Scrambling

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

The methods for ensuring the privacy of voice, data, and video transmissions.

Various techniques are commonly utilized to perform such functions. Analog voice-scrambling methods typically involve splitting the voice frequency spectrum into a number of sections by means of a filter bank and then shifting or reversing the sections for transmission in a manner determined by switch settings similar to those of a combination lock; the reverse process takes places at the receive end. Digital methods first convert the analog voice to digital form and then scramble or encrypt the digital voice data by one of the methods discussed below. See also Analogto-digital converter; Electric filter. A simple data-scrambling method involves the addition of a pseudorandom number sequence to the data at the transmit end. Devices using this method are known as stream ciphers. A second method partitions the data into blocks. Data within a block may be permutated bit by bit or substituted by some other data in a manner determined by the switch setting, which is often called a key. Devices using this method are known as block ciphers. See also Cryptography. Typical video scrambling devices used for cable television applications involve modifying the amplitude or polarity of the synchronization signals, thereby preventing the normal receiver from detecting the synchronization signals. A more sophisticated technique, used in satellite transmission, introduces a random delay to the active video signal on a line-by-line basis. An even more advanced technique called cut-and-rotate has been proposed. Video signals can also be digitized by a number of coding techniques and then scrambled by any of the data-scrambling techniques discussed above to achieve high security.

Scrambler
From Wikipedia, the free encyclopedia

For other uses, see Scrambler (disambiguation). In telecommunications, a scrambler is a device that transposes or inverts signals or otherwise encodes a message at the transmitter to make the message unintelligible at a receiver not equipped with an appropriately set descrambling device. Whereas encryption usually refers to operations carried out in the digital domain, scrambling

It has been suggested that Randomizer be merged into this article or section. (Discuss) Proposed since M

usually refers to operations carried out in the analog domain. Scrambling is accomplished by the addition of components to the original signal or the changing of some important component of the original signal in order to make extraction of the original signal difficult. Examples of the latter might include removing or changing vertical or horizontal sync pulses in television signals; televisions will not be able to display a picture from such a signal. Some modern scramblers are actually encryption devices, the name remaining due to the similarities in use, as opposed to internal operation. In telecommunications and recording, a scrambler (also referred to as a randomizer) is a device that manipulates a data stream before transmitting. The manipulations are reversed by a descrambler at the receiving side. Scrambling is widely used in satellite, radio relay communications and PSTN modems. A scrambler can be placed just before a FEC coder, or it can be placed after the FEC, just before the modulation or line code. A scrambler in this context has nothing to do with encrypting, as the intent is not to render the message unintelligible, but to give the transmitted data useful engineering properties. A scrambler replaces sequences into other sequences without removing undesirable sequences, and as a result it changes the probability of occurrence of vexatious sequences. Clearly it is not foolproof as there are input sequences that yield all-zeros, all-ones, or other undesirable periodic output sequences. A scrambler is therefore not a good substitute for a line code, which, through a coding step, removes unwanted sequences.
Contents [hide] 1 Purposes of scrambling 2 Types of scramblers 2.1 Additive (synchronous) scramblers 2.2 Multiplicative (self-synchronizing) scramblers 2.3 Comparison of scramblers 3 Noise 4 Cryptographic 5 See also 6 External links and references

[edit]

Purposes of scrambling

There are two main reasons why scrambling is used: It facilitates the work of a timing recovery circuit (see also Clock recovery), an automatic gain control and other adaptive circuits of the receiver (eliminating long sequences consisting of '0' or '1' only). It eliminates the dependence of a signal's power spectrum upon the actual transmitted data, making it more dispersed to meet maximum power spectral density requirements (because if the power is concentrated in a narrow frequency band, it can interfere with adjacent channels due to the cross modulation and the intermodulation caused by non-linearities of the receiving tract). [edit]

Types of scramblers
Additive (synchronous) scramblers Multiplicative (self-synchronizing) scramblers [edit]

Additive (synchronous) scramblers


An additive scrambler (descrambler) used in DVB

Additive scramblers (they are also referred to as synchronous) transform the input data stream by applying a pseudo-random binary sequence (PRBS) (by modulo-two addition). Sometimes a pre-calculated PRBS stored in the Read-only memory is used, but more often it is generated by a linear feedback shift register (LFSR). In order to assure a synchronous operation of the transmitting and receiving LFSR (that is, scrambler and descrambler), a sync-word must be used. A sync-word is a pattern that is placed in the data stream through equal intervals (that is, in each frame). A receiver searches for a few sync-words in adjacent frames and hence determines the place when its LFSR must be reloaded with a pre-defined initial state. The additive descrambler is just the same device as the additive scrambler. Additive scrambler/descrambler is defined by the polynomial of its LFSR (for the scrambler on the picture above, it is 1 + x 14 + x 15) and its initial state. [edit]

Multiplicative (self-synchronizing) scramblers

A multiplicative scrambler used in V.34 recommendation

A multiplicative descrambler used in V.34 recommendation

Multiplicative scramblers (also known as feed-through) are called so because they perform a multiplication of the input signal by the scrambler's transfer function in Zspace. They are discrete linear time-invariant systems. A multiplicative scrambler is recursive and a multiplicative descrambler is non-recursive. Unlike additive scramblers, multiplicative scramblers do not need the frame synchronization, that is why they are also called self-synchronizing. Multiplicative scrambler/descrambler is defined similarly by a polynomial (for the scrambler on the picture it is 1 + x 18 + x 23), which is also a transfer function of the descrambler. [edit]

Comparison of scramblers
Scramblers have certain drawbacks: Both types may fail to generate random sequences under worst case input conditions. Multiplicative scramblers lead to error multiplication during descrambling (i.e. a single bit error at the descrambler's input will result into w errors at its output, where w equals the number of the scrambler's feedback taps). Additive scramblers must be reset by the frame sync; if this fails massive error propagation will result as a complete frame cannot be descrambled. The effective length of the random sequence of an additive scrambler is limited by the frame length, which is normally much shorter than the period of the PRBS. By adding frame numbers to the frame sync, it is possible to extend the length of the random sequence, by varying the random sequence in accordance with the frame number. [edit]

Noise
The first voice scramblers were invented at Bell Labs in the period just before World War II. These sets consisted of electronics that could mix two signals, or alternately "subtract" one signal back out again. The two signals were provided by telephones for one, and a record player for the other. Sets of matching pairs of records were produced containing recordings of noise, which would then be played into the telephone and the

mixed signal sent over the wires. The noise would then be subtracted back out at the far end using the matching record, leaving the original voice signal intact. Eavesdroppers would hear only the noisy signal, unable to understand the voice inside. One of those, used (among other duties) for telephone conversations between Winston Churchill and Franklin D. Roosevelt was intercepted and unscrambled by the Germans. At least one German engineer had worked at Bell Labs before the war and came up with a way to break them. Later versions were sufficiently different that the German team was unable to unscramble them. Early versions were known as "A-3" (from AT&T). An unrelated device called SIGSALY was used for higher-level voice communications. The noise was provided on large shellac phonograph records made in pairs, shipped as needed, and destroyed after use. This worked, but was enormously awkward. Just achieving synchronization of the two records proved difficult. Post-war electronics made such systems much easier to work with by creating pseudo-random noise based on a short input tone. In use, the caller would play a tone into the phone, and both scrambler units would then listen to the signal and synchronize to it. This provided limited security, however, as any listener with a basic knowledge of the electronic circuitry could often produce a machine of similar-enough settings to break into the communications. [edit]

Cryptographic
It was the need to synchronize the scramblers that suggested to James H. Ellis the idea for non-secret encryption which ultimately led to the invention of both the RSA encryption algorithm and Diffie-Hellman key exchange well before either was reinvented publicly by Rivest, Shamir, and Adleman, or by Diffie and Hellman. The latest scramblers are not scramblers in the truest sense of the word, but rather digitizers combined with encryption machines. In these systems the original signal is first converted into digital form, and then the digital data is encrypted and sent. Using modern public-key systems, these "scramblers" are much more secure than their earlier analog counterparts. Only these types of systems are considered secure enough for sensitive data. Voice inversion scrambling can be as simple as inverting the frequency bands around a static point to various complex methods of changing the inversion point randomly and in real time and using multiple bands. The "scramblers" used in cable television are designed to prevent casual signal theft -

not to provide any real security. Early versions of these devices simply "inverted" one important component of the TV signal, re-inverting it at the client end for display. Later devices were only slightly more complex, filtering out that component entirely and then adding it by examining other portions of the signal. In both cases the circuitry could be easily built by any reasonably knowledgeable hobbyist. See Television encryption Electronic kits for scrambling and descrambling are available from hobbyist suppliers. Scanner enthusiasts often use them to listen in to scrambled communications at car races and some public service transmissions. It is also common in FRS radios. This is an easy way to learn about scrambling. The term "scrambling" is sometimes incorrectly used when jamming is meant.

You might also like