CN108964870A - The safe Enhancement Method of railway transponder message based on motor synchronizing chaos cipher - Google Patents
The safe Enhancement Method of railway transponder message based on motor synchronizing chaos cipher Download PDFInfo
- Publication number
- CN108964870A CN108964870A CN201810732792.XA CN201810732792A CN108964870A CN 108964870 A CN108964870 A CN 108964870A CN 201810732792 A CN201810732792 A CN 201810732792A CN 108964870 A CN108964870 A CN 108964870A
- Authority
- CN
- China
- Prior art keywords
- message
- encryption
- transponder
- bit
- motor synchronizing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/001—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B1/00—Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
- H04B1/59—Responders; Transponders
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0056—Systems characterized by the type of code used
- H04L1/0061—Error detection codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Train Traffic Observation, Control, And Security (AREA)
- Electric Propulsion And Braking For Vehicles (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses the safe Enhancement Method of railway transponder message based on motor synchronizing chaos cipher, method includes the following steps: step S1: building motor synchronizing nonlinear digital filter Chaotic Encryption System;Step S2: user's message is converted to the transmitting message of transponder;Step S3: according to the state of system, encryption setting is carried out to the transmitting message of subscriber response unit;Step S4: being decrypted using transmitting message of the vehicle-mounted BTM to transponder, terminates program;Solve the problems, such as that several security risks of plaintext transmission bring, existing coding mode the message acceptance rate when noise jamming is big is low, conventional cipher algorithm encryption and decryption low efficiency is difficult to meet the requirement of real-time of railway transponder message encryption.
Description
Technical field
The present invention relates to safe Enhancement Method fields, are based particularly on the railway transponder message peace of motor synchronizing chaos cipher
Full Enhancement Method.
Background technique
Transponder device be point type to vehicle information transmission equipment, be to guarantee bullet train operational safety, reliable, efficient
One of key technology and equipment can be used for CTCS-1 to CTCS-4 train operation control systems at different levels.Message is as transmission railway shape
The carrier of state information.Contain speed-limiting messages, information out of the station, location information, line conditions, track section etc. important peace
Full information.The safety of the accuracy and message transmissions of message is most important in CTCS system.
The message form in China uses the standard in Europe, and the message of transponder is divided into transponder user's message and transponder
Two kinds of transmitting message.Wherein, refer to the message that user information is worked out by certain format when transponder user's message, be divided into
The short message of the long message of 830 bits and 210 bits.The user's message of every transponder is all by frame identification, user bit
And end mark position is constituted.
China's message coding generallys use the FFFIS coding scheme that Europe signal is organized to set up at present.The system
Feature are as follows:
1. the plaintext using unencryption is transmitted, attacker can forge telegram according to its rule, and cannot be set by BTM
Standby identification.The cost of attack is small but most probably causes serious consequence.
2. using 75 bit check code cyclic checks, directly abandoned if examining to error message.Since transponder is pacified
Loaded between outdoor two rails, electromagnetic environment is more complex, during BTM of the transponder message from ground-based wireless transmissions to train
It is subject to electromagnetic interference, so that random bit errors occur, reduces the receiving efficiency of message.
3. conventional cipher algorithm encryption and decryption time delay is big, the real-time of transponder message transmissions is affected.Traditional password is calculated
Method is the diffusion reached to plaintext and obscures function, generally requires complicated system structure and carries out more wheel operations.Chaos cipher is calculated
Method is established mostly in real number state space and uses floating number multiple iterative algorithm.Both of which reduces encryption and decryption efficiency,
It is difficult to meet the requirement of real-time of railway transponder message encryption and decryption.
Summary of the invention
To solve problems of the prior art, the present invention provides the railway transponders based on motor synchronizing chaos cipher
The safe Enhancement Method of message solves several security risks of plaintext transmission bring, existing coding mode in noise situations complexity
When message acceptance rate is low, conventional cipher algorithm encryption and decryption low efficiency is difficult to meet the requirement of real-time of railway transponder message encryption
The problem of.
The technical solution adopted by the present invention is that: the railway transponder message safety enhancing side based on motor synchronizing chaos cipher
Method, method include the following steps:
Step S1: building motor synchronizing nonlinear digital filter Chaotic Encryption System;
Step S2: user's message is converted to the transmitting message of transponder;
Step S3: according to the state of system, encryption setting is carried out to the transmitting message of subscriber response unit;
Step S4: being decrypted encrypted transmitting message using vehicle-mounted BTM, terminates program.
The present invention has the beneficial effect that in the railway safe Enhancement Method of transponder message of motor synchronizing chaos cipher:
1. improving the safety of message transmissions: for plaintext transmission bring security risk, will be transmitted after message encryption
Can make attacker that can not learn message information, so can not counterfeit message, ensure that the safety of message transmission procedure.
2. improving the receiving efficiency of message: the present invention reaches self synchronous effect using the mode of filter Cipher Feedback
Fruit, and the mode of addition check code realizes the positioning function of mistake after clear packets.When asynchronous or transmission occurs for message transmissions
When in the process by noise jamming, it can be realized by the verifying to check code to the other label of mistake group and the restorer after 4 groups
Being decrypted correctly for system, improves the receiving efficiency of message.
3. message encryption and decryption has good real-time: the present invention uses the chaos digital filter block based on integer arithmetic
Frame realizes encryption and decryption, and wherein filter feedback coefficient is moved from the predetermined coefficient table for meeting chaotic characteristic, and by ciphertext modulus
State switching, nonlinear transfer function use S box look-up table mode.Compared with conventional cryptography mode, it is soft that the present invention is conducive to computer
The realization of hardware, and the speed of service is fast, more can satisfy the requirement of real time of railway transponder message encoding and decoding.
Detailed description of the invention
Fig. 1 is that the present invention is based on the overall procedures of the safe Enhancement Method of railway transponder message of motor synchronizing chaos cipher
Figure.
Fig. 2 is that the present invention is based on the streams of the step S1 of the safe Enhancement Method of railway transponder message of motor synchronizing chaos cipher
Cheng Tu.
Fig. 3 is that the present invention is based on the streams of the step S2 of the safe Enhancement Method of railway transponder message of motor synchronizing chaos cipher
Cheng Tu.
Fig. 4 is that the present invention is based on the streams of the step S3 of the safe Enhancement Method of railway transponder message of motor synchronizing chaos cipher
Cheng Tu
Fig. 5 is that the present invention is based on the chaos encryption systems of the safe Enhancement Method of railway transponder message of motor synchronizing chaos cipher
System structure chart.
Fig. 6 is that the present invention is based on the transponder messages of the safe Enhancement Method of railway transponder message of motor synchronizing chaos cipher
Decrypt flow chart.
Fig. 7 is that the present invention is based on the decryption of the chaos of the safe Enhancement Method of railway transponder message of motor synchronizing chaos cipher
System structure chart.
Fig. 8 is that the present invention is based on the long message original texts of the safe Enhancement Method of railway transponder message of motor synchronizing chaos cipher
And ciphertext exemplary diagram.
Specific embodiment
A specific embodiment of the invention is described below, in order to facilitate understanding by those skilled in the art this hair
It is bright, it should be apparent that the present invention is not limited to the ranges of specific embodiment, for those skilled in the art,
As long as various change is in the spirit and scope of the present invention that the attached claims limit and determine, these variations are aobvious and easy
See, all are using the innovation and creation of present inventive concept in the column of protection.
As shown in Figure 1, the safe Enhancement Method of railway transponder message based on motor synchronizing chaos cipher, method include as follows
Step:
Step S1: building motor synchronizing nonlinear digital filter Chaotic Encryption System;
Step S2: user's message is converted to the transmitting message of transponder;
Step S3: according to the state of system, encryption setting is carried out to the transmitting message of subscriber response unit;
Step S4: being decrypted encrypted transmitting message using vehicle-mounted BTM, terminates program.
As shown in Fig. 2, the specific steps of the step S1 of this programme are as follows:
Step S11: the nonlinear digital filter coefficient sets for meeting Kellber condition and entropy criterion are calculated;
Step S12: coefficient sets are formed into orderly nonlinear digital filter subsystem after randomly ordered.
The filter of the step S12 of this programme switches are as follows:
The selection of coefficient sets, i.e. coefficient sets { c are carried out using the calculation that the ciphertext before three moment carries out modulusm1,
cm2In m calculation method are as follows:
M=Y (i-3) mod64
Wherein, Y (i-3) indicates the ciphertext before three moment, and mod indicates modulo operation.
As shown in figure 3, the specific steps of the step S2 of this programme are as follows:
Step S21: by the binary sequence b of messagen-1bn-2…b0, n=830 or n=210 are divided into 62 bit long sequences
Column, if the length of message inadequate 62,0 polishing is added after every group, is { b after grouping for long message895b894…
b834..., b61b60…b0, for short message, it is grouped into { b255b254…b195..., b61b60…b0};
Step S22: in identifying code of every group of the last addition 00 as grouping, terminate program.
As shown in figure 4, the specific steps of the step S3 of this programme are as follows:
Step S31: initial key Key, the value of Key are selected in setting system initial state { Y (- 3), Y (- 2), Y (- 1) }
Range is (0,264);
Step S32: according to the ciphertext before three moment of Y (i-3) i.e., corresponding coefficient { c is calculatedm1, cm2, thus
The nonlinear digital filter subsystem for selecting this moment to be used to encrypt;
Step S33: according to the nonlinear digital filter subsystem of calculated encryption, calculating encryption message Y (i),
Wherein, p=(cm1×key)mod(264), " ° " indicates compound operation, cmnIndicate Y (i-3) corresponding coefficient sets, X
(i) indicate that in plain text, Y (i-n) indicates the ciphertext value before n moment, SpIndicate P iteration of S box;
Step S34: obtained ciphertext is transferred in mobile unit BTM system, is updated system mode, is carried out next group of report
The encryption of text.
The step S4 of this programme the specific steps are
Step S41: reading in the transponder that receives using mobile unit BTM and encrypt message, by system initial key Key and
Original state of the system initial state { Y (- 3), Y (- 2), Y (- 1) } as deciphering;
Step S42: judge whether transponder encryption message is long message using mobile unit BTM, if so, from number of users
Start to read 896 bit datas according to position;If being otherwise short message, 256 bit datas are read since user bit;
Step S43: the data of reading are decrypted for one group according to 64 bit using vehicle-mounted BTM, obtain plaintext X (i);It is bright
Literary X (i) decryption calculates as follows
Wherein, p=(cm1×key)mod(264), cmnFor the corresponding coefficient sets of Y (i-3);S-pIndicate inverse P times of S box repeatedly
Generation;
Step S44: decryption message is verified after decryption using vehicle-mounted BTM, verifies its every group of rear two bit check
Whether whether code is 00, examine message in transmission process by noise jamming with this.If all check bit are correct, directly remove
Check bit and filler, obtain user's message;If mistake occurs in check code, error checking group is marked and to adding
Secret report text carries out secondary reception, and verifying is decrypted to label group, will label if the message for receiving decryption passes through verifying
Group covers and cancels label, otherwise, continue to until check bit it is correct, remove check bit and filler later, obtain
To user's message, terminate program.
The present embodiment is when implementing, step 1: building motor synchronizing nonlinear digital filter Chaotic Encryption System.
The nonlinear digital filter chaos subsystem of Kelber condition and entropy criterion is constructed while met first.In order to make
The state of chaos is presented in output, and can cover the feature of transponder transmitting message, it would be desirable to calculate while meet Kelber
The coefficient sets of condition and entropy criterion.The feedback factor group of the subsystem is constructed as shown in table 1-1.
Table 1-1
627 | 37210 | 39220 | 66207 | 14147 | 51106 | 23108 | 12189 |
65204 | 83170 | 69142 | 34195 | 47204 | 833 | 97198 | 4390 |
51162 | 41180 | 39172 | 89182 | 730 | 718 | 370 | 37164 |
5126 | 87178 | 566 | 14207 | 4798 | 21100 | 93190 | 3370 |
25224 | 11180 | 105214 | 21162 | 44141 | 50159 | 11152 | 2481 |
60189 | 13114 | 23140 | 68213 | 2275 | 32185 | 35114 | 2996 |
67138 | 75154 | 340 | 798 | 59122 | 58183 | 53168 | 37120 |
10119 | 2962 | 28165 | 47150 | 445 | 31222 | 7120 | 2584 |
As shown in figure 5, filter coefficient switchover policy: the mode that the present invention is encrypted using 64 groups of coefficient sets switchings, therefore be
By the way of ciphertext of the selection of array before three moment carries out modulus calculating, i.e. { cm1, cm2In m calculation method are as follows:
M=Y (i-3) mod64
The nonlinear transfer function of system uses password S box.Main cause is that S box has dijection characteristic, after capable of making encryption
Message guarantee in section traverse and be uniformly distributed;It can have good independence between the output bit of S box, pass through
Encrypted message is analyzed, attacker can not learn the rule between its bit;S box has stringent avalanche effect, can
Variation to guarantee the encryption message when minor change occurs for user's message is very big, can resist the differential attack of attacker;This
Outside, the operation of S box is substantially the search procedure of table, and arithmetic speed is fast.The S box that the present invention chooses is as shown in table 1-2
Table 1-2
121 | 50 | 31 | 84 | 8 | 0 | 52 | 205 | 190 | 99 | 203 | 132 | 42 | 41 | 173 | 69 |
63 | 159 | 30 | 100 | 193 | 29 | 1 | 82 | 187 | 165 | 189 | 222 | 14 | 170 | 175 | 83 |
207 | 38 | 171 | 254 | 4 | 111 | 233 | 55 | 195 | 62 | 5 | 6 | 166 | 245 | 234 | 15 |
184 | 79 | 146 | 218 | 32 | 115 | 74 | 127 | 97 | 39 | 76 | 185 | 90 | 65 | 123 | 125 |
133 | 227 | 19 | 242 | 154 | 157 | 197 | 67 | 116 | 60 | 232 | 211 | 34 | 145 | 164 | 23 |
172 | 183 | 153 | 28 | 80 | 71 | 95 | 64 | 158 | 213 | 246 | 206 | 136 | 17 | 253 | 182 |
155 | 18 | 168 | 196 | 216 | 104 | 163 | 66 | 238 | 176 | 113 | 96 | 180 | 237 | 220 | 12 |
109 | 57 | 135 | 51 | 68 | 58 | 44 | 255 | 61 | 25 | 214 | 72 | 122 | 46 | 56 | 53 |
212 | 215 | 147 | 13 | 11 | 225 | 208 | 105 | 244 | 128 | 226 | 251 | 94 | 137 | 117 | 98 |
49 | 88 | 149 | 78 | 70 | 241 | 89 | 110 | 194 | 174 | 200 | 9 | 209 | 144 | 24 | 2 |
138 | 142 | 124 | 239 | 75 | 37 | 252 | 243 | 21 | 33 | 156 | 48 | 249 | 27 | 192 | 210 |
231 | 221 | 152 | 118 | 114 | 148 | 219 | 130 | 126 | 235 | 10 | 202 | 91 | 40 | 45 | 85 |
228 | 47 | 107 | 169 | 131 | 179 | 224 | 199 | 198 | 230 | 54 | 250 | 141 | 101 | 103 | 167 |
36 | 188 | 181 | 106 | 92 | 204 | 223 | 134 | 177 | 20 | 3 | 139 | 186 | 178 | 247 | 43 |
26 | 87 | 119 | 22 | 201 | 35 | 7 | 151 | 81 | 240 | 162 | 161 | 236 | 77 | 217 | 191 |
16 | 248 | 73 | 160 | 112 | 140 | 86 | 120 | 229 | 102 | 93 | 59 | 129 | 143 | 108 | 150 |
Step 2: user's message is converted to transmitting message.
Define the specific format of every group of transmission: the binary sequence of message is bn-1bn-2…b0, wherein n=830=210.
It is classified as the sequence of 62 bit longs, 0 polishing of insufficient length adds 00 identifying code as grouping after every group.For
Long message is { b after grouping895b894…b834..., b61b60…b0}.For short message, format is { b after grouping255b254…
b195..., b61b60…b0}。
The transponder transmitting message format being converted into is as shown in table 1-3.
Table 1-3
User's message | Check bit | Filler | Transmitting message |
830/210 | 28/8 | 66/46 | 896/256 |
Step 3: being encrypted to transponder transmitting message.
Ciphering process can be divided into following several steps:
1. being arranged system initial state { Y (- 3), Y (- 2), Y (- 1) }.Initial key key is chosen, the value range of key is
(0,264), key key is used to control the number of iterations of S box.
2. selecting corresponding coefficient { c according to Y (i-3) (i.e. ciphertext before three moment)m1, cm2, to select this when
Carve the nonlinear digital filter subsystem for being used to encrypt.
3. as shown in figure 5, calculating the encryption message y of output(i)
Wherein, p=(cm1×key)mod(264), " ° " indicates compound operation.
Obtained ciphertext Y (i) is input in system, system mode is updated, carries out next group encryption.
It encrypts obtained result and encrypts message for transponder, when train is by above transponder, activation transponder will add
Secret report text is wirelessly transmitted to mobile unit BTM.
Step 4: transponder encryption message is decrypted in vehicle-mounted BTM.
Firstly, vehicle-mounted BTM reads in the transponder encryption message received, system initial key key and system initial shape
Original state of the state { Y (- 3), Y (- 2), Y (- 1) } as decipher.
Secondly, vehicle-mounted BTM judges whether message is long message.If long message then reading 896 since user bit
Bit data.If message is short message, 256 bit datas are read since user bit.
As shown in fig. 7, the data of reading are decrypted for one group vehicle-mounted BTM according to 64 bit, plaintext X (i) is obtained.In plain text
X (i) decryption calculates as follows
Wherein, p=(cm1×key)mod(264), cmnFor the corresponding coefficient sets of Y (i-3).
Vehicle-mounted BTM after decryption verifies decryption message, and the present invention is added to 00 conduct after every group of user's message
Whether its check code examines the message in transmission process not by noise jamming.If verifying that there are a few groups of verification dislocations
Accidentally, mistake occurs it can be seen that message is interfered in transmission process in we, we mark the verification group of mistake at this time
Remember and secondary reception is carried out to encryption message, verifying is decrypted to label group, if secondary reception decrypts to obtain correctly
Label group is then covered and cancels label by message.It is on the contrary then continue to decryption until all check bit are correct.
When check results show that every group of check bit is correct, then directly removes check bit and filler, obtain user
Message.
1. the correlation of testing encryption message and plaintext: selection standard long message simultaneously encrypts it, and test result is such as
Shown in Fig. 5.Encrypted message and former message are dissimilar, and show after encrypting to the last fixed value of message random
Property, illustrate that Encryption Algorithm can be very good to cover plaintext characteristic, to protect traditional transponder message plaintext transmission bring
Security risk.
2. testing encryption message is to plaintext sensibility: randomly choosing one section of 1024 bit size first from plaintext space
Sequence as control plaintext sequence.The bit compareed in plaintext sequence is negated to obtain one by one 1024 sections of experiments in plain text later
Sequence.Then encryption control plaintext sequence and experiment plaintext sequence obtain control ciphertext and test ciphertext.Table 1-4 lists snowslide
Part statistical data in characteristic test is as a result, B in tablemaxIndicate that ciphertext changes maximum number of digits, BminIndicate what ciphertext changed
Minimum number of bits,Indicate the mean change digit that ciphertext changes, P indicates that the ciphertext being calculated according to statistical result changes general
Rate.We know when minor change occurs for plaintext sequence from table, and the mean change digit and probability of corresponding ciphertext sequence are equal
Close to ideal value 512 and 50%, i.e., when minor change occurs for plaintext sequence, each of ciphertext sequence is sent out than peculiar 50% probability
Raw overturning, shows that the avalanche characteristic of the Encryption Algorithm is good.
Table 1-4
3. a pair motor synchronizing effect is tested
As shown in figure 8, we are in order to verify the automatic recovery of system and location of mistake function with 16 bit block lengths
One section of message is encrypted, changes a bit in message after encryption at random, by after decryption message with it is original bright
Literary message compares, as a result as shown in tables 1 to 5.
Table 1-5
According to data in table it is found that the 7th moment encrypted message in transmission process by one ratio of noise jamming and generation
The variation of special position.When to the message decryption received, ciphertext occurred verifying bit-errors since the 7th moment, at subsequent 4
After moment, system recovery is decrypted correctly.
Claims (6)
1. the safe Enhancement Method of railway transponder message based on motor synchronizing chaos cipher, which is characterized in that method includes as follows
Step:
Step S1: building motor synchronizing nonlinear digital filter Chaotic Encryption System;
Step S2: user's message is converted to the transmitting message of transponder;
Step S3: according to the state of system, encryption setting is carried out to the transmitting message of subscriber response unit;
Step S4: being decrypted encrypted transmitting message using vehicle-mounted BTM, terminates program.
2. the railway transponder message safe Enhancement Method according to claim 1 based on motor synchronizing chaos cipher, special
Sign is, the specific steps of the step S1 are as follows:
Step S11: the nonlinear digital filter coefficient sets for meeting Kellber condition and entropy criterion are calculated;
Step S12: coefficient sets are formed into orderly nonlinear digital filter subsystem after randomly ordered.
3. the railway transponder message safe Enhancement Method according to claim 2 based on motor synchronizing chaos cipher, special
Sign is that the filter of the step S12 switches are as follows:
The selection of coefficient sets, i.e. coefficient sets { c are carried out using the calculation that the ciphertext before three moment carries out modulusm1, cm2In m
Calculation method are as follows:
M=Y (i-3) mod64
Wherein, Y (i-3) indicates the ciphertext before three moment, and mod indicates modulo operation.
4. the railway transponder message safe Enhancement Method according to claim 1 based on motor synchronizing chaos cipher, special
Sign is, the specific steps of the step S2 are as follows:
Step S21: by the binary sequence b of messagen-1bn-2...b0, n=830 or n=210 are divided into 62 bit long sequences, such as
Inadequate 62 bit of the length of fruit message, adds 0 polishing after every group, for long message, is after grouping
{b895b894...b834..., b61b60...b0, for short message, it is grouped into { b255b254...b195...,
b61b60...b0};
Step S22: in identifying code of every group of the last addition 00 as grouping.
5. the railway transponder message safe Enhancement Method according to claim 3 based on motor synchronizing chaos cipher, special
Sign is, the specific steps of the step S3 are as follows:
Step S31: initial key Key, the value range of Key are selected in setting system initial state { Y (- 3), Y (- 2), Y (- 1) }
It is (0,264);
Step S32: according to the ciphertext before three moment of Y (i-3) i.e., corresponding coefficient { c is calculatedm1, cm2, to select this
Moment is used to the nonlinear digital filter subsystem encrypted;
Step S33: according to the nonlinear digital filter subsystem of calculated encryption, calculating encryption message Y (i),
Wherein, p=(cm1×key)mod(264),Indicate compound operation, cmnIndicate Y (i-3) corresponding coefficient sets, X (i)
Indicate that in plain text, Y (i-n) indicates the ciphertext value before n moment, SpIndicate P iteration of S box;
Step S34: obtained ciphertext value is transferred in mobile unit BTM system, is updated system mode, is carried out next group of message
Encryption.
6. the railway transponder message safe Enhancement Method according to claim 5 based on motor synchronizing chaos cipher, special
Sign is, the step S4 the specific steps are
Step S41: the transponder received is read in using mobile unit BTM and encrypts message, by system initial key Key and system
Original state of the original state { Y (- 3), Y (- 2), Y (- 1) } as decryption;
Step S42: judge whether transponder encryption message is long message using mobile unit BTM, if so, from user bit
Start to read 896 bit datas;If being otherwise short message, 256 bit datas are read since user bit;
Step S43: the data of reading are decrypted for one group according to 64 bit using vehicle-mounted BTM, obtain plaintext X (i);Plaintext X
(i) decryption calculates as follows
Wherein, p=(cm1×key)mod(264), cmnFor the corresponding coefficient sets of Y (i-3);S-pIndicate the inverse P iteration of S box;
Step S44: decryption message is verified after decryption using vehicle-mounted BTM, verifying its every group rear two bit checks code is
Whether no is 00, examine message in transmission process by noise jamming with this.If all check bit are correct, directly remove verification
Position and filler, obtain user's message;If mistake occurs in check code, error checking group is marked and encryption is reported
Text carries out secondary reception, and verifying is decrypted to label group, if the message for receiving decryption will mark group by verifying
Cover and cancel label, otherwise, continue to until check bit it is correct, remove check bit and filler later, used
Family message terminates program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810732792.XA CN108964870B (en) | 2018-07-05 | 2018-07-05 | Railway transponder message security enhancement method based on self-synchronizing chaotic cipher |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810732792.XA CN108964870B (en) | 2018-07-05 | 2018-07-05 | Railway transponder message security enhancement method based on self-synchronizing chaotic cipher |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108964870A true CN108964870A (en) | 2018-12-07 |
CN108964870B CN108964870B (en) | 2020-04-28 |
Family
ID=64485937
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810732792.XA Active CN108964870B (en) | 2018-07-05 | 2018-07-05 | Railway transponder message security enhancement method based on self-synchronizing chaotic cipher |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108964870B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109861743A (en) * | 2019-03-10 | 2019-06-07 | 西安电子科技大学 | Data safe transmission method based on Big Dipper short message location information transport protocol |
CN110856139A (en) * | 2019-10-17 | 2020-02-28 | 北京全路通信信号研究设计院集团有限公司 | Data sending method, receiving method and device |
CN110868398A (en) * | 2019-10-17 | 2020-03-06 | 北京全路通信信号研究设计院集团有限公司 | Data frame encryption method, data frame decryption method and data frame decryption device |
US20230027142A1 (en) * | 2019-12-09 | 2023-01-26 | Bigo Technology Pte. Ltd. | Method and apparatus for encrypting and decrypting and reading and writing messages, computer device, and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101908024A (en) * | 2010-08-17 | 2010-12-08 | 湖南源科高新技术有限公司 | Encrypting method, device and hard disk |
CN102027681A (en) * | 2007-10-25 | 2011-04-20 | 原子能和辅助替代能源委员会 | Method of and apparatus for synchronisation |
EP2637131A1 (en) * | 2008-09-22 | 2013-09-11 | Visa International Service Association | Method of performing transactions with contactless payment devices using pre-tap and two-tap operations |
US20160344551A1 (en) * | 2013-12-24 | 2016-11-24 | Elliptic Technologies Inc. | Area efficient cryptographic method and apparatus |
CN106656475A (en) * | 2017-01-09 | 2017-05-10 | 李朋林 | Novel symmetric key algorithm for high speed encryption |
-
2018
- 2018-07-05 CN CN201810732792.XA patent/CN108964870B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102027681A (en) * | 2007-10-25 | 2011-04-20 | 原子能和辅助替代能源委员会 | Method of and apparatus for synchronisation |
EP2637131A1 (en) * | 2008-09-22 | 2013-09-11 | Visa International Service Association | Method of performing transactions with contactless payment devices using pre-tap and two-tap operations |
CN101908024A (en) * | 2010-08-17 | 2010-12-08 | 湖南源科高新技术有限公司 | Encrypting method, device and hard disk |
US20160344551A1 (en) * | 2013-12-24 | 2016-11-24 | Elliptic Technologies Inc. | Area efficient cryptographic method and apparatus |
CN106656475A (en) * | 2017-01-09 | 2017-05-10 | 李朋林 | Novel symmetric key algorithm for high speed encryption |
Non-Patent Citations (3)
Title |
---|
吴灵灵: "基于多态的混沌流密码算法的研究", 《CNKI中国硕士学位论文全文数据库基础科学辑》 * |
江磊,魏震楠,刘明: "基于内外混合流水线的高吞吐率 AES 结构", 《电子技术应用》 * |
石杨欣: "面向铁路应答器的轻量混沌分组密码研究", 《CNKI中国硕士学位论文全文数据库信息科技辑》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109861743A (en) * | 2019-03-10 | 2019-06-07 | 西安电子科技大学 | Data safe transmission method based on Big Dipper short message location information transport protocol |
CN109861743B (en) * | 2019-03-10 | 2021-03-23 | 西安电子科技大学 | Data safety transmission method based on Beidou short message positioning information transmission protocol |
CN110856139A (en) * | 2019-10-17 | 2020-02-28 | 北京全路通信信号研究设计院集团有限公司 | Data sending method, receiving method and device |
CN110868398A (en) * | 2019-10-17 | 2020-03-06 | 北京全路通信信号研究设计院集团有限公司 | Data frame encryption method, data frame decryption method and data frame decryption device |
US20230027142A1 (en) * | 2019-12-09 | 2023-01-26 | Bigo Technology Pte. Ltd. | Method and apparatus for encrypting and decrypting and reading and writing messages, computer device, and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN108964870B (en) | 2020-04-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102317904B (en) | System and methods for encryption with authentication integrity | |
Simmons | Symmetric and asymmetric encryption | |
AU2008327506B2 (en) | Method and system for encryption of data | |
CN108964870A (en) | The safe Enhancement Method of railway transponder message based on motor synchronizing chaos cipher | |
US5161244A (en) | Cryptographic system based on information difference | |
US5345507A (en) | Secure message authentication for binary additive stream cipher systems | |
CN101645899B (en) | Bidirectional authentication method and system based on symmetric encipherment algorithm | |
CN101710852A (en) | LDPC code encoding/decoding method and encoder/decoder with encryption function | |
CN101779190A (en) | Information transmission and integrated protection method | |
CN108833390B (en) | Matrix transformation-based packet physical layer encryption method | |
CN107911354B (en) | Composite parallel data encryption method | |
Saxena et al. | Efficient signature scheme for delivering authentic control commands in the smart grid | |
Mihaljević et al. | An approach for stream ciphers design based on joint computing over random and secret data | |
CN110572639A (en) | video encryption and decryption evaluation tool and method based on GB35114 standard | |
CN111641500B (en) | Encryption and decryption method for wireless video transmission safety of unmanned aerial vehicle | |
CN110278068B (en) | LoRa communication encryption system based on chaos sequence | |
CN110266321B (en) | Novel communication method and system based on polarization code | |
CN109861821B (en) | Error coordination method for LWE public key password | |
CN109819438A (en) | A kind of fountain coding wireless data safe transmission method based on AES encryption | |
CN101882991A (en) | Communication data stream encryption method based on block cipher | |
US20130058483A1 (en) | Public key cryptosystem and technique | |
CN115004559A (en) | Polarity encoding based on data privacy protection | |
Simmons | Symmetric and asymmetric encryption | |
Mihaljević | A Framework for Stream Ciphers Based on Pseudorandomness, Randomness and Coding | |
Ahlswede | Hiding Data-Selected Topics |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |