EP2353250A2 - Method and system for synchronization of cryptographic devices for gsm voice channel encryption - Google Patents
Method and system for synchronization of cryptographic devices for gsm voice channel encryptionInfo
- Publication number
- EP2353250A2 EP2353250A2 EP09826332A EP09826332A EP2353250A2 EP 2353250 A2 EP2353250 A2 EP 2353250A2 EP 09826332 A EP09826332 A EP 09826332A EP 09826332 A EP09826332 A EP 09826332A EP 2353250 A2 EP2353250 A2 EP 2353250A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- data
- transmission
- source
- stream cipher
- reception
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Definitions
- the present invention relates generally to a method and system for enhancing the efficiency and security of data transmission in electronic communications, and more particularly to a method and system to ensure successful decryption between cryptographic devices within a voice channel network.
- cartography typically ensure intentionally covert information or data in the form of undecipherable or encrypted representations to be transmitted to the authorized recipient, at which only the authorized recipient, presumably having the decryption key, would be able to decipher and thus retrieve the transmitted data.
- GSM Global System for Mobile communications
- GSM voice channel is a new medium used for encrypted speech transmission, whereby the encrypted plaintext or voice traffic may be transmitted in the form of pulse code modulation (PCM) across the respective networks.
- PCM pulse code modulation
- any form of cryptographic communications there is normally included the initialization process, whereby the primary objective of said process is to ensure both devices, particularly the recipient is ready or suitably equipped to enable decryption of data from the transmission source.
- GSM voice channel may confront complications if synchronization of the source and recipient devices for initialization in terms of transmission of data is not accurately effective. Failure of synchronization or delay in synchronization may lead to unsuccessful decryption of the transmitted plaintext, and therefore the original voice may not be obtained by the recipient. In certain circumstances, a delay in GSM voice channel communication may cause the encrypted plaintext which is transmitted from the transmission source to not synchronize with the encrypted plaintext which may have arrived at the reception source. It is apparent that the synchronization plays a major role in ensuring the reception source can obtain the original transmitted data.
- a system for synchronization of communication devices for transmission of data by voice channel encryption within a network comprising at least two communication devices operable to receive and transmit data; a transmission means (100) operable for encrypting data and sending encrypted data through a network, said means (100) comprising an encryptor (101) for encryption of data, a stream cipher state generator (105) for generating stream cipher states upon prompted and a delay module (103); a reception means (200) operable for receiving encrypted data from the transmission means (100) and decrypting said data, said means (200) comprising a decryptor (201) for decryption of encrypted data, a stream cipher state generator (205) for generating stream cipher states upon prompted and an initializer module (203) ; wherein the delay module (103) of the transmission means (100) is configured for generating digital zeros data in within one second and provide a delay prior to transmission of encrypted data; wherein the initializer module (203) of the reception means (200) is
- a method for synchronization for transmission of data between communication devices comprising a reception source and a transmission source, in a voice channel network, said method comprising the steps of: generating digital zeros data within one second at the transmission source; sending the digital zeros data to the reception source thereby providing sufficient preparing time for the reception source to receive encrypted data; generating the stream cipher states at the transmission source; encrypting the data for transmission at the transmission source; transmit the encrypted data to reception source; receiving the digital zeros data from the transmission source; receiving the encrypted data from transmission source; detecting the non- digital zeros data and thereby detecting the encrypted data; sending a signal to activate the stream cipher state generator at the reception source; generating the stream cipher states at the reception source; and decrypting the encrypted data at the reception source.
- FIG 1 illustrates an overview of the prior art related to GSM voice channel encryption-decryption
- FIG 2 illustrates another prior art in relation to encryption and decryption system
- FIG 3 provides the overall system and method in accordance with the preferred embodiments of the present invention.
- FIG 4 provides an overall flowchart for the operational view in accordance with an embodiment of the present invention
- FIG 5 and FIG 6 provide the stream cipher states synchronization result obtained with the method of the present invention.
- the present invention provides a method and system that enables the synchronization of transmitting and receiving data within cryptographic devices over a GSM voice channel communication, so as to ensure that the receiving cryptographic device is able to decrypt back the encrypted text data from the transmission source.
- FIG 1 and FIG 2 illustrate the current encryption-decryption systems. The prior art as seen in FIG 2 however is not suitable for use in GSM voice channel encryption as it does not provide synchronization in GSM channel which may lead to ineffective decryption.
- the present invention may be applied to a wide range of communication devices and applications including wireless telephony applications such as mobile phones, PDAs, smart phones, military communications, PC to PC communication that are using GSM voice channel communication.
- wireless telephony applications such as mobile phones, PDAs, smart phones, military communications, PC to PC communication that are using GSM voice channel communication.
- the main components in accordance with the preferred embodiments of the present invention are the reception source (200) and a transmission source (100) , in addition to the wireless mobile devices.
- the reception source (200) comprises of a decryptor (201) and a synchronizer unit (202)
- the transmission source (100) comprises of an encryptor (101) and a synchronizer unit (102) . It is noted that these components are in communication with each other and with their respective wireless devices (300, 400) .
- the synchronizer unit (102) of the transmission source (100) in accordance with another preferred embodiment of the present invention comprises of a stream cipher state generator (105) , and a delay module (103) , whilst at the reception source (200) , there is provided also a stream cipher state generator (205) and an initializer module (203) .
- the synchronizer unit (102) of the transmission source (100) prior to transmission of plaintext or data from the transmission source (100); the synchronizer unit (102) of the transmission source (100) generates 32-bit digital zeros for less than one second so as to ensure that the reception source (200) is prepared for initialization. It is noted that the stream cipher state generator (105) only generates the stream cipher state at the transmission source (100) once the data is ready for encryption.
- the reception source (200) later on receives a repetitive cycles of positive full-scale pulse code modulation (PCM) code, for instance 0111111111111 in less than one second, when the digital zeros are propagated from the transmission source (100) .
- PCM pulse code modulation
- the 32-bit digital zeros data is converted as positive full-scale PCM code when received at the reception source (200) , in which the magnitude bits for the positive full- scale PCM code is comprehended as LOW for the sign bit that is the most significant bit (MSB) , and HIGH for the remainder 12 bits, as seen in 0111111111111.
- the generation of said 32-bit digital zeros for a few cycles with the assistance of the delay module (105) at the transmission source (100) provides sufficient delay in within or less than one second so as to provide sufficient time for propagation of the digital zeros prior to sending the encrypted plaintext data.
- the stream of digital zeros serves to enable sufficient time is given for the reception source (200) in preparation for receiving the encrypted plaintext.
- the stream cipher generator (105) of the transmission source (100) starts to generate the stream cipher states.
- the encrypted plaintext is accordingly propagated with the assistance of a wireless protocol for instance the Bluetooth (60, 80), to a wireless mobile device prior to sending it through the wireless GSM voice channel communication network.
- said initiliazer module (203) Upon detection of the encrypted plaintext by the initializer module (203) at the reception source (200), said initiliazer module (203) immediately sends a signal to activate the stream cipher state generator (205) to generate the stream cipher states. Accordingly, the plaintext is decrypted using the generated stream cipher states of the reception source (200) .
- the reception source (200) only starts to synchronize upon detected the input signals of non-positive full scale PCM code, in contrast to that is sent by the transmission source (100) .
- the positive full scale PCM code signals are digital zero signals provided by the transmission source (100) .
- the reception source (200) Upon detection of the non positive full scale PCM code and thereby detection of the non digital zero signals from the transmission source (100), the reception source (200) generates an initialization signal that is used to initiate the predetermined cipher keys at the reception source (200) . With the presence of similar cipher keys, the reception source (200) proceeds to decrypt the incoming the encrypted signal.
- the present invention allows both stream cipher states generators from both sources to generate stream cipher states at a synchronized instance.
- FIG 5 and FIG 6 illustrate the stream cipher state as generated at both the transmission source (100) and reception source (200) .
- the highlighted area indicates that the generated stream cipher states at the reception source (200) are similar to that of the one generated at the transmission source (100) .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MYPI20084590 MY152148A (en) | 2008-11-14 | 2008-11-14 | Method and system for synchronization of cryptographic devices for gsm voice channel encryption |
PCT/MY2009/000191 WO2010056106A2 (en) | 2008-11-14 | 2009-11-12 | Method and system for synchronization of cryptographic devices for gsm voice channel encryption |
Publications (2)
Publication Number | Publication Date |
---|---|
EP2353250A2 true EP2353250A2 (en) | 2011-08-10 |
EP2353250A4 EP2353250A4 (en) | 2013-05-29 |
Family
ID=42170567
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP09826332.0A Withdrawn EP2353250A4 (en) | 2008-11-14 | 2009-11-12 | Method and system for synchronization of cryptographic devices for gsm voice channel encryption |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP2353250A4 (en) |
MY (1) | MY152148A (en) |
WO (1) | WO2010056106A2 (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3659046A (en) * | 1968-05-15 | 1972-04-25 | Sits Soc It Telecom Siemens | Message scrambler for pcm communication system |
US4817148A (en) * | 1987-07-06 | 1989-03-28 | Wegener Communications, Inc. | Signal scrambling transmission system |
US5487066A (en) * | 1988-03-21 | 1996-01-23 | First Pacific Networks, Inc. | Distributed intelligence network using time and frequency multiplexing |
EP1111956A2 (en) * | 1999-12-22 | 2001-06-27 | Alcatel USA Sourcing, L.P. | Variable rate subscriber bus |
US6516004B1 (en) * | 1997-07-31 | 2003-02-04 | T. Sqware Inc. | HDLC digital data transmission protocol controller |
US20050232422A1 (en) * | 2004-04-19 | 2005-10-20 | Jingdong Lin | GSM (Global System for Mobile communication) handset with carrier independent personal encryption |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2843258B1 (en) * | 2002-07-30 | 2004-10-15 | Eads Defence & Security Ntwk | METHOD FOR TRANSMITTING ENCRYPTED DATA, ASSOCIATED DECRYPTION METHOD, DEVICES FOR IMPLEMENTING SAME, AND MOBILE TERMINAL INCORPORATING THE SAME. |
US6944245B2 (en) * | 2003-10-17 | 2005-09-13 | Motorola, Inc. | Multi-pass interference reduction in a GSM communication system |
-
2008
- 2008-11-14 MY MYPI20084590 patent/MY152148A/en unknown
-
2009
- 2009-11-12 WO PCT/MY2009/000191 patent/WO2010056106A2/en active Application Filing
- 2009-11-12 EP EP09826332.0A patent/EP2353250A4/en not_active Withdrawn
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3659046A (en) * | 1968-05-15 | 1972-04-25 | Sits Soc It Telecom Siemens | Message scrambler for pcm communication system |
US4817148A (en) * | 1987-07-06 | 1989-03-28 | Wegener Communications, Inc. | Signal scrambling transmission system |
US5487066A (en) * | 1988-03-21 | 1996-01-23 | First Pacific Networks, Inc. | Distributed intelligence network using time and frequency multiplexing |
US6516004B1 (en) * | 1997-07-31 | 2003-02-04 | T. Sqware Inc. | HDLC digital data transmission protocol controller |
EP1111956A2 (en) * | 1999-12-22 | 2001-06-27 | Alcatel USA Sourcing, L.P. | Variable rate subscriber bus |
US20050232422A1 (en) * | 2004-04-19 | 2005-10-20 | Jingdong Lin | GSM (Global System for Mobile communication) handset with carrier independent personal encryption |
Non-Patent Citations (1)
Title |
---|
See also references of WO2010056106A2 * |
Also Published As
Publication number | Publication date |
---|---|
WO2010056106A3 (en) | 2010-09-10 |
WO2010056106A2 (en) | 2010-05-20 |
EP2353250A4 (en) | 2013-05-29 |
MY152148A (en) | 2014-08-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7697687B2 (en) | Streaming implementation of AlphaEta physical layer encryption | |
KR102619383B1 (en) | End-to-end double ratchet encryption using epoch key exchange | |
EA200602160A1 (en) | METHOD OF ENCRYPTION AND TRANSMISSION OF DATA BETWEEN THE SENDER AND THE RECIPIENT USING THE NETWORK | |
EP0882340A1 (en) | Use of an encryption server for encrypting messages | |
CN105792190B (en) | Data encryption, decryption and transmission method in communication system | |
EP3291480A1 (en) | Secure data transmission | |
WO2012129929A1 (en) | Method, system and appararus for secure transmission of media message | |
CN101568110A (en) | Wireless data transmission method and system | |
EP0840966B1 (en) | Decryption of retransmitted data in an encrypted communication system | |
US20100158243A1 (en) | Method of encryption in networked embedded systems | |
KR20000025373A (en) | Method for encoding data | |
JP2008124935A (en) | Transmitter, receiver, and information communication system | |
US9467428B2 (en) | Information security attachment device for voice communication and information security method for voice communication using the same | |
CN203537408U (en) | End-to-end voice communication privacy device with assignable secret key | |
EP2353250A2 (en) | Method and system for synchronization of cryptographic devices for gsm voice channel encryption | |
JPH08204701A (en) | Electronic mail cipher communication system and cipher communication method | |
JP2000305849A (en) | Transmitter and its method, receiver and its method and communication system | |
WO2012060684A1 (en) | Quantum-based random number generator (qrng) with multi output processor (mop) | |
JP2001053740A (en) | Open time designation-type communication mode and open time designation-type communication system | |
US20200112426A1 (en) | Methods and systems for secure communications using synchronized polarized light transmissions and stream encryption | |
JP2012204919A (en) | Backup communication circuit sharing system | |
TWI411281B (en) | System and method for protecting data with a capacity for authentication | |
Barbeau | Cryptographic Schemes for Secret Long-Distance Underwater Communications | |
Yaakob | Synchronization system for crypto initialization over GSM voice channel | |
CN114417367A (en) | Real-time encryption method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20110607 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK SM TR |
|
RIN1 | Information on inventor provided before grant (corrected) |
Inventor name: MOHAMED NOOR BEG, AHMAD RAIF BIN Inventor name: ABU TALIB, AZHAR BIN Inventor name: HAJI YAAKOB, WIRA FIRDAUS BIN Inventor name: TENGKU AZIZ, RAJA MOHD FUAD |
|
DAX | Request for extension of the european patent (deleted) | ||
A4 | Supplementary search report drawn up and despatched |
Effective date: 20130503 |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: H04W 12/04 20090101ALN20130425BHEP Ipc: H04L 7/00 20060101ALI20130425BHEP Ipc: H04L 9/12 20060101AFI20130425BHEP Ipc: H04L 9/06 20060101ALI20130425BHEP |
|
17Q | First examination report despatched |
Effective date: 20150413 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20150825 |