Font Size: a A A

Research And Implementation Of Communication Confidentiality Of Military Radio Below The Division-level

Posted on:2013-07-02Degree:MasterType:Thesis
Country:ChinaCandidate:Z L TanFull Text:PDF
GTID:2248330374474988Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
Further aggravate the situation of military struggle, the radio station as a militarycommander to convey an important means of command and impart information,confidentiality of communications is particularly important; After years of hard practice andexplore our military radio communications confidentiality, has equipped with Adaptive RadioFrequency Hopping Spread Spectrum Systems; Confidential departments, high levelcommunication network is usually configured in these stations on the basis of confidentialitymachine, the radio communication network such as the above the division; Subject to theconstraints of the various conditions, and confidentiality in the radio communications divisionfollowing general or the dense translation.This is the view of our army’s existing radio communications confidential grimsituation, combined with his many years practice experience in the first line ofcommunications equipment, a brief confidential aspects of the channel spread spectrumcommunications, frequency hopping technology and communications interference andanti-jammingtechnology; Signal confidentiality, cryptography, secure communicationssystems, as well as key-based cryptographic algorithms proceed to highlight the principle ofchaotic encryption and chaotic secure communication, developed on the basis of a radiosecurity systems based on chaos encryptionto fill the security machines in the small field ofradio communications. The last chapter as a supplement, and management is key in theencryption algorithm can be on a public basis of the assessment to ensure the security ofconfidential system as a whole, the key management system about.In this paper, the development of security systems, test, data and graphics, alsoaccording to the specific requirements of the battlefield environment and communicationssystems, select the appropriate encryption algorithm to achieve the secrecy of correspondenceneeds.
Keywords/Search Tags:Confidentiality of communications, Radio, Chaos
PDF Full Text Request
Related items