Cover and iterative learning control for and decryption in secure communication
- 7 Downloads
Typical cover techniques adopted in the conventional secure communication schemes are the additive masking and modulation by multiplication. In order to enhance security, in this paper, the new masking and decryption methods were given by iterative learning control algorithm for secure communication. In order to enhance security, the paper proposed the nonlinear masking method to apply to the traditional items and used the iterative learning control algorithm to decrypt. The algorithm reconstructed the information signal completely and analyzed the robustness and convergence of learning algorithm about the initial error and output error. The convergence conditions were given and the simulations shown in the algorithm can reconstruct the signal in secure communication.
KeywordsSecure communication Nonlinear masking Iterative learning control algorithm
The work was supported by the Hechi University Key Projection Foundation (XJ2016ZD004), the Hechi University for Youth teacher Foundation (XJ2017QN08), the Projection of Environment Master Foundation (2017HJA001, 2017HJB001), the key Project of the new century teaching reform Project in Guangxi (2010JGZ033) and the Promotion program for young teachers Foundation in University of Guang Xi (2018KY0495).
Yinjun Zhang is the corresponding author of the paper. Menji Chen contributed the idea of the paper. Jianhuan Su did the simulation.
Compliance with ethical standards
Conflict of interest
All authors declare that they have no conflict of interest.
- 1.Richardson, R.: CSI computer crime and security survey at 19.i.cmpnet.com (2008)Google Scholar
- 2.Li, Y., Dhotre, N.S., Ohara, Y., Kroeger, T.M., Miller, E.L., Long, D.D.E.: Horus: fine-grained encryption-based security for large-scale storage (PDF). www.ssrc.ucsc.edu. Discussion of encryption weaknesses for petabyte scale datasets
- 12.Sun, M.X.: Chaotic communication systems: an iterative learning perspective. In: Proceedings of the International Conference on Electrical and Control Engineering, pp. 573–577. IEEE, Wuhan (2010)Google Scholar
- 22.Matsui, M., Yamagishi, A.: A new method for known plaintext attack of FEAL cipher. In: Rueppel R.A. (ed.) Advances in Cryptology—EUROCRYPT’ 92. EUROCRYPT 1992. Lecture Notes in Computer Science, vol 658. Springer, Berlin, Heidelberg (1992)Google Scholar
- 23.Matsui, M.: The first experimental cryptanalysis of the data encryption standard. In: Desmedt Y.G. (eds.) Advances in Cryptology—CRYPTO’ 94. CRYPTO 1994. Lecture Notes in Computer Science, vol 839. Springer, Berlin, Heidelberg (1994)Google Scholar
- 24.Matsui, M.: Linear cryptanalysis method for DES cipher (PDF). In: Advances in Cryptology—EUROCRYPT 1993. Archived from the original (PDF) on 2007-09-26. Retrieved 22 Feb. 2007Google Scholar
- 25.Singh, S.: The Code Book, pp. 14–20. Anchor Books, New York (2000)Google Scholar