Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
0 of .
Results for:
No results containing your search query
P. 1
Satellite Encription

Satellite Encription

Ratings: (0)|Views: 2 |Likes:
Satellite Encription
Satellite Encription

More info:

Categories:Types, Reviews
Published by: Али Гхалехбан on Mar 01, 2013
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





 The use of satellites in communication systems is very much a factof everyday life, as is evidenced by the many people who are equipped withantennas or “dishes”, used for reception of satellite television. Satellite forman essential part of telecommunications systems worldwide carrying largeamounts of data and telephone traffic in addition to television signals.Satellites offer a number of features not readily available with other means of communications. In recent years, Satellite communication has begun to facecompetition from optical fibre systems for point to point communicationbetween large concentrated traffic sources. Recent advances in systemarchitecture have permitted the introduction of satellite personalcommunication services.When we communicate via satellites there is a possibility that aninterceptor can interfere and read the message being sent. To prevent this andto send the information in a secure manner we use satellite encryption.
: The term encryption is also known as scrambling. A system that takesthe signal and reconfigures it into something that is unusable without acorresponding decoder. Encryption means secret writing. It is used to hideinformation and access by unauthorized parties especially duringcommunication in military and national affairs.
In this method the sender creates a message, encrypts it by acryptographic process and transmits it as a ciphertext. The receiver decryptsthe received message to reveal its true content. In this, it is necessary that boththe sender and receiver must have common knowledge of the encryptionprocess and that both share a secret common element –typically thecryptographic key. The receiver must use the same key to which the senderhas used to encrypt The message to decrypt it. If he uses a different key, then it results in adifferent cipher text.
 There are two types of encryption:
Symmetric encryption or Secret key encryption
Asymmetric encryptionA scheme in which both communicating parties must have a commonkey which is called symmetric encryption. But it has an operational disadvantageof requiring a safe method of distributing keys to relevant parties. However, ascheme called asymmetric encryption was developed to mitigate many of thesedifficulties through the use of different keys for encryption. Each participant hastwo keys. The public key is published, is available freely to anyone, and is usedfor encryption. The private key is held in secrecy and is used for decryption. It iscomputationally infeasible in any reasonable length of time to derive the privatekey from the knowledge of public key.
 Satellite encryption provides the following features:
Integrity check
Digital signature
Digital date/time stamp
Now we are going to see how to implement encryption .At oneend of the system are the people who plan and operate the satellites. At the otherend of this pipeline are the public, the results are delivered at the doorstep.UPLINK:Uplink is a general term given to a radio signal sent up from earth to asatellite. The signal is a highly directional microwave radio beam with a frequencyof 3billion to 7billionHZ and at power levels of less than 20000 watts. Thepurposes for an uplink include commanding, tracking and radio science. On theradio frequency uplink to the satellite, encrypted command signals are send by theuser that the satellites receives , decodes and acts upon. In this we have to considerwhat observation the satellite is going to make, when to make them, whatencrypted data rates to use. To match the desired scientific investigation withexactly the right encrypted commands requires a good amount of informationabout the satellite and about the target system. Once the planners have done their job, all the details of a plan of action for a given period are passed to another team. This team is called sequence team which is responsible for creating the actualencrypted commands to be up linked. This team relies on highly advancedcomputer programs to help with such tasks as selecting and time-tagging theproper encrypted commands, placing them in the correct order, checking that nooperating constraints are violated and making sure that all of the instructions to the

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->