The method of mobile phone cipher
The invention belongs to field of mobile communication, is a kind of mobile phone to be carried out method of encrypting.
For the safety of communication, need take certain secrecy provision, general secrecy provision is to encrypt in communication tool.In the gsm system that the whole world is most widely used now, definition according to the GSM standard, the speech that in mobile phone wave point hop (it is generally acknowledged the delivering path that the easiest quilt is monitored) is transmitted is encrypted, and does not encrypt in the terrestrial transmission facility.For general secret needs, this can satisfy basically, but the special sector that has relatively high expectations for privacy degrees, this encryption measures is still disliked safety inadequately.At first, because regular handset only encrypts the wave point hop, and do not encrypt, thereby be easy to by other people monitoring at the ground installation hop; Secondly, for the encryption of wireless channel, key is by GSM carrier's management of telecommunication department, that is to say, the GSM carrier of telecommunication department is difficult to maintain secrecy.
Disclosed Chinese patent application on December 16th, 1998 " the mobile wireless network terminal room carries out the method and the corresponding establishment of direct coded communication " (application number 98108859.7) a kind of new communication encryption method has been proposed, this method is to the effect that: the random number (RAND) that calling party's terminal utilizes network to send, generate key K c, this encryption key sends to callee's terminal by call setup message then, makes two terminal uses can use identical key that communicating data is carried out encrypt/decrypt when communication.Encrypt with the method, privacy degrees improves with respect to conventional method, still have following shortcoming: the employed key K c of (1) two call terminal encrypt/decrypt, be by GSM (/DCS) the Ki value shared of the random number (RAND) that provides of network and network and terminal is definite by the A8 algorithm, no matter be random number (RAND), the Ki value, the A8 algorithm still is that final key K c is managed by Virtual network operator, and gsm system operator can be cracked easily to this encryption.(2) method of the enciphered data transmission described in this invention, have only when during being applied to minority and conversing, allowing to set up the mobile communcations system of the direct end-to-end communication that does not rely on base station system, just can reach omnidistance effect of encrypting, in most of the cases, the data that terminal (being caller or called) is sent all must be passed through the BTS and the BSC of region separately, upload to MSC then, the MSC that arrives the control distant terminal again is transferred to another terminal by BSC and BTS then.Use the key K c in this scheme that the speech that portable terminal sends is encrypted, after BTS receives this encrypting traffic,, in the ground installation transmission, will adopt the plaintext load mode of not encrypting, until the wave point place of another layer just with its deciphering.
The object of the present invention is to provide a kind of can be applicable to communication system that all meet the GSM standard can support the data service encryption method for handsets, this encryption method solved occur in the above-mentioned mobile phone cipher scheme owing to Virtual network operator causes unsafe problem to knowing of enciphered messages such as key.
The method of the mobile phone cipher among the present invention may further comprise the steps:
1) calling party initiates data service calls;
2) calling party or callee provide and generate the key desired data, and transmit this data;
3) both sides are according to 2) data transmitted generate key, and be stored in separately the memory;
4) voice messaging is carried out encryption, the information of encryption is carried out rate adapted and forward error correction after, carry out chnnel coding again, interweave, burst format, single channel encryption, modulation, emission; And/or
5) receive the other side's information, carry out that demodulation, channel deciphering, burst are formatd, deinterleaved, after channel-decoding, error correction and the rate adapted, be decrypted processing.
Described providing generates the key desired data, can be meant the random number rand that utilizes pseudorandom number generator to produce; Described Data transmission can also can be transmitted by the user profile territory in other signaling (as call set up signaling, call out and carry out signaling, calling alarm signaling etc.) that can carry user data by the data service transmission.
The method of described generation key can be:
1) utilize random number rand and another value Km, as the input value of binary input one-way algorithm F1, calculating output valve is K1;
2) callee passes to the calling party by data service with K1, calling party's verification;
3) both sides utilize 1) described rand and Km generate key by another binary input one-way algorithm F2.
Describedly voice messaging is carried out encryption can may further comprise the steps:
1) simulated voice being carried out A/D conversion back encodes by the low rate voice encryption device:
2) will carry out the branch frame through the continuous speech data of low rate voice encryption device coding;
3) according to key and frame number speech data is encrypted frame by frame;
4) Speech frame after encrypting is added the frame head postamble that contains location and error correction information;
5) speech data that obtains more than the general carries out rate adapted, generates the data of the speed that meets the data service transmission.
Describedly voice messaging is decrypted processing can may further comprise the steps:
1) data flow to transmitting utilizes the frame alligning information in the data flow to isolate independently scrambled data frame;
2) utilize control information (for example control information in the frame head postamble) error correction in the frame;
3) utilize the frame number in key and the frame control information that scrambled data frame is deciphered,
4) be spliced into the continuous speech data flow at last, send into and carry out the D/A conversion after the low rate voice decoder is decoded, the output simulated voice.
Describe the present invention below in conjunction with accompanying drawing.
Fig. 1 is call setup and omnidistance encryption flow figure.
Fig. 2 is that call encryption is set up the encrypt/decrypt of back encrypted speech and the procedure chart of transmission.
Set up flow chart according to omnidistance call encryption shown in Figure 1, initiate data service calls, carry out the generation of key then by the calling party.For the sake of security, directly do not carry out the key transmission, but after initiating data service calls by the calling party, calling party or callee utilize pseudo-random generator to produce random number rand, then rand are transmitted to the other side by data service.Caller and callee utilize random number rand and another value Km (Km is a kind of keying sequence of only knowing for both call sides, by the both call sides periodic replacement) simultaneously, and as the input value of binary input one-way algorithm F1, the algorithm output valve is K1.Described F1 algorithm is a kind of algorithm with unidirectional (or trap door) function, that is to say, calculates output from input and is easy to, even if but known several to (rand, K1) value will the anti-Km of release almost be impossible.For example the A3 algorithm of stipulating in the GSM standard is exactly a kind of suitable F1 algorithm.The callee passes to the calling party by data service with K1.Calling party's verification is transmitted from the callee and is made square tube cross data service K1 is passed to the calling party.Whether the K1 value that calling party's verification is transmitted from the callee is consistent with own result calculated.
If callee's K1 value and calling party's is consistent, call encryption will be allowed to carry out, calling party and callee by another kind of binary input one-way algorithm F2 (for example A8 algorithm of stipulating in the GSM standard), still utilize random number rand and Km to do input simultaneously and generate omnidistance encryption key simultaneously.After omnidistance encryption key generated, two master sides were kept at it in separately the memory device, for ensuing voice encryption processing procedure use.
If callee's K1 value and calling party K1 value are inconsistent, mobile phone provides indication by man-machine interface (MMI) to the user.Inconsistent reason may be by two kinds: 1) rand error code in transmission; 2) callee is not a legal users.When these situations take place, can whether determine retry or do further to confirm by the user.
Same cipher key related information (above-mentioned rand and K1) is except that can utilizing the data service transmission, other signaling that also can be by carrying user data is (as call set up signaling, signaling is carried out in calling, calling alarm signaling etc.) in user profile territory (for example User-user territory) transmit.
The process of the encrypt/decrypt of voice and transmission as shown in Figure 2 after call encryption was set up.Simulated voice carries out analog-to-digital conversion through A/D chip 201, and then carries out the low rate speech coding by low rate voice encryption device 202 after gathering by microphone.Here the low rate voice encryption device should be to make original speech be encoded into the encoder of the voice data that is lower than 9600bit/s speed at least, for example the half-rate encoder of GSM normalized definition is exactly a kind of encoder that is fit to this requirement, and it can generate the voice data stream of 7kbit/s.The low rate continuous speech code stream that generates is admitted to omnidistance encrypting module 203.In omnidistance encrypting module, continuous bit stream is split into isometric Speech frame, in one embodiment, continuous bit stream is divided into the Speech frame that frame length is 20ms.With a counter to the speech frame count and distribute frame number.According to omnidistance key and frame number generation ciphering sequence voice data is encrypted frame by frame, cryptographic algorithm can be used A5 cryptographic algorithm or other cryptographic algorithm, one of 15 kinds of cryptographic algorithm announcing recently of the U.S. for example are just passable as long as both sides use algorithm of the same race to carry out encrypt/decrypt.Speech frame after encrypting is added the frame head postamble that contains location and error correction information, and frame number also is added in frame head or the postamble.
Carry out data service through the data flow of above-mentioned processing by data service module 204 and handle, generate the data of the speed that meets the data service transmission.The due module RA0 of basic function, the RA1 ' and the FEC that comprise the realization transfer of data of GSM standard 04.21 regulation in the data service module 204.The data service is here handled can adopt the transparent data service mode.For the non-transparent data traffic mode, the forward error correction that transparent data service is provided by the wave point transmission plan fully (FEC) mechanism is finished error correction, and time-delay is fixing and very short.For speech, being transmitted in each encrypted speech frame that transparent data service provides can add error correction information, and accuracy can further improve.Through the data of rate adapted again through chnnel coding, interweave, launch after the burst format, single channel encryption, modulation.
To receiving the other side's information, carry out that demodulation, channel deciphering, burst formats, deinterleaved, behind the channel-decoding, data are reduced into the preceding form of transmit leg chnnel coding.And then carry out data services such as forward error correction and rate adapted by data service module 204 ' and handle, send into omnidistance deciphering module 203 '.Omnidistance deciphering module 203 ' utilizes the frame alligning information in the data flow to isolate independently scrambled data frame, utilize control information (for example control information in the frame head postamble) error correction in the frame, when finding a frame misdata and when irrecoverable, just abandoned simply, utilize the frame number in omnidistance key and the frame control information that scrambled data frame is deciphered, be spliced into the continuous speech data flow at last, send into the 202 ' decoding of low rate voice decoder, become speech after A/D converter 201 ' carries out digital-to-analogue conversion.
Utilize the encryption method for handsets among the present invention, information is all encrypted in the overall process of communication, and the random number of encrypted secret key and generation key etc. all is that the correspondent grasps rather than telecommunications operator control, so the fail safe of communication improves greatly.Owing in each encrypted speech frame, all added error correction information, can carry out error correction to each frame.In deciphering side, when finding that certain frame data mistake can not be corrected, just abandoned simply.Because have independence between frame and the frame, a bad frame can not influence the deciphering of other frames,, abandon a frame and can not cause acoustically obstacle again because each frame is all very short.Like this, communication quality also can improve.
Encryption method for handsets of the present invention also is applicable to portable terminals such as Vehicle mounted station.