WO2005018184A1 - Modulation and encryption of a digital date stream, method of decoding, multi-carrier transmission system - Google Patents

Modulation and encryption of a digital date stream, method of decoding, multi-carrier transmission system

Info

Publication number
WO2005018184A1
WO2005018184A1 PCT/IB2004/051364 IB2004051364W WO2005018184A1 WO 2005018184 A1 WO2005018184 A1 WO 2005018184A1 IB 2004051364 W IB2004051364 W IB 2004051364W WO 2005018184 A1 WO2005018184 A1 WO 2005018184A1
Authority
WO
WIPO (PCT)
Prior art keywords
mapping
data stream
interval
digital data
modulation
Prior art date
Application number
PCT/IB2004/051364
Other languages
French (fr)
Other versions
WO2005018184A8 (en
Inventor
Francesc Dalmases
Joachim Kahlert
Original Assignee
Philips Intellectual Property & Standards Gmbh
Koninklijke Philips Electronics N. V.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Philips Intellectual Property & Standards Gmbh, Koninklijke Philips Electronics N. V. filed Critical Philips Intellectual Property & Standards Gmbh
Publication of WO2005018184A1 publication Critical patent/WO2005018184A1/en
Publication of WO2005018184A8 publication Critical patent/WO2005018184A8/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/003Arrangements for allocating sub-channels of the transmission path
    • H04L5/0044Arrangements for allocating sub-channels of the transmission path allocation of payload

Definitions

  • the invention relates to a method of modulating a digital data stream and to an appliance for implementing a method of this kind. It relates, in particular, to a multi-carrier transmission system for a network, in which the digital data stream is scrambled during the course of the modulation.
  • MC multi-carrier
  • Multi -carrier systems are used in both wireless and wired standards to increase robustness against frequency-related fading.
  • the OFDM (Orthogonal Frequency Division Multiplex) multiple access method is a particular variant of multi-carrier transmission, which uses orthogonal carriers to enable spectral overlap one with another.
  • Multi-carrier modulation converts the N constellation points of an individual carrier-modulated signal into N coefficients in the frequency domain (carrier values).
  • carrier-modulated methods are Binary Phase Shift Keying (BPSK), Quadrature Phase Shift Keying (QPSK) and Quadrature Amplitude Modulation (QAM).
  • BPSK Binary Phase Shift Keying
  • QPSK Quadrature Phase Shift Keying
  • QAM Quadrature Amplitude Modulation
  • the association between the constellation points of the single-carrier modulation and the carrier coefficients 15 is normally defined.
  • T is the cycle duration of 20 the signal to be transmitted
  • N is the number of modulators
  • X n is the constellation point of the n-th modulator (QAM in this example)
  • g n (t) is the waveform of the multi-carrier modulator used.
  • the multi-carrier receiver comprises a filter array with complex-conjugate waveforms g n (t). Since the waveforms are orthogonal, the modulated data can be recovered.
  • every constellation point X n is modulated with the same waveform 25 g n (t) and demodulated with its complex-conjugate waveform g n (t). This means that the mapping between the constellation points and the carrier frequencies is established for the duration of the transmission.
  • Fig. 1 shows an MC transmitter with QAM modulation.
  • Fig. 2 shows an MC receiver with QAM modulation.
  • Fig. 3 shows a Table representing both the association between the carriers and the transmitting-end constellation points and the association between the complex- conjugate carriers and the receiving-end constellation points.
  • Fig. 1 shows an MC transmitter with QAM modulation.
  • the digital data stream is scrambled to multiple constellation points X o to X N - I .
  • Precisely one coefficient go(t) to gN- ⁇ (t) with a specific waveform is assigned to each constellation point, according to its subscript index.
  • a summator generates an output signal s(t) from the data stream modulated in this manner.
  • Fig. 2 again shows an MC transmitter with QAM modulation.
  • the complex-conjugate, time-dependent waveform g*(t) is applied to the received, time-dependent signal r(t).
  • mapping and recovery take place in a specified sequence, i.e. the subscript index is static.
  • a data stream can be recovered using suitable aids and by trying out various waveforms for g*(t).
  • the transmitted data stream which is transmitted either wirelessly or by wire, has to be capable of being received and further processed only by the authorized receiver or subscriber.
  • Encryption techniques are used to prevent an unauthorized receiver from receiving the data stream and then determining its content.
  • the encryption hereby takes place in the data link layer (layer 2), in the network layer (layer 3) or the application layer (layer 7) of the OSI 7-layer model by using a key for the encryption that is known only to the transmitter and the authorized receiver. There are a limited number of keys for the encryption, which are stored in both the transmitter and the receiver.
  • the key valid for this transmission is sent, e.g. in the handshake message. Since the encryption takes place in a layer above the physical layer (layer 1), it is possible to isolate an individual data connection on the physical medium with means suitable for the task. This isolated or copied data stream can then be logged and stored using suitable appliances.
  • French patent 2 808 361 claims a method of encrypting a digital signal that is intended to be transmitted, which is composed of consecutive binary elements and is achieved by mapping onto a set of points of a predetermined constellation having a whole number C of points, which are different from a power of 2.
  • Mapping of the N binary elements of the binary code word onto a point among 2 N points of the constellation is then undertaken for each binary code word, wherein this point among the 2 N points represents N binary elements in an absolute manner, and wherein the values of C - 2 N other binary elements of the binary code word are deductible from the former utilization or non-utilization of C - 2 N other points of the constellation, designated special points, wherein each of them represents in a differential manner a binary element among C - 2 N other binary elements of the binary code word.
  • the C - 2 N binary elements of the digital signal are suppressed and replaced by markers, which are designed to indicate at least one event relative to the value of the C - 2 N binary elements of the digital signal, wherein the markers are encrypted by the special points.
  • the encryption method from French patent 2 808 361 uses markers that are encrypted by the special points to suppress special binary elements of the digital signal. These encrypted markers intervene in the modulation to increase the yield of the transmitted information whilst retaining the quality of transmission. It is therefore an object of the invention to specify a method of modulating a digital data stream in a multi-carrier transmission system that increases the protection of the data stream from interception. It is further an object of the invention to specify a method of encrypting a digital data stream. One further object is to specify a method of decoding a digital data stream that has been transmitted in encrypted form. It is further an object of the invention to specify an appliance for implementing a method of this kind.
  • the object is achieved in accordance with the invention by a method for modulating a digital data stream in a multi-carrier transmission system, wherein, in the course of the modulation: - the digital data stream is divided into N partial data streams and scrambled onto N constellation points, - mapping of the N constellation points onto at least N carrier frequencies is undertaken, - through application of a mapping function, encryption is undertaken in that the position of the N constellation points, and thus of the partial data streams, is changed in respect of their sequence in the frequency domain in accordance with a mapping pattern.
  • the digital data stream is divided into N partial streams in a multi-carrier transmission system, wherein N is an integer.
  • These partial streams are assigned to constellation points according to the sequence of their indices. However, they are not assigned in their sequence to the carriers in the frequency domain.
  • encryption takes place, since any third party who attempts to intercept this connection will be unaware of the sequence of the original partial data streams and therefore cannot piece them together.
  • a set of mapping patterns is available, and during modulation of a data stream during a connection, the mapping function uses individual elements or mapping patterns from the set of mapping patterns. The encryption level is increased thereby.
  • Known deciphering methods work on the basis that the individual letters of a language occur with a certain frequency.
  • the set of mapping patterns is implemented in the form of a loop, from the beginning to the end and then starting at the beginning again. A compromise can thereby be found as regards the dynamics of the mapping, i.e. the changing of mapping patterns and the memory space needed for storing the mapping patterns.
  • the contents of a set of mapping patterns used by a subscriber to the network is not constant for each connection. This means that a different set of mapping patterns is compiled for each connection. This is done by a permutation function, which defines the content.
  • a method for encryption of a digital data stream to be transmitted which comprises the following steps: - transmitting of an encryption key and thereby: - defining a permutation function, - defining a set of mapping patterns, - defining a hop interval, wherein the last three steps may be performed in any order.
  • a handshake is established between two subscribers to a network. Once the handshake has been established, a protocol or encryption key is transmitted, making the information necessary for the actual transmission available to the receiving subscriber.
  • a permutation function is defined with the encryption key, indicating which mapping patterns are to be used in which order during the actual transmission.
  • a set of mapping patterns is defined, the content of which is the assignment of the individual constellation points to arbitrary carriers.
  • a hop interval is defined, defining the time of change from one mapping pattern to the next.
  • the defining of the permutation function, the set of mapping patterns and the hop interval serves for alignment of the transmitting and receiving subscribers to the network, in order to ensure that both subscribers are using the same encryption method.
  • the defining of the encryption method may take place in any order.
  • the object is also achieved in accordance with the invention through the implementation of a permutation procedure, which comprises a loop with the following steps: - set an interval to 1 , - wait for the end of a predefined hop interval, - increase the interval by the value of 1 , - undertake a comparison of whether the current value of the interval is greater than the total number of elements in a permutation function, which indicates the positions of the mapping patterns to be used for a modulation of the digital data stream, wherein one or the other of the following then takes place: - if the result of the comparison is positive: reset the interval to 1, - if the result of the comparison is negative: equate the current mapping function with the mapping pattern located at the position specified by the permutation function.
  • the advantage of the encryption method in accordance with the invention is that no extra bandwidth is necessary for the data transmission.
  • redundancy is deliberately generated in that the number of N constellation points is greater than the number m of usable carriers.
  • Usable carriers are those that transmit a partial data stream.
  • the remaining (N-m) carriers are occupied with a pseudo random code.
  • the encryption level is thereby further increased.
  • the permutation procedure enables the mapping pattern serving for the encryption to be changed again and again during a connection without any prior knowledge of the actual length of the connection.
  • the appliance for implementing a modulation method or encryption method the object is achieved in accordance with the invention in that it is equipped with a first controller, which controls the execution of the mapping function.
  • the object is achieved in accordance with the invention through the implementation of a second permutation procedure, which comprises a loop with the following steps: - set an interval to 1 , - wait for the end of a predefined hop interval, - increase the interval by the value of 1 , - undertake a comparison of whether the current value of the interval is greater than the total number of elements in a permutation function, which indicates the positions of the recovery patterns to be used for a demodulation of the encrypted digital data stream, wherein one or the other of the following then takes place: - if the result of the comparison is positive: reset the interval to 1, - if the result of the comparison is negative: equate the current recovery function with the recovery pattern located at the position specified by the permutation function.
  • This method also begins with the resetting of an interval to 1, in order that a defined starting point is present, from which point counting takes place on expiry of the hop interval.
  • the receiving subscriber is notified of the hop interval and permutation function after the handshake.
  • the content of the recovery pattern to be used currently is derived through creation of the complex-conjugate waveform of the relevant mapping pattern. It is thereby ensured that the authorized receiving subscriber is using the same procedure as the transmitting subscriber.
  • the decoding appliance the object is achieved in accordance with the invention in that it is equipped with a second controller, which controls the execution of the recovery function.
  • the object is achieved in accordance with the invention by a multi-carrier transmission system with an appliance for modulating a digital data stream that is scrambled during the modulation, and with an appliance for decoding a digital data stream that has been transmitted in encrypted form, which exhibits means for: - undertaking an encrypted modulation, - undertaking the recovery of a digital data stream that has been transmitted in encrypted form.
  • This multi-channel transmission system exhibits an encryption mechanism, which takes place in the physical layer of the network (layer 1 of the OSI layer model).
  • the above-described methods in accordance with the invention may be used in either a wireless network, such as the mobile radio network or a WLAN (Wireless Local Area Network), or a wired network, such as a LAN (Local Area Network).
  • Fig. 4 shows, in a schematic representation, an appliance in accordance with the invention for modulating a digital data stream to be transmitted.
  • Fig. 5 shows, in a schematic representation, an appliance in accordance with the invention for demodulating and decoding a received digital data stream.
  • Fig. 6 shows a Table, in which examples of mapping patterns are entered.
  • Fig. 7 shows a Table giving examples of possible permutation functions.
  • Fig. 8 shows schematically, in a flowchart, a method in accordance with the invention for encrypting a digital data stream.
  • Fig. 9 shows schematically, in a flowchart, a method in accordance with the invention for decoding a scrambled data stream.
  • Fig. 4 shows, in a schematic representation, an appliance 1 in accordance with the invention for modulating a digital data stream to be transmitted, comprising the partial streams do, di ... dN-i.
  • the partial streams of the data stream are scrambled onto the constellation points Xo, Xi ... X N - I by quadrature amplitude modulation.
  • the encryption of the scrambled data stream then takes place in that the constellation points X o , Xi ... X N - I are mapped onto the carriers go(t), g ⁇ (t) ... gN- ⁇ (t) according to a mapping function ⁇ n , wherein they are regrouped in respect of their subscript indices.
  • the content of a constellation point thereby has a different position in the frequency domain.
  • the mapping of the constellation points in accordance with the invention thus differs from the prior art, i.e. it does not take place in the order of the predetermined positions, but in accordance with a mapping function ⁇ n .
  • the subscript index n hereby indicates that an individual mapping pattern ⁇ , has a validity of one interval of length n, and then a change takes place.
  • the interval n may hereby be defined in relation to time and correspond to a cycle duration T h0p or defined in relation to data packets and correspond to a specific number Q of data packets.
  • the mapping is therefore dynamic.
  • the current mapping function ⁇ n is then part of a quantity totaling H mapping patterns ⁇ ,: ⁇ e ⁇ , , ⁇ 2 , ... ⁇ dress ⁇ (2) wherein H is the integral quantity of mapping patterns ⁇ , and n is the interval that indicates the validity of the respective current mapping function ⁇ n .
  • the current mapping function ⁇ n determines the mapping between the constellation points Xo, Xi ... X N - I and the mapping points ao, ai ...
  • FIG. 5 illustrates, in a schematic representation, an appliance 3 in accordance with the invention for recovery, i.e. for demodulation and decoding, of a scrambled, encrypted data stream.
  • the digital data stream has been scrambled and encrypted during the modulation.
  • the complex-conjugate, time-dependent waveform g*(t) is applied to the received, time-dependent signal r(t).
  • the partial signals are then sent to a filter array, which creates the corresponding output signals bo, bi ... b -i as intermediate values.
  • the receiving-end constellation points Y o , Yi ... Y N - I are created from the intermediate values by applying a dynamic recovery function ⁇ n . This also sends the indices into the correct, successive order.
  • the encryption key transmitted after the handshake, or its content is stored, or put into intermediate storage, e.g. in a RAM, at least for the duration of the transmission, demodulation and decoding.
  • a dynamic recovery controller 4 controls the assignment of the complex- conjugate carriers to the receiving-end constellation points.
  • Fig. 6 shows a Table in which examples of mapping patterns ⁇ , are entered.
  • the constellation point X 0 is combined with the waveform go
  • Each of the individual mapping patterns ⁇ i, ⁇ 2 ... ⁇ H> wherein H is an integer represents an encryption, since the constellation points have changed position as regards their sequence in the frequency domain.
  • a further encryption is achieved by using successive different mapping patterns during one transmission.
  • the number H of elements of the mapping function ⁇ n is hereby restricted, as is apparent from equation (2).
  • the current mapping function ⁇ n is, however, variable, as is apparent from equation (3). This is achieved because the different mapping patterns ⁇ , are used again and again in a loop.
  • the corresponding recovery function ⁇ n assigns the constellation points Y o , Yi ... Y N - I by application of the complex-conjugate waveform g o, g I ... g N -i-
  • the sequence and the interval duration n for which the mapping patterns ⁇ ls ⁇ 2 ... ⁇ H are to be used are defined during the handshake between the two partners to a connection.
  • mapping of the constellation points onto the carriers takes place dynamically, i.e. in accordance with a mapping function.
  • four mapping functions ⁇ i to ⁇ H are shown. It is apparent that the number of constellation points and of carriers is the same and that every constellation point Xo to X N - I is mapped on one of the carriers go to gN-i-
  • the example shows possible assignments for four mapping patterns ⁇ . In one embodiment of the invention, the mapping patterns ⁇ i to ⁇ 4 are used successively. If the transmission is not yet complete when the last mapping function has finished, a start is again made at the first mapping function for the encryption.
  • the mapping patterns ⁇ i to ⁇ H and the recovery patterns ⁇ j to ⁇ H are used not successively, but in a sequence that is specified by one of the permutation functions S,.
  • Fig. 7 shows a Table which, for explanatory purposes, gives examples of possible permutation functions S ⁇ , S and S .
  • L is an integer which indicates the entire number of available, predefined permutation functions S,.
  • the length M of each individual permutation function is 5. This means that every individual permutation function S, indicates the sequence of utilization for 5 mapping patterns ⁇ ,.
  • the same mapping pattern may occur multiple times.
  • Individual mapping patterns from the "stock" i.e. individual predefined assignments of constellation points to carriers, may also be omitted.
  • the change from one mapping pattern ⁇ , to the next takes place on expiry of a hop interval I hop .
  • a hop interval I h0p is alternatively defined by: a) a time T hop or b) a number Q of data packets.
  • Fig. 8 shows schematically, in a flowchart, a method in accordance with the invention for encrypting a digital data stream. Following on from the handshake 100, at step 200 the encryption key is transmitted.
  • the permutation function S indicates the order in which the mapping patterns ⁇ , are to be used.
  • Definition 210 of the permutation function valid for the current transmission may alternatively take place by: c) Transmitting a vector S ho which contains the specific permutation sequence ⁇ p_l, p_2 ... p_M ⁇ or d) Transmitting only the name of an individual permutation function S,.
  • Alternative c) enables an unauthorized third party to intercept the permutation sequence and therefore comprises an aid to decoding the transmitted digital data stream.
  • this method has the advantage that space is saved, both at the transmitting and the receiving end, since the permutation sequence valid for the current transmission need only be put into intermediate storage and may be deleted on termination of the transmission.
  • Alternative d) presupposes that, both at the transmitting and the receiving end, all possible permutation functions Si, S 2 ... S L have to be permanently stored in order that the permutation function S, valid for the transmission can be invoked.
  • the advantage of this variant is that an unauthorized third party cannot determine the sequence of mapping functions ⁇ , implied by the permutation function S, used, since it is not transmitted.
  • Step 220 defining mapping patterns, may alternatively take place by either: e) Transmitting the specific, individual mapping pattern ⁇ , in the form of vectors containing the assignments of constellation points to mapping points or carriers. or f) Transmitting the name of the mapping pattern ⁇ , to be used .
  • the advantages and disadvantages of alternatives e) and f) are, as with the defining of the permutation function S grind that the transmission of the specific information reduces the protection against interception, and the storage of predefined mapping patterns occupies space at both the transmitting and receiving ends.
  • Step defining the hop interval I h0p means, alternatively: g) Specifying a cycle duration Th op or h) Specifying a number Q of data packets. The dynamic mapping 300 then begins.
  • the first permutation procedure 400 is as follows: at step 410, the interval n is set to 1 and the current mapping function ⁇ i is equated with the mapping pattern ⁇ p t whose position p i is specified by the permutation function S,.
  • step 420 there is a wait for the expiry of the hop interval Ih op - Measurement of the time for determining the end of the cycle duration, or the counting of the transmitted data packets, takes place by means of appropriate appliances, such as a counter or a flip-flop.
  • the interval n is increased by a value of 1 at step 430.
  • the encryption key is transmitted at step 600. This initiates the following: - the defining of a permutation function S, 610, - the defining of recovery patterns ⁇ , 620, - the defining of a hop interval Ih op 630.
  • the permutation function S is the same as that used for the transmitting-end modulation and encryption, and indicates the order in which the recovery patterns ⁇ , are to be used.
  • the definition of the permutation function S, valid for the current transmission may alternatively take place by: i) Storing, or putting into intermediate storage, a vector S, which contains the specific permutation sequence ⁇ p_l, p_2 ... p_M ⁇ or j) Storing, or putting into intermediate storage, an individual permutation function S,. Which of the alternatives i) or j) is selected depends on the transmitter's operating mode. The disadvantages specified for alternatives c) and d) apply here.
  • the step of defining recovery patterns, 620 may alternatively take place by: k) Storing, or putting into intermediate storage, the specific, individual recovery pattern ⁇ , in the form of vectors that have been transmitted by the transmitter or 1) Storing, or putting into intermediate storage, the recovery pattern ⁇ , corresponding to the name of the mapping pattern ⁇ , used or m) Generating the recovery pattern ⁇ , corresponding to the transmitted mapping pattern ⁇ ,.
  • k) is that only the patterns necessary for the current data transmission are stored. The disadvantage is that, in some circumstances, these could be intercepted during the transmission of the encryption key.
  • the advantage of alternative 1) is that the encryption key contains no specific data necessary for decoding.
  • the disadvantage is that all possible recovery patterns have to be stored, including those that are not necessary for the current transmission.
  • Alternative 1) has the disadvantage that a time delay may possibly occur as a result of the generation of the recovery pattern not yet being completed before the encryption key is fully transmitted and the data stream begins.
  • Step 630, defining the hop interval Ih op may alternatively take place by: n) Storing a received cycle duration T hop or p) Storing a received number Q of data packets.
  • Alternatives n) and p) are governed by the transmitter's operating mode during this connection. Only then does dynamic recovery begin at 700.
  • the second permutation procedure 800 is comparable with the first permutation procedure 400 of the transmitter, since the decoding has to take place in steps corresponding with encryption.
  • the interval n is set to "1" and the current recovery function ⁇ i is equated with the recovery pattern ⁇ p , located at position p i of the permutation function S,.
  • the interval n is increased by a value of 1 at step 830.
  • the encryption key 600 initiates, with three steps, the defining of different variables that are valid for this current connection.
  • the order of defining the variables may, without affecting the invention, differ from that shown as an example in Fig. 9: definition of a permutation function 610, definition of recovery patterns 620 and definition of a hop interval 630.
  • the invention may be summarized by the phrase "encrypted modulation".
  • a first encryption level is achieved in that the constellation points change their order in the frequency domain.
  • a further encryption level is achieved in that different mapping patterns are used during a connection, i.e. the assignment of the transmission channels is changed and the modulation is therefore dynamic.
  • the encryption level is further increased by means of a permutation function, which defines the order of the mapping patterns to be used.
  • the encryption level is further increased through the use of a hop interval, which differs in length for different connections.
  • the encryption level may be further increased if redundancy is accepted, in which the number of usable carriers that transmit a partial data stream is smaller than the number of constellation points, and the remaining carriers are occupied with a pseudo random code.

Abstract

Method of modulating a digital data stream in MC technology, in which the constellation points (Xo, X1 ... XN-I) change their sequence in accordance with a mapping pattern (Ψi) during modulation. This dynamic mapping represents an encryption, since it is not readily possible for an unauthorized subscriber to restore the original sequence. The encryption level is further increased by the use of a set of multiple mapping patterns (Ψi), which is implemented during transmission in the form of a loop. The encryption level is further increased by defining a hop interval (Ihop), indicating the validity of an individual mapping pattern, after the handshake. The encryption key defines a set of mapping patterns (Ψi), a permutation function (Si), which indicates the order of use of the individual elements of the set of mapping patterns, and a hop interval (Ihop).

Description

MODULATION AND ENCRYPTION OF A DIGITAL DATE STREAM, METHOD OF DECODING, MULTI- CARRIER TRANSMISSION SYSTEM
The invention relates to a method of modulating a digital data stream and to an appliance for implementing a method of this kind. It relates, in particular, to a multi-carrier transmission system for a network, in which the digital data stream is scrambled during the course of the modulation. In multi-carrier (MC) technology, a single data stream is 5 transmitted at a low data rate via a number of carriers. Multi -carrier systems are used in both wireless and wired standards to increase robustness against frequency-related fading. The OFDM (Orthogonal Frequency Division Multiplex) multiple access method is a particular variant of multi-carrier transmission, which uses orthogonal carriers to enable spectral overlap one with another. 10 Multi-carrier modulation converts the N constellation points of an individual carrier-modulated signal into N coefficients in the frequency domain (carrier values). Examples of carrier-modulated methods are Binary Phase Shift Keying (BPSK), Quadrature Phase Shift Keying (QPSK) and Quadrature Amplitude Modulation (QAM). The association between the constellation points of the single-carrier modulation and the carrier coefficients 15 is normally defined. For example, in the case of a transmitter of a multi-carrier transmission system, the signal transmitted in the complex baseband is as follows: ^) = ∑ -o X^ -nT) (1) wherein t is the current time, e.g. the system time, T is the cycle duration of 20 the signal to be transmitted, N is the number of modulators, Xn is the constellation point of the n-th modulator (QAM in this example) and gn(t) is the waveform of the multi-carrier modulator used. The multi-carrier receiver comprises a filter array with complex-conjugate waveforms g n(t). Since the waveforms are orthogonal, the modulated data can be recovered. This example shows that every constellation point Xn is modulated with the same waveform 25 gn(t) and demodulated with its complex-conjugate waveform g n(t). This means that the mapping between the constellation points and the carrier frequencies is established for the duration of the transmission. As is apparent from equation (1), the number of modulators N, and thereby the number of constellation points X also, is limited. Examples of the prior art are shown in the following drawings. Fig. 1 shows an MC transmitter with QAM modulation. Fig. 2 shows an MC receiver with QAM modulation. Fig. 3 shows a Table representing both the association between the carriers and the transmitting-end constellation points and the association between the complex- conjugate carriers and the receiving-end constellation points.
To illustrate the prior art, Fig. 1 shows an MC transmitter with QAM modulation. The digital data stream is scrambled to multiple constellation points Xo to XN-I. Precisely one coefficient go(t) to gN-ι(t) with a specific waveform is assigned to each constellation point, according to its subscript index. A summator generates an output signal s(t) from the data stream modulated in this manner. To illustrate the prior art, Fig. 2 again shows an MC transmitter with QAM modulation. The complex-conjugate, time-dependent waveform g*(t) is applied to the received, time-dependent signal r(t). The same coefficient, g(t) or g*(t), is used with a specific waveform at the transmitting end and the receiving end. The partial signals are then passed on to a filter array, which produces the corresponding output signals Yo, Yj ... YN-I - The disadvantage of this transmission method is that a signal received by a third party can be demodulated offline, since the association, or mapping, between the constellation points and the carrier coefficients is fixed during the transmission. To illustrate the prior art, Fig. 3 shows a Table, illustrating both the association between the carriers go to gN-i and the transmitting-end constellation points Xo to XN-I and the association between the complex-conjugate carriers g*o to g*N-ι and the receiving-end constellation points Yo to YN-I . It can be seen that the mapping and recovery take place in a specified sequence, i.e. the subscript index is static. Once it has been intercepted and stored, a data stream can be recovered using suitable aids and by trying out various waveforms for g*(t). The transmitted data stream, which is transmitted either wirelessly or by wire, has to be capable of being received and further processed only by the authorized receiver or subscriber. Encryption techniques are used to prevent an unauthorized receiver from receiving the data stream and then determining its content. The encryption hereby takes place in the data link layer (layer 2), in the network layer (layer 3) or the application layer (layer 7) of the OSI 7-layer model by using a key for the encryption that is known only to the transmitter and the authorized receiver. There are a limited number of keys for the encryption, which are stored in both the transmitter and the receiver. At the start of the data transmission, the key valid for this transmission is sent, e.g. in the handshake message. Since the encryption takes place in a layer above the physical layer (layer 1), it is possible to isolate an individual data connection on the physical medium with means suitable for the task. This isolated or copied data stream can then be logged and stored using suitable appliances. This stored data stream can then be decoded offline. It is thus possible for an unauthorized receiver to determine even the content of a data stream that has been transmitted in encrypted form. A known transmission system of this kind is therefore not protected from interception. French patent 2 808 361 claims a method of encrypting a digital signal that is intended to be transmitted, which is composed of consecutive binary elements and is achieved by mapping onto a set of points of a predetermined constellation having a whole number C of points, which are different from a power of 2. With this encryption method, the binary elements of the said digital signal are firstly regrouped into binary, successive code words of length L, wherein the length L is obtained from the equation: L = N + C - 2N, wherein N is an integer, such that: 2N < C < 2N+1. Mapping of the N binary elements of the binary code word onto a point among 2N points of the constellation is then undertaken for each binary code word, wherein this point among the 2N points represents N binary elements in an absolute manner, and wherein the values of C - 2N other binary elements of the binary code word are deductible from the former utilization or non-utilization of C - 2N other points of the constellation, designated special points, wherein each of them represents in a differential manner a binary element among C - 2N other binary elements of the binary code word. In accordance with one embodiment of the French patent 2 808 361, the C - 2N binary elements of the digital signal are suppressed and replaced by markers, which are designed to indicate at least one event relative to the value of the C - 2N binary elements of the digital signal, wherein the markers are encrypted by the special points. Once the occurrence relative to the value of the element or of multiple binary elements in the digital signal has been recognized by utilizing the corresponding special point, it is not necessary to utilize this special point again if this event is not repeated, which enables the number of constellation points utilized during a large number of consecutive code words of the digital signal to be reduced. Reducing the number of constellation points utilized for the same quantity of transmitted information in this manner enables the quality of the transmission to be still further improved. The encryption method from French patent 2 808 361 uses markers that are encrypted by the special points to suppress special binary elements of the digital signal. These encrypted markers intervene in the modulation to increase the yield of the transmitted information whilst retaining the quality of transmission. It is therefore an object of the invention to specify a method of modulating a digital data stream in a multi-carrier transmission system that increases the protection of the data stream from interception. It is further an object of the invention to specify a method of encrypting a digital data stream. One further object is to specify a method of decoding a digital data stream that has been transmitted in encrypted form. It is further an object of the invention to specify an appliance for implementing a method of this kind. It is also an object of the invention to specify a multi-carrier transmission system for a digital data stream. As regards the modulation method, the object is achieved in accordance with the invention by a method for modulating a digital data stream in a multi-carrier transmission system, wherein, in the course of the modulation: - the digital data stream is divided into N partial data streams and scrambled onto N constellation points, - mapping of the N constellation points onto at least N carrier frequencies is undertaken, - through application of a mapping function, encryption is undertaken in that the position of the N constellation points, and thus of the partial data streams, is changed in respect of their sequence in the frequency domain in accordance with a mapping pattern. The digital data stream is divided into N partial streams in a multi-carrier transmission system, wherein N is an integer. These partial streams are assigned to constellation points according to the sequence of their indices. However, they are not assigned in their sequence to the carriers in the frequency domain. As a result, encryption takes place, since any third party who attempts to intercept this connection will be unaware of the sequence of the original partial data streams and therefore cannot piece them together. In accordance with one embodiment of the invention, a set of mapping patterns is available, and during modulation of a data stream during a connection, the mapping function uses individual elements or mapping patterns from the set of mapping patterns. The encryption level is increased thereby. Known deciphering methods work on the basis that the individual letters of a language occur with a certain frequency. This approach of taking frequency into account is not successful if, with this embodiment of the invention, the assignments are changed during the course of a connection. In accordance with a further embodiment of the invention, the set of mapping patterns is implemented in the form of a loop, from the beginning to the end and then starting at the beginning again. A compromise can thereby be found as regards the dynamics of the mapping, i.e. the changing of mapping patterns and the memory space needed for storing the mapping patterns. In accordance with a preferred embodiment of the invention, the contents of a set of mapping patterns used by a subscriber to the network is not constant for each connection. This means that a different set of mapping patterns is compiled for each connection. This is done by a permutation function, which defines the content. The object is also achieved in accordance with the invention by a method for encryption of a digital data stream to be transmitted, which comprises the following steps: - transmitting of an encryption key and thereby: - defining a permutation function, - defining a set of mapping patterns, - defining a hop interval, wherein the last three steps may be performed in any order. Before the start of data transmission, a handshake is established between two subscribers to a network. Once the handshake has been established, a protocol or encryption key is transmitted, making the information necessary for the actual transmission available to the receiving subscriber. In accordance with the invention, a permutation function is defined with the encryption key, indicating which mapping patterns are to be used in which order during the actual transmission. In addition, a set of mapping patterns is defined, the content of which is the assignment of the individual constellation points to arbitrary carriers.
Furthermore, a hop interval is defined, defining the time of change from one mapping pattern to the next. The defining of the permutation function, the set of mapping patterns and the hop interval serves for alignment of the transmitting and receiving subscribers to the network, in order to ensure that both subscribers are using the same encryption method. The defining of the encryption method may take place in any order. As regards the encryption method, the object is also achieved in accordance with the invention through the implementation of a permutation procedure, which comprises a loop with the following steps: - set an interval to 1 , - wait for the end of a predefined hop interval, - increase the interval by the value of 1 , - undertake a comparison of whether the current value of the interval is greater than the total number of elements in a permutation function, which indicates the positions of the mapping patterns to be used for a modulation of the digital data stream, wherein one or the other of the following then takes place: - if the result of the comparison is positive: reset the interval to 1, - if the result of the comparison is negative: equate the current mapping function with the mapping pattern located at the position specified by the permutation function. The advantage of the encryption method in accordance with the invention is that no extra bandwidth is necessary for the data transmission. In a further embodiment, however, redundancy is deliberately generated in that the number of N constellation points is greater than the number m of usable carriers. Usable carriers are those that transmit a partial data stream. The remaining (N-m) carriers are occupied with a pseudo random code. The encryption level is thereby further increased. The permutation procedure enables the mapping pattern serving for the encryption to be changed again and again during a connection without any prior knowledge of the actual length of the connection. As regards the appliance for implementing a modulation method or encryption method, the object is achieved in accordance with the invention in that it is equipped with a first controller, which controls the execution of the mapping function. As regards the decoding method for a received digital data stream that has been transmitted in encrypted form, the object is achieved in accordance with the invention through the implementation of a second permutation procedure, which comprises a loop with the following steps: - set an interval to 1 , - wait for the end of a predefined hop interval, - increase the interval by the value of 1 , - undertake a comparison of whether the current value of the interval is greater than the total number of elements in a permutation function, which indicates the positions of the recovery patterns to be used for a demodulation of the encrypted digital data stream, wherein one or the other of the following then takes place: - if the result of the comparison is positive: reset the interval to 1, - if the result of the comparison is negative: equate the current recovery function with the recovery pattern located at the position specified by the permutation function. This method also begins with the resetting of an interval to 1, in order that a defined starting point is present, from which point counting takes place on expiry of the hop interval. The receiving subscriber is notified of the hop interval and permutation function after the handshake. The content of the recovery pattern to be used currently is derived through creation of the complex-conjugate waveform of the relevant mapping pattern. It is thereby ensured that the authorized receiving subscriber is using the same procedure as the transmitting subscriber. As regards the decoding appliance, the object is achieved in accordance with the invention in that it is equipped with a second controller, which controls the execution of the recovery function. As regards the multi-carrier transmission system, the object is achieved in accordance with the invention by a multi-carrier transmission system with an appliance for modulating a digital data stream that is scrambled during the modulation, and with an appliance for decoding a digital data stream that has been transmitted in encrypted form, which exhibits means for: - undertaking an encrypted modulation, - undertaking the recovery of a digital data stream that has been transmitted in encrypted form. This multi-channel transmission system exhibits an encryption mechanism, which takes place in the physical layer of the network (layer 1 of the OSI layer model). The above-described methods in accordance with the invention may be used in either a wireless network, such as the mobile radio network or a WLAN (Wireless Local Area Network), or a wired network, such as a LAN (Local Area Network).
The invention will be further described with reference to examples of embodiments shown in the drawings, to which, however, the invention is not restricted. Fig. 4 shows, in a schematic representation, an appliance in accordance with the invention for modulating a digital data stream to be transmitted. Fig. 5 shows, in a schematic representation, an appliance in accordance with the invention for demodulating and decoding a received digital data stream. Fig. 6 shows a Table, in which examples of mapping patterns are entered. Fig. 7 shows a Table giving examples of possible permutation functions. Fig. 8 shows schematically, in a flowchart, a method in accordance with the invention for encrypting a digital data stream. Fig. 9 shows schematically, in a flowchart, a method in accordance with the invention for decoding a scrambled data stream.
Fig. 4 shows, in a schematic representation, an appliance 1 in accordance with the invention for modulating a digital data stream to be transmitted, comprising the partial streams do, di ... dN-i. In this example, the partial streams of the data stream are scrambled onto the constellation points Xo, Xi ... XN-I by quadrature amplitude modulation. The encryption of the scrambled data stream then takes place in that the constellation points Xo, Xi ... XN-I are mapped onto the carriers go(t), gι(t) ... gN-ι(t) according to a mapping function ψn , wherein they are regrouped in respect of their subscript indices. The content of a constellation point thereby has a different position in the frequency domain. The mapping of the constellation points in accordance with the invention thus differs from the prior art, i.e. it does not take place in the order of the predetermined positions, but in accordance with a mapping function ψn. The subscript index n hereby indicates that an individual mapping pattern Ψ, has a validity of one interval of length n, and then a change takes place. The interval n may hereby be defined in relation to time and correspond to a cycle duration Th0p or defined in relation to data packets and correspond to a specific number Q of data packets. The mapping is therefore dynamic. The current mapping function ψn is then part of a quantity totaling H mapping patterns Ψ,: ^ e {Ψ, , Ψ2 , ... Ψ„ } (2) wherein H is the integral quantity of mapping patterns Ψ, and n is the interval that indicates the validity of the respective current mapping function ψn. In one embodiment, the mapping patterns Ψ, are applied successively, wherein the position of the mapping pattern is determined by the permutation function S,={ρ_l, p_2 ... p_M}, so that: Ψn = Ψp_π (3) The current mapping function ψn determines the mapping between the constellation points Xo, Xi ... XN-I and the mapping points ao, ai ... aN-i, and thereby also the carrier frequencies go(t), gι(t) ... gN-ι(t), since, with this embodiment, the mapping points and the carrier frequencies are assigned to each other in accordance with their subscript indices. This definition is shown in the following equation (4): [a0 a .... aN_ T = ψXx, X. ... XN- ) (4) It can also be seen from Fig. 4 that, with the appliance 1 in accordance with the invention for modulating a digital data stream in a multi-carrier transmission system, an encryption method is added to a modulation method that is known per se. The combination of modulation and encryption in accordance with the invention takes place in the physical layer, i.e. layer 1, of the OSI 7-layer model. A dynamic mapping controller 2 controls the assignment of the constellation points to the mapping points and carriers in accordance with the mapping function. The mapping patterns are stored in a memory, e.g. a RAM (Random Access Memory). The encryption key transmitted after the handshake defines inter alia the mapping patterns to be used and their sequence and validity duration. These definitions are stored or at least put into intermediate storage, so that the dynamic mapping controller has access to them. Fig. 5 illustrates, in a schematic representation, an appliance 3 in accordance with the invention for recovery, i.e. for demodulation and decoding, of a scrambled, encrypted data stream. The digital data stream has been scrambled and encrypted during the modulation. In this example, the complex-conjugate, time-dependent waveform g*(t) is applied to the received, time-dependent signal r(t). The partial signals are then sent to a filter array, which creates the corresponding output signals bo, bi ... b -i as intermediate values. The receiving-end constellation points Yo, Yi ... YN-I are created from the intermediate values by applying a dynamic recovery function φn. This also sends the indices into the correct, successive order. The encryption key transmitted after the handshake, or its content, is stored, or put into intermediate storage, e.g. in a RAM, at least for the duration of the transmission, demodulation and decoding. A dynamic recovery controller 4 controls the assignment of the complex- conjugate carriers to the receiving-end constellation points. Fig. 6 shows a Table in which examples of mapping patterns Ψ, are entered. In this example, according to a first mapping pattern Ψ„ the constellation point X0 is combined with the waveform go, the constellation point X\ with the waveform g -i and the constellation point XN-I with the waveform gj. Each of the individual mapping patterns Ψi, Ψ2 ... ΨH> wherein H is an integer, represents an encryption, since the constellation points have changed position as regards their sequence in the frequency domain. A further encryption is achieved by using successive different mapping patterns during one transmission. The number H of elements of the mapping function ψn is hereby restricted, as is apparent from equation (2). The current mapping function ψn is, however, variable, as is apparent from equation (3). This is achieved because the different mapping patterns Ψ, are used again and again in a loop. At the receiving end, the corresponding recovery function φn assigns the constellation points Yo, Yi ... YN-I by application of the complex-conjugate waveform g o, g I ... g N-i- Before the start of data transmission, the sequence and the interval duration n for which the mapping patterns Ψls Ψ2 ... ΨH are to be used are defined during the handshake between the two partners to a connection. The Table in Fig. 6 illustrates that, in accordance with the invention, the mapping of the constellation points onto the carriers takes place dynamically, i.e. in accordance with a mapping function. In this example, four mapping functions Ψi to ΨH are shown. It is apparent that the number of constellation points and of carriers is the same and that every constellation point Xo to XN-I is mapped on one of the carriers go to gN-i- The example shows possible assignments for four mapping patterns Ψ. In one embodiment of the invention, the mapping patterns Ψi to Ψ4 are used successively. If the transmission is not yet complete when the last mapping function has finished, a start is again made at the first mapping function for the encryption. In accordance with a preferred embodiment of the invention, the mapping patterns Ψi to ΨH and the recovery patterns Φj to ΦH are used not successively, but in a sequence that is specified by one of the permutation functions S,. Fig. 7 shows a Table which, for explanatory purposes, gives examples of possible permutation functions Sι, S and S . Here, L is an integer which indicates the entire number of available, predefined permutation functions S,. In this example, the length M of each individual permutation function is 5. This means that every individual permutation function S, indicates the sequence of utilization for 5 mapping patterns Ψ,. The same mapping pattern may occur multiple times. Individual mapping patterns from the "stock", i.e. individual predefined assignments of constellation points to carriers, may also be omitted. The number M of positioning information p_i is an integer and may be greater or smaller than the number H of mapping patterns Ψ, or equal to it. Preferably: M>=H, so individual mapping patterns are used multiple times during one loop. At the start of a transmission, which of the three permutation functions Si to SL possible in this example is to be used is defined between transmitter and receiver. The change from one mapping pattern Ψ, to the next takes place on expiry of a hop interval Ihop. A hop interval Ih0p is alternatively defined by: a) a time Thop or b) a number Q of data packets. An appropriate appliance is present, both at the transmitting end and the receiving end, to measure the time Ihop in accordance with alternative a) or to count the number Q of data packets in accordance with alternative b). It is obvious that, in the transmission system, both the transmitter and the receiver have the same time, e.g. t is the system time of the network, to which all subscribers are synchronized. Fig. 8 shows schematically, in a flowchart, a method in accordance with the invention for encrypting a digital data stream. Following on from the handshake 100, at step 200 the encryption key is transmitted. This initiates the following, in any order: - the defining of a permutation function S, 210, - the defining of mapping patterns Ψ, 220, - the defining of a hop interval Ihop 230. The permutation function S, indicates the order in which the mapping patterns Ψ, are to be used. Definition 210 of the permutation function valid for the current transmission may alternatively take place by: c) Transmitting a vector S„ which contains the specific permutation sequence {p_l, p_2 ... p_M} or d) Transmitting only the name of an individual permutation function S,. Alternative c) enables an unauthorized third party to intercept the permutation sequence and therefore comprises an aid to decoding the transmitted digital data stream. However, this method has the advantage that space is saved, both at the transmitting and the receiving end, since the permutation sequence valid for the current transmission need only be put into intermediate storage and may be deleted on termination of the transmission. Alternative d) presupposes that, both at the transmitting and the receiving end, all possible permutation functions Si, S2 ... SL have to be permanently stored in order that the permutation function S, valid for the transmission can be invoked. The advantage of this variant is that an unauthorized third party cannot determine the sequence of mapping functions ψ, implied by the permutation function S, used, since it is not transmitted. Step 220, defining mapping patterns, may alternatively take place by either: e) Transmitting the specific, individual mapping pattern Ψ, in the form of vectors containing the assignments of constellation points to mapping points or carriers. or f) Transmitting the name of the mapping pattern Ψ, to be used . The advantages and disadvantages of alternatives e) and f) are, as with the defining of the permutation function S„ that the transmission of the specific information reduces the protection against interception, and the storage of predefined mapping patterns occupies space at both the transmitting and receiving ends. Step 230, defining the hop interval Ih0p means, alternatively: g) Specifying a cycle duration Thop or h) Specifying a number Q of data packets. The dynamic mapping 300 then begins. The first permutation procedure 400 is as follows: at step 410, the interval n is set to 1 and the current mapping function ψi is equated with the mapping pattern Ψp t whose position p i is specified by the permutation function S,. At step 420, there is a wait for the expiry of the hop interval Ihop- Measurement of the time for determining the end of the cycle duration, or the counting of the transmitted data packets, takes place by means of appropriate appliances, such as a counter or a flip-flop. When the end of the hop interval Ihop has been reached, the interval n is increased by a value of 1 at step 430. At step 440, a comparison is made of whether the current value for the interval n is greater than the total number M of elements of the permutation vector. If the result of the comparison is "yes", the loop starts again at step 410 and the interval n is reset to the value of 1. If the result of the comparison is "no", step 450 invokes the mapping pattern located at the n-th position p_n of the permutation function S, , i.e. ψn = Ψp n , and this is applied continuously until the end of the hop interval Ihop is reached in the course of the loop at step 420, after which the interval n is increased by a value of 1 at step 430. Fig. 9 shows schematically, in a flowchart, a method in accordance with the invention for decoding a scrambled data stream. Once the handshake has taken place at 500, the encryption key is transmitted at step 600. This initiates the following: - the defining of a permutation function S, 610, - the defining of recovery patterns Φ, 620, - the defining of a hop interval Ihop 630. The permutation function S, is the same as that used for the transmitting-end modulation and encryption, and indicates the order in which the recovery patterns Φ, are to be used. The definition of the permutation function S, valid for the current transmission may alternatively take place by: i) Storing, or putting into intermediate storage, a vector S,, which contains the specific permutation sequence {p_l, p_2 ... p_M} or j) Storing, or putting into intermediate storage, an individual permutation function S,. Which of the alternatives i) or j) is selected depends on the transmitter's operating mode. The disadvantages specified for alternatives c) and d) apply here. The step of defining recovery patterns, 620, may alternatively take place by: k) Storing, or putting into intermediate storage, the specific, individual recovery pattern Φ, in the form of vectors that have been transmitted by the transmitter or 1) Storing, or putting into intermediate storage, the recovery pattern Φ, corresponding to the name of the mapping pattern Ψ, used or m) Generating the recovery pattern Φ, corresponding to the transmitted mapping pattern Ψ,. The advantage of alternative k) is that only the patterns necessary for the current data transmission are stored. The disadvantage is that, in some circumstances, these could be intercepted during the transmission of the encryption key. The advantage of alternative 1) is that the encryption key contains no specific data necessary for decoding. The disadvantage is that all possible recovery patterns have to be stored, including those that are not necessary for the current transmission. Alternative 1) has the disadvantage that a time delay may possibly occur as a result of the generation of the recovery pattern not yet being completed before the encryption key is fully transmitted and the data stream begins. Step 630, defining the hop interval Ihop may alternatively take place by: n) Storing a received cycle duration Thop or p) Storing a received number Q of data packets. Alternatives n) and p) are governed by the transmitter's operating mode during this connection. Only then does dynamic recovery begin at 700. The second permutation procedure 800 is comparable with the first permutation procedure 400 of the transmitter, since the decoding has to take place in steps corresponding with encryption. At step 810, the interval n is set to "1" and the current recovery function φi is equated with the recovery pattern φp , located at position p i of the permutation function S,. At step 820, there is a wait for the expiry of the hop interval Ihop. Measurement of the time for determining the end of the cycle duration Th0p, or the counting of the transmitted data packets for determining the number Q, takes place by means of appropriate appliances, such as an oscillator, a counter or a flip-flop. When the end of the hop interval Ihop has been reached, the interval n is increased by a value of 1 at step 830. At step 840, a comparison is made of whether the current value for the interval n is greater than the total number M of elements of the permutation vector. If the result of the comparison is "yes", the loop starts again at step 810 and the interval n is reset to the value of 1. If the result of the comparison is "no", step 850 invokes the recovery pattern located at the n-th position p_n of the permutation function S, , i.e. φn = φp n , and this is applied continuously until the end of the hop interval Ih0p is reached in the course of the loop at step 820, after which the interval n is increased by a value of "1" at step 830. The encryption key 600 initiates, with three steps, the defining of different variables that are valid for this current connection. The order of defining the variables may, without affecting the invention, differ from that shown as an example in Fig. 9: definition of a permutation function 610, definition of recovery patterns 620 and definition of a hop interval 630. The invention may be summarized by the phrase "encrypted modulation". A first encryption level is achieved in that the constellation points change their order in the frequency domain. A further encryption level is achieved in that different mapping patterns are used during a connection, i.e. the assignment of the transmission channels is changed and the modulation is therefore dynamic. The encryption level is further increased by means of a permutation function, which defines the order of the mapping patterns to be used. The encryption level is further increased through the use of a hop interval, which differs in length for different connections. The encryption level may be further increased if redundancy is accepted, in which the number of usable carriers that transmit a partial data stream is smaller than the number of constellation points, and the remaining carriers are occupied with a pseudo random code.

Claims

CLAIMS:
1. A method of modulating a digital data stream in a multi-carrier transmission system, wherein, in the course of the modulation:
- the digital data stream is divided into N partial data streams (do, d] ... dN-i) and scrambled onto N constellation points (XG, Xi ... XN-I), - mapping of the N constellation points (Xθ5 Xi ... XN-I) onto at least N carrier frequencies (go(t), gι(t) ... gN-ι(t)) is undertaken, characterized in that, in the course of the modulation, through the application of a mapping function (ψn), encryption is undertaken in that the position of the constellation points (X0, Xi ... XN-I), and thus of the partial data streams (do, d] ... dN-i), is changed in respect of their sequence in the frequency domain (g0(t), gι(t) ... gN-ι(t)) in accordance with a mapping pattern (Ψ,).
2. A method as claimed in claim 1, characterized in that, during a modulation, the mapping function (ψn) uses, in succession, individual elements from a set of mapping patterns (Ψ,).
3. A method as claimed in claim 2, characterized in that the set of mapping patterns (Ψ,) is implemented in the form of a loop, from the beginning to the end and then starting at the beginning again.
4. A method as claimed in claim 2 or 3, characterized in that a permutation function (S,) defines the content of a set of mapping patterns (Ψi).
5. A method of encrypting a digital data stream to be transmitted, characterized by the following steps: - transmitting an encryption key (200) and thereby: - defining (210) a permutation function (S,), - defining (220) a set of mapping patterns (Ψi), - defining (230) a hop interval (IhoP), wherein the last three steps (210, 220, 230) may be performed in any order.
6. A method of encrypting a digital data stream characterized by the implementation of a permutation procedure (400), which comprises a loop with the following steps: - setting (410) an interval (n) to 1, - waiting (420) for the end of a predefined hop interval (Ihop), - increasing (430) the interval (n) by the value of 1, - undertaking a comparison (440) of whether the current value of the interval (n) is greater than the total number (M) of elements in a permutation function (S;), which indicates the positions of the mapping patterns (Ψ,) to be used for a modulation of the digital data stream, wherein one or the other of the following then takes place: - if the result of the comparison is positive: resetting the interval (n) to 1, - if the result of the comparison is negative: equating the current mapping function (ψn) with the mapping pattern (Ψp n) located at the position (p_n) specified by the permutation function (S,).
7. A method of encrypting a digital data stream, which is distributed in the course of the modulation onto m usable carriers, characterized in that the number N of constellation points used is greater than the number m of carriers that transmit partial data streams.
8. An appliance (1) for implementing a method as claimed in any one of the preceding claims, characterized in that it is equipped with a first controller (2), which controls the execution of the mapping function (ψ„).
9. A method of decoding a received digital data stream that has been transmitted in encrypted form, characterized by the implementation of a second permutation procedure (800), which comprises a loop with the following steps: - setting (810) an interval (n) to 1, - waiting (820) for the end of a predefined hop interval (Ihop), - increasing (830) the interval (n) by the value of 1, - undertaking a comparison (840) of whether the current value of the interval (n) is greater than the total number (M) of elements in a permutation function (S,), which indicates the positions of the recovery patterns (Φj) to be used for a demodulation of the encrypted digital data stream, wherein one or the other of the following then takes place: - if the result of the comparison is positive: resetting the interval (n) to 1, - if the result of the comparison is negative: equating the current recovery function (φn) with the recovery pattern (Φp n) located at the position (p_n) specified by the permutation function (S,).
10. An appliance (3) for implementing a method as claimed in claim 9, characterized in that it is equipped with a second controller (4), which controls the execution of the recovery function (φn).
11. A multi-carrier transmission system with an appliance, in particular an appliance (1) as claimed in claim 8, for modulating a digital data stream that is scrambled during the modulation, and with an appliance, in particular an appliance (3) as claimed in claim 9, for decoding a digital data stream that has been transmitted in encrypted form, characterized in that it exhibits means for: - undertaking an encrypted modulation, - undertaking the recovery of a digital data stream that has been transmitted in encrypted form.
12. A use of any one of the above-mentioned methods in a wireless or in a wired network.
PCT/IB2004/051364 2003-08-13 2004-08-03 Modulation and encryption of a digital date stream, method of decoding, multi-carrier transmission system WO2005018184A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP03102525.7 2003-08-13
EP03102525 2003-08-13

Publications (2)

Publication Number Publication Date
WO2005018184A1 true WO2005018184A1 (en) 2005-02-24
WO2005018184A8 WO2005018184A8 (en) 2005-08-11

Family

ID=34178564

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2004/051364 WO2005018184A1 (en) 2003-08-13 2004-08-03 Modulation and encryption of a digital date stream, method of decoding, multi-carrier transmission system

Country Status (2)

Country Link
TW (1) TW200511788A (en)
WO (1) WO2005018184A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2396462A1 (en) * 1999-12-22 2001-06-28 Deutsche Telekom Ag Method and circuit arrangement for the secure transmission in digital transmission systems
WO2002102130A2 (en) * 2001-06-16 2002-12-27 Valence Semiconductor, Inc. Control of power spectral density by modulation of subcarriers which do not carry data
US6501841B1 (en) * 1998-12-17 2002-12-31 Intel Corporation Method for providing security for a transmission of information through a plurality of frequency orthogonal subchannels

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6501841B1 (en) * 1998-12-17 2002-12-31 Intel Corporation Method for providing security for a transmission of information through a plurality of frequency orthogonal subchannels
CA2396462A1 (en) * 1999-12-22 2001-06-28 Deutsche Telekom Ag Method and circuit arrangement for the secure transmission in digital transmission systems
WO2002102130A2 (en) * 2001-06-16 2002-12-27 Valence Semiconductor, Inc. Control of power spectral density by modulation of subcarriers which do not carry data

Also Published As

Publication number Publication date
TW200511788A (en) 2005-03-16
WO2005018184A8 (en) 2005-08-11

Similar Documents

Publication Publication Date Title
US8751810B2 (en) Establishing shared information in a network
US4924516A (en) Method and system for a synchronized pseudo-random privacy modem
US7904723B2 (en) Method and apparatus for enhancing security of wireless communications
JP4284773B2 (en) Transmission device, reception device, communication system, transmission method, and communication method
JP4247267B2 (en) Radio transmitter, radio receiver, radio communication system, and radio signal control method
JP4284774B2 (en) Transmission device, reception device, communication system, transmission method, and communication method
RU2419990C2 (en) Alarm of control channel in wireless communication
US6683955B1 (en) Method for receiving a secured transmission of information through a plurality of frequency orthogonal subchannels
US20060291656A1 (en) Encryption method and decoding method for a digital transmission system
US7813409B2 (en) Secure network using orthogonal frequency division multiplexing spread spectrum communications
US11038730B2 (en) Method for exploiting preamble waveforms to support device and network functionalities in wireless systems
US11811506B2 (en) Application of key exchange based physical layer security methods
WO2005018184A1 (en) Modulation and encryption of a digital date stream, method of decoding, multi-carrier transmission system
US6501841B1 (en) Method for providing security for a transmission of information through a plurality of frequency orthogonal subchannels
KR20060073596A (en) Method and device for encrypting a digital data stream in a transission system
US20110228822A1 (en) Spectral smoothing wireless communications device and associated methods
JP5254820B2 (en) COMMUNICATION DEVICE, COMMUNICATION SYSTEM, AND COMMUNICATION METHOD
Sarkiss et al. Multi-library Coded Caching with Partial Secrecy
AU2013326454B2 (en) Embedding a digital watermark in a signal
CN117676561A (en) Cognitive radio signal safe transmission method based on overlay and underly
JP2011259151A (en) Transmission system, transmitter, receiver, transmission method and program

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
CFP Corrected version of a pamphlet front page

Free format text: UNDER (54) PUBLISHED TITLE REPLACED BY CORRECT TITLE

122 Ep: pct application non-entry in european phase