CN100395973C - High-reliability cipher synchronizing method in mobile communication - Google Patents
High-reliability cipher synchronizing method in mobile communication Download PDFInfo
- Publication number
- CN100395973C CN100395973C CNB021279632A CN02127963A CN100395973C CN 100395973 C CN100395973 C CN 100395973C CN B021279632 A CNB021279632 A CN B021279632A CN 02127963 A CN02127963 A CN 02127963A CN 100395973 C CN100395973 C CN 100395973C
- Authority
- CN
- China
- Prior art keywords
- synchronous
- bch
- message key
- cryptosync
- byte
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Abstract
The present invention relates to a high-reliability cipher synchronizing method which adopts a continuous cipher synchronization mode in mobile communication, which is jointly completed by the steps of synchronous code encoding, modulation, transmitting, synchronous code receiving, subsequently cipher synchronizing protection, etc. The original synchronous codes are formed by determining a synchronous head, generating a message key, completing a BCH code of the message key, and the original synchronous codes are modulated by a BARKER code and then are sent at a definite time after expansion. The received message carries out great number adjudication by bits and BCH decoding to obtain the correct message key in the receiving process. The subsequent cipher can be synchronously protected in the synchronous protecting state. The present invention integrates various simultaneous technologies and error correcting technologies to realize the high reliability and the interference immunity of the cipher synchronization in mobile communication. When the communication channel error ratio is 1*10<-1>, the synchronization probability reaches 96%.
Description
Technical field
The invention belongs to the secure communication category of electrical communication technology, specifically is a kind of highly reliable mobile communication method of cryptographic synchronization.
Background technology
For wireless channel, the cryptosync technology is directly connected to the success or failure and the fail safe of secure communication.At present, the cryptosync that is used for the crypto of wireless channel has dual mode, a subsynchronous and continuous synchronization.One subsynchronous finger only sends cryptosync one time before each communication, password desynchronizing is recovered to be finished by the mechanism of reporting an error.Continuous synchronization refers to timed sending cryptosync in communication process, searches for synchronous code after the step-out automatically, need not report an error.It is one subsynchronous that general shortwave crypto adopts, and ultrashort wave adopts continuous synchronization.One subsynchronous subject matter is when channel bit error rate is very high, and reporting an error of cryptosync will be very frequent, directly causes the serious decline of communication efficiency.Continuous synchronization then faces the problem of reliability decrease when channel bit error rate is very high, when channel bit error rate is 1 * 10
-1Shi Genben can not reliably working.In recent years, secure communication causes that more and more people pay close attention to, but reliability problems is masty problem always.Chinese patent 1050294 " method for synchronous in the mobile radio communication system " discloses a kind of method of encryption synchronisation.The technology that this method is used is more single, and effect is comparatively limited.
Summary of the invention
The purpose of this invention is to provide a kind of reliability height, the cryptosync method of strong interference immunity is used this method, and synchronous probability still can keep high level under the high situation of channel bit error rate.
The objective of the invention is to reach like this: a kind of cryptosync method of crypto of wireless channel; adopt the continous cipher method of synchronization; per 2 seconds synchronously once, finished jointly by synchronous code coding, the transmission of modulation back, synchronous code reception and follow-up cryptosync protection step.The coding of described synchronous code, modulation, transmission are meant that synchronous code comprises the synchronizing information of 11 bytes, at definite synchronous head, produce message key, message key be divided into two groups, the message key after the grouping is carried out Bose-Chaudhuri-Hocquenghem Code, obtain BCH (31,21) A and BCH (31,21) B; After forming original synchronous code, original synchronous code modulated, expands to 7 groups with the BARKER sign indicating number after timed sending.The reception of described synchronous code is meant that the butt joint collection of letters ceases step-by-step and carries out majority decision, obtains correct BCH (31,21) A and BCH (31,21) B and translates message key.Described follow-up cryptoguard is meant and promptly enters the synchronous protection state after cryptosync is received first; in the synchronous protection state; in official hour, do not receive synchronous head or receive the wrong time number limiting of message key by pre-determined; still in accordance with regulations moment extracts message key and carries out cryptosync and handle from password in restricted portion, keeps the cryptosync with originating party.
The coding of described synchronous code, modulation, transmission have following steps; 1. at first determine 3 a byte of sync SH1, SH2, SH3; 2. 5 byte message keys (IK) are divided into two groups, every group of 20bit is designated as IKA and IKB, respectively IKA and one ' 0 ' formation of IKB end benefit 21bit carried out BCH (31,21) coding more respectively, is designated as BCH (31,21) A and BCH (31,21) B; 3. buffer memory BUFi, i=1,2 ... 11 is unit with the byte, deposit SH1, SH2, SH3 in buffer memory BUF1, BUF2 and BUF3 respectively by byte, deposit BCH (31,21) A in buffer memory BUF4, BUF5, BUF6 and BUF7 by byte, the last position of BUF7 fills out ' 0 ' to supply 8, with BCH (31,21) B deposits buffer memory BUF8, BUF9, BUF10 and BUF11 in by byte, and the last position of BUF11 fills out ' 0 ' to supply 8, and the original coding of so far finishing the synchronous code of 11 bytes is designated as SB; 4. above-mentioned original synchronous code is carried out the modulation of BARKER sign indicating number.Select 7 BARKER sign indicating numbers 1110010 for use, be about to original synchronous code and be extended to 7 groups, the original synchronous code of the expression of ' 1 ' in the BARKER sign indicating number is not done any change, and each of the original synchronous code of ' 0 ' expression is contrary.Obtain at last SB1, SB2, SB3 ,/SB4 ,/SB5, SB6 ,/SB7 and deposit RAM in.Wherein SB1, SB2, SB3, SB6 are identical ,/SB4 ,/SB5 ,/SB7 is identical, and '/' representative is a radix-minus-one complement.5. utilize the base band clock signal with SB1, SB2, SB3 ,/SB4 ,/SB5 ,/SB6 ,/SB7 sends in proper order, the CPU internal timing repeated transmission work every 2 seconds simultaneously.
Reception is to carry out as follows: receiving terminal is known 3 a byte of sync SH1, SH2, SH3 in advance.1. get 4 majority decisions by the signal step-by-step of receiving is carried out 7, be judged to 1 and be judged to 0 less than 4 more than or equal to 4,2. compare by turn with known synchronous head.The signal of receiving need deposit among the buffer memory, declares moving one an of displacement, up to detecting synchronous head.3. promptly detect BCH (31,21) A after synchronous head detects, BCH (31,21) B also with the method for receiving synchronous head, declares one of a displacement.After moving 64 times, promptly finish the receipts message key.4. BCH (31,21) A and BCH (31,21) B are carried out BCH decoding, translate message key IKA and IKB.
Described follow-up cryptosync protection is meant in the synchronous protection state by pre-determined time number limiting; if debits are taken place for three times do not receive synchronous head or receive message key when wrong in official hour continuously; just withdraw from the synchronous protection state, search for cryptosync again.The frame structure of cryptosync is represented in Fig. 4.
The present invention has following positive effect:
1, multiple simultaneous techniques and error correction coding merge, and have solved high reliability and anti-interference in the cryptosync of wireless channel preferably.According to measuring and calculating, the average error rate of ultrashort wave channel can reach 5 * 10
-2, and design of the present invention Danone anti-1 * 10
-1When the error rate is 1 * 10
-1The time, synchronous probability reaches more than 96%.Therefore, present technique has sufficient surplus to adapt to various channels.The realization of this technology has important meaning to wireless secure communication, has broad application prospects in wireless duplexing mobile communication system especially, to fundamentally promoting the quality of secure communication, the development that promotes the national defense communication cause is had positive role.
2, need not only need utilize the clock in radio station can finish cryptosync by any synchronizing information in radio station, it be convenient to use, and is easy to promote.
Description of drawings
Accompanying drawing 1 is a password process of transmitting block diagram of the present invention.
Accompanying drawing 2 is password receiving course block diagrams of the present invention.
Accompanying drawing 3 is frame structure schematic diagrames of the said cryptosync of the present invention.
Accompanying drawing 4 is the said embodiment send mode of the present invention schematic diagrames.
Accompanying drawing has provided embodiments of the invention.Present embodiment adopts the continous cipher method of synchronization, and per 2 seconds synchronously once.The cryptosync scheme is realized by the MCS51 assembler language.
Make a start and at first determine 3 a byte of sync SH1, SH2, SH3; Then 5 byte message keys (IK) are divided into two groups, every group of 20bit is designated as IKA and IKB, respectively IKA and one ' 0 ' formation of IKB end benefit 21bit carried out BCH (31,21) coding more respectively, is designated as BCH (31,21) A and BCH (31,21) B; Buffer memory BUFi, i=1,2 ... 11 is unit with the byte, deposit SH1, SH2, SH3 in buffer memory BUF1, BUF2 and BUF3 respectively by byte, deposit BCH (31,21) A in buffer memory BUF4, BUF5, BUF6 and BUF7 by byte, the last position of BUF7 fills out ' 0 to supply 8 ', with BCH (31,21) B deposits buffer memory BUF8, BUF9, BUF10 and BUF11 in by byte, and the last position of BUF11 fills out ' 0 ' to supply 8, and the original coding of so just finishing the synchronous code of 11 bytes is designated as SB.
Above-mentioned original synchronous code is carried out the modulation of BARKER sign indicating number.Select 7 BARKER sign indicating numbers 1110010 for use, be about to original synchronous code and be extended to 7 groups, the original synchronous code of the expression of ' 1 ' in the BARKER sign indicating number is not done any change, and each of the original synchronous code of ' 0 ' expression is contrary.Obtain at last SB1, SB2, SB3 ,/SB4 ,/SB5, SB6 ,/SB7 and deposit RAM in.Wherein SB1, SB2, SB3, SB6 are identical ,/SB4 ,/SB5 ,/SB7 is identical, and '/' representative is a radix-minus-one complement.
Utilize the base band clock signal with SB1, SB2, SB3 ,/SB4 ,/SB5 ,/SB6 ,/SB7 sends in proper order, the CPU internal timing repeated transmission work every 2 seconds simultaneously.
Receiving terminal is known 3 a byte of sync SH1, SH2, SH3 in advance.Get 4 majority decisions by the signal step-by-step of receiving is carried out 7, be judged to 1 and be judged to 0 less than 4 more than or equal to 4, and compare by turn with known synchronous head.The signal of receiving need deposit among the buffer memory, declares one of a displacement, up to detecting synchronous head.
Promptly detect BCH (31,21) A after synchronous head detects, BCH (31,21) B also adopts the method for receiving synchronous head, declares one of a displacement.After moving 64 times, promptly finish the receipts message key.BCH (31,21) A and BCH (31,21) B are carried out BCH decoding, translate IKA and IKB.
Promptly enter the synchronous protection state after cryptosync is received first; in the synchronous protection shape; if the debit does not receive synchronous head or receives message key because of interference in official hour wrong; still the moment in accordance with regulations extracts message key and carries out cryptographic algorithm and handle from keying sequence; keep cryptosync with originating party; have only when continuous three times above-mentioned situation taking place, just withdraw from the synchronous protection state, search for cryptosync again.The present invention can be used in the privacy device of various wireless communication system.The mode that when enciphered data or speech, can adopt cryptosync and enciphered message alternately to send as can be seen from Figure 3, in addition, it can also expand use, for example as the signaling delivery plan of wireless channel, wherein synchronous head is constant, encodes and sends with signaling data alternate message key (IK).For the reliability that guarantees to receive, can adopt the mode that repeats to send for same signaling, receiving end appoints receipts once to get final product.
Claims (4)
1. a mobile communication method of cryptographic synchronization adopts the continous cipher method of synchronization, and per 2 seconds synchronously once, by synchronous code coding, modulation, transmission; Synchronous code receives and follow-up cryptosync protection step is finished jointly, it is characterized in that: the coding of described synchronous code, modulation, transmission are meant that synchronous code comprises the synchronizing information of 11 bytes, at definite synchronous head, produce message key, message key is divided into two thin, message key after the grouping is carried out Bose-Chaudhuri-Hocquenghem Code, obtain BCH (31,21) A and BCH (31,21) B; After forming original synchronous code, the back timed sending is modulated, expanded to original synchronous code with the BARKER sign indicating number; The reception of described synchronous code is meant that the butt joint collection of letters ceases step-by-step and carries out majority decision, obtains correct BCH (31,21) A and BCH (31,21) B; Decoding translates the required message key of receiving end through BCH at last; After described follow-up cryptosync protection is meant receiving end cryptosync is received first; promptly enter the synchronous protection state; under this state; do not receive synchronous head or receive the wrong time number limiting of message key by pre-determined; still in accordance with regulations moment extracts message key and carries out cryptographic algorithm and handle from keying sequence in restricted portion, surpasses behind the number of times that limits receiving end and withdraws from the synchronous protection state and search for cryptosync again.
2. mobile communication method of cryptographic synchronization as claimed in claim 1 is characterized in that: the coding of described synchronous code, modulation, transmission have following steps; 1. at first determine 3 a byte of sync SH1, SH2, SH3; 2. 5 byte message keys (IK) are divided into two groups, every group of 20bit is designated as IKA and IKB, respectively IKA and IKB end mended one ' 0 ' formation 21bit, carries out BCH (31,21) coding more respectively, is designated as BCH (31,21) A and BCH (31,21) B; 3. buffer memory BUFi, i=1,2 ... 11 is unit with the byte, deposit SH1, SH2, SH3 in buffer memory BUF1, BUF2 and BUF3 respectively by byte, deposit BCH (31,21) A in buffer memory BUF4, BUF5, BUF6 and BUF7 by byte, " 0 " is filled out to supply 8 in the position, minimum end of BUF7, with BCH (31,21) B deposits buffer memory BUF8, BUF9, BUF10 and BUF11 in by byte, and the last position of BUF11 fills out ' 0 ' to supply 8, and the original coding of finishing the synchronous code of 11 bytes is designated as SB; 4. above-mentioned original synchronous code is carried out 1110010 modulation of 7 BARKER sign indicating numbers, expand to 7 groups: 5. utilize the base band clock signal with SB1, SB2, SB3 ,/SB4 ,/SB5 ,/SB6 ,/SB7 sends in proper order, the CPU internal timing repeated transmission work every 2 seconds simultaneously.
3. mobile communication method of cryptographic synchronization as claimed in claim 1, it is characterized in that: described reception is to carry out 1. receiving terminal as follows to know 3 a byte of sync SH1 in advance, SH2, SH3, by being carried out 7, the signal step-by-step of receiving gets 4 majority decisions, be judged to 1 and be judged to 0 more than or equal to 4 less than 4,2. compare by turn with known synchronous head, the signal of receiving need deposit among the buffer memory, declare moving one an of displacement,, promptly detect BCH (31 after 3. synchronous head detects up to detecting synchronous head, 21) A, BCH (31,21) B also adopts the method for receiving synchronous head, declare bit shift, after moving 64 times, promptly finish the receipts message key, 4. to BCH (31,21) A and BCH (31,21) B carries out BCH decoding, translates message key IKA and IKB.
4. mobile communication method of cryptographic synchronization as claimed in claim 1; it is characterized in that: described follow-up cryptosync protection is meant in the synchronous protection state by pre-determined time number limiting; if debits are taken place for three times do not receive synchronous head or receive message key when wrong in official hour continuously; just withdraw from the synchronous protection state, search for cryptosync again.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB021279632A CN100395973C (en) | 2002-12-06 | 2002-12-06 | High-reliability cipher synchronizing method in mobile communication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB021279632A CN100395973C (en) | 2002-12-06 | 2002-12-06 | High-reliability cipher synchronizing method in mobile communication |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1507195A CN1507195A (en) | 2004-06-23 |
CN100395973C true CN100395973C (en) | 2008-06-18 |
Family
ID=34231170
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB021279632A Expired - Fee Related CN100395973C (en) | 2002-12-06 | 2002-12-06 | High-reliability cipher synchronizing method in mobile communication |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100395973C (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101388872B (en) * | 2007-09-10 | 2012-08-29 | 华为技术有限公司 | Data signal modulation, demodulation method, transceiver and transceiving system |
CN101388873B (en) * | 2007-09-10 | 2012-04-04 | 华为技术有限公司 | Data signal modulation, demodulation method, transceiver and transceiving system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4754482A (en) * | 1985-11-26 | 1988-06-28 | Samco Investment Company | Method and apparatus for synchronizing encrypting and decrypting systems |
CN1025704C (en) * | 1990-03-07 | 1994-08-17 | 艾利森电话股份有限公司 | Continous cipher synchronization for cellular communication system |
CN1263392A (en) * | 2000-03-03 | 2000-08-16 | 清华大学 | Information element transmission method |
DE10045463A1 (en) * | 2000-09-11 | 2002-03-28 | Ammar Alkassar | Self-synchronizing current cipher for route encryption over fault-prone transmission channel, uses output unit to take over data from cipher device when sync signal is activated |
-
2002
- 2002-12-06 CN CNB021279632A patent/CN100395973C/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4754482A (en) * | 1985-11-26 | 1988-06-28 | Samco Investment Company | Method and apparatus for synchronizing encrypting and decrypting systems |
CN1025704C (en) * | 1990-03-07 | 1994-08-17 | 艾利森电话股份有限公司 | Continous cipher synchronization for cellular communication system |
CN1263392A (en) * | 2000-03-03 | 2000-08-16 | 清华大学 | Information element transmission method |
DE10045463A1 (en) * | 2000-09-11 | 2002-03-28 | Ammar Alkassar | Self-synchronizing current cipher for route encryption over fault-prone transmission channel, uses output unit to take over data from cipher device when sync signal is activated |
Non-Patent Citations (4)
Title |
---|
BCH(31,21)码的解码及其软件实现. 张瑞华.通信技术,第11期. 2002 |
BCH(31,21)码的解码及其软件实现. 张瑞华.通信技术,第11期. 2002 * |
数字保密通信中的密码同步技术. 张凤仙.飞行器测控学报,第21卷第1期. 2002 |
数字保密通信中的密码同步技术. 张凤仙.飞行器测控学报,第21卷第1期. 2002 * |
Also Published As
Publication number | Publication date |
---|---|
CN1507195A (en) | 2004-06-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101267210B (en) | Data decoding and coding and receiving/transmission method and device | |
EP0270216B1 (en) | Dynamic frame length communication system, and stations for such a system | |
US5825889A (en) | Use of duplex cipher algorithms for satellite channels with delay | |
CN102404729B (en) | End-to-end speech encryption method for low-speed narrowband wireless digital communication | |
JPH11508115A (en) | Improved method for simultaneously performing bit synchronization and error detection in TDM / TDMA system | |
US4805197A (en) | Method and apparatus for recovering clock information from a received digital signal and for synchronizing that signal | |
JPH0656998B2 (en) | Synchronization method and digital data transmission system | |
US8718213B2 (en) | Clock synchronization method, apparatus, and system | |
CN102025448A (en) | Common public radio interface service transmitting/receiving method and device | |
EP0375361B1 (en) | Duplex communications method and system | |
CN111479269A (en) | L ora node network access method capable of realizing synchronization | |
CN108512785A (en) | A kind of Data Transport Protocol method | |
GB2348347A (en) | Transmission scheme with puncturing of channel coded data frames | |
US4631721A (en) | Bidirectional communication system of a two-wire bus comprising an active terminator | |
RU2178238C2 (en) | Discriminating-call system and its secondary station | |
CN100395973C (en) | High-reliability cipher synchronizing method in mobile communication | |
RU2377723C2 (en) | Method of transmitting discrete messages over wireless communication channels | |
CN103023630A (en) | Method for hiding information of speech stream on basis of speech coding by pulse code modulation | |
JP4404967B2 (en) | Air frame synchronization | |
CN108521287B (en) | frequency hopping synchronization realization method based on time information | |
CN102263683B (en) | Secure communication method for double loop field bus in numerical control system | |
CN101841385A (en) | Method for indicating frame ending | |
JPS6234309B2 (en) | ||
US5781553A (en) | Digital wireless private branch exchange system | |
RU2638732C1 (en) | Method of information transmission |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20080618 Termination date: 20201206 |