Patent classifications
H04L9/001
VEHICLE BUS MESSAGE AUTHENTICATION USING WATERMARKING
An electronic control unit comprises circuitry to receive a combined signal via a vehicle bus of a vehicle, wherein the combined signal contains a combination of a data signal and a watermark signal, which can be a radio frequency (RF) signal or an analog baseband signal, wherein the data signal includes a message, circuitry to extract a watermark from the watermark signal, circuitry to verify the watermark based on a comparison of the watermark with a pre-defined watermark, circuitry to extract the data signal from the combined signal and obtain the message from the data signal, and circuitry to authenticate the message based on the verification of the watermark.
Differential chaos shift keying communication method and system based on hybrid index
A differential chaos shift keying communication method based on hybrid index, including: modulating a transmitted signal based on the hybrid index; and demodulating a received signal based on the hybrid index. The hybrid index is a hybrid index bit, which includes a carrier index bit and a carrier number index bit. This application also provides a system for implementing the differential chaos shift keying communication method, which includes a transmitter and a receiver.
METHOD FOR GUARANTEEING RELIABILITY OF REAL-TIME SCRAMBLING AND MESSAGE TRANSMISSION BY TRAIN CONTROL CENTER SYSTEM
The invention relates to a method for guaranteeing the reliability of real-time scrambling and message transmission by a train control center system. The method comprises the following steps: S1, starting the system for offline message loading and reading; S2, obtaining message data to be scrambled; S3, sending the message to be scrambled to a scrambling operation board for scrambling; S4, performing inverse decoding processing on an operation board; S5, performing comparison after decoding; and S6, outputting effective message data. Compared with the prior art, the invention has the advantages of being capable of guaranteeing the safety and reliability of message data.
Encryption method and system using a random bit string encryption key
Methods and systems for encrypting data are disclosed. A circuit uses a white noise generator to capture a random string of bits as an encryption key. The encryption key is generated at a central server and is provided to a subscriber on a physical memory device. The subscriber uses the encryption key to encrypt a source data file. The encrypted data file is sent to the central server, which uses the encryption key to decrypt the encrypted data file and to recover the source data file. The file name for the source data file may be encrypted into the encrypted data file and a new name assigned to the encrypted data file. A random number index may be used to identify the starting point of the encrypted file.
TAP-DOMAIN SECRET-KEY GENERATION
Methods, systems, and devices for wireless communications are described. A wireless device may receive reference signals from another wireless device over a channel between the devices. The wireless device may perform channel estimation based on the reference signals to determine multiple taps. The wireless device may receive a message from the other wireless device indicating one or more taps to be selected to obtain a secret key for encrypting a message. The wireless device may select the taps based on the indication and communicate one or more encrypted messages with the other wireless device. For example, the wireless device may receive encrypted messages, transmit encrypted messages, or both.
Physically unclonable functions using pulse width chaotic maps
Technologies are provided for clockless physically unclonable functions (PUFs) in reconfigurable devices. Embodiments of the disclosed technologies include processing circuitry configured to perform numerous operations. The operations can include receiving a challenge continuous pulse signal, and generating a response continuous pulse signal by iteratively extending the challenge continuous pulse signal in time-domain. In some configurations, the iteratively extending includes generating a next continuous pulse signal by operating on a prior continuous pulse signal according to a stretching function, and generating a second next continuous pulse width signal by operating on the next continuous pulse signal according to a folding function.
COMMUNICATION SYSTEM AND METHOD USING UNITARY BRAID DIVISIONAL MULTIPLEXING (UBDM) WITH PHYSICAL LAYER SECURITY
A system includes first and second sets of communication devices. A processor coupled to the first set of communication devices produces a first encoded vector and transmits the first encoded vector to the second set of communication devices via a communication channel that applies a channel transformation to the first encoded vector during transmission. A processor coupled to the second set of communication devices receives the transformed signal, detects an effective channel thereof, and identifies left and right singular vectors of the effective channel. A precoding matrix is selected from a codebook of unitary matrices based on a message, and a second encoded vector is produced based on a second known vector, the precoding matrix, a complex conjugate of the left singular vectors, and the right singular vectors. The second encoded vector is sent to the first set of communication devices for identification of the message.
PHYSICALLY UNCLONABLE FUNCTIONS USING PULSE WIDTH CHAOTIC MAPS
Technologies are provided for clockless physically unclonable functions (PUFs) in reconfigurable devices. Embodiments of the disclosed technologies include processing circuitry configured to perform numerous operations. The operations can include receiving a challenge continuous pulse signal, and generating a response continuous pulse signal by iteratively extending the challenge continuous pulse signal in time-domain. In some configurations, the iteratively extending includes generating a next continuous pulse signal by operating on a prior continuous pulse signal according to a stretching function, and generating a second next continuous pulse width signal by operating on the next continuous pulse signal according to a folding function.
RATE LINE SUPPRESSION USING CHAOTIC SPREADING CODES
A system, method, and computer program product for chaotically generating a pseudorandom number sequence, such as for use in spread spectrum communications systems and in cryptographic systems. Chaotically generated pseudorandom numbers are not cyclostationary in nature, so output values encoded via such non-cyclostationary bases have no clear correlations. Spread signal communications systems using chaotically generated spreading codes thus operate without rate line artifacts, increasing their resistance to signal detection and to determinations of underlying signal chip rates and signal symbol rates. Broadcasts and guided transmissions (including either conductive wire or optical transmission media), in both radio frequency and optical systems are supported. Common spread spectrum communications systems including DSSS and FHSS may be strengthened through the use of chaotically generated spreading codes. Similarly, keys and nonces generated for cryptographic systems may be improved over those based on conventionally generated pseudorandom numbers.
Methods for Optical Image Encryption and Decryption Based on Biological Information
Image encryption and decryption methods based on biological information. The encryption method includes: obtaining the biological information; using the chaotic mapping method to preprocess the biological information to construct the first chaotic biological phase plate and the second chaotic biological phase plate; obtaining the original image to be encrypted and use the first chaotic biological phase plate and the second chaotic biological phase plate to determine the reconstructed optical encrypted image based on the discrete cosine transform method, and Fresnel transform method; and inputting reference light that interferes with the encrypted image of the reproduction light to determine the encrypted image. The invention can reduce the information amount of the key, improve the efficiency of storage and transmission, and improve security.