SONET Crypto Counter

How TX and RX create an unhackable interaction log





Crypto Visualization








This Cryptographic counter technology has been incorporated in these TX and RX modules , so that it can't be misused by any others with same frequency of 867MHz. By this technique , no one can bypass the signal and control the horn system line . This ensures safety and avoids misusing the current technology.

For each TX and RX interference, the counter keeps the count of interactions it has made in both TX and RX.The transmitter combines: secret key, counter and the command and runs them through a cryptographic algorithm. This creates a unique encrypted code for every transmission. If a spoof module tries to interact with the same frequency ,the TX's crypto counter doesn't get matched with the current count and denies the request. Also , it doesn't add up space in the memory as it erases previous data in sometime.