Please wait a minute...
 首页  期刊介绍 期刊订阅 联系我们
 
最新录用  |  预出版  |  当期目录  |  过刊浏览  |  阅读排行  |  下载排行  |  引用排行  |  百年期刊
Journal of Tsinghua University(Science and Technology)    2019, Vol. 59 Issue (2) : 154-161     DOI: 10.16511/j.cnki.qhdxxb.2018.25.053
COMPUTER SCIENCE AND TECHNOLOGY |
Security frequency hopping communication system based on an improved ZUC algorithm
WANG Chao1, HUO Zhenkun1, LIU Pengcheng2, LIU Rui3, ZHANG Huanguo4
1. China Key laboratory of Specialty Fiber Optics and Optical Access Networks, Joint International Research Laboratory of Specialty Fiber Optics and Advanced Communication, Shanghai Institute for Advanced Communication and Data Science, Shanghai University, Shanghai 200444, China;
2. Shanghai HUAWEI Technology Co., Ltd, Shanghai 201206, China;
3. The Third Research Institute of the Ministry of Public Security, Shanghai 200031, China;
4. School of Computer Science, Wuhan University, Wuhan 430072, China
Download: PDF(2283 KB)  
Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks    
Abstract  Frequency hopping is an important anti-jamming and anti-interception technique that is widely used in communication systems. Frequency hopping is then combined with cryptographic algorithms to offer better security. This paper presents a frequency hopping communication system based on an optimized ZUC algorithm with three layers. The introduction of a permutation polynomial in the top layer increases the linear complexity while the evolutionary DES algorithm in the bottom layer achieves high security of the sequences. Security and randomness tests show that the resultant sequences have good hamming correlations, randomness, and linear complexity and pass the NIST test as well. Finally, the system was successfully implemented in the Simulink system.
Keywords frequency hopping      ZUC algorithm      evolutionary DES algorithm      NIST test     
Issue Date: 16 February 2019
Service
E-mail this article
E-mail Alert
RSS
Articles by authors
WANG Chao
HUO Zhenkun
LIU Pengcheng
LIU Rui
ZHANG Huanguo
Cite this article:   
WANG Chao,HUO Zhenkun,LIU Pengcheng, et al. Security frequency hopping communication system based on an improved ZUC algorithm[J]. Journal of Tsinghua University(Science and Technology), 2019, 59(2): 154-161.
URL:  
http://jst.tsinghuajournals.com/EN/10.16511/j.cnki.qhdxxb.2018.25.053     OR     http://jst.tsinghuajournals.com/EN/Y2019/V59/I2/154
  
  
  
  
  
  
  
  
  
  
  
  
  
[1] OJHA P, GUPTA S K. A study on security issues related to wireless communication[J]. International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, 2015, 4(8):6956-6958.
[2] SO J, KIM Y. Interference-aware frequency hopping for Bluetooth in crowded Wi-Fi networks[J]. Electronics Letters, 2016, 52(17):1503-1505.
[3] GHATE N R, KALE K V. Smart home safety device using frequency hopping approach based on GSM generation[C]//Proceedings of the 1st International Conference on Intelligent Systems and Information Management. Aurangabad, India:IEEE, 2017:341-347.
[4] 梅文华. 跳频序列设计[M]. 北京:国防工业出版社, 2016. MEI W H. Frequency hopping sequences design[M]. Beijing:National Defense Industry Press, 2016. (in Chinese)
[5] 张超, 庄奕琪, 李振荣, 等. 基于AES跳频算法的蓝牙WPAN网络数据传输性能[J]. 吉林大学学报(工学版), 2010, 40(2):576-580. ZHANG C, ZHUANG Y Q, LI Z R, et al. Bluetooth WPAN throughput based on AES frequency-hopping algorithm[J]. Journal of Jilin University (Engineering and Technology Edition), 2010, 40(2):576-580. (in Chinese)
[6] 王克达, 刘瑞, 胡风, 等. 基于演化密码的安全跳频序列研究[J]. 微型电脑应用, 2015, 31(10):1-4. WANG K D, LIU R, HU F, et al. Study on safe frequency hopping sequence, based on evolutionary cryptosystem[J]. Microcomputer Applications, 2015, 31(10):1-4. (in Chinese)
[7] WANG C, ZHANG H G, LIU L L. Evolutionary cryptography theory based generating method for a secure Koblitz elliptic curve and its improvement by a hidden Markov models[J]. Science China Information Sciences, 2012, 55(4):911-920.
[8] 张焕国, 冯秀涛, 覃中平, 等. 演化密码与DES密码的演化设计[J]. 通信学报, 2002, 23(5):57-64. ZHANG H G, FENG X T, QIN Z P, et al. Evolutionary cryptosystems and evolutionary design for DES[J]. Journal of China Institute of Communications, 2002, 23(5):57-64. (in Chinese)
[9] SÁ SOUSA J, VILELA J P. A characterization of uncoordinated frequency hopping for wireless secrecy[C]//Proceedings of the 7th IFIP Wireless and Mobile Networking Conference. Vilamoura, Portugal:IEEE, 2014:1-4.
[10] FENG G L, TZENG K K. A generalization of the Berlekamp-Massey algorithm for multisequence shift-register synthesis with applications to decoding cyclic codes[J]. IEEE Transactions on Information Theory, 1991, 37(5):1274-1287.
[11] DING C S, YIN J X. Sets of optimal frequency-hopping sequences[J]. IEEE Transactions on Information Theory, 2008, 54(8):3741-3745.
[12] 高军涛, 胡予濮, 李雪莲, 等. 两类最优跳频序列集的线性复杂度[J]. 通信学报, 2012, 33(2):175-181. GAO J T, HU Y P, LI X L, et al. Linear complexity of two classes of optimal sets frequency-hopping sequences[J]. Journal on Communications, 2012, 33(2):175-181. (in Chinese)
[13] 汤任君, 段竞哲, 邓洪敏. Logistic混沌序列和DES算法的图像加密方法[J]. 计算机应用, 2017, 37(S1):89-92. TANG R J, DUAN J Z, DENG H M. Image encryption algorithm based on Logistic chaotic sequence and DES[J]. Journal of Computer Applications, 2017, 37(S1):89-92. (in Chinese)
[14] 冯秀涛. 祖冲之序列密码算法[J]. 信息安全研究, 2016, 2(11):1028-1041. FENG X T. The ZUC stream cipher algorithm[J]. Journal of Information Security Research, 2016, 2(11):1028-1041. (in Chinese)
[15] UZ ZAMAN J K M S, GHOSH R. Review on fifteen statistical tests proposed by NIST[J]. Journal of Theoretical Physics & Cryptography, 2012, 1:18-31.
[1] REN Yinpeng, NI Zuyao, KUANG Linling, WU Sheng, LU Jianhua. Anti partial-band noise jamming interleaved hybrid spread spectrum system design and capacity analysis[J]. Journal of Tsinghua University(Science and Technology), 2015, 55(8): 866-872.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
Copyright © Journal of Tsinghua University(Science and Technology), All Rights Reserved.
Powered by Beijing Magtech Co. Ltd