期刊文献+

Research on End-to-End Encryption of TETRA

Research on End-to-End Encryption of TETRA
原文传递
导出
摘要 The Terrestrial Trunked Radio(TETRA) system uses end-to-end encryption in addition to the air interface encryption to provide enhanced security. The TETRA system uses a synchronization technique known as frame stealing to provide synchronization of end-to-end encrypted data. However, the frame stealing process degrades the quality of video. This paper proposes an end-to-end encryption system with the frame stealing technique for voice and frame insertion for video. A block cipher in the output feedback mode is used to implement the end-to-end key stream generator. Moreover. In the Short Data Service(SDS) message encryption , a block cipher in the Cipher Block Chaining (CBC) mode is used to calculate the cryptographically secure checksum, which is sufficient to certify the integrity. The Terrestrial Trunked Radio(TETRA) system uses end-to-end encryption in addition to the air interface encryption to provide enhanced security. The TETRA system uses a synchronization technique known as frame stealing to provide synchronization of end-to-end encrypted data. However, the frame stealing process degrades the quality of video. This paper proposes an end-to-end encryption system with the frame stealing technique for voice and frame insertion for video. A block cipher in the output feedback mode is used to implement the end-to-end key stream generator. Moreover. In the Short Data Service(SDS) message encryption , a block cipher in the Cipher Block Chaining (CBC) mode is used to calculate the cryptographically secure checksum, which is sufficient to certify the integrity.
出处 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2006年第2期70-73,共4页 中国邮电高校学报(英文版)
基金 ThisprojectissupportedbyNationalNaturalScienceFoundationofChina(60372094).
关键词 TETRA end-to-end encryption CONFIDENTIALITY INTEGRITY TETRA end-to-end encryption confidentiality integrity
  • 相关文献

参考文献16

  • 1ETSI EN 300 392-1 V1.3.0,TETRA:teneral network design[EB/OL].2005-02-01.http:// www.etsi.org.
  • 2TETRA Security Mechanisms[EB/OL].2003-02-10.http:// www.tetramou.com/files/tetra_ security_ mechanisms.ppt.
  • 3Wireless Distributed Communication Systems[EB/OL].2004-05-10.http:// www2.rfsworld.com/RFS_ Edition3/pdfs/WDCS_ Introduction_ 525-527.pdf.
  • 4TETRA Security An overview[EB/OL].2003-08-01.http:// www.tetramou.com/resources/files/Tetra secR1.pdf.
  • 5SUI Ai-fen,WANG Jiao.Research and comparison of security mechanisms in GSM and IS-41[J].Journal of Chongqing Institute of Posts and Telecommunications (in Chinese),2004,16(1):66-69.
  • 6ETSI EN 300 175-7.V1.8.1,DECT Common Interface Security features[EB/OL].2004-11-10.http://www.etsi.org.
  • 7LIN H,LEIN HARN.Authentication in wireless communications[C] // Proceedings of IEEE Global Telecommunications Conference:Vol 1,Nov 29-Dec 2,1993,Houston,Tx,USA.Piscataway,NJ,USA:IEEE,1993:550-554.
  • 8ETSI EN 300 392-7.TETRA:Security aspects,Version 2.2.1[EB/OL].2004-09-01.http://www.etsi.org.
  • 9TETRA MoU SFPG Recommendation 02-End-to-End Encryption[EB/OL].2003-08-01.http:// www.tetramou.com/MoU.
  • 10ZHANG Zhi-hui,HU Bing,YANG Yi-xian.Research on encryption mechanism of TETRA[J].Communications Technology,2004(2):118-120.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部