13.07.2015 Views

View File - University of Engineering and Technology, Taxila

View File - University of Engineering and Technology, Taxila

View File - University of Engineering and Technology, Taxila

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

cryptographic keys K ti (where i ¼ 1; 2; ...; n) shared between the communicatingearth stations while the satellite remains transparent: meaning thesatellite has no role in the ciphering process.A cryptosystem that may work for the scenario depicted by Fig. 1.4 isdescribed as follows. All the earth stations TS(i) <strong>and</strong> RS( j) are assumedcapable <strong>of</strong> generating r<strong>and</strong>om numbers RDN(i) <strong>and</strong> RDN( j), respectively.Each transmitting earth station TS(i) generates <strong>and</strong> stores the r<strong>and</strong>om numbersRDN(i). It then encrypts RDN(i), that is, E y ½RDNðiÞŠ, <strong>and</strong> transmits theencrypted r<strong>and</strong>om number E y ½RDNðiÞŠ to RS( j). The receiving earth stationRS( j) generates RDN( j) <strong>and</strong> performs modulo-2 (simply, mod-2) additionwith RDN(i); that is, RDNð jÞRDNðiÞ to obtain the session key K r ð jÞ,where denotes mod-2 addition. It should be noted that mod-2 addition isimplemented with exclusive-OR gates <strong>and</strong> obeys the ordinary rules <strong>of</strong> additionexcept that 1 1 ¼ 0.The transmitting earth station retrieves RDN(i) <strong>and</strong> performs mod-2addition with RDN( j) (that is, RDNðiÞRDNð jÞ) to obtain the session keyK t ðiÞ. This process is reversed if RSð jÞ transmits messages <strong>and</strong> TSðiÞ receives.Figure 1.5 demonstrates the case where the satellite plays an activeciphering role. In it the keys K Ei (where i ¼ 1; 2; ...; nÞ the satellite receivesfrom the transmitting uplink stations TS i are recognized by the onboardprocessor, which in turn arranges, ciphers, <strong>and</strong> distributes to the downlinkFIGURE 1.5Ciphering with keyed satellite onboard processors.Copyright © 2002 by Marcel Dekker, Inc. All Rights Reserved.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!