EP0228455A1 - Scrambling apparatus - Google Patents
Scrambling apparatusInfo
- Publication number
- EP0228455A1 EP0228455A1 EP19860904577 EP86904577A EP0228455A1 EP 0228455 A1 EP0228455 A1 EP 0228455A1 EP 19860904577 EP19860904577 EP 19860904577 EP 86904577 A EP86904577 A EP 86904577A EP 0228455 A1 EP0228455 A1 EP 0228455A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- scrambling
- sub
- buffer
- analog signals
- code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000004891 communication Methods 0.000 claims abstract description 187
- 239000000872 buffer Substances 0.000 claims description 284
- 230000009466 transformation Effects 0.000 claims description 8
- 230000005540 biological transmission Effects 0.000 claims description 7
- 238000012360 testing method Methods 0.000 claims description 7
- 230000004044 response Effects 0.000 claims description 5
- 125000004122 cyclic group Chemical group 0.000 claims description 4
- 230000008878 coupling Effects 0.000 claims 21
- 238000010168 coupling process Methods 0.000 claims 21
- 238000005859 coupling reaction Methods 0.000 claims 21
- 230000007274 generation of a signal involved in cell-cell signaling Effects 0.000 claims 5
- 230000001172 regenerating effect Effects 0.000 claims 3
- 230000000694 effects Effects 0.000 claims 2
- 230000001131 transforming effect Effects 0.000 claims 2
- 238000001914 filtration Methods 0.000 claims 1
- 230000002401 inhibitory effect Effects 0.000 claims 1
- 238000000034 method Methods 0.000 description 31
- 230000006870 function Effects 0.000 description 11
- 230000008569 process Effects 0.000 description 8
- 238000001228 spectrum Methods 0.000 description 6
- 230000001360 synchronised effect Effects 0.000 description 6
- 230000003111 delayed effect Effects 0.000 description 5
- 230000001934 delay Effects 0.000 description 4
- 230000000977 initiatory effect Effects 0.000 description 3
- 230000008859 change Effects 0.000 description 2
- 230000001010 compromised effect Effects 0.000 description 2
- 230000003292 diminished effect Effects 0.000 description 2
- 238000013507 mapping Methods 0.000 description 2
- 230000002441 reversible effect Effects 0.000 description 2
- 241000009298 Trigla lyra Species 0.000 description 1
- 230000003044 adaptive effect Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000001174 ascending effect Effects 0.000 description 1
- 230000002238 attenuated effect Effects 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 239000002131 composite material Substances 0.000 description 1
- 239000013078 crystal Substances 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 239000012634 fragment Substances 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 230000033764 rhythmic process Effects 0.000 description 1
- 238000005070 sampling Methods 0.000 description 1
- 238000012956 testing procedure Methods 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
- H04K1/06—Secret communication by transmitting the information or elements thereof at unnatural speeds or in jumbled order or backwards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
- H04L9/0656—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
- H04L9/0662—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
Definitions
- the present invention relates to devices for scrambling and unscrambling voice communications which are to be transmitted and received over ordinary or non-secure communication links.
- the first voice-privacy devices were developed soon after the widespread adoption of the telephone.
- the simplest, and historically the earliest, voice privacy systems utilized the technique of frequency inversion.
- a mirror image of the message frequency spectrum replaces the original speech signal. This results in the highest-pitched sounds being converted into low-pitched sounds, and the low-pitched sounds being converted into high-pitched sounds. Since the rhythm of the speech is not altered, the residual intelligibility of the scrambled signal is quite high.
- the inversion scrambler operates in a fixed and predetermined manner, the scrambled signal may be unscrambled by an opponent equipped with a similar device.
- a more sophisticated system related in concept to the inversion scrambler is the band-shift scrambler.
- the frequency spectrum is divided into a number of bands.
- the various bands are then shifted with respect to each other, possibly in conjunction with inversion of some or all of the frequency bands.
- This system provides true coded speech privacy, since there are a number of different combinations of shifted frequency bands.
- To unscramble the communication one must know how the frequency spectrum was divided into bands and the sequence of the various bands in the scrambled signal. This information constitutes a "key" which an opponent must either possess or deduce in order to unscramble the signal.
- the most secure analog scrambling method which produces a scrambled or cyphered signal presently suitable for transmission over conventional telephone circuits is the time-element scrambler.
- This technique has been made practical by recent improvements in the cost/performance ratio of microcomputers.
- the speech is divided into a large number of very short duration time-elements.
- the sequence of these time elements is altered using a scrambling code which may have so many possible values that "brute force" deduction is impossible.
- each - successive second or other time segment of speech may be altered using a different code which is specified by the scrambling code.
- the unscrambling unit properly set to the particular code in use and synchronized with the scrambling unit, can reassemble the fragments of speech in the correct sequence to restore intelligibility and substantially unimpaired voice quality to the message.
- this type of scrambler offers low residual intelligibility and a sufficiently large number of possible codes to be secure from cryptoanalytic attack by an opponent equipped with any but the most advanced technological and economic resources.
- the codes Since the same code must be inputted into prior art scrambling machines at each end of the communication link, the codes must be exchanged by the parties to the communication at some time prior to the commencement of said communication. Hence these systems are also vulnerable at the time the code is passed between the parties which are to have the secure communication. Two solutions of this problem are possible. First, the code may be passed by courier or other secure means.
- a second solution would be to exchange the scrambling code over the non-secure communication link using a public key system.
- the public key system was developed to allow two parties who have not previously communicated with each other to communicate in code by eliminating the need to exchange "code books" over a secure communication link.
- the party who wishes to receive the coded message referred to as the receiver
- sends an encryption code, E to the party wishing to send the message, referred to as the sender.
- the sender uses the encryption code to transform his message into a coded message which he then transmits to the receiver over the non-secure communication link.
- the receiver then decodes the message using a decrypting code, D, which only he possesses.
- the unique feature of the public key system resides in the fact that even a third party who overheard the encrypting code, E, can not decrypt the message, since it is essentially impossible to derive the decryption code, D, from a knowledge of E. In fact, even a knowledge of how E was used to encrypt the message is insufficient to decrypt the message.
- the public key system system could be used to exchange scrambling codes which are to be used by two time-element scrambling machines connected to an non-secure communication link.
- the first machine would transmit a public key system encrypting code to the second machine which would use the encrypting code to encrypt a scrambling code.
- the encrypted scrambling code would then be sent back to the first machine over the non-secure communication link where it would be decrypted.
- the scrambling code thereafter would be used by both machines to scramble and unscramble the subsequent communications between the machines.
- Public key codes require a prior list of codes or a computer associated with the device in question. There are strict mathematical requirements for the generation of these codes. As a result, one can not merely make up a code number which is easy to remember.
- the size of the codes makes the use of these systems awkward. A large number must be entered at the start of the communication. This type of entry process, if done, for example, via a keyboard, has a sufficiently high error rate to make such systems unattractive to a user having the crytographic expertise of the average telephone user.
- the present invention consists of a novel time-element scrambling system and the component parts thereof for communicating over an non-secure communication link such as a telephone line.
- An apparatus is provided at each end of the communication link which scrambles and unscrambles the relevant signals using a time-element scrambling system.
- the scrambling and unscrambling operations are specified by a scrambling code which is exchanged by the two apparatuses in an encrypted form when the communication link is first established.
- the scrambling code is encrypted using a public key system code which is sent by the apparatus initiating the communication to the other apparatus.
- the apparatus receiving the encrypting code generates the scrambling code to be used in the communication, encrypts the scrambling code using the public key system encryption code, and returns the encrypted scrambling code to the apparatus which initiated the communication.
- the initiating apparatus then decrypts the scrambling code using its secret private decryption code. Thereafter, each apparatus uses the scrambling code to scramble its communications with the other apparatus.
- the generation of these two codes and their exchange by the two apparatuses is transparent to the users.
- Each apparatus automatically generates the code for which it is responsible without input from the user of the apparatus.
- the manner in which the codes are generated guarantees that the next code that will be generated may not be predicted by examining the apparatus in question at any time substantially in advance of the time at which the communication link is established nor can the code be deduced after the communication has ended.
- the generation of the relevant codes and their exchange by the apparatuses in question is automatic.
- the operation of the system is both transparent to the users and secure against security breaches resulting from the existence of a list of possible codes.
- the system includes a calling apparatus and a receiving apparatus.
- Each of these apparatuses contain means for inputting and outputting the voice signals of the parties using the system, and means for inputting and outputting scrambled electrical signals on the communication link in question.
- Each apparatus contains means for scrambling the voice signals inputted to it by the user and for unscrambling the scrambled voice signals communicated on said communication link.
- the scrambling and unscrambling systems each employ a scrambling code which is exchanged by the receiving apparatus and calling apparatus prior to the commencement of the scrambled communication.
- the scrambling code is exchanged in an encrypted form to prevent an eavesdropper from using a similar scrambling apparatus to unscramble the communication.
- the calling apparatus calls the receiving apparatus.
- the two apparatuses exchange messages which serve to verify that a compatible apparatus exists on each end of the communication link.
- the calling apparatus generates an encrypting code according to a public key system and transmits that key to the receiving apparatus.
- the receiving apparatus then generates a scrambling code, encrypts it using the encrypting code received from the calling apparatus, and then transmits the encrypted scrambling code to the calling apparatus.
- the calling apparatus decrypts the encrypted scrambling code and stores it for use in scrambling and unscrambling the subsequent communications.
- the voice communications are scrambled by recording the voice signals inputted into the apparatus in question and then replaying said recording in a time sequence different from the sequence in which the recording was made.
- Each apparatus contains two or more scrambling buffers for recording the voice signals of the user and then replaying the recording in a scrambled form. These buffers alternate functions such that at any given time, one of these scrambling buffers is used to record the voice signals and the other is used to replay the voice signals previously recorded. When the replaying of the previously recorded segment of voice signals is completed, the roles of the two scrambling buffers are reversed. Embodiments using more than two buffers will be apparent to those skilled in the art. Each scrambling buffer is divided into a plurality of sub-buffers.
- the voice signals recorded in each sub-buffer are replayed over the communication link.
- the order in which the various sub-buffers are replayed is substantially different from the order in which the individual sub-buffers were used to record the voice signals; hence the resultant signal on the communication link is unintelligible to an eavesdropper who does not know the order in which the sub-buffers were replayed.
- the order in which the sub-buffers are replayed is determined by the the scrambling code exchanged by the two apparatuses prior to the commencement of the scrambled communication. This code is used to define a pseudo-random playback sequence which is changed after the contents of each scrambling buffer has been completely replayed on the communication link.
- Each apparatus also contains two unscrambling buffers for recording the scrambled signals received on the communication link and for replaying these signals in unscrambled form.
- One unscrambling buffer is used to record the incoming signals on the communication link while the other is being used to replay the previously recorded signals in unscrambled form.
- Each of these unscrambling buffers is also divided into a plurality of sub-buffers as were the two scrambling buffers used to scramble the signals.
- Each sub-buffer in an unscrambling buffer contains the previous contents of one of the sub-buffers of a scrambling buffer contained in the corresponding apparatus at the other end of the communication link.
- the signals may be unscrambled by replaying the recorded signals stored in each sub-buffer in the proper order. Since the signals stored in any one sub-buffer are already in the proper order within that sub-buffer, only the order in which the individual sub-buffers are to be replayed is necessary to unscramble the signals.
- the order in which the sub-buffers are replayed is the same as the order in which they were played into the communication link by the apparatus which performed the scrambling. Since . both apparatuses use the same scrambling code to generate the order in which sub-buffers are replayed for any given scrambling buffer, the correct order is known to the unscrambling circuitry.
- the scrambling and unscrambling buffers used in the present invention are digital in nature. Each consists of a plurality of contiguous memory slots.
- the signals to be recorded in a given buffer are first digitized by an analog to digital converter.
- the output of the analog to digital converter is a digital word or bit stream whose value represents the analog signal fed to the converter at a given instant of time.
- a clock circuit causes the converter to periodically sample this signal.
- the replaying circuitry contains a digital to analog converter to convert the digital data back to analog form for replaying in analog form on the communication link or on a speaker.
- the storage operations of the two apparatuses are synchronized by the repeated exchange of synchronization signals on the communication link.
- the calling apparatus contains means for generating prime numbers which are used to construct the public key encrypting code sent to the receiving apparatus.
- the particular prime numbers used to generate the encrypting and corresponding decrypting codes are not predictable from an examination of the calling apparatus at a time significantly prior to the establishment of the communication link. Hence, it is not possible for an eavesdropper to obtain access to the relevant decrypting code by examining the calling apparatus.
- the calling apparatus since the calling apparatus itself generates the encrypting and decrypting code pairs as used in the public key system, neither the user nor an opponent having access to the system's manufacturer can breach the security of the system by obtaining the relevant codes.
- the operation of the apparatus is transparent to the user.
- the receiving apparatus contains means for generating random numbers which may be used as "seeds" for a pseudo-random number generator.
- the scrambling code contains such a seed.
- the next seed to be generated may not be ascertained by an examination of the receiving apparatus at a time significantly prior to the establishment of the communication link, since the receiving apparatus also contains a means for detecting a random event which is used to define the subsequent "seeds" generated by that apparatus.
- the security of the system is also protected from breaches in which the eavesdropper obtains a list of the scrambling codes which will be used in future communications, since neither the user nor the system's manufacturer has such a list.
- FIGURE 1 illustrates an apparatus according to the present invention.
- FIGURE 2 is a flow chart for the calling apparatus initialization steps according to the present invention.
- FIGURE 3 is a flow chart for the receiving apparatus initialization steps according to the present invention.
- FIGURE 4 is a flow chart for the scrambling steps according to the present invention.
- FIGURE 5 is a flow chart for the unscrambling steps according to the present invention.
- An apparatus is shown schematically at 10 in FIGURE 1. It interfaces with a communications link, such as standard telephone line, through an output line 40 and an input line 80. It interfaces with its user through a microphone 12 and a speaker 76.
- the apparatus carries out four functions. First, it establishes a communication link with a compatible apparatus that is also connected to a standard telephone line. Second, it exchanges the code information needed to scramble and unscramble the subsequent phone communication with the compatible apparatus on the other end of the communication link. Third, it scrambles the acoustical voice signals detected by the microphone 12 and transmits the resultant scrambled signals on the output line 40. And fourth, it receives scrambled signals on the input line 80, unscrambles said signals, and then plays back the unscrambled signals on the speaker 76.
- the first two functions are carried out by a computer 18 and a modem 19.
- the apparatus initiating the communication referred to as the calling apparatus, calls the apparatus which is to receive the communication, referred to as the receiving apparatus.
- the communication begins with a "hand-shaking" procedure in which the computer in the calling apparatus sends a digital message via the modem 19 to the computer 18 in the receiving apparatus.
- the computer 18 in the receiving apparatus responds with a corresponding message which is verified by the calling apparatus. This confirms that a compatible apparatus is connected to both ends of the communication link.
- the calling apparatus generates an -encrypting code and transmits it to the receiving apparatus in digital form using the modem 19.
- the receiving apparatus Upon receiving the encrypting code, the receiving apparatus generates a scrambling code and transforms said scrambling code into an encrypted scrambling code using the encrypting code sent by the calling apparatus. The receiving apparatus then transmits this encrypted scrambling code to the calling apparatus. The calling apparatus then decrypts the scrambling code. The scrambling code is then used by both the calling apparatus and receiving apparatus to control the scrambling and unscrambling of the subsequent voice communications between the two apparatuses.
- the encrypting code is of the type used in public key systems. It enables the receiving apparatus to encode the scrambling code in a manner such that it cannot be decoded except by the particular calling apparatus which generated the encrypting code.
- the function, f(n,x) is chosen such that the inverse function is essentially impossible to calculate without knowledge of an additional variable; thus even a knowledge of n will not allow x to be deduced from X.
- d is the decrypting code which must be known in addition to n if one is to decode the message X.
- n is the product of two large prime numbers p and q
- d [2(p-l) (q-l)+l]/3.
- the computer 18 generates prime numbers whenever it is not busy supervising a scrambled communication.
- random number new seed.
- ln(x) is the natural logorithm of x
- trunc(z) is the integer part of the number z
- e 2.71828.
- Prime number table 56 is stored in a non-volatile memory such as an EEPROM so that the table of primes will not be lost if power is removed from the apparatus.
- a random event generator 50 is used to periodically reset the pseudo-random number generator seed which is used to generate the pseudo-random numbers used for generating prime numbers and scrambling codes.
- the event chosen may be the difference in phase between the clock 58 and some quantity related to the phase of the AC signal on the power line to which the apparatus of the present invention is connected. Hence even an examination of the apparatus of the present invention will not be sufficient to predict the encrypting and decrypting codes that will be in use at some later time.
- the time needed to decode the scrambling code is sufficiently long to introduce a delay in the start of the communication if an encrypting system having sufficiently long codes to assure absolute security is used.
- the apparatus of the present invention is intended for wide spread use, and hence must employ inexpensive computer hardware to perform the various calculations. Such hardware lacks the speed needed to decode a scrambling code using a long encrypting code in a time period of less than a few seconds. It is sufficiently fast, however, to provide a level of security which is sufficient for most communications. For those communications requiring a higher level of security, the apparatus of the present invention provides a second mode of operation which is transparent to the user.
- two encrypting codes are sent to the receiving apparatus, a short code and a long code.
- the receiving apparatus returns two scrambling codes, a short scrambling code and a long scrambling code.
- the short scrambling code is immediately decoded and used to scramble the communication in which it is sent.
- the long scrambling code is stored along with the identity of the receiving apparatus in a table 57. This long code is decoded and stored after the communication is completed. If the same calling apparatus and receiving apparatus are reconnected in a subsequent communication, the long scrambling codes are used to govern that communication. Hence, a later high security communication can be set up by making a low security communication a few hours in advance of the intended high security communication.
- the second communication is commenced before the decoding process is finished and a previously decoded long code is available, that long code is used. If a previously decoded long code is not available, the short scrambling code transmitted at the start of this second communication is used instead of the long scrambling code which has not yet been decoded.
- the voice signals are scrambled by recording the voice for a predetermined time interval, dividing the time interval into a series of sub-intervals, and then replaying the voice recorded during each sub-interval. The order in which the sub-intervals are replayed is substantially different from the order in which the sub-intervals were recorded. This results in an unintelligible pattern.
- This playback order is determined by the scrambling code passed between the two apparatuses prior to the start of the voice communications.
- the scrambled signals are unscrambled by applying the process in reverse.
- the scrambled signals are recorded for the same predetermined time interval which is likewise divided into a series of sub-intervals.
- the scrambled signals recorded during each sub-interval are then replayed in the order specified by the scrambling code. Since both apparatuses have the same scrambling code, the unscrambling apparatus contains the information needed to properly play back the scrambled signals.
- the acoustical voice signals of the user are detected by the microphone 12 and converted into digital words by the analog to digital converter 14.
- Each digital word generated by the analog to digital converter 14 represents the output voltage of microphone 12 at a given sample time.
- the acoustical voice signal is sampled at a rate determined by a clock 58.
- the digital words so generated are stored in either a first scrambling buffer 22 or a second scrambling buffer 32 depending on the state of a switch 13 which is under the control of the computer 18.
- the digital words are stored in the appropriate buffer in the order in which they are generated by the analog to digital converter 14.
- the two scrambling buffers 22 and 32 are identical. In the preferred embodiment, each contains in excess of 6000 words and the sampling rate is chosen such that each buffer records approximately 3/4 or a second of speech from the microphone 12.
- each buffer may be read out through an associated multiplexing circuit.
- the multiplexing circuit associated with the first scrambling buffer 22 is shown at 20.
- the multiplexing circuit associated with the second scrambling buffer 32 is shown at 30.
- the output of the multiplexing circuits 20 and 30 is input to a digital to analog converter 16 which drives the output line 40.
- the choice of which scrambling buffer is to be read out at a given time is determined by a switch 15 which is also under the control of the computer 18.
- the scrambling buffers 22 and 32 are each divided into a plurality of sub-buffers 24.
- Each sub-buffer will preferably store 256 digital words of voice data.
- the associated multiplexing circuits 20 and 30 select which of the sub-buffers is to be read out at a given time.
- the contents of each sub-buffer are read out one word at a time in the sequence in which they were stored in that sub-buffer.
- the scrambling of the signal results from scrambling the order in which the sub-buffers are replayed rather than scrambling the contents of each sub-buffer.
- the order in which the individual sub-buffers are chosen for replaying is determined by the computer using a scrambling table 52 which contains an ordered list of the sub-buffers generated using the scrambling code.
- the order in which the sub-buffers are read out is essentially random.
- one or more of the sub-buffers 24 may be read-out in an order different from that in which the contents of said sub-buffer 24 were stored.
- the contents of said sub-buffer could be read-out in the reverse order. That is, instead of reading out the contents in the order "first in first out", the contents would be read-out in the order "last in first out”.
- the sub-buffers to be read-out in this manner may be specified by including a second seed in the scrambling code. This seed is used to define a second pseudo-random number sequence which in turn specifies the sub-buffers to be read-out in the altered order. Embodiments in which the read-out sequence is varied according to some other ordering procedure will be apparent to those skilled in the art.
- the lengths of the various sub-buffers 24 as well as the number of such sub-buffers may be made variable.
- the scrambling table 52 would contain the number of sub-buffers, the length of each sub-buffer and the starting location of each sub-buffer in the relevant scrambling buffer, in addition to the order in which the sub-buffers are to be read-out.
- the lengths of the sub-buffers are chosen using an independent pseudo-random number sequence generated from an additional seed which is communicated as part of the scrambling code.
- the scrambling buffers 22 and 32 are alternatively filled and replayed.
- the scrambled conversation is delayed by the time needed to fill a buffer and read it out onto the communication link. This time delay may be reduced by employing the "sliding window" technique described by Becker and Piper in Cypher Systems (Wiley Interscience, 1982) which is hereby incorporated by reference. The time delay in question is only necessary if we allow every permutation of the sub-buffers.
- a two buffer time delay is needed because sufficient time must be allowed to properly decode a transmission in which the last sub-buffer to be filled was the first sub-buffer to be read-out.
- the sending apparatus must wait for all the sub-buffers to be filled before it can commence reading out the buffer in question onto the communication link.
- the receiving apparatus must wait until all the sub-buffers are filled before it can commence reading out the buffer in question into the speaker. If one limits the possible permutations of the sub-buffers such that any given sub-buffer is not moved more than some maximum number, N, of sub-buffers from its original position, read out may be commenced before the entire buffer is filled.
- read-out may be commenced as soon as the first N sub-buffers are filled.
- This maximum number of sub-buffers must be large enough to prevent cryptanalytic attack. However, this number can be substantially less than the entire length of the buffer in question. Thus, substantial reduction in the time delays may be obtained using this technique.
- the buffer length must be sufficiently long to accommodate enough sub-buffers for security, but it must also short enough to assure that long time delays are not introduced into the communication.
- the scrambled signals received over the input phone line 80 are unscrambled in an analogous manner.
- the scrambled signals are converted to digital words by an analog to digital converter 62.
- the output of the analog to digital converter 62 is stored in one of two unscrambling buffers 68 or 70 depending on the state of the switch 63 which is under the control of the computer 18.
- the unscrambling buffers 68 and 70 are identical to the scrambling buffers 22 and 32 used to store the voice signals prior to scrambling.
- Each unscrambling buffer is divided into a plurality of sub-buffers 72.
- the digital values stored in a given sub-buffer may be replayed into a digital to analog converter 74 which drives the speaker 76.
- the replaying is accomplished with the aid of a multiplexing circuit associated with the unscrambling buffer in question.
- the multiplexer circuit associated with unscrambling buffer 68 is shown at 64. That associated with unscrambling buffer 70 is shown at 66.
- Each of the multiplexer circuits is under the control of the computer 18 which has access to an unscrambling table 54 which contains the order in which the unscrambling buffers are to be replayed.
- the values in each sub-buffer are replayed in the order in which they were received from the analog to digital converter 62, since it is only the order of the sub-buffers that has been scrambled.
- the computer communicates the starting and ending addresses of each sub-buffer together with the proper read-out order to the relevant multiplexing circuit.
- This data is contained in scrambling and unscrambling tables 52 and 54. Since both the sending and receiving apparatuses use the same procedures to generate this order starting from the same pseudo-random number seeds, the necessary information is available to both computers. While one unscrambling buffer is being replayed, the other is being filled by the analog-to-digital converter 62. At the end of the replaying operation, the roles of the unscrambling buffers are reversed by reversing the positions of the switches 63 and 73.
- the scrambling table 52 and the unscrambling table 54 are generated using a pseudo-random number generator which is originally seeded with the scrambling code. Such generators are well known to those skilled in the computer sciences.
- each buffer is divided into 32 sub-buffers.
- the scrambling table 52 contains a list of the numbers from 1 to 32 in an essentially random order. This table may be produced by assigning a pseudo-random number,to each of the integers from 1 to 32 and then reordering this list of integers based the psuedo-random number assigned to each.
- the corresponding unscrambling table 54 contains the inverse of this list. After each table is used, a new table is calculated. The new table replaces the oldest table stored.
- frequence inversion scrambling techniques may be applied to the output of the present invention before said output is placed on the communication link.
- the addition of frequency inversion scrambling to the output signal results in reduced residual intelligibility of the signal on the communication link.
- a frequency inversion scrambling circuit 110 is used to transform the output of the digital-to-analog converter 16 before said output is placed on the communication link.
- An analogous frequency inversion descrambling circuit 104 removes the frequency inversion scrambling before the signal from the communication link is inputted into the analog-to-digital converter 62.
- the protocols used by the frequency inversion scrambling circuit 110 and the frequency inversion descrambling circuit 104 are governed by a separate pseudo-random number seed which is passed as part of the scrambling code exchanged at the beginning of the communication.
- a frequency inversion scrambling circuit transforms the frequency spectrum of the signal inputted to it into a different frequency spectrum.
- the signal to be transformed may be represented mathematically by the equation
- Fj_(f) is a function describing the ith frequency band which is centered about a frequency f, and ⁇ (t) is the amplitude of the ith frequency component of the signal S(t).
- frequency inversion scrambling is one in which the relationship between the Ai's and the B 's is given by This transformation results in low frequency sounds being converted into high frequency sounds, and high frequency sounds being converted into low frequency sounds.
- the B ⁇ 's could be calculated from the Ai's by randomizing the order of the A ⁇ 's using a pseudo-random number sequence generator seeded with a seed passed as part of the scrambling code. In this case
- B k A where j is chosen at random from a set of values which is initially l,2,...,n. Each time a j is so chosen, that j is removed from the set in question. This guarantees that each A ⁇ will be used once and only once.
- the frequency inversion unscrambling circuit 104 performs the inverse transformation.
- the frequency scrambled signals inputted to it from the communication link on line 80 are decomposed into a list of amplitudes representing the amplitude of the said frequency scrambled signals in each of the frequency bands used by the frequency scrambling circuit 110.
- This list of amplitudes is then reordered using the inverse of the transformation employed by the frequency scrambling circuit 110 to scrambling the signals inputted to it. Since each of the apparatuses at the two ends of the communication link are using the same scrambling code, both apparatuses have the necessary information to- construct this inverse transformation.
- the transformed list of amplitudes is then used to generate an electrical signal which is inputted to the analog-to-digital converter 62.
- Means for generating an analog signal from a list of values representing the amplitude of said signal in each of a plurality of predetermined frequency bands are well known to those skilled in the electronic circuit arts.
- such circuits consist of a number of oscillators.
- One such oscillator is provided for each frequency band, the frequency of said oscillator being that of the frequency at the center of said band.
- the amplitude of the output of each said oscillator is controlled by an input signal which is proportional to the corresponding value in said list.
- the outputs of all the oscillators are combined in a suming circuit to produce the signal in question.
- means for generating a list of values representing the amplitude of an analog signal in each of a plurality of predetermined frequency bands are also well known to those skilled in the electronic circuit arts.
- such circuits consist of a series of band pass filters and means for measuring the output amplitude of the signal transmitted by each said filter when the analog signal in question is inputted to said filters.
- the band of frequencies passed by each said filter corresponds to the band of frequencies in one of said predetermined frequency bands
- the amplitude of the signal passed by said filter corresponds to the said value representing the amplitude of said analog signal in said frequency band.
- the scrambling code can also specify the times during the communication at which the transformation in question is changed.
- the frequency . inversion scrambling circuit 110 could alternate between a mode in which simple frequency inversion scrambling as described above is used and no frequency inversion scrambling is used.
- the times at which the transitions are made could be specified by a pseudo-random number generator using a seed passed as part of the scrambling code.
- the frequency inversion scrambling circuit may be placed at other locations in the communication path.
- the frequency inversion scrambling circuit 110 could be placed between the analog-to-digital converter 16 and the microphone 12.
- the corresponding frequency inversion descrambling circuit would be placed between the digital to analog converter 74 and the speaker 76. Since the frequency inversion scrambling is independent of the time element scrambling, the order in which the two scrambling techniques are applied to the signal is not important. It is essential to the operation of the system that both the calling apparatus and receiving apparatus remain synchronized with one another.
- a synchronization generator 78 is used to periodically send a signal in the form a pulse at a specified frequency on the communication link. This signal is detected by the apparatus at the other end of the communication link by a synchronization detector 60. During the transmission of this signal, the digital to analog converter 74 is squelched to prevent the signal in question from introducing noise into the communication. The synchronization signal is used to reset the location in the buffer in which the analog-to-digital converter 14 stores its output.
- a notch filter 96 of conventional design may be included between the digital to analog converter 16 and the communication link to prevent the synchronization detector 60 in the corresponding apparatus at the other end of the communications link from mistaking scrambled speech for the synchronization pulse in question.
- This filter substantially removes the frequency components of the scrambled speech from the narrow band of frequencies corresponding to the synchronization pulses.
- the output of the digital to analog converter 16 may be squelched during a short time period which includes the time at which a synchronization pulse is expected. This further limits the possibility of mistaking scrambled speech produced by either apparatus from being mistaken as a synchronization pulse.
- the synchronization pulses are sent out at varying times relative to the times at which the contents of the scrambling buffers are sent. If the synchronization pulses are sent at regular intervals, e.g., after every buffer is read out, an opponent would know how to at least synchronize his device with the scrambler. By varying the times of the synchronization pulses relative to the beginning of the buffer read out, the opponent in question is deprived of this information. Hence, the synchronization pulses are sent out at pseudo-random intervals determined by an independent pseudo-random number generator.
- the scrambling code exchanged by the apparatuses during the initialization procedure contains a seed for this independent pseudo-random number generator as well as the seed used in the pseudo-random number generator which specifies the sequence in which the various sub-buffers are read out.
- Each apparatus includes an "offset" table 92 which specifies the time at which the next synchronization pulse is expected relative to the time at which the read out of a particular buffer is to be commenced.
- the synchronization generator 78 in each apparatus has access to a corresponding offset table 94 which specifies the times at which synchronization pulses are sent relative to the times at which the contents of the scrambling buffer are sent. The apparatus receiving the synchronization pulse compares its time of arrival to that given in the table and adjusts its timing accordingly.
- the apparatus of the present invention is intended for use on a communication link consisting of a standard telephone communication system.
- the input line 80 and the output line 40 must share the same communications path.
- A's sidetone is delayed by two buffer read out times because his speech must be stored in a scrambling buffer prior to being read out onto the line and the speech which is read out into the line is further delayed by the time needed to fill the unscrambling buffer in A's apparatus and to then ' unscramble it.
- A's sidetone appears as an echo in his earphone.
- A's unscrambling circuits are synchronized to unscrambling signals originating in B's apparatus, not in A's apparatus. Hence, A's sidetone will not be properly unscrambled.
- the signals leaving B's apparatus arrive at A's apparatus after a delay which depends on the length of the communication link and the various switching circuits employed in said communication link.
- the synchronization pulses exchanged by the two apparatuses keep A's unscrambling buffer synchronized wtih B's scrambling buffer. Since A's signals "arrive" at his apparatus without the above mentioned delay, they will not be properly synchronized with A's unscrambling buffer. Thus, A will hear his speech scrambled in his earphone delayed by two buffer read out times. In addition to this echo, the local loop modifies the currents generated by A in a manner which is frequency dependent, unpredictable, and which varies with time. Hence, merely subtracting A's output onto the loop from the input to A's unscrambling circuits will not eliminate this scrambled sidetone.
- the sidetone is supressed by squelching.
- Simple squelching systems are well known to the art, e.g., push to talk or VOX. These systems are inadequate for scrambled communications.
- These prior art systems operate by squelching A's earphone during the time he is speaking. However, since A's speech is delayed by the time needed to read out A's scrambling buffer and the time needed to read the contents back into A's unscrambling buffer, this squelching procedure results in A's earphone being squelched at the wrong time.
- the apparatus of the present invention avoids this problem by squelching the input to A's unscrambling buffer in response to a signal actually being output to the communication link rather than in response to a signal detected at A's microphone as is the case in conventional squelching or VOX systems.
- the output of A's digital to analog converter 16 indicates that scrambled signals are being output by A onto the communication link
- the output of A's analog-to-digital converter 62 which feeds A's unscrambling buffer, is forced to be zeros by the computer 18.
- no signals are output to A's earphone from its unscrambling buffer during this corresponding time.
- Figure 2 is a flow chart for the initialization sequence programs used by the calling apparatus in .
- establishing a scrambled communication with the receiving apparatus The communication link is initially established in a conventional manner by the calling apparatus dialing the number of the receiving apparatus and placing the relevant tones on the telephone lines. This software is in the modem 19.
- the calling apparatus sends a first message in digital form and waits for a second message from the receiving apparatus.
- the second message is compared with the text of an expected second message stored in the computer 18 of the calling apparatus. If it does not match, the calling apparatus enters a non-secure communication mode in which the calling apparatus does not scramble the conversation. If the second message matches that stored in the calling apparatus, the calling apparatus generates an encrypting code and transmits it to the receiving apparatus.
- the encrypting code is generated by selecting two prime numbers from a table 56 of primes stored in the calling apparatus. When the apparatus of the present invention is not busy communicating with another apparatus of the present invention, it generates prime numbers and stores them in table 56. The two prime numbers selected from the table 56 for use in a given communication are selected at random from the stored primes by generating pseudo-random numbers which define which entries in the table are to be used. The encrypting code is the product of the two prime numbers selected. The encrypting code is transmitted to the receiving apparatus in digital form by the modem 19. The calling apparatus then waits for an encrypted scrambling code to be received from the receiving apparatus over the modem 19 in digital form.
- the encrypted scrambling code is then decrypted, using the method described above, and stored in the computer 18.
- the scrambling code is then used as a seed for a pseudo-random number generator used to calculate the values to be entered into the scrambling and unscrambling tables.
- each of the buffers used to store the digital values representing the output voltage of the speech input to the microphone 12 of the present invention is divided into 32 sub-buffers 24.
- the scrambling and unscrambling tables, 52 and 54 each consist of a list of the 32 addresses of the sub-buffers. The 32 addresses are placed in the table in question in a random order.
- the random order is created by first ordering the addresses in ascending order in a scratch table contained in the computer 18 and then assigning a pseudo-random number to each of the addresses.
- the addresses are then reordered in the scratch table according to the pseudo-random number assigned to each and transferred to the scrambling table 52.
- the reordered table contains as its first entry the address which was assigned the largest pseudo-random number, as its second entry the address which was assigned the second largest pseudo-random number and so on.
- the scrambling table 52 is a mapping of the contents of a scrambling buffer in one apparatus into the unscrambling buffer of the other apparatus.
- the unscrambling table 54 is the inverse mapping. Its first entry is the address in the unscrambling buffer at which the data which was originally stored in the first sub-buffer of the scrambling buffer in the other apparatus will be stored when that data is received. Its second entry is the address in the unscrambling buffer at which the data which was originally stored in the second sub-buffer of the scrambling buffer of the other apparatus will be stored, and so on.
- both apparatuses are scrambling data using the same scrambling table 52._
- the data received by one apparatus from the other is not unscrambled until an unscrambling buffer has been filled and switched to the digital to analog converter 74. It takes the same amount of time to readout a scrambling buffer as to read in the data for the unscrambling buffer. Hence, by the time an unscrambling buffer has been filled, the apparatuses will have generated new scrambling tables.
- the unscrambling table which is used is the one corresponding to the scrambling table which was used prior to the scrambling table currently being used to scramble the signals.
- the unscrambling table 54 contains space for two "unscrambling tables", a first table corresponding to the scrambling table currently being used to scramble data for output to the communication link .and a second table corresponding to the scrambling table used prior to said first table.
- Figure 3 is a flow chart for the initialization sequence programs used in the receiving apparatus.
- the receiving apparatus begins by answering the telephone and establishing a communication link using the modem 19. It then waits for a first message to be received from the calling apparatus and tests that message against an expected message stored in the computer 18 contained in the receiving apparatus. If the received message does not match the stored message, the receiving apparatus remains in an non-secure mode in which voice communications are not scrambled. If the received message matches the stored message, the receiving apparatus responds by sending a second predetermined message to the calling apparatus.
- each message sent by the calling and receiving apparatuses consists of three parts, a character specifying the length of an ASCII string of characters, the ASCII string in question, and two characters specifying a cyclic redundancy check (CRC) .
- the CRC is computed by conventional means.
- the apparatus which receives the message computes its own CRC check on the message. If it matches the CRC in the message, it sends the ASCII character ACK (hex 06) . If it does not match, it sends the ASCII character NAK (hex 15) and waits for the sending machine to repeat the message. If the message is not correctly transmitted after a predetermined number of attempts, the apparatuses enter the non-secure mode.
- one of the apparatuses sends a message on the communication link to the other, it waits for either an ACK or NAK response indicating whether the transmission was successful or not. If unsuccessful, it repeats the message.
- the receiving apparatus waits for the calling apparatus to send an encrypting code to be used by it in transmitting a scrambling code to the calling apparatus.
- the scrambling code is then generated using a pseudo-random number generator.
- the pseudo-random number is generated using standard pseudo-random number procedures. The procedures typically calculate a pseudo-random number from a "seed" number. A new seed is then calculated and used to calculate the next pseudo-random number.
- the seed used to generate the pseudo-random numbers which will be used to • calculate the next prime number and the next scrambling codes is altered in response to an event which cannot be predicted from the past behavior of the receiving apparatus. For example, when a call is received, the receiving apparatus can change the seed by measuring the time difference between the beginning of the call and the time at which the AC line voltage which provides the power for the receiving apparatus crosses zero volts.
- the computer can choose a new seed for the pseudo-random number generator used to generate prime numbers and scrambling codes.
- the new seed value is based on the time interval between the current call and the one preceding it. Since there is no way of predicting the intervals at which calls are made from the apparatus, this guarantees that the next encrypting and decrypting codes as well as the next scrambling code generated by the apparatus may not be predicted from an examination of the apparatus.
- the scrambling code is stored in the receiving apparatus and then encoded using the encrypting procedure described above. The encoded scrambling code is then transmitted to the calling apparatus.
- the receiving apparatus then resets the various buffers and counters contained therein and waits for a synchronization signal from the calling apparatus. Upon receipt of the synchronization signal, it enters the secure communication mode in which the speech signals input to the receiving apparatus are scrambled and output onto the communications link and the scrambled speech signals received from the communications link are unscrambled and output onto the speaker in the receiving apparatus.
- Figure 4 is a flow chart for the scrambling functions in both the calling apparatus and receiving apparatus.
- the calling apparatus and receiving apparatus each contain buffers 22 and 32 for storing a digital representation of the speech signals inputted into the apparatus of the present invention. These buffers are divided into sub-buffers 24 which are read out during the scrambling process. Each sub-buffer 24 is read out in its entirety before reading out the next sub-buffer 24. The order in which the sub-buffers are to be read out is stored in a scrambling table 52 which contains the address of each of the sub-buffers. Initially, a pointer is set to the first entry in this table. The address defined by this pointer is loaded into the appropriate multiplex circuit by the computer.
- the contents of the sub-buffer so identified are read out of that sub-buffer one slot at a time and then transmitted to the digital to analog converter 16.
- the pointer is incremented and the process repeated until the pointer has been incremented past the last entry in the scrambling table.
- a new scrambling table 52 is then generated using the pseudo-random number generator in the same manner as was done in generating the previous table.
- the buffers used in the scrambling process are then switched in roles. The buffer which was just read out being used to accumulate data from the microphone 12. The buffer which had been accumulating data from the microphone is now switched to the digital-to-analog converter 16.
- Figure 5 is a flow chart of the unscrambling functions in both the calling and receiving apparatuses.
- the calling and receiving apparatuses each contain buffers 68 and 70 for storing a digital representation of the scrambled voice signals inputted from the communication link.
- the buffer is switched to an output mask in which each of the sub-buffers making up this buffer may be connected to the digital-to-analog converter which drives the speaker.
- a pointer is set to indicate the first entry in the unscrambling table which contains the address of this first sub-buffer to be read out into the speaker 76.
- the address of sub-buffer so identified is entered in the multiplexer circuit by the computer and the contents of that sub-buffer read out to the digital to analog converter, one slot at a time.
- the pointer is incremented, and the next sub-buffer is read out.
- the buffer which had been accumulating data during the read out of the present buffer is switched to the read out mode, the present buffer being switched to accumulate the incoming voice patterns.
- a new unscrambling table is then loaded, and the processes repeated.
- each apparatus Periodically, each apparatus generates a synchronization pulse which is used by the apparatus at the other end of the communication link to synchronize its operation. This pulse is generated at the end of every Nth buffer read out.
- both the calling and receiving functions are contained in the same apparatus.
- these functions are contained in separate machines. Separately the functions would provide an added degree of security in specialized systems such as those used for carrying out banking operations.
- a system in which the calling apparatus has significantly more computing capability than the receiving apparatus would allow use of longer encrypting codes and have a higher degree of security.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
- Slot Machines And Peripheral Devices (AREA)
- Telephone Function (AREA)
- Air Bags (AREA)
Abstract
Nouveau système de brouillage à élément de temps et ses composants, permettant de communiquer par l'intermédiaire d'une liaison de communication (40, 80) ne garantissant pas une sécurité suffisante, telle qu'une ligne téléphonique. Les opérations de brouillage et de débrouillage sont spécifiées par un code de brouillage qui est échangé par les deux appareils (10, 10) à chaque extrémité de la liaison de communication (40, 80) sous une forme cryptée (en utilisant un code à clef public) lors de l'établissement de la liaison de communication (40, 80). Par la suite, chaque appareil (10) utilise le code de brouillage pour brouiller sa communication avec l'autre appareil (10). La production de ces deux codes et leur échange par les deux appareils (10, 10) est transparente aux utilisateurs. La manière selon laquelle les codes sont produits garantit qu'un code produit ultérieurement ne peut être prédit en examinant l'appareil (10) en question à n'importe quel moment sensiblement avant l'instant où la liaison de communication (40, 80) est établie ou par la suite.New time element jamming system and its components, enabling communication via a communication link (40, 80) not providing sufficient security, such as a telephone line. The scrambling and unscrambling operations are specified by a scrambling code which is exchanged by the two devices (10, 10) at each end of the communication link (40, 80) in an encrypted form (using a key code public) when establishing the communication link (40, 80). Thereafter, each device (10) uses the scrambling code to scramble its communication with the other device (10). The production of these two codes and their exchange by the two devices (10, 10) is transparent to users. The manner in which the codes are produced ensures that a code produced later cannot be predicted by examining the device (10) in question at any time substantially before the time when the communication link (40, 80) is established or thereafter.
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US74993985A | 1985-06-27 | 1985-06-27 | |
US749939 | 1985-06-27 |
Publications (1)
Publication Number | Publication Date |
---|---|
EP0228455A1 true EP0228455A1 (en) | 1987-07-15 |
Family
ID=25015857
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP19860904577 Withdrawn EP0228455A1 (en) | 1985-06-27 | 1986-06-26 | Scrambling apparatus |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP0228455A1 (en) |
AU (1) | AU6128686A (en) |
WO (1) | WO1987000377A1 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102008018615B3 (en) * | 2008-04-11 | 2009-06-25 | Eurocopter Deutschland Gmbh | Apparatus and method for generating a monitor sound |
CN106792352B (en) * | 2016-12-22 | 2020-01-24 | 苏州华启智能科技有限公司 | Side-tone eliminating circuit and two-wire full duplex intercom device using same |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4020285A (en) * | 1972-09-29 | 1977-04-26 | Datotek, Inc. | Voice security method and system |
US4200770A (en) * | 1977-09-06 | 1980-04-29 | Stanford University | Cryptographic apparatus and method |
US4377862A (en) * | 1978-12-06 | 1983-03-22 | The Boeing Company | Method of error control in asynchronous communications |
FR2466144B1 (en) * | 1979-09-18 | 1986-11-07 | Lignes Telegraph Telephon | METHOD FOR TESTING A LINE FOR TRANSMITTING DIGITAL DATA BETWEEN TWO MODEMS AND DEVICE IMPLEMENTING THIS METHOD |
US4280193A (en) * | 1979-12-14 | 1981-07-21 | Burroughs Corporation | Data link processor for magnetic tape data transfer system |
US4433211A (en) * | 1981-11-04 | 1984-02-21 | Technical Communications Corporation | Privacy communication system employing time/frequency transformation |
-
1986
- 1986-06-26 WO PCT/US1986/001364 patent/WO1987000377A1/en not_active Application Discontinuation
- 1986-06-26 EP EP19860904577 patent/EP0228455A1/en not_active Withdrawn
- 1986-06-26 AU AU61286/86A patent/AU6128686A/en not_active Abandoned
Non-Patent Citations (1)
Title |
---|
See references of WO8700377A1 * |
Also Published As
Publication number | Publication date |
---|---|
AU6128686A (en) | 1987-01-30 |
WO1987000377A1 (en) | 1987-01-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU723304B2 (en) | Apparatus and method for secure commmunication based on channel characteristics | |
US4797672A (en) | Voice network security system | |
US4160120A (en) | Link encryption device | |
US5193115A (en) | Pseudo-random choice cipher and method | |
US4434323A (en) | Scrambler key code synchronizer | |
US6907123B1 (en) | Secure voice communication system | |
EP0677939A2 (en) | Wireless communications privacy method and system | |
US20200021566A1 (en) | Dynamic encryption method | |
EP0994598A1 (en) | Cryptation system for packet switching networks based on digital chaotic models | |
CN1015950B (en) | Duplex analog scrambler | |
US5696880A (en) | Communication system user authentication method | |
US20050232424A1 (en) | Method and system for encryption of streamed data | |
WO2001010071A1 (en) | System and method for secured data transmission within a wireless communication system | |
US7023997B1 (en) | Secure messaging communication system | |
EP0228455A1 (en) | Scrambling apparatus | |
JPH07303104A (en) | Storage type communication system with encryption function | |
Beker | Analogue speech security systems | |
Massey | On probabilistic encipherment | |
Mitchell et al. | A classification of time element speech scramblers | |
EP0216595A2 (en) | Data encryption | |
JP2703901B2 (en) | Secret device | |
RU2325766C2 (en) | Information protection method | |
Vaishnavi et al. | A Microprocessor-Based Real Time Voice Encryptor | |
JPH04192736A (en) | Ciphering device | |
Brackett | DIGITAL TRANSMISSION OF VOICE" A study for the Department of Communications Ottawa, Ontario, Canada |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 19870305 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE CH DE FR GB IT LI LU NL SE |
|
R17P | Request for examination filed (corrected) |
Effective date: 19870625 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN WITHDRAWN |
|
18W | Application withdrawn |
Withdrawal date: 19880205 |
|
RIN1 | Information on inventor provided before grant (corrected) |
Inventor name: WEISMAN, JOE Inventor name: CARLSON, CHARLES, EDWARD Inventor name: MAISEL, DOUGLAS, ANDREW Inventor name: MCREYNOLDS, JOHN, FREDERICK |