WO2004014019A1 - Procede de transmission de donnees chiffrees, procede de dechiffrement associe, dispositifs pour leur mise en oeuvre, et terminal mobile les incorporant - Google Patents
Procede de transmission de donnees chiffrees, procede de dechiffrement associe, dispositifs pour leur mise en oeuvre, et terminal mobile les incorporant Download PDFInfo
- Publication number
- WO2004014019A1 WO2004014019A1 PCT/FR2003/002302 FR0302302W WO2004014019A1 WO 2004014019 A1 WO2004014019 A1 WO 2004014019A1 FR 0302302 W FR0302302 W FR 0302302W WO 2004014019 A1 WO2004014019 A1 WO 2004014019A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- determined
- value
- time interval
- cryptographic
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/12—Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/037—Protecting confidentiality, e.g. by encryption of the control plane, e.g. signalling traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Definitions
- the present invention relates to the field of digital radiocommunication systems and, in particular, systems of the type
- TDMA from the English “Time Division Multiple Access” which means time division multiple access. It finds particularly advantageous applications in private professional radiocommunication systems (or PMR systems, from the English “Professional Mobile Radio”).
- PMR systems generally offer an end-to-end encryption service for traffic data transmitted during communications. This is data encoding speech, in particular, but more generally data of any kind.
- the purpose of encryption is to preserve the confidentiality and integrity of the data transmitted and to prevent identity theft of the mobile terminals belonging to the system.
- the transmitter comprises a cryptographic sequence generator 11, which generates a data block SCj called cryptographic sequence, independently of the clear data flow, from a secret encryption key K and from information called initialization vector IVj (from English
- the cryptographic sequence SCj is such that: where E [ ⁇ denotes the encryption of the information IVj with the key K, according to a determined encryption algorithm.
- the encryption algorithm is the same for all mobile terminals in the system.
- the initialization vector IVj and the secret encryption key K are known to both the sending terminal and the receiving terminal.
- the initialization vector IVj varies in time to avoid the same cryptographic sequence being used twice with the same key K, which would seriously weaken the security of the transmitted data.
- the index i refers to a current value of the initialization vector.
- the transmitter also includes an Exclusive-OR operator 21 which receives the cryptographic sequence SCj on a first input and a sequence mj of clear data on a second input, and which generates a sequence of encrypted data q on output, so that: where ⁇ designates the OR-Exclusive operation operated bit by bit.
- the sequence q is transmitted through the transmission channel 20.
- the receiver also includes a cryptographic sequence generator 12 generating, from the same initialization vector IVj and the same secret encryption key K, a cryptographic sequence SCj identical to that generated by the generator 11 of the transmitter and having used to encrypt the sequence q. Likewise, it also includes an Exclusive OR operator 22 which receives on a first input the cryptographic sequence SCj generated by the generator 12, which receives on a second input the sequence of encrypted data q, and which outputs the sequence m; clear data, since: q ⁇ SCj ⁇ mj ⁇ SCj ⁇ SCj ⁇ mj (3)
- the transmitter and the receiver must perform dual operations of each other. In particular, it is therefore necessary for the receiver to know the time relationship to be respected at the input of the operator 22, between the cryptographic sequence SCj which it generates on the one hand and the sequence of encrypted data q which it receives on the other hand, so that the decryption takes place correctly.
- This constraint is known as cryptographic synchronization.
- cryptographic synchronization actually presents two aspects. First of all, the initial synchronization, that is to say at the start of communication.
- This technique has been applied without modification in TDMA type systems such as the TETRA system (from the English “TErrestrial Trunked Radio”), where no resource had been reserved a priori for the transmission of cryptographic synchronization information: this is transmitted from start to finish by theft of speech frames (in English "Frame stealing"). More particularly, the data of a speech frame contained in certain determined TDMA frames (or radio frames) is replaced by cryptographic synchronization information. This allows the receiving terminal to generate the cryptographic sequence suitable for decrypting the voice data transmitted in the TDMA frames which immediately follow. There is therefore a determined temporal relation and fixed between the transmission of synchronization information and that of the encrypted data to which it relates. It is said that the cryptographic synchronization information is transmitted in the band with reference to the fact that it occupies useful communication resources. We can for example refer to American patent n ° 2002/0066013 for an example of this technique applied to the TETRA system.
- the initial synchronization must be of good quality to prevent radio transmission errors from depriving many receiving terminals in group communications of the possibility of receiving and deciphering the speech correctly.
- the cryptographic synchronization information is generally repeated 4 times during the first second of communication, that is to say during the first 34 frames, which causes a frame theft rate of the order of 11%, severely degrading the quality of speech.
- a first object of the invention is to define a cryptographic synchronization mechanism in a TDMA system having an associated signaling channel, which eliminates the drawbacks of the aforementioned prior art.
- a second object of the invention is to propose a mechanism for maintaining cryptographic synchronization during the cell change during communication by a mobile terminal on reception.
- a method of transmitting encrypted data between a transmitting mobile terminal and at least one receiving mobile terminal of a digital radiocommunication system, through a radio transmission channel having a frame structure such that a TDMA frame comprises time slots of a first type forming a traffic channel for the transmission of traffic information and at least one time slot of a second type forming a signaling channel associated for the transmission of signaling information includes the following steps:
- a sequence of encrypted data packets is transmitted in the traffic channel from a time interval of the first determined type, while associated cryptographic synchronization information is transmitted in the associated signaling channel inside 'a time interval of the second determined type,
- cryptographic synchronization delay information relating to the time difference between said time interval of the second determined type and said time interval of the first determined type, is also transmitted in the associated signaling channel.
- the cryptographic synchronization information is transmitted in the associated signaling channel when resources are available there for this purpose, thus avoiding the drawbacks of theft of speech frames of the technique known in the prior art.
- a second aspect of the invention relates to a method of decrypting a sequence of encrypted data packets transmitted between a transmitting mobile terminal and at least one receiving mobile terminal of a digital radiocommunication system, through a radio transmission channel having a frame structure such as a TDMA frame comprises time slots of a first type forming a traffic channel for the transmission of traffic information and at least one time slot of a second type forming a signaling channel associated for the transmission of signaling information, comprising the steps consisting in: a) receiving said sequence of encrypted data packets from a time interval of the first determined type; b) optionally, receive associated cryptographic synchronization information in the associated signaling channel, within a time interval of the second determined type, and, in this case, c) also receive, in the associated signaling channel , cryptographic synchronization delay information relating to the time difference between said time interval of the second determined type and said time interval of the first determined type; d) generating a value of an initialization vector used to generate a cryptographic sequence used for the encryption of said
- a third aspect of the invention relates to a device for transmitting encrypted data between a transmitting mobile terminal and at least one receiving mobile terminal of a digital radiocommunication system, through a radio transmission channel having a frame structure such as a TDMA frame comprises time slots of a first type forming a traffic channel for the transmission of traffic information and at least one time slot of a second type forming a associated signaling channel for the transmission of information signaling system, comprising: means for transmitting a sequence of encrypted data packets in the traffic channel from a time interval of the first determined type, and for transmitting cryptographic synchronization information in the signaling channel associated with within a time interval of the second determined type, and - means for also transmitting da ns the associated signaling channel, cryptographic synchronization delay information relating to the time difference between said time interval of the second determined type and said time interval of the first determined type.
- a fourth aspect of the invention relates to a device for decrypting a sequence of encrypted data packets transmitted between a transmitting mobile terminal and at least one receiving mobile terminal of a digital radiocommunication system, through a radio transmission channel having a frame structure such as a TDMA frame comprises time slots of a first type forming a traffic channel for the transmission of traffic information and at least one time slot of a second type forming a signaling channel associated for the transmission of signaling information, comprising: a) first reception means for receiving said sequence of encrypted data packets from a time interval of the first determined type; b) second reception means for possibly receiving associated cryptographic synchronization information in the communication channel associated signaling, within a time interval of the second determined type, and, in this case, c) reception means for also receiving, in the associated signaling channel, cryptographic synchronization delay information relating to the time difference between said time interval of the second determined type and said time interval of the first determined type; d) first generation means for generating a value of an initialization vector used to generate a crypto
- a fifth and final aspect of the invention relates to a mobile terminal of a digital radio communication system, comprising a transmission device, and / or a decryption device as defined above.
- FIG. 2 is a diagram showing an example of frame structure in a TDMA radio system
- - Figure 3a and Figure 3b are, respectively, a diagram and a table illustrating an example of encapsulation of speech frames (or speech packets) in the frame structure of Figure 2;
- FIG. 4 is a block diagram of a mobile terminal according to the invention.
- FIG. 5 is a diagram illustrating an example of sequence of steps of a method of transmitting encrypted data according to the invention
- - Figure 6 is a diagram illustrating an example of initialization vector according to the invention
- - Figure 7 is a diagram illustrating an example of synchronization information according to the invention, corresponding to the example of initialization vector according to Figure 6;
- FIG. 8 is a diagram illustrating an example of transmission of the first four sequences of encrypted data in a superframe of the radio channel for a determined half-wave;
- FIG. 9 is a diagram illustrating an example of reception of four first sequences of encrypted data in a superframe of the radio channel for the half-cycle considered in FIG. 8;
- FIG. 10 is a diagram illustrating an example of sequence of steps of a method for decrypting encrypted data according to the invention.
- FIG. 11 is a conversion table giving a time difference value expressed in number of speech frames as a function of the value of said time difference expressed in number of time intervals, in the example of encapsulation of FIGS. 3a and 3b;
- - Figure 12 is a diagram showing a handover configuration in a radiocommunication system;
- FIG. 13 is a diagram illustrating an example of sequence of steps according to the invention, to maintain cryptographic synchronization during a handover.
- the base station of a cell can establish logical traffic channels with one or more mobile terminals located in its radio coverage area, after a call establishment procedure carried out by means of a dedicated control logical channel.
- the traffic channel established with a mobile terminal is down and / or up.
- One or more logical traffic channels are multiplexed, on a determined frequency, with an associated signaling logical channel used to exchange signaling during communication.
- the invention is described below in its application to an example of a radiocommunication system which is a TDMA-2 system, that is to say a TDMA type 2 order system.
- FIG. 2 is a diagram which illustrates an example of the structure of a radio superframe on physical traffic channels in such an example.
- the structure of a radio superframe on a physical uplink traffic channel established on a determined frequency f T u and on the other hand, the structure of a radio superframe on a physical downlink channel established on a determined frequency fjD, different from the frequency f-ru-
- a superframe of the physical traffic channel is subdivided into four frames (also called radio frames, TDMA frames or segments, in the jargon of a person skilled in the art), which are shown one above the other in the figure.
- a TDMA frame corresponds to a quarter of a superframe.
- Each TDMA frame is composed of nine composite time intervals each having a duration d2 equal to 40 ms, and each comprising two consecutive elementary time intervals, each of duration d1 equal to 20 ms.
- Each of the first eight composite time intervals of each frame has an odd elementary time interval for the downward direction and an even elementary time interval for the upward direction, which are identified by the letter T.
- the recurring sequence of these time intervals T forms a logical traffic channel or TCH channel (from the English "Traffic CHannel"), respectively downlink and uplink. Consequently, on the same physical downlink traffic channel established on the determined frequency TD , the base station can multiplex, in the even elementary time intervals, another logical traffic channel established with another mobile station.
- the ninth composite time interval of each segment is reserved for the transmission of signaling information.
- the recurring sequence of these time intervals which are identified by the letter S, form a logical signaling channel associated, respectively down and up.
- several logical channels can be multiplexed in the time intervals S of the super-frame.
- the numbers indicated above the frames correspond to the composite time slot numbers in the superframe, that is to say also to the elementary time slot numbers in each of the uplink and downlink channels.
- this associated signaling channel is used for the transmission of periodic cryptographic synchronization information. These are therefore transmitted "out-of-band". This technique makes it possible to avoid theft of frames during the entire duration of the current internship. Frame thefts only occur for the transmission of the initial cryptographic synchronization.
- the cryptographic synchronization information which is transmitted at a determined time is the current value of the initialization vector, that is to say that used for the generation of the current cryptographic sequence, i.e. -also tell the generation of the current encrypted data sequence.
- a sequence of encrypted data is transmitted in the TCH channel as soon as it is available.
- the alternation in progress can start on any time interval T between two consecutive time intervals S.
- the data unit at the output of a speech coder from the transmitting terminal is a speech frame, and corresponds to a data packet of determined size.
- M the size (in number of bits) of a frame or speech packet, that is to say the number of bits of a speech packet.
- M 88.
- N the length (in number of bits) of the cryptographic sequence SCj.
- N is an integer multiple of M.
- P there is an integer P such that:
- N PxM (4)
- each cryptographic sequence SCj is combined bit by bit in the OR-Exclusive operator (we sometimes say "XORE") with P speech frames successively delivered by the speech coder.
- a new cryptographic sequence SCj is therefore generated once all the P speech frames.
- the PxM bits of P consecutive speech frames can be encapsulated in exactly eight radio time intervals.
- the bit rate on the radio channel is equal to
- a time interval comprises, in this order:
- a time interval successively comprises:
- a time interval comprises, in this order:
- FIG. 4 A block diagram of a mobile terminal according to the invention is shown in Figure 4.
- the antenna 40 of the terminal is connected to its radio stage 41 corresponding to the analog part of the terminal.
- the baseband signal delivered by the radio stage 41 is supplied to a synchronization unit 42 and to a demodulator 43.
- the unit 42 searches for synchronization patterns in the received signal. It performs the time synchronization function of the terminal.
- the demodulator 43 which is synchronized by the unit 42, estimates the symbols transmitted from the baseband signal, and supplies these estimated symbols to a circuit 44 for processing the received signal.
- a circuit 45 for processing the signal to be transmitted delivers symbols to be transmitted which are modulated by a modulator 46.
- the latter delivers the symbols modulated on the radio stage 41.
- a frame generator 47 which is synchronized by the unit 42, controls the radio stage 41, the demodulator 43 and the modulator 46 to place the terminal in reception or transmission mode in the appropriate time intervals according to the structure of radiocommunication system frame.
- the terminal is alternately in transmission mode and in reception mode, changing every 20 ms.
- the frame generator 47 also ensures the sequencing of the circuit 44 for processing the received signal, and that of the circuit 45 for processing the signal to be transmitted.
- FIG. 4 illustrates in each of the blocks 44 and 45, circuits 51 and 52 respectively, and 53 and 54 for processing the logical channels, respectively for traffic and signaling, which have been mentioned above with reference to FIG. 2.
- a first channel A of a two-way switch 61 receives sequences successive clear data mj, which are delivered by a speech coder 62 from the analog signal produced by a microphone 63 when a PTT (“Push-To-Talk”) button on the terminal is activated by the user.
- the output of switch 61 is connected to a first input of an Exclusive OR operator 56 for the encryption of the sequence mj.
- a second operator input 56 receives a cryptographic sequence SCj generated by a cryptographic sequence generator 58, through a shift register 57.
- the sequence SCj is generated by the generator 58 from a determined secret encryption key K , on the one hand, and of the current value IVj of an initialization vector, on the other hand.
- a cryptographic synchronization control unit 55 delivers the current value IVj of the initialization vector to the generator 58.
- the initialization vector IVj varies over time and changes value
- the value of the vector IVj depends on the value of the time slot counter in the cell of the sending terminal.
- any other law of evolution of the value of the vector IVj is possible, as soon as this law is deterministic in order to be able to be followed in parallel by the transmitting terminal and the receiving terminal or terminals.
- the encryption key K is constant for a determined communication. It is generated during communication establishment by an appropriate encryption key choice algorithm. If necessary, an index defining this key can be transmitted in the call set-up signaling or be transmitted in the initial signaling sequence of the alternation, then then in the associated signaling channel for the late entry function. .
- the output of the operator 56 delivers a sequence of encrypted data q which is delivered to the circuit 53 of the processing circuit 45 through a first channel A of a second two-way switch 64.
- Cryptographic synchronization information CSIj is delivered by the unit 55 to the processing circuit 45 of the data to be transmitted.
- This cryptographic synchronization information is derived from the value of the initialization vector IVj used for the generation of the sequence SCj having served for the encryption of the sequence q. It is transmitted, under the control of the frame generator 47, in at least one traffic time interval T at the start of the half-day, coming into the frame structure immediately before the time interval in which the first sequence of encrypted data q with i ⁇ O is transmitted (initial synchronization). For this emission "in the band", it is the circuit 53 which is active.
- the information CSIj is also repeated, with a determined periodicity (which may be variable during the duration of the call), in determined time intervals S of the associated signaling channel, for the following encrypted data sequences, c ' that is to say the sequences q with i different from 0 (periodic synchronization).
- circuit 54 is active.
- information ⁇ 1j of cryptographic synchronization delay is also delivered by the unit 55 to the processing circuit 45. It relates to the time difference between the start of the transmission of the encrypted data packets of the sequence q other than the first, on the one hand, and the transmission of the periodic cryptographic synchronization information CSIj (for i different from 0), on the other hand.
- the information ⁇ 1j is preferably expressed in number of time intervals, since it is then coded by only three bits (taking values from 0 to 7). However, this is not mandatory. It can also be expressed as the number of speech packets. It is transmitted in a time interval S of the associated signaling channel (preferably the same as that in which the periodic synchronization information CSIj is transmitted, because it is simpler, but it can also be a different time interval S).
- the circuit 51 of the received signal processing circuit 44 delivers sequences of encrypted data q which are transmitted on a second channel B switch 61.
- the circuit 51 delivers to the unit 55 the cryptographic synchronization information CSIj received in the traffic channel TCH.
- circuit 52 of circuit 44 which, for at least certain sequences q, delivers to unit 55 the information CSIj as well as the information ⁇ 1 j, these being received in the associated signaling channel
- the Exclusive OR operator 56 receives the sequence q through said channel B of the switch 61 and ensures decryption of it in a dual manner from that for which it provides encryption when the terminal is transmitting.
- the output of the operator 56 then delivers a clear data sequence mj which is delivered to a channel decoder 65 through a second channel B of the switch 64.
- the decoder 65 delivers, from the sequence mj, an analog signal which is restored in audible form to the user via a loudspeaker 66.
- a value IVj of the initialization vector is delivered by the unit 55 to the generator 58 for each sequence q to be deciphered.
- the value of the initialization vector IVj can be derived from the value of the cryptographic synchronization information CSIj received.
- the appropriate value CSIj is received only in at least some of the time slots S of the SACCH channel, that is to say for some only of the encrypted data sequences to be decrypted. Other sequences of encrypted data q are received, for which the corresponding cryptographic synchronization information CSIj is not received.
- the cryptographic synchronization information CSIj (for i different from 0) is received in a time interval S of the channel SACCH, it is delivered to the unit 55 by the circuit 52.
- the information IVj is derived from it by the unit 55 and it is then delivered by the unit 55 to the generator 58.
- the circuit 52 then delivers to the unit 55 also the above-mentioned information ⁇ 1 j.
- a module 68 for shifting the unit 55 then generates information ⁇ 2j from the information ⁇ 1j.
- This information is used to offset the cryptographic sequence SCj in order to take account of the time difference between the start of the transmission of the encrypted data packets of the sequence q other than the first, on the one hand, and the transmission of the periodic cryptographic synchronization information CSIj se relating to the sequence q, on the other hand.
- the information ⁇ 2j is expressed in number of bits to be shifted.
- the offset is effected by controlling the shift register 57 appropriately, in a manner which is within the reach of those skilled in the art.
- the information IVj is generated by a module 67 of unit 55, said module of
- freewheeling starting from the knowledge of the last value IVj derived from a value SCIj received, on the one hand, and from the law of evolution of the value IVj, on the other hand.
- Such a module implements a reversible algorithm, known as the "freewheeling" algorithm, which is known per se.
- reversible is meant that it can turn in one direction or the other, each time giving an output value obtained deterministically from the input value. Consequently, if it is applied a first time in a determined direction to a determined input value, then a second time in the opposite direction to the output value obtained previously, one must find said determined input value.
- FIG. 5 shows an example of a sequence of steps for the transmission of an encrypted data sequence determined according to the transmission method of the invention. This method is implemented in a mobile terminal when it is transmitting in a communication (that is to say the terminal which has the alternation in progress).
- the unit 55 generates the current value of the initialization vector IVj, according to a deterministic evolution law.
- the current value IVj is a function of the value of the time slot counter in the cell where the transmitting terminal is located.
- the value of the time interval counter is maintained by the network infrastructure for each cell. It is known to each mobile terminal which is in communication in this cell. The purpose of this counter is to allow radio synchronization of the terminals with the cell base station.
- the different cells are synchronized, from a radio point of view, in a manner which is not very precise with one another, for example with the precision provided by NTP (from the English "Network Time Protocol").
- NTP from the English "Network Time Protocol”
- the values of the time interval counters in the different cells can therefore be different, but the difference between these values is small and can be limited a priori.
- unit 55 of the transmitting terminal At the start of the half-day, unit 55 of the transmitting terminal generates a random value coded on Q1 bits, where Q1 is a determined integer. This value is kept in memory for the duration of the work-study program.
- each value of the initialization vector IVj results from the binary concatenation of the Q1 bits of this random value and of a determined number Q2 + Q3 of bits of the current value of the time interval counter, where Q2 and Q3 are determined whole numbers.
- the Q1 bits of the random value form the most significant Q1 bits or MSB (of the English "Most Significant Bits") of IVj
- the least significant Q3 bits or LSB of the value of the time interval counter form the Q3 LSB of IVj
- the Q2 MSB of the value of the interval counter of IVj times form Q2 intermediate bits of IVj.
- the unit 55 also generates the cryptographic synchronization information CSIj, at least when this information can or must be transmitted.
- the value CSIj is derived from the value IVj.
- the Q1 bits of the random value form the Q1 MSB of CSIj
- the Q3 LSB of the value of the time slot counter form the Q3 LSB of CSIj, so that CSIj is coded on a number
- the at least approximate synchronization of the time interval counters of each of the cells of the transmitting terminal and of the receiving terminal makes it possible in fact to transmit to the receiving terminal only the Q3 LSBs of the value of the counter of the cell of the transmitting terminal (in more than the random value encoded on Q1 bits, of course). Indeed, the receiving terminal which is in any cell of the system can then reconstruct the entire value of the time slot counter of the cell of the sending terminal from the value of the time slot counter in its own cell (from which it will take Q2 MSBs, to the nearest unit if necessary) on the one hand, and Q3 LSBs received on the other hand.
- the advantage presented by this method is that the variability introduced by the time interval counter is added to the variability of the random value generated by the transmitting terminal. This in fact increases the degree of security without increasing the size of the random value to be generated. In addition, this method guarantees total protection against replay. As a variant, it is possible to transmit in the information SCIj the difference between the values of the time interval counters in the respective cells of the transmitting terminal and of the receiving terminal, instead of transmitting the LSBs of the value of the interval counter of time in the cell of the sending terminal.
- the law of evolution of the initialization vector IVj is deterministic in the sense that, knowing a value of the vector at an instant given, its value IVj can be deduced at a later time (with j> i), depending on the evolution of the value of the time interval counter in the cell of the transmitting terminal. It will also be noted that the initial random value must be transmitted each time in the value CSIj in order to allow late entry of other terminals.
- the generator 58 produces the current cryptographic sequence SCj in a step 72, according to the relationship already given above: where EK designates the encryption of the information IVj with the key K, according to a determined encryption algorithm which is the same for all the mobile terminals of the system, and which, of course, is the same whether the terminal is transmitter or receiver .
- the sequence SCj is stored in the register 57 as it is generated.
- the operator 56 performs the bitwise OR-Exclusive operation between the N bits of the sequence SCj and an identical number PxM of bits originating from P speech packets consecutive forming a clear data sequence mj of PxM bits (these PxM bits being stored in an appropriate shift register, not shown).
- the time interval 2 (see FIG. 2) of a given TDMA frame carries the request for half-time (start of transmission by the sending terminal).
- the initial cryptographic synchronization information CSIg is then transmitted, in a step 74, in one or more of the time intervals T following, for example the two time intervals 3 and 4, being repeated several times (for example as many times as its length allows, taking into account the signaling bits to be transmitted in addition to the useful bits, knowing that an interval of time of 20 ms can contain a maximum of 320 bits with a bit rate of 16 Kbits / s).
- the sequence of data encrypted in. is then transmitted, in a step 75, from the next time interval T, here the time interval 5.
- This time interval contains the first two speech frames, as well as a quarter of the speech frame next (see table in Figure 3b).
- the first speech frame is preferably inserted in this time interval determined from the first time position such that the first speech frame will be transmitted completely in this time interval (reference is made to the diagram and to the table in FIGS. 3a and 3b, respectively). In this way, it is ensured that the speech information transmitted up to the next signaling time interval S always corresponds to an integer number of speech frames. This simplifies the determination of the information ⁇ 2j for the periodic synchronization (see below).
- the speech transmission is therefore preceded by a transmission in the band of the initial cryptographic synchronization information.
- This transmission does not generally cause any deterioration in the quality of the speech, since it occurs during a period of time used for the calculation by the speech coder of the first speech frames to be transmitted.
- the cryptographic sequences SCj and therefore the encrypted data sequences q preferably have a length in bits equal to the duration separating two time intervals S devoted to signaling (taking account of the useful bit rate on the channel) .
- the position of the sequences q is fixed by relation to time intervals S during a given alternation. But this position varies from one alternate to another.
- the sequences c go from time interval 5 to time interval 13, from time interval 14 to time interval 22, etc.
- the value CSIj is also transmitted, in a step 77, within a determined time interval S of the associated signaling channel SACCH.
- the information ⁇ 1j is also transmitted in a time interval S of the SACCH channel, preferably the same as that in which the information CSIj is transmitted. In this way, the information ⁇ 1j is received by the receiver substantially at the same time as the information CSIj. This simplifies the processing by the receiving terminal, and guarantees a minimal delay during the late entry of a new receiving terminal into the communication, since all the information it needs to decrypt the sequence q reaches it in a period of time. as small as possible.
- FIG. 8 is a diagram which illustrates the transmission, in a determined superframe, of the first four sequences of data encrypted in-at 03, of a determined half-wave, by a determined transmitting terminal, in accordance with the example envisaged in this who is before.
- the spreading of the encrypted data of each sequence in the superframe is symbolized by respective horizontal arrows, which are in solid line opposite the time intervals of the traffic channel in which data is transmitted, and in broken line otherwise.
- the following are transmitted on the uplink: the work-study request in the time interval 2; the initial synchronization information CSIQ in the time intervals 3 and 4; the sequences CQ, C-], 02 and C3 from, respectively, time intervals 5, 14, 23, and 32; the periodic synchronization information CSI-j and the information relating to the corresponding time offset ⁇ 1 ⁇ in the signaling time interval 18; as well as the periodic synchronization information CSI3 and the information relating to the corresponding time offset ⁇ I3 in the signaling time interval 36.
- the information ⁇ 1I and ⁇ I3 are equal to 4.
- the transmission of the sequence C3 continues in the following superframe (not shown).
- FIG. 9 illustrates the reception of the same sequences of encrypted data crj, c-], C and 03 by the receiving terminal in a determined superframe.
- the encapsulation of the data in the super-frame considered is managed by the base station. Given the difference in radio synchronization between the cell of the transmitting terminal and that of the receiving terminal, it may happen, as is the case in the example shown, that there is a shift in time interval numbers between the data received by the base station of the cell of the transmitting terminal and that transmitted by the base station of the cell of the receiving terminal.
- the alternation request (granted) from the transmitter is received in the receiver cell in the time interval 3.
- the information CSIrj is received in the time intervals 4 and
- the crj sequences . cj, C2 and C3 are received from time intervals 6, 15, 24, and 33 respectively.
- the periodic synchronization information CSIi and the information relating to the corresponding time offset ⁇ 1I are always received in the signaling time interval 18.
- the periodic synchronization information CSI3 and the information relating to the corresponding time offset ⁇ I3 are always received in the signaling time interval 36. This is why the value of the information ⁇ 1-
- the receiving terminal receives a sequence of encrypted data q in the traffic channel, from a determined time interval T, in a determined superframe.
- This sequence is delivered by the circuit 51 of the circuit 44 for processing the data received. If the sequence q is received from one of the time intervals 1, 10 19 and 29, that is to say the first time interval of one of the four frames of said determined superframe, one then wonders, in a step 82, if the synchronization information CSIj (and therefore also the information ⁇ 1j) has been received in the preceding signaling time interval S, namely, respectively the time interval 36 of the preceding super-frame , interval 9, interval 18 or interval 27.
- step 82 one wonders whether one has received the synchronization information CSIj (and therefore also the information ⁇ 1J) in the following signaling time interval S, namely one of the intervals 9, 18, 27, and 36.
- the unit 55 If the answer to the question of the test 82 is yes, then, in a step 83, the unit 55 generates the current value IVj of the initialization vector from the value of the information CSIj received. For this, we consider the Q3 LSB and the Q1 MSB of the value CSIj received, which respectively form the Q3 LSB and the
- the current value IVj is generated by the "freewheeling" module 67 of the unit 55. It will be noted that in reality the value ⁇ 1j is constant for the whole duration of the alternation in progress, so that the terminal which is party to the communication can keep in memory the value received initially, it that is to say at the start of the alternation, and disregard the values subsequently received during the same alternation.
- step 84 above is only possible for a receiving terminal which is already part of the communication, and not for a receiving terminal in late entry phase. Such a terminal will have to wait for the actual reception of the CSIj information (and therefore also the information
- a step 85 the generator 58 then generates the cryptographic sequence SCj from the current value of the initialization vector IVj produced in step 83 or in step 84, according to the relation (1) given in the introduction.
- the unit 55 generates the information ⁇ 2j from the current information ⁇ 1j. It will be noted that, as for the information ⁇ 1j (see paragraph above), the value of the information ⁇ 2j is constant for the entire duration of the alternation in progress. Step 85 can therefore be executed by a receiving terminal only once at the start of the half-day internship, or at the time of late entry into the call, as the case may be. Then the value ⁇ 2j can be kept in memory until the start of the next alternation.
- the generation of the ⁇ 2j information from the ⁇ 1j information amounts to converting the ⁇ 1j information expressed in number of time intervals into corresponding ⁇ 2j information expressed in number of speech packets.
- This conversion can be carried out using a table of values stored in memory, which is illustrated by the table in FIG. 11. This table can be understood by considering the diagram and the table in Figures 3a and 3b respectively.
- the Exclusive-OR operator 56 restores the clear data sequence mj from the encrypted data sequence q and the cryptographic sequence SCj, according to the relation (3) given in the introduction, and according to in addition to the information ⁇ 2j. More precisely, the sequence SCj is combined with the sequence q after shifting its bits to the right of a
- a technique according to the conventional prior art would consist in providing the MTR terminal, in the cell change command transmitted on the associated signaling channel, only purely radio information allowing it to synchronize from a radio point of view on the desired channel in cell B.
- the terminal should wait for reception of the cryptographic synchronization information transmitted by the technique described above for perform cryptographic synchronization. Until the reception of this information, the MTR terminal could not decrypt the data received, so that the communication would be cut, even though the "handover" has already been successfully completed. This technique therefore results in late cryptographic synchronization, due to this waiting for the cryptographic synchronization information on the traffic channel in the target cell, and therefore in a break in communication much longer than that due to the "handover" proper.
- the time slot counters in the source cell and in the target cell are again used to solve this problem.
- the time interval counter takes into account the elementary time intervals, and not the composite time intervals of the frame structure. Consequently, the number of time intervals referred to here is, unless otherwise stated, to be considered with reference to the number of elementary time intervals, that is to say taking into account the time intervals at the same time on the uplink and on the downlink.
- the length of a TDMA frame thus corresponds to 72 units (36 ⁇ 2) of the time interval counter of the cell considered.
- the BTSA base station provides the MTR terminal in the cell change command transmitted on the associated signaling channel of cell A, in addition to the radioelectric information which enables it to synchronize on the desired channel in the cell B, information relating to the cryptographic synchronization offset between the source cell and the target cell, which is obtained in the manner which will now be explained.
- This information is expressed as the difference ⁇ QPT between the respective time interval counters of the source cell and the target cell.
- the BTSB base station of cell B begins to receive from the network, during a transitional phase of the cell change procedure, encrypted voice packets which are intended to be transmitted on the downlink of the channel which will carry the communication in cell B between itself and the MTR terminal (hereinafter target channel).
- These voice packets carry a time stamp inserted by the network to allow verification of correct sequencing and absence of loss. It is necessary in This is due to the fact that the time for transferring voice packets across the network can vary from one packet to another, and that in addition some packets can be lost during transmission across the network. This time stamp is naturally synchronized with the value of the time interval counter in cell A.
- the BTSB station then retransmits to the BTSA base station of cell A information composed of the value of the time interval counter in cell B corresponding to the transmission on the target channel of a determined speech packet, having been received from the network, on the one hand, and the corresponding time stamp carried by said received speech packet, on the other hand.
- the base station BTSA of the source cell can easily calculate the cryptographic synchronization offset between the two base stations by comparing the value received with the value CAj of its own time slot counter corresponding to the transmission time interval of the speech packet considered (that is to say corresponding to a given time stamp). It then transmits cryptographic synchronization offset information to the terminal MTR in the cell change command.
- a possible convention is to transmit the difference ⁇ CPT between the values CBj and CAj, respectively of the time slot number counter in the target cell B and of the time slot number counter in the source cell A, corresponding for example at the start of the same cryptographic sequence, that is to say at the time interval S within which a cryptographic synchronization information CSIj has been or could have been transmitted there.
- This difference ⁇ CPT is easy to obtain as a function of the information transmitted by the base station BTSB of the target cell to the base station BTSA of the source cell as indicated above.
- the cell change command is transmitted during the signaling time interval for which the time interval counter in the source cell A is CAj, corresponding to the time interval inside from which the cryptographic synchronization information would have been transmitted CSIj for a determined cryptographic sequence SCj
- the value of the cryptographic synchronization offset information ⁇ CPT transmitted with the cell change command is then equal to CBj-CAj, where CBj is the value of the time slot counter in the target cell B at the start of the same cryptographic sequence SCj.
- the terminal MTR knows, by scanning the neighboring cells and in particular of the target cell B, the value of the time slot counter in each of these cells. It is then able to determine, thanks to the use of the "freewheeling" algorithm, the value of the cryptographic synchronization information CSj to be used for the decryption of a sequence of encrypted data q received via the target channel (Le., The channel allocated to communication in cell B), and the time position at the start of the cryptographic sequence to which this value corresponds (and which is normally determined by the information which is noted ⁇ 1j in the above) .
- FIG. 13 illustrates a sequence of steps of an algorithm making it possible to maintain the cryptographic synchronization for the MTR terminal between cells A and B.
- the terminal MTR receives, in a step 91, cryptographic synchronization offset information ⁇ CPT, relating to the cryptographic synchronization offset between the source cell A and the target cell B.
- This information ⁇ CPT is calculated by the cell A BTSA base station as mentioned above.
- the ⁇ CPT information is transmitted by the base station BTSA to the terminal MTR with the cell change command in a time interval S determined on the transmission channel allocated to the communication in cell A.
- the terminal MTR stores the value of a first determined cryptographic synchronization information CSIj, which can quite simply be the current value of the cryptographic synchronization information at the time when the cell change command is received.
- the terminal MTR performs the cell change. Consequently, it passes from the transmission channel allocated to communication in cell A to the transmission channel allocated to communication in cell B.
- a step 94 it receives a sequence of encrypted data packets here determined, within a time interval T determined on the transmission channel allocated to the communication in cell B. This is the first sequence of encrypted data packets it receives after it is transferred to cell B.
- the terminal MTR also receives the value of the cryptographic synchronization information CSIj to be used for the decryption of the sequence q (and therefore, also the value of the corresponding associated cryptographic synchronization delay information ⁇ 1j), then, in a step 95, it performs the decryption of the sequence Cj from the values
- the terminal MTR determines, in a step 96, the value CS as well as the value ⁇ 1j, from the value CBj of the time slot counter in the source cell and from the value of the cryptographic synchronization information CSIj, which it memorized in step 92, and also from the value CBj of the time slot counter corresponding to the time slot S in which the cryptographic synchronization information CSIj could have been received on the transmission channel allocated to the communication in cell B.
- the terminal then performs the Euclidean division of ⁇ CPT 'by the number 2xP of (elementary) time intervals separating two signaling time intervals S in the frame structure, and which also corresponds to the length of a cryptographic sequence.
- 2xP is equal to 72.
- the divider is called ⁇ s and the rest is called ⁇ in the following.
- the remainder ⁇ rr (counted in elementary time intervals) is divided by two to obtain the offset in composite time intervals corresponding to the number of (elementary) time intervals on the only downlink of the transmission channel (in the case of a TDMA system of order 2 corresponding to the example considered here).
- This value ⁇ / 2 is the value of the cryptographic synchronization delay information ⁇ 1j corresponding to the cryptographic sequence SCj.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2003273459A AU2003273459A1 (en) | 2002-07-30 | 2003-07-21 | Method for transmitting encrypted data, associated decrypting method, device for carrying out said methods and a mobile terminal for the incorporation thereof |
CA2493882A CA2493882C (fr) | 2002-07-30 | 2003-07-21 | Procede de transmission de donnees chiffrees, procede de dechiffrement associe, dispositifs pour leur mise en oeuvre, et terminal mobile les incorporant |
US10/491,637 US7620184B2 (en) | 2002-07-30 | 2003-07-21 | Method for transmitting encrypted data, associated decrypting method, device for carrying out said methods and a mobile terminal for the incorporation thereof |
ES03755619T ES2401844T3 (es) | 2002-07-30 | 2003-07-21 | Procedimiento de transmisión de datos cifrados, procedimiento de descifrado asociado, dispositivos para su puesta en práctica y terminal móvil que los incorpora |
EP03755619A EP1525707B1 (fr) | 2002-07-30 | 2003-07-21 | Procede de transmission de donnees chiffrees, procede de dechiffrement associe, dispositifs pour leur mise en oeuvre, et terminal mobile les incorporant |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR02/09668 | 2002-07-30 | ||
FR0209668A FR2843258B1 (fr) | 2002-07-30 | 2002-07-30 | Procede de transmission de donnees chiffrees, procede de dechiffrement associe, dispositifs pour leur mise en oeuvre, et terminal mobile les incorporant. |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2004014019A1 true WO2004014019A1 (fr) | 2004-02-12 |
Family
ID=30129539
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/FR2003/002302 WO2004014019A1 (fr) | 2002-07-30 | 2003-07-21 | Procede de transmission de donnees chiffrees, procede de dechiffrement associe, dispositifs pour leur mise en oeuvre, et terminal mobile les incorporant |
Country Status (7)
Country | Link |
---|---|
US (1) | US7620184B2 (fr) |
EP (1) | EP1525707B1 (fr) |
AU (1) | AU2003273459A1 (fr) |
CA (1) | CA2493882C (fr) |
ES (1) | ES2401844T3 (fr) |
FR (1) | FR2843258B1 (fr) |
WO (1) | WO2004014019A1 (fr) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2898229A1 (fr) * | 2006-03-06 | 2007-09-07 | Eads Secure Networks Soc Par A | Synchronisation cryptographique entrelacee |
Families Citing this family (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7602908B2 (en) * | 2003-12-22 | 2009-10-13 | Aol Llc | System and method for using a streaming protocol |
WO2005086802A2 (fr) | 2004-03-08 | 2005-09-22 | Proxense, Llc | Systeme de compte lie utilisant une cle numerique personnelle |
EP1610490A1 (fr) | 2004-06-21 | 2005-12-28 | France Telecom | Procédé et dispositif de chiffrement ou déchiffrement de données |
US20060031873A1 (en) * | 2004-08-09 | 2006-02-09 | Comcast Cable Holdings, Llc | System and method for reduced hierarchy key management |
US8352730B2 (en) | 2004-12-20 | 2013-01-08 | Proxense, Llc | Biometric personal data key (PDK) authentication |
US20060133309A1 (en) * | 2004-12-21 | 2006-06-22 | Mathis James E | Methods for synchronization of communications between a circuit switched network and a packet data network |
KR100768509B1 (ko) * | 2005-03-10 | 2007-10-18 | 한국전자통신연구원 | 무선 휴대 인터넷 시스템의 암호화 및 복호화 장치, 그리고그 방법 |
US8219129B2 (en) * | 2006-01-06 | 2012-07-10 | Proxense, Llc | Dynamic real-time tiered client access |
US11206664B2 (en) | 2006-01-06 | 2021-12-21 | Proxense, Llc | Wireless network synchronization of cells and client devices on a network |
US8412949B2 (en) | 2006-05-05 | 2013-04-02 | Proxense, Llc | Personal digital key initialization and registration for secure transactions |
US9269221B2 (en) | 2006-11-13 | 2016-02-23 | John J. Gobbi | Configuration of interfaces for a location detection system and application |
US8243659B2 (en) * | 2007-03-15 | 2012-08-14 | Nokia Corporation | DVB low bit rate services |
CN101325684B (zh) * | 2007-06-14 | 2010-10-06 | 中兴通讯股份有限公司 | 基于移动多媒体广播的加密控制信息传输方法及系统 |
WO2009062194A1 (fr) | 2007-11-09 | 2009-05-14 | Proxense, Llc | Capteur de proximité de support de services d'applications multiples |
US8171528B1 (en) | 2007-12-06 | 2012-05-01 | Proxense, Llc | Hybrid device having a personal digital key and receiver-decoder circuit and methods of use |
US9251332B2 (en) | 2007-12-19 | 2016-02-02 | Proxense, Llc | Security system and method for controlling access to computing resources |
US8230462B2 (en) * | 2008-01-23 | 2012-07-24 | Newport Media, Inc. | Fast channel switching for encrypted mobile multimedia multicast system |
US8508336B2 (en) | 2008-02-14 | 2013-08-13 | Proxense, Llc | Proximity-based healthcare management system with automatic access to private information |
US11120449B2 (en) | 2008-04-08 | 2021-09-14 | Proxense, Llc | Automated service-based order processing |
CN102625302B (zh) * | 2008-06-23 | 2016-03-30 | 华为技术有限公司 | 密钥衍生方法、设备及系统 |
MY152148A (en) * | 2008-11-14 | 2014-08-15 | Mimos Berhad | Method and system for synchronization of cryptographic devices for gsm voice channel encryption |
FR2941584B1 (fr) * | 2009-01-27 | 2011-04-01 | St Nxp Wireless France | Procede de traitement de flux de donnees recues par un appareil de communication sans fil et necessitant au moins en partie des traitements cryptographiques et appareil correspondant |
FR2941583A1 (fr) * | 2009-01-27 | 2010-07-30 | St Nxp Wireless France | Procede de dechiffrage d'un paquet chiffre au sein d'un appareil de communication sans fil, et appareil correspondant |
CN101932007B (zh) * | 2009-06-22 | 2014-02-26 | 中兴通讯股份有限公司 | 一种实现移动终端业务流传输的方法及无线中继系统 |
US9125149B2 (en) | 2009-09-30 | 2015-09-01 | Qualcomm Incorporated | Method and apparatus for enhancement of synchronization for TD-SCDMA baton handover |
FR2954643B1 (fr) * | 2009-12-22 | 2012-06-01 | Eads Defence & Security Sys | Synchronisation d'equipements terminaux d'un systeme de communication |
US9418205B2 (en) | 2010-03-15 | 2016-08-16 | Proxense, Llc | Proximity-based system for automatic application or data access and item tracking |
US20120281832A1 (en) * | 2010-04-01 | 2012-11-08 | University Of Mississippi | Secure wireless communication transceiver |
US8918854B1 (en) | 2010-07-15 | 2014-12-23 | Proxense, Llc | Proximity-based system for automatic application initialization |
WO2012106466A2 (fr) * | 2011-02-01 | 2012-08-09 | Lacson Francis Gerard | Procédé de cryptage de données |
US9265450B1 (en) | 2011-02-21 | 2016-02-23 | Proxense, Llc | Proximity-based system for object tracking and automatic application initialization |
KR20120116137A (ko) * | 2011-04-12 | 2012-10-22 | 한국전자통신연구원 | 음성 통신 장치 및 그 방법 |
KR20140123723A (ko) * | 2013-04-15 | 2014-10-23 | 한국전자통신연구원 | 충돌방지 알고리즘을 이용한 rf아이디 시스템에서 키 설립 방법 |
US9405898B2 (en) | 2013-05-10 | 2016-08-02 | Proxense, Llc | Secure element as a digital pocket |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0446194A1 (fr) | 1990-03-07 | 1991-09-11 | Telefonaktiebolaget L M Ericsson | Synchronisation continue des dispositifs de chiffrage dans un système cellulaire de communication |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4757536A (en) | 1984-10-17 | 1988-07-12 | General Electric Company | Method and apparatus for transceiving cryptographically encoded digital data |
SE465797B (sv) * | 1990-03-07 | 1991-10-28 | Ericsson Telefon Ab L M | Foerfarande att oeverfoera synkroniseringsinformation vid krypterad oeverfoering i ett mobilradiosystem |
US5159593A (en) * | 1990-07-02 | 1992-10-27 | Motorola, Inc. | Channel acquistion and handoff method and apparatus for a TDMA communication system |
US5708710A (en) * | 1995-06-23 | 1998-01-13 | Motorola, Inc. | Method and apparatus for authentication in a communication system |
US5719937A (en) * | 1995-12-06 | 1998-02-17 | Solana Technology Develpment Corporation | Multi-media copy management system |
FI20002608A (fi) | 2000-11-28 | 2002-05-29 | Nokia Corp | Päästä-päähän -tahdistksen ylläpitäminen tietoliikeneyhteydellä |
-
2002
- 2002-07-30 FR FR0209668A patent/FR2843258B1/fr not_active Expired - Fee Related
-
2003
- 2003-07-21 CA CA2493882A patent/CA2493882C/fr not_active Expired - Fee Related
- 2003-07-21 ES ES03755619T patent/ES2401844T3/es not_active Expired - Lifetime
- 2003-07-21 AU AU2003273459A patent/AU2003273459A1/en not_active Abandoned
- 2003-07-21 EP EP03755619A patent/EP1525707B1/fr not_active Expired - Lifetime
- 2003-07-21 WO PCT/FR2003/002302 patent/WO2004014019A1/fr not_active Application Discontinuation
- 2003-07-21 US US10/491,637 patent/US7620184B2/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0446194A1 (fr) | 1990-03-07 | 1991-09-11 | Telefonaktiebolaget L M Ericsson | Synchronisation continue des dispositifs de chiffrage dans un système cellulaire de communication |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2898229A1 (fr) * | 2006-03-06 | 2007-09-07 | Eads Secure Networks Soc Par A | Synchronisation cryptographique entrelacee |
WO2007101956A1 (fr) * | 2006-03-06 | 2007-09-13 | Eads Secure Networks | Synchronisation cryptographique entrelacee |
US8306069B2 (en) | 2006-03-06 | 2012-11-06 | Eads Secure Networks | Interleaved cryptographic synchronization |
Also Published As
Publication number | Publication date |
---|---|
FR2843258A1 (fr) | 2004-02-06 |
CA2493882A1 (fr) | 2004-02-12 |
US20050013277A1 (en) | 2005-01-20 |
EP1525707B1 (fr) | 2012-10-03 |
AU2003273459A1 (en) | 2004-02-23 |
CA2493882C (fr) | 2014-12-23 |
EP1525707A1 (fr) | 2005-04-27 |
US7620184B2 (en) | 2009-11-17 |
FR2843258B1 (fr) | 2004-10-15 |
ES2401844T3 (es) | 2013-04-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1525707B1 (fr) | Procede de transmission de donnees chiffrees, procede de dechiffrement associe, dispositifs pour leur mise en oeuvre, et terminal mobile les incorporant | |
EP1158828B1 (fr) | Procédé de controle de transfert d'un canal dans un réseau de radiocommunication cellulaire | |
EP1158827B1 (fr) | Procédé de controle de transfert d'un canal dans un réseau de radiocommunication cellulaire | |
JP2656155B2 (ja) | ハンドオフ時における暗号化システムの再同期 | |
US7697687B2 (en) | Streaming implementation of AlphaEta physical layer encryption | |
FR2881590A1 (fr) | Procede de communication numerique par paquets a travers un canal de transmission partage par une pluralite d'utilisateurs | |
FR2750272A1 (fr) | Procede pour le chiffrement du transfert de donnees, et systeme de communication de donnees l'employant | |
EP1264494A1 (fr) | Procede d'emission de signaux radio, reseau d'acces et terminal de radiocommunication appliquant le procede | |
FR2798810A1 (fr) | Procede et systeme de telecommunication en mode paquets dans lequel plusieurs communications sont transferables d'un chemin vers un autre | |
WO2001056222A1 (fr) | Procede de communication avec sequestre et recuperation de cle de chiffrement | |
FR2892591A1 (fr) | Gestion des transferts intercellulaires dans les communications de groupe | |
FR2709388A1 (fr) | Procédé d'accès multiple par répartition en fréquences orthogonales, station centrale, station répartie, système et utilisation correspondants. | |
EP1992102B1 (fr) | Synchronisation cryptographique entrelacee | |
FR2652468A1 (fr) | Procede de synchronisation dans un systeme de radio mobile. | |
WO2000072472A1 (fr) | Procede de diffusion de signaux radio depuis une station de base de radiocommunication, stations de base et terminaux mobiles pour la mise en oeuvre d'un tel procede | |
FR2793988A1 (fr) | Procede de radiocommunication entre une station de base et des terminaux mobiles, stations de base et terminaux mobiles pour la mise en oeuvre d'un tel procede | |
FR2809905A1 (fr) | Procede de transfert avec traitement de signaux entre deux interfaces d'emission/reception distinctes | |
Velasco et al. | Secure Optical Communications Based on Fast Cryptography | |
Velasco Esteban et al. | Secure optical communications based on fast cryptography | |
FR3133506A1 (fr) | Procédé et dispositif de distribution de clés secrètes dans une constellation de satellite | |
WO2004102872A1 (fr) | Processeur et procede de synchronisation de chiffrement de bout-en-bout | |
WO2011083211A1 (fr) | Synchronisation de traitement de données utiles |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
WWE | Wipo information: entry into national phase |
Ref document number: 10491637 Country of ref document: US |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2003755619 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2493882 Country of ref document: CA |
|
WWP | Wipo information: published in national office |
Ref document number: 2003755619 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: JP |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: JP |