FIELD: information technology.
SUBSTANCE: in the method, before radio communication on each user station, cryptographic algorithms are prepared for operation by obtaining variables for generating a first pseudorandom number (PRN1) and a second pseudorandom number (PRN2). The cryptographically protected information is transmitted using a combination cipher defined by PRN1 and PRN2, and synchronised sequences making up the packet, wherein each of these two parts of the packet are modulated with different frequencies defined by PRN2. The cryptographic algorithms are then synchronised in the burst transmission radio network (BTRN) through transmission of current values of PRN1 and PRN2. At the receiving side, the BTRN receives the transmitted digital information by splitting the received mixture into two components: service and encoded information in case of synchronisation of cryptographic algorithms in the BTRN, or service and protected information in case of decryption of the transmitted combined cipher.
EFFECT: protected mode of operation with self-recovery of a burst transmission radio network during passive attack.
1 dwg
Title | Year | Author | Number |
---|---|---|---|
RADIO MODEM | 2010 |
|
RU2439820C1 |
METHOD FOR STEGANOGRAPHICAL CLOAKING OF INFORMATION | 2008 |
|
RU2374770C1 |
METHOD FOR CRYPTOGRAPHIC TRANSFORMATION OF DIGITAL DATA UNITS | 2007 |
|
RU2359415C2 |
METHOD FOR GENERATING ENCRYPTION KEYS | 2016 |
|
RU2656578C1 |
METHOD FOR ADAPTIVE TRANSFER OF DATA IN RADIO LINK WITH PSEUDO-RANDOM TUNING OF WORKING FREQUENCY | 2007 |
|
RU2356167C1 |
ADAPTIVE DEVICE FOR DATA TRANSFER WITH PSEUDORANDOM TUNING OF WORKING FREQUENCY | 2008 |
|
RU2356171C1 |
METHODS AND APPARATUS FOR SELECTIVE DATA ENCRYPTION | 2009 |
|
RU2505931C2 |
METHOD FOR CRYPTOPROTECTION OF TELECOMMUNICATION KNOW-HOW SYSTEMS | 1995 |
|
RU2077113C1 |
METHOD FOR DATA STREAM ENCRYPTION | 2009 |
|
RU2423799C2 |
METHOD FOR STREAM ENCRYPTION OF DATA | 2005 |
|
RU2291578C1 |
Authors
Dates
2011-07-27—Published
2009-12-29—Filed