Main > Chinese Journal of Lasers >  Volume 47 >  Issue 9 >  Page 0906001 > Article
  • Abstract
  • Abstract
  • View Summary
  • Figures (4)
  • Tables (1)
  • Equations (0)
  • References (26)
  • Get PDF(in Chinese)
  • Paper Information
  • Received: Mar. 16, 2020

    Accepted: Apr. 13, 2020

    Posted: Sep. 1, 2020

    Published Online: Sep. 16, 2020

    The Author Email: Yan Senlin (senlinyan@163.com)

    DOI: 10.3788/CJL202047.0906001

  • Get Citation
  • Copy Citation Text

    Senlin Yan. Theory and Technique of Cross Transmittance and Alternate Parallel Reception of Laser Chaos in Secure Communication[J]. Chinese Journal of Lasers, 2020, 47(9): 0906001

    Download Citation

  • Category
  • fiber optics and optical communications
  • Share
Chinese Journal of Lasers, Vol. 47, Issue 9, 0906001 (2020)

Theory and Technique of Cross Transmittance and Alternate Parallel Reception of Laser Chaos in Secure Communication

Yan Senlin*

Author Affiliations

  • Electronic Engineering School, Nanjing Xiaozhuang University, Nanjing, Jiangsu 211171, China

Abstract

A novel laser chaotic coding system was studied herein. The proposed system realized the application of cross emission and alternate parallel reception (CEAPR) in chaotic secure communications using two space-coupled lasers synchronizing with two other lasers. We theoretically determined two chaotic coding and decoding equations of the CEAPR. In addition, the mathematical physical principle of CEAPR coding and decoding of chaotic laser was defined and described. Two practical applications of the CEAPR technology were developed herein. The proposed system characterizes different parameters between the emitter laser emitting chaotic coding carrier and the receiver laser, which is different from the traditional chaotic communication system that has the same parameter secret-keys for the emitter and receiver. The emitters have multiple-parameters and multiple-variables, can implement alternating transmission of information security, and has a flexible application. It makes it difficult for invaders to decipher the communication contents from the carrier.

keywords

Please Enter Your Email: