Acta Metallurgica Sinica(English letters)
Previous Articles Next Articles
ZHANG Zhi-hui; YANG Yi-xian
Received:
Revised:
Online:
Contact:
Abstract: The TETRA system uses end-to-end encryption in addition to the air interface encryption to provide enhanced security. The TETRA system uses a synchronization technique known as frame stealing to provide synchronization of end-to-end encrypted data. However, the frame stealing process degrades the quality of video. This paper proposes an end-to-end encryption system with the frame stealing technique for voice and frame insertion for video. A block cipher in the output feedback mode is used to implement the end-to-end Key Stream Generator. Moreover. In SDS (the Short Data Service) message encryption, a block cipher in the CBC mode is used to calculate the cryptographically secure checksum, which is sufficient to certify the integrity. 16 Refs. In English.
Key words: TETRA; end-to-end encryption; confidentiality; integrity
CLC Number:
TN918. 1
ZHANG Zhi-hui; YANG Yi-xian . Research on end-to-end encryption of TETRA[J]. Acta Metallurgica Sinica(English letters), doi: 1005-8885(2006)02-0070-04 .
0 / / Recommend
Add to citation manager EndNote|Ris|BibTeX
URL: https://jcupt.bupt.edu.cn/EN/1005-8885(2006)02-0070-04
https://jcupt.bupt.edu.cn/EN/Y2006/V13/I2/70