The method to set up of chaotic secret phone and device thereof
One, technical field
The invention belongs to the chaotic secret communication technical field, relate to the secure communication and the code phone equipment of cable voice and data.
Two, background technology
The speech security method has multiple method, the simplest is Voice Conversion Techniques, another kind of secrecy technology is that voice are divided into a plurality of time periods, and transmit the phonetic element of these time periods with several different inversion frequencies, the length of used time period and the order of inversion frequency can decide by the prearranged coding card that inserts simultaneously in encoder and the decoder.The voice of each time period may be partitioned into a series of frequency range again, and to each section with a different audio conversion frequency, frequency division and audio tone inversion frequency can change at random.A kind of distributor of five frequency bands can and be transformed into 3840 kinds of forms with voice-scrambling, but wherein has only several forms that sufficient disguise can be provided, and is available.As treating frequency, the time period also can be upset.These encryption methods are called the frequency hopping coding.In addition, the upset table of sound frequency composition can change continuously according to the pseudo random sequence that produces synchronously in the transmitter and receiver, and the method is called rolling coding.But these are based on the processing method of analog signal, will inevitably bring the deficiencies such as poor signal quality that encryption strength is low, signal to noise ratio is low, recovery is come out.
What the speech security effect was best at present is digital-scrambling techniques.Earlier voice digitization is gone to encrypt with the high speed password machine again, what transmit in telephone line is the digital signal of encrypting, and the conversation of using tapping device to receive is a slice noise, is difficult to solve original voice.
Three, summary of the invention
The objective of the invention is to realize a kind of can the use, have simultaneously the confidential phone of the chaos speech secure communication function of digitized, high reliability, high encryption strength, high-speed encryption and decryption, hi-fi effect again as plain old telephone.The operator can assemble easily and use as plain old telephone.
Chaotic secret telephone set (as Fig. 1), when circuit diverter switch 13, when subject for ridicule input diverter switch 14 is on off state A, the external call link tester is crossed the line input mouth that circuit diverter switch 13 inserts ordinary telephone set support 15.Simultaneously, the subject for ridicule on the ordinary telephone set support 15 is imported/is gone out signal and is connected with ordinary telephone set subject for ridicule 16 through subject for ridicule input diverter switch 14.At this moment this chaotic secret telephone set works in the normal talking pattern, and duplex transmission is simulated audio signal on the outside line.
Under the normal talking pattern, the signal that transmits on telephone line modulator-demodulator (MODEM) 11, dual-tone multifrequency acceptance and demodulator circuit 18 and 10 pairs of outside lines of data flow chaos coding/decoding module circuit and the actuation of keys of ordinary telephone set support 15 are monitored in real time.
When circuit diverter switch 13, when microphone input diverter switch 14 is on off state B, the external call link tester is crossed telephone line modulator-demodulator (MODEM) 11 and is connected with the RS232 level shifting circuit 105 of data flow chaos coding/decoding module circuit 10 inside, and ordinary telephone set subject for ridicule 16 is connected with filter circuit 103 with filter circuit 101, audio frequency output power amplifier through the audio frequency input amplification of subject for ridicule input diverter switch 14 and data flow chaos coding/decoding module circuit 10 inside.At this moment this chaotic secret telephone set works in the secret telephony pattern, and duplex transmission is chaos encryption audio data stream signal on the outside line.
Under the secret telephony pattern, on-line direct current power supply 17 enters ordinary telephone set support 15 by online resistance 20, circuit diverter switch 13 and keeps its in-line power.
The conversion of normal and two kinds of patterns of secret telephony can be made up and realizes by pressing specific keys on the ordinary telephone set.Under the off-hook condition after keying in a specific key combination that enters secure communication on the ordinary telephone set support 15, dual-tone multifrequency is accepted with demodulator circuit 18 touch-tone signal of button to be demodulated to corresponding key assignments data and is sent into logical AND sequential control circuit 107 in the data flow chaos coding/decoding module circuit 10, send digital signal processor 108 again.Handle the control command that the back forms secure communication, control command one tunnel is sent logical sequence control circuit 107, and control circuit diverter switch 13 switches to state B with subject for ridicule input diverter switch 14, makes the calling party on-hook.Simultaneously telephone line modulator-demodulator (MODEM) 11 is sent into through serial ports control circuit 109, RS232 level shifting circuit 105 in another road of control command, makes it begin the opposing party's dial-up in secure communication and begins to set up data communication channel.At this moment this chaotic secret telephone set enters the secret telephony pattern.
Secure communication the opposing party's chaotic secret telephone set is receiving after specific keys that the other side transmits makes up pairing touch-tone signal, correspondingly with the above-mentioned action of calling party carries out corresponding switch change action, makes it enter the secret telephony pattern.The handshake procedure that its telephone line modulator-demodulator (MODEM) 11 responds the other side's calling and enters communication.
At this moment, the both sides in the communication all enter the data confidentiality talking state.LCDs in demonstration and the port control circuit (MCU) 12 demonstrates the information that enters secure communication mode.The either party of both call sides is after keying in a specific key combination that withdraws from secure communication on the ordinary telephone set support 15, dual-tone multifrequency is accepted with demodulator circuit 18 touch-tone signal of button to be demodulated to corresponding key assignments data and is sent into logical AND sequential control circuit 107 in the data flow chaos coding/decoding module circuit 10, send digital signal processor 108 again, handle back formation and withdraw from the control command that secure communication enters proper communication.Control command one tunnel is sent logical sequence control circuit 107, and switches to state A by logical sequence control circuit 107 control circuit diverter switches 13 and subject for ridicule input diverter switch 14, makes ordinary telephone set support 15 recover online; Another road control command is sent into telephone line modulator-demodulator (MODEM) 11 through serial ports control circuit 109, RS232 level shifting circuit 105, makes it finish work at present state and hanging wire.At this moment this chaotic secret telephone set returns to normal call mode.
No matter the opposing party in the conversation withdraws from after keying in the key combination that withdraws from secure communication on the ordinary telephone set support 15, still all can withdraw from the secure communication state after its telephone line modulator-demodulator (MODEM) 11 receives the other side's hanging wire signal and reenter normal call mode, ordinary telephone set support 15 recovers online.
The first step after entering secure communication mode will be carried out the authentication of both call sides identity information.After entering secure communication mode, LCDs in both sides' demonstration and the port control circuit (MCU) 12 demonstrates the prompting that requires input the other side identity information, in the receiver of ordinary telephone set subject for ridicule 16, play out the signal language of " please import 12 identity datas of the other side, finish behind the key entry pound sign " simultaneously.After keying in the key combination of 12 identity datas of the other side on the ordinary telephone set support 15, dual-tone multifrequency is accepted with demodulator circuit 18 touch-tone signal of button to be demodulated to corresponding key assignments data and is sent into logical AND sequential control circuit 107 in the data flow chaos coding/decoding module circuit 10, send digital signal processor 108 again, with the key of these data, and then be processed into parameters value in the quick chaos pseudo random sequence secret algorithm as when authentication chaos system.
The secret telephony both sides are when authentication, separately as a token of with one group of data of arranging, utilization chaos pseudo random sequence secret algorithm is encrypted the back and is sent some groups mutually to the other side, after both sides receive the data that the other side sends, the identity data that digital signal processor 108 separately reads oneself is provided with the identity data value in 19, and it is decrypted some groups of data that receive as decruption key, if some groups of data after the deciphering are all identical, and it is errorless with the data of agreement, then the authentication of both sides' identity information is passed through, and can carry out next step operation.If there are some groups of data after the side deciphering inequality, or it is wrong with the data of agreement, then the LCDs in the demonstration of chaotic secret telephone set and the port control circuit (MCU) 12 demonstrates the information of authentication error, in the receiver of ordinary telephone set subject for ridicule 16, play out the signal language of " the other side's identity information is wrong, and authentication is not passed through " simultaneously.The chaotic secret telephone set requires to authenticate again or withdraw from secure communication.Take such authentication measures can prevent effectively that the third party from intercepting the initialization code data of both call sides, and then decode out the call-information that both sides encrypt, thus the fail safe that improves chaotic secret telephone set (as Fig. 1).
After the authentication of finishing under the secure communication mode, chaotic secret telephone set display reminding information and play out the signal language of " please import 12 bit digital, key in pound sign then finish " subsequently as the initialization key.After keying in the key combination of initialization key data on the ordinary telephone set support 15, these data are accepted by digital signal processor 108.When 12 of the initialization key less thaies of input and when keying in pound sign, digital signal processor 108 will be on the rearmost position of key data automatically zero padding become 12.Subsequently, to use the chaos pseudo random sequence secret algorithm, send to the other side mutually after the initialization key data encryption separately to secret telephony both sides input, both sides receive the initialization key data that the other side sends, the identity data that digital signal processor 108 separately reads oneself is provided with the identity data value in 19, and it is decrypted the initialization key data that receives as key, both sides obtain the other side and send the initialization key of secure voice data, so that can be decrypted to the other side's speech scrambling data that receive subsequently.
For achieving the above object, adopted in the technical scheme of the present invention to comprise that a kind of data flow chaos coding/decoding module circuit 10, telephone line modulator-demodulator (MODEM) 11, demonstration and port control circuit (MCU) 12, circuit diverter switch 13, subject for ridicule input diverter switch 14, ordinary telephone set support 15, ordinary telephone set subject for ridicule 16, dual-tone multifrequency acceptance are provided with 19 modules with demodulator circuit 18, identity data and constitute.Data flow chaos coding/decoding module circuit 10, comprise digital signal processor (DSP) 108, memory under program 106, logical AND sequential control circuit 107, the audio frequency input is amplified and filter circuit 101, the D/A change-over circuit 102 of the A/D of input analog signal and output analog signal, audio frequency output power amplifier and filter circuit 103, RS232 level shifting circuit 105, serial ports control chip 109 formations such as grade, memory under program 106, logical AND sequential control circuit 107 is peripheral connecting circuits of digital signal processor DSP 108, audio frequency input amplification is connected A/D change-over circuit 102 with filter circuit 101, and realizes seamless link with digital signal processor DSP 108 by synchronous serial interface MCBSP.Digital signal processor DSP 108 is realized seamless link by synchronous serial interface MCBSP with D/A change-over circuit 102, audio frequency output power amplifier and the filter circuit 103 of output analog signal; (DSP108 is connected RS232 level shifting circuit 105, realizes the direct communication of serial I/O data flow and DSP108 with digital signal processor by serial ports control chip 109; Digital signal processor DSP 108 in the data flow chaos coding/decoding module circuit 10 connects and shows and port control circuit MCU12, serial ports RS232 in the data flow chaos coding/decoding module circuit 10 connects telephone line modem 11 and is connected with digital signal processor DSP 108 by serial ports control chip 109, identity data is provided with 19 modules and connects logical AND sequential control circuit 107, data flow chaos coding/decoding module circuit 10 sound intermediate frequencies input amplification is held with audio frequency output power amplifier is connected subject for ridicule input diverter switch 14 with the output of filter circuit 103 B with the input of filter circuit 101, circuit input/the outbound port of ordinary telephone set support 15 connects the A end of subject for ridicule input diverter switch 14, and ordinary telephone set subject for ridicule 16 is connected with the common port of subject for ridicule input diverter switch 14.
Have the strong digital signal processor DSP of numerical operation ability 108 in the modularized circuit and move a kind of quick CPRS chaos (pseudo random sequence) secret algorithm.Because the CPRS chaos system has self-synchronization and synchronizing speed is fast, its state parameter is many, the chaotic behavior complexity, thereby this algorithm to have a key many, security performance is good, and reliability height, antidecoding capability be strong, and can produce encryption and decryption chaos pseudo random sequence (CPRS), the undistorted characteristics of decrypting ciphertext fast.This invention technology also provides ITUG.723.1 compress speech software simultaneously, code check after the compress speech only is 5.3k/6.3kbps, make that the data rate of this invention actual transmissions when secure communication mode is lower, thereby the quality requirement of wire message way is greatly reduced.
" chaotic secret telephone set " of the present invention has normal talking pattern and secret telephony pattern, but between simply switches, when entering the secret telephony pattern, duplex transmission is chaos encryption audio data stream signal on its outside line, but not analog signal has the authentication function of both call sides identity information.
The touch-tone signal that the back occurs on the line output terminal under dual-tone multifrequency acceptance and the demodulator circuit 18 demodulation ordinary telephone set supports 15 upper keyboard keys is adopted in the information input outside ordinary telephone set support 15, obtain its corresponding key assignments, draw relevant signal internally and need not to take apart ordinary telephone set support 15 structures.Circuit diverter switch 13, subject for ridicule input diverter switch 14 can adopt the relay of dpdt double-pole double-throw (DPDT) or the analog switch of dpdt double-pole double-throw (DPDT).
" chaotic secret telephone set " of the present invention has and sends and accept dual key, and during 12 of input key less thaies, on the rearmost position automatically zero padding become 12.
" chaotic secret telephone set " of the present invention has LCDs display reminding information, simultaneously play cuing language function in the receiver of ordinary telephone set subject for ridicule 16.
" chaotic secret telephone set " of the present invention its identity data is provided with 19 circuit, and the value that is provided with has uniqueness, can be used to differentiate user's identity.
" chaotic secret telephone set " of the present invention its circuit diverter switch 13, subject for ridicule input diverter switch 14 can adopt the relay of dpdt double-pole double-throw (DPDT) or the analog switch of dpdt double-pole double-throw (DPDT).
The data flow chaos coding/decoding module circuit 10 that adopts in " chaotic secret telephone set " of the present invention, it is characterized in that adopting model is the integrated circuit formation audio frequency input amplification and filter circuit 101 of TLC2272ACD, adopt model be the integrated circuit of TLC320AD50C as A/D and D/A converter 102, external logic and sequential control circuit 107 employing programmable chip ISP_M4A5.
" chaotic secret telephone set " of the present invention formed as Fig. 2 after it is characterized in that can simply being connected by two parts on the structure.A part is an ordinary telephone set 15,16, and its internal structure need not to change, and model does not also have specific (special) requirements.Another part by a kind of data flow chaos coding/decoding module circuit 10, telephone line modem 11, demonstration and port control circuit MCU12, circuit diverter switch 13, subject for ridicule input diverter switch 14, on-line direct current power supply 17, online resistance 20, dual-tone multifrequency is accepted and demodulator circuit 18, identity data are provided with the bases of forming such as 19.Promptly become a kind of chaotic secret telephone set of the present invention such as Fig. 1 after the simple connection of two parts.
Four, description of drawings
Fig. 1 is " chaotic secret telephone set " of the present invention system block diagram;
Fig. 2 is a concrete enforcement circuit block diagram of the present invention
Fig. 3 is a circuit diagram of the present invention
Fig. 4 is the program flow diagram of work of the present invention
Five, embodiment
The chaotic secret telephone set
Be example with a kind of " the chaotic secret telephone set " that adopts this invention fabrication techniques below, the embodiment of this technology is described.
1, circuit structure design is with reference to figure 3
Adopted a kind of data flow chaos coding/decoding module circuit 10 in the chaotic secret telephone set that this invention realized, be used for real-Time Speech Signals is compressed and the computing of CPRS chaos encryption and decryption, utilize telephone line modem 11 to realize the duplex transmission of chaos encryption audio data stream signal, utilize monolithic processor controlled demonstration and port control circuit MCU12 to realize the demonstration of information, utilize button on the ordinary telephone set support 15 and dual-tone multifrequency to accept to realize the input of key informations with demodulator circuit 18, utilize ordinary telephone set subject for ridicule 16 to realize picking up and resetting of voice messaging, utilize circuit diverter switch 13, the switching that subject for ridicule input diverter switch 14 realizes operating state utilizes identity data that the identity that 19 modules are confirmed receiving-transmitting sides is set.Form as Fig. 1 after can simply connecting by two parts on the structure, the ordinary telephone set that adopts 15,16, its internal structure need not to change, model does not also have specific (special) requirements.
The voice signal of input is the audio output signal of telephone set subject for ridicule 16 outputs in this device, therefore adopting model is amplification and the filter circuit 101 that the integrated circuit of TLC2272ACD constitutes the audio frequency input, and the employing model is that the integrated circuit of TLC320AD50C is as the A/D converter of audio input signal and the D/A converter 102 of audio output signal.The secure voice signal of deciphering will output in the earphone, so output employing model is the power amplifier and the filter circuit 103 of the operational amplifier formation audio output signal of LM386.
Code check behind the digitization of speech signals to be sent is that 128kbps annotates: owing to employing in this programme is the A/D converter of 16bits, directly transmission need be than higher channel width, therefore must adopt voice compression algorithm to compress before sending, adopt same algorithm to carry out decompress(ion) when accepting again.Adopt G.723.1 compression algorithm of ITU in this programme, this compression algorithm has that code check after the compression is low, to recover voice quality better, but algorithm is realized difficult characteristics.G.723.1, ITU is 5.3k/63kbps only to the code check after the compress speech, and code check is lower.Because this algorithm, compress speech can be brought the time-delay of 30ms at least.
For the voice signal that sends is compressed the chaos encryption with CPRS, the voice signal that receives is carried out CPRS chaos decode and decompression operation, the model of selecting TI company to produce in this programme is the digital signal processor (DSP) 108 of the fixed-point calculation of TMS320VC5409_100, and the supporting employing model memory under program 106 that is SST39VF400A, power conversion and the filtering chip that model is TPS767D301.According to Theoretical Calculation and with reference to experimental result, such selection can be guaranteed enough operational capabilities, and voice signal is being carried out compression and decompression, and when carrying out CPRS chaos encryption and decryption simultaneously, total amount of delay that system brings is about 32ms, satisfies the requirement of real-time speech communicating fully.
In order to realize wire communication, this programme is selected the ordinary telephone wiring modem 11 duplex transmission chaos encryption audio data stream signals of Hayes company production for use, and digital signal processor (DSP) 108 controls its working method by serial ports.
Outside logical AND sequential control circuit 107 adopts programmable chip ISP_M4A5_32 in this programme, it is the integrated circuit of MAX3241 and TL16C550 that RS232 level conversion data 105 and serial ports control chip 109 adopts models, shows that adopting models with port control 12 is the liquid crystal display screen that shows of the two row information of CM1610 and the singlechip chip of AT89C51.
It is relay, ordinary telephone set support 15 and the 16 no characteristic requirements of ordinary telephone set subject for ridicule of DS2Y-S-DC5V that circuit diverter switch 13, subject for ridicule are imported diverter switch 14 employing models, and dual-tone multifrequency acceptance and demodulator circuit 18 employing models are the DIP switch that chip, the identity data of MT8870 is provided with 16 of 19 employings.
Required power supply when on-line direct current power supply 17 is used to provide 15 work of ordinary telephone set support with on-line direct current resistance 20 is selected the resistance of 7812 voltage stabilizing chips and 600 ohm respectively for use.
2, operation principle description references Fig. 3, Fig. 4
Chaotic secret telephone set such as Fig. 3 that the present invention realized, start back circuit diverter switch 13, subject for ridicule input diverter switch 14 all are on off state A place, and the external call link tester is crossed the line input mouth that circuit diverter switch 13 inserts ordinary telephone set support 15.Simultaneously, the subject for ridicule on the ordinary telephone set support 15 is imported/is gone out signal and is connected with ordinary telephone set subject for ridicule 16 through subject for ridicule input diverter switch 14.At this moment this chaotic secret telephone set works in the normal talking pattern, and duplex transmission is simulated audio signal on the outside line;
Communication mode and ordinary telephone set under the normal talking pattern are identical.At this moment the signal that transmits on telephone line modem 11, dual-tone multifrequency acceptance and demodulator circuit 18 and 10 pairs of outside lines of data flow chaos coding/decoding module circuit and the actuation of keys of ordinary telephone set support 15 are monitored in real time.
Under the off-hook condition, but after keying in a specific key combination that enters secure communication on the ordinary telephone set support 15 software setting, as (
*1#), dual-tone multifrequency is accepted with demodulator circuit 18 touch-tone signal of button to be demodulated to corresponding key assignments data and is sent into logical AND sequential control circuit 107 in the data flow chaos coding/decoding module circuit 10, send digital signal processor 108 again.Handle the control command that the back forms secure communication, control command one tunnel is sent logical sequence control circuit 107, and control circuit diverter switch 13 switches to state B with subject for ridicule input diverter switch 14, makes the calling party on-hook.Simultaneously telephone line modem 11 is sent into through serial ports control circuit 109, RS232 level shifting circuit 105 in another road of control command, makes it begin the opposing party's dial-up in secure communication and begins to set up data communication channel.At this moment this chaotic secret telephone set enters the secret telephony pattern.
Secure communication the opposing party's chaotic secret telephone set is receiving after specific keys that the other side transmits makes up pairing touch-tone signal, and the corresponding switch change action that carries out with the above-mentioned action of calling party makes it enter the secret telephony pattern.Its telephone line modem 11 response the other side's calling also begins to enter the communication handshake program.
At this moment, the both sides in the communication all enter the data confidentiality talking state.LCDs among demonstration and the port control circuit MCU12 demonstrates the information that enters secure communication mode.
Under the secure communication mode, the either party of both call sides after keying in a specific key combination that withdraws from secure communication on the ordinary telephone set support 15 (
*0#), dual-tone multifrequency is accepted with demodulator circuit 18 touch-tone signal of button to be demodulated to corresponding key assignments data and is sent into logical AND sequential control circuit 107 in the data flow chaos coding/decoding module circuit 10, send digital signal processor 108 again, handle back formation and withdraw from the control command that secure communication enters proper communication.Control command one tunnel is sent logical sequence control circuit 107, and switches to state A by logical sequence control circuit 107 control circuit diverter switches 13 and subject for ridicule input diverter switch 14, makes ordinary telephone set support 15 recover online; Another road control command is sent into telephone line modem 11 through serial ports control circuit 109, RS232 level shifting circuit 105, makes it finish work at present state and hanging wire.At this moment this chaotic secret telephone set returns to normal call mode.
No matter the opposing party in the conversation withdraws from after keying in the key combination that withdraws from secure communication on the ordinary telephone set support 15, still all can withdraw from the secure communication state and reenter normal call mode after its telephone line modem 11 receives the other side's hanging wire signal, ordinary telephone set support 15 recovers online.
Under the secret telephony pattern, on-line direct current power supply 17 enters ordinary telephone set support 15 by online resistance 20, circuit diverter switch 13 and keeps its in-line power.
After entering secure communication mode, LCDs among both sides' demonstration and the port control circuit MCU12 demonstrates the prompting that requires input the other side identity information, in the receiver of ordinary telephone set subject for ridicule 16, play out the signal language of " please import 12 identity datas of the other side, finish behind the key entry pound sign " simultaneously.After keying in the key combination of 12 identity datas of the other side on the ordinary telephone set support 15, dual-tone multifrequency is accepted with demodulator circuit 18 touch-tone signal of button to be demodulated to corresponding key assignments data and is sent into logical AND sequential control circuit 107 in the data flow chaos coding/decoding module circuit 10, send digital signal processor 108 again, with the key of these data, and then be processed into parameters value in the quick chaos pseudo random sequence secret algorithm as when authentication chaos system.
The secret telephony both sides are in when authentication, separately with the data of one group of agreement as a token of as (0123456789
*#), utilization chaos pseudo random sequence secret algorithm is encrypted the back and is sent some groups mutually to the other side, after both sides receive the data that the other side sends, the identity data that digital signal processor 108 separately reads oneself is provided with the identity data value in 19, and it is decrypted some groups of data that receive as decruption key, if some groups of data after the deciphering are all identical, and errorless in the data of agreement, then the authentication of both sides' identity information is passed through, and can carry out next step operation.
If there are some groups of data after the side deciphering inequality, or it is wrong in the data of agreement, then the LCDs among the demonstration of chaotic secret telephone set and the port control circuit MCU12 demonstrates the information of authentication error, in the receiver of ordinary telephone set subject for ridicule 16, play out the signal language of " the other side's identity information is wrong, and authentication is not passed through " simultaneously.The chaotic secret telephone set requires to authenticate again or withdraw from secure communication.
Take such authentication measures can prevent effectively that the third party from intercepting the initialization code data of both call sides, and then decode out the call-information that both sides encrypt, thus the fail safe that improves chaotic secret telephone set (as Fig. 1).
After the authentication of finishing under the secure communication mode, chaotic secret telephone set display reminding information and play out the signal language of " please import 12 bit digital, key in pound sign then finish " subsequently as the initialization key.After keying in the key combination of initialization key data on the ordinary telephone set support 15, these data are accepted by digital signal processor 108.When importing 12 of key less thaies and keying in pound sign, digital signal processor 108 will automatic zero padding become 12 on the rearmost position of key data.
Subsequently, to use the chaos pseudo random sequence secret algorithm, send to the other side mutually after the initialization key data encryption separately to secret telephony both sides input, both sides receive the initialization key data that the other side sends, the identity data that digital signal processor 108 separately reads oneself is provided with the identity data value in 19, and it is decrypted the initialization key data that receives as key, both sides obtain the other side and send the initialization key of secure voice data, so that can be decrypted to the other side's speech scrambling data that receive subsequently.After finishing the exchange of mutual authentication and initialization key data, in secure voice communication subsequently, a side initialization key data will be used to one's own side's's (transmit leg) encryption key and the opposing party's (the other side) decruption key.
When carrying out secure communication, dsp chip 108 in the intercommunication device automatically with the quick CPRS chaotic secret algorithm in the program storage 106, ITU pack into program storage area in the dsp chip 108 of compress speech decompression algorithm, system management, voice suggestion file supervisor G.723.1, and begins to carry out this program in start energising back automatically.Enter the secure communication stage, both sides' telephone line modulator-demodulator (MODEM) 11 will be set up the duplex data communication channel by telephone wire.
During the communicator operate as normal, the A/D conversion chip (TLC320AD50C) 102 of communicating pair is gathered the voice signal after audio frequency input amplification and the filtering 101 respectively simultaneously, and the data flow of the signal after the collection through becoming 128kbps after the digitlization is deposited in the buffering area of dsp chip 108 through synchronous serial interface.A/D chip 102 every 30ms send an interrupt request DSP108 these data are handled.
Both sides' dsp chip 108 regularly to the speech data gathered by ITU G.723.1 voice compression compress, data after the compression need be carried out CPRS chaos encryption coding to guarantee safety of data, send the data buffer zone of telephone line modem 11 to send by serial ports control chip 109, RS232 level conversion 105 then.
The data that both sides' telephone line modem 11 is accepted also send dsp chip 108 to carry out the CPRS chaos decode by RS232 level conversion 105, serial ports control chip 109 after error correction and data decompression is handled.Data behind the decompress(ion) are delivered to D/A conversion chip 102 simultaneously, restore the other side's sound after digital-to-analogue conversion and amplification of audio frequency output work and filtering 103, thereby realize speech secure communication.
3, main performance of Shi Xianing and technical indicator
In this application example, the acquisition rate of voice is 8KHz, 16 quantifications, employing high speed TMS320VC5409_100DSP device and ITU G723.1 agreement are handled in real time voice and are compressed, data bit rate after the compression is 5.3/6.3Kbps, the speech bandwidth that can transmit reaches 100-3400Hz, and transmission delay is not more than 32ms.These technical merits and index all are not less than the requirement of ordinary numbers communication equipment.
4, application prospect
This chaotic secret phone can be widely used in the place of various need to be keep secret communications, prevents autotelic eavesdropping, ensures information security, and is suitable for having as government offices, enterprises and institutions, commercial department etc. the entity and individual of data communication, secure communication needs.The data confidentiality phone that does not also have specialty in the market; and along with the development of information technology; state secret, trade secret even individual privacy just constantly are subjected to increasing illegal infringement; entity and individual press for a kind of means of communication that can protect own interests; therefore, the present invention has good application and market prospects.