CN108964870A - The safe Enhancement Method of railway transponder message based on motor synchronizing chaos cipher - Google Patents

The safe Enhancement Method of railway transponder message based on motor synchronizing chaos cipher Download PDF

Info

Publication number
CN108964870A
CN108964870A CN201810732792.XA CN201810732792A CN108964870A CN 108964870 A CN108964870 A CN 108964870A CN 201810732792 A CN201810732792 A CN 201810732792A CN 108964870 A CN108964870 A CN 108964870A
Authority
CN
China
Prior art keywords
message
encryption
transponder
bit
motor synchronizing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810732792.XA
Other languages
Chinese (zh)
Other versions
CN108964870B (en
Inventor
王小敏
张文芳
姜志儒
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Southwest Jiaotong University
Original Assignee
Southwest Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Southwest Jiaotong University filed Critical Southwest Jiaotong University
Priority to CN201810732792.XA priority Critical patent/CN108964870B/en
Publication of CN108964870A publication Critical patent/CN108964870A/en
Application granted granted Critical
Publication of CN108964870B publication Critical patent/CN108964870B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • H04B1/59Responders; Transponders
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • H04L1/0061Error detection codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Train Traffic Observation, Control, And Security (AREA)
  • Electric Propulsion And Braking For Vehicles (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses the safe Enhancement Method of railway transponder message based on motor synchronizing chaos cipher, method includes the following steps: step S1: building motor synchronizing nonlinear digital filter Chaotic Encryption System;Step S2: user's message is converted to the transmitting message of transponder;Step S3: according to the state of system, encryption setting is carried out to the transmitting message of subscriber response unit;Step S4: being decrypted using transmitting message of the vehicle-mounted BTM to transponder, terminates program;Solve the problems, such as that several security risks of plaintext transmission bring, existing coding mode the message acceptance rate when noise jamming is big is low, conventional cipher algorithm encryption and decryption low efficiency is difficult to meet the requirement of real-time of railway transponder message encryption.

Description

The safe Enhancement Method of railway transponder message based on motor synchronizing chaos cipher
Technical field
The present invention relates to safe Enhancement Method fields, are based particularly on the railway transponder message peace of motor synchronizing chaos cipher Full Enhancement Method.
Background technique
Transponder device be point type to vehicle information transmission equipment, be to guarantee bullet train operational safety, reliable, efficient One of key technology and equipment can be used for CTCS-1 to CTCS-4 train operation control systems at different levels.Message is as transmission railway shape The carrier of state information.Contain speed-limiting messages, information out of the station, location information, line conditions, track section etc. important peace Full information.The safety of the accuracy and message transmissions of message is most important in CTCS system.
The message form in China uses the standard in Europe, and the message of transponder is divided into transponder user's message and transponder Two kinds of transmitting message.Wherein, refer to the message that user information is worked out by certain format when transponder user's message, be divided into The short message of the long message of 830 bits and 210 bits.The user's message of every transponder is all by frame identification, user bit And end mark position is constituted.
China's message coding generallys use the FFFIS coding scheme that Europe signal is organized to set up at present.The system Feature are as follows:
1. the plaintext using unencryption is transmitted, attacker can forge telegram according to its rule, and cannot be set by BTM Standby identification.The cost of attack is small but most probably causes serious consequence.
2. using 75 bit check code cyclic checks, directly abandoned if examining to error message.Since transponder is pacified Loaded between outdoor two rails, electromagnetic environment is more complex, during BTM of the transponder message from ground-based wireless transmissions to train It is subject to electromagnetic interference, so that random bit errors occur, reduces the receiving efficiency of message.
3. conventional cipher algorithm encryption and decryption time delay is big, the real-time of transponder message transmissions is affected.Traditional password is calculated Method is the diffusion reached to plaintext and obscures function, generally requires complicated system structure and carries out more wheel operations.Chaos cipher is calculated Method is established mostly in real number state space and uses floating number multiple iterative algorithm.Both of which reduces encryption and decryption efficiency, It is difficult to meet the requirement of real-time of railway transponder message encryption and decryption.
Summary of the invention
To solve problems of the prior art, the present invention provides the railway transponders based on motor synchronizing chaos cipher The safe Enhancement Method of message solves several security risks of plaintext transmission bring, existing coding mode in noise situations complexity When message acceptance rate is low, conventional cipher algorithm encryption and decryption low efficiency is difficult to meet the requirement of real-time of railway transponder message encryption The problem of.
The technical solution adopted by the present invention is that: the railway transponder message safety enhancing side based on motor synchronizing chaos cipher Method, method include the following steps:
Step S1: building motor synchronizing nonlinear digital filter Chaotic Encryption System;
Step S2: user's message is converted to the transmitting message of transponder;
Step S3: according to the state of system, encryption setting is carried out to the transmitting message of subscriber response unit;
Step S4: being decrypted encrypted transmitting message using vehicle-mounted BTM, terminates program.
The present invention has the beneficial effect that in the railway safe Enhancement Method of transponder message of motor synchronizing chaos cipher:
1. improving the safety of message transmissions: for plaintext transmission bring security risk, will be transmitted after message encryption Can make attacker that can not learn message information, so can not counterfeit message, ensure that the safety of message transmission procedure.
2. improving the receiving efficiency of message: the present invention reaches self synchronous effect using the mode of filter Cipher Feedback Fruit, and the mode of addition check code realizes the positioning function of mistake after clear packets.When asynchronous or transmission occurs for message transmissions When in the process by noise jamming, it can be realized by the verifying to check code to the other label of mistake group and the restorer after 4 groups Being decrypted correctly for system, improves the receiving efficiency of message.
3. message encryption and decryption has good real-time: the present invention uses the chaos digital filter block based on integer arithmetic Frame realizes encryption and decryption, and wherein filter feedback coefficient is moved from the predetermined coefficient table for meeting chaotic characteristic, and by ciphertext modulus State switching, nonlinear transfer function use S box look-up table mode.Compared with conventional cryptography mode, it is soft that the present invention is conducive to computer The realization of hardware, and the speed of service is fast, more can satisfy the requirement of real time of railway transponder message encoding and decoding.
Detailed description of the invention
Fig. 1 is that the present invention is based on the overall procedures of the safe Enhancement Method of railway transponder message of motor synchronizing chaos cipher Figure.
Fig. 2 is that the present invention is based on the streams of the step S1 of the safe Enhancement Method of railway transponder message of motor synchronizing chaos cipher Cheng Tu.
Fig. 3 is that the present invention is based on the streams of the step S2 of the safe Enhancement Method of railway transponder message of motor synchronizing chaos cipher Cheng Tu.
Fig. 4 is that the present invention is based on the streams of the step S3 of the safe Enhancement Method of railway transponder message of motor synchronizing chaos cipher Cheng Tu
Fig. 5 is that the present invention is based on the chaos encryption systems of the safe Enhancement Method of railway transponder message of motor synchronizing chaos cipher System structure chart.
Fig. 6 is that the present invention is based on the transponder messages of the safe Enhancement Method of railway transponder message of motor synchronizing chaos cipher Decrypt flow chart.
Fig. 7 is that the present invention is based on the decryption of the chaos of the safe Enhancement Method of railway transponder message of motor synchronizing chaos cipher System structure chart.
Fig. 8 is that the present invention is based on the long message original texts of the safe Enhancement Method of railway transponder message of motor synchronizing chaos cipher And ciphertext exemplary diagram.
Specific embodiment
A specific embodiment of the invention is described below, in order to facilitate understanding by those skilled in the art this hair It is bright, it should be apparent that the present invention is not limited to the ranges of specific embodiment, for those skilled in the art, As long as various change is in the spirit and scope of the present invention that the attached claims limit and determine, these variations are aobvious and easy See, all are using the innovation and creation of present inventive concept in the column of protection.
As shown in Figure 1, the safe Enhancement Method of railway transponder message based on motor synchronizing chaos cipher, method include as follows Step:
Step S1: building motor synchronizing nonlinear digital filter Chaotic Encryption System;
Step S2: user's message is converted to the transmitting message of transponder;
Step S3: according to the state of system, encryption setting is carried out to the transmitting message of subscriber response unit;
Step S4: being decrypted encrypted transmitting message using vehicle-mounted BTM, terminates program.
As shown in Fig. 2, the specific steps of the step S1 of this programme are as follows:
Step S11: the nonlinear digital filter coefficient sets for meeting Kellber condition and entropy criterion are calculated;
Step S12: coefficient sets are formed into orderly nonlinear digital filter subsystem after randomly ordered.
The filter of the step S12 of this programme switches are as follows:
The selection of coefficient sets, i.e. coefficient sets { c are carried out using the calculation that the ciphertext before three moment carries out modulusm1, cm2In m calculation method are as follows:
M=Y (i-3) mod64
Wherein, Y (i-3) indicates the ciphertext before three moment, and mod indicates modulo operation.
As shown in figure 3, the specific steps of the step S2 of this programme are as follows:
Step S21: by the binary sequence b of messagen-1bn-2…b0, n=830 or n=210 are divided into 62 bit long sequences Column, if the length of message inadequate 62,0 polishing is added after every group, is { b after grouping for long message895b894… b834..., b61b60…b0, for short message, it is grouped into { b255b254…b195..., b61b60…b0};
Step S22: in identifying code of every group of the last addition 00 as grouping, terminate program.
As shown in figure 4, the specific steps of the step S3 of this programme are as follows:
Step S31: initial key Key, the value of Key are selected in setting system initial state { Y (- 3), Y (- 2), Y (- 1) } Range is (0,264);
Step S32: according to the ciphertext before three moment of Y (i-3) i.e., corresponding coefficient { c is calculatedm1, cm2, thus The nonlinear digital filter subsystem for selecting this moment to be used to encrypt;
Step S33: according to the nonlinear digital filter subsystem of calculated encryption, calculating encryption message Y (i),
Wherein, p=(cm1×key)mod(264), " ° " indicates compound operation, cmnIndicate Y (i-3) corresponding coefficient sets, X (i) indicate that in plain text, Y (i-n) indicates the ciphertext value before n moment, SpIndicate P iteration of S box;
Step S34: obtained ciphertext is transferred in mobile unit BTM system, is updated system mode, is carried out next group of report The encryption of text.
The step S4 of this programme the specific steps are
Step S41: reading in the transponder that receives using mobile unit BTM and encrypt message, by system initial key Key and Original state of the system initial state { Y (- 3), Y (- 2), Y (- 1) } as deciphering;
Step S42: judge whether transponder encryption message is long message using mobile unit BTM, if so, from number of users Start to read 896 bit datas according to position;If being otherwise short message, 256 bit datas are read since user bit;
Step S43: the data of reading are decrypted for one group according to 64 bit using vehicle-mounted BTM, obtain plaintext X (i);It is bright Literary X (i) decryption calculates as follows
Wherein, p=(cm1×key)mod(264), cmnFor the corresponding coefficient sets of Y (i-3);S-pIndicate inverse P times of S box repeatedly Generation;
Step S44: decryption message is verified after decryption using vehicle-mounted BTM, verifies its every group of rear two bit check Whether whether code is 00, examine message in transmission process by noise jamming with this.If all check bit are correct, directly remove Check bit and filler, obtain user's message;If mistake occurs in check code, error checking group is marked and to adding Secret report text carries out secondary reception, and verifying is decrypted to label group, will label if the message for receiving decryption passes through verifying Group covers and cancels label, otherwise, continue to until check bit it is correct, remove check bit and filler later, obtain To user's message, terminate program.
The present embodiment is when implementing, step 1: building motor synchronizing nonlinear digital filter Chaotic Encryption System.
The nonlinear digital filter chaos subsystem of Kelber condition and entropy criterion is constructed while met first.In order to make The state of chaos is presented in output, and can cover the feature of transponder transmitting message, it would be desirable to calculate while meet Kelber The coefficient sets of condition and entropy criterion.The feedback factor group of the subsystem is constructed as shown in table 1-1.
Table 1-1
627 37210 39220 66207 14147 51106 23108 12189
65204 83170 69142 34195 47204 833 97198 4390
51162 41180 39172 89182 730 718 370 37164
5126 87178 566 14207 4798 21100 93190 3370
25224 11180 105214 21162 44141 50159 11152 2481
60189 13114 23140 68213 2275 32185 35114 2996
67138 75154 340 798 59122 58183 53168 37120
10119 2962 28165 47150 445 31222 7120 2584
As shown in figure 5, filter coefficient switchover policy: the mode that the present invention is encrypted using 64 groups of coefficient sets switchings, therefore be By the way of ciphertext of the selection of array before three moment carries out modulus calculating, i.e. { cm1, cm2In m calculation method are as follows:
M=Y (i-3) mod64
The nonlinear transfer function of system uses password S box.Main cause is that S box has dijection characteristic, after capable of making encryption Message guarantee in section traverse and be uniformly distributed;It can have good independence between the output bit of S box, pass through Encrypted message is analyzed, attacker can not learn the rule between its bit;S box has stringent avalanche effect, can Variation to guarantee the encryption message when minor change occurs for user's message is very big, can resist the differential attack of attacker;This Outside, the operation of S box is substantially the search procedure of table, and arithmetic speed is fast.The S box that the present invention chooses is as shown in table 1-2
Table 1-2
121 50 31 84 8 0 52 205 190 99 203 132 42 41 173 69
63 159 30 100 193 29 1 82 187 165 189 222 14 170 175 83
207 38 171 254 4 111 233 55 195 62 5 6 166 245 234 15
184 79 146 218 32 115 74 127 97 39 76 185 90 65 123 125
133 227 19 242 154 157 197 67 116 60 232 211 34 145 164 23
172 183 153 28 80 71 95 64 158 213 246 206 136 17 253 182
155 18 168 196 216 104 163 66 238 176 113 96 180 237 220 12
109 57 135 51 68 58 44 255 61 25 214 72 122 46 56 53
212 215 147 13 11 225 208 105 244 128 226 251 94 137 117 98
49 88 149 78 70 241 89 110 194 174 200 9 209 144 24 2
138 142 124 239 75 37 252 243 21 33 156 48 249 27 192 210
231 221 152 118 114 148 219 130 126 235 10 202 91 40 45 85
228 47 107 169 131 179 224 199 198 230 54 250 141 101 103 167
36 188 181 106 92 204 223 134 177 20 3 139 186 178 247 43
26 87 119 22 201 35 7 151 81 240 162 161 236 77 217 191
16 248 73 160 112 140 86 120 229 102 93 59 129 143 108 150
Step 2: user's message is converted to transmitting message.
Define the specific format of every group of transmission: the binary sequence of message is bn-1bn-2…b0, wherein n=830=210. It is classified as the sequence of 62 bit longs, 0 polishing of insufficient length adds 00 identifying code as grouping after every group.For Long message is { b after grouping895b894…b834..., b61b60…b0}.For short message, format is { b after grouping255b254… b195..., b61b60…b0}。
The transponder transmitting message format being converted into is as shown in table 1-3.
Table 1-3
User's message Check bit Filler Transmitting message
830/210 28/8 66/46 896/256
Step 3: being encrypted to transponder transmitting message.
Ciphering process can be divided into following several steps:
1. being arranged system initial state { Y (- 3), Y (- 2), Y (- 1) }.Initial key key is chosen, the value range of key is (0,264), key key is used to control the number of iterations of S box.
2. selecting corresponding coefficient { c according to Y (i-3) (i.e. ciphertext before three moment)m1, cm2, to select this when Carve the nonlinear digital filter subsystem for being used to encrypt.
3. as shown in figure 5, calculating the encryption message y of output(i)
Wherein, p=(cm1×key)mod(264), " ° " indicates compound operation.
Obtained ciphertext Y (i) is input in system, system mode is updated, carries out next group encryption.
It encrypts obtained result and encrypts message for transponder, when train is by above transponder, activation transponder will add Secret report text is wirelessly transmitted to mobile unit BTM.
Step 4: transponder encryption message is decrypted in vehicle-mounted BTM.
Firstly, vehicle-mounted BTM reads in the transponder encryption message received, system initial key key and system initial shape Original state of the state { Y (- 3), Y (- 2), Y (- 1) } as decipher.
Secondly, vehicle-mounted BTM judges whether message is long message.If long message then reading 896 since user bit Bit data.If message is short message, 256 bit datas are read since user bit.
As shown in fig. 7, the data of reading are decrypted for one group vehicle-mounted BTM according to 64 bit, plaintext X (i) is obtained.In plain text X (i) decryption calculates as follows
Wherein, p=(cm1×key)mod(264), cmnFor the corresponding coefficient sets of Y (i-3).
Vehicle-mounted BTM after decryption verifies decryption message, and the present invention is added to 00 conduct after every group of user's message Whether its check code examines the message in transmission process not by noise jamming.If verifying that there are a few groups of verification dislocations Accidentally, mistake occurs it can be seen that message is interfered in transmission process in we, we mark the verification group of mistake at this time Remember and secondary reception is carried out to encryption message, verifying is decrypted to label group, if secondary reception decrypts to obtain correctly Label group is then covered and cancels label by message.It is on the contrary then continue to decryption until all check bit are correct.
When check results show that every group of check bit is correct, then directly removes check bit and filler, obtain user Message.
1. the correlation of testing encryption message and plaintext: selection standard long message simultaneously encrypts it, and test result is such as Shown in Fig. 5.Encrypted message and former message are dissimilar, and show after encrypting to the last fixed value of message random Property, illustrate that Encryption Algorithm can be very good to cover plaintext characteristic, to protect traditional transponder message plaintext transmission bring Security risk.
2. testing encryption message is to plaintext sensibility: randomly choosing one section of 1024 bit size first from plaintext space Sequence as control plaintext sequence.The bit compareed in plaintext sequence is negated to obtain one by one 1024 sections of experiments in plain text later Sequence.Then encryption control plaintext sequence and experiment plaintext sequence obtain control ciphertext and test ciphertext.Table 1-4 lists snowslide Part statistical data in characteristic test is as a result, B in tablemaxIndicate that ciphertext changes maximum number of digits, BminIndicate what ciphertext changed Minimum number of bits,Indicate the mean change digit that ciphertext changes, P indicates that the ciphertext being calculated according to statistical result changes general Rate.We know when minor change occurs for plaintext sequence from table, and the mean change digit and probability of corresponding ciphertext sequence are equal Close to ideal value 512 and 50%, i.e., when minor change occurs for plaintext sequence, each of ciphertext sequence is sent out than peculiar 50% probability Raw overturning, shows that the avalanche characteristic of the Encryption Algorithm is good.
Table 1-4
3. a pair motor synchronizing effect is tested
As shown in figure 8, we are in order to verify the automatic recovery of system and location of mistake function with 16 bit block lengths One section of message is encrypted, changes a bit in message after encryption at random, by after decryption message with it is original bright Literary message compares, as a result as shown in tables 1 to 5.
Table 1-5
According to data in table it is found that the 7th moment encrypted message in transmission process by one ratio of noise jamming and generation The variation of special position.When to the message decryption received, ciphertext occurred verifying bit-errors since the 7th moment, at subsequent 4 After moment, system recovery is decrypted correctly.

Claims (6)

1. the safe Enhancement Method of railway transponder message based on motor synchronizing chaos cipher, which is characterized in that method includes as follows Step:
Step S1: building motor synchronizing nonlinear digital filter Chaotic Encryption System;
Step S2: user's message is converted to the transmitting message of transponder;
Step S3: according to the state of system, encryption setting is carried out to the transmitting message of subscriber response unit;
Step S4: being decrypted encrypted transmitting message using vehicle-mounted BTM, terminates program.
2. the railway transponder message safe Enhancement Method according to claim 1 based on motor synchronizing chaos cipher, special Sign is, the specific steps of the step S1 are as follows:
Step S11: the nonlinear digital filter coefficient sets for meeting Kellber condition and entropy criterion are calculated;
Step S12: coefficient sets are formed into orderly nonlinear digital filter subsystem after randomly ordered.
3. the railway transponder message safe Enhancement Method according to claim 2 based on motor synchronizing chaos cipher, special Sign is that the filter of the step S12 switches are as follows:
The selection of coefficient sets, i.e. coefficient sets { c are carried out using the calculation that the ciphertext before three moment carries out modulusm1, cm2In m Calculation method are as follows:
M=Y (i-3) mod64
Wherein, Y (i-3) indicates the ciphertext before three moment, and mod indicates modulo operation.
4. the railway transponder message safe Enhancement Method according to claim 1 based on motor synchronizing chaos cipher, special Sign is, the specific steps of the step S2 are as follows:
Step S21: by the binary sequence b of messagen-1bn-2...b0, n=830 or n=210 are divided into 62 bit long sequences, such as Inadequate 62 bit of the length of fruit message, adds 0 polishing after every group, for long message, is after grouping {b895b894...b834..., b61b60...b0, for short message, it is grouped into { b255b254...b195..., b61b60...b0};
Step S22: in identifying code of every group of the last addition 00 as grouping.
5. the railway transponder message safe Enhancement Method according to claim 3 based on motor synchronizing chaos cipher, special Sign is, the specific steps of the step S3 are as follows:
Step S31: initial key Key, the value range of Key are selected in setting system initial state { Y (- 3), Y (- 2), Y (- 1) } It is (0,264);
Step S32: according to the ciphertext before three moment of Y (i-3) i.e., corresponding coefficient { c is calculatedm1, cm2, to select this Moment is used to the nonlinear digital filter subsystem encrypted;
Step S33: according to the nonlinear digital filter subsystem of calculated encryption, calculating encryption message Y (i),
Wherein, p=(cm1×key)mod(264),Indicate compound operation, cmnIndicate Y (i-3) corresponding coefficient sets, X (i) Indicate that in plain text, Y (i-n) indicates the ciphertext value before n moment, SpIndicate P iteration of S box;
Step S34: obtained ciphertext value is transferred in mobile unit BTM system, is updated system mode, is carried out next group of message Encryption.
6. the railway transponder message safe Enhancement Method according to claim 5 based on motor synchronizing chaos cipher, special Sign is, the step S4 the specific steps are
Step S41: the transponder received is read in using mobile unit BTM and encrypts message, by system initial key Key and system Original state of the original state { Y (- 3), Y (- 2), Y (- 1) } as decryption;
Step S42: judge whether transponder encryption message is long message using mobile unit BTM, if so, from user bit Start to read 896 bit datas;If being otherwise short message, 256 bit datas are read since user bit;
Step S43: the data of reading are decrypted for one group according to 64 bit using vehicle-mounted BTM, obtain plaintext X (i);Plaintext X (i) decryption calculates as follows
Wherein, p=(cm1×key)mod(264), cmnFor the corresponding coefficient sets of Y (i-3);S-pIndicate the inverse P iteration of S box;
Step S44: decryption message is verified after decryption using vehicle-mounted BTM, verifying its every group rear two bit checks code is Whether no is 00, examine message in transmission process by noise jamming with this.If all check bit are correct, directly remove verification Position and filler, obtain user's message;If mistake occurs in check code, error checking group is marked and encryption is reported Text carries out secondary reception, and verifying is decrypted to label group, if the message for receiving decryption will mark group by verifying Cover and cancel label, otherwise, continue to until check bit it is correct, remove check bit and filler later, used Family message terminates program.
CN201810732792.XA 2018-07-05 2018-07-05 Railway transponder message security enhancement method based on self-synchronizing chaotic cipher Active CN108964870B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810732792.XA CN108964870B (en) 2018-07-05 2018-07-05 Railway transponder message security enhancement method based on self-synchronizing chaotic cipher

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810732792.XA CN108964870B (en) 2018-07-05 2018-07-05 Railway transponder message security enhancement method based on self-synchronizing chaotic cipher

Publications (2)

Publication Number Publication Date
CN108964870A true CN108964870A (en) 2018-12-07
CN108964870B CN108964870B (en) 2020-04-28

Family

ID=64485937

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810732792.XA Active CN108964870B (en) 2018-07-05 2018-07-05 Railway transponder message security enhancement method based on self-synchronizing chaotic cipher

Country Status (1)

Country Link
CN (1) CN108964870B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109861743A (en) * 2019-03-10 2019-06-07 西安电子科技大学 Data safe transmission method based on Big Dipper short message location information transport protocol
CN110856139A (en) * 2019-10-17 2020-02-28 北京全路通信信号研究设计院集团有限公司 Data sending method, receiving method and device
CN110868398A (en) * 2019-10-17 2020-03-06 北京全路通信信号研究设计院集团有限公司 Data frame encryption method, data frame decryption method and data frame decryption device
US20230027142A1 (en) * 2019-12-09 2023-01-26 Bigo Technology Pte. Ltd. Method and apparatus for encrypting and decrypting and reading and writing messages, computer device, and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101908024A (en) * 2010-08-17 2010-12-08 湖南源科高新技术有限公司 Encrypting method, device and hard disk
CN102027681A (en) * 2007-10-25 2011-04-20 原子能和辅助替代能源委员会 Method of and apparatus for synchronisation
EP2637131A1 (en) * 2008-09-22 2013-09-11 Visa International Service Association Method of performing transactions with contactless payment devices using pre-tap and two-tap operations
US20160344551A1 (en) * 2013-12-24 2016-11-24 Elliptic Technologies Inc. Area efficient cryptographic method and apparatus
CN106656475A (en) * 2017-01-09 2017-05-10 李朋林 Novel symmetric key algorithm for high speed encryption

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102027681A (en) * 2007-10-25 2011-04-20 原子能和辅助替代能源委员会 Method of and apparatus for synchronisation
EP2637131A1 (en) * 2008-09-22 2013-09-11 Visa International Service Association Method of performing transactions with contactless payment devices using pre-tap and two-tap operations
CN101908024A (en) * 2010-08-17 2010-12-08 湖南源科高新技术有限公司 Encrypting method, device and hard disk
US20160344551A1 (en) * 2013-12-24 2016-11-24 Elliptic Technologies Inc. Area efficient cryptographic method and apparatus
CN106656475A (en) * 2017-01-09 2017-05-10 李朋林 Novel symmetric key algorithm for high speed encryption

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
吴灵灵: "基于多态的混沌流密码算法的研究", 《CNKI中国硕士学位论文全文数据库基础科学辑》 *
江磊,魏震楠,刘明: "基于内外混合流水线的高吞吐率 AES 结构", 《电子技术应用》 *
石杨欣: "面向铁路应答器的轻量混沌分组密码研究", 《CNKI中国硕士学位论文全文数据库信息科技辑》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109861743A (en) * 2019-03-10 2019-06-07 西安电子科技大学 Data safe transmission method based on Big Dipper short message location information transport protocol
CN109861743B (en) * 2019-03-10 2021-03-23 西安电子科技大学 Data safety transmission method based on Beidou short message positioning information transmission protocol
CN110856139A (en) * 2019-10-17 2020-02-28 北京全路通信信号研究设计院集团有限公司 Data sending method, receiving method and device
CN110868398A (en) * 2019-10-17 2020-03-06 北京全路通信信号研究设计院集团有限公司 Data frame encryption method, data frame decryption method and data frame decryption device
US20230027142A1 (en) * 2019-12-09 2023-01-26 Bigo Technology Pte. Ltd. Method and apparatus for encrypting and decrypting and reading and writing messages, computer device, and storage medium

Also Published As

Publication number Publication date
CN108964870B (en) 2020-04-28

Similar Documents

Publication Publication Date Title
CN102317904B (en) System and methods for encryption with authentication integrity
Simmons Symmetric and asymmetric encryption
AU2008327506B2 (en) Method and system for encryption of data
CN108964870A (en) The safe Enhancement Method of railway transponder message based on motor synchronizing chaos cipher
US5161244A (en) Cryptographic system based on information difference
US5345507A (en) Secure message authentication for binary additive stream cipher systems
CN101645899B (en) Bidirectional authentication method and system based on symmetric encipherment algorithm
CN101710852A (en) LDPC code encoding/decoding method and encoder/decoder with encryption function
CN101779190A (en) Information transmission and integrated protection method
CN108833390B (en) Matrix transformation-based packet physical layer encryption method
CN107911354B (en) Composite parallel data encryption method
Saxena et al. Efficient signature scheme for delivering authentic control commands in the smart grid
Mihaljević et al. An approach for stream ciphers design based on joint computing over random and secret data
CN110572639A (en) video encryption and decryption evaluation tool and method based on GB35114 standard
CN111641500B (en) Encryption and decryption method for wireless video transmission safety of unmanned aerial vehicle
CN110278068B (en) LoRa communication encryption system based on chaos sequence
CN110266321B (en) Novel communication method and system based on polarization code
CN109861821B (en) Error coordination method for LWE public key password
CN109819438A (en) A kind of fountain coding wireless data safe transmission method based on AES encryption
CN101882991A (en) Communication data stream encryption method based on block cipher
US20130058483A1 (en) Public key cryptosystem and technique
CN115004559A (en) Polarity encoding based on data privacy protection
Simmons Symmetric and asymmetric encryption
Mihaljević A Framework for Stream Ciphers Based on Pseudorandomness, Randomness and Coding
Ahlswede Hiding Data-Selected Topics

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant