KR20160117366A - Wireless ciphering method using time synchronization in GPS - Google Patents

Wireless ciphering method using time synchronization in GPS Download PDF

Info

Publication number
KR20160117366A
KR20160117366A KR1020160039380A KR20160039380A KR20160117366A KR 20160117366 A KR20160117366 A KR 20160117366A KR 1020160039380 A KR1020160039380 A KR 1020160039380A KR 20160039380 A KR20160039380 A KR 20160039380A KR 20160117366 A KR20160117366 A KR 20160117366A
Authority
KR
South Korea
Prior art keywords
data
random number
time
wireless
generating
Prior art date
Application number
KR1020160039380A
Other languages
Korean (ko)
Inventor
김상희
Original Assignee
주식회사 다빈기술
디와이엘엔제이 주식회사
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 주식회사 다빈기술, 디와이엘엔제이 주식회사 filed Critical 주식회사 다빈기술
Publication of KR20160117366A publication Critical patent/KR20160117366A/en

Links

Images

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S19/00Satellite radio beacon positioning systems; Determining position, velocity or attitude using signals transmitted by such systems
    • G01S19/01Satellite radio beacon positioning systems transmitting time-stamped messages, e.g. GPS [Global Positioning System], GLONASS [Global Orbiting Navigation Satellite System] or GALILEO
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0041Arrangements at the transmitter end
    • H04L1/0042Encoding specially adapted to other signal generation operation, e.g. in order to reduce transmit distortions, jitter, or to improve signal shape
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/304Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy based on error correction codes, e.g. McEliece

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention relates to a wireless encryption method using time synchronization in a GPS, and more particularly, to a wireless encryption method using time synchronization in a GPS, which changes a frequency channel in accordance with the time synchronization of the GPS in order to encrypt wireless data stored in wireless equipment, the frequency channel selected by using random data, and transmits the wireless data, thereby preventing radio intercept from being blocked. The wireless encryption method comprises the steps of: generating a cryptogram by encrypting plain text received from a telegram communication terminal; generating random data; transmitting a bit stream including the cryptogram and the random data; and changing a frequency channel depending on the time synchronization of the GPS and the random data, and outputting data through the changed frequency channel. As a method proposed in the present invention to solve conventional security vulnerability by adding a hiding function during message telegram encryption communications, the wireless encryption method encrypts and transmits a message to be encrypted and sent, and at this time, changes a channel in accordance with the time synchronization of the GPS in a process of transmitting data, and transmits the data. The wireless encryption method designates a channel by using a random number generator, thereby enabling cipher communication in message telegram communications performed in a wireless environment having a hiding function.

Description

[0001] The present invention relates to a wireless ciphering method using time synchronization,

In particular, the present invention relates to a wireless encryption method using time-synchronization of geosynchronous time. In particular, in order to encrypt wireless data of a wireless device, a frequency channel is changed according to ZPS time synchronization and transmitted. At this time, And wirelessly intercepting the wireless eavesdropping by basically blocking the wireless eavesdropping.

This application is a Korean priority application filed on March 31, 2015, the contents of which are incorporated herein by reference.

Conventional cryptographic communication concealment techniques have been accomplished through mutual authentication and data encryption / decryption between trusted devices.

The encrypted communication must be preceded by the synchronization detection and the synchronization acquisition process so that the encryption device can normally perform the encrypted communication. Also, in order to perform cryptographic communication, a key exchange process must be preceded before a common cryptographic key can be formed to decrypt ciphertext. The present invention also includes a key exchange process and a synchronization pattern detection process for sharing a common encryption key.

In addition, error correction codes are used to protect important key information from transmission errors in key exchange. Therefore, the cryptographic device adopts an appropriate synchronous frame structure, a key exchange algorithm, and an error correction code according to the communication environment of the application section.

Korean Patent Laid-Open No. 10-2015-0078654 (published on Jul. 20, 2015), "Apparatus and method for encrypting video, server sharing encrypted video" Korean Patent No. 10-1318903 (issued on October 17, 2013), "Location Information Collection Server and Location Information Management Method"

The present invention proposes a method for solving a conventional security weakness by adding a secret function for message-specific cryptographic communication. The method encrypts and transmits a message to be encrypted and transmits the encrypted message. At this time, the channel is changed in accordance with the time- And a channel is changed by designating a channel by a random number generator so as to provide a method and apparatus for cryptographic communication concealment in message specialized communication in a radio environment having a concealment function.

It is another object of the present invention to provide a method for providing cryptographic security by transmitting key information inserted along with geospace synchronization information for each message message through a channel change and a random number generator.

A wireless encryption method using time stamp synchronization according to an embodiment of the present invention includes the steps of generating a cipher text by encrypting a plaintext received from a professional communication terminal, generating random number data, and transmitting the cipher text and the random number data Wherein the step of generating the ciphertext includes inserting a synchronization frame in front of the ciphertext, the method comprising the steps of: transmitting a bitstream; , The synchronization frame includes a synchronization pattern for distinguishing the random number data from the ciphertext and key information used for decrypting the ciphertext, the key information is generated by error correction encoding the random number and the time information, And changing the channel according to the random number value to output the data Time data synchronized with the GS time is used as source data, a time value is generated by applying a predetermined variable condition to the source data, and the channel is changed according to the generated time value and the random number value, Generating random number data in synchronization with generation of random number data in a step of generating the random number data to a side that receives the output data, and generating random number data based on the time value And generating the same time value as the decoded data.

Also, the variable condition causes the time value to be generated by adding or subtracting a preset unit time to the source data, and the unit time used for the variable condition is data of a variable function that can be changed through a user Lt; / RTI >

The generation of the random number data in the step of generating the random number data may be performed at a predetermined time period in which the user can be set and when the limit size of the cumulative method of the transmitted bit stream exceeds a predetermined size, Random number data different from the previous random number data is generated every time one of the conditions of the transmission times exceeds the preset number of transmission times, and the changed random number data is changed in accordance with the above-mentioned GSPS time synchronization and the random number value to output the data May be used as a random value in the step.

According to an embodiment of the present invention, there is provided a method for solving a conventional security weakness by adding a secret function for message-specific crypto-communication, which encrypts and transmits a message to be transmitted by encryption, The channel is changed by appropriately changing the channel, and the channel is changed. The channel is designated by the random number generator, thereby providing a cryptographic communication effect in message specialized communication in a wireless environment having a concealment function.

Further, the present invention has an effect of providing cipher security because the key information inserted together with the geofist synchronization information is transmitted through the channel change and random number generator for each message message.

FIG. 1 is a block diagram of a system in which a wireless encryption method using geofust time synchronization is performed according to an embodiment of the present invention
2 is a block diagram of a cryptographic communication bitstream according to an embodiment of the present invention;
3 is a block diagram illustrating a configuration of a cipher text transmission apparatus according to an embodiment of the present invention.
4 is a block diagram showing a configuration of a cipher text receiving apparatus according to an embodiment of the present invention;

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Reference will now be made in detail to the embodiments of the present invention, examples of which are illustrated in the accompanying drawings. These embodiments are described in sufficient detail to enable those skilled in the art to practice the invention. It should be understood that the various embodiments of the present invention are different, but need not be mutually exclusive. For example, certain features, structures, and characteristics described herein may be implemented in other embodiments without departing from the spirit and scope of the invention in connection with one embodiment. It is also to be understood that the position or arrangement of the individual components in each described embodiment may be varied without departing from the spirit and scope of the present invention.

The following detailed description is, therefore, not to be taken in a limiting sense, and the scope of the present invention is to be limited only by the appended claims, along with the full scope of equivalents to which the claims are entitled, if properly explained. In the drawings, like reference numerals refer to the same or similar functions throughout the several views.

While the present invention has been described in connection with what is presently considered to be the most practical and preferred embodiment, it is to be understood that the invention is not limited to the disclosed embodiments. Also, in certain cases, there may be a term selected arbitrarily by the applicant, in which case the meaning thereof will be described in detail in the description of the corresponding invention. Therefore, the term used in the present invention should be defined based on the meaning of the term, not on the name of a simple term, but on the entire contents of the present invention.

Whenever an element is referred to as " including " an element throughout the description, it is to be understood that the element may include other elements as well, without departing from the other elements unless specifically stated otherwise. In addition, the term " "... Module " or the like means a unit for processing at least one function or operation, which may be implemented in hardware or software, or a combination of hardware and software.

1 to 4, a wireless encryption method using time-slip time synchronization according to an embodiment of the present invention will be described.

FIG. 1 is a system block diagram illustrating a system configuration for encrypting secrets in message telephony communication according to an embodiment of the present invention. Referring to FIG.

Referring to Figure 1, the encryption device is located between a professional communication terminal and a wireless modem. The professional communication terminal and the encryption device can use the RS-232C standard for message communication. Also, since the cryptographic device transmits the ciphertext to the wireless channel, all the ciphering devices sharing the group key can decrypt the ciphertext. Here, the encrypted communication can use the broadcast method, and the wireless transmission environment can use the environment in which the transmission error is BER < = 10 -2 .

2 is a data format diagram illustrating a configuration of an encrypted communication bitstream according to an embodiment of the present invention. Referring to FIG. 2, since the encryption device according to the present invention transmits data to the wireless environment, the malicious eavesdropping device can not distinguish whether it is tapping the encrypted communication or intercepting a meaningless random number.

This is the key to concealing the encrypted communication proposed by the present invention. The synchronization frame is transmitted before the cipher text is transmitted. The synchronization frame consists of a synchronization pattern for identifying the boundary with a random number and key information capable of decrypting the cipher text. Therefore, it is necessary to know the defined synchronization pattern so that the cipher text can be normally received. The synchronous pattern of the present invention is defined as 16 bits and can be arbitrarily defined and used from among patterns having excellent autocorrelation properties.

3 is a block diagram illustrating a configuration of a cipher text transmission apparatus according to an embodiment of the present invention. 3, the transmitting apparatus includes a synchronization pattern generating unit 31, an error correction coding unit 32, a specialized encryption processing unit 33, a random number generating unit 34, a GPS time synchronization input unit 35, And a modulator 36.

The synchronization pattern generation unit 31 transmits the synchronization pattern to the radio environment through the modulator 36 when there is a message from the specialized communication terminal.

The error correction coding unit 32 encodes the key information value by encoding Bose-Chadhuri-Hocquenghem (BCH). Here, it is assumed that the key information is a random number and time information, and that the encryption apparatus has a group key in advance. The initial value is generated by using the random number and the time information, and the operation key is finally generated using the encryption algorithm function.

The specialized cipher processing unit 33 generates a cipher text by encrypting the plain text telegram using the generated operation key, and transmits the cipher text to the wireless channel through the modulator 35. [

The random number generator 34 generates a random number value which is key information, and time data to be synchronized in the GSPS time synchronization input unit 35 is input and is transmitted while changing channels according to the random number value.

When the specialized cipher processing unit 33 generates the cipher text by encrypting the plain text cipher text using the generated operation key, the modulator 36 is connected to receive the cipher text.

Meanwhile, the modulator 36 is connected to the random number generator 34 which generates the random number, and receives the random number value which is the key information. The modulator 36 mixes the received random number value with a time value synchronized with the time-to-failure time, modulates the signal into a bit stream form suitable for the radio channel, and wirelessly transmits the signal. Here, the modulator 36 generates a time value by applying a preset variable condition to the source data using the time data through the GSPS time synchronization input unit 35 as a source data, and then mixes the generated time value and the random number value Modulates the signal in the form of a bit stream suitable for the wireless channel, and wirelessly transmits the modulated signal.

Accordingly, the ciphertext receiving apparatus, which will be described later with reference to FIG. 4, can also generate the random number data synchronized with the random number data generating process of the random number generating unit 34 of the cipher text transmitting apparatus, And generates a time value equal to the time value on the basis of the ZPS time through the same condition as the condition, and decodes the modulated data in the modulator 36 based on the time value.

The variable condition for generating the time value of the modulator 36 is a condition for generating a time value by adding or subtracting a predetermined unit time to time data synchronized with the source time data, In addition, the unit time used for the variable condition may be variable function data that can be changed through the user.

The generation of the random number data through the random number generating unit 34 is performed when a predetermined period of time in which the user can be set and a limit size of the cumulative method of the bit stream transmitted through the modulator 36 exceeds a predetermined size, Whenever the number of times of transmission of the bitstream transmitted through the transmission path 36 is equal to or more than a predetermined number of times of transmission, random number data other than the previous random number data is generated, and the thus generated random number data is transmitted to the modulator 36 Is used as the time value in a process of modulating a signal in a bit stream form suitable for a radio channel through mixing of a random number value and a time value.

4 is a block diagram illustrating a configuration of a cipher text receiving apparatus according to an embodiment of the present invention. 4, the receiver includes a demodulator 41, a synchronization pattern detector 42, an error correction decoder 43, a decode decoder 44 and a DSP time synchronization extractor 45.

First, the data through the demodulator 41 receives the bit stream modulated in the wireless environment through the receiver including the transceiver.

The sync pattern detector 42 performs a function of detecting a sync pattern in the received bit stream.

After the synchronization pattern is detected and the synchronization acquisition determination is made, the error correction decoding unit 43 determines the received bitstream as the key information value (15, 7) and performs BCH decoding to extract the random number and the time information as the key information value .

The decryption processing unit 44 generates an operation key by using the extracted key information and the group key, decrypts the received cipher text, and decrypts the received cipher text into a plain text.

A transmission procedure for encrypting a message message will be described. When a transmission starts, a random number is generated and a channel is selected according to a random number value. The key information includes a random number value to be sent and a piece of paper time information before transmission to the wireless channel. Generates key information including the random number and the time information, and performs error correction encoding on the key information to generate a key information value to be transmitted. And transmits all the key information values. The error correction encoded key information is inserted into the cipher text and the cipher text encrypted with the operation key is transmitted. When the transmission of the ciphertext is completed, the mobile station moves to the transmission start position and generates a random number until the next message message is received, and transmits the random number to the wireless channel. Here, since the key information value is unique to each message text, the operation key changes the channel every time the message is sent, thereby allowing secure ciphertext transmission.

A reception procedure for encrypting a message message will be described. When reception starts, a synchronization pattern is detected from received data. Corrects and decodes the received data, and obtains random number and time information, which are transmitted key information.

Generates an operation key for decryption using the key information value acquired in the step and decrypts the received cipher text.

Deciphering deciphering until the special reception is completed, and returning to the step of detecting the synchronous pattern to receive the next message when completed.

31: Sync pattern generation unit
32: error correction code unit
33:
34:
35: a GPS time synchronization input unit
36: Modulator
41: Demodulator
42: Sync pattern detector
43: Error correction decoding unit
44:
45: a GPS time synchronization extracting unit

Claims (3)

Generating a cipher text by encrypting a plain text received from the professional communication terminal;
Generating random number data;
Transmitting the bit stream composed of the cipher text and the random number data;
And outputting the data by changing the channel according to the time stamp synchronization and the random number value,
The step of generating the ciphertext includes inserting a synchronization frame before the ciphertext, wherein the synchronization frame includes a synchronization pattern for distinguishing the random number data from the ciphertext, and key information used for deciphering the ciphertext, The key information is generated by error correction encoding the random number and time information,
In the step of outputting the data by changing the channel according to the time stamp synchronization and the random number value, time data synchronized with the GSPS time is used as the source data, and a time value is generated by applying a variable condition preset in the source data , Changing the channel according to the generated time value and the random number value, and outputting the data,
Generating random number data synchronously with generation of random number data in the step of generating the random number data, and generating a random number data having the same time value as the time value based on the geSiS time based on the same condition as the variable condition And decrypting the received modulated data, wherein the received data is decrypted.
The method according to claim 1,
Wherein the variable condition causes the time value to be generated by adding or subtracting a predetermined unit time to the source data,
Wherein the unit time used for the variable condition is variable function data that can be changed through a user.
3. The method of claim 2,
The generation of the random number data in the step of generating the random number data may be performed at a predetermined time period in which the user can be set and at a time when the limit size of the cumulative method of the bit stream to be transmitted exceeds a predetermined size and the number of transmissions When random number data different from the previous random number data is generated at any one of the conditions of the predetermined number of transmission times and the changed random number data is changed in accordance with the GSPS time synchronization and the random number value to output the data Wherein the random number is a random number.
KR1020160039380A 2015-03-31 2016-03-31 Wireless ciphering method using time synchronization in GPS KR20160117366A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR1020150045671 2015-03-31
KR20150045671 2015-03-31

Publications (1)

Publication Number Publication Date
KR20160117366A true KR20160117366A (en) 2016-10-10

Family

ID=57146398

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020160039380A KR20160117366A (en) 2015-03-31 2016-03-31 Wireless ciphering method using time synchronization in GPS

Country Status (1)

Country Link
KR (1) KR20160117366A (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101318903B1 (en) 2011-11-15 2013-10-17 동아대학교 산학협력단 Location Data Server and Method for Managing of Location Data using the same
KR20150078654A (en) 2013-12-31 2015-07-08 주식회사 케이티 Apparatus and method for encrypting image taken by vehicle, and server for shearing encrypted image

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101318903B1 (en) 2011-11-15 2013-10-17 동아대학교 산학협력단 Location Data Server and Method for Managing of Location Data using the same
KR20150078654A (en) 2013-12-31 2015-07-08 주식회사 케이티 Apparatus and method for encrypting image taken by vehicle, and server for shearing encrypted image

Similar Documents

Publication Publication Date Title
US8687810B2 (en) Chaotic cipher system and method for secure communication
JP4094216B2 (en) Automatic resynchronization of cryptographic synchronization information
US9960911B2 (en) System and method for securing wireless communication through physical layer control and data channel
KR20030085094A (en) Encrypting device
US8699712B2 (en) Randomization of plain text for GSM SACCH
KR100430358B1 (en) Radio communication device and radio communication method
KR101675332B1 (en) Data commincaiton method for vehicle, Electronic Control Unit and system thereof
JP2006211687A (en) Method for secure transmission of mobile communication subscriber identifier
US20040137878A1 (en) AV data wireless communication system, communication apparatus, and electronic device
JP4379031B2 (en) Information transmission method and information transmitting apparatus and information receiving apparatus used therefor
AU2016204552A1 (en) Method and apparatus for authenticated encryption of audio
JP2005244986A (en) Method for generating cryptosync
KR20060011999A (en) Des algorithm-based encryption method
CN110572261A (en) data encryption transmission method
CN106604275B (en) Information transmission encryption and decryption method and system based on mobile internet
KR100866848B1 (en) Hiding method and apparatus for a message cipher communications on radio channel
KR20160117366A (en) Wireless ciphering method using time synchronization in GPS
KR102078903B1 (en) reliable data checking method of wireless encrypted communication
KR20010008808A (en) Encryption method by scramble on wlan
CN100479363C (en) A method for quick recovery of cipher synchronization for secure voice communication in mobile communication system
KR20110050932A (en) Apparatus and method for mutual authentication between reader and tag in radio frequency identification system
JP5029815B2 (en) Descrambler, communication device, identification method and program
CN107820240A (en) Short message Encrypt and Decrypt method and Android operation system based on Android operation system
KR100492507B1 (en) Security method for wireless data transmission and apparatus of transmitting/receiving thereof
Zhang et al. Research on end-to-end encryption of TETRA

Legal Events

Date Code Title Description
A201 Request for examination
E902 Notification of reason for refusal
E902 Notification of reason for refusal
E701 Decision to grant or registration of patent right