KR20160117366A - Wireless ciphering method using time synchronization in GPS - Google Patents
Wireless ciphering method using time synchronization in GPS Download PDFInfo
- Publication number
- KR20160117366A KR20160117366A KR1020160039380A KR20160039380A KR20160117366A KR 20160117366 A KR20160117366 A KR 20160117366A KR 1020160039380 A KR1020160039380 A KR 1020160039380A KR 20160039380 A KR20160039380 A KR 20160039380A KR 20160117366 A KR20160117366 A KR 20160117366A
- Authority
- KR
- South Korea
- Prior art keywords
- data
- random number
- time
- wireless
- generating
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S19/00—Satellite radio beacon positioning systems; Determining position, velocity or attitude using signals transmitted by such systems
- G01S19/01—Satellite radio beacon positioning systems transmitting time-stamped messages, e.g. GPS [Global Positioning System], GLONASS [Global Orbiting Navigation Satellite System] or GALILEO
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0041—Arrangements at the transmitter end
- H04L1/0042—Encoding specially adapted to other signal generation operation, e.g. in order to reduce transmit distortions, jitter, or to improve signal shape
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
- H04L9/0656—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/304—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy based on error correction codes, e.g. McEliece
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Radar, Positioning & Navigation (AREA)
- Remote Sensing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
In particular, the present invention relates to a wireless encryption method using time-synchronization of geosynchronous time. In particular, in order to encrypt wireless data of a wireless device, a frequency channel is changed according to ZPS time synchronization and transmitted. At this time, And wirelessly intercepting the wireless eavesdropping by basically blocking the wireless eavesdropping.
This application is a Korean priority application filed on March 31, 2015, the contents of which are incorporated herein by reference.
Conventional cryptographic communication concealment techniques have been accomplished through mutual authentication and data encryption / decryption between trusted devices.
The encrypted communication must be preceded by the synchronization detection and the synchronization acquisition process so that the encryption device can normally perform the encrypted communication. Also, in order to perform cryptographic communication, a key exchange process must be preceded before a common cryptographic key can be formed to decrypt ciphertext. The present invention also includes a key exchange process and a synchronization pattern detection process for sharing a common encryption key.
In addition, error correction codes are used to protect important key information from transmission errors in key exchange. Therefore, the cryptographic device adopts an appropriate synchronous frame structure, a key exchange algorithm, and an error correction code according to the communication environment of the application section.
The present invention proposes a method for solving a conventional security weakness by adding a secret function for message-specific cryptographic communication. The method encrypts and transmits a message to be encrypted and transmits the encrypted message. At this time, the channel is changed in accordance with the time- And a channel is changed by designating a channel by a random number generator so as to provide a method and apparatus for cryptographic communication concealment in message specialized communication in a radio environment having a concealment function.
It is another object of the present invention to provide a method for providing cryptographic security by transmitting key information inserted along with geospace synchronization information for each message message through a channel change and a random number generator.
A wireless encryption method using time stamp synchronization according to an embodiment of the present invention includes the steps of generating a cipher text by encrypting a plaintext received from a professional communication terminal, generating random number data, and transmitting the cipher text and the random number data Wherein the step of generating the ciphertext includes inserting a synchronization frame in front of the ciphertext, the method comprising the steps of: transmitting a bitstream; , The synchronization frame includes a synchronization pattern for distinguishing the random number data from the ciphertext and key information used for decrypting the ciphertext, the key information is generated by error correction encoding the random number and the time information, And changing the channel according to the random number value to output the data Time data synchronized with the GS time is used as source data, a time value is generated by applying a predetermined variable condition to the source data, and the channel is changed according to the generated time value and the random number value, Generating random number data in synchronization with generation of random number data in a step of generating the random number data to a side that receives the output data, and generating random number data based on the time value And generating the same time value as the decoded data.
Also, the variable condition causes the time value to be generated by adding or subtracting a preset unit time to the source data, and the unit time used for the variable condition is data of a variable function that can be changed through a user Lt; / RTI >
The generation of the random number data in the step of generating the random number data may be performed at a predetermined time period in which the user can be set and when the limit size of the cumulative method of the transmitted bit stream exceeds a predetermined size, Random number data different from the previous random number data is generated every time one of the conditions of the transmission times exceeds the preset number of transmission times, and the changed random number data is changed in accordance with the above-mentioned GSPS time synchronization and the random number value to output the data May be used as a random value in the step.
According to an embodiment of the present invention, there is provided a method for solving a conventional security weakness by adding a secret function for message-specific crypto-communication, which encrypts and transmits a message to be transmitted by encryption, The channel is changed by appropriately changing the channel, and the channel is changed. The channel is designated by the random number generator, thereby providing a cryptographic communication effect in message specialized communication in a wireless environment having a concealment function.
Further, the present invention has an effect of providing cipher security because the key information inserted together with the geofist synchronization information is transmitted through the channel change and random number generator for each message message.
FIG. 1 is a block diagram of a system in which a wireless encryption method using geofust time synchronization is performed according to an embodiment of the present invention
2 is a block diagram of a cryptographic communication bitstream according to an embodiment of the present invention;
3 is a block diagram illustrating a configuration of a cipher text transmission apparatus according to an embodiment of the present invention.
4 is a block diagram showing a configuration of a cipher text receiving apparatus according to an embodiment of the present invention;
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Reference will now be made in detail to the embodiments of the present invention, examples of which are illustrated in the accompanying drawings. These embodiments are described in sufficient detail to enable those skilled in the art to practice the invention. It should be understood that the various embodiments of the present invention are different, but need not be mutually exclusive. For example, certain features, structures, and characteristics described herein may be implemented in other embodiments without departing from the spirit and scope of the invention in connection with one embodiment. It is also to be understood that the position or arrangement of the individual components in each described embodiment may be varied without departing from the spirit and scope of the present invention.
The following detailed description is, therefore, not to be taken in a limiting sense, and the scope of the present invention is to be limited only by the appended claims, along with the full scope of equivalents to which the claims are entitled, if properly explained. In the drawings, like reference numerals refer to the same or similar functions throughout the several views.
While the present invention has been described in connection with what is presently considered to be the most practical and preferred embodiment, it is to be understood that the invention is not limited to the disclosed embodiments. Also, in certain cases, there may be a term selected arbitrarily by the applicant, in which case the meaning thereof will be described in detail in the description of the corresponding invention. Therefore, the term used in the present invention should be defined based on the meaning of the term, not on the name of a simple term, but on the entire contents of the present invention.
Whenever an element is referred to as " including " an element throughout the description, it is to be understood that the element may include other elements as well, without departing from the other elements unless specifically stated otherwise. In addition, the term " "... Module " or the like means a unit for processing at least one function or operation, which may be implemented in hardware or software, or a combination of hardware and software.
1 to 4, a wireless encryption method using time-slip time synchronization according to an embodiment of the present invention will be described.
FIG. 1 is a system block diagram illustrating a system configuration for encrypting secrets in message telephony communication according to an embodiment of the present invention. Referring to FIG.
Referring to Figure 1, the encryption device is located between a professional communication terminal and a wireless modem. The professional communication terminal and the encryption device can use the RS-232C standard for message communication. Also, since the cryptographic device transmits the ciphertext to the wireless channel, all the ciphering devices sharing the group key can decrypt the ciphertext. Here, the encrypted communication can use the broadcast method, and the wireless transmission environment can use the environment in which the transmission error is BER < = 10 -2 .
2 is a data format diagram illustrating a configuration of an encrypted communication bitstream according to an embodiment of the present invention. Referring to FIG. 2, since the encryption device according to the present invention transmits data to the wireless environment, the malicious eavesdropping device can not distinguish whether it is tapping the encrypted communication or intercepting a meaningless random number.
This is the key to concealing the encrypted communication proposed by the present invention. The synchronization frame is transmitted before the cipher text is transmitted. The synchronization frame consists of a synchronization pattern for identifying the boundary with a random number and key information capable of decrypting the cipher text. Therefore, it is necessary to know the defined synchronization pattern so that the cipher text can be normally received. The synchronous pattern of the present invention is defined as 16 bits and can be arbitrarily defined and used from among patterns having excellent autocorrelation properties.
3 is a block diagram illustrating a configuration of a cipher text transmission apparatus according to an embodiment of the present invention. 3, the transmitting apparatus includes a synchronization
The synchronization
The error
The specialized
The
When the specialized
Meanwhile, the
Accordingly, the ciphertext receiving apparatus, which will be described later with reference to FIG. 4, can also generate the random number data synchronized with the random number data generating process of the random
The variable condition for generating the time value of the
The generation of the random number data through the random
4 is a block diagram illustrating a configuration of a cipher text receiving apparatus according to an embodiment of the present invention. 4, the receiver includes a
First, the data through the
The
After the synchronization pattern is detected and the synchronization acquisition determination is made, the error
The
A transmission procedure for encrypting a message message will be described. When a transmission starts, a random number is generated and a channel is selected according to a random number value. The key information includes a random number value to be sent and a piece of paper time information before transmission to the wireless channel. Generates key information including the random number and the time information, and performs error correction encoding on the key information to generate a key information value to be transmitted. And transmits all the key information values. The error correction encoded key information is inserted into the cipher text and the cipher text encrypted with the operation key is transmitted. When the transmission of the ciphertext is completed, the mobile station moves to the transmission start position and generates a random number until the next message message is received, and transmits the random number to the wireless channel. Here, since the key information value is unique to each message text, the operation key changes the channel every time the message is sent, thereby allowing secure ciphertext transmission.
A reception procedure for encrypting a message message will be described. When reception starts, a synchronization pattern is detected from received data. Corrects and decodes the received data, and obtains random number and time information, which are transmitted key information.
Generates an operation key for decryption using the key information value acquired in the step and decrypts the received cipher text.
Deciphering deciphering until the special reception is completed, and returning to the step of detecting the synchronous pattern to receive the next message when completed.
31: Sync pattern generation unit
32: error correction code unit
33:
34:
35: a GPS time synchronization input unit
36: Modulator
41: Demodulator
42: Sync pattern detector
43: Error correction decoding unit
44:
45: a GPS time synchronization extracting unit
Claims (3)
Generating random number data;
Transmitting the bit stream composed of the cipher text and the random number data;
And outputting the data by changing the channel according to the time stamp synchronization and the random number value,
The step of generating the ciphertext includes inserting a synchronization frame before the ciphertext, wherein the synchronization frame includes a synchronization pattern for distinguishing the random number data from the ciphertext, and key information used for deciphering the ciphertext, The key information is generated by error correction encoding the random number and time information,
In the step of outputting the data by changing the channel according to the time stamp synchronization and the random number value, time data synchronized with the GSPS time is used as the source data, and a time value is generated by applying a variable condition preset in the source data , Changing the channel according to the generated time value and the random number value, and outputting the data,
Generating random number data synchronously with generation of random number data in the step of generating the random number data, and generating a random number data having the same time value as the time value based on the geSiS time based on the same condition as the variable condition And decrypting the received modulated data, wherein the received data is decrypted.
Wherein the variable condition causes the time value to be generated by adding or subtracting a predetermined unit time to the source data,
Wherein the unit time used for the variable condition is variable function data that can be changed through a user.
The generation of the random number data in the step of generating the random number data may be performed at a predetermined time period in which the user can be set and at a time when the limit size of the cumulative method of the bit stream to be transmitted exceeds a predetermined size and the number of transmissions When random number data different from the previous random number data is generated at any one of the conditions of the predetermined number of transmission times and the changed random number data is changed in accordance with the GSPS time synchronization and the random number value to output the data Wherein the random number is a random number.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150045671 | 2015-03-31 | ||
KR20150045671 | 2015-03-31 |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20160117366A true KR20160117366A (en) | 2016-10-10 |
Family
ID=57146398
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020160039380A KR20160117366A (en) | 2015-03-31 | 2016-03-31 | Wireless ciphering method using time synchronization in GPS |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20160117366A (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101318903B1 (en) | 2011-11-15 | 2013-10-17 | 동아대학교 산학협력단 | Location Data Server and Method for Managing of Location Data using the same |
KR20150078654A (en) | 2013-12-31 | 2015-07-08 | 주식회사 케이티 | Apparatus and method for encrypting image taken by vehicle, and server for shearing encrypted image |
-
2016
- 2016-03-31 KR KR1020160039380A patent/KR20160117366A/en active IP Right Grant
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101318903B1 (en) | 2011-11-15 | 2013-10-17 | 동아대학교 산학협력단 | Location Data Server and Method for Managing of Location Data using the same |
KR20150078654A (en) | 2013-12-31 | 2015-07-08 | 주식회사 케이티 | Apparatus and method for encrypting image taken by vehicle, and server for shearing encrypted image |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8687810B2 (en) | Chaotic cipher system and method for secure communication | |
JP4094216B2 (en) | Automatic resynchronization of cryptographic synchronization information | |
US9960911B2 (en) | System and method for securing wireless communication through physical layer control and data channel | |
KR20030085094A (en) | Encrypting device | |
US8699712B2 (en) | Randomization of plain text for GSM SACCH | |
KR100430358B1 (en) | Radio communication device and radio communication method | |
KR101675332B1 (en) | Data commincaiton method for vehicle, Electronic Control Unit and system thereof | |
JP2006211687A (en) | Method for secure transmission of mobile communication subscriber identifier | |
US20040137878A1 (en) | AV data wireless communication system, communication apparatus, and electronic device | |
JP4379031B2 (en) | Information transmission method and information transmitting apparatus and information receiving apparatus used therefor | |
AU2016204552A1 (en) | Method and apparatus for authenticated encryption of audio | |
JP2005244986A (en) | Method for generating cryptosync | |
KR20060011999A (en) | Des algorithm-based encryption method | |
CN110572261A (en) | data encryption transmission method | |
CN106604275B (en) | Information transmission encryption and decryption method and system based on mobile internet | |
KR100866848B1 (en) | Hiding method and apparatus for a message cipher communications on radio channel | |
KR20160117366A (en) | Wireless ciphering method using time synchronization in GPS | |
KR102078903B1 (en) | reliable data checking method of wireless encrypted communication | |
KR20010008808A (en) | Encryption method by scramble on wlan | |
CN100479363C (en) | A method for quick recovery of cipher synchronization for secure voice communication in mobile communication system | |
KR20110050932A (en) | Apparatus and method for mutual authentication between reader and tag in radio frequency identification system | |
JP5029815B2 (en) | Descrambler, communication device, identification method and program | |
CN107820240A (en) | Short message Encrypt and Decrypt method and Android operation system based on Android operation system | |
KR100492507B1 (en) | Security method for wireless data transmission and apparatus of transmitting/receiving thereof | |
Zhang et al. | Research on end-to-end encryption of TETRA |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
E902 | Notification of reason for refusal | ||
E701 | Decision to grant or registration of patent right |