CA1258884A - Method and apparatus for transceiving cryptographically encoded digital data - Google Patents

Method and apparatus for transceiving cryptographically encoded digital data

Info

Publication number
CA1258884A
CA1258884A CA000494791A CA494791A CA1258884A CA 1258884 A CA1258884 A CA 1258884A CA 000494791 A CA000494791 A CA 000494791A CA 494791 A CA494791 A CA 494791A CA 1258884 A CA1258884 A CA 1258884A
Authority
CA
Canada
Prior art keywords
synchronization
bit
signals
data
cryptographic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired
Application number
CA000494791A
Other languages
French (fr)
Inventor
Craig F. Szczutkowski
Eugene H. Peterson, Iii
Satish Kappagantula
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
General Electric Co
Original Assignee
General Electric Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by General Electric Co filed Critical General Electric Co
Priority to CA000494791A priority Critical patent/CA1258884A/en
Application granted granted Critical
Publication of CA1258884A publication Critical patent/CA1258884A/en
Expired legal-status Critical Current

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Synchronisation In Digital Transmission Systems (AREA)

Abstract

METHOD AND APPARATUS FOR TRANSCEIVING
CRYPTOGRAPHICALLY ENCODED DIGITAL DATA

ABSTRACT OF THE DISCLOSURE
Method and apparatus are disclosed for transceiving digital control and cryptographically encoded data signals in a unique format. The format includes frame synchronization, cryptographic synchronization and selective signalling (addressing) information both in a preamble portion to an entire message and recurrently at regular intervals throughout a message of encrypted digital voice signals. This arrangement permits successful late entry and/or synchronization recovery (both frame and cryptographic synchronization recovery) in an addressable selective signalling type of private radio communication system even if such synchronization is never acquired from the preamble (e.g. because of a long radio transmission channel fade or the like) or in the event such synchronization is temporarily lost after the preamble has already occurred.

Description

- ` ~
31il4 METHOD AND APPARATUS FOR TRANSCEIVING
CRYPTOGRAPHICALLY ~NCODED DIGITAL DATA
SPECIFICATION
This invention relates to method and apparatus for transceiving digital signals. Although generally usable in any transmission media (e.g. wire lines using modems), it finds especially advantageous application over a radio communication channel. Irl particular, it is relates to systems in which digitized crypto~raphically encoded voice (or other) data signals as well as suitable digital synchronization and/or other digital control signals are transmitted on the same communication channel with the digitized and encrypted voice data signals.
This application is related to other commonly assigned Canadian applications claiming other inventions contemplated for combined use in the commercial embodiment of this invention: Canadian Application Serial No. 498,346, filed December 20, 1985, Szczutkowski et al, entitled "Cryptographic Digital Signal Transceiver Method and Apparatus"; Canadian Application Serial No. 494,789, filed November 7, 1985, Zinser, entitled 'IHybrid Subband Coder/Decoder Method and Apparatus"; and Canadian Application Serial No. 494,790, filed November 7, 1985, Szczutkowski, entitle "Method and Apparatus for Efficient Digital Time Delay Compensation in Compressed Bandwidth Signal Processing".
Transceiving digital control and message data signals ove~ radio communication channels is already .. ''''~, ,~ ~, ~2S~1~il84 well known in the art. For example, reference may be had to commonly-assigned U.S. Patent No. ~,027,243, issued May 31, 1977 to Stackhouse et al which describes a form oE digital message generator for a digitally controlled radio transmitter and receiver in a radio communication system. Provisions are made for acquiring bit synchronization as well as word synchronization (including the multiple transmission of address information in complemented and uncomplemented form) in each of a steady succession of digital command messages transmitted between radio station sites. A modem circuit capable of detecting a 2 out of 3 voted Barker code sync word for frame synchronization is included in the Stackhouse et al system.
Cryptographic encoding of digitized speech signals is also well known in the prior art. For example, the Data Encryption Standard (DES) utilized in the presently preferred exemplary embodiment of this invention is itself well known and more fully described in detail in the following printed publications:
"Federal Information Processing Standards"
Publication No. 46, Data Encryption Standard, U.S. Department of Commerce, NTIS, 5285 Port Royal Road, Springfield, Virginia 22161;
"Federal Standard 1027 GSA, Telecommunications, General Security Requirements for Equipment Using DES" available from NTIS or the U.S. Government Printing Office; and "Federal Information Processing Standards Publication No. 81, DES Modes of Operation"
(the "output feedback mode" is utilized in the presently preferred embodiment of this invention), also available from NTIS or the U.S. Government Printing Office.

~2S~8~4 - 3 - 45-MR~00466 Typically, as ln DES, encoded digital voice signals are transmitted in blocks or "frames" oE fixed size along with a progressively changing encryption "vector" which, when combined with appropriate secret "key" digital data, may be used to encode or decode digitized voice data (or any other type o digital data).
It is also known to provide automatic selective signalling within radio communication networks of various types. Sometimes a separate "control" channel is utilized for achieving the desired selective signalling functions (e.g. selection of available communication channels and selection of a desired subset of message recipients within the system).
However, for various reasons, in prior voice privacy systems utilizing digitized and cryptographically encoded voice data signals, truly automatic selective signalling capability is not believed to have been previously available. Nevertheless, it is hlghly desirable in many radio communication environments to have such selective signalling capability. For example, it may be very useful to selectively address one of plural repeaters that may be within range of a given transceiver which is generating or relaying such an encrypted digital voice message.
2S It is also believed highly desirable to permit late entry and/or synchroni~ation recovery (both word and cryptographic synchronization recovery) in the context of a digital voice privacy radio communication system having true selective signalling capability.
As explained in Stackhouse et al, above-; mentioned U.S. Patent 4,027,243, a radio frequency communication channel is a relatively noisy and sometimes unreliable environment. Impulse noise, multipath interference and signal fading are typical of the expected problems that must be successfully overcome.
rrhe present invention utilizes a unique format ~L~588~4 ~5 MR-00466 of control and encoded voice digital signals which provides the above set forth desired features especially well in the context of a radio frequency communication channel. It follows, of course, that the same unique format is also advantageous for any other less onerous type of communication channel such as, for example, conventional telephone channels or wire lines (perhaps also using added conventional modems on each end of the channel).
These as well as other objects and advantages of this invention will be more completely understood and appreciated b,v reading the following detailed description of the presently preferred exemplary embodiment of this invention in conjunction with the accompanying drawings, of which:
FIGURE 1 is a schematic block diagram of an exemplary microprocessor controlled radio transceiver in accordance with this invention;
FIGURE 2 is a schematic/graphic depiction of an exemplary preferred format or time sequence of the transmitted and/or received stream of digital signals in the exemplary embodiment of FIGURE l; and FIGURES 3-5 are simplified general flow block diagrams of exemplary computer programs that are embodied in the control program memory devices of the exemplary FIGURE 1 system embodiment for the purposes of sync maintenance, acquisition and late entry.
The transceiver of FIGURE 1 includes the usual radio frequency transmitter 10 and radio frequency receiver 12 (or any other communication channel transmitter and receiver such as, for example r the transmit lines and receive lines of a conventional wire line modem). ~s indicated in FIGURE 1, the transceiver may be in communication with one or more repeaters or transceivers or base station(s~ over a radio frequency or other Eorm of communication channel. The clear/private - 5 - 45-~R-466 switches Sl, S2 (typically realized as conventional solid state controlled MUX switches used to switch analog signals under eontrol of digital switch signals) may be provided so that the transceiver can operate in a conven-tional "cl~ar" mode or alternatively, in the cryptographicor "private" mode. For example, when the switches are in the "clear" mode as shown in FIGURE 1, the audio input coming from a microphone and to be transmitted is simply directly connected to transmitter 10 while the output of receiver 12 is direetly connected to the usual receiver audio output circuit.
However, when switches Sl, S2 are moved to the "private" mode position, then the microprocessor controlled remai~der of the FIGURE l circui-try is switched into operation between the usual receiver audio input/output circuits and the usual radio frequency transmitter/receiver circuits 10, 12. In particular, the microprocessor controlled circuitry will take eonventional audio input signals (e~g. from a microphone or audio amplifier or the like) and convert those to a stream of cryptographically encoded digital signals input at switch Sl to the modulator of transmitter 10. On the receiving side, a stream of digital signals arrives via the detector output of receiver 12 and is ultimately decoded and converted into analog audio signals at the lower eontact of switch S2 before being passed onto the usual receiver audio output circuits (e.g. audio amplifiers, loudspeakers, etcetera)~
In the preferred embodiment, the detector output of receiver 12 is constantly eonnected to the "private" digital decoding circuits (as shown in FIGURE l) so that the received signal can constantly be monitored. If a switch from "clear" to "private"
mode is unexpectedly effected at the transmitter (e.g.
initially or in the middle of an ongoing message), then the receiver "private" circuit will automatically begin the requisite decoding process and have decoded audio signals switched to the receiver audio output circuits automatically. This arrangement also makes it possible for the receiving set to automatically switch itself into the "private" mode wherever incoming digital signals are successfully decoded and in fact, this is contemplated for the preferred embodiment.
The overall architecture of the microprocessor control circuits shown in FIGURE 1 is generally conventional. In particular, the heart of the system is a control microprocessor 14 (e.g. an IntelTM 8031 integrated circuit chip). Communication with the remainder of the digital circuitry is via the usual data bus 16 and control bus 18. The usual push-to-talk (PTT) switch 20 may be considered as one wire in the control bus 18 if desired. A manual clear/private mode switch used for selecting the mode of transmitted voice may also be one wire in the control bus 18 if desired. As should be appreciated, there is no need for a manual receive clear/private mode switch when automatic receive mode ; switching is performed as explained above. The system may include a conventional codec 22 (e.g. an IntelTM 2916 integrated circuit chip) and conventional speech coding circuits 24 in the form of a suitably programmed Digital Signal Processor (DSP) te.g. an NEC 7720 integrated circuit chip) for converting audio signals ta/from digital-analog form in accordance with known speech digitization and processing algorithms.
In the preferred exemplary embodiment, a hybrid subband coding technique is employed in accordance with the invention claimed in the related aforementioned Canadian application of Zinser. There the audio frequency band 180-2900 Hz is split into four octaves with the highest frequency band 1450-2900 Hz being subject to conventional block companded pulse code modulation (BCPCM) and the lower three subbands being subject to conventional ~2~ 84 adaptive pulse code modulation (APCM) digital bandwidth compression techniques~ This plus the novel time delay compensation technique of Szczu-tkowski permit the speech coding to be carried out using but a single DSP chip 24.
However, as should be understood, the use of such speech coding techniques is optional insofar as the presently claimed invention is concerned. The novel message format-ting employed in the present invention may be utilized with any desired type of digital speech encoding algorithm or with any type of digital data (e.g. ASCII, etc.).
The Data Encryption Standard is implemented via conventional DES circuits 26 (e.g. an MC 6859 integrated circuit chip) and a conventional DES key memory 28 (e.g.
64 bytes of RAM). Suitable conventional ROM circuits 30 (e.g. 4 kilobytes~ are also provided to physically embody the program control structure pertinent to the present invention as indicated in FIGURE 1.
The transmit/receive interface circuits 32 are sometimes referred to as "modem" circuits and may also be of conventional design. They preferably include bit restoration circuits of the type described in commonly assigned U.S. Patent No. 4,382,298, issued May 3, 1983 to Evans. Although conventional clock recovery and up/do~n counter circuits can be employed with this invention, it is presently preferred to use the clock recovery circuits described in the Canadian Application Serial No. 468,504, filed November 23, 1984, Evans, and the up/down counter circuits described in the commonly assigned Evans U.S. Patent No. 4,611,337, issued September 9, 1986. Reference may also be had to the aforementioned Stackhouse et al U.S. Patent No. 4,027,243 for digital transmit/receive modem interface circuits suitable for use with radio frequency transmitters and receivers such as transmitter 10 and receiver 12 and for a hardwired Barker code sync word detector. In the preferred exemplary embodiment, the ~L258884 interface 32 may be placed in a "sync search" mode whereupon such a Barker code sync word detector is activated and which thereupon outputs a priority interrupt signal to control microprocessor 14 whenever such a sync word is detected.
A conventional Gaussian Minimum Shift Key (GMSK) filter 34 (e.g. a fourth order low pass sessel filter having an about 7 kilohertz cut-off measured at the 3 dB points) is preferably included to process the stream of digital output signals before they are passed onto the modulator of transmitter 10 as should be appreciated by those in the art.
The output of receiver 12 (e.g. from an fm discriminator) is also preferably passed through a conventional limiter circuit 36 to eliminate d.c. bias effects that otherwise might be present in the output of the receiver discriminator. For example, the limiter 36 may utilize a simple comparator to compare the instantaneous incoming signal from receiver 12 with a running averaged value over some previous relatively short interval as should also be appreciated by those in the art.
The transmit/receive interface 32 may, for ; example, on the transmit side comprise a con~entional parallel-to-serial shift register for generating a serial stre~m of digital binary signals to be transmitted.
On the receive side, the transmit/receive interface 32 may typically utilize a digital phase locked loop for achieving bit synchronization and a hardwired correlator for recognizing a predetermined Barker Code which may be used for achieving word synchronization.
The preferred time sequence of digital signals being transmit-ted by transmitter 10 or received via receiver 12 is schematically depicted in FIGURE 2.
This format or time sequence of digital signals is generated for transmission under program control of the ;

~2S 51884 ,, - 9 - 45-MR-00~66 microprocessor 14 and, in the receive mode, the control microprocessor 14 is also pro~rammed (e.g. via ROM 30) so as to properly detect and decode the same time sequence or format of digital signals. This unique format permits initial and ongoing frame synchronization, repeater address-ing, cryptographic synchronization and selective signalling. All four types of information are repetitively transmitted in a relatively long preamble portion for fade protection (e.g. the usual Raleigh fading which may be expected on radio frequency communication channels) and, in addition, all four types of information are repeatedly retransmitted at regular intervals within the encrypted voice data stream. Fade protecting the preamble by multiple repeats and/or other techniques provides a very high probability of correct initial synchronization and addressing functions. Repeating all four types of information within the voice data stream permits late entry (in the event that the preamble is missed or unsuccessfully decoded) and/or permits recovery of synchronization (in the event that synchronization initially acquired from the preamble is subsequently lost before the end of a given message occurs).
When the transceiver o:E FIGURE 1 is in the "private" mode and the PTT switch is activated, the preamble portion of the format shown in FIGVRE 2 is first transmitted so as to establish bit synchronization, word or frame synchronization, cryptographic synchronization and addressing (e.g. repeater and/or other selective signalling). Fade protection for deep fading (e.g~ up to 45 milliseconds~ is preferably provided by multiple repeats of a synchronization sequence as well as the initialization vector (IV) and selective signalling (SS) signals.
The initial "dotting" sequence is merely an alternating 1,0 pattern of digital signals (e.g. 10101010...~ and i5 continued for a "transmitter ~Z5i8~4 wake-up ti~e" (e.g. 25 milliseconds). During this initial "dotting" time, the receiver circuits can quickly obtain bit synchronization. For example, conventional hardwired bit synchronization circuits might be utilized in the transmit/receive interface 32 as previously described so as to automatically obtain and remain in bit synchronization with the incoming serial stream of digital signals. Those skilled in the art will appreciate that logic l's and O's may be interchanged throughout this discussion since they refer only to two binary levels and not to a rigid voltage polarity or magnitude.
The synchronization sequence next occurs for a time duration equal to the sum of: (a) the maximum expected fade duration, (b) the bit duration required to ensure 9g% synchronization acquisition, and (c) the typical time required for repeater turn-on to occur. The exemplary synchronization seguence includes 12 repeats of 48 bit synchronization groups, each of which groups includes a 16 bit synchronization word S (an 11 bit Barker code such as 11100010010 and 5 bits of fill or dotting), an 8 bit "outside address" (OA) repeated once in complemented form (which may alternatively comprise other internal data configurations such as a 5 bit repeater address repeated twice plus filler) to complete a second 16 bit field and a 5 bit sync number (SN) repeated three times (with the second repeat being in complemented form) plus 1 final bit of odd parity code so as to complete the third 16 bit field in a given 48 bit group. At 9500 baud, it requires approximately 60 milliseconds ((48 x 12)/9600) to transmit all 576 bits of the synchronization sequence in the preamble of FIG~RE 2.
Once a correct synchronization word S is decoded, the following OA and SN fields may be recognized by requiring that all the vectors within each field (2 in the OA field and 3 in the SN Eield) match ti.e. taking into account the complemented form of adjacent repeated ,, :: . . . .

~5~1~il84 \

vectors) to ensure proper frame synchronization and/or that sufficiently error free reception is being enjoyecl.
(Late entry is differentiated from preamble entry by the format of the OA field). The proper synchronization number SN is reconstructed by voting 2 of 3 on the three 5 bit vector fields. The synchronization number data SN not only helps establish the current or instantaneous position within the synchronization sequence, it also helps ensure that the correct boundary is identified between the sync sequence and the following IV and SS signal sequence as shown in FIGURE 2.
The IV and SS fields follow the synchronization sequence in the preamble of FIGURE 2. This second control data sequence includes a 64 bit guard band (GB), a 64 bit initialization vector (IV) and a 16 bit selective signalling address ~SS) repeated 9 times in the overall IV and SS
sequence of 1296 bits depicted in FIGURE 2. The 64 bit guard band GB provides fade protection while the 64 bit IV
field is used to establish cryptographic synchronization in accordance with the conventional DES. The 16 bit selective signalling field SS provides group and individual selective signalling capability within a radio communication net~ork.
The IV and SS sequence subsists for a time duration equal to the sum of: (a) the time required for transmitting the initialization vector IV, (b) the time required for selective signalling transmissions SS, and (c) the degree of fade protection desired for the SS/IV
control data fields. In the exemplary embodiment, approximately 45 milliseconds of fade margin is provided in the IV and SS sequence of 1296 bits.
The selective signalling vector SS may be used for selective calling of individuals or groups using the same DES cryptographic key. Accordingly, truly selective signalling capability is provided within a crypto-graphic communication net.work. The 16 bit SS field may ~L2$~ 4 represent, for example, a user group with individual addresses therewithin so that users with the same cryptographic key nevertheless have the ability to further subdivide their calls to subsets or individual transceivers within their particular network. For example, the SS
field may also be encrypted to facilitate selective signalling within a group of users having the same DES key while providing no information to a user with a different key (or an evesdropper).
The guard band GB may be used for additional message or signalling capabilities if desired but, in the present exemplary embodiment, it is merely filled with a dotting pattern. 64 bits of dotting was chosen so as to provide a fade margin of approximately 45 milliseconds.
The DES initialization vector IV conventionally contains 64 bits and is a pseudo-randomly generated initialization vector used by the conventional DES
encryption algorithm to initialize the cipher-stream generation.
A "five-of-nine" vote is utilized for analyzing the g times repeated IV/SS data sequence. For example, at the receiver each of the nine sequential Gs/IV/SS
data fields is voted bit-hy-bit on an at least five-out-of-nine basis. The voted results are stored as used as the correct IV/SS vectors for cryptographic synchroni-ization and selective signalling purposes.
The preamble format of FIGURE 2 is chosen so as to provide a 99% probability of correct recep~ion in a radio frequency communication channel experiencing up to about 3% bit error rate (BER). In this analysis, fading is treated as a separate process and dealt with by inter-leaving redundant data (or left "open" by using all l's or all O's, any arbitrary pattern or simply dotted guard bands) along with repeated critical synchronization data as shown in FIGVRE~ 2. For example, the E'IGURE 2 ; format is designed so as to protect a~ainst data losses ~L:2Sl3~84 even though up to about 45 milliseconds of fading may occur on -the radio frequency communication channel. The probability o-f correct reception for the required information is then the product of the probabilities of the individual fields.
Thus if Pch is the probability of the correct preamble reception, then Pch = (Pcs ~ Pcoa * Pcsn) *Pcss *Pciv LEquation 1]
where, lQ Pcs is the probability of correct sync S
reception;
Pcoa is the probability of correct OA reception;
Pcsn is the probability of correct sync number SN reception;
Pcss is the probability of correct selective signalling SS address reception; and Pciv is the probability of correc-t initialization vector IV reception.
Assuming a 3% BER and the FIGURE 2 format:
la) for a repeater receiver or a mobile receiver;
Pcs * Pcoa * Pcsn = 0.98964 [~quation 2 (b) for a mobile receiver (the repeater may : not require IV and SS );
Pess * Pciv = 0.99978 IEquation 3]
(c) for the repeater, probability of correet acquisition is Pcra = 0.98964 [Equation 4 (d) for a mobile, probability of correct reception of the preamble is Pcma = 0.98964 * 0.99978 ~Equation 5]
Pcma = 0.98845 IEquation 6]
The format of FIGURE 2 typically provides:
- Initial entry time of about 250 msecs, - Ren-try (in case of temporary sync loss), - Late entry capability :IIL25~31!3~34 - Probability of correct detection of header > 99% at a channel BER of 3%, - Protection against fades of up to about 50 msecs duration, - Falsing rate of less than about once per week.
The output feedback mode of operation of the DES
algorithm requires that a 64-bit vector be transmitted at least once per PTT activation. In the preferred embodiment, the 6~ bit vector is transmitted once per frame to allow for re-entry or late entry. This vector is different for each transmission thereby constituting 1 out of 264 possible vectors~ The vector is called an initialization vector or IV.
The reconstructed SS and IV vectors are the result of voting at least 5-of-9 on the available group of 9 vectors as previously described. The process of voting at least 5-out-of-9 on the incoming data stream has the effect o~ improving the effective bit error rate (BER) of the channel. For a given channel error rate Pe, the probability of correct reception where the probability of ` correct IV and SS reception Pciv*Pcss can be calculated as:
1 _ 80 Pcss*Pciv = ¦ ~ (k) (Pe) (1-Pe) Lk=5 For Pe = .03 t3% BER), then Pciv*Pcss works out as .99978 or 99.98% probability of correct reception.
`, Correct sync S (11 bit Barker code) reception ls ensured by repeating the 11 bits of the Barker code with a 5 bit fill continuously over a finite period. This time was chosen as the sum of the worst case (expected) fade duration and the time taken to repeat the sync pattern so that the probability of correct reception is at least 99%
at a 3% ~ER.

;8~384 - 15 - ~5-MR-00466 The probability that 27 bits wil] be correct at a 3% BER, is simply (1-0.03) or .439, i.e. the probability that the sync ls corrupted is (1~0.439) or .561.
Thus the probability that the sync is corrupted n times in a row is (0.561)n or the probability of correct sync under these conditions is l-(0.561)n. This is required to be at least 0.99 in the exemplary embodiment. The value of n satisfying the above equation is at least 8 (12 is used in the exemplary embodiment and is thus more than ample). The probability of correct sync S and OA
i s 0 ~ 9 9 9 0 2 r The probability of correct preamble reception under these conditions is Pch = Pcs * Pcsiv = 0.99902 *
O.99*0.99978 = O.9899 = ~_O.99.
Following the preamble shown in FIGURE 2 are successive data frames, each of which includes a 112 bit header portion and 2040 bits of encrypted voice data.
The header includes a single repeat of the sync word S, the outside address OA, the initialization vector IV and the selective signalling address SS. No sync count number SN
is provided nor are multiple repeats provided in an attempt to keep the overall data frame length as low as possible (e.g. on the order of 225 milliseconds) and/or to keep the required data processing overhead to a minimum during the time it is necessary to also decode and otherwise process the incoming encrypted voice data.
Nevertheless, by inserting such a header in-to each data frame, enough information is regularly provided so as to allow for late entry into an ongoing message or conversation and/or so as to reestablish lost frame or cryptographic synchronization (e.g. as might occur from temporary loss of signal or multiple transmitting conditions or the like on a typical radio frequency communication channel). A synchronization maintenance control function in the receiver may thus monitor the ; ongoing received da-ta frame header. It may permit a ~ZS~38~3A

certain amount of "Eree wheeling" even if a bad header is sometimes detected since the critical cryptographic initialization vector IV can be predicted from the previously received (correct) IV. Once cryptographic synchronization has been completely lost, the preferred exemplary embodiment requires two valid received IV's (in consecutive data frames) to be detected before proper cryptographic synchronization is resumed.
As also depicted in FIGURE 2, an end of message ~EOM~ signal is transmitted at the end of a message transmission (e.g. upon release of the PTT switch 20).
The EOM signal is continued for about 50 milliseconds in the exemplary embodiment so as to allow for relatively long fades in the received signal while still ensuring that the EOM is properly decoded.
:[n the format of FIGURE 2, the sync word S
; should preferably preceed the other associated fields ~e.g. OA, IV, SS~ so as to permit frame sync acquisition before the other fields are to be detected. However, the exact order of the remaining OA, IV, SS fields is essentially a matter of choice.
Those skilled in the art should be able to readily devise transmission control programs for the microprocessor 14 re~uired to assemble and transmit data streams in accordance with the time sequences depicted in FIGURE 2. However, since the reception processing control is somewhat more involved, an exemplary embodiment of suitable computer program subroutines is presented in FIGURES 3-5 for causing the micro-processor control system of FIGURE l to properly receiveand decode the time sequence of digital signals depicted in FIGU~E 2.
The receive control functions required by the digital signal format of FIGURE 2 may be divided into two major funct.ional computer program subroutines: (a) a synchronization ac~uisition subroutine as shown in ~L2~88~4 FIGURE 3, and (b) a synchronization maintenance subroutine as shown in FIGURE 4. ~ lower level "late entryl' subroutine shown in FIGURE 5 is utilized in conjunction with the other programs of FIGURES 3 and 4 so as to permit successful late entry into an ongoing conversation.
A repeated hard-wired test is made for presence of the 11 bit sarker code synchronization word S in the transmit/receive interface 32 irrespective of the private/
clear mode status thus enabling automatic reception of either DES encoded digital voice or normal analog voice transmissions. Then, whenever decoded voice is present, the control microprocessor 14 itself automatically switches 52 into a "private" receive mode. A suitable visual or other indicator of this automatically derived "private" mode may also be activated by the control microprocessor. (If desired, the transmit portion of switches S2, S2 may also be automatically switched to the "private" mode in readiness for any re-turn transmission.) As will be recalled, the transmit/receive interface 32 of FIGURE 1 is preferably hardwired so as to automatically ; recognize the appropriate Barker code word and to generate an appropriate priority interrupt signal for the microprocessor 14 which then abruptly switches control to entry point 100 of the sync acquisition subroutine.
lternatively, the transmit/receive interface 32 may provide a simple multi-bit register through which the incoming bit stream passes and which is periodically sampled by microprocessor 14 at block 102. If the proper Barker code word is not yet received, then the incoming bit stream may be advanced by one or more bits in the interface buffer at 104 and another test made for the proper Barker code at 102. In the preferred exemplary embodiment, the test at 102 should always simply confirm that a proper Rarker code sync word is present --since that :is the condition upon which control is passed to ~51!38~3~

entry point 100. If not, then the interface 3~ is replaced in its sync search mode and control of micriprocessor 14 is passed back to higher level programs until the next priority interrupt is produced by interface 32 signifying that another proper sync word S has been detected. As should be appreciated, the interface 32 is preferably wired to inhibit generation of any subsequent priority interrupt until it is agaln placed in a sync search mode. Otherwise, a priority interrupt would always be generated whenever an incoming S word occurs. It should also be recalled that bit synchronization is typically handled by conventional fixed hardware in the transmit/
receive interface 32.
When a correct Barker code synchronization word S has been detected at 102, control passes to 106 where a check is made for a proper outside address OA.
In other words, is the OA correct -Eor the particular transceiver site in qwestion? If not, then control is passed to wait loop block 108 where microprocessor 14 now waits for the next sync word S which is tested again at 102.
If both a valid synchronization word S and valid ou-tside address OA are detected at blocks 102 and 106, then a test is made at 110 to determine whether the S and OA data just received comes from the preamble of FIGURE 2 or from a data frame header which, in the latter case, would indicate that a late entry is being attempted to an ongoing message. As explained earlier, the O~ field includes two 8-bit vectors. In the preamble, the second vector is the logical complement of the first vector.
However, in the data frame header -the second vector is merely a straightforward repeat of the first vector.
Accordingly, a test may be made at block 110 to see whether the second vector in the just received OA
field i.s inverted. If it is, then exit is made to the late entry subroutine of FIGURE 5 as indicated. If not, then a normal sync acquisition from the preamble is ``` ~2S~38~34 - l9 - 45-MR-00466 indicated and control is passed onto block 112 where a test is made to determine if the synchronization number SN
is a valid number (e.g. do the three 5-bit vectors and odd parity code bit check out with respect to one another and, if so, is the indicated sync number less than or equal to 12?). If the sync number SN is not valid, then exit is taken via wait loop 114 back to block 102 to wait for the next valid Barker code synchronization word S.
However, if a valid synchronization number SN
is detected at 112, then control is passed to block 116 where the data field boundaries within the preamble are now established (e.g. because one now knows which one of the 12 repeated S/OA/SN fields has just been successfully detected and where it is located in the interface buffer register~. The nine repeated GB/IV/SS fields in the IV
and SS sequence of the preamble are then received and a ~ vote is taken among the nine repeats of the IV and SS
: data fields. In the exemplary embodiment, a simple majority vote (e.g. at least 5 out of 9) is taken on a bit-by-bit basis to determine the final IV and SS field ~ values for later usage by microprocessor 14.
: After the voted SS field is available, control is next passed to block 118 where the SS field is tested to make sure that it is correct for this particular transceiver~site. If not, then exit may be taken via block 120 where the receiving modem in interface 32 is again placed in the sync search mode where a search is undertaken for the next correct Barker code word.
Finally, if the entire sync acquisition subroutine of FIGURE 3 has been successfully completed, then exit from block 118 will be made to begin actually decoding the data frames which follow so as to drive the receiver audio output circuits. However, since the first portion of each data frame in the exemplary embodi.ment is a header portion which repeats the S/QA/IV/SS fields, exit from the FIGURE 3 subroutine may, if desired, simply ~LZS13~38~
- 20 - ~5-MR-00466 be taken to the synchronization maintenance subroutine of FIGURE 4 where control of the microprocessor 14 normally resides anyway during the ongoing receipt of a succession of data frames.
Upon entry to the sync maintenance subroutine of FIGURE 4 at block 200, control is passed to bloc]c 202 where the IV and SS fields from the currently received data frame header are read into a buffer register and the just received cryptographic initialization vector IV is compared to the predicted next IV. As will be appreciated by those in the art, the conventional DES algorithm permits one to predict the next IV based upon the previous IV. For the very first data frame, the IV in the header should be the same as the IV already received and voted upon from the preamble. Thus, so as to accommodate the first data frame, an initial housekeeping operation might be performed (e.g. back in the sync acquisition subroutine so as to initially set the predicted next ~V to be equal to the voted upon prea~ble IV).
~dditionally, block 202 may include a test for the end of message character EOM since this would be a convenient place to make such detection. If detected, then the inter~ace 32 may again be placed in the sync search mode and control of microprocessor 14 passed back to higher level programs.
The actual comparison of the currently received IV with the predicted next IV is depicted at block 204 in FIGURE 4~ If the two do not match, then an IV loss is indicated and control is passed to block 206 where a test is made to see if a late entry flag has previously been set (by the late entry subroutine of F~GURE 5 to be discussed later). If the late entry flag was set, then exi~ is taken to block 208 where the current received IV
is used to derive a predicted next IV and control is passed b~ck to block 202.
On the other hand, if the late entry flag was :,, , 31 2S88~4 - 21 45-MR~00466 not set, then control is passed from block 206 to block 210 where a "loss of IV" counter i.s incremented. The counter contents is then tested at 212 to see if it is less than or equal to some desired maximum. In the exemplary embodiment, the maximum may be set at a value up to 10. If the "loss of IV" counter has not yet exceeded the maximum permitted contents, then e~it is made to block 214 where the currently received encrypted voice data field is decoded using conventional DES
algorithms. The decoded results are then conventionally also passed on to codec 22 which drives the analog receiver audio output circuits as should now be appreciated by those in the art and control is passed back to block 202 of the sync maintenance subroutine for processing the next data frame of the incoming message.
If the "loss of IV" counter exceeds the maximum permitted value as tested at block 212, then this indicates a loss of sync and, as a result, the interface 32 is again placed in its sync search mode and control is passed back to higher level programs as indicated by block 216.
Under normal circumstances, when there is no IV loss as tested at block 204, then control is passed to block 218 where a test is made on the late entry flag.
If the late entry flag has not been set, then control is passed directly to block 220 where the "loss of IV" counter is cleared (just in case it might have previously accumu-lated some content) and control is passed onto block 214 where the encrypted voice data field is decoded, etc. as previously described. On the other hand, if the late entry flag was set as tested at block 218, then the late entry flag is reset a-t block 222 so as to indicate a good late entry sync acquisition. As should now be appreciated, during normal message reception times, control of microprocessor 14 repeatedly passes about the loop comprising blocks 202~ 204, 218, 220 and 214.
If exit is made to the late entry subroutine ~2~8~
- 22 - 45-~R-00466 from block 110 of FIGURE 3, then control .i5 passed to block 300 of FIGURE 5 where the IV and SS fields are decoded and stored from the currently received data frame header. A
tes-t is made at 302 to see if the SS field is correct for this particular transceiver/suite. If not, then the interface 32 is again placed in its sync search mode and control is passed back to higher level programs as indicated by block 30~.
On the other hand, if the SS field is detected as being correct at block 302, then the late entry flag is set at block 306 and the next initialization vector IV will then be iteratively predicted at block 303 in accordance with conventional DES algorithms and a wait loop maintained until the next data frame time whereupon a return is made to the entry of the sync maintenance subroutine in FIGURE 4.
To summarize the control algorithm represented by the flowcharts of FIGURES 3-5, initial sync acquisition involves acquisition of the ll-bit Barker code to establish word synchronization. The hardwired interface circuits 32 detect the sarker code word and priority interrupt the microprocessor 14 whereupon control passes to the sync acquisition subroutine of FIGU~E 3. The repeater address or outside address field OA and the other following fields are then subsequently acquired and temporarily held in a suitable buffer storage. The information thus held in the buffer will have a unique characteristic identifying it as having come from the preamble or from the header of a regular data frame.
In the exemplary embodiment, such differentiation is provided by causing the second or repeated vector in the outside address OA field to be inverted in the preamble but not inverted in the header of a regular data field.
Thus, a test can be made at block 110 of FIGURE 3 to determine whether the incoming S and OA fields originated from a preamble or from -the header of a data frame.

- 23 - ~5-MR-00466 If sync acquisition is madeduring the preamble (as should normally occur), the next occurring 16-bit SN field is grouped into three 5~bit fields and a single odd parity bit field. In the exemplary embodiment, the second 5-bit vector is inverted but otherwise the three 5-bit vectors should match if correctly received and the value of the 5-hit vector identifies which one of the 12 repeated synchronization packets (i.e. S/OA/SN) has just been successfully received. This permits the correct boundary to be established between the 576-bit sync sequence and the 1296-bit IV/SS sequence of the preamble. Once this boundary has been established, then the 9-way redundant GB/IV/SS data stream may be properly framed, received and a majority vote process performed so as to provide a degree of error correction in the resultant initially received IV and SS data fields. The error corrected SS address is then checked for proper identification and, if correct, then the error corrected IV may be used for DES decryption of the encrypted voice ; 20 data field.
On the other hand, if successful sync acquisition is not made during receipt of a preamble to a message, then a "late entry" situation is indicated This may occur, for example, because the receiver was somehow "late" in acquiring synchronization either by missing the preamble altogether or by having temporarily lost sufficient ~F signal due to a long fade situation in a RF communication channel. In such case, the fields following the OA of the data frame header are the IV and SS fields. If the SS field correctly checks out (i.e. indicating that the message is indeed intended for this particular receiver), then a late entry flag is set and the incoming IV data from the data frame header is stored. This first received IV from a data frame header is not used immediately for voice data decryption but, rather, is used only to predict the IV for the next ~s~

frame. Thus, a wai.t is made fo.r the next frame where entry to the sync maintenance subroutine provides the IV received from the next data frame.
If the late entry ~lag is set, and the predicted and currently received IV's do not match, then the current IV is merely used as the "seed" for the next predicted IV to be used in the sync maintenance subroutine while continuing to inhibit the audio output. Accordingly, in the case of a late entry, two successive correctly received IV's are required before audio output is permitted to occur.
During sync maintenance (~or either type of sync acquisition) the just received incoming IV stream is compared to the predicted new IV internally ~enerated in accordance with the DES algorithm. If the late entry flag was set and a good IV comparison is made, then the sync loss counter is cleared and the correct IV may be used to generate a DES decryption vector (e.g. using the DES key from emory 28) in accordance with conventional DES algorithms.
During steady state, the receiver continues to decrypt the encrypted voice stream. Furthermore, if during steady state operation the predicted IV does not properly compare with the currently received IV, a sync loss counter is incremented and when the value exceeds a maximum (e.g. 10), the receiver is assumed to have dropped out of synchronization and attemp~s are then made to resynchronize the receiver with the incoming date stream. ~ccordingly, in the exemplary embodiment, once a steady state operation has been achieved, the receiver can "coast" for about data frames (e.g. about 2.25 seconds) before synchronization is considered to have been completely lost.
While only one exemplary embodiment of this invention has been described in detail, those skilled , - 25 - 45~MR-00466 in the art will appreciate that many modifications and variations may be macle in the exemplary embodiment while yet retaining many of the novel advantages and featurqs of this invention. Accordingly, all such variations and modifications are intended to be included within the scope of the appended claims.

Claims (33)

The embodiments of the invention in which an exclusive property or privilege is claimed are defined as follows:
1. A transceiver for reliably sending and receiving digital control and cryptographically encoded digital data signals over a communication channel subject to fading and/or noise, said transceiver comprising:
transmitter and receiver means for transmitting and/or receiving a succession of digital signals; and control means connected to said transmitter and receiver means and including a digital data microprocessor system programmed so as to perform the following functions:
(a) initial synchronization acquisition wherein said received digital signals are scanned for an initial preamble portion from which frame synchronization, addressing and cryptographic synchronization signals are extracted, (b) ongoing synchronization maintenance wherein said received digital signals are scanned for data frames succeeding said preamble portion, said data frames having a header portion containing the same type of addressing and cryptographic synchronization signals occurring in said initial preamble portion and also including encrypted digital data, and from which data frames at least said frame synchronization and said cryptographic synchronization signals are repeatedly extracted so as to permit maintenance of frame synchronization and ongoing cryptographic synchronization throughout the decoding of an encrypted message comprising plural such data frames, and (c) late entry wherein, in the event frame synchronization and/or cryptographic synchronization are lost or not acquired from said preamble, said data frames are scanned and from which synchronization, addressing and cryptographic synchronization signals are nevertheless extracted and control passed back to said ongoing synchronization maintenance function such that the remaining portion of a properly address encrypted message data stream is nevertheless successfully decoded.
2. A transceiver as in claim l wherein said control means is programmed to process said digital signals occurring in substantially the following time sequence:
(A) a preamble portion having:
(1) an alternating 1,0 data pattern, (2) 12 repeated steps of (i) a 16 bit synchronization and including a multiple bit Barker code, (ii) a 16 bit outside address word including a multiple bit address repeated at least once, (iii) a 16 bit sync number code including a multiple bit number code (identifying which of the 12 repeats is involved) repeated at least once in complemented form and also including at least 1 bit of parity code, (3) 9 repeated sets of (i) a 64 bit guard band, (ii) a 64 bit cryptographic initialization vector, (iii) a 16 bit selective signalling code identifying the intended message recipient(s), (B) successive data frames which each include (1) a 112 bit header portion having (i) a 16 bit synchronization word including a multiple bit Barker code, (ii) a 16 bit outside address word including a multiple bit address repeated at least once, (iii) a 16 bit selective signalling code identifying the intended message recipient(s), (iv) a 64 bit cryptographic initialization vector, (v) at least one of the bit fields in the header portion being distinguishable from the respectively corresponding field in the preamble so as to permit detection of a late entry condition, (2) a 2040 bit string of cryptographically encoded digital data, and (C) an end-of-message word signifying the end of a given message.
3. A transceiver for reliably sending and receiving digitized and cryptographically encrypted data signals over a communication channel subject to noise and fading phenomena, said transceiver comprising:

receiver means for providing a sequence of received digital signals;
transmitter means for transmitting a sequence of generated digital signals; and digital signal processing means connected to said receiver means and to said transmitter means for processing said received digital signals into output signals and for generating said generated digital signals from signals input thereto, wherein both said received and said generated digital signals are formatted to include (a) an initial preamble portion which includes timing synchronization signals and cryptographic synchronization signals, and (b) a subsequent sequence of frames each containing encrypted data and also including, embedded therein, a portion containing the same type of timing synchronization signals and cryptographic synchronization signals which are included in said initial preamble portion;
said digital signal processing means being adapted to automatically detect and monitor said embedded synchronization signals within said received digital signals so as to maintain accurate timing and cryptographic synchronization data and so as to establish accurate timing and cryptographic synchronization even after occurrence of said preamble portion in the event of belated signal reception or temporary loss of accurate synchronization data during the course of a given received message.
4. A transceiver as in claim 3 wherein said digital signal processing means processes digital signals which include addressing signals identifying the desired message recipient both in said initial preamble portion and embedded in said frames of encrypted data, said digital signal processing means also being adapted to automatically detect and monitor said embedded address signals so as to enable belated correctly addressed receipt of a message even after occurrence of said preamble portion in the event of belated signal reception or temporary loss of accurate address data during the course of a given received message.
5. In a radio communication system for processing digitized and cryptographically encoded signals, an improved method of formatting such digital signals, said improved method comprising the steps of processing in timed sequence the below-identified digital signals:
(A) a preamble portion having:
(1) an alternating 1,0 data pattern, (2) 12 repeated sets of (i) a 16 bit synchronization word including an 11 bit Barker code, (ii) a 16 bit outside address word including an 8 bit address repeated once in complemented form, (iii) a 16 bit sync number code including a 5 bit number code (identifying which of the 12 repeats is involved) repeated 3 times with the second repeat being in complemented form and also including 1 bit of odd parity code, (3) 9 repeated sets of (i) a 64 bit guard band, (ii) a 64 bit cryptographic initialization vector, (iii) a 16 bit selective signalling code identifying the intended message recipient(s), (B) successive data frames which each include (1) a 112 bit header portion having (i) a 16 bit synchronization word including an 11 bit Barker code, (ii) a 16 bit outside address word including an 8 bit address repeated once, (iii) a 16 bit selective signalling code identifying the intended message recipient(s), (iv) a 64 bit cryptographic initialization vector, (2) a 2040 bit string of cryptographically encoded digital voice data, and (C) an end-of-message word signifying the end of a given message.
6. A method of reliably sending and receiving control and cryptographically encoded digital data signals over a communication channel which may be subject to noise and/or fading, said method comprising:
(a) scanning received signals for an initial preamble portion from which frame synchronization, addressing and cryptographic synchronization signals are extracted, (b) scanning said received digital signals for data frames succeeding said preamble portion, said data frames containing encrypted data and also containing a portion including the same type of addressing and synchronization signals occurring in said initial preamble portion, and repeatedly extracting at least said frame synchronization and said cryptographic synchronization signals from said data frames so as to permit maintenance of such synchronization throughout the decoding of an encrypted message comprising plural such data frames, and (c) in the event frame synchronization and/or cryptographic synchronization are lost or not acquired from said preamble, scanning said data frames, extracting synchronization, addressing and cryptographic synchronization signals therefrom and passing control back to said scanning step (b) such that the remaining portion of a properly addressed encrypted voice message data stream is nevertheless successfully decoded.
7. A method of sending and receiving control and cryptographically encoded digital data signals over a communication channel, said method comprising:
(a) scanning received signals for an initial preamble portion from which frame synchronization, addressing and cryptographic synchronization signals are extracted, (b) scanning said received digital signals for data frames succeeding said preamble portion and from which data frames at least said frame synchronization and said cryptographic synchronization signals are repeatedly extracted so as to permit maintenance of such synchronization throughout the decoding of an encrypted message comprising plural such data frames, and (c) in the event frame synchronization and/or cryptographic synchronization are lost or not acquired from said preamble, scanning said data frames, extracting synchronization, addressing and cryptographic synchronization signals therefrom, and passing control back to said scanning step (b) such that the remaining
Claim 7 continued:
portion of a properly addressed encrypted voice message data stream is nevertheless successfully decoded, wherein said digital signals occur in substantially the following time sequence for a complete message (A) a preamble portion having:
(1) an alternating 1,0 data pattern, (2) 12 repeated steps of (i) a 16 bit synchronization word including a multiple bit Barker code, (ii) a 16 bit outside address word including a multiple bit address repeated at least once in complemented form, (iii) a 16 bit sync number code including a multiple bit number code (identifying which of the 12 repeats is involved) repeated at least once and also including at least 1 bit of parity code, (3) 9 repeated sets of (i) a 64 bit guard band, (ii) a 64 bit cryptographic initialization vector, (iii) a 16 bit selective signalling code identifying the intended message recipient(s), (B) successive data frames which each include (1) a 112 bit header portion having (i) a 16 bit synchronization word including a multiple bit Barker code, (ii) a 16 bit outside address word including a multiple bit address repeated at least once, (iii) a 16 bit selective signalling code identifying the intended message recipient(s), (iv) a 64 bit cryptographic initialization vector, (v) at least one of the bit fields in the header portion being distinguishable from the respectively corresponding field in the preamble so as to permit detection of a late entry condition, (2) a 2040 bit string of cryptographically encoded digital data, and (C) an end-of-message word signifying the end of a given message.
8. A method of reliably sending and receiving digitized and cryptographically encrypted data signals over a communication channel subject to noise and fading phenomena, said method comprising:
processing received digital signals into output signals and generating digital signals from locally input signals wherein both said received and said generated digital signals are formatted to include (a) an initial preamble portion which includes timing synchronization signals and cryptographic synchronization signals, and (b) a subsequent sequence of frames each containing encrypted data and also including, embedded therein, a portion including the same type of timing synchronization signals and cryptographic synchronization signals which are included in said initial preamble portion; and automatically detecting and monitoring said embedded synchronization signals within said received digital signals so as to maintain accurate timing and cryptographic synchronization data and so as to establish accurate timing and cryptographic synchronization even after occurrence of said preamble portion in the event of belated signal reception or temporary loss of accurate synchronization data during the course of a given received message.
9. A method as in claim 8 wherein said digital signals include addressing signals identifying the desired message recipient both in said initial preamble portion and embedded in said frames of encrypted data, and automatically detecting and monitoring said embedded address signals so as to enable belated correctly addressed receipt of a message even after occurrence of said preamble portion in the event of belated signal reception or temporary loss of accurate address data during the course of a given received message.
10. A transceiver as in claim 1 wherein said control means is programmed so as to perform the following sub-functions to accomplish ongoing synchronization maintenance:
(a) extracting a cryptographic synchronization signal value from a first data frame;
(b) predicting the value of a cryptographic synchronization signal of a further data frame to be received at a time later than the time said first data frame is received in response to said extracted cryptographic synchronization signal;

(c) extracting a further cryptographic synchronization signal value from a further data frame received at a time later than said time said first data frame was received;
(d) testing if said further cryptographic synchronization signal value and said predicted synchronization signal value match; and (e) if said testing reveals said further and predicted values do not match, passing control to said late entry function such that cryptographic synchronization can be re-acquired.
11. A transceiver as in claim 10 wherein:
said control means is programmed so as to perform the following additional sub-functions to accomplish ongoing synchronization maintenance;
(d1) repeatedly sequentially performing said sub-functions (a) through (d) for a succession of received data frames, and (d2) counting the number of successive times said testing reveals said further and predicted values do not match; and conditioning the performance of said control-passing sub-function (e) on whether the number counted by said counting sub-function exceeds a predetermined number.
12. A transceiver as in claim 11 wherein said control means is programmed so as to perform the following sub-functions to accomplish said late entry function:
(1) extracting a cryptographic synchronization signal value from a second data frame;
(2) predicting the value of a cryptographic synchronization signal to be received at a time later than the time said second data frame is received in response to said extracted cryptographic synchronization signal;
(3) extracting a further cryptographic synchronization signal value from a further data frame received at a time later than said time said further data frame was received;
(4) testing if said further cryptographic synchronization signal value and said predicted synchronization signal value match;
(5) repeatedly performing said sub-functions (1) through (4) for a succession of received data frames until said testing reveals said further and predicted values match; and (6) passing control back to said ongoing synchronization maintenance function when said testing reveals said further and predicted values match.
13. A transceiver as in claim 1 wherein said control means is programmed so as to perform the following sub-functions to accomplish said late entry function:
(a) extracting a cryptographic synchronization system value from a first data frame;
(b) predicting the value of a cryptographic synchronization signal of a further data frame to be received at a time later than the time said first data frame was received in response to said extracted cryptographic synchronization signal;
(c) extracting a further cryptographic synchronization signal value from a further data frame received at a time later than the time said first data frame was received;
(d) testing if said further cryptographic synchronization signal value and said predicted synchronization signal value match;

(e) performing said sub-functions (a) through (d) for a succession of received data frames until said testing reveals said further and predicted values match; and (f) passing control back to said ongoing synchronization maintenance function when said testing reveals said further and predicted values match.
14. A transceiver as in claim 1 wherein said control means is programmed so as to perform the following sub-functions to accomplish initial synchronization acquisition:
(a) extracting a plurality of versions of a synchronization value appearing redundantly within said initial preamble portion, (b) selecting one of said plurality of extracted versions of said synchronization value matching the majority of said plurality of extracted versions, and (c) determining the timing of said data frames relative to said initial preamble portion in response to said selected version.
15. A transceiver as in claim 14 wherein said control means is programmed so as to perform the following further sub-functions to accomplish initial synchronization acquisition:
extracting a plurality of versions of at least one further value appearing redundantly within said initial preamble portion, testing if there exists at least a predetermined degree of correspondence between said plurality of extracted versions of said further value, and conditioning the performance of said selecting function (b) and said determining function (c) on the results of said testing.
16. A transceiver as in claim 1 wherein said control means is programmed so as to perform the following further functions:
extracting an encrypted address value from said received digital signals, decrypting said encrypted address value in accordance with a predetermined decryption key, comparing said decrypted address value with a preset address value associated with said transceiver to obtain a result, and conditioning the performance of said initial synchronization acquisition, ongoing synchronization maintenance and late entry functions on the result of said comparison.
17. A transceiver as in claim 2 wherein said control means is programmed to process said 12 repeated sets of said 16 bit synchronization word, said 16 bit outside address word and said 16 bit sync number code over a duration in excess of a maximum expected fade duration.
18. A transceiver as in claim 2 wherein said control means is programmed to process said 9 repeated sets of said 64 bit guard band, said 64 bit cryptographic initialization vector and said 16 bit selective signalling code over a duration in excess of a maximum expected fade duration.
19. A transceiver as in claim 2 wherein said control means is programmed to interleave the processing of said 64 bit guard band with the processing of said 64 bit cryptographic initialization vector and said 16 bit selective signalling code.
20. A method as in claim 6 wherein said scanning step (b) includes the steps of:
(a) extracting a cryptographic synchronization signal value from a first digital signal data frame;

(b) predicting the value of a cryptographic synchronization signal of a further digital signal data frame to be received at a time later than the time said first data frame was received in response to said extracted cryptographic synchronization signal;
(c) extracting a further cryptographic synchronization signal value from a digital signal data frame received at a time later than the time said first digital signal data frame was received;
(d) testing if said further cryptographic synchronization signal value and said predicted synchronization signal value match; and (e) if said testing reveals said further and predicted values do not match, performing said scanning step (c) such that cryptographic synchronization can be re-acquired.
21. A method as in claim 20 wherein:
said scanning step (b) further includes the following steps:
(d1) sequentially performing said steps (a) through (d) for a succession of digital signal data frames, and (d2) counting the number of successive times said testing step (d) reveals said further and predicted values do not match; and said step (e) performs said scanning step (c) only if the number counted by said counting step (d2) exceeds a predetermined limit.
22. A method as in claim 21 wherein said scanning step (c) includes the following steps:
(1) extracting a cryptographic synchronization signal value from a second digital signal data frame;

(2) predicting the value of a cryptographic synchronization signal of a further digital signal data frame to be received at a time later than the time said second digital signal data frame was received in response to said extracted cryptographic synchronization signal;
(3) extracting a further cryptographic synchronization signal value from a further digital signal data frame received at a time later than the time said second digital signal data frame was received;
(4) testing if said further cryptographic synchronization signal value and said predicted synchronization signal value match;
(5) repeating said steps (1) through (4) until said testing reveals said further and predicted values match; and (6) passing control back to said scanning step (b) when said testing step (4) reveals said further and predicted values match.
23. A method as in claim 6 wherein said scanning and passing step (c) includes the following steps:
(a) extracting a cryptographic synchronization signal value from a first digital signal data frame;
(b) predicting the value of a cryptographic synchronization signal of a further digital signal data frame to be received at a time later than the time said first data frame was received in response to said extracted cryptographic synchronization signal;
(c) extracting a further cryptographic synchronization signal value from a further data frame received at a time later than the time said first digital signal data frame was received;
(d) testing if said further cryptographic synchronization signal value and said predicted synchronization signal value match;
(e) repeating said steps (a) through (d) for a succession of digital signal data frames until said testing reveals said further and predicted values match; and (f) passing control back to said scanning step (b) when said testing reveals said further and predicted values match.
24. A method as in claim 6 wherein said scanning step (a) includes the following steps:
(a) extracting a plurality of versions of a synchronization value appearing redundantly within said initial preamble portion, (b) selecting one of said plurality of extracted versions of said synchronization value matching the majority of said plurality of versions, and (c) determining the timing of the occurrence of said data frames relative to said initial preamble portion in response to said selected version, said scanning step (b) scanning said received digital signals beginning with the occurrence of said data frame.
25. A method as in claim 24 wherein said scanning step (a) further includes the following steps:
extracting a plurality of versions of at least one further value appearing redundantly within said initial preamble portion, testing if there exists at least a predetermined degree of correspondence between said plurality of extracted versions of said further value, and conditioning the performance of said selecting step (b) and said determining step (c) on the results of said testing.
26. A method as in claim 6 further including the following steps:
extracting an encrypted address value from said received digital signals, decrypting said encrypted address value in accordance with a predetermined decryption key, comparing said decrypted address value with a preset address value to obtain a result, and conditioning the performance of said scanning steps (a) through (c) on the result of said comparison.
27. A method as in claim 7 further including the step of receiving and/or transmitting said 12 repeated sets of said 16 bit synchronization word, said 16 bit outside address word and said 16 bit sync number code over a duration in excess of the maximum expected fade duration.
28. A method as in claim 7 further including the step of receiving and/or transmitting said 9 repeated sets of said 64 bit guard band, said 64 bit cryptographic initialization vector and said 16 bit selective signalling code over a duration in excess of the maximum expected fade duration.
29. A method as in claim 7 further including the step of receiving and/or transmitting said 64 bit guard band interleaved with said 64 bit cryptographic initialization vector and said 16 bit selective signalling code.
30. A system as in claim l wherein said ongoing synchronization maintenance and late entry functions each include extracting signals from a header portion of said data frames, said header portion containing said frame synchronization signals, cryptographic synchronization signals, and addressing signals, said signals being redundant with the frame synchronization, cryptographic synchronization and addressing signals contained in said initial preamble portion, said header portion being substantially shorter than said initial preamble portion, said frames each also including a data field containing encrypted digital data signals.
31. A transceiver as in claim 3 wherein said frames in said subsequent sequence each include a header portion containing frame synchronization signals, cryptographic synchronization signals, and addressing signals, said signals being redundant with frame synchronization, cryptographic synchronization and addressing signals contained in said initial preamble portion, said heater portions being substantially shorter than said initial preamble portion, said frames each also including a data field containing encrypted digital data signals.
32. A method as in claim 6 wherein steps (b) and (c) each include;
scanning said received data frames for a header portion containing said frame synchronization signals, cryptographic synchronization signals, and addressing signals, said signals being redundant with frame synchronization, cryptographic synchronization and addressing signals contained in said initial preamble portion, said header portions being substantially shorter than said initial preamble portion, and extracting said cryptographic synchronization, frame synchronization and addressing signals from said subsequent frame header portions, said frames each also including a data field containing encrypted digital data signals.
33. A method as in claim 8 wherein said
Claim 33 continued:
subsequent sequence of frames are each formatted to include:
a header portion containing frame synchronization signals, cryptographic synchronization signals, and addressing signals, said signals being redundant with frame synchronization, cryptographic synchronization and addressing signals contained in said initial preamble portion, said header portions being substantially shorter than said initial preamble portion, and a data field containing encrypted digital data signals.
CA000494791A 1985-11-07 1985-11-07 Method and apparatus for transceiving cryptographically encoded digital data Expired CA1258884A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CA000494791A CA1258884A (en) 1985-11-07 1985-11-07 Method and apparatus for transceiving cryptographically encoded digital data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CA000494791A CA1258884A (en) 1985-11-07 1985-11-07 Method and apparatus for transceiving cryptographically encoded digital data

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CA000599514A Division CA1275700C (en) 1989-05-11 1989-05-11 Method and apparatus for transceiving cryptographically encoded digital data

Publications (1)

Publication Number Publication Date
CA1258884A true CA1258884A (en) 1989-08-29

Family

ID=4131819

Family Applications (1)

Application Number Title Priority Date Filing Date
CA000494791A Expired CA1258884A (en) 1985-11-07 1985-11-07 Method and apparatus for transceiving cryptographically encoded digital data

Country Status (1)

Country Link
CA (1) CA1258884A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114978429A (en) * 2022-05-26 2022-08-30 上海工程技术大学 Door and window control wireless transmitting and receiving method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114978429A (en) * 2022-05-26 2022-08-30 上海工程技术大学 Door and window control wireless transmitting and receiving method

Similar Documents

Publication Publication Date Title
US4757536A (en) Method and apparatus for transceiving cryptographically encoded digital data
US4817146A (en) Cryptographic digital signal transceiver method and apparatus
JP2656155B2 (en) Resynchronization of encryption system during handoff
KR960011190B1 (en) Continuous cipher synchronization for cellular communication system
CA1293785C (en) Secure communication system
US5974584A (en) Parity checking in a real-time digital communications system
DK167332B1 (en) SIGNAL SIGNAL ENCryption
JP3248911B2 (en) Discontinuous CDMA reception method
US5305384A (en) Apparatus, system and method for transmitting secure signals over narrow spaced channels
AU643771B2 (en) Continuous cipher synchronization for cellular communication system
EP0273289A2 (en) Bit synchronization method for a digital radiotelephone system
JPS6126739B2 (en)
JP3636383B2 (en) Audio signal communication apparatus, transmission method, and receiver
CA1259659A (en) Radiotelephone system employing digitized speech data signalling
ES2038932A2 (en) Digital radio receiver which detects when a portion of a burst is stolen for a control message
WO1998007291A2 (en) Signalling method and a digital radio system
EP0178608A2 (en) Subband encoding method and apparatus
WO1997016917A1 (en) Method and apparatus for transmitting messages in a telecommunication system
NO323054B1 (en) Digital signal receiver that can receive data that is encrypted and sent in direct processing
CA1258884A (en) Method and apparatus for transceiving cryptographically encoded digital data
US5333197A (en) System to prevent a scrambler from generating undesired symbols
WO2001039434A2 (en) Packet order determining method and apparatus
KR20000048760A (en) Systems and methods for communicating desired audio information over a communications medium
US5784388A (en) Methods and apparatus for decoding control signals in dispatch trunked radio system
JP2530603B2 (en) Bucket data receiver

Legal Events

Date Code Title Description
MKEX Expiry