当前位置:网站首页>What is the difference between learning code, rolling code and fixed code? The number of repeated codes, coding capacity and the principle of rolling code
What is the difference between learning code, rolling code and fixed code? The number of repeated codes, coding capacity and the principle of rolling code
2022-06-25 04:03:00 【ZhangJiQun.】
Catalog
Learning code Rolling code Fixed code What's the difference?
Multiple code number , Coding capacity
Learning code Rolling code Fixed code What's the difference?
One 、 Meaning is different :
1、 Fixed code : The address code is fixed , Although the address code is fixed , But it's made up of 8 Bits of different address codes , Pairing can be done through different combinations , This will not happen . The fixed code of the remote control is relative to the rolling code , Generally by PT2262/2272 The system consists of hardware coding 、 Fixed code remote control system .
2、 Learning code : Composed of millions of different codes , The receiver learns only through code matching , To recognize the remote control . It greatly increases the security of the product . Usually learn the code IC by 1527 and 2240, Decode to MCU .
3、 Rolling code : At present, it is mainly used in RKE(Remote Keyless Entry) In the system , Authentication .
Two 、 Characteristics of different :
1、 Both fixed code and learning code are used in civil and commercial alarm products , Home burglar alarm and home gas alarm are common at home , The rolling code is only used for RKE The system authenticates .
2、 Coding, decoding and coding combination are different : Coding of learning code IC by 1527 and 2240, Decode to MCU ; The fixed code code is PT2262( Traditional anti-theft detector ), decode PT2272( Traditional alarm host );
3、 The security of fixed code is not high , Address coding is easy to duplicate ; The security of learning code is relatively high ,100 Ten thousand groups of codes greatly reduce the probability of code repetition in use .
Multiple code number , Coding capacity
1、 The number of duplicate yards is different :
Rolling code : In the use “ Duplicate code ” The probability is very small , And there will be solder joints on the back of the chip .
Fixed code : Automatically change the code after each launch , The probability of repeated code is very high .
2、 The coding capacity is different :
Rolling code : The code value can be seen through the right solder joint connection .
Fixed code : Coding capacity is only 6561 individual , Out-of-service “ Code interceptor ” Get the address code .
The principle of rolling code
The encoder detects key input , Wake up the system from the power saving state , Synchronous counting plus 1 , Together with the serial number, it is encrypted by the key to form ciphertext data , And send it out with key value and other data . Because the synchronization count value is different every time it is sent , Even if the same key is pressed many times . Sync count automatically scrolls forward , The transmitted codeword will not happen again . Therefore, it is called rolling code . The synchronous count is the same as the encoder serial number 64 Two people passed together DES encryption ,DES The key is unique to the manufacturer , It must be kept secret . The encrypted ciphertext is transmitted through the RF system .
After the receiving end receives the ciphertext , Through the manufacturer's DES Key to decrypt , After decryption, the synchronization count and encoder serial number are obtained . First, check whether the encoder serial number corresponds to the receiver serial number , If the corresponding , Check whether the synchronization count is within the synchronization window , That is, whether it is greater than the synchronization count saved locally , But not much , If it's too big , This machine will synchronize again . If in the synchronization window , Inform the actuator to execute the user command , For example, open or close the door lock .
Because the encryption algorithm can break up the plaintext , therefore , The rolling of codes will make the transmitted codes vary greatly and difficult to crack , Due to the existence of synchronous counting , Repeated sending has no effect , Therefore, to break this kind of system, we must break DES Algorithm . The synchronization count is 16 position , Can be up to 2 Of 16 Power =65536 , If you use... Every day 10 Time , Then there are 18 Years of service life .32 Bit's serial number , Capacity of 232 = 42 Billion , It can fully meet the production requirements .
边栏推荐
- 中国天眼发现地外文明可疑信号,马斯克称星舰7月开始轨道试飞,网信办:APP不得强制要求用户同意处理个人信息,今日更多大新闻在此...
- Perfect shuffle problem
- x86 CPU,危!最新漏洞引发热议,黑客可远程窃取密钥,英特尔“全部处理器”受影响...
- Preparedstatement principle of preventing SQL injection
- “语法糖”——我的编程新知
- Cesium 拖拽3D模型
- Now, the ear is going into the metauniverse
- 教你如何在winpe里安装win11系统
- Sun Wu plays Warcraft? There is a picture and a truth
- Comprehensive assignment of thesis writing instruction of Dongcai
猜你喜欢

居家办公之后才明白的时间管理 | 社区征文

9 necessary soft skills for program ape career development

中国天眼发现地外文明可疑信号,马斯克称星舰7月开始轨道试飞,网信办:APP不得强制要求用户同意处理个人信息,今日更多大新闻在此...

Internet Explorer died, and netizens started to build a true tombstone

Russian Airi Research Institute, etc. | SEMA: prediction of antigen B cell conformation characterization using deep transfer learning

Trading system development (IV) - trading counter system

client-go gin的简单整合十一-Delete

Development of trading system (I) -- Introduction to trading system

程序猿职业发展9项必备软技能

Crawler grabs the data of Douban group
随机推荐
[team learning] SQL programming language notes - task04
Tai Chi graphics 60 lines of code to achieve classic papers, 0.7 seconds to get Poisson disk sampling, 100 times faster than numpy
程序猿职业发展9项必备软技能
OpenSUSE installation pit log
Solution to the problem that Linux crontab timed operation Oracle does not execute (crontab environment variable problem)
MySQL modifies and deletes tables in batches according to the table prefix
你真的需要自动化测试吗?
2022-06-21-flink-49 (I. SQL manual)
Russian Airi Research Institute, etc. | SEMA: prediction of antigen B cell conformation characterization using deep transfer learning
Do you really need automated testing?
驻波比计算方法
Svn deployment
[rust submission] review impl trail and dyn trail in rust
Amazon's other side in China
Jilin University 22 spring March "technical economics" assignment assessment-00073
x86 CPU,危!最新漏洞引发热议,黑客可远程窃取密钥,英特尔“全部处理器”受影响...
Work assessment of Biopharmaceutics of Jilin University in March of the 22nd spring -00005
Development of trading system (V) -- Introduction to Sinovel counter
Work assessment of pharmacotherapeutics of Jilin University in March of the 22nd spring -00064
Intel 13代酷睿首次露出真面目:68MB缓存提升明显