行确认,与GPS卫星进行通信连接,并抓取IP地址所在区域图像,同时将抓取到的真实地址反馈给工作人员,同时发送警报信息至相关单位进行处理,当防火墙无法阻挡外部数据入侵时,该防火墙会对通信帧进行数据更改或数据销毁处理,避免造成数据泄露,同时将处理信息反馈给工作人员。Specifically, when the communication frame is attacked by an external attack during transmission, the firewall is activated to defend against the attack data, the IP address of the attack source is confirmed through the firewall, the communication connection is made with the GPS satellite, and the image of the area where the IP address is located is captured. At the same time, the captured real address is fed back to the staff, and alarm information is sent to relevant units for processing. When the firewall cannot block external data intrusion, the firewall will change the data or destroy the communication frame to avoid data corruption. leak, and at the same time feedback the processing information to the staff.

接收通信帧,并对其进行数据解码:数据接收模块接收通信帧,并将其发送至解密算法模块,解密算法模块利用解密算法对接收到的加密信息进行解密分析,同时将解密后的数据反馈给用户。Receive the communication frame and decode the data: the data receiving module receives the communication frame and sends it to the decryption algorithm module. The decryption algorithm module uses the decryption algorithm to decrypt and analyze the received encrypted information, and at the same time feeds back the decrypted data to users.

具体的,数据接收模块成功接收到通信帧时,数据接收模块记录接收到通信帧的时间,并将其记录为接收时间,同时依据接收时间确认发送时间密钥信息,确认完成后,数据接收模块将通信帧导入分数阶傅里叶多路复用器中的分析滤波器组中进行数据转换处理生成输出信号矢量,将各组输出信号矢量通过提取解密转换成输入信号矢量,并依据其进行传输数据恢复,同时将传输数据反馈给用户。Specifically, when the data receiving module successfully receives the communication frame, the data receiving module records the time when the communication frame is received and records it as the receiving time. At the same time, it confirms the sending time key information based on the receiving time. After the confirmation is completed, the data receiving module The communication frame is introduced into the analysis filter bank in the fractional-order Fourier multiplexer for data conversion processing to generate an output signal vector. Each group of output signal vectors is converted into an input signal vector through extraction and decryption, and is transmitted according to it. Data recovery, while feeding back the transmitted data to the user.

以上所述,仅为本发明较佳的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,根据本发明的技术方案及其发明构思加以等同替换或改变,都应涵盖在本发明的保护范围之内。The above are only preferred specific embodiments of the present invention, but the protection scope of the present invention is not limited thereto. Any person familiar with the technical field can, within the technical scope disclosed in the present invention, implement the technical solutions of the present invention. Equivalent substitutions or changes of the inventive concept thereof shall be included in the protection scope of the present invention.

Claims (3)

1.一种基于分数阶傅里叶变换阶次复用的保密通信方法,其特征在于,该保密通信方法具体步骤如下:1. A secure communication method based on fractional Fourier transform order multiplexing, characterized in that the specific steps of the secure communication method are as follows: (1)接收传输数据,并记录数据信息:传输模块接收用户发送的传输数据,并收集其相关信息,并对收集到的进行分类处理,同时自行构建加密记录表,并将各组信息进行记录;(1) Receive the transmission data and record the data information: The transmission module receives the transmission data sent by the user, collects its relevant information, and classifies the collected information. At the same time, it builds an encrypted record table by itself and records each group of information. ; 其中,所述分类处理具体步骤如下:Among them, the specific steps of the classification processing are as follows: 步骤一:对传输数据的数据类型、数据长度以及数据大小进行信息收集,并将其分别录入加密记录表中;Step 1: Collect information on the data type, data length and data size of the transmitted data, and enter them into the encryption record table respectively; 步骤二:对接收到传输数据时的系统时间进行收集,并将其标记为发送时间,同时将其在加密记录表中进行记录;Step 2: Collect the system time when the transmission data is received, mark it as the sending time, and record it in the encrypted record table; (2)对传输数据进行安全检测:对用户发送的传输数据通过监测、分析并判断传输数据的安全性以及合法性;(2) Security detection of transmitted data: Monitor, analyze and determine the security and legality of the transmitted data sent by users; (3)对传输数据进行加密处理生成通信帧:对符合传输规则的传输数据进行数据加密,同时将加密完成的传输数据通过数据转换生成通信帧;(3) Encrypt the transmission data to generate a communication frame: Encrypt the transmission data that conforms to the transmission rules, and at the same time convert the encrypted transmission data to generate a communication frame; (4)实时监测通信安全环境:对通信帧传输环境进行实时监测,并对外部攻击行为进行分析处理,同时对攻击来源进行IP地址定位,并将其反馈给工作人员;(4) Real-time monitoring of the communication security environment: Real-time monitoring of the communication frame transmission environment, analysis and processing of external attack behaviors, while locating the IP address of the source of the attack and feeding it back to the staff; (5)接收通信帧,并对其进行数据解码:数据接收模块接收通信帧,并将其发送至解密算法模块,解密算法模块利用解密算法对接收到的加密信息进行解密分析,同时将解密后的数据反馈给用户;(5) Receive the communication frame and decode the data: the data receiving module receives the communication frame and sends it to the decryption algorithm module. The decryption algorithm module uses the decryption algorithm to decrypt and analyze the received encrypted information, and at the same time, the decrypted The data is fed back to the user; 其中,步骤(3)中所述数据加密具体步骤如下:Among them, the specific steps of data encryption described in step (3) are as follows: Ⅰ:构建分数阶傅里叶多路传输复用器,并从加密记录表中提取数据长度,并依据其构建分数阶傅里叶多路传输复用器综合滤波器组;Ⅰ: Construct a fractional-order Fourier multiplexer, extract the data length from the encrypted record table, and construct a comprehensive filter bank for the fractional-order Fourier multiplexer based on it; Ⅱ:将传输数据导入分数阶傅里叶多路传输复用器综合滤波器组中,并对其进行调制处理生成复用信号;Ⅱ: Import the transmission data into the comprehensive filter bank of the fractional Fourier multiplexer, and modulate it to generate a multiplexed signal; Ⅲ:从加密记录表中提取发送时间信息,并依据发送时间信息进行时间单元倍数计算,其具体计算公式如下:III: Extract the sending time information from the encrypted record table, and calculate the time unit multiple based on the sending time information. The specific calculation formula is as follows: Ns=int(Ts/Tu) (1)N s =int(T s /T u ) (1) 其中,Ns代表发送时间单元倍数,Ts代表系统时间,Tu代表设定的时间单元的长度,int()为取整函数;Among them, N s represents the multiple of the sending time unit, T s represents the system time, Tu represents the length of the set time unit, and int() is the rounding function; Ⅳ:依据计算出的时间单元倍数对复用信号发送时间密钥信息进行确认,并将复用信号通过数据转换处理生成通信帧;IV: Confirm the multiplexed signal transmission time key information based on the calculated time unit multiple, and generate a communication frame through data conversion processing of the multiplexed signal; 步骤(4)中所述分析处理具体步骤如下:The specific steps of the analysis and processing described in step (4) are as follows: S1:当通信帧在传输过程中遭到外部攻击时,启动防火墙对攻击数据进行防御,并通过防火墙对攻击来源IP地址进行确认;S1: When the communication frame is attacked by an external attack during transmission, start the firewall to defend against the attack data, and confirm the attack source IP address through the firewall; S2:与GPS卫星进行通信连接,并抓取IP地址所在区域图像,同时将抓取到的真实地址反馈给工作人员,同时发送警报信息至相关单位进行处理;S2: Communicate with the GPS satellite and capture the image of the area where the IP address is located. At the same time, the captured real address is fed back to the staff, and alarm information is sent to relevant units for processing; S3:当防火墙无法阻挡外部数据入侵时,该防火墙会对通信帧进行数据更改或数据销毁处理,避免造成数据泄露,同时将处理信息反馈给工作人员。S3: When the firewall cannot block external data intrusion, the firewall will change or destroy data in the communication frame to avoid data leakage, and at the same time feed back the processing information to the staff. 2.根据权利要求1所述的一种基于分数阶傅里叶变换阶次复用的保密通信方法,其特征在于,步骤(2)中所述安全检测具体步骤如下:2. A secure communication method based on fractional Fourier transform order multiplexing according to claim 1, characterized in that the specific steps of security detection in step (2) are as follows: 第一步:对传输数据进行异常排查,若传输数据中存在异常信息,则将其反馈给用户,并停止后续传输过程;Step 1: Check for exceptions in the transmission data. If there is abnormal information in the transmission data, feedback it to the user and stop the subsequent transmission process; 第二步:若传输数据中不存在异常信息,传输模块检测传输数据中是否存在违规信息,若存在,则反馈用户“存在违规信息,无法传输”。Step 2: If there is no abnormal information in the transmitted data, the transmission module detects whether there is illegal information in the transmitted data. If it exists, it will feedback to the user that "there is illegal information and cannot be transmitted." 3.根据权利要求1所述的一种基于分数阶傅里叶变换阶次复用的保密通信方法,其特征在于,步骤(5)中所述解密分析具体步骤如下:3. A secure communication method based on fractional Fourier transform order multiplexing according to claim 1, characterized in that the specific steps of the decryption analysis in step (5) are as follows: P1:记录接收到通信帧的时间,并将其记录为接收时间,同时依据接收时间确认发送时间密钥信息;P1: Record the time when the communication frame is received, record it as the reception time, and confirm the sending time key information based on the reception time; P2:将通信帧导入分数阶傅里叶多路复用器中的分析滤波器组中进行数据转换处理生成输出信号矢量;P2: Import the communication frame into the analysis filter bank in the fractional Fourier multiplexer for data conversion processing to generate an output signal vector; P3:将各组输出信号矢量通过提取解密转换成输入信号矢量,并依据其进行传输数据恢复,同时将传输数据反馈给用户。P3: Convert each group of output signal vectors into input signal vectors through extraction and decryption, and restore the transmission data based on them, while feeding back the transmission data to the user.
CN202111235700.5A 2021-10-22 2021-10-22 Secret communication method based on fractional Fourier transform order multiplexing Active CN113992384B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111235700.5A CN113992384B (en) 2021-10-22 2021-10-22 Secret communication method based on fractional Fourier transform order multiplexing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111235700.5A CN113992384B (en) 2021-10-22 2021-10-22 Secret communication method based on fractional Fourier transform order multiplexing

Publications (2)

Publication Number Publication Date
CN113992384A CN113992384A (en) 2022-01-28
CN113992384B true CN113992384B (en) 2023-10-20

Family

ID=79740618

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111235700.5A Active CN113992384B (en) 2021-10-22 2021-10-22 Secret communication method based on fractional Fourier transform order multiplexing

Country Status (1)

Country Link
CN (1) CN113992384B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114826645B (en) * 2022-03-03 2024-04-16 深圳市迪讯飞科技有限公司 Method and terminal for real-time aggregation of multipath data
CN115984063A (en) * 2022-09-29 2023-04-18 河北数微信息技术有限公司 Community online security monitoring method and device, computer equipment and storage medium

Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101345616A (en) * 2008-08-15 2009-01-14 哈尔滨工业大学 Communication Encryption and Decryption Method Based on Multi-parameter Four-term Weighted Fractional Fourier Transform
CN101667911A (en) * 2009-09-25 2010-03-10 北京理工大学 Secret communication method based on fraction order Fourier transform order-multiplexing
CN102201914A (en) * 2011-07-14 2011-09-28 哈尔滨工业大学 Secret communication method based on multi-dimensional single/multi-parameter four-weighted fractional Fourier transform
CN103916238A (en) * 2014-04-01 2014-07-09 北京工业大学 Digital audio signal encryption/decryption method based on quanta
CN106102045A (en) * 2016-05-25 2016-11-09 赵京磊 A kind of secret communication method using Fourier Transform of Fractional Order
CN108768927A (en) * 2018-04-04 2018-11-06 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) Secret communication method and device
CN109088895A (en) * 2018-10-25 2018-12-25 苏州格目软件技术有限公司 A kind of working method positioning distributed network security attack system of defense
CN109391292A (en) * 2018-12-20 2019-02-26 哈尔滨工业大学 The collaborative transmission method of weighted score Fourier transform domain double slot diversities and multiplexing
CN109617676A (en) * 2018-11-15 2019-04-12 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) A password synchronization method and communication node
WO2019073232A1 (en) * 2017-10-11 2019-04-18 Data Border Ltd. A security system and method
CN110311898A (en) * 2019-06-13 2019-10-08 浙江工业大学 Man-in-the-middle attack detection method for networked CNC system based on Gaussian radial basis function classifier
CN110366181A (en) * 2019-07-29 2019-10-22 努比亚技术有限公司 Data transmission method, system and computer readable storage medium
CN111245804A (en) * 2020-01-06 2020-06-05 北京松果电子有限公司 Communication security testing method and device for terminal equipment and storage medium
CN210927991U (en) * 2019-12-05 2020-07-03 中鄂飞鹿科技有限责任公司 A low power and real-time LoRa network
CN111865996A (en) * 2020-07-24 2020-10-30 中国工商银行股份有限公司 Data detection method and device and electronic equipment
CN112016112A (en) * 2020-09-08 2020-12-01 中国人民解放军海军航空大学 Method for encrypting image by compounding Fourier transform and differential transform
CN112015985A (en) * 2020-08-25 2020-12-01 中国民航大学 A network information security supervision system based on computer communication
WO2021008028A1 (en) * 2019-07-18 2021-01-21 平安科技(深圳)有限公司 Network attack source tracing and protection method, electronic device and computer storage medium
CN112437094A (en) * 2020-12-04 2021-03-02 武汉华工赛百数据系统有限公司 Block chain-based network data evidence storage and management integrated service platform
CN112615865A (en) * 2020-12-21 2021-04-06 曹佳乐 Data anti-intrusion method based on big data and artificial intelligence and big data server
CN112910568A (en) * 2021-01-18 2021-06-04 猫岐智能科技(上海)有限公司 Data communication method, data sending method and data receiving method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9043861B2 (en) * 2007-09-17 2015-05-26 Ulrich Lang Method and system for managing security policies

Patent Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101345616A (en) * 2008-08-15 2009-01-14 哈尔滨工业大学 Communication Encryption and Decryption Method Based on Multi-parameter Four-term Weighted Fractional Fourier Transform
CN101667911A (en) * 2009-09-25 2010-03-10 北京理工大学 Secret communication method based on fraction order Fourier transform order-multiplexing
CN102201914A (en) * 2011-07-14 2011-09-28 哈尔滨工业大学 Secret communication method based on multi-dimensional single/multi-parameter four-weighted fractional Fourier transform
CN103916238A (en) * 2014-04-01 2014-07-09 北京工业大学 Digital audio signal encryption/decryption method based on quanta
CN106102045A (en) * 2016-05-25 2016-11-09 赵京磊 A kind of secret communication method using Fourier Transform of Fractional Order
WO2019073232A1 (en) * 2017-10-11 2019-04-18 Data Border Ltd. A security system and method
CN108768927A (en) * 2018-04-04 2018-11-06 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) Secret communication method and device
CN109088895A (en) * 2018-10-25 2018-12-25 苏州格目软件技术有限公司 A kind of working method positioning distributed network security attack system of defense
CN109617676A (en) * 2018-11-15 2019-04-12 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) A password synchronization method and communication node
CN109391292A (en) * 2018-12-20 2019-02-26 哈尔滨工业大学 The collaborative transmission method of weighted score Fourier transform domain double slot diversities and multiplexing
CN110311898A (en) * 2019-06-13 2019-10-08 浙江工业大学 Man-in-the-middle attack detection method for networked CNC system based on Gaussian radial basis function classifier
WO2021008028A1 (en) * 2019-07-18 2021-01-21 平安科技(深圳)有限公司 Network attack source tracing and protection method, electronic device and computer storage medium
CN110366181A (en) * 2019-07-29 2019-10-22 努比亚技术有限公司 Data transmission method, system and computer readable storage medium
CN210927991U (en) * 2019-12-05 2020-07-03 中鄂飞鹿科技有限责任公司 A low power and real-time LoRa network
CN111245804A (en) * 2020-01-06 2020-06-05 北京松果电子有限公司 Communication security testing method and device for terminal equipment and storage medium
CN111865996A (en) * 2020-07-24 2020-10-30 中国工商银行股份有限公司 Data detection method and device and electronic equipment
CN112015985A (en) * 2020-08-25 2020-12-01 中国民航大学 A network information security supervision system based on computer communication
CN112016112A (en) * 2020-09-08 2020-12-01 中国人民解放军海军航空大学 Method for encrypting image by compounding Fourier transform and differential transform
CN112437094A (en) * 2020-12-04 2021-03-02 武汉华工赛百数据系统有限公司 Block chain-based network data evidence storage and management integrated service platform
CN112615865A (en) * 2020-12-21 2021-04-06 曹佳乐 Data anti-intrusion method based on big data and artificial intelligence and big data server
CN112910568A (en) * 2021-01-18 2021-06-04 猫岐智能科技(上海)有限公司 Data communication method, data sending method and data receiving method

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
一种基于分数阶傅里叶变换的OFDM系统及其均衡算法;陈恩庆;陶然;张卫强;孟祥意;;电子学报(03);第409-414页 *
基于离散分数阶Fourier变换本征矢量分解的图像加密算法;田玉萍;;计算机应用与软件(02);第318-321、333页 *
小波包变换和加权分数阶傅里叶变换的通信应用对比分析;刘菁;魏雪缘;刘钊;徐瑞阳;;无线电通信技术(01);第18-23页 *
级联混沌对视频分数阶傅立叶域的加密;金建国;马刚;魏明军;;计算机工程与设计(08);第1995-2001页 *

Also Published As

Publication number Publication date
CN113992384A (en) 2022-01-28

Similar Documents

Publication Publication Date Title
CN113992384B (en) Secret communication method based on fractional Fourier transform order multiplexing
CN111274578A (en) Data safety protection system and method for video monitoring system
CN101350724A (en) An Encryption Method Based on Biometric Information
CN101442407A (en) Method and system for identification authentication using biology characteristics
CN101695038A (en) Method and device for detecting SSL enciphered data safety
CN111224995A (en) SSL/TLS network encryption communication information real-time decryption method based on memory analysis
CN111245783A (en) Isolated environment data transmission device and method based on digital encryption technology
CN107947937A (en) A kind of safe audio-video encryption system and terminal authentication implementation method
CN111698253A (en) Computer network safety system
CN113965396B (en) Data security communication system and method based on risk assessment
CN115499844A (en) Mobile terminal information safety protection system and method
CN112307875A (en) Face verification method and face verification system
US7920705B1 (en) System and method for convert channel detection
CN110473131A (en) Material evidence information saves trace to the source monitoring system and monitoring method from damage
CN114357418A (en) Encryption authentication method, system, terminal device, server and storage medium
CN114547589A (en) Privacy-protecting user registration and user authentication method and device
Han et al. The privacy protection framework for biometric information in network based CCTV environment
Khalid et al. Cloud server security using bio-cryptography
CN112637172A (en) Novel data security and confidentiality method
CN115776413B (en) Iris encryption-based data transmission method and system
CN111010491A (en) Image data transmission method, device and system based on hiding technology
KR101754519B1 (en) Keyboard secure system and method for protecting data input via keyboard using one time key
CN115659359A (en) Business system access active auditing method and system
CN115118446A (en) Data security control method and system
CN115221546A (en) Safety data processing method and device for burning after use

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant