Acta Metallurgica Sinica(English letters)

Previous Articles     Next Articles

Research on end-to-end encryption of TETRA

ZHANG Zhi-hui; YANG Yi-xian
  

  1. Beijing FORICH Software Technology Co., Ltd., Network Security Division, Beijing 100083, China
  • Received:2005-06-02 Revised:1900-01-01 Online:2006-11-23
  • Contact: ZHANG Zhi-hui

Abstract: The TETRA system uses end-to-end encryption in addition to the air interface encryption to provide enhanced security. The TETRA system uses a synchronization technique known as frame stealing to provide synchronization of end-to-end encrypted data. However, the frame stealing process degrades the quality of video. This paper proposes an end-to-end encryption system with the frame stealing technique for voice and frame insertion for video. A block cipher in the output feedback mode is used to implement the end-to-end Key Stream Generator. Moreover. In SDS (the Short Data Service) message encryption, a block cipher in the CBC mode is used to calculate the cryptographically secure checksum, which is sufficient to certify the integrity. 16 Refs. In English.

Key words: TETRA; end-to-end encryption; confidentiality; integrity

CLC Number: