Professional Documents
Culture Documents
The Research of Chaos-Based SMS Encryption in Mobile Phone: Jing Pan Qun Ding Na Qi
The Research of Chaos-Based SMS Encryption in Mobile Phone: Jing Pan Qun Ding Na Qi
Abstract—This paper introduces a chaos-based S MS (S hort and the A5/1 algorith m description. In Section 3, SMS mode
Message Service) encryption scheme, and it combines with the used in this paper is introduced and applies this encryption
improved A5/1 algorithm. In this paper, the description of this scheme on mobile phone-like system on FPGA, and the
S MS (Short Message Service) encryption scheme in mobile results are discussed later. Finally, Section 5 concludes the
phone is proposed in details. Finally, we design a system like paper.
common mobile phone to test the application of such
encryption scheme, and the test results show that this chaos-
based encryption scheme can encrypt short messages in mobile
phone. II. CHAOT IC ENCRYPT ION A LGORIT HM
Keywords-SMS(Short Message Service) encryption; chaotic A. Logistic Mapping and Digital Logistic Sequences
sequences; A5/1 algorithm Logistic equation is shown in equation (1):
n
n
[5]. i 0
As is known to all, logistic mapping can generate real
Based on the aforementioned research results, this paper value sequences and they need to be transformed to 0-1
introduces chaos-based SMS encryption scheme. The sequences for digital commun ication. We use the method
method of this scheme is described in details to verify its proposed by ourselves in 2008 to get digital 0-1 sequences
security. Then, it will be applied in a FPGA system like from logistic map [7], and it is shown in equation (3).
mobile phone for test. Based on the analysis, this chaos-
based SMS encryption scheme can realize the security of 2m 1
short message in mobile phone. 0 x ( n) I 2mk
k 0
The rest of this paper is organized as follows. In Section T [ x(n)]
2m 1
2, the chaos-based encryption scheme is proposed for later 1 x ( n) I m
2 k 1
application, and it shows the logistic sequence generation k 0
B. A5/1 Algorithm
The stream cipher of A5 series is used for GSM XOR
Algorithm
encryption. It passed the whole statistic tests known by us
and has good efficiency on hardware encryption implement
with short time for encrypting delay. So far, there are t wo
Stream cipher output
versions of A5 algorithm: A5/ 1 and A5/2. The former limits
the export but has better security than the latter. Therefore,
we select A5/1 algorith m and its algorith m diagram is shown
in Fig.2. Fig.3 T he flow chart of chaotic encryption with A5/1
The stream ciphers generated through such encryption
algorithm can pass the three random axio ms for pseudo
random cycle sequences proposed by Golo mb. In balance
tests, we choose different lengths and different initial value
to test, and the results show that the number of 0 and 1 is
nearly same and it is balance of such sequences. In run test,
the testing results show that the actual characteristics are
similar to the ideal characteristics in run test analysis. In
addition, the sequences also have good performance in the
correlation analysis. For the limits of this paper, we don ’t
give the testing results in details.
Fig.2 T he algorithm diagram of A5/1
502
498
III. THE A PPLICAT ION IN SMS ENCRYPT ION B. Encryption Application Tests
In this paper, we design the system like mobile phone on
A. SMS Mode in Mobile Phone FPGA to realize our chaos-based SMS encryption scheme,
SMS transmission in mobile phone usually has two and the whole design diagram is shown in Fig.4.
modes: TEXT mode and PDU mode [8]. PDU mode is more
complex than TEXT mode because it can send both English Encryption module
and Chinese messages. Therefore, we mainly introduce PDU Computer
Decryption module
mode to design SMS encryption system like mobile phone.
PDU mode: Serial Port
503
499
the computer and it is very convenient to operate. Here we scheme is combined chaotic sequences with A5/1 algorithm
give some testing results in Fig.6. to realize encryption of short messages. In this paper, it gives
the chaotic logistic mapping and its quantization method for
getting binary sequences and the principle of the A5/1
algorithm, and also gives the method of the chaotic
encryption with improved A5/1 algorithm. Then, it
introduces the SMS mode used in mobile phone and applies
this encryption scheme in the mobile phone-like system
designed on FPGA for test. According to the analysis, this
chaos-based SMS encryption scheme can realize the security
Fig.6 T he SMS encryption testing results of short message in mobile phone.
In Fig.6, it shows that only if the key is the same that the
encrypted short messages can be decrypted correctly.
Therefore, it realizes the security of SMS in mobile phone. A CKNOWLEDGMENT
Table I shows some technical indexes of this hardware This work is supported by the National Natural Science
system. Foundation of China (no.61072072) and Students Academic
Science and Technology Innovation Funding Projects of
Heilongjiang University.
T echnical index PRO PERTY
HARDWARE PART
SIM300 Frequency Band ESM900, DCS1800
GSM Type Small Mobile Basestation
REFERENCES
External communication interface RS232
[1] Runsheng Huang. Chaos and Its Applications(II) [M]. Wuhan
ENCRYPTIO N ALGORITHM University Press, 2005,12.
Pseudo random Test NIST SP800-22
Max encrypt/decrypt Rate 1.25Mbps for FPGA chip [2] Liu Yinsen. A video conference solution and achievement based on
115200bps for RS232 chaotic encryption algorithms [J]. Computer & Digital
Data error after encryption <20% Engineering,2011,39(1):104-109.
Max delay of hardware encryption <100ms for 1k bits data [3] Hu Guoxiang. Short message encryption schem based on the elliptic
curve public key encryption [J]. Journal of South-Central University
ELECTRICAL SPECIFICATIO N for Nationalities(Nat Sci Edition),2007(9),26(3):95-97.
Work Power Supply 3.4V-4.5V for SIM300 [4] Chen Yantao. Design and implementation of a SMS transmission
1.2V, 3.3V for FPGA chip
system based on a SIM300 [J]. Computer Engineering
Power Consumption(SIM300) 2W under ESM900 Class 4
1W under DCS1800 Class 1 &Science,2008,30(3):156-158.
[5] Na Qi, Bingbing Xue, Jing Pan. Design of a SMS encryption
T ABLE I transmission system based on GSM and FPGA. National
T ECHNICAL I NDEX OF T HIS HARDWARE SYSTEM Postgraduate Electronic Design Contest(Heilongjiang area),2010,7.
[6] Runsheng Huang, Chaos and Its Applications [M].Wuhan University
Press,2003:128–138.
[7] Hong Wu, Qun Ding,Ping Zhou. Design and application of Logistic
IV. CONCLUSION sequences in data encryption [J]. Chinese Journal of Scientific
Instrument,2008(4), 29(4).
This paper introduces a chaos-based SMS encryption [8] Na Qi, Jing Pan, Qun Ding. Design and hardware implementation of
scheme in the mobile phone-like system. The method of this FPGA & chaotic encryption-based wireless [C]. IMCCC2011,2011.
504
500