CN102082661A - PCM/FM telemetering system-based data security communication method - Google Patents

PCM/FM telemetering system-based data security communication method Download PDF

Info

Publication number
CN102082661A
CN102082661A CN 201110024224 CN201110024224A CN102082661A CN 102082661 A CN102082661 A CN 102082661A CN 201110024224 CN201110024224 CN 201110024224 CN 201110024224 A CN201110024224 A CN 201110024224A CN 102082661 A CN102082661 A CN 102082661A
Authority
CN
China
Prior art keywords
data
key
shift register
key stream
frame
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 201110024224
Other languages
Chinese (zh)
Inventor
赵泽茂
戴绍港
陈集炜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Dianzi University
Original Assignee
Hangzhou Dianzi University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Dianzi University filed Critical Hangzhou Dianzi University
Priority to CN 201110024224 priority Critical patent/CN102082661A/en
Publication of CN102082661A publication Critical patent/CN102082661A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Selective Calling Equipment (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a pulse code modulation (PCM)/frequency modulation (FM) telemetering system-based data security communication method. The method comprises the following steps of: assigning a cipher key until an initial key generator generates an initial key; generating a key stream through a clock-controlled key stream generator, and generating a next group of data cipher keys; generating ciphertext from data to be transmitted and key stream exclusive OR, packaging into a frame, and performing Turbo encoding on the packaged data frame; and finally, performing signal sampling on the data subjected to the Turbo encoding, performing preset filtering on the sampled data, feeding the data into a channel through FM modulation, wherein a receiving end receives and synchronizes the signal, and at the receiving end, the signal is processed in an inverted sequence in turn and is successively subjected to coherent demodulation, data sampling, Turbo code decoding and decryption through the FM so as to obtain the needed data finally. The method has high linear complexity, can effectively protect the data, and improves security of the PCM/FM telemetering system.

Description

Data security communication method based on PCM/FM remote measurement system
Technical field
The invention belongs to the telemetry intelligence (TELINT) technical field, relate to a kind of data security communication method based on PCM/FM remote measurement system.
Background technology
Contain a large amount of important informations in the reentry telemetry system in the data, be included in the scouting information in the electronic warfare, the state of flight information of aircraft etc.For preventing that the third party from intercepting and capturing or utilizing these information, then require the telemetry of wireless transmission is carried out effective scrambled.The encryption of telemetry requires when guaranteeing high Cipher Strength, and the encryption and decryption computing is simple, and mistake and diffusion of information are little, also require the reasonable combination of error correcting code and encryption and decryption during realization.
PCM/FM is one of time-devision system standard remote measurement system, also is a kind of telemetry system code modulation mode that extensively adopts at present, realizes the time division multiplexing Digital Transmission of multichannel analog signals, reaches the purpose of utilizing limited channel to carry out the high accuracy remote measurement.At present, the most frequently used coding method is divided in data encryption: sequence (stream) password, block cipher and public key cryptography three classes.Stream cipher is pressed bit and is encrypted, and real-time is good, fast operation, and the error diffusion in the transmission course is little, is fit to very much telemetry and encrypts, and this also is the reason that current telemetry mainly adopts stream cipher.
In reentry telemetry system was used, the document of publishing that the research of relevant data encryption method and technology realize was actually rare, and does not see the documents and materials that the box-like clock key stream of set of applications carries out data encryption.
Summary of the invention
Purpose of the present invention is exactly at the deficiencies in the prior art, proposes a kind of data security communication method based on PCM/FM remote measurement system.
The inventive method concrete steps are:
At first produce initial key, generate key stream by the clock key stream generator then, and generate group data seed key down with seed key assignment to initial key maker;
Described clock key stream generator comprises the first shift register A, the second shift register B, the 3rd shift register C and the 4th shift register D, its length is respectively L1, L2, L3 and L4, and the second shift register B, the 3rd shift register C and the 4th shift register D form the clock key stream generator; Wherein L2, L3 and L4 are coprime in twos;
The described first shift register A is used for producing the initial value of the second shift register B, control linear feedback shift register (LFSR) is the L2 level, controlled LFSR is respectively L3 level and L4 level, and the initial condition of the tap position of controlled LFSR and control LFSR is by default;
Then data to be sent and key stream XOR are generated ciphertext, encapsulation incoming frame, the Barker code that frame head adopts telemetry standards to recommend, postamble are the seed key behind 31 codings, and packaged Frame is through the Turbo coding.
Then the data behind the Turbo coding are shone upon, the data after the mapping are carried out signal sampling, and the data after the sampling are carried out preset filtering, and channel is sent in modulation through FM at last; Receiving terminal received signal and synchronously at receiving terminal, is handled with backward successively, successively by FM coherent demodulation, data sampling, Turbo code decoding and deciphering, obtains desired data at last.
The present invention directly adopts the clock key stream generator, the cycle of the pseudo random sequence that this maker produces is that the cycle of three linear feedback shift register output sequences is long-pending, combination and cross complaint by maker like this makes cycle of formation sequence near 2 131 powers.Have good linear complexity, effectively protected data strengthens the fail safe of PCM/FM telemetry system self.
Because the present invention adopts the mode of sequential encryption, it is expressly encrypted one by one by code element or byte, so it doesn't matter between each ciphertext code element and the adjacent code element, so there is not the problem of error code diffusion in principle.Encryption key is not directly exposed in the ciphertext yet, uses seed key to guarantee Cipher Strength, and the encryption and decryption that is used to set up encryption device simultaneously is synchronous.
Description of drawings
Fig. 1 is the key stream generator model;
Fig. 2 is the Frame model;
Fig. 3 is a reentry telemetry system simplified model block diagram;
Fig. 4 is the MF transmitter block diagram;
Fig. 5 is the intermediate-frequency receiver block diagram.
Embodiment
The present invention is further described below in conjunction with drawings and Examples.
The present invention is based on PCM/FM remote measurement system data ciphering method principle as shown in Figure 1, clock key stream generator among the figure is made up of three linear feedback shift registers (LFSR), wherein controlling LFSR is 31 grades, controlled LFSR is respectively 47 grades and 53 grades, and the initial condition of the tap position of controlled LFSR and control LFSR is by default (maintaining secrecy); The key of decision clock key stream generator is the initial condition of shift register, and this initial condition is called as seed key.After the recipient receives ciphertext and seed key, start identical clock key generator, produce the decruption key identical, thereby recover expressly with encryption key.The cycle of the pseudo random sequence that the clock key stream generator produces in this scheme is that the cycle of three linear feedback shift register output sequences is long-pending, like this by the combination and the cross complaint of maker, makes cycle of formation sequence near 2 131 powers.
Length 4~the 1024Byte of telemetry frame does not wait, and can define the frame length of oneself according to actual needs.Consider the code length needs of the Turbo code that adopts in the native system, the employing frame length is 128Byte.According to telemetry standards, synchronous head length generally accounts for 5% ~ 10% of frame length and is advisable, in remote measurement, also can get below 5%, the optimal synchronisation sign indicating number that the native system synchronous head adopts bit synchronization sign indicating number and telemetry standards to recommend, account for 25, the seed key key accounts for 15 bits in frame, the shared bit of ciphertext is 984 so.Frame structure as shown in Figure 2.
When first frame is encrypted, set the initial value of 5,47,53 grades of registers, 5 grades register produces the initial value of 31 seed keys as 31 grades of registers, and the clock key stream generator was started working and produced key 984 bits this moment.Produce ciphertext with this 984 bit keys and ciphertext XOR, and ciphertext is encapsulated into frame.Get in this key stream last 5 bits as the seed key of next frame, this seed key is carried out (3,1) coding, produce 15 bits, and be encapsulated in this frame and transmit.Promptly finished the encryption and the transmission problem of first frame data this moment.When the first frame end of transmission, 5 bit seed keys and clock key stream generator produce 984 bit keys once more thus, are waiting for the encryption of next frame data.When second frame data arrived, 984 bit keys stream can be finished with expressly direct XOR and encrypt and encapsulated frame thus.Get the seed key of last 5 bits as next frame equally, this seed key is carried out (3,1) coding, produce 15 bits, frame is advanced in encapsulation.Can enter the chnnel coding stage after finishing this process.
Chnnel coding adopts Turbo code.Signal divides three the tunnel to handle, and carries out compound at last.First supported signal is the signal that only joins delay and handle.Second supported signal carries out compound after time delay, coding and puncturing process.The 3rd supported signal earlier through interleaver, to encode, delete surplus back compound.Interleaving mode uses matrix to interweave, and promptly reads every 8.Coded system adopts the RSC coding, and it is synchronous to use FIFO to carry out the time delay of data.After finishing chnnel coding, the data behind the coding being shone upon, binary data 1,0 is mapped to respectively+and 1 ,-1.Use 64 times of clock frequencies that the signal after shining upon is sampled to the code check behind the Turbo coding.
Then, the gained signal is carried out preset filtering, adopt raised cosine window.Use the clock frequency identical to carry out the FM modulation with sampling.Frequency modulation(FM) adopts the method for DDS to realize.The amplitude of the SIN function of one-period is deposited among the ROM as carrier wave, read data among the ROM at interval by certain address.Modulation signal can change the modulation of address realization to frequency by adding up as input signal.Flow chart as shown in Figure 3.
Pass through the DA transducer afterwards to digital signal imitationization, filtering is amplified the back and is sent by MF transmitter.Shown in Figure 4 and 5.Intermediate-frequency receiver receives signal and handles, and converts digital signal to, and signal is carried out the synchronous of strictness.Handle with backward successively then, successively, obtain desired data at last by FM coherent demodulation, data sampling, Turbo code decoding and deciphering.

Claims (2)

1. based on the data security communication method of PCM/FM remote measurement system, it is characterized in that this method may further comprise the steps:
At first produce initial key, generate key stream by the clock key stream generator then, and generate group data seed key down with seed key assignment to initial key maker;
Described clock key stream generator comprises the first shift register A, the second shift register B, the 3rd shift register C and the 4th shift register D, its length is respectively L1, L2, L3 and L4, and the second shift register B, the 3rd shift register C and the 4th shift register D form the clock key stream generator; Wherein L2, L3 and L4 are coprime in twos;
The described first shift register A is used for producing the initial value of the second shift register B, and control LFSR is the L2 level, and controlled LFSR is respectively L3 level and L4 level, and the initial condition of the tap position of controlled LFSR and control LFSR is by default;
Then data to be sent and key stream XOR are generated ciphertext, encapsulation incoming frame, the Barker code that frame head adopts telemetry standards to recommend, postamble are the seed key behind 31 codings, and packaged Frame is through the Turbo coding.
2. at last the data behind the Turbo coding are carried out signal sampling, the data after the sampling are carried out preset filtering, channel is sent in modulation through FM; Receiving terminal received signal and synchronously at receiving terminal, is handled with backward successively, successively by FM coherent demodulation, data sampling, Turbo code decoding and deciphering, obtains desired data at last.
CN 201110024224 2011-01-21 2011-01-21 PCM/FM telemetering system-based data security communication method Pending CN102082661A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201110024224 CN102082661A (en) 2011-01-21 2011-01-21 PCM/FM telemetering system-based data security communication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201110024224 CN102082661A (en) 2011-01-21 2011-01-21 PCM/FM telemetering system-based data security communication method

Publications (1)

Publication Number Publication Date
CN102082661A true CN102082661A (en) 2011-06-01

Family

ID=44088421

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201110024224 Pending CN102082661A (en) 2011-01-21 2011-01-21 PCM/FM telemetering system-based data security communication method

Country Status (1)

Country Link
CN (1) CN102082661A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106230580A (en) * 2016-08-31 2016-12-14 福州福大海矽微电子有限公司 A kind of changeable key multiple encryption method
CN108768604A (en) * 2018-05-08 2018-11-06 北京航空航天大学 A kind of low complex degree bit synchronization method for PCM/FM multiple-symbol detections
CN113329025A (en) * 2021-06-07 2021-08-31 中国电子科技集团公司第二十九研究所 Software authorization-based embedded symmetric encryption recorded data protection method and system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1585321A (en) * 2004-06-07 2005-02-23 北京交通大学 Digital information anti-interference soft encrypted method and system based on Turbo code-encode
WO2006113541A2 (en) * 2005-04-13 2006-10-26 Northwestern University Streaming implementation of alphaeta physical layer encryption

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1585321A (en) * 2004-06-07 2005-02-23 北京交通大学 Digital information anti-interference soft encrypted method and system based on Turbo code-encode
WO2006113541A2 (en) * 2005-04-13 2006-10-26 Northwestern University Streaming implementation of alphaeta physical layer encryption

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
《机电工程》 20091231 季艳中等 基于Turbo码的PCM/FM再入遥测系统性能分析 第56页右栏第8-15行,图3 1-2 第26卷, 第12期 2 *
《杭州电子科技大学学报》 20091231 李孟婷等 序列加密在PCM/FM遥测系统中的仿真研究 第10页第9行-第11页第23行,图1-2 1-2 第29卷, 第6期 2 *
《计算机工程与科学》 20100731 徐芡芡等 基于LFSR的钟控密钥流生成器 第18页右栏第5-9行 1-2 第32卷, 第7期 2 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106230580A (en) * 2016-08-31 2016-12-14 福州福大海矽微电子有限公司 A kind of changeable key multiple encryption method
CN108768604A (en) * 2018-05-08 2018-11-06 北京航空航天大学 A kind of low complex degree bit synchronization method for PCM/FM multiple-symbol detections
CN113329025A (en) * 2021-06-07 2021-08-31 中国电子科技集团公司第二十九研究所 Software authorization-based embedded symmetric encryption recorded data protection method and system

Similar Documents

Publication Publication Date Title
CN107113169B (en) Permanent secure communications from short-term secure encrypted quantum communications
US9755674B2 (en) Method for encryption obfuscation
CN102035648B (en) Safe and real-time soft recovery system and method for aircraft state information
WO2007076712A1 (en) A system and method for generating the analog-digital mixed chaotic signal, a encryption communication method thereof
CN102238005A (en) Relaying method for remote secure quantum communication
JP2012085028A (en) Yuen encryption optical transmitter and receiver, yuen encryption optical transmission method and reception method, and encryption communication system
CN101431400B (en) Encryption/decryption method and system based on chaos hybrid self-synchronizing method
CN103019648A (en) True random number generator with digital post-processing circuit
CN103580849A (en) Spatiotemporal chaos secret communication method
CN110912699A (en) Optical transmission method based on floating probability forming
CN101568110A (en) Wireless data transmission method and system
CN101656728B (en) Secure transmission method using time-varying incidental information flow as key information
CN102082661A (en) PCM/FM telemetering system-based data security communication method
CN101763239A (en) Random encrypting method and apparatus
RU2459367C2 (en) Method to generate alternating key for unit coding and transfer of coded data
CN103346878A (en) Secret communication method based on FPGA high-speed serial IO
CN104980228A (en) Optical signal transmission method and device
Ferrara et al. Implementation and experimental evaluation of reed-solomon identification
CN101827149B (en) Quantum code telephone
CN203554473U (en) Chaotic synchronous control system for secure communication system
CN111901100B (en) Data link quantum computation resistant communication method and system based on symmetric key pool
CN100555937C (en) A kind of E-mail encryption transmitting-receiving system
RU2553083C1 (en) Multichannel transmitter for spectrally efficient radio communication system
CN101296052B (en) Anti-communication reconnaissance and interception method and device
US3813493A (en) Secure data transmission apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20110601