APPARATUS FOR TRANSFERRING SECRET INFORMATION FROM A CENTRAL STATION TO A TERMINAL.
TECHNICAL FIELD
The invention relates to an apparatus for transferring secret information from a central station to a terminal at the request of a person entitled to receive the information.
BACKGROUND ART
In the use of cryptography in large telecommunication networks, the pertinent 5 cryptokey must be transferred before enciphering can begin. The system must be made sufficiently safe so that it will defy analysis even after a long period of listening and recording. At present, key codes are distributed manually and this is obviously a weak link within an organization. The transfer of the key word has so far been the greatest limiting factor in the practical application of
10 cryptography in large communication networks. In the diplomatic corps and military organizations, for example, different forms of code books are used today for enciphering, as well as a preciously arranged time schedule for changing between different codes. For more general civilian use in business, as well as more general use at lower levels in military organizations, more easily
15 available and safer methods must be applied, however. So-called bundle enciphering is used for larger bundles of communication channels between communication junction points in a telecommunication network, the junction points being able to process enciphering between themselves. However, this method leaves communication between the user and the nearest junction point
20 unprotected. No reliable method for individual enciphering can be achieved without flexible and unforcible cryptokey distribution, and this problem has not been solved so far.
,
DISCLOSURE OF INVENTION
The object of the invention is to provide a method of protecting the trans¬ mission of smaller quantities of information, e.g. cryptokeys, over customary 25 telecommunication media from a central station to a plurality of users, where
the consequences of forcing a key will be limited and where it will be possible to discover any attempt, both in time and place, to break the key.
This is achieved in accordance with the invention in that the key code for communication between the terminal and the central station consists of an open and a closed part, of which only the first is sent to the central station which, from the information obtained, determines the closed part and with the aid of it enciphers the transferred key word, deciphering in the terminal taking place with the aid of the closed, untransmitted part of the code.
The invention is characterized by the disclosures in the claims.
BRIEF DESCRIPTION OF DRAWINGS
The invention will now be described in detail with the aid of an embodiment while referring to the appended drawing which schematically, in the form of a block diagram, illustrates a terminal and a central station for transmission of a key word to the terminal.
BEST MODE FOR CARRYING OUT THE INVENTION
In the form of a block diagram the drawing illustrates a terminal T in accordance with the invention, in which, with the aid of a code a key word from a central station C, can be obtained without analysis by listening being possible. The terminal contains four registers Al, Bl, A2, B2 for storing the code, which is divided into two parts. One part, called the open part in continuation, and which is to be transmitted to the central station is stored in the registers Al, Bl, while the registers A2, B2 are intended for storing the so-called closed part, which is not transmitted.
The central station C contains a data memory DM with memory fields Fl, F2, etc., each intended for one of the codes being used, the code being stored divided into four partial fields corresponding to the registers Al, Bl, A2, B2 in the terminals. The memory DM also contains a memory field FR for storing the key word which is to be transmitted to a terminal from which an authorized user has sent the code. A conventional electronic control circuit SK is used for
reading from the memory DM and for remaining control functions in the central station.
When a user from a terminal requests a code word from the central station the code is written into the registers Al, Bl, A2, B2. The code may comprise a part registered on an information carrier such as a plastic card, and a memorized part known solely to the user. According to the embodiment, it is assumed that both the registered and the memorized part are included in both the open and the closed part of the code. If the part registered on the card consists of the binary words 11100110 and 1001, the first word is included in the closed part and is written into the register A2 and the second word is included in the open part and is written into the register Al. If the memorized part consists of the binary words 0111 and 00 the first word is included in the closed part and is written into the register B2, while the second word is included in the open part and is written into the register Bl.
After writing the codes, the content of the register Al is sent at first through the telecommunication connection SMT-SMC to the central station, where it is written into a register RA and is compared in a comparator circuit JKA with the partial memory field Al in all fields Fl, F2 etc. under the control of the circuit SK. If there is agreement, e.g. in the memory field Fl, the scanning is stopped, and the comparator circuit JKA sends a signal to the terminal where the gate Gl is opened for transferring the content of the register Bl to the central station. A random number is simultaneously sent from a counter TGC in the central station to a memory TGT in the terminal and the counter is stopped. The content of the register Bl is written into the central station register RB and is compared in a comparator circuit JKB with the content in the register Bl in the partial field Fl. If agreement is found, which is a sign that the user is authorized to receive information, the comparator circuit JKB activates the feed-out of the key word from the memory location FR and also feed-out of the partial fields A2 and B2 to an enciphering device KRC. This device can use optional mathematical functions for enciphering and contains the necessary electronic circuits, e.g. multiplication circuits, for the functions, which may vary for different users. However, for the sake of simplicity there is described here an example of an enciphering device which contains adding circuits AD1, AD2, AD3. In the first there are added the key word from the field FR and the
code word from the partial field A2. As previously mentioned, the content of the partial field A2 corresponds to the content of the register A2 in the terminal, and this will enable decoding in the terminal deciphering device KRT by a corresponding addition carried out in the central station. The content of the register A2 included in the closed part of the code thus does not need to be transferred from the terminal. In principle, this form of coding and decoding would already enable a secret transfer without risk of analysis, in accordance with the basic conception of the invention. In this example, however, there is a further addition in the adding circuit AD2 of the encipheirng device KRC between the word enciphered in the adding circuit ADl and the content of the partial field B2 corresponding to the content of the register B2 in the terminal. In a similar way, the content of the register B2 is added in the adding circuit AD2 of the decryption device to the enciphered message obtained by two additions. The random number 0001 in the counter TGC is added to the enciphered information obtained from the adding circuit AD2 in the central station adding circuit AD 3. In the same way, the random number stored in the terminal memory TGT is added in the corresponding adding circuit AD3 in the decryption device KRT to the information coming over the line.
The result of the processes is indicated on the drawing for the illustrated practical embodiment. It is obvious that by introducing further coding with a random number there is obtained further security against possible analysis of the code. However, the basic principle of the invention is that the closed code associated with the calling code and comprising one or more parts is never transferred on the line but is read in the central station with guidance from the open part of the code for use in encoding.
)tøPI