Security frequency hopping communication system based on an improved ZUC algorithm
WANG Chao1, HUO Zhenkun1, LIU Pengcheng2, LIU Rui3, ZHANG Huanguo4
1. China Key laboratory of Specialty Fiber Optics and Optical Access Networks, Joint International Research Laboratory of Specialty Fiber Optics and Advanced Communication, Shanghai Institute for Advanced Communication and Data Science, Shanghai University, Shanghai 200444, China; 2. Shanghai HUAWEI Technology Co., Ltd, Shanghai 201206, China; 3. The Third Research Institute of the Ministry of Public Security, Shanghai 200031, China; 4. School of Computer Science, Wuhan University, Wuhan 430072, China
Abstract:Frequency hopping is an important anti-jamming and anti-interception technique that is widely used in communication systems. Frequency hopping is then combined with cryptographic algorithms to offer better security. This paper presents a frequency hopping communication system based on an optimized ZUC algorithm with three layers. The introduction of a permutation polynomial in the top layer increases the linear complexity while the evolutionary DES algorithm in the bottom layer achieves high security of the sequences. Security and randomness tests show that the resultant sequences have good hamming correlations, randomness, and linear complexity and pass the NIST test as well. Finally, the system was successfully implemented in the Simulink system.
王潮, 霍振坤, 刘鹏程, 刘瑞, 张焕国. 基于改进祖冲之算法的安全跳频通信系统[J]. 清华大学学报(自然科学版), 2019, 59(2): 154-161.
WANG Chao, HUO Zhenkun, LIU Pengcheng, LIU Rui, ZHANG Huanguo. Security frequency hopping communication system based on an improved ZUC algorithm. Journal of Tsinghua University(Science and Technology), 2019, 59(2): 154-161.
[1] OJHA P, GUPTA S K. A study on security issues related to wireless communication[J]. International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, 2015, 4(8):6956-6958. [2] SO J, KIM Y. Interference-aware frequency hopping for Bluetooth in crowded Wi-Fi networks[J]. Electronics Letters, 2016, 52(17):1503-1505. [3] GHATE N R, KALE K V. Smart home safety device using frequency hopping approach based on GSM generation[C]//Proceedings of the 1st International Conference on Intelligent Systems and Information Management. Aurangabad, India:IEEE, 2017:341-347. [4] 梅文华. 跳频序列设计[M]. 北京:国防工业出版社, 2016. MEI W H. Frequency hopping sequences design[M]. Beijing:National Defense Industry Press, 2016. (in Chinese) [5] 张超, 庄奕琪, 李振荣, 等. 基于AES跳频算法的蓝牙WPAN网络数据传输性能[J]. 吉林大学学报(工学版), 2010, 40(2):576-580. ZHANG C, ZHUANG Y Q, LI Z R, et al. Bluetooth WPAN throughput based on AES frequency-hopping algorithm[J]. Journal of Jilin University (Engineering and Technology Edition), 2010, 40(2):576-580. (in Chinese) [6] 王克达, 刘瑞, 胡风, 等. 基于演化密码的安全跳频序列研究[J]. 微型电脑应用, 2015, 31(10):1-4. WANG K D, LIU R, HU F, et al. Study on safe frequency hopping sequence, based on evolutionary cryptosystem[J]. Microcomputer Applications, 2015, 31(10):1-4. (in Chinese) [7] WANG C, ZHANG H G, LIU L L. Evolutionary cryptography theory based generating method for a secure Koblitz elliptic curve and its improvement by a hidden Markov models[J]. Science China Information Sciences, 2012, 55(4):911-920. [8] 张焕国, 冯秀涛, 覃中平, 等. 演化密码与DES密码的演化设计[J]. 通信学报, 2002, 23(5):57-64. ZHANG H G, FENG X T, QIN Z P, et al. Evolutionary cryptosystems and evolutionary design for DES[J]. Journal of China Institute of Communications, 2002, 23(5):57-64. (in Chinese) [9] SÁ SOUSA J, VILELA J P. A characterization of uncoordinated frequency hopping for wireless secrecy[C]//Proceedings of the 7th IFIP Wireless and Mobile Networking Conference. Vilamoura, Portugal:IEEE, 2014:1-4. [10] FENG G L, TZENG K K. A generalization of the Berlekamp-Massey algorithm for multisequence shift-register synthesis with applications to decoding cyclic codes[J]. IEEE Transactions on Information Theory, 1991, 37(5):1274-1287. [11] DING C S, YIN J X. Sets of optimal frequency-hopping sequences[J]. IEEE Transactions on Information Theory, 2008, 54(8):3741-3745. [12] 高军涛, 胡予濮, 李雪莲, 等. 两类最优跳频序列集的线性复杂度[J]. 通信学报, 2012, 33(2):175-181. GAO J T, HU Y P, LI X L, et al. Linear complexity of two classes of optimal sets frequency-hopping sequences[J]. Journal on Communications, 2012, 33(2):175-181. (in Chinese) [13] 汤任君, 段竞哲, 邓洪敏. Logistic混沌序列和DES算法的图像加密方法[J]. 计算机应用, 2017, 37(S1):89-92. TANG R J, DUAN J Z, DENG H M. Image encryption algorithm based on Logistic chaotic sequence and DES[J]. Journal of Computer Applications, 2017, 37(S1):89-92. (in Chinese) [14] 冯秀涛. 祖冲之序列密码算法[J]. 信息安全研究, 2016, 2(11):1028-1041. FENG X T. The ZUC stream cipher algorithm[J]. Journal of Information Security Research, 2016, 2(11):1028-1041. (in Chinese) [15] UZ ZAMAN J K M S, GHOSH R. Review on fifteen statistical tests proposed by NIST[J]. Journal of Theoretical Physics & Cryptography, 2012, 1:18-31.