1、 TIA-102.AAAD-B (Revision of TIA-102.AAAD-A) December 2015Project 25 Digital Land Mobile Radio Block Encryption Protocol ANSI/TIA-102.AAAD-B-2015 APPROVED: NOVEMBER 24, 2015 NOTICE TIA Engineering Standards and Publications are designed to serve the public interest through eliminating misunderstandi
2、ngs between manufacturers and purchasers, facilitating interchangeability and improvement of products, and assisting the purchaser in selecting and obtaining with minimum delay the proper product for their particular need. The existence of such Standards and Publications shall not in any respect pre
3、clude any member or non-member of TIA from manufacturing or selling products not conforming to such Standards and Publications. Neither shall the existence of such Standards and Publications preclude their voluntary use by Non-TIA members, either domestically or internationally. Standards and Public
4、ations are adopted by TIA in accordance with the American National Standards Institute (ANSI) patent policy. By such action, TIA does not assume any liability to any patent owner, nor does it assume any obligation whatever to parties adopting the Standard or Publication. This Standard does not purpo
5、rt to address all safety problems associated with its use or all applicable regulatory requirements. It is the responsibility of the user of this Standard to establish appropriate safety and health practices and to determine the applicability of regulatory limitations before its use. Any use of trad
6、emarks in this document are for information purposes and do not constitute an endorsement by TIA or this committee of the products or services of the company. (From Project No. TIA-PN-102.AAAD-B, formulated under the cognizance of the TIA TR-8 Mobile and Personal Private Radio Standards, TR-8.3 Subc
7、ommittee on Encryption). Published by TELECOMMUNICATIONS INDUSTRY ASSOCIATION Technology and Standards Department 1320 N. Courthouse Road, Suite 200 Arlington, VA 22201 U.S.A. PRICE: Please refer to current Catalog of TIA TELECOMMUNICATIONS INDUSTRY ASSOCIATION STANDARDS AND ENGINEERING PUBLICATIONS
8、 or call IHS, USA and Canada (1-877-413-5187) International (303-397-2896) or search online at http:/www.tiaonline.org/standards/catalog/ All rights reserved Printed in U.S.A. NOTICE OF COPYRIGHT This document is copyrighted by the TIA. Reproduction of these documents either in hard copy or soft cop
9、y (including posting on the web) is prohibited without copyright permission. For copyright permission to reproduce portions of this document, please contact the TIA Standards Department or go to the TIA website (www.tiaonline.org) for details on how to request permission. Details are located at: htt
10、p:/www.tiaonline.org/standards/catalog/info.cfm#copyright or Telecommunications Industry Association Technology (b) there is no assurance that the Document will be approved by any Committee of TIA or any other body in its present or any other form; (c) the Document may be amended, modified or change
11、d in the standards development or any editing process. The use or practice of contents of this Document may involve the use of intellectual property rights (“IPR”), including pending or issued patents, or copyrights, owned by one or more parties. TIA makes no search or investigation for IPR. When IP
12、R consisting of patents and published pending patent applications are claimed and called to TIAs attention, a statement from the holder thereof is requested, all in accordance with the Manual. TIA takes no position with reference to, and disclaims any obligation to investigate or inquire into, the s
13、cope or validity of any claims of IPR. TIA will neither be a party to discussions of any licensing terms or conditions, which are instead left to the parties involved, nor will TIA opine or judge whether proposed licensing terms or conditions are reasonable or non-discriminatory. TIA does not warran
14、t or represent that procedures or practices suggested or provided in the Manual have been complied with as respects the Document or its contents. If the Document contains one or more Normative References to a document published by another organization (“other SSO”) engaged in the formulation, develo
15、pment or publication of standards (whether designated as a standard, specification, recommendation or otherwise), whether such reference consists of mandatory, alternate or optional elements (as defined in the TIA Procedures for American National Standards) then (i) TIA disclaims any duty or obligat
16、ion to search or investigate the records of any other SSO for IPR or letters of assurance relating to any such Normative Reference; (ii) TIAs policy of encouragement of voluntary disclosure (see TIA Procedures for American National Standards Annex C.1.2.3) of Essential Patent(s) and published pendin
17、g patent applications shall apply; and (iii) Information as to claims of IPR in the records or publications of the other SSO shall not constitute identification to TIA of a claim of Essential Patent(s) or published pending patent applications. TIA does not enforce or monitor compliance with the cont
18、ents of the Document. TIA does not certify, inspect, test or otherwise investigate products, designs or services or any claims of compliance with the contents of the Document. ALL WARRANTIES, EXPRESS OR IMPLIED, ARE DISCLAIMED, INCLUDING WITHOUT LIMITATION, ANY AND ALL WARRANTIES CONCERNING THE ACCU
19、RACY OF THE CONTENTS, ITS FITNESS OR APPROPRIATENESS FOR A PARTICULAR PURPOSE OR USE, ITS MERCHANTABILITY AND ITS NONINFRINGEMENT OF ANY THIRD PARTYS INTELLECTUAL PROPERTY RIGHTS. TIA EXPRESSLY DISCLAIMS ANY AND ALL RESPONSIBILITIES FOR THE ACCURACY OF THE CONTENTS AND MAKES NO REPRESENTATIONS OR WA
20、RRANTIES REGARDING THE CONTENTS COMPLIANCE WITH ANY APPLICABLE STATUTE, RULE OR REGULATION, OR THE SAFETY OR HEALTH EFFECTS OF THE CONTENTS OR ANY PRODUCT OR SERVICE REFERRED TO IN THE DOCUMENT OR PRODUCED OR RENDERED TO COMPLY WITH THE CONTENTS. TIA SHALL NOT BE LIABLE FOR ANY AND ALL DAMAGES, DIRE
21、CT OR INDIRECT, ARISING FROM OR RELATING TO ANY USE OF THE CONTENTS CONTAINED HEREIN, INCLUDING WITHOUT LIMITATION ANY AND ALL INDIRECT, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES (INCLUDING DAMAGES FOR LOSS OF BUSINESS, LOSS OF PROFITS, LITIGATION, OR THE LIKE), WHETHER BASED UPON BREACH OF CONTR
22、ACT, BREACH OF WARRANTY, TORT (INCLUDING NEGLIGENCE), PRODUCT LIABILITY OR OTHERWISE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THE FOREGOING NEGATION OF DAMAGES IS A FUNDAMENTAL ELEMENT OF THE USE OF THE CONTENTS HEREOF, AND THESE CONTENTS WOULD NOT BE PUBLISHED BY TIA WITHOUT SUCH LIMITA
23、TIONS. ANSI/TIA-PN-102.AAAD-B i Foreword (This foreword is not part of this document) This document is a revision to the TIA.102-AAAD-A Project 25 Block Encryption Protocol specification, and has been submitted to APCO/NASTD/FED by the Telecommunications Industry Association (TIA), as provided for i
24、n a Memorandum of Understanding (MOU) dated December, 1993. That MOU provides that APCO/NASTD/FED will devise a Common System Standard for digital public safety communications (the Standard) and that TIA shall provide technical assistance in the development of documentation for the Standard. This do
25、cument has been developed by the TIA TR8.3 Encryption subcommittee and is being published to provide technical information on the emerging digital techniques for Land Mobile Radio Service. The symbol “P25” or the wording “Project 25” appearing on the cover sheet of this document when published or in
26、 the title of any TIA-102 document or Telecommunications Service Bulletin (TSB) referenced herein, that indicates the APCO/NASTD/FED Project 25 Steering Committee has adopted the document as part of the Standard. The appearance of the abbreviation “P25” or the wording “Project 25” on the cover sheet
27、 of this document or in the title of any document referenced herein does not limit the applicability of the information contained in this document to “P25” or “Project 25” implementations exclusively. This document includes 3 normative annexes. ANSI/TIA-PN-102.AAAD-B ii Patent Identification The rea
28、ders attention is called to the possibility that compliance with this document may require the use of one or more inventions covered by patent rights. By publication of this document no position is taken with respect to the validity of those claims or any patent rights in connection therewith. The p
29、atent holders so far identified have, we believe, filed statements of willingness to grant licenses under those rights on reasonable and nondiscriminatory terms and conditions to applicants desiring to obtain such licenses. The following patent holders and patents have been identified in accordance
30、with the TIA intellectual property rights policy: No patents have been identified. TIA shall not be responsible for identifying patents for which licenses may be required by this document or for conducting inquiries into the legal validity or scope of those patents that are brought to its attention.
31、 ANSI/TIA-PN-102.AAAD-B iii Table of Contents 1. Scope . 1 1.1 Revision History . 1 1.2 Normative References . 2 1.3 Informative References 3 2. Description 4 3. Sychronization for Voice Messages 5 3.1 Initialization Vector . 8 4. Keystream Generator . 8 4.1 Output FeedBack (OFB) Description . 9 4.2
32、 Encryption Input Register Initialization . 10 4.3 Block Encryption System . 13 4.4 Key Selection . 15 5. Voice Operation 16 5.1 Unencrypted Operation 16 5.2 FDMA CAI Clock Schedule 16 5.3 FDMA Encryption Bit Order . 18 5.4 Two-Slot TDMA CAI Clock Schedule . 22 5.5 Two-Slot TDMA Encryption Bit Order
33、 23 6. Data Operation 26 6.1 Encrypted Data Packet Structure . 27 Annex A (normative) Data Encryption Standard (DES) 30 A.1 Algorithm ID and Description . 30 A.2 Output FeedBack (OFB) Description . 30 A.3 Bit Correspondence . 30 A.4 Voice Encryption Example for FDMA 31 Annex B (normative) Triple Dat
34、a Encryption Algorithm (TDEA), . 35 B.1 Algorithm ID and Description . 35 B.2 Output FeedBack (OFB) Description . 35 B.3 Bit Correspondence . 35 B.4 Voice Encryption Examples for FDMA . 36 Annex C (normative) Advanced Encryption Standard (AES) 40 C.1 Algorithm ID and Description . 40 C.2 Output Feed
35、back (OFB) Description . 40 C.3 Bit Correspondence . 40 C.4 Voice Encryption Example for FDMA 41 C.5 Voice Encryption Example for TDMA 42 ANSI/TIA-PN-102.AAAD-B iv Terminology AES Advanced Encryption Standard a block encryption algorithm with a 128-bit input register (n) and a key variable length of
36、 128, 192, or 256 bits (k) ALGID Algorithm ID to indicate the type of encryption algorithm ARQ Automatic Retry Request to retry corrupted data packets BR Base Radio, a reference designating a base station CAI Common Air Interface, described in BAAA Cipher Text Encrypted information, sometimes called
37、 coded, the result of Plaintext exclusive ORed with Keystream CON Console, a standard reference model designation CRC Cyclic Redundancy Checksum for data error detection DES Data Encryption Standard a block encryption algorithm with a 64-bit input/output register (n) and a key variable length of 64-
38、bits (k, but every eighth bit going from left to right is a parity bit) ES Encryption Synchronization information embedded in voice ESS Encryption Synchronization Signaling FDMA Frequency Division Multiple Access IMBE Improved Multi-Band Excitation coder for voice IV Initialization Vector, the start
39、ing point of the encryption algorithm for each transmission Key Variable Affects how the algorithm converts plain text to cipher text Keystream The output of the block encryption algorithm that is exclusive ORed with Plain Text to form Cipher Text KID Key Identifier to indicate the encryption key fo
40、r the message LDU Logical Link Data Unit, one of two data units that comprise a voice superframe LFSR Linear Feedback Shift Register LLC Logical Link Control sublayer of the OSI Data Link Layer LSD Low Speed Data embedded in voice MI Message Indicator, used to synchronize encryption MR Mobile Radio,
41、 a reference designating a mobile or portable radio Octet 8 bits grouped together, also called a byte OFB Output Feed Back, one operating mode for block encryption OSI Open System Interconnection reference model Plain Text Unencrypted information, sometimes called clear RFG RF system Gateway, a stan
42、dard reference model designation SAP Service Access Point, where a network provides a service TDEA Triple Data Encryption Algorithm a block encryption algorithm with a 64-bit input register and a key variable length of 64, 128, or 192 bits (k, but every eighth bit going from left to right is a parit
43、y bit). Also known as Triple DES. TDMA Time Division Multiple Access ANSI/TIA-PN-102.AAAD-B 1 1. SCOPE The Project 25 standard covers all of the parts of a system for public-safety Land Mobile Radio communications. These systems include portable radios for hand held operation, mobile radios for vehi
44、cular operation, base stations for fixed installations, and other fixed equipment for wide area operation and console operator positions, as well as computer equipment for data communications. The standard defines the means for this equipment to send and receive digital information, in the form of e
45、ither voice or data (i.e. non-voice) messages. One requirement given in the TIA-102 suite of standards is to be able to protect digital communications with encryption. The implication is that a means for encryption and decryption needs to be included in those system elements (e.g. portable and mobil
46、e radios) that intend to protect the messages they exchange in conformance to the other parts of Project 25 standard. It is the scope of this document to describe how to use encryption to protect messages for the Project 25 standard. TSB102 also contains a Functional Network Model to describe a Proj
47、ect 25 standard system. Such a system is decomposed into functional groups with simple designations like MR for mobile radio, and BR for base station (radio). These functional groups are loosely correlated to real products and devices, but they need not be. Each functional group has one or more inte
48、rfaces to other functional groups that allow information to be transferred through the system. The interface for communications over a radio channel is called the Common Air Interface (CAI). The formats for transmission of information over the Common Air Interface are described in BAAA and in BBAC.
49、The functions of encryption and decryption generally take place near the end points of a message path in a system, in order to maintain the confidentiality of the information through as much of the system as possible. This means that the encryption and decryption functions can be provided at points where voice information is coded with IMBE, such as an MR (mobile or portable radio) or a CON (console). The functions may also be provided at points where data (non-voice) information enters the system such as an RFG (RF system Gateway). This Block Encryption Pr