Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

SDH signal encryption method realized by key bytes

A signal encryption and byte technology, applied in multiplex communication, digital transmission system, secure communication device, etc., can solve problems such as unrealizable, key byte encryption, unknown information, etc., and achieve the goal of reducing hardware processing speed Requirements, the effect of good encryption effect

Inactive Publication Date: 2010-02-10
中国人民解放军西安通信学院
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Source encryption only encrypts low-speed information streams; channel encryption mainly encrypts information payloads. Although it reduces the encryption rate to a certain extent, it still relies heavily on high-speed encryption chips. For some ultra-high-speed data Encryption (such as Tbit / s level) can do nothing at all, and the encryption of the information payload cannot realize the complete encryption of the high-speed channel flow and key bytes. Although the intruder does not know the true meaning of the information, they only need to know the trend and frequency of the information. can achieve the purpose of eavesdroppers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SDH signal encryption method realized by key bytes
  • SDH signal encryption method realized by key bytes
  • SDH signal encryption method realized by key bytes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The method of encrypting SDH high-speed signal by using key bytes, the key overhead bytes provided in the SDH frame structure: frame synchronization bytes (A1, A2 bytes) and data communication channel bytes (D1-D12 bytes) encryption;

[0019] The frame sync bytes and the data communication channel bytes can also be encrypted separately, that is, only the frame sync bytes or only the data communication channel bytes are encrypted. The frame synchronization byte plays the role of frame positioning, and its protection can well realize the encryption of information; the data communication channel byte carries the network management information of the SDH transmission system, and its protection is related to the normal operation of the entire network, management and maintenance.

[0020] attached figure 1 It is the frame structure diagram of STM-1 in SDH. It consists of 9 rows x 270 columns (bytes) and is divided into three parts: segment overhead, pointer and information...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method which realizes the encryption of SDH signals by making use of key bytes; wherein, the encryption of frame synchronization bytes is realized by randomly selecting a key from a key table by every N frames of a sending end and inserting a key number of the key into unused overhead bytes of a frame structure after the sending end and a receiving end realize the framesynchronization, and at the same time, the encryption operation for the present frame synchronization bytes is carried out by the key and operating results are inserted into the frame structure as newframe synchronization bytes and every N frames change a value of the frame synchronization bytes; a frame synchronization module of the receiving end continuously monitors an unused byte, and once the value changes, corresponding keys are found from the key table to make decryption operation for the value of the present frame synchronization bytes according to the value; the encryption of data communication channel encryption bytes is made before the SDH is framed and the decoding of the data communication channel encryption bytes is realized after the receiving end is decoded. The method avoids the problem brought about by direct encryption of high speed information payload, lowers down the requirements for the processing speed of hardware in the encryption operation and has good encryption effect.

Description

technical field [0001] The invention relates to a method for encrypting SDH signals by utilizing key bytes. Background technique [0002] The basic transmission module of the digital synchronization series (SDH) is STM-1, the bit rate is 155520kbit / s, most of the backbone lines use STM-16, the bit rate is 2488320kbit / s, and some trunk lines use STM-64, the bit rate is 9953280kbit / s , which belongs to the high-speed channel. [0003] For information encryption in the SDH transmission system, source encryption or SDH channel information payload encryption is mainly used at present. Source encryption only encrypts low-speed information flow; channel encryption mainly encrypts information payload. Although it reduces the encryption rate to a certain extent, it still relies heavily on high-speed encryption chips. For some ultra-high-speed data The encryption (such as Tbit / s level) is completely powerless, and the encryption of the information payload cannot achieve complete enc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/18H04J3/06
Inventor 杨世平邓大鹏解东宏张引发杨君刚林初善王英杰赵峰
Owner 中国人民解放军西安通信学院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products