TW389016B - Encryption device for communication system and method thereof - Google Patents
Encryption device for communication system and method thereof Download PDFInfo
- Publication number
- TW389016B TW389016B TW87117561A TW87117561A TW389016B TW 389016 B TW389016 B TW 389016B TW 87117561 A TW87117561 A TW 87117561A TW 87117561 A TW87117561 A TW 87117561A TW 389016 B TW389016 B TW 389016B
- Authority
- TW
- Taiwan
- Prior art keywords
- signal
- encrypted
- communication device
- message
- transmitted
- Prior art date
Links
Abstract
Description
A7 B7 五、發明説明(5·1發明領域 本發明係有關於一種將通訊裝置之間的通訊加密 (encrypt丨〇η) ’以防止被竊聽的袭置,特別是有關於一種 將電話之閉的通訊加密,以防止被竊聽的裝25-2發明背景 經濟部中央標準局員工消費合作社印製 一般通訊系統在進行通訊時,因為其傳 無經過特別處理’所以只要在兩個通訊系統之 的過程中接收到此訊號者,都可以直接了解訊 訊息9故若有竊聽者想竊聽兩個通訊裝置之 時’以電話為例,竊聽者只需對此二電話之間 旁通(by pass)到另一通訊裝置,即可以接收到 信號,並藉以獲得二電話之間所傳送的訊息。 通訊方法很容易被竊聽,尤其是無線通訊,更 者竊聽其通訊内容。 一般傳統的通訊系統之竊聽防止裝置, 解決通訊系統太易於被竊聽的問題,所以傳統 防竊聽裝置是將二通訊系統之間的通訊信號 數段,此數段頻譜之訊號經過頻率轉移之後, 此數段之頻蟠調整其回到其原來的頻譜位置, 解調出通訊信號内原來所含的訊息。因此即使 到通訊信號,因為其不知通訊信號被分成數段 此數段頻譜於頻譜上的位置是如何調整的,故 送的訊號並 間傳輸訊號 號所包含的 間所傳遞的 的通訊線路 其間的通訊 所以傳統的 容易被竊聽 即是為了要 的通訊系統 的頻譜分成 接收端即對 以使接收端 竊聽者接收 頻譜之後, 亦無法解調 {請先閲讀背面之注意»項再填寫本頁) 10^. 訂 本紙張尺度適用中國國家搞準(CNS ) Λ4規格(2丨OX297公犮) 經濟部中央樣準局®C工消費合作社印装 A7 B7 五、發明説明( 出通訊信號内所包含的訊息。 然而一般傳統的防竊聽裝置所用技術是類比式 的’並且其使用的方法有一些缺點,例如在將通訊信號調 整其頻燔位置時,其是由傳统防竊聽裝置中的頻率調換裝 置所執行的,所以其頻率讕換的方式,是固定於傳统防竊 聽裝置中的,若竊聽者也具有相同廠牌或是相同調換頻燔 方法之裝置,則竊聽者仍然可以對所接收到的通訊信號處 理,以獲得其中之訊息。甚蓋竊聽者只要具有PBX端, 則竊聽者仍然可以直接聽到通話内容。尤其是因為技術上 的問題,頻譜調換的方法並不會有太多種,所以即使竊聽 者不具有相同廠牌的防竊聽裝置,亦可竊聽而得到兩通訊 裝置之間所傳送之訊息。另外,對傳統的類比式防竊聽裝 置而言’仍然必須要對電話線電壓準位的校準,方能使傳 統之防竊聽裝置進行運作。 另一種傳統的防狂聽裝置是数位式的,其為一種數 位保密裝置’其雖然可以使得無法由ΡΒΧ端直接聽到通 話内容。但是其缺點是密碼是固定而無法改變的,所以藕 聽者仍可能破解密碼而進行竊聽。另外,尚有一種是密竭 可以改變的,但是其必須將密碼在電話線上傳輪給對方, 對方才能據以將通訊信號中的訊息解出,如此才能進行通 訊。但是此種方式仍有可能會因為傳輸密碼給對方時,被 竊聽者接收而破解’以致竊聽者仍能進行竊聽。此外使用 此種數位保密裝置的通訊系統中間的訊號傳輪,必須使用 品質非常高的通訊線路,否則往往兩通訊者無法通訊成 私紙張尺度適闲中國國家梂準 ( CNS)A4坭格(2丨0χ297公楚) *(請先閲讀背面之注意事項再填寫木頁}A7 B7 V. Description of the Invention (5.1 Field of the Invention The present invention relates to a method of encrypting communication between communication devices to prevent eavesdropping, and in particular to a method of closing a telephone The communication is encrypted to prevent eavesdropping. 25-2 BACKGROUND OF THE INVENTION Employees' cooperatives of the Central Standards Bureau of the Ministry of Economic Affairs print general communication systems when communicating, because the transmission has not been specially processed. Anyone who receives this signal in the process can directly understand the message. Therefore, if an eavesdropper wants to eavesdrop on two communication devices, take the phone as an example, the eavesdropper only needs to pass between the two phones. To another communication device, you can receive the signal and use it to obtain the message transmitted between the two phones. The communication method is easy to be eavesdropped, especially wireless communication, and even to eavesdrop on its communication content. General eavesdropping of traditional communication systems Prevent the device and solve the problem that the communication system is too easy to be eavesdropped. Therefore, the traditional anti-eavesdropping device is to divide the communication signal between the two communication systems into several segments. After the frequency spectrum signal is shifted, the frequency of this number of bands is adjusted to return to its original frequency spectrum position, and the original information contained in the communication signal is demodulated. Therefore, even if it is a communication signal, it does not know that the communication signal is divided into numbers. How to adjust the position of these spectrums on the spectrum, so the transmitted signals are transmitted in parallel and the communication lines included in the signals are used to communicate between them. Therefore, the traditional system that is easy to be intercepted is the communication system required. The spectrum is divided into the receiving end, so that the eavesdropper at the receiving end cannot demodulate after receiving the spectrum {Please read the note on the back »before filling this page) 10 ^. The revised paper size is applicable to China's national standard (CNS) Λ4 specification (2 丨 OX297) 犮 A7 B7 printed by the Central Bureau of Standards of the Ministry of Economic Affairs® C Industrial Consumer Cooperatives 5. Description of the invention (the information contained in the communication signal. However, the technology used in traditional anti-eavesdropping devices is analog And its method has some disadvantages. For example, when adjusting the communication signal to its frequency position, it is used in traditional anti-eavesdropping devices. The frequency switching device is implemented, so the frequency switching method is fixed in the traditional anti-eavesdropping device. If the eavesdropper also has the same brand or the same frequency switching method device, the eavesdropper can still The received communication signal is processed to obtain the information in it. Even if the eavesdropper has a PBX terminal, the eavesdropper can still hear the call directly. Especially because of technical problems, there are not many methods for spectrum switching. Therefore, even if the eavesdroppers do not have the same brand of anti-eavesdropping device, they can eavesdrop and obtain the message transmitted between the two communication devices. In addition, for the traditional analog anti-eavesdropping device, it is still necessary to The calibration of the level can enable the traditional anti-eavesdropping device to operate. Another traditional anti-bugging device is digital, which is a kind of digital security device. Although it can prevent the call content from being heard directly by the PBX terminal. However, the disadvantage is that the password is fixed and cannot be changed, so the listener may still crack the password and eavesdrop. In addition, there is still a type that can be changed, but it must pass the password to the other party on the phone line so that the other party can extract the information in the communication signal based on this, so that the communication can be performed. But this method may still be cracked because it is received by eavesdroppers when transmitting the password to the other party, so that eavesdroppers can still eavesdrop. In addition, the signal transmission wheel in the middle of the communication system using such a digital security device must use a very high-quality communication line, otherwise the two correspondents cannot communicate into a private paper. The Chinese National Standards (CNS) A4 standard (2)丨 0χ297 公 楚) * (Please read the notes on the back before filling out the wooden page}
A7 B7 五 經濟部中央橾隼局貝工消費合作社印製 、發明説明( 功’亦即其通話連綠的困難度後高,^ 所以此種數位保密裝 置亦不是最佳的通訊保密裝置。 5·3發明S的及概遠 鑒於上述之發明背景中,傳 • t^ ^ ^ , X 择·的通訊系統防竊聽裝 A 力致防止竊聽的竊取訊 息,並且其連線成功率不高,使用·χ> 氏用不方便,同時因為其必 須先經過設定方可使用,所以使用去Α Ϋ自行安裝時亦造成不 變。所以本發明的加密數位保密裴瞀* χ其主要目的即是要防 止竊聽者竊取二通訊系統之間所傳通α Α 得遞的訊息,使其無法自 所接收到的訊號中解出該訊息。 根據以上所述之目的,本發明提供了_们^位 保密裝置,係用於電性搞合至第一通訊裝置,並且第二通 訊裝置鏈性耦合至另一個加密數位保密裝置,使第一 裝置欲經由一媒介(media)傳输訊息至第二通訊裝置時, 防止此訊息被傳送到第一及第二通訊裝置以外,此加密數 位保密裝置包含下列元件:類比/數位轉換裝置,用於將 此訊息數位化’以形成數位訊號。加密/解密裝置,用於 將數位訊號’以密碼產生裝置所產生的密碼加密,而產生 加密訊號。調變/解調變裝置’用於對由中央處理單元所 傳送過來的加密訊號調變(modu丨ate),以產生調變訊號, 使其適合於媒介中傳送。而其中上述之訊息可以為下列其 中之一:語音、視訊以及資料(data)。另外,本發明的一 實施例尚可以包含壓缩/解壓缩裝置,以壓缩數位訊號的 本紙張尺度通用中a國家揉率(CNS >A4規格(210X297公釐) •(请先閲讀背面之注意^項再填寫本頁) 訂 五、發明説明( A7 B7 資料量,或是將經過壓缩的訊號解壓缩以回復其原來的 資料量•另亦可包含攪碼/解攪碘裝置,以將所要處理的 訊號中的位元順序依照一預定順序調換,或是將經過攪碼 的訊號之位元恢復其原來的位元順序。 本發明的一較佳實施例中的密碼產生裝置係以一 RSA演算法產生密碑,此密爲包含公開金请以及私人金 鑰。在第一逯訊系統端的加密數位保密裝置與第二通訊系 統端的加密數位保密裝置直接電性耦合時,係依據RSa 廣算法將與第一通訊系統連線之加密數位保密裝置的公 開金鑰,傳送到舆第二通訊系統連線之加 並健存之。同時將與第二通訊系統連線之加密數 置之公開金鑰傳送到與第一通訊系統連線之加密‘裝 密裝置並館存之。另外,與第一通訊系統連線之:保 保密裝置和與第二通訊系統連線之加密數位保密裝位 過媒介電性耦合時,係依據RSA演算法與第一加置逯 保密裝置中的壓縮訊號共同產生之第二密碼而產生數位 一加密數位保密裝置之公開金鑰,並將其傳送到第-此第 數位保密裝置而存之 密 二請先閱讀背面之注意事項再填寫本夏 -•Ό-- ’ ϋ J1 : I n n I · 5-4圈式簡單說明 經濟部中央標準局貝工消費合作社印製 圖一使用者將電話透過本發明的加密數位保 置,舆另一個使用本發明的加密數位保密裝置舆電話 的使用者進行保密通訊時的架構圖。 圈二為本發明加密數位保密裝置之一較佳 密裝 迷缘 施例 tf^i ^^^1 In mi » t紙張尺度適用中國困家標準(CNS ) A4坭格(2丨〇χ297公楚A7 B7 5. Printed by the Central Government Bureau of the Ministry of Economic Affairs, Shellfish Consumer Cooperative, printed and invented the description (work, that is, the difficulty of talking even green), so this digital security device is not the best communication security device. 5 In view of the above background of the invention of 3 invention S, the communication system of t ^ ^ ^, X optional · Anti-eavesdropping equipment A is committed to prevent eavesdropping and stealing information, and its connection success rate is not high, use · Χ > It is inconvenient to use. At the same time, it must be set before it can be used, so it will not change when it is installed by itself. Therefore, the encrypted digital security of the present invention Pei * * The main purpose is to prevent The eavesdropper steals the message passed by α Α between the two communication systems, making it impossible to extract the message from the received signal. According to the purpose described above, the present invention provides a security device Is used to electrically couple to the first communication device, and the second communication device is chain-coupled to another encrypted digital security device, so that the first device wants to transmit information to the second communication device via a medium. To prevent this message from being transmitted outside the first and second communication devices, the encrypted digital security device includes the following components: analog / digital conversion device for digitizing this message to form a digital signal. Encryption / decryption device for The digital signal is encrypted with a password generated by a password generating device to generate an encrypted signal. The modulation / demodulation device is used to modulate the encrypted signal transmitted by the central processing unit to generate Modulating the signal to make it suitable for transmission in a medium. The above-mentioned information may be one of the following: voice, video, and data. In addition, an embodiment of the present invention may further include a compression / decompression device, Compressed digital signals on this paper scale are commonly used in a country (CNS > A4 size (210X297 mm) • (Please read the note on the back before filling in this page) Order 5. Description of the invention (A7 B7 data volume , Or decompress the compressed signal to restore its original data amount. • It can also include a codec / deintermediate device to set the bits in the signal to be processed. The order is switched according to a predetermined order, or the bits of the scrambled signal are restored to their original bit order. The cryptographic generating device in a preferred embodiment of the present invention generates a secret monument by using an RSA algorithm. The secret contains the public key and the private key. When the encrypted digital security device on the first communication system side and the encrypted digital security device on the second communication system are directly and electrically coupled, it will be connected to the first communication system according to the RSa algorithm. The public key of the encrypted digital security device of the line is transmitted to the second communication system and is added and saved. At the same time, the public key of the encrypted number connected to the second communication system is transmitted to the first communication. The system's encrypted encryption device is installed and stored in the library. In addition, when connected to the first communication system: the security device and the encrypted digital security device connected to the second communication system are electrically coupled through the medium. Generate a digital-encrypted digital security device public key based on the second password generated by the RSA algorithm and the first encrypted signal in the security device, and send it to the- The digital security device is kept secret. Please read the notes on the back before filling in this summer-• Ό-- 'ϋ J1: I nn I Figure 1 is a diagram of the architecture of a user holding a phone through the encrypted digital device of the present invention, and another user using the encrypted digital security device of the present invention to perform confidential communication. The second circle is one of the better encrypted digital security devices of the present invention. The dense tasting example tf ^ i ^^^ 1 In mi »tThe paper size is applicable to the Chinese Standard for Householder (CNS) A4 坭 格 (2 丨 〇χ297 公 楚
0 I- I A70 I- I A7
五、發明説明() 的系統功能方塊圖。 5·5發明样麯說明 {請先閱讀背面之注$項再填寫本頁) 因為傳統的類比防竊聽裝置在兩個通訊系統之間 傳送的訊犹,並無法完全保障其所内含的訊惠不會被竊聽 者所獲得。而傳統的數位保密裝置之密碼也可能被破解, 導致不密性仍不是最佳’另外還引起通話連線的困難度大 為提高之缺點。所以本發明即提出超數位保密器(加密數 位保密裝置),使二通訊系統之通訊中所使用的密瑪每次 皆不相同,所以不容易破解密碣。另外,本發明所提供的 加密數位保密裝置舆方法可以使得無法由ΡΒΧ端直接聽 到通話内容,並且每次連線成功的機率幾乎到違1 〇〇%, 另外,本發明所提供的加密數位保密裝置之一較佳實施 例’可以用可充電式電池作為其電源,而且其操作是單鍵 操作,操作方便。 經濟部中央樣準局貝工消費合作社印敦 依據本發明的一較佳實施例所提供的加密數位保 密器’其用於電話通訊時,連接方式如圖一所示。其t第 一端10透過電話11與第二端15之電話連線時’第一端 1〇中的電話11連接到依據本發明的一較佳實施例所提 供的加密數位保密器20。在第一端10要送出訊號到第二 端15的過程當中,加密數位保密器20將電話11所傳送 過來的資料傳送到第二端15的加密數位保密器25 ’然後 經過加密數位保密器25的處理,將訊惠傳送到第二端15 的電話機16。另外,在第二端15要送出訊號到第一端 本纸張尺度適用中國困家標準(CNS > Λ4说格(2丨0 X 297公绝) 五、 經濟部中央標準局負工消費合作社印製 發明説明( 10的過程當中,加密數位保密器25將電話16所傳送過 來的資料傳送到第一端10的加密數位保密器2〇,然後經 過加密數位保密器20的處理,將訊息傳送到第一端10 的電話機1 1。 另’由圈一中的加密數位保密器15町知,本發明 的較佳實施例所提供的加密數位保密器之外觀如圈一 中的加密數位保密器20所示,其包含了直流電插座27, 是用來作為本發明的加密數位保密器所需要的耄猓。而電 話線插座28則是用來作為要連線到其他端的電話時所需 的電話線之插座,而電話機插座29則是要速接到本端的 電話機’而散熱孔30則是用來提供本發明的加密數位保 密器散熱之所需。當使用者要進行密碼連線通訊的功能 時,使用者按下啟動鍵31,在通話狀態指示燈32發亮的 部分不停旋轉時,表示連線成功,此時使用者可以開始說 話,或是資料通訊開始•而要停止密碼連線通訊功能時, 則可以再按一下啟動鍵31,或者將話機掛上,則本發明 的加密數位保密裝置會自動關機,以關閉本發 W的加密數 位保密器之運作,而此時通話狀態指示燈32 只U燒滅β 另外在本發明的加密數位保密器表面卜 上,本發明使 用了三個燈號,以表現本加密數位保密裝*热$ ·"的密馬交換狀 態、密碼連線狀態以及電池狀態。其中電碲办社 i吧狀態指示燈 35顯示黃燈時,表示本發明的加密數位保衆壯 φ裝置正在充 電中,綠燈時表示本發明的加密數位保密裝ϊ τ 正在使用電 池作為電源,紅燈時表示作為電池的電源即將世 呢力不足, 本紙張尺度逋用中國國家標準(CNS ) Λ4说格(21〇Χ297公楚)V. Function block diagram of system description (). Description of the Invention Song of 5.5 (Please read the note on the back before filling in this page) Because the traditional analog anti-eavesdropping device transmits the message between the two communication systems, it cannot completely guarantee the information contained in it. Benefits will not be obtained by eavesdroppers. And the password of the traditional digital security device may be cracked, which leads to the fact that the incompatibility is still not optimal. In addition, it also leads to the disadvantage that the difficulty of the call connection is greatly increased. Therefore, the present invention proposes a super digital security device (encrypted digital security device), so that the secrets used in the communication of the two communication systems are different each time, so it is not easy to crack the secrets. In addition, the encrypted digital security device method provided by the present invention can prevent the call content from being heard directly by the PBX terminal, and the probability of each successful connection is almost 100%. In addition, the encrypted digital security provided by the present invention A preferred embodiment of the device 'can use a rechargeable battery as its power source, and its operation is one-button operation, easy to operate. The Encrypted Digital Encryptor provided by the Central Prototype Bureau of the Ministry of Economic Affairs, Shellfish Consumer Cooperative, according to a preferred embodiment of the present invention, is used for telephone communication, and the connection method is shown in Fig. 1. When the first end 10 is connected to the telephone of the second end 15 through the telephone 11, the telephone 11 in the first end 10 is connected to the encrypted digital security device 20 provided according to a preferred embodiment of the present invention. In the process of sending the signal from the first end 10 to the second end 15, the encrypted digital security device 20 transmits the data transmitted by the telephone 11 to the encrypted digital security device 25 of the second end 15 and then passes through the encrypted digital security device 25. The processing is transmitted to the telephone 16 on the second end 15. In addition, the second end 15 must send a signal to the first end. The paper size is applicable to Chinese standards (CNS > Λ4 grid (2 丨 0 X 297)). 5. Consumers' Cooperatives, Central Standards Bureau, Ministry of Economic Affairs In the process of printing the description of the invention (10), the encrypted digital security device 25 transmits the data transmitted by the telephone 16 to the encrypted digital security device 20 of the first end 10, and then processes the encrypted digital security device 20 to transmit the message. The telephone set 1 to the first end 10. Also known from the encrypted digital security device 15 in the first circle, the encrypted digital security device provided by the preferred embodiment of the present invention has the appearance of the encrypted digital security device in the first circle. As shown at 20, it includes a DC power socket 27, which is used as the key for the encrypted digital security device of the present invention. The telephone line socket 28 is used as a telephone required to connect to a telephone at the other end. Line socket, while the phone socket 29 is to be quickly connected to the local phone, and the heat dissipation hole 30 is used to provide the heat dissipation of the encrypted digital security device of the present invention. When the user wants to perform the password connection communication function When enabled, the user presses the start button 31. When the illuminated part of the call status indicator 32 rotates continuously, it indicates that the connection is successful. At this time, the user can start talking or data communication starts. For the line communication function, you can press the start key 31 again, or hang up the phone. The encrypted digital security device of the present invention will automatically shut down to turn off the operation of the encrypted digital security device of the present W, and the call status at this time Indicator lights 32 U burn out β In addition, on the surface of the encrypted digital security device of the present invention, the present invention uses three lights to represent the encrypted digital security device of the encrypted digital security device * Hot $ "" Connection status and battery status. When the tellurium office i bar status indicator 35 shows a yellow light, it indicates that the encrypted digital security device of the present invention is being charged, and when the green light indicates the encrypted digital security device of the present invention τ The battery is being used as a power source. When the light is red, it indicates that the power source for the battery will soon be insufficient. This paper uses the Chinese National Standard (CNS) Λ4 grid (21〇 × 297).
發明説明()Invention Description ()
使用者發現後得以將直流電插座27插入電泺線。密码連 線狀態燈36是在連線成功並且密碼檢查正確時則亮起否 則總滅,密填交換狀態燈37是在密码交換成功時則亮起 否則熄滅,使用者得以藉上述兩個燈號以了解連線及密碼 交換的情形》本發明的一較佳實施例所提供之上述外觀僅 為一較佳實施例,並非用以限定本發明,若在上述的外觀 上所具有之顢示功能有所改變,例如加入密碼清除鍵或是 硬體重置(reset)鍵時,只要具有本發明的功能而依據本 發明的方法進行保密通訊者,皆應包含在本發明的精神及 範圍之中。 在使用本發明的加密數位保密裝置時,需要先舆通 訊對象的加密數位保密裝置做密爲交換,並且對每一不同 之通訊對象的加密數位保密系統皆具有一不同密碟,其中 每一組密碼都是由加密數位保密系統所產生。而密场交換 的方式是將要交換密碼的兩個加密數位保密裝置,透過密 碼交換線接上個別的電話線插座28,然後按下啟動按鈕 31,加密數位保密裝置就會自動進行密碼交換β在密碑 交換完成之後,密碼交換狀態燈37就會亮起。 而由本發明的上述步驊交換完密碼之後,以後若要 與此使用者進行保密通訊時,兩方的使用者之電話舆加密 數位保密裝置之連接方式如圈一所示。使用者用一般話機 撥號接通之後,雙方按下啟動按鈕31,本發明所提供的 加密數位保密裝置20與25就會自動檢查電話線路的品 質,並且檢査雙方的密碼是否正確。在上述檢查無誤後, --------1^-- {請先Μ請背面之注意事項再填寫本頁) 訂 ---------After the user finds it, he can insert the DC power socket 27 into the electric cable. The password connection status light 36 is on when the connection is successful and the password check is correct, otherwise it is always off, and the dense exchange status light 37 is on when the password exchange is successful, otherwise it is off, and the user can borrow the above two lights In order to understand the situation of connection and password exchange, the above-mentioned appearance provided by a preferred embodiment of the present invention is only a preferred embodiment, and is not intended to limit the present invention. Some changes, for example, when a password clear key or a hardware reset key is added, as long as it has the functions of the present invention and performs confidential communication according to the method of the present invention, it should be included in the spirit and scope of the present invention. When using the encrypted digital security device of the present invention, it is necessary to exchange the encrypted digital security device of the communication object first, and each encrypted digital security system of the communication object has a different disk, each group of which Passwords are generated by encrypted digital security systems. The secret field exchange method is to encrypt two encrypted digital security devices that need to exchange passwords, connect to individual telephone line sockets 28 through the password exchange line, and then press the start button 31. The encrypted digital security devices will automatically perform password exchange β in After the secret stone exchange is completed, the password exchange status light 37 will light up. After the passwords are exchanged by the above steps of the present invention, and if it is necessary to perform confidential communication with this user in the future, the telephone encryption methods of the two users are encrypted as shown in circle 1. After the user dials up with a general phone and both parties press the start button 31, the encrypted digital security devices 20 and 25 provided by the present invention will automatically check the quality of the telephone line and check whether the passwords of both parties are correct. After the above checks are correct, -------- 1 ^-{Please ask the notes on the back before filling this page) Order ---------
Ί/· CΊ / · C
張尺度適用中國國家梂準(CNS)A4規格(210X297公龙) 五、發明説明() 密场連線狀態燈36將會亮起’然後若通話狀態指示燈3之 亮起的部分不停轉動,則使用者可以開始通話,在使用者 通話完畢掛斷電話後’本發明的加密數位保密裝里可以自 動關閉電源·’進入省電棋式直到下一次使用者再度進行保 密通訊為止。 ' 另外,本發明的加密數位保密裝置亦可以加入密脅 清除鍵’使用者先按下啟動鍵’再於_定時間内按下此密 场清除健’以清除已經储存的密峰紀錄表。經過此密為濟 除步驟之後,必須要舆通話對象重新做一次密碼交換,以 後才能進行保密通訊。另,本發明的加密數位保密裝置之 一實施例可同時儲存800組通話對象之密碼,並且可以 使用兹電池’待機時間長,還可以單鍵操作以簡化操作程 序。上述特性僅是本發明的一較佳實施例所具有,並非用 以限定本發明,若在上述的使用特性之外,再加上其他功 能之改善,倘其加密及通訊的方法是依據本發明的功能而 進行保密通訊者,亦應包含在本發明的精神及範困之中。 經濟部中央標準局負工消費合作社印家 本發明所提供的加密數位保密裝置之系統方瑰圈 如圈二所示,其中本發明的加密.數位保密裝置中的數位/ 類比轉換器50接收由電話11所傳送過來的訊息,益且 將其數位化之後’將所得到數位訊號傳送到壓缩/解麇缩 裝置51進行訊號壓縮而得到一壓縮訊號,並將其傳送到 加密/解密裝置53進行加密之前,先以中央處理器52將 其送入挽场/解扰瑪(scramble/descramble)裝置54,以一 預設项序對麼縮訊號中的位元作扰马(scramble)而得到 ^紙張尺度逋用中國國家標準(cns ) A4現格(2i〇x29Ti|~y 經濟部中央橾準局男工消費合作社印製 A7 —_____B7 五、發明説明(—) ~ '~' ---- 一挽瑪訊號,然後中央處理器52將攪碼訊號傳送到加密 /解密裝置.53’以將舆電話直接連接的加密數位保密 裝置所產生的密瑪(公開金锖public key舆私人金輪 private key)中的私人金鑰對攪碣訊號做加密 (encryption),然後中央處理器52將此加密訊垅傳送到 攪碼/解攪碼裝置54’以該預設順序對加密訊號進行第二 次攪碼而得到經攪碼加密訊號,然後中央處理器52將其 送入鐧變/解調變裝置55,接著中央處理裝置52將此經 攪碼加密訊號送到調變/解調變裝置55處理,以將此經授 碼加密訊號之頻率調變(mod u late)成適合於傳輸至第二 端15的調變訊號。因此經過加密的訊息被包含在此調變 訊號内,而經過傳遞媒介傳送到第二端15中之依據本發 明的加密數位保密裝置,以供其解密而得到其中所含的訊 息。 而本發明的裝置在接收訊號時,上述第二端15中 之依據本發明的加密數位保密裝置,將内含訊息的調變訊 號傳送到圈二依據本發明的加密數位保密裝里中的調變/ 解調變裝置55,此時調變/解調變裝置55對此調變訊號 解調變(demodulate),以使其頻率適合於本發明的加密數 位保密裝置所處理。然後t央處理器52將調變/解調變裝 置55對調變訊號解調變所得的經攪碼加密訊號傳送到攪 碼/解攪碼裝置54’以進行解攪碼(descramble)的工作, 依照該預設順序抽出攪碼訊號的位元,而得以將此攪碼訊 號内的加密訊號抽出,並且由t央處理器52傳送到加密 本紙張尺度適用中國國家標準(CNS ) Λ4規搞(210x297公楚) ο ! *π先閲I背面之注#^項再填寫本頁) 訂 I H· - .The scale is applicable to the Chinese National Standard (CNS) A4 specification (210X297 male dragon). 5. Description of the invention () The closed-field connection status light 36 will light up, and then if the illuminated part of the call status light 3 rotates continuously Then, the user can start a call, and after the user hangs up the phone, "the encrypted digital security device of the present invention can automatically turn off the power." Enter the power-saving chess mode until the next time the user performs confidential communication again. In addition, the encrypted digital security device of the present invention can also add a secret threat clear key ‘the user first presses the start key’ and then presses this secret field clear key within a predetermined time ’to clear the stored dense peak record table. After this secret removal step, the callee must be exchanged for a new password before confidential communication can be performed. In addition, an embodiment of the encrypted digital security device of the present invention can simultaneously store the passwords of 800 groups of callees, and can use a battery 'for a long standby time, and can also be operated with a single key to simplify the operation procedure. The above-mentioned characteristics are only provided by a preferred embodiment of the present invention, and are not intended to limit the present invention. If in addition to the above-mentioned use characteristics, plus the improvement of other functions, if the method of encryption and communication is based on the present invention The function of confidential communication should also be included in the spirit and scope of the present invention. The system of the encrypted digital security device provided by the present invention provided by the Central Standards Bureau of the Ministry of Economic Affairs and Consumer Cooperatives is shown in circle 2, where the encryption of the present invention is received by the digital / analog converter 50 in the digital security device. The message transmitted from the phone 11 is digitized and then 'the obtained digital signal is transmitted to the compression / decompression device 51 for signal compression to obtain a compressed signal, which is then transmitted to the encryption / decryption device 53 for Before encryption, it is first sent to the scramble / descramble device 54 by the central processing unit 52, and the bits in the shrink signal are scrambled in a preset item order to obtain ^ Paper standards are in accordance with Chinese National Standard (cns) A4 (2i0x29Ti | ~ y Printed by Male Workers Consumer Cooperatives, Central Bureau of Standards, Ministry of Economic Affairs, A7 —_____ B7 V. Description of Invention (—) ~ '~' ---- After receiving the signal, the CPU 52 transmits the scrambled signal to the encryption / decryption device. 53 'to generate a secret key (public key and private key) generated by an encrypted digital security device directly connected to the public telephone. ) Encrypts the scrambled signal with the private key, and then the CPU 52 sends the scrambled signal to the scramble / de-scramble device 54 'to perform a second scramble on the encrypted signal in the preset order. The scrambled and encrypted signal is obtained, and then the CPU 52 sends it to the conversion / demodulation device 55, and then the CPU 52 sends the scrambled and encrypted signal to the modulation / demodulation device 55 for processing. Modulate the frequency of this coded encrypted signal into a modulated signal suitable for transmission to the second end 15. Therefore, the encrypted message is included in this modulated signal and transmitted to the transmission medium. The encrypted digital security device according to the present invention at the second end 15 is used for decryption to obtain the information contained therein. When the device of the present invention receives a signal, the encrypted digital number according to the present invention at the second end 15 The security device transmits the modulation signal containing the message to the modulation / demodulation device 55 in the encrypted digital security device according to the present invention. At this time, the modulation / demodulation device 55 responds to the modulation signal. Demodulation (demodulate), So that its frequency is suitable for processing by the encrypted digital security device of the present invention. Then the central processor 52 transmits the scrambled encrypted signal obtained by demodulating the modulation signal by the modulation / demodulation device 55 to the scramble / decrypt The scramble device 54 ′ performs descramble work, and extracts the bits of the scramble signal according to the preset order, so that the encrypted signal in the scramble signal can be extracted and transmitted by the central processor 52. To the paper size of the encrypted paper, the Chinese National Standard (CNS) Λ4 regulations are applied (210x297). Ο! * Π Please read the note # ^ on the back of I before filling this page) Order IH ·-.
經濟部中央樣準局員工消费合作社印裝 五、發明説明() /解密裝置53’以由和電話n直接連接的加密數位保密 裝里所產生的密項中的私人金鑰對加密訊號做解加密以 得到it瑪訊號•然後中央處理器52將攪碭訊號傳送到攪 碼/解攪碘裝置54進行解攪碭,用該预設順序恢復該攪瑀 訊號中每個位元之位置,以得到麈缩訊號。然後中央處理 器52將應编訊號送到墨缩/解壓缩裝置以進行解壓缩,而 獲得未經®縮的數位訊號,並且傳送到數位/類比轉換器 50’以將此未經壓縮的數位訊號轉換成為類比訊號,並 傳送到電話11,將此類比訊號轉換成音頻訊號。 _L述本發a片的加密數位保密系統之内部結構僅是 本發明的一較佳實施例爾,本發明的加密數位保密裝置玎 以不包含壓縮/解壓縮裝置51或攪碼/解攪碼裝置54,或 是兩者皆不包含,仍可以進行具有上述本發明的較佳實施 例之保密通訊的功能。 上述的本發明之加密數位保密裝置並不限定於與 電話機一起使用,其所要傳送的資料内容也可以是文字資 料或是視訊資料,若是要傳送的訊息本身已經是數位資料 時’則本發明的一較佳實施例中的數位/類比轉換器50 並不需要使用於本發明的一較佳實施例中。另外,若是f 央處理器52處理的速度夠快或是第一端以及第二端之通 訊頻寬夠大時,也可以不使用壓缩/解壓缩裝置51,直接 將數位訊號由中央處理器52傳送到攪碼/解攪碼裝置 54’以進行攪碼,而後其餘處理舆有壓縮/解壓缩裝置51 的處理情形相同。甚至,亦可以不用攪碼/解攪碼裝置 本紙法尺度適用中國國家標隼(CNS ) A4規格(210X297公嫠) *請先閱讀背面之,¾意事項再填商本萸) -Λν.Printed by the Consumer Cooperatives of the Central Sample Bureau of the Ministry of Economic Affairs 5. Description of the invention () / Decryption device 53 'uses the private key in the secret item generated by the encrypted digital security device directly connected to the phone n to decrypt the encrypted signal Encrypt to get it signal. Then the CPU 52 sends the churning signal to the churning / descending iodine device 54 for descrambling, and restores the position of each bit in the churning signal with the preset order. Get a crimped signal. The CPU 52 then sends the coding signal to the ink reduction / decompression device for decompression to obtain an uncompressed digital signal, and sends it to the digital / analog converter 50 'to convert the uncompressed digital The signal is converted into an analog signal and transmitted to the telephone 11 to convert the analog signal into an audio signal. _L The internal structure of the encrypted digital security system of the a-chip of the present invention is only a preferred embodiment of the present invention. The encrypted digital security device of the present invention does not include the compression / decompression device 51 or the scramble / unscrambling code. The device 54, or neither of them, can still perform the function of secure communication having the above-mentioned preferred embodiment of the present invention. The above-mentioned encrypted digital security device of the present invention is not limited to use with a telephone. The data content to be transmitted may also be text data or video data. If the message to be transmitted is already digital data, then the present invention The digital / analog converter 50 in a preferred embodiment does not need to be used in a preferred embodiment of the present invention. In addition, if the processing speed of the central processing unit 52 is fast enough or the communication bandwidth of the first end and the second end is large enough, the digital signal can be directly transmitted from the central processing unit 52 without using the compression / decompression device 51. It is transmitted to the scramble / de-scramble device 54 'for scramble, and the rest of the processing is performed by the compression / decompression device 51 in the same way. Even, it is not necessary to use the scramble / unscramble device. The paper size is applicable to the Chinese National Standard (CNS) A4 specification (210X297). * Please read the back of the paper first, and then fill in the business note of the paper) -Λν.
IT 經濟部中央標準局員工消费合作社印製 A7 ______B7 五、發明説明() 54,而將數位訊號直接由中央處理器52傳送到加密/觯 密裝置53處理,其餘後續處理情形與有攪碼/解攪碼裝置 54者相同。另外,尚可以使用壓缩/解壓缩裝置51,而 不使用攪瑪/解攪碼裝置54,其訊號處理情形與本發明於 圈二中的較佳實施例者所處理的訊號相差只少了一個攪 碘/解攪碼裝置所處理者,其餘處理皆相同,亦可以得到 保密通訊的結果,凡此種將加密/解密裝置應用於通訊系 統中,並且用於加密舆解密的公開金鑰舆私人金婧是經由 RSA(Rivest Shamir Adleman)演算法隨機I數產生者(在 本發明的一較佳實施例中可以是對使用者音頻訊號抽樣 再加上RSA所產生的隨機亂數而產生卜其皆為本發明的 較佳實施例,是故亦不脫本發明的精神舆範团。若將上述 密項位元設為512位元,則其密瑪之組合可以達到2512 種,約等於(一兆)17種’故幾乎是無法破解的。本發明的 一較佳實施例是採用RSA全程即時加密,而壓缩/解壓缩 標準是符合丨TU-T G.72 3.1語音壓縮/解壓缩,故其音質 比一般傳統保密裝置之音質大為提高。此外本發明的一較 佳實施例中,其通訊協定時間非常短,可以達到1 0秒内, 而且其連線所需速度僅需9600bps(每秒位元包),連線成 功率幾乎達到百分之一百。並且其為全雙工(full duplex)’其通信介面符合美規pSTN(公眾交換電話網路) 以及歐規標準’另外其可以隨插即用,省去使用者安裝的 麻煩。 上述的本發明之加密數位保密裝置進行第一次通 本紙張尺度適用中國國家#準(CNS ) A4规格(210X297公犮) Ο ! 二窬先閲見背面之注意事β再填寫本瓦) 訂 Α7 Β7 五、發明説明() 訊之前’其與通訊系統及欲通訊對象間之連接情形如圖一 之連接情形,所不同的是第一端1〇的加密數位保密裝置 20之電話線插座28’必須和第二端15的加密數位保密 裝置25之電話線插座直接電性耦合,以將個別的公開金 鑰直接傳送給對方’並存於對方的公開金鑰列表(pub|jc key directory)中相對於通訊對象的位址β此第一次交換 金锖時的金錄產生方式是以RSA演算法隨機產生,爾後 若進行第一次通訊時’即是將含有对方公開金婧的資訊以 本身的私人金鑰加密並將此加密訊息傳到對方,同時對方 亦做相同的動作,送一加密訊息到本方,接著以本方的私 人金鑰對所接收的加密訊息解密,若得出的是本方的公開 金鑰’則表示此通訊過程要進行保密通訊,並且在此次通 訊中’本方的加密通訊裴置會把通訊過程中使用者的音頻 訊號數位化之後的訊號抽出_筆,以與RSA演算法隨機 產生的密碼結合’藉以產生另一對本方的公開金鑰以及私 人金婧,相同的,對方也做如此之動作,同時雙方於通訊 過程中會交換此後來產生的公開金鑰給對方存於公開金 鍮列表中。由以上可知本發明的加密數位保密系統可以每 次變換密碼,並且經由公開金鍮與私人金鑰等RSA演算 法的架構,使本發明的密碼於傳輸中不致外洩,故其通訊 非常安全。本案並不是完全依照傳統的RSA演算法產生 密碼,本案乃擷取其中一部份,配合本案所採用的方法’ 使所產生的亂碼不會有依照順序出現的機會,因為RSA 演算法乃密碼學中廣泛應用的方法,所以其原理於此不赘 13 本紙張尺度適用中國國家揉準(CNS > Λ4現格Πΐ〇729Τ^ ^ Q! ·( t先W讀背面之注f項再填寫本頁) ’ITI I.—. —I ^v*y—. 經濟部中央標準局員工消費合作社印繁 A7 B7 五、發明説明( 述。此外本發明的加密數位保密裝置所使用的加密演算法 推然是RS A演算法,但是此演算法只是本發明所使用的 一個實施例’仍可以使用其他的演算法來產生密妈。 另,本發明的一較佳實施例亦提供一種防止通訊系 统間之通訊的防竊聽方法,此方法即是依據本發明的加密 數位保密裝置之各個元件所執行的功能,分別對欲傳輸的 訊息作處理’使得包含有訊息的通訊訊號在媒介中傳送 時,訊息内容無法被通訊雙方之外的接收者所解出° 以上所述僅為本發明之較佳實施例而已,並非用以 限定本發明之申請專利範面;凡其它未脫離本發明所揭示 之精神下所完成之等效改變或修飾,均應包含在下述之申 锖專利範团内。 *(婧先閲讀背面之注項再填寫本頁> -訂 — ' ίν 經濟部中央樣準局員工消費合作社印¾ 14 本紙浪尺度適用中國國家標準(CNS ) A4说格(210X297公釐)Printed by A7 ______B7 of the Consumer Cooperatives of the Central Standards Bureau of the Ministry of IT and Economics V. Invention Description (54), and the digital signal is directly transmitted from the central processor 52 to the encryption / encryption device 53 for processing. The descrambling device 54 is the same. In addition, the compression / decompression device 51 can be used instead of the churning / de-scrambling device 54. The signal processing situation is only one less than the signal processed by the preferred embodiment of the present invention in the second circle. The rest of the processing performed by the iodine / unscramble device are the same, and the result of confidential communication can also be obtained. Any public key that uses the encryption / decryption device in the communication system and is used for encryption and decryption Jin Jing is a random I number generator based on the RSA (Rivest Shamir Adleman) algorithm. (In a preferred embodiment of the present invention, it can be generated by sampling the user's audio signal and adding random random numbers generated by RSA. All are the preferred embodiments of the present invention, and therefore do not depart from the spirit of the present invention. If the above-mentioned secret bit is set to 512 bits, the combination of its denser numbers can reach 2512, which is approximately equal to ( One trillion) 17 kinds of 'is almost impossible to crack. A preferred embodiment of the present invention uses RSA full-time instant encryption, and the compression / decompression standard is in line with TU-T G.72 3.1 voice compression / decompression, So its sound quality is better than average The sound quality of the traditional security device is greatly improved. In addition, in a preferred embodiment of the present invention, the communication protocol time is very short, which can reach 10 seconds, and the connection speed is only 9600bps (bit packets per second). ), The connection success rate reaches almost 100%. And it is full duplex (the full duplex), and its communication interface complies with the US regulatory pSTN (Public Switched Telephone Network) and the European regulatory standard. In addition, it can be plug-and-play The above-mentioned encrypted digital security device of the present invention can be used for the first time. The paper size applies to China National Standards (CNS) A4 (210X297). 〇! Please see the back of the document Note for β, please fill in this tile) Order A7 B7 V. Description of the invention () Before the news, the connection between it and the communication system and the object to be communicated is shown in the connection situation in Figure 1. The difference is the first end 10 The telephone line socket 28 'of the encrypted digital security device 20 must be directly and electrically coupled with the telephone line socket of the encrypted digital security device 25 of the second end 15 to directly transmit the individual public key to the other party' and store it in the other party. The public key list (pub | jc key directory) is relative to the address of the communication partner β. The gold record generation method for the first exchange of gold coins is randomly generated by the RSA algorithm. If the first communication is performed later, That is, the information containing the other party's public Jing Jing is encrypted with its own private key and the encrypted message is transmitted to the other party. At the same time, the other party does the same action, sends an encrypted message to the party, and then uses the party's private key. Decrypt the received encrypted message. If you get your own public key, it means that this communication process needs to be confidential. In this communication, your own encrypted communication will be used by Pei Zhi. After the audio signal of the person has been digitized, the signal is extracted and combined with the password randomly generated by the RSA algorithm to generate another pair of his public key and private gold. Similarly, the other party also does the same. During the communication process, the two parties will exchange the public key generated later and store it in the public gold list. From the above, it can be known that the encrypted digital security system of the present invention can change the password each time, and through the structure of the RSA algorithm such as the public key and the private key, the password of the present invention is not leaked during transmission, so its communication is very secure. This case does not generate the password completely according to the traditional RSA algorithm. This case extracts a part of it and cooperates with the method used in this case to prevent the generated garbled code from appearing in order because the RSA algorithm is cryptography. The method is widely used in China, so its principle is not repeated here. 13 This paper size is applicable to the Chinese national standard (CNS > Λ4 is now Πΐ〇729Τ ^ ^ Q! · (T first read the note f on the back and fill in this Page) 'ITI I.—. —I ^ v * y—. Employee Consumer Cooperatives of the Central Bureau of Standards, Ministry of Economic Affairs, A7, B7, and V5. Description of the invention (in addition. In addition, the encryption algorithm used in the encrypted digital security device of the present invention is inferred. Of course, it is an RS A algorithm, but this algorithm is only one embodiment of the present invention. It is still possible to use other algorithms to generate secrets. In addition, a preferred embodiment of the present invention also provides a method for preventing communication between systems. Anti-eavesdropping method for communication, this method is the function performed by each element of the encrypted digital security device according to the present invention, and processes the message to be transmitted separately, so that the communication message containing the message When transmitting in the medium, the content of the message cannot be interpreted by recipients other than the communicating parties. The above is only a preferred embodiment of the present invention, and is not intended to limit the scope of patent application of the present invention. Equivalent changes or modifications made without departing from the spirit disclosed in the present invention should be included in the following patent application groups. * (Jing first read the note on the back before filling out this page >-订 — 'ίν Printed by the Employees' Cooperatives of the Central Bureau of Standards, Ministry of Economic Affairs of the People's Republic of China 14 14 This paper applies the Chinese National Standard (CNS) A4 standard (210X297 mm)
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW87117561A TW389016B (en) | 1998-10-23 | 1998-10-23 | Encryption device for communication system and method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW87117561A TW389016B (en) | 1998-10-23 | 1998-10-23 | Encryption device for communication system and method thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
TW389016B true TW389016B (en) | 2000-05-01 |
Family
ID=21631745
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW87117561A TW389016B (en) | 1998-10-23 | 1998-10-23 | Encryption device for communication system and method thereof |
Country Status (1)
Country | Link |
---|---|
TW (1) | TW389016B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8630414B2 (en) | 2002-06-20 | 2014-01-14 | Qualcomm Incorporated | Inter-working function for a communication system |
-
1998
- 1998-10-23 TW TW87117561A patent/TW389016B/en not_active IP Right Cessation
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8630414B2 (en) | 2002-06-20 | 2014-01-14 | Qualcomm Incorporated | Inter-working function for a communication system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6266418B1 (en) | Encryption and authentication methods and apparatus for securing telephone communications | |
KR100563108B1 (en) | Ic card and cryptographic communication method between ic cards | |
KR20010107519A (en) | System, device and method for secure communication and access control | |
JPH07298065A (en) | Communication equipment | |
JPH03214834A (en) | Multi-medium network system | |
US20030217263A1 (en) | System and method for secure real-time digital transmission | |
CN101909290A (en) | Method, system and mobile terminal for encrypting voice call | |
US8290160B1 (en) | Method and apparatus for secured facsimile transmission | |
JPH10242956A (en) | Privacy telephone set | |
JPH09147072A (en) | Personal authentication system, personal authentication card and center equipment | |
TW389016B (en) | Encryption device for communication system and method thereof | |
AU753951B2 (en) | Voice and data encryption method using a cryptographic key split combiner | |
JPH0918601A (en) | Communication method | |
CN215186781U (en) | Quantum computing resistant mobile communication system based on quantum secret communication network | |
CN210693957U (en) | Quantum encryption device of PSTN telephone | |
EA016739B1 (en) | Method and apparatus for secured facsimile transmission | |
GB2241414A (en) | Apparatus and method for data communication. | |
JPH06152587A (en) | Method and device for digital communication | |
JPH07303104A (en) | Storage type communication system with ciphering function | |
WO2010069102A1 (en) | Moblie terminal, cipher key transmission method, decrypt method and secrecy communication realizing method | |
CN113132090A (en) | System for sharing quantum key and secret communication method based on system | |
CN111641646A (en) | Safety enhancement type communication positioning terminal | |
JPH05304614A (en) | Picture information ciphering method | |
HU226781B1 (en) | Device set for secure direct information transmission over internet | |
JPH02195377A (en) | Ic card provided with key sharing function |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
GD4A | Issue of patent certificate for granted invention patent | ||
MM4A | Annulment or lapse of patent due to non-payment of fees |