Please wait a minute...
 首页  期刊介绍 期刊订阅 联系我们 横山亮次奖 百年刊庆
 
最新录用  |  预出版  |  当期目录  |  过刊浏览  |  阅读排行  |  下载排行  |  引用排行  |  横山亮次奖  |  百年刊庆
清华大学学报(自然科学版)  2019, Vol. 59 Issue (2): 154-161    DOI: 10.16511/j.cnki.qhdxxb.2018.25.053
  计算机科学与技术 本期目录 | 过刊浏览 | 高级检索 |
基于改进祖冲之算法的安全跳频通信系统
王潮1, 霍振坤1, 刘鹏程2, 刘瑞3, 张焕国4
1. 上海大学 特种光纤与光接入网重点实验室, 特种光纤与先进通信国际合作联合实验室, 上海先进通信与数据科学研究院, 上海 200444;
2. 上海华为技术有限公司, 上海 201206;
3. 公安部第三研究所, 上海 200031;
4. 武汉大学 计算机学院, 武汉 430072
Security frequency hopping communication system based on an improved ZUC algorithm
WANG Chao1, HUO Zhenkun1, LIU Pengcheng2, LIU Rui3, ZHANG Huanguo4
1. China Key laboratory of Specialty Fiber Optics and Optical Access Networks, Joint International Research Laboratory of Specialty Fiber Optics and Advanced Communication, Shanghai Institute for Advanced Communication and Data Science, Shanghai University, Shanghai 200444, China;
2. Shanghai HUAWEI Technology Co., Ltd, Shanghai 201206, China;
3. The Third Research Institute of the Ministry of Public Security, Shanghai 200031, China;
4. School of Computer Science, Wuhan University, Wuhan 430072, China
全文: PDF(2283 KB)  
输出: BibTeX | EndNote (RIS)      
摘要 跳频通信具有良好的抗干扰和抗拦截特性,因此被广泛地应用于很多通信系统中。密码算法的引入可以增强跳频序列的安全性。该文在祖冲之算法3层结构的基础上,对其进行适当的改进,在第1层引入置换多项式方法来增加序列的线性复杂度,并且将第3层替换为演化DES密码算法来增加安全性,进而提出了基于改进ZUC算法的跳频通信系统实现方案。对本方案所产生的跳频序列进行了多种安全性以及随机性测试,实验结果表明:汉明相关性、随机性和动态局部线性复杂度表现良好,并且通过了NIST随机性测试,而后通过Simulink仿真验证了其可行性。
服务
把本文推荐给朋友
加入引用管理器
E-mail Alert
RSS
作者相关文章
王潮
霍振坤
刘鹏程
刘瑞
张焕国
关键词 跳频通信祖冲之算法演化DES密码NIST测试    
Abstract:Frequency hopping is an important anti-jamming and anti-interception technique that is widely used in communication systems. Frequency hopping is then combined with cryptographic algorithms to offer better security. This paper presents a frequency hopping communication system based on an optimized ZUC algorithm with three layers. The introduction of a permutation polynomial in the top layer increases the linear complexity while the evolutionary DES algorithm in the bottom layer achieves high security of the sequences. Security and randomness tests show that the resultant sequences have good hamming correlations, randomness, and linear complexity and pass the NIST test as well. Finally, the system was successfully implemented in the Simulink system.
Key wordsfrequency hopping    ZUC algorithm    evolutionary DES algorithm    NIST test
收稿日期: 2018-06-04      出版日期: 2019-02-16
基金资助:国家自然科学基金资助项目(61332019,61572304)
引用本文:   
王潮, 霍振坤, 刘鹏程, 刘瑞, 张焕国. 基于改进祖冲之算法的安全跳频通信系统[J]. 清华大学学报(自然科学版), 2019, 59(2): 154-161.
WANG Chao, HUO Zhenkun, LIU Pengcheng, LIU Rui, ZHANG Huanguo. Security frequency hopping communication system based on an improved ZUC algorithm. Journal of Tsinghua University(Science and Technology), 2019, 59(2): 154-161.
链接本文:  
http://jst.tsinghuajournals.com/CN/10.16511/j.cnki.qhdxxb.2018.25.053  或          http://jst.tsinghuajournals.com/CN/Y2019/V59/I2/154
  图1 S盒的演化策略
  表1 差分特性对比
  表2 线性特性对比
  图2 ZUC算法整体结构图
  图3 改进 ZUC算法结构图
  图4 跳频通信系统仿真模型
  图5 跳频通信系统各仿真波形
  图6 两个64元序列的汉明相关性
  图7 跳频图案
  表3 8条64元跳频序列的统计测试结果
  图8 序列1的动态线性与局部动态线性复杂度曲线
  表4 跳频序列 NIST测试结果
  图9 信噪比误码率关系曲线
[1] OJHA P, GUPTA S K. A study on security issues related to wireless communication[J]. International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, 2015, 4(8):6956-6958.
[2] SO J, KIM Y. Interference-aware frequency hopping for Bluetooth in crowded Wi-Fi networks[J]. Electronics Letters, 2016, 52(17):1503-1505.
[3] GHATE N R, KALE K V. Smart home safety device using frequency hopping approach based on GSM generation[C]//Proceedings of the 1st International Conference on Intelligent Systems and Information Management. Aurangabad, India:IEEE, 2017:341-347.
[4] 梅文华. 跳频序列设计[M]. 北京:国防工业出版社, 2016. MEI W H. Frequency hopping sequences design[M]. Beijing:National Defense Industry Press, 2016. (in Chinese)
[5] 张超, 庄奕琪, 李振荣, 等. 基于AES跳频算法的蓝牙WPAN网络数据传输性能[J]. 吉林大学学报(工学版), 2010, 40(2):576-580. ZHANG C, ZHUANG Y Q, LI Z R, et al. Bluetooth WPAN throughput based on AES frequency-hopping algorithm[J]. Journal of Jilin University (Engineering and Technology Edition), 2010, 40(2):576-580. (in Chinese)
[6] 王克达, 刘瑞, 胡风, 等. 基于演化密码的安全跳频序列研究[J]. 微型电脑应用, 2015, 31(10):1-4. WANG K D, LIU R, HU F, et al. Study on safe frequency hopping sequence, based on evolutionary cryptosystem[J]. Microcomputer Applications, 2015, 31(10):1-4. (in Chinese)
[7] WANG C, ZHANG H G, LIU L L. Evolutionary cryptography theory based generating method for a secure Koblitz elliptic curve and its improvement by a hidden Markov models[J]. Science China Information Sciences, 2012, 55(4):911-920.
[8] 张焕国, 冯秀涛, 覃中平, 等. 演化密码与DES密码的演化设计[J]. 通信学报, 2002, 23(5):57-64. ZHANG H G, FENG X T, QIN Z P, et al. Evolutionary cryptosystems and evolutionary design for DES[J]. Journal of China Institute of Communications, 2002, 23(5):57-64. (in Chinese)
[9] SÁ SOUSA J, VILELA J P. A characterization of uncoordinated frequency hopping for wireless secrecy[C]//Proceedings of the 7th IFIP Wireless and Mobile Networking Conference. Vilamoura, Portugal:IEEE, 2014:1-4.
[10] FENG G L, TZENG K K. A generalization of the Berlekamp-Massey algorithm for multisequence shift-register synthesis with applications to decoding cyclic codes[J]. IEEE Transactions on Information Theory, 1991, 37(5):1274-1287.
[11] DING C S, YIN J X. Sets of optimal frequency-hopping sequences[J]. IEEE Transactions on Information Theory, 2008, 54(8):3741-3745.
[12] 高军涛, 胡予濮, 李雪莲, 等. 两类最优跳频序列集的线性复杂度[J]. 通信学报, 2012, 33(2):175-181. GAO J T, HU Y P, LI X L, et al. Linear complexity of two classes of optimal sets frequency-hopping sequences[J]. Journal on Communications, 2012, 33(2):175-181. (in Chinese)
[13] 汤任君, 段竞哲, 邓洪敏. Logistic混沌序列和DES算法的图像加密方法[J]. 计算机应用, 2017, 37(S1):89-92. TANG R J, DUAN J Z, DENG H M. Image encryption algorithm based on Logistic chaotic sequence and DES[J]. Journal of Computer Applications, 2017, 37(S1):89-92. (in Chinese)
[14] 冯秀涛. 祖冲之序列密码算法[J]. 信息安全研究, 2016, 2(11):1028-1041. FENG X T. The ZUC stream cipher algorithm[J]. Journal of Information Security Research, 2016, 2(11):1028-1041. (in Chinese)
[15] UZ ZAMAN J K M S, GHOSH R. Review on fifteen statistical tests proposed by NIST[J]. Journal of Theoretical Physics & Cryptography, 2012, 1:18-31.
No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
版权所有 © 《清华大学学报(自然科学版)》编辑部
本系统由北京玛格泰克科技发展有限公司设计开发 技术支持:support@magtech.com.cn