JPS60173950A - Ciphering device - Google Patents

Ciphering device

Info

Publication number
JPS60173950A
JPS60173950A JP59029734A JP2973484A JPS60173950A JP S60173950 A JPS60173950 A JP S60173950A JP 59029734 A JP59029734 A JP 59029734A JP 2973484 A JP2973484 A JP 2973484A JP S60173950 A JPS60173950 A JP S60173950A
Authority
JP
Japan
Prior art keywords
address
key
random number
terminal
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
JP59029734A
Other languages
Japanese (ja)
Other versions
JPH0789625B2 (en
Inventor
Eiji Okamoto
栄司 岡本
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NEC Corp
Original Assignee
NEC Corp
Nippon Electric Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NEC Corp, Nippon Electric Co Ltd filed Critical NEC Corp
Priority to JP59029734A priority Critical patent/JPH0789625B2/en
Publication of JPS60173950A publication Critical patent/JPS60173950A/en
Publication of JPH0789625B2 publication Critical patent/JPH0789625B2/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
    • H04L9/0662Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/34Encoding or coding, e.g. Huffman coding or error correction

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)

Abstract

PURPOSE:To eliminate the need for additional registration of a new key by scrambling a random number, encoding and decoding data depending on an opposite terminal device address and the storage content of a storage means in a encoding device distributing a key for encoding. CONSTITUTION:A multiplexer 102 gives (i, j) as the result of arrangement of an opposite side terminal address (j) and an own terminal address (i) of an address memory 103 as a bit pattern to an exclusive OR element 104 to form (i, j)+ MK=Kij to a master key MK of a memory 105. A scrambler 106 transmits the result scrambling the random RN generated by a random number generator 101 by using a bit pattern Kij as a key to an opposite terminal device. Moreover, an encoder/decoder 107 encodes or decodes the data by using the random number RN as a key. Thus, the output of the scrambler 106 and the encoder/ decoder 107 is obtained externally.

Description

【発明の詳細な説明】 (産業上の利用分野) 本発明はデータの暗号・復号化及びそのためのキーを配
送する〆夛暗号装置に関する。
DETAILED DESCRIPTION OF THE INVENTION (Field of Industrial Application) The present invention relates to a decoding device for encrypting and decoding data and distributing keys therefor.

(従来技術とその問題点) 通信ネットワークに秘匿のため暗号化及びそのためのキ
ー配送を行なう暗号システムを導入した例は従来からあ
る。1つは中心局をもち、通信毎に該通信を行なう2つ
の局にキーをその都度送る方法である。もう1つは各局
が他の局との間にキーを持つ方法であり、局数がnなら
ば各局はn個のキーを持つこととなる0前者は中心局が
必要なので複雑となり、後者は局数が大となるとキーメ
モリだけでも大きくなる上、新しい局が新設される毎に
既存のすべての局のメモリに新しいキーを追加登録しな
ければならないという欠点があった◎(発明の目的) 本発明は中心局が不要で、かつ局が新設されても既存の
局のメモリに新しいキーを追加登録する必要のない暗号
装置を提供することを目的とする。
(Prior Art and its Problems) There have been examples in the past in which a cryptographic system that performs encryption for secrecy and key distribution for the encryption is introduced into a communication network. One is a method that has a central station and sends a key to two stations communicating each time each communication is made. The other method is for each station to have a key with other stations; if the number of stations is n, each station will have n keys.The former is complicated because it requires a central station, and the latter is As the number of stations increases, the key memory alone becomes large, and each time a new station is established, a new key must be added to the memory of all existing stations. (Objective of the invention) SUMMARY OF THE INVENTION An object of the present invention is to provide an encryption device that does not require a central station and does not require additional registration of a new key in the memory of an existing station even if a new station is established.

(発明の構成) 本発明によれば、アドレスを有する複数端末から成る通
信ネットワークの各端末に設置され、端末間の通信デー
タの暗号化・復号化及び暗号用のキー配送を行なう暗号
装置において、前記アドレスと前もって定められたビッ
トパターンを記憶する記憶手段と、乱数を発生する乱数
発生手段と、前記キーを配送すべき相手端末のアドレス
と前記記憶手段の記憶内容とに依存して前記乱数をスク
ランブルするスフ2ンプル手段と、前記乱数に依存して
データを暗号化し、あるいは暗号化されたデータを復号
化する暗号・復号手段と、から成ることを特徴とする暗
号装置が得られるっまた本発明によれば、アドレスを有
する複数端末から成る通信ネットワークの各端末に設置
され、端末間の通信データの暗号化・復号化を行ない、
かつ通信相手端末アドレスと自端末アドレスと前もって
定められたビットパターンとに依存してスクランブルさ
れて配送されてきたキーを受増る暗号装置aにおいて、
前記自端末アドレスと前もって定められたビットパター
ンを記憶する記憶手段と、前記通信相手端末のアドレス
と前記記憶手段の記憶内容とに依存して前記スクランブ
ルされて配送されてきたキーをデスクランブルするデス
クランブル手段と、前記キーに依存してデータを暗号化
し、あるいは暗号化されたデータを復号化する暗号・f
v号手段と、から成ることを特徴とする暗号装置が祷ら
れる。
(Structure of the Invention) According to the present invention, in an encryption device that is installed at each terminal of a communication network consisting of a plurality of terminals having addresses and performs encryption/decryption of communication data between terminals and distribution of keys for encryption, a storage means for storing the address and a predetermined bit pattern; a random number generation means for generating a random number; The present invention also provides a cryptographic device characterized in that it is comprised of a second sample means for scrambling, and an encryption/decryption means for encrypting data or decrypting encrypted data depending on the random number. According to the invention, it is installed at each terminal of a communication network consisting of a plurality of terminals having addresses, and encrypts and decrypts communication data between the terminals,
In the cryptographic device a, which receives keys scrambled and distributed depending on the communication partner terminal address, the own terminal address, and a predetermined bit pattern,
storage means for storing the own terminal address and a predetermined bit pattern; and a device for descrambling the scrambled and delivered key depending on the address of the communication partner terminal and the contents stored in the storage means. a scrambling means and a cipher/f for encrypting data or decrypting encrypted data depending on the key;
An encryption device characterized by comprising:

(実施例) 以下実施例を示すブロック図を用いて本発明の動作M理
を詳細に説明する。
(Example) The operation principle of the present invention will be explained in detail below using a block diagram showing an example.

第1図は本発明の第1の実施例全示すブロック図である
。キーを配送する端末のアドレス全11キーを配送され
る端末のアドレスを」とする。図において、多重化装[
102は相手fll!l端末アドレスjとアドレスメモ
リ103に記憶された自端末アドレスiをビットパター
ンとして並べた(j、j)を排他的論理和素子104に
送る。該排他的論理和素子104は(+1j)とマスタ
ーキーメモリ105に記憶されたマスターキーMKに対
して(j、j)■MKを作成する0以下Kij=(’ 
p J )■MKとおぐ0スクランブラ−106は乱数
発生器101で発生した乱数KNを前記KIjをキーと
してスクランブルし、相手側端末に送る0以下、K1.
をキー七+3 してANをスクランブルした結果を8C(K、、。
FIG. 1 is a block diagram showing the entire first embodiment of the present invention. Addresses of terminals to which keys will be delivered The addresses of terminals to which all 11 keys will be delivered are ``. In the figure, the multiplexer [
102 is the opponent full! 1 terminal address j and the own terminal address i stored in the address memory 103 are arranged as a bit pattern (j, j) and sent to the exclusive OR element 104. The exclusive OR element 104 creates (j, j)■MK for (+1j) and the master key MK stored in the master key memory 105, where Kij=('
p J )■MK and Ogu0 Scrambler 106 scrambles the random number KN generated by the random number generator 101 using the KIj as a key, and sends it to the other party's terminal.
The result of scrambling AN by pressing key 7+3 is 8C (K,...).

鳳」 RN)と記す0また暗号・復号器107は前記乱数KN
をキーとしてデータを暗号あるいけ復号する。
Also, the encoder/decoder 107 uses the random number KN.
Encrypt or decrypt the data using the key.

図にある保rtfl装置108とは前記の乱数発生器1
01、多重化装[302,アドレスメモリ]o3、排他
的論理和素子104、マスターキーメモリ1o5、スフ
2ンブラー106、暗号・復号器)07を保護し、外部
からはスクランプ7−106と暗号・復号器107の出
力のみ得られるものである。
The security rtfl device 108 shown in the figure is the random number generator 1 mentioned above.
01, multiplexing device [302, address memory] o3, exclusive OR element 104, master key memory 1o5, double sumbler 106, encryption/decoder) 07, and protects the scram 7-106 and encryption/decryption from the outside. Only the output of the device 107 can be obtained.

第2図は本発明の第2の実施例を示す図であシ、前記第
1の実施例から送られたキーを受増る0第2の実施例は
端末Jに設置されているものとする。
FIG. 2 is a diagram showing a second embodiment of the present invention, and it is assumed that the second embodiment is installed in a terminal J that receives and increases the keys sent from the first embodiment. do.

図において、多重化装置202は相手11+11端末ア
ドレスiとアドレスメモリ203に記憶された自端末ア
ドレスjをビットパターンとして並べた(r、j>を排
他的論理和素子204に送り、該〃ト仙的論理和素子2
04は(+、J)とマスターキーメモリ205 K記憶
されているマスターキーMKに対してに、j=(j、j
)■MKを作成する。デスク2ンプ2−206は第1の
実施例から送られ* s c (x t jp RN 
)をキーに、j でデスクランブルしてRNを得、ta
RNをキーとして暗号・復号器207 Fiデータを暗
号化・復号化する0図における保護装置208とは前記
の多重化装置 202 、アドレスメモリ203、排他
的論理和204、マスターキーメモリ2o5、デスクラ
ンプ? −206、暗号・復号器207を保睦し、外部
からは暗号・復号器207の出力のみ得られるものであ
る。
In the figure, the multiplexing device 202 arranges the destination 11+11 terminal address i and the own terminal address j stored in the address memory 203 as a bit pattern (r, j>) to the exclusive OR element 204, and logical disjunction element 2
04 is (+, J) and for the master key MK stored in the master key memory 205 K, j = (j, j
)■Create MK. The desk 2 amplifier 2-206 is sent from the first embodiment * s c (x t jp RN
) as the key, descramble with j to obtain RN, and ta
The protection device 208 in the figure is the multiplexing device 202, address memory 203, exclusive OR 204, master key memory 2o5, and desk lamp. ? -206, the encoder/decoder 207 is protected, and only the output of the encoder/decoder 207 can be obtained from the outside.

以上の実施例において、乱数発生器は自然乱数または疑
似乱数を発生する従来の発生器である0スクランブラ−
、デスクランプ2−は市販の暗号器、復号器を用いるこ
とができるO多重化装置は2つのビットパターン金並べ
る装置である。保饅装置は例えば鉄板等でねじなども用
いずに蝋うことによね実現できる。スクランブラ−とデ
スクランブラ−は暗号・復号器の暗号化機能と復号化機
能を各々用いることもできるOスフ2ンプラーとデスク
ランブラ−は物理的に分かれている必要はなく、1個の
機器でも、両機能を含めば使用できる。またアドレスメ
モリとマスターキーメモリは単一メモリに含ませること
ができる。
In the above embodiments, the random number generator is a 0 scrambler, which is a conventional generator that generates natural random numbers or pseudo-random numbers.
, Desk Clamp 2- can use a commercially available encoder and decoder. The multiplexer is a device that arranges two bit patterns. The device for preserving rice cakes can be realized, for example, by brazing an iron plate or the like without using screws or the like. The scrambler and descrambler can also use the encryption and decryption functions of the encoder/decoder, respectively.The scrambler and descrambler do not need to be physically separated, and can be used as a single device. , can be used if both functions are included. Also, address memory and master key memory can be included in a single memory.

本発明の実施例において、K t t =(It 3 
)■MKとしたが、これはKijの1例である。他にも
′MKをキーとして(i、j)を暗号化した結果をに1
.とするなど、多くの定め方がある。また、本発明によ
って暗号・復号器用のキーを配送しているが、配送の後
に該キーが正しく共鳴されたか否かを検定するために、
テストデータを暗号化あるいは復号化して確かめる方法
を用いればより確実となる0さらに、EKij(RN)
を送るときにIt、Nの他に時刻情報を送れば再送検出
ができる。
In an embodiment of the invention, K t t =(It 3
)■MK, but this is an example of Kij. In addition, the result of encrypting (i, j) using 'MK as a key is 1
.. There are many ways to define it. Furthermore, although the present invention distributes keys for encryptors and decryptors, in order to verify whether the keys have been correctly resonated after distribution,
It will be more reliable if you use a method that encrypts or decrypts the test data to confirm.0 Furthermore, EKij (RN)
If time information is sent in addition to It and N when sending, retransmission can be detected.

(発明の効果) 以上詳細に説明したように、本発明を用いれば、キー配
送のためのセンターを心太とせず、新しい端末の付加に
際して他端末は何ら変更する必要がないのでデータ通信
に適用してその効果は極めて大きい。
(Effects of the Invention) As explained in detail above, if the present invention is used, the center for key distribution does not need to be central, and there is no need to change other terminals when adding a new terminal, so it can be applied to data communication. The effect is extremely large.

【図面の簡単な説明】[Brief explanation of drawings]

第1図、第2図は各々本発明の第1の実施例及び第2の
実施例を示すブロック図である0図において、101は
乱数発生器、102.202は多重化装置、103、 
203はアドレスメモリ、104. 204は排他的論
理和素子、105. 205はマスターキーメモリ、1
06はスクランブラ−1206はデスクランブラ−11
07、207は暗号・復号器、108. 208は保W
!に装置を各々表わす。 第1図
1 and 2 are block diagrams showing a first embodiment and a second embodiment of the present invention, respectively. In FIG. 0, 101 is a random number generator, 102, 202 is a multiplexing device, 103,
203 is an address memory, 104. 204 is an exclusive OR element, 105. 205 is a master key memory, 1
06 is scrambler-1206 is descrambler-11
07, 207 is an encoder/decryptor, 108. 208 is HoW
! The devices are shown in . Figure 1

Claims (1)

【特許請求の範囲】[Claims] 1、 アドレスを有する複数端末から成る通信ネットワ
ークの各端末に設置され、端末間の通信データの暗号化
・復号化及び暗号用のキー配送を行なう暗号装置におい
て、前記アドレスと前もって定められたビットパターン
を記憶する記憶手段と、乱数を発生する乱数発生手段と
、前記キーを配送すべき相手端末のアドレスと前記記憶
手段の記憶内容とに依存して前記乱数をスクランブルす
る手段と、前記乱数に依存してデータを暗号化し、ある
いは暗号化されたデータを復号化する暗号・復号手段と
、から成ることを特徴とする暗号装置02、アドレスを
有する複数端末から成る通信ネットワークの各端末に設
置され、端末間の通信データの暗号化・復号化を行ない
、かつ通信相手端末アドレスと自端末アドレスと前もっ
て定められたビットパターンに依存してスクランブルさ
れて配送されてきたキーを受取る暗号装置において、前
記自端末アドレスと前もって定められたビットパターン
を記憶する記憶手段と、前記通信相手端末のアドレスと
前記記憶手段の記憶内容とに依存1゜て前記スクランブ
ルされて配送されてきたキーをデスクランブルするデス
クランゲル手段と、前記キーに依存してデータを暗号化
し、あるいは暗号化されたデータを復号化する暗号・復
号手段と、から成ることを特徴とする暗号装置。
1. In a cryptographic device that is installed at each terminal of a communication network consisting of multiple terminals having an address and performs encryption/decryption of communication data between terminals and distribution of keys for encryption, the address and a predetermined bit pattern are used. a random number generation means for generating a random number; a means for scrambling the random number depending on the address of the destination terminal to which the key is to be delivered and the contents of the storage means; an encryption device 02 characterized by comprising an encryption/decryption means for encrypting data or decrypting encrypted data, installed at each terminal of a communication network consisting of a plurality of terminals having addresses, In an encryption device that encrypts and decrypts communication data between terminals, and receives a key that has been scrambled and distributed depending on a communication partner terminal address, an own terminal address, and a predetermined bit pattern, the said own storage means for storing a terminal address and a predetermined bit pattern; and a descrambler for descrambling the scrambled and delivered key depending on the address of the communication partner terminal and the contents stored in the storage means. and an encryption/decryption means for encrypting data or decrypting encrypted data depending on the key.
JP59029734A 1984-02-20 1984-02-20 Cryptographic device Expired - Lifetime JPH0789625B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP59029734A JPH0789625B2 (en) 1984-02-20 1984-02-20 Cryptographic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP59029734A JPH0789625B2 (en) 1984-02-20 1984-02-20 Cryptographic device

Publications (2)

Publication Number Publication Date
JPS60173950A true JPS60173950A (en) 1985-09-07
JPH0789625B2 JPH0789625B2 (en) 1995-09-27

Family

ID=12284331

Family Applications (1)

Application Number Title Priority Date Filing Date
JP59029734A Expired - Lifetime JPH0789625B2 (en) 1984-02-20 1984-02-20 Cryptographic device

Country Status (1)

Country Link
JP (1) JPH0789625B2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH02199939A (en) * 1989-01-28 1990-08-08 Nec Corp System for verifying opposite party
WO2001030019A1 (en) * 1999-10-18 2001-04-26 Sony Corporation Information processor and information processing method, and recorded medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH02199939A (en) * 1989-01-28 1990-08-08 Nec Corp System for verifying opposite party
WO2001030019A1 (en) * 1999-10-18 2001-04-26 Sony Corporation Information processor and information processing method, and recorded medium

Also Published As

Publication number Publication date
JPH0789625B2 (en) 1995-09-27

Similar Documents

Publication Publication Date Title
US5815573A (en) Cryptographic key recovery system
US5793871A (en) Optical encryption interface
EP0576224B1 (en) Cryptographic key management apparatus and method
EP0843479B1 (en) Process for data certification by scrambling and certification system using such a process
JP2006520500A (en) Protected return path from digital rights management dongle
WO1990009009A1 (en) Data carrier and data communication apparatus using the same
JPH0969830A (en) Cipher communication system
JPS6021501B2 (en) Operation key verification method in data communication network
KR20030011672A (en) Method of transmitting confidential data
CN103618607A (en) Method for data security transmission and key exchange
JP2000115162A (en) Secure communication equipment and storage device
JP2000115154A5 (en) Data processing equipment and methods, and data decoding processing equipment and methods
JPH09130374A (en) Encipherment system
JP2002185447A (en) Secret data processor and its electronic components
JPS60173950A (en) Ciphering device
JPH01212039A (en) Cryptographic key common share device
JPH07336328A (en) Cipher device
JPS63220630A (en) Terminal control system
JPH0491531A (en) Confidential data transferring method using ic card
JPS5917750A (en) Cipher system
JPS63219244A (en) Enciphered information processing system
JPH11168461A (en) Method and equipment for communicating information
JPH02195377A (en) Ic card provided with key sharing function
CN210274210U (en) IP recording system based on quantum encryption
JPH02195376A (en) Ic card provided with key sharing function