EP0592595A1 - Verschluesselungsvorrichtung - Google Patents

Verschluesselungsvorrichtung

Info

Publication number
EP0592595A1
EP0592595A1 EP92915602A EP92915602A EP0592595A1 EP 0592595 A1 EP0592595 A1 EP 0592595A1 EP 92915602 A EP92915602 A EP 92915602A EP 92915602 A EP92915602 A EP 92915602A EP 0592595 A1 EP0592595 A1 EP 0592595A1
Authority
EP
European Patent Office
Prior art keywords
memory
data
input
output
bits
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP92915602A
Other languages
English (en)
French (fr)
Inventor
Stefan Vismarlöv 2 SANTESSON
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Business Security OL AB
Original Assignee
Business Security OL AB
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Business Security OL AB filed Critical Business Security OL AB
Publication of EP0592595A1 publication Critical patent/EP0592595A1/de
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
    • H04L9/0662Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry

Definitions

  • the invention relates to a ciphering device according to the preamble of claim 1.
  • a ciphering device For the transferring of information it has been known for a long time in different applications to use different methods of ciphering the information before the trans ⁇ ferring thereof.
  • the first reason for ciphering is that the information should not be possible to read for anybody who accesses the information in an improper way during the transfer.
  • the problems of improper access to the information have increased rather than decreased.
  • One previously known method is based on so called block ciphering according to which a data format with fixed block lengths is used.
  • incoming data must be expanded to the block size used, adding redundant data to the information to be transferred.
  • block ciphering should be used in a total ciphering of a connection, i.e. for both data and a transfer protocol, block synchronization must be implemented so as to identify the start and the end of transferred blocks, further increasing the amount of redundant data that has to be transferred.
  • the ciphering process is identical each time it is used two identical messages in plain text will always result in two identical cryptograms.
  • the complete deciphering key must be involved in the process which in practice delimits the size of the key, requiring in turn frequent changes of the key.
  • Bit sequence cihpering includes implementation of internal registers, which are modified and will effect the ciphering process. As a result two identical messages will be ciphered differently from time to time. Accordingly, th most appropriate block size, i.e. 1, can be used in the ciphering process.
  • the bit sequence generated does not hav to be synchronized with respect to the start and the end of the block, and all types of block sizes of the plain text can be ciphered without any data expansion.
  • the internal registers have to be synchronized between a transmitter and a receiver so as to balance the ciphering and the dechipering process. The synchronization is accomplished by transmitting separately an initial value to said receiver.
  • the ciphering device is provided with a sequence of bits to be ciphered and comprises a data input for said sequence, a data output for a ciphered bit sequence and a mixing unit, a first input thereof being connected to said data input, an output thereof being connected to said data output, and a second input thereof being connected to a code unit for generating code bits, said code unit comprising at least one shift register, the input thereof being connected to said data output, and at least one memory storing code bits, said memory being addressed from said shift register for outputing code bits into said mixing unit.
  • a very large key is required in form of a large amount of code bits. As the key has to be large practical problems will arise in handling said key, and therefore the practical use of said method has been delimited.
  • An object of the present invention is to overcome the problems and drawbacks mentioned above and to accomplish a ciphering device that is independent from blocks and that decreases dramatically the size of the key which has to be distributed to said transmitters and said receivers.
  • FIG. 1 is a block diagram showing a basic circuit for a so called cipher feed back crypto according to prior art technique
  • FIG. 2 is a block diagram showing the basics of the ciphering device according to the invention.
  • FIG. 3 is a block diagram showing the basics of a deciphering device according to the invention.
  • FIG. 4 is a block diagram showing a further development of the device according to the invention.
  • FIG. 1 In the block diagram of FIG. 1 there is shown a ciphering device according to a prior art technique called "cipher feed back crypto".
  • the device comprises a data input into which a sequence of bits to be ciphered is fed, and a data output 11, from which a ciphered bit sequence is taken.
  • Said data input 10 is connected to a first input of a mixing unit 13, and said data output 11 is connected to an output of said mixing unit 13.
  • Said data output 11 is connected also to an input of a shift register 15 forming part of a code unit 14.
  • Said code unit 14 comprises also a memory 16, which is addressed by outputs of said shift register 15 and which stores code bits for the ciphering process. An output of said memory 16 is connected to a second input of said mixing unit 13.
  • Said mixing unit 13 comprises preferably an EXOR gate.
  • the deciphering accor ⁇ ding to the described method is a completely reversed process compared to the ciphering process, and therefore a deciphering device comprises corresponding units, that is data input 110, a data output 111, a mixing unit 113, a shift register 115, into which incoming ciphered data bits are fed, and a memory 116.
  • the deciphered sequence of data bits is available on the output of said mixing unit 113.
  • the device according to the invention shown in FIG. 2 comprises, in addition to the means included in the device shown in FIG.
  • an address selecting means 12 which is provided with a first set of inputs 20, which are connected to outputs of said shift register 15, and a second set of inputs 21, which are connected to outputs of an address generating means 17.
  • Said address selecting means 12 is also provided with a set of outputs 22 which are operatively connected to said memory 16 for addressing said memory.
  • Said address generating means 17 is arranged to address all addresses in said memory 16 that are used for code bits. By said address selecting means 12 addresses to said memory are selected either from said shift register 15 or said address generating means 17. During a ciphering process said memory 16 is addressed by said shift register 15, and in a initiating process the addressing is made by said address generating means 17.
  • the code bits that are stored in said memory 16 in the addresses selected by said address generating means 17 are provided by a pseudo-random generator 17, which preferably comprises a feedback shift register 19.
  • a pseudo-random generator 18 In said pseudo-random generator 18 there is stored a start value which constitutes the key in this device. Means that are not shown are provided for inputting said key into said pseudo-random generator 18 at appro ⁇ priate points of time.
  • said pseudo-random generator 18 comprises a shift register 19 a feed back polynomial calculates in a conventional manner a feedback value that is entered into the first position of said shift register 19.
  • control unit 23 is arranged for the control of said address generating means and said memory 16, said control unit ensuring that an appropriate selec ⁇ tion and number of generated code bits is stored in all positions utilized in said memory 16.
  • control unit ensuring that an appropriate selec ⁇ tion and number of generated code bits is stored in all positions utilized in said memory 16.
  • some part or parts of the generated code bits sequence are omitted to render the search of said start value more difficult.
  • a deciphering device functions in a way completely corresponding to the ciphering device of FIG. 2, one difference being that said shift register 115 is connected directly to said data input 110.
  • Corresponding means and elements of said deciphering device has been given corresponding reference numerals with an addition of 100.
  • FIG. 4 shows a further development of the device according to the invention, further comprising two sets of shift registers 15,15', address generating means 17,17' and memory units 16,16', all in series. In the embodiment shown only one pseudo-random generator is used, but also two can be utilized.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
EP92915602A 1991-07-01 1992-07-01 Verschluesselungsvorrichtung Withdrawn EP0592595A1 (de)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
SE9102040A SE468730B (sv) 1991-07-01 1991-07-01 Krypteringsanordning och dekrypteringsanordning
SE9102040 1991-07-01
PCT/SE1992/000490 WO1993001578A1 (en) 1991-07-01 1992-07-01 Ciphering device

Publications (1)

Publication Number Publication Date
EP0592595A1 true EP0592595A1 (de) 1994-04-20

Family

ID=20383213

Family Applications (1)

Application Number Title Priority Date Filing Date
EP92915602A Withdrawn EP0592595A1 (de) 1991-07-01 1992-07-01 Verschluesselungsvorrichtung

Country Status (4)

Country Link
EP (1) EP0592595A1 (de)
AU (1) AU2291692A (de)
SE (1) SE468730B (de)
WO (1) WO1993001578A1 (de)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3180836B2 (ja) * 1992-05-21 2001-06-25 日本電気株式会社 暗号通信装置
DE19707288A1 (de) * 1997-02-24 1998-08-27 Andreas Kuehnl Mittel zur sicheren Chiffrierung jeglicher Art von Daten
AU738210B2 (en) * 1998-09-01 2001-09-13 Peter William Ross Encryption via user-editable multi-page file
AUPP559898A0 (en) * 1998-09-01 1998-09-24 Ross, Peter William Large user-editable data file enabling both a character rotation which is variable and custom encryption/decryption programs
US6820198B1 (en) 1998-09-01 2004-11-16 Peter William Ross Encryption via user-editable multi-page file

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3905667A1 (de) * 1989-02-24 1990-08-30 Ant Nachrichtentech Verfahren zum ver- und entschluesseln eines nachrichtenstromes

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO9301578A1 *

Also Published As

Publication number Publication date
SE9102040D0 (sv) 1991-07-01
AU2291692A (en) 1993-02-11
WO1993001578A1 (en) 1993-01-21
SE468730B (sv) 1993-03-08
SE9102040L (sv) 1993-01-02

Similar Documents

Publication Publication Date Title
US4797921A (en) System for enciphering or deciphering data
US4322576A (en) Message format for secure communication over data links
CA1100588A (en) Message verification and transmission error detection by block chaining
US4160120A (en) Link encryption device
US4172213A (en) Byte stream selective encryption/decryption device
US4159468A (en) Communications line authentication device
KR950010705B1 (ko) 암호화/해독화 장치 및 그 통신 네트워크
US5799089A (en) System and apparatus for blockwise encryption/decryption of data
US7142669B2 (en) Circuit for generating hash values
US6324286B1 (en) DES cipher processor for full duplex interleaving encryption/decryption service
US6831979B2 (en) Cryptographic accelerator
US7907725B2 (en) Simple universal hash for plaintext aware encryption
KR950704733A (ko) 선택 가능한 탭이 있는 피드백 레지스터를 갖는 암호화 방법 및 장치(method and apparatus for encrypion having a feedback register with selectable taps)
US20110255689A1 (en) Multiple-mode cryptographic module usable with memory controllers
US5809148A (en) Decryption of retransmitted data in an encrypted communication system
US7447311B2 (en) Method of designing optimum encryption function and optimized encryption apparatus in a mobile communication system
US4760600A (en) Cipher system
US4133974A (en) System for locally enciphering prime data
EP0840966B1 (de) Entschlusselung von wiederholten daten in einem verschlusselten kommunikationssystem
EP0309447B1 (de) Einrichtung zur verschlüsselung und zur entschlüsselung
US6088449A (en) Tri-signature security architecture systems and methods
EP0592595A1 (de) Verschluesselungsvorrichtung
GB2124808A (en) Security system
JPH04335730A (ja) 暗号送信装置、暗号受信装置、暗号通信システム
KR100226867B1 (ko) 무선 통신의 스트림 암호 시스템

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 19940127

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): CH DE GB LI SE

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: BUSINESS SECURITY O.L. AB

17Q First examination report despatched

Effective date: 19950510

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 19950921