CN100395973C - High-reliability cipher synchronizing method in mobile communication - Google Patents

High-reliability cipher synchronizing method in mobile communication Download PDF

Info

Publication number
CN100395973C
CN100395973C CNB021279632A CN02127963A CN100395973C CN 100395973 C CN100395973 C CN 100395973C CN B021279632 A CNB021279632 A CN B021279632A CN 02127963 A CN02127963 A CN 02127963A CN 100395973 C CN100395973 C CN 100395973C
Authority
CN
China
Prior art keywords
synchronous
bch
message key
cryptosync
byte
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB021279632A
Other languages
Chinese (zh)
Other versions
CN1507195A (en
Inventor
曾勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CETC 30 Research Institute
Original Assignee
CETC 30 Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CETC 30 Research Institute filed Critical CETC 30 Research Institute
Priority to CNB021279632A priority Critical patent/CN100395973C/en
Publication of CN1507195A publication Critical patent/CN1507195A/en
Application granted granted Critical
Publication of CN100395973C publication Critical patent/CN100395973C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Abstract

The present invention relates to a high-reliability cipher synchronizing method which adopts a continuous cipher synchronization mode in mobile communication, which is jointly completed by the steps of synchronous code encoding, modulation, transmitting, synchronous code receiving, subsequently cipher synchronizing protection, etc. The original synchronous codes are formed by determining a synchronous head, generating a message key, completing a BCH code of the message key, and the original synchronous codes are modulated by a BARKER code and then are sent at a definite time after expansion. The received message carries out great number adjudication by bits and BCH decoding to obtain the correct message key in the receiving process. The subsequent cipher can be synchronously protected in the synchronous protecting state. The present invention integrates various simultaneous technologies and error correcting technologies to realize the high reliability and the interference immunity of the cipher synchronization in mobile communication. When the communication channel error ratio is 1*10<-1>, the synchronization probability reaches 96%.

Description

High reliability method of cryptographic synchronization in the mobile communication
Technical field
The invention belongs to the secure communication category of electrical communication technology, specifically is a kind of highly reliable mobile communication method of cryptographic synchronization.
Background technology
For wireless channel, the cryptosync technology is directly connected to the success or failure and the fail safe of secure communication.At present, the cryptosync that is used for the crypto of wireless channel has dual mode, a subsynchronous and continuous synchronization.One subsynchronous finger only sends cryptosync one time before each communication, password desynchronizing is recovered to be finished by the mechanism of reporting an error.Continuous synchronization refers to timed sending cryptosync in communication process, searches for synchronous code after the step-out automatically, need not report an error.It is one subsynchronous that general shortwave crypto adopts, and ultrashort wave adopts continuous synchronization.One subsynchronous subject matter is when channel bit error rate is very high, and reporting an error of cryptosync will be very frequent, directly causes the serious decline of communication efficiency.Continuous synchronization then faces the problem of reliability decrease when channel bit error rate is very high, when channel bit error rate is 1 * 10 -1Shi Genben can not reliably working.In recent years, secure communication causes that more and more people pay close attention to, but reliability problems is masty problem always.Chinese patent 1050294 " method for synchronous in the mobile radio communication system " discloses a kind of method of encryption synchronisation.The technology that this method is used is more single, and effect is comparatively limited.
Summary of the invention
The purpose of this invention is to provide a kind of reliability height, the cryptosync method of strong interference immunity is used this method, and synchronous probability still can keep high level under the high situation of channel bit error rate.
The objective of the invention is to reach like this: a kind of cryptosync method of crypto of wireless channel; adopt the continous cipher method of synchronization; per 2 seconds synchronously once, finished jointly by synchronous code coding, the transmission of modulation back, synchronous code reception and follow-up cryptosync protection step.The coding of described synchronous code, modulation, transmission are meant that synchronous code comprises the synchronizing information of 11 bytes, at definite synchronous head, produce message key, message key be divided into two groups, the message key after the grouping is carried out Bose-Chaudhuri-Hocquenghem Code, obtain BCH (31,21) A and BCH (31,21) B; After forming original synchronous code, original synchronous code modulated, expands to 7 groups with the BARKER sign indicating number after timed sending.The reception of described synchronous code is meant that the butt joint collection of letters ceases step-by-step and carries out majority decision, obtains correct BCH (31,21) A and BCH (31,21) B and translates message key.Described follow-up cryptoguard is meant and promptly enters the synchronous protection state after cryptosync is received first; in the synchronous protection state; in official hour, do not receive synchronous head or receive the wrong time number limiting of message key by pre-determined; still in accordance with regulations moment extracts message key and carries out cryptosync and handle from password in restricted portion, keeps the cryptosync with originating party.
The coding of described synchronous code, modulation, transmission have following steps; 1. at first determine 3 a byte of sync SH1, SH2, SH3; 2. 5 byte message keys (IK) are divided into two groups, every group of 20bit is designated as IKA and IKB, respectively IKA and one ' 0 ' formation of IKB end benefit 21bit carried out BCH (31,21) coding more respectively, is designated as BCH (31,21) A and BCH (31,21) B; 3. buffer memory BUFi, i=1,2 ... 11 is unit with the byte, deposit SH1, SH2, SH3 in buffer memory BUF1, BUF2 and BUF3 respectively by byte, deposit BCH (31,21) A in buffer memory BUF4, BUF5, BUF6 and BUF7 by byte, the last position of BUF7 fills out ' 0 ' to supply 8, with BCH (31,21) B deposits buffer memory BUF8, BUF9, BUF10 and BUF11 in by byte, and the last position of BUF11 fills out ' 0 ' to supply 8, and the original coding of so far finishing the synchronous code of 11 bytes is designated as SB; 4. above-mentioned original synchronous code is carried out the modulation of BARKER sign indicating number.Select 7 BARKER sign indicating numbers 1110010 for use, be about to original synchronous code and be extended to 7 groups, the original synchronous code of the expression of ' 1 ' in the BARKER sign indicating number is not done any change, and each of the original synchronous code of ' 0 ' expression is contrary.Obtain at last SB1, SB2, SB3 ,/SB4 ,/SB5, SB6 ,/SB7 and deposit RAM in.Wherein SB1, SB2, SB3, SB6 are identical ,/SB4 ,/SB5 ,/SB7 is identical, and '/' representative is a radix-minus-one complement.5. utilize the base band clock signal with SB1, SB2, SB3 ,/SB4 ,/SB5 ,/SB6 ,/SB7 sends in proper order, the CPU internal timing repeated transmission work every 2 seconds simultaneously.
Reception is to carry out as follows: receiving terminal is known 3 a byte of sync SH1, SH2, SH3 in advance.1. get 4 majority decisions by the signal step-by-step of receiving is carried out 7, be judged to 1 and be judged to 0 less than 4 more than or equal to 4,2. compare by turn with known synchronous head.The signal of receiving need deposit among the buffer memory, declares moving one an of displacement, up to detecting synchronous head.3. promptly detect BCH (31,21) A after synchronous head detects, BCH (31,21) B also with the method for receiving synchronous head, declares one of a displacement.After moving 64 times, promptly finish the receipts message key.4. BCH (31,21) A and BCH (31,21) B are carried out BCH decoding, translate message key IKA and IKB.
Described follow-up cryptosync protection is meant in the synchronous protection state by pre-determined time number limiting; if debits are taken place for three times do not receive synchronous head or receive message key when wrong in official hour continuously; just withdraw from the synchronous protection state, search for cryptosync again.The frame structure of cryptosync is represented in Fig. 4.
The present invention has following positive effect:
1, multiple simultaneous techniques and error correction coding merge, and have solved high reliability and anti-interference in the cryptosync of wireless channel preferably.According to measuring and calculating, the average error rate of ultrashort wave channel can reach 5 * 10 -2, and design of the present invention Danone anti-1 * 10 -1When the error rate is 1 * 10 -1The time, synchronous probability reaches more than 96%.Therefore, present technique has sufficient surplus to adapt to various channels.The realization of this technology has important meaning to wireless secure communication, has broad application prospects in wireless duplexing mobile communication system especially, to fundamentally promoting the quality of secure communication, the development that promotes the national defense communication cause is had positive role.
2, need not only need utilize the clock in radio station can finish cryptosync by any synchronizing information in radio station, it be convenient to use, and is easy to promote.
Description of drawings
Accompanying drawing 1 is a password process of transmitting block diagram of the present invention.
Accompanying drawing 2 is password receiving course block diagrams of the present invention.
Accompanying drawing 3 is frame structure schematic diagrames of the said cryptosync of the present invention.
Accompanying drawing 4 is the said embodiment send mode of the present invention schematic diagrames.
Accompanying drawing has provided embodiments of the invention.Present embodiment adopts the continous cipher method of synchronization, and per 2 seconds synchronously once.The cryptosync scheme is realized by the MCS51 assembler language.
Make a start and at first determine 3 a byte of sync SH1, SH2, SH3; Then 5 byte message keys (IK) are divided into two groups, every group of 20bit is designated as IKA and IKB, respectively IKA and one ' 0 ' formation of IKB end benefit 21bit carried out BCH (31,21) coding more respectively, is designated as BCH (31,21) A and BCH (31,21) B; Buffer memory BUFi, i=1,2 ... 11 is unit with the byte, deposit SH1, SH2, SH3 in buffer memory BUF1, BUF2 and BUF3 respectively by byte, deposit BCH (31,21) A in buffer memory BUF4, BUF5, BUF6 and BUF7 by byte, the last position of BUF7 fills out ' 0 to supply 8 ', with BCH (31,21) B deposits buffer memory BUF8, BUF9, BUF10 and BUF11 in by byte, and the last position of BUF11 fills out ' 0 ' to supply 8, and the original coding of so just finishing the synchronous code of 11 bytes is designated as SB.
Above-mentioned original synchronous code is carried out the modulation of BARKER sign indicating number.Select 7 BARKER sign indicating numbers 1110010 for use, be about to original synchronous code and be extended to 7 groups, the original synchronous code of the expression of ' 1 ' in the BARKER sign indicating number is not done any change, and each of the original synchronous code of ' 0 ' expression is contrary.Obtain at last SB1, SB2, SB3 ,/SB4 ,/SB5, SB6 ,/SB7 and deposit RAM in.Wherein SB1, SB2, SB3, SB6 are identical ,/SB4 ,/SB5 ,/SB7 is identical, and '/' representative is a radix-minus-one complement.
Utilize the base band clock signal with SB1, SB2, SB3 ,/SB4 ,/SB5 ,/SB6 ,/SB7 sends in proper order, the CPU internal timing repeated transmission work every 2 seconds simultaneously.
Receiving terminal is known 3 a byte of sync SH1, SH2, SH3 in advance.Get 4 majority decisions by the signal step-by-step of receiving is carried out 7, be judged to 1 and be judged to 0 less than 4 more than or equal to 4, and compare by turn with known synchronous head.The signal of receiving need deposit among the buffer memory, declares one of a displacement, up to detecting synchronous head.
Promptly detect BCH (31,21) A after synchronous head detects, BCH (31,21) B also adopts the method for receiving synchronous head, declares one of a displacement.After moving 64 times, promptly finish the receipts message key.BCH (31,21) A and BCH (31,21) B are carried out BCH decoding, translate IKA and IKB.
Promptly enter the synchronous protection state after cryptosync is received first; in the synchronous protection shape; if the debit does not receive synchronous head or receives message key because of interference in official hour wrong; still the moment in accordance with regulations extracts message key and carries out cryptographic algorithm and handle from keying sequence; keep cryptosync with originating party; have only when continuous three times above-mentioned situation taking place, just withdraw from the synchronous protection state, search for cryptosync again.The present invention can be used in the privacy device of various wireless communication system.The mode that when enciphered data or speech, can adopt cryptosync and enciphered message alternately to send as can be seen from Figure 3, in addition, it can also expand use, for example as the signaling delivery plan of wireless channel, wherein synchronous head is constant, encodes and sends with signaling data alternate message key (IK).For the reliability that guarantees to receive, can adopt the mode that repeats to send for same signaling, receiving end appoints receipts once to get final product.

Claims (4)

1. a mobile communication method of cryptographic synchronization adopts the continous cipher method of synchronization, and per 2 seconds synchronously once, by synchronous code coding, modulation, transmission; Synchronous code receives and follow-up cryptosync protection step is finished jointly, it is characterized in that: the coding of described synchronous code, modulation, transmission are meant that synchronous code comprises the synchronizing information of 11 bytes, at definite synchronous head, produce message key, message key is divided into two thin, message key after the grouping is carried out Bose-Chaudhuri-Hocquenghem Code, obtain BCH (31,21) A and BCH (31,21) B; After forming original synchronous code, the back timed sending is modulated, expanded to original synchronous code with the BARKER sign indicating number; The reception of described synchronous code is meant that the butt joint collection of letters ceases step-by-step and carries out majority decision, obtains correct BCH (31,21) A and BCH (31,21) B; Decoding translates the required message key of receiving end through BCH at last; After described follow-up cryptosync protection is meant receiving end cryptosync is received first; promptly enter the synchronous protection state; under this state; do not receive synchronous head or receive the wrong time number limiting of message key by pre-determined; still in accordance with regulations moment extracts message key and carries out cryptographic algorithm and handle from keying sequence in restricted portion, surpasses behind the number of times that limits receiving end and withdraws from the synchronous protection state and search for cryptosync again.
2. mobile communication method of cryptographic synchronization as claimed in claim 1 is characterized in that: the coding of described synchronous code, modulation, transmission have following steps; 1. at first determine 3 a byte of sync SH1, SH2, SH3; 2. 5 byte message keys (IK) are divided into two groups, every group of 20bit is designated as IKA and IKB, respectively IKA and IKB end mended one ' 0 ' formation 21bit, carries out BCH (31,21) coding more respectively, is designated as BCH (31,21) A and BCH (31,21) B; 3. buffer memory BUFi, i=1,2 ... 11 is unit with the byte, deposit SH1, SH2, SH3 in buffer memory BUF1, BUF2 and BUF3 respectively by byte, deposit BCH (31,21) A in buffer memory BUF4, BUF5, BUF6 and BUF7 by byte, " 0 " is filled out to supply 8 in the position, minimum end of BUF7, with BCH (31,21) B deposits buffer memory BUF8, BUF9, BUF10 and BUF11 in by byte, and the last position of BUF11 fills out ' 0 ' to supply 8, and the original coding of finishing the synchronous code of 11 bytes is designated as SB; 4. above-mentioned original synchronous code is carried out 1110010 modulation of 7 BARKER sign indicating numbers, expand to 7 groups: 5. utilize the base band clock signal with SB1, SB2, SB3 ,/SB4 ,/SB5 ,/SB6 ,/SB7 sends in proper order, the CPU internal timing repeated transmission work every 2 seconds simultaneously.
3. mobile communication method of cryptographic synchronization as claimed in claim 1, it is characterized in that: described reception is to carry out 1. receiving terminal as follows to know 3 a byte of sync SH1 in advance, SH2, SH3, by being carried out 7, the signal step-by-step of receiving gets 4 majority decisions, be judged to 1 and be judged to 0 more than or equal to 4 less than 4,2. compare by turn with known synchronous head, the signal of receiving need deposit among the buffer memory, declare moving one an of displacement,, promptly detect BCH (31 after 3. synchronous head detects up to detecting synchronous head, 21) A, BCH (31,21) B also adopts the method for receiving synchronous head, declare bit shift, after moving 64 times, promptly finish the receipts message key, 4. to BCH (31,21) A and BCH (31,21) B carries out BCH decoding, translates message key IKA and IKB.
4. mobile communication method of cryptographic synchronization as claimed in claim 1; it is characterized in that: described follow-up cryptosync protection is meant in the synchronous protection state by pre-determined time number limiting; if debits are taken place for three times do not receive synchronous head or receive message key when wrong in official hour continuously; just withdraw from the synchronous protection state, search for cryptosync again.
CNB021279632A 2002-12-06 2002-12-06 High-reliability cipher synchronizing method in mobile communication Expired - Fee Related CN100395973C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB021279632A CN100395973C (en) 2002-12-06 2002-12-06 High-reliability cipher synchronizing method in mobile communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB021279632A CN100395973C (en) 2002-12-06 2002-12-06 High-reliability cipher synchronizing method in mobile communication

Publications (2)

Publication Number Publication Date
CN1507195A CN1507195A (en) 2004-06-23
CN100395973C true CN100395973C (en) 2008-06-18

Family

ID=34231170

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB021279632A Expired - Fee Related CN100395973C (en) 2002-12-06 2002-12-06 High-reliability cipher synchronizing method in mobile communication

Country Status (1)

Country Link
CN (1) CN100395973C (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101388872B (en) * 2007-09-10 2012-08-29 华为技术有限公司 Data signal modulation, demodulation method, transceiver and transceiving system
CN101388873B (en) * 2007-09-10 2012-04-04 华为技术有限公司 Data signal modulation, demodulation method, transceiver and transceiving system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4754482A (en) * 1985-11-26 1988-06-28 Samco Investment Company Method and apparatus for synchronizing encrypting and decrypting systems
CN1025704C (en) * 1990-03-07 1994-08-17 艾利森电话股份有限公司 Continous cipher synchronization for cellular communication system
CN1263392A (en) * 2000-03-03 2000-08-16 清华大学 Information element transmission method
DE10045463A1 (en) * 2000-09-11 2002-03-28 Ammar Alkassar Self-synchronizing current cipher for route encryption over fault-prone transmission channel, uses output unit to take over data from cipher device when sync signal is activated

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4754482A (en) * 1985-11-26 1988-06-28 Samco Investment Company Method and apparatus for synchronizing encrypting and decrypting systems
CN1025704C (en) * 1990-03-07 1994-08-17 艾利森电话股份有限公司 Continous cipher synchronization for cellular communication system
CN1263392A (en) * 2000-03-03 2000-08-16 清华大学 Information element transmission method
DE10045463A1 (en) * 2000-09-11 2002-03-28 Ammar Alkassar Self-synchronizing current cipher for route encryption over fault-prone transmission channel, uses output unit to take over data from cipher device when sync signal is activated

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
BCH(31,21)码的解码及其软件实现. 张瑞华.通信技术,第11期. 2002
BCH(31,21)码的解码及其软件实现. 张瑞华.通信技术,第11期. 2002 *
数字保密通信中的密码同步技术. 张凤仙.飞行器测控学报,第21卷第1期. 2002
数字保密通信中的密码同步技术. 张凤仙.飞行器测控学报,第21卷第1期. 2002 *

Also Published As

Publication number Publication date
CN1507195A (en) 2004-06-23

Similar Documents

Publication Publication Date Title
CN101267210B (en) Data decoding and coding and receiving/transmission method and device
EP0270216B1 (en) Dynamic frame length communication system, and stations for such a system
US5825889A (en) Use of duplex cipher algorithms for satellite channels with delay
CN102404729B (en) End-to-end speech encryption method for low-speed narrowband wireless digital communication
JPH11508115A (en) Improved method for simultaneously performing bit synchronization and error detection in TDM / TDMA system
US4805197A (en) Method and apparatus for recovering clock information from a received digital signal and for synchronizing that signal
JPH0656998B2 (en) Synchronization method and digital data transmission system
US8718213B2 (en) Clock synchronization method, apparatus, and system
CN102025448A (en) Common public radio interface service transmitting/receiving method and device
EP0375361B1 (en) Duplex communications method and system
CN111479269A (en) L ora node network access method capable of realizing synchronization
CN108512785A (en) A kind of Data Transport Protocol method
GB2348347A (en) Transmission scheme with puncturing of channel coded data frames
US4631721A (en) Bidirectional communication system of a two-wire bus comprising an active terminator
RU2178238C2 (en) Discriminating-call system and its secondary station
CN100395973C (en) High-reliability cipher synchronizing method in mobile communication
RU2377723C2 (en) Method of transmitting discrete messages over wireless communication channels
CN103023630A (en) Method for hiding information of speech stream on basis of speech coding by pulse code modulation
JP4404967B2 (en) Air frame synchronization
CN108521287B (en) frequency hopping synchronization realization method based on time information
CN102263683B (en) Secure communication method for double loop field bus in numerical control system
CN101841385A (en) Method for indicating frame ending
JPS6234309B2 (en)
US5781553A (en) Digital wireless private branch exchange system
RU2638732C1 (en) Method of information transmission

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20080618

Termination date: 20201206