GB2306860A - Encryption/decryption system encrypts data using encrypted key - Google Patents

Encryption/decryption system encrypts data using encrypted key Download PDF

Info

Publication number
GB2306860A
GB2306860A GB9521742A GB9521742A GB2306860A GB 2306860 A GB2306860 A GB 2306860A GB 9521742 A GB9521742 A GB 9521742A GB 9521742 A GB9521742 A GB 9521742A GB 2306860 A GB2306860 A GB 2306860A
Authority
GB
United Kingdom
Prior art keywords
circuit
encryption
lfsr
data
decryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB9521742A
Other versions
GB9521742D0 (en
Inventor
Michel Burri
Pascal Renard
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Motorola Solutions Inc
Original Assignee
Motorola Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Motorola Inc filed Critical Motorola Inc
Priority to GB9521742A priority Critical patent/GB2306860A/en
Publication of GB9521742D0 publication Critical patent/GB9521742D0/en
Publication of GB2306860A publication Critical patent/GB2306860A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • H04L2209/125Parallelization or pipelining, e.g. for accelerating processing of cryptographic operations

Abstract

An encryption arrangement, eg for vehicle anti-theft by ignition immobilisation includes a first encrypting circuit coupled to receive data 220 for encryption, and arranged to encrypt the received data according to a received encrypted data key, and a second encrypting circuit, coupled to receive a data key 120, and arranged to encrypt the data key to provide the encrypted data key to the first encrypting circuit.

Description

ENCRYPTION/DECRYPTION ARRANGEMENTS Field of the Invention This invention relates to encryption/decryption arrangements, and particularly though not exclusively to encryption/decryption arrangements for use in security applications.
Background of the Invention Many devices such as smartcards and electronic locks require a highly secure data transmission between two devices, preferably in a form which prevents unauthorised access. A high level of security can be achieved using encryption/decryption techniques, used to encrypt the data before transmission by a first device and to decrypt the data after reception by a second device. Usually the higher the level of security, the greater the complexity of the hardware and software used to perform the encryption/decryption algorithm. Consequently much silicon is used and the resulting execution time is long.
However, a problem with this arrangement is that some applications require a high level of security using an encryption algorithm and yet also a fast execution time. A typical example of such an application is a vehicle antitheft system. Data is exchanged between the vehicle ignition switch and the key. If a mutual acknowledgement occurs, the user can drive the vehicle; if not, the engine is immobilised. The exchanged data is more secure if it is encrypted and decrypted as described above. Vehicle manufacturers require anti-theft systems in their vehicles to have fast total response times of about 100 ms. such that as soon as the user turns the key in the ignition switch, the engine is either started or immobilised.
This invention seeks to provide an encryption/decryption circuit and method which mitigates the above mentioned disadvantages.
Summarv of the Invention According to a first aspect of the present invention there is provided an encrypting arrangement comprising a first encrypting circuit coupled to receive data for encryption, and arranged to encrypt the received data according to a received encrypted data key; and, a second encrypting circuit, coupled to receive a data key, and arranged to encrypt the data key to provide the encrypted data key to the first encrypting circuit.
According to a second aspect of the present invention there is provided a decryption arrangement comprising, a first decrypting circuit coupled to receive data for decryption, and arranged to decrypt the received data according to a received decrypted data key; and, a second decrypting circuit, coupled to receive an encrypted data key, and arranged to decrypt the encrypted data key to provide the decrypted data key to the first decrypting circuit.
Preferably one of the first and second encrypting/decrypting circuits is a shift register. Alternatively, the first and second encrypting/decrypting circuits are preferably both shift registers.
Preferably the encrypted key is mixed with the received data to produce a mixed data signal for encryption/decryption. Preferably a feature of the mixed signal is used to determine the number of shifts of the shift registers.
The feature is preferably the number of occurrences of the mixed signal.
In this way an encryption/decryption algorithm is provided which allows the user to obtain a good level of confidentiality, a low complexity in term of silicon and a fast execution time whatever the implementation (hardware or software).
Brief Description of the Drawing(s) An exemplary embodiment of the invention will now be described with reference to the drawing in which: FIGS.1, 2 and 3 show conceptual diagrams of linear feedback shift registers in accordance with the invention.
FIGS.4 and 5 show bit sequence tables associated with the linear feedback shift registers of FIGS. 1, 2 and 3.
FIG.6 shows a preferred embodiment of an encryption/decryption circuit in accordance with the invention.
Detailed Description of a Preferred Embodiment Referring to FIG. 1, there is shown a Linear Feedback Shift Register (LFSR) 10. The LFSR 10 contains a number of cells yl, y2, y3 ,yn each containing a data bit. Output paths from each of the cells yl, y2, y3, ,yn are input to a NOR gate 15, where they are summed together in modulo-2.
The result is then fed-back to the first cell yl, while the previous bit stored in each cell is shifted to the next cell on the right. A binary sequence is initially loaded into the cells of the LFSR 10, and a characteristic bit pattern is generated through successive iterations of the LFSR 10.
Mathematically, the operation of the LFSR 10 is:
y'l= yl y2.... ....yn y,2=yl y,3=y2 y'n=yn-l Equation 1 This set of linear equations have the following matrix form: [r]= [T].[Y] Equation 2 where [T] is the transition matrix.
Example for n = 4.
y'l -1 1 lyl # y' 2 # # 1 0 0 0 ## y2 # y' 3 0 1 0 0 y3 y' 4 0 0 1 0 y4
Equation 3 The polynomial P(x) = det([T] - [X].[I]) is the characteristic polynomial of [T].
Over the field of the integers mod 2, this can be written as: P(x) = det([T] + [X].[I]) Equation 4 where [I] is the unity matrix.
Characteristic polynomials for LFSR:
1 1 1 1 X000 l+X 1 1 1 1 0 0 0 0 X 0 0 1 X 0 0 P4(x) = det##0 1 0 0#+#0 0 X 0##=# 0 1 X 0 0 1 0 0 X 0 0 X 0 0 1 X 0 0 0 1 0 0 0 0 X 0 0 1 X X 0 0 1 1 1 P4(x) = (1 + X)#1 X 0#+#1 X 0#=(1 + X)# X.# ##+# #+# 0 1 X 0 1 X P4(x) = X4 + X3 + X2 + X + 1 Therefore the polynomial for an n-cell LFSR will be: Pn(x) = Xn + Xn-1 + +X+1 An LFSR having a single cycle of length 2n -1 is said to be a maximum sequence LFSR and is suitable for encryption/decryption since the quality of data mixing inside a cycle is pseudo random. The period of the transition matrix must then be 2n -1. The characteristic polynomial of a maximum sequence LFSR must satisfy the two following conditions: - it must be irreducible (not factored) - it must not be a divisor of Xk -1 for k smaller then 2n -1.
The irreducible polynomials are deduced from P(x) in the following way: P(x) = Q(x). D(x) + R(x) Example for n = 4.
P(x) = X4 +X3+X2 +X+l =(X+1).(X3 +1)+X2 where: Q(x) = (X + 1) is the quotient D(x) = (X3 + 1) is the greatest common divisor of P(x) R(x) = X2 is the remainder Q(x) is the inverse of feedback equation of D(x). Therefore it is possible to build a reversible encryption/decryption LFSR, if a first predetermined selection of the feedback paths is made (relating to the polynomial Q(x)) during the encryption sequence and a second predetermined selection of the feedback paths is made (relating to the polynomial D(x)) during the decryption sequence.
Referring now also to FIG. 2, a LFSR 30 having four cells x0 xl, x2, and x3 is shown. The feedback paths from cells xl and x0 are selected, corresponding to he polynomial P4(x) when divided by Q(x) = (X + 1). The table 60 of FIG. 4 shows the equivalent binary sequence when the LFSR 30 is shifted to right and initialised by "1 1 1 1".
Referring now also to FIG. 3 a LFSR 50 having four cells x0, xl, x2 and x3 is shown. The feedback paths from cells x0 and x3 are selected, corresponding to he polynomial P4(x) when divided by D(x) = (X3 + 1) . The table 70 of FIG. 5 shows the equivalent binary sequence when the LFSR 50 is shifted to left and initialised by " 1 1 1 1". it can be seen that the binary sequence of the tables 60 and 70 follows the same pattern but in a reversed order.
The above principle may be used for encryption and decryption purposes as follows. In the case of a vehicle key and ignition lock, the key has a first LFSR such as the LFSR 50 initialised with a plain text message and having a first feedback selection scheme. When the key is placed in the ignition lock the first LFSR loads a summed, fedback bit to the leftmost cell and shifts the plain text message to the right. This is repeated a predetermined number of times and finally the message (which is now encrypted) is transmitted to the ignition lock.
The ignition lock has a second LFSR which is which has the same structure as the first LFSR, but with a second feedback selection scheme which is arranged to be complimentary with respect to that of the first LFSR. The second LFSR is initialised with the received encrypted message. The second LFSR loads a summed, fedback bit to the rightmost cell and shifts the plain text message to the left. This is repeated the same predetermined number of times, resulting in a decrypted message which the restored plain text message. This plain text message is then compared to an expected message and if the result of the comparison is positive, the ignition is enabled.
Referring now to FIG. 6, an encryption/decryption circuit 100 is shown. The circuit 100 is arranged for providing a further embedded encrypting/decrypting method by employing two LFSRs, one arranged to encrypt secure key data before mixing this data with that from the other LFSR. The circuit 100 comprises an encrypting/decrypting circuit 200, and a random key generator (RKG) circuit 110 and other components to be further described below.
The RKG circuit 110 comprising a first LFSR 115 of length M having a secure data input terminal 120 for loading secure data into the first LFSR 115, to be further described below. The first LFSR 115 has an output 150.
The random key generator circuit also includes first and second feedback paths 130 and 140 respectively. The first feedback path 130 includes an encryption input 135, and is arranged to provide encryption shifting in a first direction for the first LFSR 115. The second feedback path 140 includes an decryption input 145, and is arranged to provide decryption shifting in a second direction for the first LFSR 115.
The encrypting/decrypting circuit 200 comprises a second LFSR 210 of length N coupled to serial input and output terminals 220 and 215 respectively, and having parallel input and outputs to be further described below. Third and fourth feedback paths 230 and 240 respectively are coupled to the second LFSR 210. The first feedback path 230 includes an encryption input 235, and is arranged to provide encryption shifting in a first direction for the second LFSR 210. The second feedback path 240 includes an decryption input 245, and is arranged to provide decryption shifting in a second direction for the second LFSR 210.
The parallel output of the second LFSR 210 is coupled to a mixer circuit, which takes this output and the output 150 of the first LFSR 115, mixing them to produce a mixed parallel output.
The mixed parallel output is then sent to the parallel input of the second LFSR 210. A parity circuit 260 is coupled to count each occurrence of the mixed parallel output signal, and provides a parity bit signal indicating the whether an odd or an even number of signals have been detected.
A shift circuit 270 is coupled to receive the parity bit signals, and provides clocking signals to shift both the first and second LFSRs 115 and 210 respectively by an equal number of shifts. The number of shifts are determined by the parity bit signals. If a parity odd (0) signal is received, a first number of clocking signals are provided. If a parity even (1) signal is received, a second number of clocking signals are provided. In this way a further degree of complication is added, resulting in more security.
In operation, to encrypt a message, the encrypting feedback paths 130 of the first LFSR 115 and 230 of the second LFSR 150 are enabled by their respective inputs 135 and 235. The decrypting feedback paths 140 and 240 remain disabled.
A plain text message of length N is serially received at the serial input terminal 220 and loaded into the second LFSR 210. Simultaneously, a secret key is loaded into the first LFSR 115 via the secure data input terminal 120.
The value of the data in both LFSRs 115 and 210 are then combined in the mixer circuit 250. The mixed parallel signal is then loaded into the second LFSR 210. In this way the plain text message is encoded by the secure key data before shifting. The parity of the number of received mixed signals is then determined by the parity circuit 260, and an appropriate parity signal is sent to the shift circuit 270, which in turn sends a predetermined number of clocking signals to both LFSRs. Thereby the contents of the first and second LFSRs 115 and 210 are both right shifted by an amount determined by the shift circuit 270.
To provide increased security, the above process may be repeated a number of times with the partial results stored in the LFSRs 115 and 210, before a final encrypted message is provided from the second LFSR 210 at the serial output terminal 215.
The decryption process is similar to the encryption process described above.
The encrypted message is fed into the second LFSR 210 via the serial input terminal 220, the decryption inputs 145 and 245 are enabled and the encryption inputs 135 and 235 are disabled, thereby mandating a left shift operation for the LFSRs 115 and 210. For the decryption operation, the secure key data is not loaded into the first LFSR 115. Instead, the last shifted result from the encryption sequence is retained in the LFSR 115, and this is used as the first value provided to the mixer circuit 250 during decryption. The decryption sequence continues in an identical manner to the encryption sequence, being repeated the same number of times, and utilising the mixer circuit 250, the parity circuit 260 and the shift circuit 260 as described above.
In this way a deeply embedded encryption/decryption algorithm is produced.
The algorithm is easily customised by varying the parameters of the secret key, the feedback paths, the number of shifts, the number of repetitions and the lengths N and M of the LFSRs 115 and 210 respectively.
It will be appreciated that alternate embodiments to the one described above are possible. For example, the arrangement of the feedback paths need not be limited to those precisely described above. Furthermore, an alternate method could be used for selecting the number of shifts to be performed by the shift circuit 270. For example, a logic circuit with an input from the first LFSR 115 could replace the parity circuit 260.

Claims (9)

Claims
1. An encryption arrangement comprising, a first encrypting circuit coupled to receive data for encryption, and arranged to encrypt the received data according to a received encrypted data key; a second encrypting circuit, coupled to receive a data key, and arranged to encrypt the data key to provide the encrypted data key to the first encrypting circuit.
2. A decryption arrangement comprising, a first decrypting circuit coupled to receive data for decryption, and arranged to decrypt the received data according to a received decrypted data key; a second decrypting circuit, coupled to receive an encrypted data key, and arranged to decrypt the encrypted data key to provide the decrypted data key to the first decrypting circuit.
3. The circuit of claim 1 or claim 2 wherein one of the first and second encrypting/decrypting circuits is a shift register.
4. The circuit of claim 1 or claim 2 wherein the first and second encrypting/decrypting circuits are shift registers.
5. The circuit of claim 4 or claim 5 wherein the encrypted key is mixed with the received data to produce a mixed data signal for encryption/decryption.
6. The circuit of claim 4 or claim 5 wherein a feature of the mixed signal is used to determine the number of shifts of the shift registers.
7. The circuit of claim 6 wherein the feature is the number of occurrences of the mixed signal.
8. An encryption circuit substantially as hereinbefore described and with reference to the drawings.
9. A decryption circuit substantially as hereinbefore described and with reference to the drawings.
GB9521742A 1995-10-24 1995-10-24 Encryption/decryption system encrypts data using encrypted key Withdrawn GB2306860A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB9521742A GB2306860A (en) 1995-10-24 1995-10-24 Encryption/decryption system encrypts data using encrypted key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB9521742A GB2306860A (en) 1995-10-24 1995-10-24 Encryption/decryption system encrypts data using encrypted key

Publications (2)

Publication Number Publication Date
GB9521742D0 GB9521742D0 (en) 1996-01-03
GB2306860A true GB2306860A (en) 1997-05-07

Family

ID=10782809

Family Applications (1)

Application Number Title Priority Date Filing Date
GB9521742A Withdrawn GB2306860A (en) 1995-10-24 1995-10-24 Encryption/decryption system encrypts data using encrypted key

Country Status (1)

Country Link
GB (1) GB2306860A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102010032315A1 (en) 2010-07-27 2012-02-02 Volkswagen Ag Method for encrypting information which is to be transmitted from transmitting device to receiving device, involves providing constant identification information which is constant at different encryption operations

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2020513A (en) * 1978-05-03 1979-11-14 Atalla Technovations Improved method and apparatus for securing data transmissions
EP0387599A2 (en) * 1989-03-14 1990-09-19 Tandem Computers Incorporated Method of encrypting transmitted data using a unique key
EP0443752A2 (en) * 1990-02-21 1991-08-28 General Instrument Corporation Of Delaware Block-cipher cryptographic device based upon a pseudorandom nonlinear sequence generator
GB2274229A (en) * 1992-12-19 1994-07-13 Ibm Cryptography system.
GB2278518A (en) * 1993-05-14 1994-11-30 Trafford Limited Encrypted data transfer
DE4441001A1 (en) * 1993-11-17 1995-05-18 Sagem High security vehicle engine control unit incorporates immobiliser

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2020513A (en) * 1978-05-03 1979-11-14 Atalla Technovations Improved method and apparatus for securing data transmissions
EP0387599A2 (en) * 1989-03-14 1990-09-19 Tandem Computers Incorporated Method of encrypting transmitted data using a unique key
EP0443752A2 (en) * 1990-02-21 1991-08-28 General Instrument Corporation Of Delaware Block-cipher cryptographic device based upon a pseudorandom nonlinear sequence generator
GB2274229A (en) * 1992-12-19 1994-07-13 Ibm Cryptography system.
GB2278518A (en) * 1993-05-14 1994-11-30 Trafford Limited Encrypted data transfer
DE4441001A1 (en) * 1993-11-17 1995-05-18 Sagem High security vehicle engine control unit incorporates immobiliser

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102010032315A1 (en) 2010-07-27 2012-02-02 Volkswagen Ag Method for encrypting information which is to be transmitted from transmitting device to receiving device, involves providing constant identification information which is constant at different encryption operations

Also Published As

Publication number Publication date
GB9521742D0 (en) 1996-01-03

Similar Documents

Publication Publication Date Title
Zeng et al. Pseudorandom bit generators in stream-cipher cryptography
US5623548A (en) Transformation pattern generating device and encryption function device
US6014446A (en) Apparatus for providing improved encryption protection in a communication system
JP4094671B2 (en) Spiral scramble
EP1021887B1 (en) Method and apparatus for generating a stream cipher
Guo et al. Recomputing with permuted operands: A concurrent error detection approach
EP0739109A2 (en) Method and apparatus for authentication in an electronic locking system
JPH07104976A (en) Pseudo random number generator
US7142675B2 (en) Sequence generator and method of generating a pseudo random sequence
US20070067374A1 (en) Random Number Generating Circuit
JP6714735B2 (en) Random code generator
US5649014A (en) Pseudorandom composition-based cryptographic authentication process
CA2193196A1 (en) Pseudorandom number generator
Cui et al. A guaranteed secure scan design based on test data obfuscation by cryptographic hash
JP3044565B2 (en) Encryption device
JPH10240500A (en) Random number generator and method, enciphering device and method, decoder and method and stream cipher system
US7046803B2 (en) Random keystream generation apparatus and method for use in an encryption system
EP2103033B1 (en) Efficient data integrity protection
GB2306722A (en) Encryption/decryption
GB2306860A (en) Encryption/decryption system encrypts data using encrypted key
Letham et al. A 128K EPROM using encryption of pseudorandom numbers to enable read access
GB2124808A (en) Security system
Kanso Clock-controlled generators
JP2830842B2 (en) Pseudo random number generator
JP2002217898A (en) Pseudo random number generating system

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)