A security encryption method and decryption method for train CAN bus communication

A CAN bus, communication security technology, applied in bus network, secure communication device, key distribution, can solve problems such as cracking and tampering, easy to be monitored by attackers in train CAN bus communication, and unable to judge the authenticity of data, etc., to achieve the steps Simplicity and safety-enhancing effect

Active Publication Date: 2022-03-18
CSR ZHUZHOU ELECTRIC LOCOMOTIVE RES INST
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to solve the problem that the train CAN bus communication is easy to be monitored, cracked and tampered by attackers and the authenticity of the data cannot be judged in practical applications, the present invention proposes a train CAN bus communication security encryption method and decryption method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security encryption method and decryption method for train CAN bus communication
  • A security encryption method and decryption method for train CAN bus communication
  • A security encryption method and decryption method for train CAN bus communication

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0049] This embodiment relates to a secure encryption method for train CAN bus communication.

[0050] Combine below figure 1 The flow chart of the train CAN bus communication security encryption process in the middle left half and figure 2 To specifically illustrate the CAN bus communication security encryption method. Such as figure 1 and figure 2 As shown, the train CAN bus communication security encryption method of this embodiment mainly includes the following steps 11 to 13.

[0051] In step 11, a first key and a second key are determined.

[0052] In a preferred embodiment of the present invention, both the first key and the second key use Gold codes, and the generation expression is XOR of two m-sequences. Because the Gold code has the advantages of easy generation, strong regularity, random distribution of 0 and 1 codes, and it is difficult to be guessed without knowing the expression of the generated Gold code, so applying it to the train CAN bus communication...

no. 2 example

[0068] This embodiment relates to a secure decryption method for train CAN bus communication.

[0069] In addition to the above-mentioned safe encryption method for train CAN bus communication, the present invention also includes a safe decryption method for train CAN bus communication. figure 1 The middle right half is the flow chart of the train CAN bus communication security decryption process. Combine below figure 1 and image 3 To specifically illustrate the train CAN bus communication security decryption method. The secure decryption method for train CAN bus communication in this embodiment mainly includes the following steps 21 to 23.

[0070] In step 21, the receiver first receives the encrypted CAN message. Here, the encrypted CAN message includes the receiving end verification code, the encrypted data message encrypted by the first key, and the encrypted ID message encrypted by the second key.

[0071] In step 22, it is judged whether the encrypted CAN message i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a train CAN bus communication security encryption method and a decryption method. The encryption method includes: determining the first key and the second key; using the first key to encrypt the data message in the CAN message to be encrypted; using the second key to encrypt the identity authentication message in the CAN message to be encrypted Encryption; use the encrypted data message and the encrypted identity authentication message to generate the receiving end verification code; determine and send the encrypted CAN message, the encrypted CAN message includes the encrypted data message, the encrypted identity authentication message and Receiver verification code. The invention greatly enhances the difficulty of deciphering data messages and identity authentication messages, effectively prevents CAN messages from being tampered with, and increases the security of information transmission.

Description

technical field [0001] The present disclosure relates to the field of electrical systems, in particular to a secure encryption method for train CAN bus communication, and also relates to a secure decryption method for train CAN bus communication. Background technique [0002] CAN bus communication technology has the characteristics of short frame data structure, non-destructive bus arbitration technology, flexible communication mode, etc. It can meet the real-time and reliability requirements of train communication, but there are hidden dangers in terms of security. specifically: [0003] 1. The CAN bus transmits messages by broadcasting, and all nodes can receive messages on the bus, which provides the possibility for message information monitoring, and the message is a short frame structure, the attacker can quickly crack the CAN data and frame ID; [0004] 2. The passive address information in the message transmitted by the CAN bus cannot confirm whether the received da...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/08H04L12/40
CPCH04L63/0478H04L63/12H04L9/0861H04L12/40H04L2012/40215
Inventor 高英明宁侨邹智荣粟荡唐鹏辉莫云罗源
Owner CSR ZHUZHOU ELECTRIC LOCOMOTIVE RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products