Research on end-to-end encryption of TETRA

被引:1
作者
Beijing FORICH Software Technology Co. Ltd., Network Security Division, Beijing 100083, China [1 ]
不详 [2 ]
机构
[1] Beijing FORICH Software Technology Co. Ltd., Network Security Division
[2] Information Security Center, Beijing University of Posts and Telecommunications
来源
J. China Univ. Post Telecom. | 2006年 / 2卷 / 70-73期
基金
中国国家自然科学基金;
关键词
Confidentiality; End-to-end encryption; Integrity; TETRA;
D O I
10.1016/S1005-8885(07)60107-1
中图分类号
学科分类号
摘要
The Terrestrial Trunked Radio (TETRA) system uses end-to-end encryption in addition to the air interface encryption to provide enhanced security. The TETRA system uses a synchronization technique known as frame stealing to provide synchronization of end-to-end encrypted data. However, the frame stealing process degrades the quality of video. This paper proposes an end-to-end encryption system with the frame stealing technique for voice and frame insertion for video. A block cipher in the output feedback mode is used to implement the end-to-end key stream generator. Moreover. In the Short Data Service (SDS) message encryption, a block cipher in the Cipher Block Chaining (CBC) mode is used to calculate the cryptographically secure checksum, which is sufficient to certify the integrity.
引用
收藏
页码:70 / 73
页数:3
相关论文
共 16 条
[1]  
TETRA: Teneral network design, (2005)
[2]  
TETRA security mechanisms, (2003)
[3]  
Wireless distributed communication systems, (2004)
[4]  
TETRA security An overview, (2003)
[5]  
Sui A.-F., Wang J., Research and comparison of security mechanisms in GSM and IS-41, Journal of Chongqing Institute of Posts and Telecommunications, 16, 1, pp. 66-69, (2004)
[6]  
DECT Common Interface Security features, (2004)
[7]  
Lin H., Lein H., Authentication in wireless communications, Proceedings of IEEE Global Telecommunications Conference, 1, pp. 550-554, (1993)
[8]  
TETRA: Security aspects, version 2.2.1, (2004)
[9]  
TETRA MoU SFPG recommendation 02-end-to-end encryption, (2003)
[10]  
Zhang Z.-H., Hu B., Yang Y.-X., Research on encryption mechanism of TETRA, Communications Technology, 2, pp. 118-120, (2004)