Constellation Encryption Design Based on Chaotic Sequence and the RSA Algorithm
Abstract
:1. Introduction
- The parameters transmitted by the asymmetric RSA algorithm directly affect the generation of the chaotic sequence, which increases the flexibility and security of the chaotic sequence as a secret sequence.
- The constellation encryption is directly performed using the secret sequence, so that the points on the constellation are not in the real position. In this process, the amplitude and phase of the constellation are not processed so that a better demodulation signal performance can be achieved, even under the conditions of a low signal-to-noise ratio.
- Using the secret sequence to directly encrypt the constellation, the obtained constellation diagram has the same shape as the unencrypted constellation diagram, so the illegal receiver cannot observe the constellation encryption from the constellation diagram, which improves the interception resistance of the satellite communication.
2. Theoretical Content
2.1. Typical Chaotic Map
2.2. RSA Algorithm
2.2.1. The Process of RSA Algorithm
- (1)
- Arbitrarily choose two different prime numbers p and q to calculate the product , .
- (2)
- An integer e is arbitrarily selected, which must satisfy and , and the integer e is used as the encryption key.
- (3)
- Determine the decryption key d and satisfy .
- (4)
- The integers n and e are made public, and d is kept secret.
- (5)
- Encrypt plaintext m (m is an integer) into ciphertext c, use public key (n,e) for encryption, and encrypt algorithm .
- (6)
- Decrypt ciphertext c into plaintext m, use private key (n,d) for decryption, and decrypt algorithm (provided in Appendix A).
2.2.2. Security of RSA Algorithm
3. The Proposed Design Method
3.1. Design Thinking
3.2. Specific Design Steps
3.2.1. Sender Encryption Steps
- A.
- B.
- C.
3.2.2. Receiver Encryption Steps
- A.
- B.
- C.
- D.
4. Experimental Simulation 7
4.1. Initial Value Sensitivity
4.2. Chaos of System Parameters
4.3. Constellation Diagram Comparison before and after Encryption
4.4. System Reliability
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Appendix A
References
- Gao, Y.; Ao, H.; Zhou, Q.; Feng, Z.; Zhou, W.; Li, Y.; Li, X. Modeling of satellite communication systems design with physical layer security. In Proceedings of the 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, 22–24 March 2017; pp. 1680–1683. [Google Scholar] [CrossRef]
- Yuxuan, G.; Yue, L.; Penghui, S. Research Status of Typical Satellite Communication Systems. In Proceedings of the 2021 19th International Conference on Optical Communications and Networks (ICOCN), Qufu, China, 23–27 August 2021; pp. 1–3. [Google Scholar] [CrossRef]
- You, L.; Li, K.-X.; Wang, J.; Gao, X.; Xia, X.-G.; Ottersten, B. Massive MIMO Transmission for LEO Satellite Communications. IEEE J. Sel. Areas Commun. 2020, 38, 1851–1865. [Google Scholar] [CrossRef]
- Hou, Y.; Chen, Y.; Wang, Z.; Xiang, H. Research on Dynamic Assignment of Satellite Communication Tasks Based on GA Algorithm. In Proceedings of the 2020 IEEE 5th Information Technology and Mechatronics Engineering Conference (ITOEC), Chongqing, China, 12–14 June 2020; pp. 1052–1055. [Google Scholar] [CrossRef]
- Wei, L.; Mingfeng, L.; Yanyan, H. A high reliable satellite communication for emergency communications. In Proceedings of the IET International Conference on Communication Technology and Application (ICCTA 2011), Beijing, China, 14–16 October 2011; pp. 811–814. [Google Scholar] [CrossRef]
- Saunders, C. The role of small satellites in military communications. In Proceedings of the IET Seminar on Military Satellite Communications 2013 (Milsatcoms 2013), London, UK, 14 June 2013; pp. 1–13. [Google Scholar] [CrossRef]
- Liang, C.; Zhang, Q.; Ma, J.; Li, K. Research on neural network chaotic encryption algorithm in wireless network security communication. EURASIP J. Wirel. Commun. Netw. 2019, 2019, 1–10. [Google Scholar] [CrossRef] [Green Version]
- Gao, Y.; Ao, H.; Feng, Z.; Zhou, W.; Hu, S.; Li, X. Modeling and Practise of Satellite Communication Systems Using Physical Layer Security: A Survey. In Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), Guangzhou, China, 21–24 July 2017; pp. 829–832. [Google Scholar] [CrossRef]
- Zheng, G.; Arapoglou, P.-D.; Ottersten, B. Physical Layer Security in Multibeam Satellite Systems. IEEE Trans. Wirel. Commun. 2012, 11, 852–863. [Google Scholar] [CrossRef]
- Li, W.; Mclernon, D.; Wong, K.-K.; Wang, S.; Lei, J.; Zaidi, S.A.R. Asymmetric Physical Layer Encryption for Wireless Communications. IEEE Access 2019, 7, 46959–46967. [Google Scholar] [CrossRef]
- Pfeiffer, J.; Fischer, R.F.H. Multilevel Coding for Physical-Layer Security. IEEE Trans. Commun. 2022, 70, 1999–2009. [Google Scholar] [CrossRef]
- Li, W.; Mclernon, D.; Lei, J.; Ghogho, M.; Zaidi, S.A.R.; Hui, H. Cryptographic Primitives and Design Frameworks of Physical Layer Encryption for Wireless Communications. IEEE Access 2019, 7, 63660–63673. [Google Scholar] [CrossRef]
- Hoseini, S.A.; Bouhafs, F.; den Hartog, F. A Practical Implementation of Physical Layer Security in Wireless Networks. In Proceedings of the 2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 8–11 January 2022; pp. 1–4. [Google Scholar] [CrossRef]
- Xu, H.; Sun, L. Encryption Over the Air: Securing Two-Way Untrusted Relaying Systems Through Constellation Overlapping. IEEE Trans. Wirel. Commun. 2018, 17, 8268–8282. [Google Scholar] [CrossRef]
- Han, S.; Li, J.; Meng, W.; Guizani, M.; Sun, S. Challenges of Physical Layer Security in a Satellite-Terrestrial Network. IEEE Netw. 2022, 36, 98–104. [Google Scholar] [CrossRef]
- Quyen, N.X.; Duong, T.Q.; Vo, N.S.; Xie, Q.; Shu, L. Chaotic direct-sequence spread-spectrum with variable symbol period: A technique for enhancing physical layer security. Comput. Netw. 2016, 109, 4–12. [Google Scholar] [CrossRef]
- Sedaghatnejad, S.; Farhang, M. Detectability of Chaotic Direct-Sequence Spread-Spectrum Signals. IEEE Wirel. Commun. Lett. 2015, 4, 589–592. [Google Scholar] [CrossRef]
- Wang, X.; Li, Z.; Zhang, Q.; Pan, X.; Gao, R.; Xin, X.; Yao, H.; Tian, F.; Tian, Q.; Wang, Y. Chaotic physical layer encryption scheme based on phase ambiguity for a DMT system. Opt. Express 2022, 30, 14782–14797. [Google Scholar] [CrossRef] [PubMed]
- Sultan, A.; Yang, X.; Hajomer, A.A.E.; Hussain, S.B.; Hu, W. Dynamic QAM Mapping for Physical-Layer Security Using Digital Chaos. IEEE Access 2018, 6, 47199–47205. [Google Scholar] [CrossRef]
- Zhang, X.; Zhang, B.; Guo, D. Physical Layer Secure Transmission Based on Fast Dual Polarization Hopping in Fixed Satellite Communication. IEEE Access 2017, 5, 11782–11790. [Google Scholar] [CrossRef]
- Luo, Z.; Wang, H.; Zhou, K.; Lv, W. Combined Constellation Rotation With Weighted FRFT for Secure Transmission in Polarization Modulation Based Dual-Polarized Satellite Communications. IEEE Access 2017, 5, 27061–27073. [Google Scholar] [CrossRef]
- Sultan, A.; Yang, X.; Hajomer, A.A.E.; Hu, W. Chaotic Constellation Mapping for Physical-Layer Data Encryption in OFDM-PON. IEEE Photonics Technol. Lett. 2018, 30, 339–342. [Google Scholar] [CrossRef]
- Vidhya, E.; Sivabalan, S.; Rathipriya, R. Hybrid Key Generation for RSA and ECC. In Proceedings of the 2019 International Conference on Communication and Electronics Systems (ICCES), Coimbatore, India, 15–16 November 2019; pp. 35–40. [Google Scholar] [CrossRef]
- Yue, P.; Guodong, L.; Jing, Z. Based on the Improved RSA Keys and Compound Chaotic System and Design of Audio Encryption Algorithm. In Proceedings of the 2016 International Conference on Smart City and Systems Engineering (ICSCSE), Hunan, China, 25–26 November 2016; pp. 197–201. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Quan, M.; Jin, Q.; Ba, B.; Zhang, J.; Jian, C. Constellation Encryption Design Based on Chaotic Sequence and the RSA Algorithm. Electronics 2022, 11, 3346. https://doi.org/10.3390/electronics11203346
Quan M, Jin Q, Ba B, Zhang J, Jian C. Constellation Encryption Design Based on Chaotic Sequence and the RSA Algorithm. Electronics. 2022; 11(20):3346. https://doi.org/10.3390/electronics11203346
Chicago/Turabian StyleQuan, Mengjiao, Qiang Jin, Bin Ba, Jin Zhang, and Chunxiao Jian. 2022. "Constellation Encryption Design Based on Chaotic Sequence and the RSA Algorithm" Electronics 11, no. 20: 3346. https://doi.org/10.3390/electronics11203346
APA StyleQuan, M., Jin, Q., Ba, B., Zhang, J., & Jian, C. (2022). Constellation Encryption Design Based on Chaotic Sequence and the RSA Algorithm. Electronics, 11(20), 3346. https://doi.org/10.3390/electronics11203346