GB2094593A - Signal encryption systems - Google Patents
Signal encryption systems Download PDFInfo
- Publication number
- GB2094593A GB2094593A GB8106827A GB8106827A GB2094593A GB 2094593 A GB2094593 A GB 2094593A GB 8106827 A GB8106827 A GB 8106827A GB 8106827 A GB8106827 A GB 8106827A GB 2094593 A GB2094593 A GB 2094593A
- Authority
- GB
- United Kingdom
- Prior art keywords
- signal
- comb
- pattern
- filter
- null
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
There are many situations - one example is that of the police radio communications network - where it is desirable to disguise the information content of a transceived signal such as exists in speech in the 300 to 3000 Hz band. The invention provides a signal encryption and decryption system which comprises: 1) for encryption first comb filtering means, by which the signal to be encrypted may be comb filtered in such a way that the pattern of the nulls formed by the filtering process is changed in an agile, predetermined manner, the output of this first comb filtering means being the encrypted signal; and 2) for decryption second comb filtering means, by which the encrypted signal to be decrypted may be comb filtered in a fashion complementary to that effected by the first comb filtering means, the output of this second comb filtering means being the decrypted signal.
Description
SPECIFICATION
Signal encryption systems
This invention relates to signal encryption systems, and concerns in particular the encryption of audio, specifically voice, signals for transception over an unsecure communications link.
There are many situations where it is desirable to disguise the information content of a signal transceived - by radio or cable, say- between the transmitting apparatus and the receiving apparatus of a transceiving system. One example is that of the police radio communications network; normally, vocal messages, such as those between the police car and its control, are transceived over narrow band radio channels that can relatively easily be "overheard" by anyone in range with a suitable receiver tuned to within a few kilohertz of the correctfre- quency, and it is clearly highly desirable to employ some form of speech scrambler, or encryption device, to improve the degree of privacy. Such a device should be simple, inexpensive and effective, and should not result in any increase in the bandwidth of the radio channel.
There area number of techniques that can in principle be used to provide speech scrambling, but those suggested so far have required an increase in bandwidth, have provided results that have been relatively easy to de-scramble, or have necessitated the use of complex and expensive apparatus. The present invention seeks to provide a simple, cheap and effective scrambling - encryption - system, suitable for use in the transceiving of information which itself exists over a finite but fairly narrow frequency band (as is the case with the human voice, most of the information in which exists in frequencies in the band 300 to 3,000 Hz), which system overcomes these problems.
In one aspect, therefore, this invention provides a signal encryption and decryption system which comprises: 1) for encryption
first comb filtering means, by which the signal to be encrypted may be comb filtered in such a way that the pattern ofthe nulls formed bythefiltering process is changed in an agile, predetermined manner, the output of this first comb filtering means being the encrypted signal; and 2) for decryption
second comb filtering means, by which the encrypted signal to be decrypted may be comb filtered in a fishion complementary to that effected by the first comb filtering means, the output of this second comb filtering means being the decrypted signal.
The system of the invention employs two features wherein the invention may be said to reside. Firstly, it uses comb filters the filtering effect of which may be varied in an agile, predetermined fashion, and secondly it uses two such filters the effect of one of which is complementary to that of the other, It may be explained as follows:- A comb filter is a filter which filters out (or passes, depending on one's viewpoint) the signal fed to the filter at various frequencies spaced, usually regularly, across the frequency spectrum of the signal.
The effect of a typical such filter will be clear from
Figure la ofthe accompanying drawings, which shows superimposed on one another the gain/frequency plot of a constant amplitude "test" signal (dotted line) input to the filter together with that of the filtered signal (solid line) output bythefilter. It will be seen that the filter has "combed out" the input signal, forming a regular sequence of nulls (frequencies at which the gain of the output signal is much reduced, so that its amplitude approaches zero) across the signal spectrum.In the invention there are used comb filters of a type such that its filtering effect is dynamicaily variable during operation- and specifically may be altered so as to change the position and spacing ofthe nulls in an agile, predetermined manner, Such filters are discussed in more detail hereinafter, together with an explanation of their effect.
The invention requires the use (for the decryption of the previously-encrypted signal) of a second comb filter complementary to the first. By "complementary" is meant that the second filter provides an output signal with a pattern of nulls and maxima (and intermediate points) which is complementary "opposite" -to that produced by the first filter. The effect of such a filter (complementary to that whose effect is shown in Figure la) is shown in and will be clearfrom Figure 1b oftheaccompanying drawings; from a comparison of the two Figures it will be seen that the two output signals are complementary (one may be regarded as an "upside down" version of the other).Where such a second filter, complementary to the first, is used after the first - thus, where the signal output from the first is then fed to the second -the output from the second will be substantially identical in form, though possibly of reduced gain (amplitude), to that of the first, for wherever the first filter reduced the signal gain by a specific factor the second "increased" it by the same factor (in practice the second filter reduces the gain by the inverse factor, and a subsequent amplification stage then brings the signal amplitude uniformly up to the original level).
The comb filters used in the invention are dynamically variable during operation - that is, their filtering effects are alterable while the filters are operating.
The invention requires that the alterations be in an agile, predetermined, manner, and the effect of such alterations is, very simply, that a signal (the speech signal of a voice communication system, say) encrypted in this way becomes very difficult to understand. The situation may perhaps be appreciated best by considering an analogy (albeit an imperfect one), namely the understanding of a visual image generated by reflection off the surface of a liquid (a pool of water, say) which is subjected to ripples (as from successive puffs of wind). There are
two main factors involved in the result; firstly there
is the frequency of the ripples, and secondly there is
the rate of change of that frequency. Consider the
pool of water. If it is flat and calm the reflection is
clear and undistorted, whereas if it is gently rippled the reflection is distorted.If the ripples are regular
(of constant frequency) then the eye/brain combination can still derive some understanding of the
reflection, though the extent of this may depend upon the ripple frequency (a very low ripple rate is close to a flat looking at a "foggy" object- its general nature is apparent, though detail is lost; an intermediate rate causes the most difficulty). However, if the ripples are irregular (of variable frequency) then the eye/brain combination has a very considerable problem in understanding the reflection, and will generally fail (provided, again, that the mean ripple frequency is neithertoo low nortoo high, and provided that the rate at which the ripple frequency changes - is itself neither too low nor too high).
As it is for the eye/brain combination in this analogy, so it is for the ear/brain combination with a speech signal encrypted according to the invention; the encrypting comb filter generates the varying pattern of nulls (the ripples) across the signal frequency spectrum, and the rate at which the pattern is altered is chosen so as to render the encrypted signal the least intelligible.
The pattern of nulls -their positions and spacing is related to the number of nulls and the width of the signal's frequency spectrum. When encrypting a voice signal the majority of the intelligible information in which is spread across a frequency spectrum about 3.3kHz wide it has proven satisfactory to let the null spacing be from 500 to 100 Hz, the corresponding number of nulls being from about 6 to about 30. Optimum figures for speech encryption are presently thought to be 300Hz spacing and 10/11 in number.
In the invention the pattern of the comb filtergenerated nulls is varied during operation. Naturally, the agility of these changes - the rate at which the changes occur- is important. If it is very low then the ear-brain accommodates to each change long before the next occurs, while if it is very high then the overall effect is of no rate change at all. For human speech a useful basis for assessing change rates is the length of the average syllable (about 1/3 sec); if the change rate is such that there is a change at least once and not more than ten times every syllable then ear/brain confusion is satisfactorily high. The optimum change rate is presently considered to be three or four times per syllable (that is, roughly 10 to 15 changes a second).
In addition, however, the degree of change is of importance. If the change is very small then it amounts to no change at all (though, over a longer period, the overall change may be quite large, it will have occurred so slowly as to cause the ear/brain no problem), while a large change may, fortuitously, merely result in a coarser pattern which "fits" the original finer pattern. Thus, the degree of change of the null pattern should be significant, but not such as to result in null displacement by an amount corresponding to the original null separation. Moreover, the sequence of these changes should not be such as to result in the null pattern regularly returning within a short time (two or three changes) to one which "fits" with an earlier pattern.The expression "agile" is used herein to denote a pattern change fashion which is both significant (but not too much so) and not regularly periodic; an example of such a pattern could be one wherein the null spacing was increased to near, but significantly more than twice the first spacing, was then reduced to an amount just less than half the first spacing, was then increased to an amount of one and a half times the first spacing, was then reduced to an amount less than a quarter of the spacing, was then increased to an amount of one andthree-quarters the original spacing, and finally was increased to the original spacing - the cycle then being repeated.
In accordance with the invention the comb-filtergenerated null pattern is changed in an agile, predetermined manner. It is very much preferred that the changes be apparently random but nevertheless predetermined. The reason for choosing a "random" manner of change is not so much to confuse the casual eavesdropper, for almost any pattern of changes will acomplish that, but to make it difficult, if not impossible, for the "professional" with the appropriate tools at his command to decrypt the encrypted signal.However, having decided upon "random" change it follows that the change must only seem to be random - it will in fact be pseudorandom -for in the decryption stage of the invention the second comb filter not only has to be of a type complementary to the first, it has to be actually complementary, and so must generate a matching pattern of maxima (a complementary pattern of nulls) which changes in exactly the same "random" way as that of the encrypting comb filter. The causing of some event in apparently random but actually predetermined manner is commonly and conveniently done under the control of a pseudo-random number generator. Such generators are well known, and the use of one in the invention is described hereinafter.Here, however, it may briefly be explained that such a device may be set to generate a sequence of numbers the order of which appears to be random, and that once so set it will always generate the same sequence whenever it is started (though it can be forced to start at some mid point in the sequence, if preferred). Accordingly, if the encrypting comb filter is under the control of one pseudo-random number generator, while the decrypting filter is underthe control of a second such generator which is identical to the first, the two "random" sequences can easily be caused to be the same!
The inventive system involves the comb filter encryption of a signal (before transmission) followed by its complementary comb filter decryption (after transmission). The pattern of the nulls formed by the encrypting comb filter is changed in a predetermined manner, so that the complementary pattern formed by the decrypting comb filter must be changed in the same manner, and clearly the two changing patterns must be synchronised with each other. A method of synchronising the two (whether the changes are pseudo-random or not), without providing any auxiliary signals (such as timing signals) which would increase the signal bandwidth, involves pre-programming the decryption stage of the receiver with a "list" of the patterns to match.
The thus pre-programmed decryption stage is then caused to compare each pattern it receives with those in the list, and to "lock on" at that point where it finds a match- i.e., when a pattern being compared corresponds to a pattern in the list, the decryption stage then initiates further internal generation of the "decrypting" complementary comb filter null pattern starting from that point in the list of such patters. In a preferred embodiment the comparison is extended to a second (and possibly to a third) null pattern spaced in time from the first by a preselected amount; if the second pattern matches as predicted from the list upon the basis of the original matching of the first pattern, then one can be reasonably certain that the two patterns have been correctly identified and placed in the sequence of patterns, and then the decryption stage can "lock on" as described above.
In practice, however, it is unnecessary for the receiver to hold a list of all the null patterns that can be transceived; instead it need only store one (or preferably three or four fairly widely separated in the sequence), comparing it with each received pattern in turn until a match is observed. Moreover, where the null pattern changes non-repetitively under pseudo-random control it is in practice necessary merely to look for one null point at one pre-chosen frequency (which will only occur once during each pseudo-random cycle) - though again four frequencies well spaced in time will allow both faster synchronisation and a limited degree of checking.
It will be appreciated that this procedure for attaining synchronisation requires merely a foreknowledge of the changes to be made to the null pattern.
Thus it is as suitable for use with a pseudo-random series of such changes as it is with a regular series, for in each case the series is in fact predetermined (and so can be programmed into the decryption stage) even if it appears not to be.
The system of the invention requires the use of two variable effect comb filters, each complementary to the other. Although there are various ways of constructing comb filters, that presently preferred for the invention employs an analogue delay unit of the charge-coupled, or "bucket-brigade", device type to provide a delayed version of the filter input signal which is then combined with an undelayed version (the combination can be in one of two ways, as is further explained below, depending on the result required), the clocking rate of the delay unit being varied (it is conveniently the output from a frequency divider fed by a fixed frequency oscillator and the division rate of which is controlled by the pseudo-random number generator) so as in turn to vary the filter effect in the desired "random" manner.In order for such a comb filter to have the effect illustrated by Figure 1a the delayed version is summed with the undelayed version, with suitable gain adjustment, to give the required result, while for such a filter to have the complementary effect illustrated by Figure ib the delayed version is itself the required result, but is also recursively fed back to and subtracted from the undelayed version at the input (a brief explanation of thie is given hereinafter).
A comb filter constructed using as the delay unit a bucket brigade device of the type just described generates a pattern of nulls (as in Figure la and b) in which the spacing between the nulls is inversely proportional to the delay. Using a delay unit with a delay dthe nulls (in Figure 1a, say) are positioned at frequencies proportional to 1/0.5d, 1/1.5d, 1/2.5d, 1/3.5d and soon. Thus, if the delayed is set to 0.Olsec then the null frequencies will be at 100Hz intervals across the signal spectrum (at 50,150,250,350Hz....
.) whereas if the delayd is 0.001secthen the null frequencies will be 1000Hz apart (at 500, 1500, 2500,3500Hz ).
The encryption/decryption system of the invention may be employed to encrypt and decrypt any source signal that can be fed to and through the comb filters required. It is, however, the main purpose of the invention to provide a security system for use in military or civil radio communications networks and specifically for use in the police radio network.
As such, the inventive system is interposed as an additional link at a suitable place in the radio communications equipment, the encryption portion residing in the transmitter, with the decryption portion in the receiver. In a typical case, then, the encrypter is placed between the microphone/preamp. stage and modulation/output stages of the transmitter, while the decrypter is placed between the receive/demodulate stages and postamp./loudspeaker stage of the receiver.
The invention extends, of course, to a transceiving system whenever employing a signal encryption and decryption system as described and claimed herein.
The invention is now described, though only by way of illustration, with reference to the accompanying drawings in which: Figures la andb show gain/frequency curves for two complementary comb filters useful in the encryption system of the invention;
Figure2 shows a schematic circuit of a radio transceiving system employing the encryption system of the invention;
Figures 3a andb show schematic circuits for two complementary comb filters having the effect illustrated in Figures la and 1b;
Figure 4 shows a sequence of signal plots illustrating the operation of the comb circuit of Figures 3b;
Figure 5 shows a schematic circuit for the variable delay unit illustrated in Figures 3a and 3b; and
Figures 6a andb show in schematic form more practical circuits analogous to those of Figures 3a and 3b.
Figures la andb have already been described hereinbefore, and need no further discussion.
The schematic circuits of Figures 2, 3a andb and 5 need no description per Se, though the following simplified explanation with reference to Figure 4 of the operation of the circuits of Figures 3a andb may prove useful.
Dealing, first, with the circuit of Figure 3a it is easy
to see, if the source signal is a sine wave (varying
sinusoidally in amplitude with time as shown by 40
in Figure 4), following an initial D.C. signal of zero
amplitude, that if the delay effected by the delay unit
is, say, 60', then the output of the delay unit will be
an identical (but delayed) simple sine wave (41), and
when this delayed version is "added" to the source
version to give the filter's output the latter is merely
a combination of the two (pictured, 42, for conveni
ence as though they simply overlapped, though in
practice they are actually added together). Note that
for the first 60"the combination signal 42 consists
solely of the source signal 40.
Turning, now, to the Figure 3b circuit, when the combination signal 42 is input to this second comb filter it firstly has the output of that circuit subtracted from it - but, of course, initially there is no such output (or, rather, the output has zero value), so the combination 42 enters the delay unit unchanged, and is output therefrom as a delayed version of itself (43) in exactly the same way, and by exactly the same amount, as source signal 40 was delayed passing through the Figure 3a circuit delay unit. Note, however, that the first 600 of this delayed combination signal 43 is derived by simply delaying by 60 the source signal 40.Thus, as the second 60 of the combination signal 42 is input to the Figure Sb circuit delay unit, so the output 43 of that unit, which output consists solely of the first 60 delayed version of the source signal 40, is first subtracted therefrom.
Accordingly, the signal actually input to the delay unit is simply the original source signal 40, which passes through the delay unit to emerge delayed by 60". Naturally, this delaying/subtraction process continues the whole time while the combination signal 42 is input to the Figure Sb comb filter, and naturally the whole time the filter outputs (43) what is simply a delayed version of the source signal 40.
Figures 6a andb illustrate more practical forms of circuit that can be employed as the required comb filters of Figure 2.
The encrypting unit is shown in Figure 6a, the decrypting unit in Figure Sb. In each case the unit may conveniently be split into a digital part and an analogue part.
The encryption unit
The analogue part comprises a unity gain buffer amplifier (60) with a 600t input impedance (to give a degree of isolation) and a low (about 100t) output resistance, an analogue delay line (61) and a unity gain adder (62). The analogue delay line 61 is a bucket brigade device having N buckets, and the delay provided is given by the time a unit input impulse takes to traverse all N buckets driven by the clock inputck.The delaydis given by the expression N/fck so that for a clock frequency (fck) at 100kHz and with
N =512 the delay is 5120 microseconds.
A bucket brigade delay line is a sampled data
device, and the analogue output contains consider
able clock frequency components and their harmon
ics. A variable gain Low Pass filter (63) compensates for the gain or loss of the delay line at audio frequen
cies, and also removes the clock frequency compo
nents.
The whole analogue part forms a comb filter with a response which has nulls at frequencies of 1/0.5d, 1/1.5d, 1/2.5d and soon, and maxima at frequencies of 1/d, 1/2d, 1/3d and so on. The limits over which the delay unit functions are 1 to toms, giving a first null in the range 50 to 500Hz.
The frequencies of main interest for voice transmission lie in the range 300 to 3300 Hz. The comb filter operates in this range, but its characteristics are randomly altered by altering the bucket brigade delay line's clock frequency. This function is achieved by the digital part of the unit.
In the digital part the crystal oscillator (64) contains a stable crystal oscillator, a counter, and decoders. The block has three outputs: a timing signal TMG (a high frequency square wave at Fxtai/k), a clock signal ck (a lower frequency square wave at FXta,/N - -fCk=20Hz) and a gate signal GTE. GTE is a pulse which becomes "true" at crystal-controlled regular intervals and remains "false" between these intervals (in this example GTE becomes "true" every 204.75 seconds for a period of 512 ck pulses).
The sync and code blocks (65 and 66) are sync and code word generators which together form a pseudo random number generator (PRNG) consisting of a 12-bit serial-in parallel-out shift register and three exclusive "or" gates. If the parallel outputs of the register are labelled Q1-Q1 2 from the input end the exor gates are connected to the register's input so that Q3Q12=A; Q3 1tQ9=B; then the input is AB.
This gives a maximum sequence PRNG where there are 212~1 =4095 individual unique states present in the register's parallel outputs. The PRNG is clocked by the signal ck (which becomes true every 50ms); thus the cycle of 4095 states repeats every 204.75 secs, and each PRNG state lasts for 50ms.
Every 204.75 secs the GTE signal becomes true, and the Gate block (67), which is a simple gated
M-bit serial-to-parallel shift register, routes a particular PRNG code to a programmable frequency divider (68).
The programmage frequency divider 68 comprises an M-bit frequency divider clocked by the timing signal TMG. Its division ratio is set by data fed from the Gate block 68. The M-bit code output from Gate block 68 sets the maximum count so that the divider counts from zero to the maximum count. This has the effect of outputting a clock signal ck which is FTMG/count max., and this in turn causes the delay unitto give a delayof512x1/fck.
The decryption unit
This unit has many parts in common with the encryption unit, and those parts that are common are numbered similarly.
Again, the unit may be split into a digital part and an analogue part.
The encrypted signal enters the analogue part via a buffer (70), and is fed to a unity gain subtractor (71) where it is filtered by a complementary comb filter made out of a subtractor 71, a delay line 61, and a low pass filter 63. The decrypted signal exits the unit via a unity gain buffer (72).
The digital unit is similar two that of Figure 6a but with the addition of a synchronising input Lk to the sync. and code word generators 65 and 66. The Lk input, the effect of which is to reset the PRNG to some predetermined part of the PRNG sequence, is obtained from a code comparator (75) which is driven from a parallel-to-serial converter (74) which in turn gets its inputs from four matched filters and their comparators (75).
The filter block 75 contains four band-pass filters each of which takes an input from the buffer 70, and is set to accept one of four specific frequencies Fa, Fb, Fc and Fd. Each filter feeds a voltage comparator and a schmitt trigger, so that if one of the preset frequencies - Fa, say - is present the schmitt trigger emits a logic "1" (if this particular frequency is not present the logic signal remains at "0"). The four logic outputs L, Lb, Lc and Ld are fed into the converter 74 and thence into the code comparator 73 (which consists of a set of counters and a number of exor gates). The result is a locking signal Lk if Fa, Fb, Fc and Fd are present in a predetermined sequence and at a predetermined code, and the PRNG is then reset to a predetermined code, and thereafter then runs in synchronism with that in the encrypting unit.
Claims (11)
1. A signal encryption and decryption system which comprises: 1 ) for ecryption first comb filtering means, by which the signal to be encrypted may be comb filtered in such a way that the pattern of the nulls formed by the filtering process is changed in an agile, predetermined manner, the output of this first comb filtering means being the encrypted signal; and 2) for decryption
second comb filtering means, by which the encrypted signal to be decrypted may be comb filtered in a fashion complementary to that effected by the first comb filtering means, the output of this second comb filtering means being the decrypted signal.
2. A system as claimed in claim 1 which is for the encryption of a voice signal the majority of the intelligible information in which is spread across a frequency spectrum about 3.3kHz wide, wherein the null spacing is from 500 to 100 Hz, the corresponding number of nulls being from 6 to 30.
3. A system as claimed in either of the preceding claims, wherein the rate of change of the pattern of the comb filter-generated nulls during operation is such that there is a change at least three times and not more than thirty times every second.
4. A system as claimed in any of the preceding claims, wherein the degree of change of the null pattern is significant, but not such as to result in null displacement by an amount corresponding to the original null separation, and is not such as to result in the null pattern regularly returning within a short time (two or three changes) to one which "fits" with an earlier pattern.
5. A system as claimed in any of the preceding claims, wherein the comb-filter-generated null pattern is changed in an agile, apparently random but nevertheless predetermined manner.
6. A system as claimed in claim 5, wherein the pattern changes are effected underthe control of a pseudo-random number generator.
7. A system as claimed in any of the preceding claims, wherein, in order that in operation the null pattern formed by the complementary decrypting comb filter may be changed in the same manner as that of the encrypting comb filter, so that the two patterns are synchronised with each other, there is provided, associated with the decrypting comb filter, comparison means pre-programmable with a "list" of the patterns to match, this comparison means acting to compare each received null pattern and, when a pattern being compared corresponds to a pattern in the list, initiating further internal generation of the decrypting complementary null pattern starting from that point.
8. A system as claimed in any of the preceding claims, wherein each comb filter employs an analogue delay unit of the charge-coupled, or "bucket-brigade", device type so as in operation to provide a delayed version of the filter input signal which is then combined with an undelayed version, the clocking rate of the delay unit being varied so as in turn to vary the filter effect in the desired manner.
9. A system as claimed in claim 8, wherein in operation in the encrypting filter the delayed version is summed with the undelayed version, while in the decrypting filter the delayed version is itself the required result, but is also recursively fed back to and subtracted from the undelayed version at the input.
10. A signal encryption and decryption system as claimed in any of the preceding claims and substantially as described hereinbefore.
11. A transceiving system whenever employing a signal encryption and decryption system as claimed in any of the preceding claims.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB8106827A GB2094593B (en) | 1981-03-06 | 1981-03-06 | Signal encryption systems |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB8106827A GB2094593B (en) | 1981-03-06 | 1981-03-06 | Signal encryption systems |
Publications (2)
Publication Number | Publication Date |
---|---|
GB2094593A true GB2094593A (en) | 1982-09-15 |
GB2094593B GB2094593B (en) | 1984-11-07 |
Family
ID=10520143
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB8106827A Expired GB2094593B (en) | 1981-03-06 | 1981-03-06 | Signal encryption systems |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2094593B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0263687A2 (en) * | 1986-10-08 | 1988-04-13 | Oki Electric Industry Company, Limited | Spread spectrum communications systems and transmitters and receivers therefor |
EP0378446A2 (en) * | 1989-01-13 | 1990-07-18 | Joseph Alfred Webb | Signal encryption |
WO1992004785A1 (en) * | 1990-08-31 | 1992-03-19 | The Secretary Of State For Defence In Her Britannic Majesty's Government Of The United Kingdom Of Great Britain And Northern Ireland | Optical communications system |
CN113067663A (en) * | 2021-03-23 | 2021-07-02 | 海能达通信股份有限公司 | Communication method, system, related equipment and storage medium |
-
1981
- 1981-03-06 GB GB8106827A patent/GB2094593B/en not_active Expired
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0263687A2 (en) * | 1986-10-08 | 1988-04-13 | Oki Electric Industry Company, Limited | Spread spectrum communications systems and transmitters and receivers therefor |
EP0263687A3 (en) * | 1986-10-08 | 1989-07-19 | Oki Electric Industry Company, Limited | Spread spectrum communications systems and transmitters and receivers therefor |
US4879726A (en) * | 1986-10-08 | 1989-11-07 | Oki Electric Industry Co., Ltd. | Spread spectrum communications system |
EP0378446A2 (en) * | 1989-01-13 | 1990-07-18 | Joseph Alfred Webb | Signal encryption |
EP0378446A3 (en) * | 1989-01-13 | 1992-05-27 | Joseph Alfred Webb | Signal encryption |
WO1992004785A1 (en) * | 1990-08-31 | 1992-03-19 | The Secretary Of State For Defence In Her Britannic Majesty's Government Of The United Kingdom Of Great Britain And Northern Ireland | Optical communications system |
GB2267622A (en) * | 1990-08-31 | 1993-12-08 | Secr Defence | Optical communications system |
US5418905A (en) * | 1990-08-31 | 1995-05-23 | The Secretary Of State For Defence In Her Britannic Majesty's Government Of The United Kingdom Of Great Britain And Northern Ireland | Correlated photon pair optical communications system |
CN113067663A (en) * | 2021-03-23 | 2021-07-02 | 海能达通信股份有限公司 | Communication method, system, related equipment and storage medium |
CN113067663B (en) * | 2021-03-23 | 2023-03-10 | 海能达通信股份有限公司 | Communication method, system, related equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
GB2094593B (en) | 1984-11-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US4052565A (en) | Walsh function signal scrambler | |
US7076065B2 (en) | Chaotic privacy system and method | |
US3723878A (en) | Voice privacy device | |
JP5170586B2 (en) | Yuen encryption optical transmission device and reception device, Yuen encryption optical transmission method and reception method, and encryption communication system | |
US5166953A (en) | Technique for frequency-hopped spread spectrum communications | |
AU8141394A (en) | Process and device for speech scrambling and unscrambling in speech transmission | |
JPS63124638A (en) | Analog scrambler | |
US5003598A (en) | Secure communication system | |
EP3997813A1 (en) | Optical communication system using mode-locked frequency comb and all-optical phase encoding for spectral and temporal encrypted and stealthy transmission, and for optical processing-gain applications | |
US3808536A (en) | Communication scrambler system | |
Karavaev et al. | An experimental communication scheme based on chaotic time-delay system with switched delay | |
GB2094593A (en) | Signal encryption systems | |
US7308043B1 (en) | Scrambled chirp frequency jitter for feature suppression | |
CA1206528A (en) | Voice encryption and decryption system | |
US7333608B2 (en) | Analog scrambler | |
US5436973A (en) | Pseudo-random signal synthesizer with smooth, flat power spectrum | |
US6229897B1 (en) | Apparatus and method of secured analog voice communication | |
US4856063A (en) | No-overhead synchronization for cryptographic systems | |
US3123672A (en) | Grator | |
US2479338A (en) | Inverter and distorter for secret communications | |
US7512237B1 (en) | Encryption for optical communications using dynamic subcarrier multiplexing | |
US4013837A (en) | Voice security method and system | |
US4133977A (en) | Voice scrambler using syllabic masking | |
US20030091064A1 (en) | Systems and methods for creating covert channels using packet frequencies | |
US4058677A (en) | Sound scrambling equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PCNP | Patent ceased through non-payment of renewal fee |