Font Size: a A A

Mobile Terminal Encrypted Communication Fpga Chip Design And Realization

Posted on:2012-03-25Degree:MasterType:Thesis
Country:ChinaCandidate:X Y ChenFull Text:PDF
GTID:2218330368997675Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Along with the rapid development of mobile communication technology, especially the widespread global use of the 2G/3G system, the security needs of 2G/3G mobile phone communication are growing, and the custom requirement for security has become more sophisticated. Although there is a relatively complete set of safety norms and technology in the standard 2G/3G system, the mere adoption of wireless channel encryption technology only ensure voice signals encrypted between cell phone and the base station, speech signals between the base stations in the relay process are still transmitted in exposure.In this paper, in the end 2G/3G network encryption as the object of study, discussion based on the anti-RPE-LTP (Regular Pulse Excitation - Long Term Prediction), and AMR voice compression and decryption algorithm of the FPGA chip implementation. The use of VHDL hardware description language and FPGA advantages designed based on the voice channel anti-RPE-LTP coding the encryption and decryption algorithms to achieve end to end secure encrypted communications, based on the data channel to overcome the technical shortcomings. Complete frame scrambling encryption, plus sync to sync, frame scrambling decryption software module design, complete power, FPGA, PROM, AD and other hardware clock and module design, produced with FPGA-based voice codecs to expand circuit boards, full-duplex encrypted communication, the module can be in different mobile communication operators call between different networks, call delay, high strength encryption, decryption, audio reproduction is high.If the hardware module can further improve the integration of hardware, made of a mobile network in any inter-end voice encryption and decryption modules, to achieve practical and industry can be very easy, the research object has good practical value.
Keywords/Search Tags:2G/3G, FPGA, voice encryption/ decryption
PDF Full Text Request
Related items