The invention relates to the field of telecommunications, and, more particularly, to cryptographic methods and devices intended to encrypt messages (data).
In North America wireless cellular telephony uses a time divisional multiple access (TDMA) communication protocol—a voice signal in either traffic direction—base station to mobile station or mobile station to base station. It is a sequence of digitized speech frames or blocks of a predetermined number of binary digits, representing the output of a speech-compressing analog-to-digital converter, together with various binary check digits and coding bits used for error detection and error correction. Since such systems operate over a wireless link, there is a risk of unauthorized interception of calls.
To provide privacy, a transmitting station using a conventional encryption technique forms a privacy mask, having the same predetermined number of binary digits as the speech frame, and encrypts each frame with this particular privacy mask, typically by combining the speech frame and the privacy mask using a bit-by-bit exclusive-OR (XOR) operation.
Decryption is performed at the receiving station, again by XORing the received speech frame and the privacy mask. This is because double XORing of a binary digit with the same binary bit value recovers its initial value.
An advantage of this conventional technique is that the transmitting station and receiving station each have a procedure for privately generating the privacy mask, so that the mask is neither transmitted nor directly available to eavesdroppers. Available computing systems have difficulty decrypting encrypted messages in real time.
An example of a wireless protocol is the Global System for Mobile Communication (GSM), which includes an optional encryption scheme. In this scheme, a database known as the Authentication Center holds an individual encryption key number, Ki, for each subscriber, which is also stored on a chip known as the Subscriber Information Module held in the subscriber's mobile terminal. The subscriber has no access to the key.
When a secure session is requested, a random number is generated by the Authentication Center and used, together with the customer's key, Ki, to calculate an encryption key, Kc, used during the session for encrypting and decrypting messages to/from the subscriber. The random number is sent from the Authentication Center to the subscriber's mobile terminal via the Base Transceiver Station. The mobile terminal passes the random number to the Subscriber Information Module, which calculates the encryption key Kc using an algorithm called A5, from the received random number and the stored key Ki. Thus, the random number is sent over the air, but not the customer's key Ki or the encryption key Kc.
The random number and the encryption key Kc are entered into the Home Location Register database of the GSM network, which stores details for the subscriber concerned. They are also sent to the Visiting Location Register for the area where the user terminal is currently located, and are supplied to the Base Transceiver Station by which the mobile station is communicating to the network.
The encryption key Kc is used, together with the current TDMA frame number, to implement the A5 algorithm in both the mobile terminal and the Base Transceiver Station so that data transmitted over the air interface between the mobile terminal and the Base Transceiver Station is encrypted. Thus, the individual user key Ki is stored only at the Authentication Center and the Subscriber Information Module, where the encryption key Kc is calculated and forwarded to the Base Transceiver Station and the mobile terminal.
With new monitoring devices on the market, which make it easy to listen to and record speech and Short Message Service (SMS) communication of any given GSM cell phone number, there is a need for a personal encrypting option in cases where the users choose to enhance the communication security provided by the carrier or when the carrier disables its encryption algorithms. With the proposed system any two users can agree on mutual secret codes to privately encrypt their communications.
The foregoing aspects and many of the attendant advantages of the invention will become more readily appreciated as the same become better understood by reference to the following detailed description, when taken in conjunction with the accompanying drawings, wherein:
The present invention relates to methods and systems for personal encryption of messages and data, independent of the carrier, using a GSM handset. The proposed methods and systems furnish another layer of communication security in addition to that of the carrier, or provides the user with communication security in cases where the carrier has disabled its encryption algorithm. In the following description, several specific details are presented to provide a thorough understanding of the embodiments of the invention. One skilled in the relevant art will recognize, however, that the invention can be practiced without one or more of the specific details, or in combination with or with other components, etc. In other instances, well-known implementations or operations are not shown or described in detail to avoid obscuring aspects of various embodiments of the invention.
Reference throughout the specification to “one embodiment” or “an embodiment” means that a particular feature, structure, implementation, or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, uses of the phrases “in one embodiment” or “in an embodiment” in various places throughout the specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, implementation, or characteristics may be combined in any suitable manner in one or more embodiments.
Traditionally, as mentioned above, the calculations for the privacy mask generation, or the encrypting and decrypting key generation, are initiated by transmission of a random number from the Authentication Center. Only this random number is transmitted over the air. Keys are generated locally, using this random number and a customer-specific key. Among other advantages, the present invention enables the user to enter his or her own random number, or private code, and initiate the key generation and the subsequent encryption, independent of the Authentication Center and its encryption algorithms. If the party receiving the call also enters the same random number, or private code, the two users can communicate using their own personalized and private encrypted messages and data.
The user interface 201 passes the phone number part of an input to a comparator 202 to be compared with the phone number of the party in communication with, so that if there is a match, the communication will be encrypted. The comparator 202 generates and sends an enable signal to a selector module 203 if there is a match. The user interface 201 also passes the secret code part of the input to a key generator 204 to be used for the generation of encryption keys. In another embodiment the specified phone number may also be used along with the secret code to generate the encryption keys. In this way the same secret code generates different keys for different phone numbers.
If the comparator 202 sends an enable signal to the selector module 203, the encryption key will be provided to an XOR unit 205, and will be utilized to encrypt the message or data, block by block. But if the comparator 202 does not send an enable signal to the selector module 203, the selector module will continue to pass a string of 0's to the XOR unit 205 which results in the communication message or data passing through the XOR unit 205 without any alteration.
Unlike the existing methods in which the synchronization of the key and the transmitted data is between the mobile station and the base station, the present invention requires synchronization between the two mobile stations. This is because the encryption is applied to the two end users, or the two mobile stations, instead of one mobile station and one base station. For this reason the same method of synchronization employed by the A5 algorithm is not suitable for the proposed methods. In one embodiment, additional protocols may be added to transmit the frame number from one mobile station to the other mobile station. In another embodiment the key sequence may be as long as a data block and synchronization can be performed frame by frame.
Embodiments of the present invention do not necessitate extra hardware, although one of ordinary skill in the art will realize that functions such as key generation can be achieved with or without additional hardware. For example, the key sequence may either reside in the mobile station's existing memory or use pre-burned EPROMs or other memory devices, which are sold in pairs. Users may even download key sequences from SMS centers.
But if the desired telephone number is not the same as the telephone number in communication with, in step 308 the communication data will not be altered since the data will be only XORed with a string of 0's. The embodiments of the present invention may be added to different points along the path of the communication system 100, such as points A and A′ depicted in
The preferred and several alternate embodiments have thus been described. After reading the foregoing specification, one of ordinary skill will be able to effect various changes, alterations, combinations, and substitutions of equivalents without departing from the broad concepts disclosed. It is therefore intended that the scope of the letters patent granted hereon be limited only by the definitions contained in the appended claims and equivalents thereof, and not by limitations of the embodiments described herein.