EP0765550A1 - Dispositif de dechiffrement d'algorithmes de dechiffrement et procede pour le chiffrement et le dechiffrement au moyen d'un tel dispositif - Google Patents
Dispositif de dechiffrement d'algorithmes de dechiffrement et procede pour le chiffrement et le dechiffrement au moyen d'un tel dispositifInfo
- Publication number
- EP0765550A1 EP0765550A1 EP95920758A EP95920758A EP0765550A1 EP 0765550 A1 EP0765550 A1 EP 0765550A1 EP 95920758 A EP95920758 A EP 95920758A EP 95920758 A EP95920758 A EP 95920758A EP 0765550 A1 EP0765550 A1 EP 0765550A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- decryption
- algorithm
- encrypted
- encryption
- decryption device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
Definitions
- Decryption device for decryption algorithms and method for performing the encryption and decryption thereof
- the invention relates to a decryption device for decryption algorithms and the method for carrying out the encryption and decryption thereof, in that the decryption device grants access to authorized persons and excludes unauthorized persons from access.
- Digital information is being sent on an increasingly larger scale via secure distribution channels. However, this information should only reach certain recipients and should not be read by unauthorized persons. The procedures for transmitting such information are already very much adapted to the needs of the industry.
- Decryption device is not possible to pass on the decryption process and thus enable the exploration of the encryption algorithm.
- FIG. 1 is the
- Decryption device of decryption algorithms shows and the method for performing the encryption and decryption of digital information.
- the decryption device of decryption algorithms shown in FIG. 1 is used for the purpose of illustration in multiple personal computers, wherein digital information is sent to selected decryption owners.
- the decryption device shown here consists of an integrated circuit 1, a central processor CPU-2, an internal non-readable volatile memory with random access RAM-3 as working memory and a
- ROM-4 internal non-readable non-volatile random access memory ROM-4, in which an internal non-readable decryption algorithm (EI) is stored, and an interface 5 are assigned, which is arranged between the central processor CPU-2 and the personal computer 6 and with the personal computer 6 is connected to data path a, and is partially integrated in an integrated circuit.
- EI internal non-readable decryption algorithm
- the method for carrying out the transmission of the decryption algorithm is shown in FIG. 1 in that the decryption device is used in a number of personal computers, digital information being sent to selected owners of decryption devices.
- the distributor chooses an encryption algorithm VE. This is intended to encrypt the information transmitted later. This
- Encryption algorithm should be kept secret and must still be secure enough to offer security when encrypting messages.
- z. B different types of DES (e.g. with different S-boxes) or other encryption methods.
- Decryption algorithm EE encrypted to illegible algorithm EEV Any user of a decryption device who wants to receive a decryption algorithm can now report to the distribution point. This can e.g. B. verbally (also over the phone), in writing or electronically. He must identify himself using the decoder's public serial number. Since this serial number was only assigned once, the decryption device can be clearly identified. The distribution point can now decide whether the recipient is authorized to receive the decryption algorithm. This can also depend on payment.
- the distributor of the messages chooses an encryption algorithm VE, which is then to be used to encrypt the message to be transmitted later.
- This encryption algorithm is never publicly accessible, but is only transmitted in encrypted form.
- the manufacturer of the decryption device (the distributor of the
- Decryption algorithms and messages have internal Decryption algorithms EI and also the associated ones
- Encryption algorithms EIU of all decryption devices are stored in a database at the manufacturer or at the distributor.
- EI1UA the encryption algorithm also known only to the manufacturer of the decryption device, is suitable for EI IX.
- the decryption algorithm EE to be transmitted to the decryption device is encrypted. This is done in such a way that the
- Decryption algorithm EI matching encryption algorithm EIU to the illegible algorithm EEV is encrypted according to the following formula:
- EEV: EI1U (EE).
- Ciphertexts are available to use promising cracking algorithms. In this case, however, this is not possible due to the brevity of the transmitted encrypted decryption algorithm EEV.
- the central processor CPU-2 introduces one with the internal non-readable non-volatile memory with random access ROM-4 and the internal non-readable volatile memory with random access RAM-3
- the encrypted decryption algorithm EEV is read into the decryption device via interface 5.
- the decryption algorithm was previously entered in encrypted form by the user of the decryption device or read in another form.
- ROM-4 is stored using the internal non-readable non-volatile random access memory
- Decryption algorithm EEV decrypted with the internal decryption process EI This is done in such a way that the central processor CPU-2, the decryption device stored in the internal non-readable non-volatile memory with random access ROM-4, is entered into the personal computer 6, executes instructions of the decryption algorithm EI and decrypts the encrypted decryption algorithm EEV as follows:
- the decryption device is now ready for use.
- the CPU loads the key K and the message NV via the interface 5.
- Keys must be transmitted in a secure way that is not accessible to third parties; this can also be done by encryption.
- the message is then decrypted by the central processor CPU-2 using the decryption algorithm EE using the key K:
- NE: EE (NV, K).
- the decrypted information NE is then output by the central processor CPU-2 via the interface 5 and is available to the receiver.
- Decryption algorithm must be made known or already exists in the decryption device.
- the transmitted decryption algorithm can neither be passed on nor investigated, since it encrypts individually for each decryption device is transmitted and stored there is not readable and is only available for internal use of the decryption device with the corresponding serial number.
- EEV encrypted decryption algorithm for transmission
- VE encryption algorithm when distributing the information to encrypt the digital information suitable for EE
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
L'invention a pour objet un dispositif de déchiffrement d'algorithmes de déchiffrement et un procédé pour le chiffrement et le déchiffrement au moyen d'un tel dispositif, et a pour but de développer un dispositif et un procédé en tant que système pouvant travailler avec des algorithmes de chiffrement variables et assurant la transmission de l'algorithme de chiffrement sans qu'il soit détecté et tout en empêchant la rupture de cet algorithme. Ce but est atteint, conformément à l'invention, grâce au fait que le dispositif de chiffrement comprend un circuit intégré (1) auquel sont associés un processeur central (2), une mémoire RAM interne volatile, à verrouillage de lecture (3) utilisée comme mémoire de travail, et une mémoire ROM interne non volatile et à verrouillage de lecture et accès direct (4) et une interface (5), chaque dispositif de déchiffrement différant de l'autre par le contenu de la mémoire ROM interne non volatile à accès direct (4) et étant partiellement intégré dans un circuit intégré, et que l'on dispose d'une interface (5) entre le processeur central (2) et l'ordinateur personnel (6), qui est reliée, avec ledit processeur central (2), à l'ordinateur personnel (6) par le chemin de données (a).
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE19944420970 DE4420970A1 (de) | 1994-06-16 | 1994-06-16 | Entschlüsselungseinrichtung von Entschlüsselungsalgorithmen und Verfahren zur Durchführung der Ver- und Entschlüsselung derselben |
DE4420970 | 1994-06-16 | ||
PCT/DE1995/000733 WO1995034968A1 (fr) | 1994-06-16 | 1995-05-30 | Dispositif de dechiffrement d'algorithmes de dechiffrement et procede pour le chiffrement et le dechiffrement au moyen d'un tel dispositif |
Publications (1)
Publication Number | Publication Date |
---|---|
EP0765550A1 true EP0765550A1 (fr) | 1997-04-02 |
Family
ID=6520686
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP95920758A Withdrawn EP0765550A1 (fr) | 1994-06-16 | 1995-05-30 | Dispositif de dechiffrement d'algorithmes de dechiffrement et procede pour le chiffrement et le dechiffrement au moyen d'un tel dispositif |
Country Status (4)
Country | Link |
---|---|
EP (1) | EP0765550A1 (fr) |
AU (1) | AU3862795A (fr) |
DE (1) | DE4420970A1 (fr) |
WO (1) | WO1995034968A1 (fr) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE19747827C2 (de) * | 1997-02-03 | 2002-08-14 | Mannesmann Ag | Verfahren und Einrichtung zur Einbringung eines Dienstschlüssels in ein Endgerät |
ATE213575T1 (de) | 1997-10-28 | 2002-03-15 | Brokat Infosystems Ag | Verfahren zum digitalen signieren einer nachricht |
GB2332833A (en) * | 1997-12-24 | 1999-06-30 | Interactive Magazines Limited | Secure credit card transactions over the internet |
JP3776619B2 (ja) | 1999-03-05 | 2006-05-17 | 株式会社東芝 | 暗号通信端末、暗号通信センター装置、暗号通信システム及び記憶媒体 |
US7079655B1 (en) | 1999-10-25 | 2006-07-18 | Kabushiki Kaisha Toshiba | Encryption algorithm management system |
WO2001043338A1 (fr) * | 1999-12-09 | 2001-06-14 | Milinx Business Group Inc. | Procede et appareil permettant d'effectuer des transactions de commerce electronique securisees |
Family Cites Families (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE3003998A1 (de) * | 1980-02-04 | 1981-09-24 | Licentia Patent-Verwaltungs-Gmbh, 6000 Frankfurt | System zur ver- und entschluesselung von daten |
IL63102A (en) * | 1980-06-19 | 1984-03-30 | Oak Industries Inc | System for enciphering messages |
JPS5890849A (ja) * | 1981-11-24 | 1983-05-30 | Nec Corp | 暗号試験装置 |
US4531020A (en) * | 1982-07-23 | 1985-07-23 | Oak Industries Inc. | Multi-layer encryption system for the broadcast of encrypted information |
CA1219930A (fr) * | 1983-07-21 | 1987-03-31 | Takashi Kamitake | Systeme de transmission d'informations |
US4907273A (en) * | 1984-10-12 | 1990-03-06 | Wiedemer John D | High security pay television system |
DE3501178A1 (de) * | 1985-01-16 | 1986-07-17 | Blaupunkt-Werke Gmbh, 3200 Hildesheim | Verfahren und schaltungsanordnung zur verhinderung des unberechtigten empfangs verschluesselter fernsehsignale |
JPH0783473B2 (ja) * | 1986-10-27 | 1995-09-06 | 日本電気株式会社 | Catvアドレツサブル端末装置 |
FR2608338B1 (fr) * | 1986-12-15 | 1993-09-03 | Dassault Electronique | Dispositif pour l'echange de donnees confidentielles entre une serie de terminaux et un concentrateur |
GB2214677B (en) * | 1988-01-26 | 1991-06-26 | Philips Electronic Associated | Decoding transmitted scrambled signals |
NL8900307A (nl) * | 1989-02-08 | 1990-09-03 | Philips Nv | Publiek communicatiesysteem met gedistribueerde stations, alsmede station en substations voor gebruik in zo een communicatiesysteem. |
US5029207A (en) * | 1990-02-01 | 1991-07-02 | Scientific-Atlanta, Inc. | External security module for a television signal decoder |
US5237610A (en) * | 1990-02-01 | 1993-08-17 | Scientific-Atlanta, Inc. | Independent external security module for a digitally upgradeable television signal decoder |
US4991208A (en) * | 1990-03-29 | 1991-02-05 | Gte Laboratories Incorporated | Video control system having session encryption key |
US5111504A (en) * | 1990-08-17 | 1992-05-05 | General Instrument Corporation | Information processing apparatus with replaceable security element |
FR2681165B1 (fr) * | 1991-09-05 | 1998-09-18 | Gemplus Card Int | Procede de transmission d'information confidentielle entre deux cartes a puces. |
-
1994
- 1994-06-16 DE DE19944420970 patent/DE4420970A1/de not_active Withdrawn
-
1995
- 1995-05-30 EP EP95920758A patent/EP0765550A1/fr not_active Withdrawn
- 1995-05-30 WO PCT/DE1995/000733 patent/WO1995034968A1/fr not_active Application Discontinuation
- 1995-05-30 AU AU38627/95A patent/AU3862795A/en not_active Abandoned
Non-Patent Citations (1)
Title |
---|
See references of WO9534968A1 * |
Also Published As
Publication number | Publication date |
---|---|
DE4420970A1 (de) | 1995-12-21 |
WO1995034968A1 (fr) | 1995-12-21 |
AU3862795A (en) | 1996-01-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE60029722T2 (de) | Verfahren und vorrichtungen zur sicheren verteilung von öffentlichen und privaten schlüsselpaaren | |
DE60314402T2 (de) | System und methode zum speichern sowie abrufen kryptographischer geheimnisse von unterschiedlichen kundenendgeräten in einem netzwerk | |
DE69416809T2 (de) | Verbesserungen der Sicherheit in Datenverarbeitungssystemen | |
DE69632707T2 (de) | Verschlüsselungseinrichtung mit doppelter vorwärtsgeregelter Hash-Funktion | |
DE69532227T2 (de) | Signalsendeverfahren und kommunikationssystem | |
AT512289B1 (de) | Kryptographisches authentifizierungs- und identifikationsverfahren für mobile telefon- und kommunikationsgeräte mit realzeitverschlüsselung während der aktionsperiode | |
DE2231835A1 (de) | Verfahren zur in mehreren stufen erfolgenden ver- und entschluesselung binaerer daten | |
DE3036596A1 (de) | Verfahren zum gesicherten abwickeln eines geschaeftsvorganges ueber einen ungesicherten nachrichtenkanal | |
DE19744961A1 (de) | Erzeugen eindeutiger und unvorhersagbarer Werte | |
WO2000072502A1 (fr) | Procede de verification de l'integrite et de l'auteur de textes et de codage et decodage de ces textes | |
DE112012000971T5 (de) | Datenverschlüsselung | |
EP2098039A1 (fr) | Procédé de transfert de messages codés | |
DE60023426T2 (de) | Elektronisches Authentifizierungssystem | |
EP0765550A1 (fr) | Dispositif de dechiffrement d'algorithmes de dechiffrement et procede pour le chiffrement et le dechiffrement au moyen d'un tel dispositif | |
EP2685682A2 (fr) | Procédé et système de messagerie sécurisée | |
WO2002078246A2 (fr) | Procede et dispositif de production assiste par ordinateur de cles publiques de cryptage | |
DE4420967C2 (de) | Entschlüsselungseinrichtung von digitalen Informationen und Verfahren zur Durchführung der Ver- und Entschlüsselung dieser mit Hilfe der Entschlüsselungseinrichtung | |
DE102006009725A1 (de) | Verfahren und Vorrichtung zum Authentifizieren eines öffentlichen Schlüssels | |
EP0902568A2 (fr) | Procédé de transmision de messages chiffrés | |
DE60023770T2 (de) | Verfahren und Vorrichtung zur Sicherung eines Kryptokoprocessors | |
EP0844762A2 (fr) | Procédé d'échange sécurisé de messages pour services de masse ainsi que dispositif d'abonné et dispositif serveur y adaptés | |
DE102007046102B4 (de) | Verfahren zum Schutz vor Veränderung von Daten und zur Authentifizierung des Datensenders bei der Datenübertragung durch Verwendung von Verschlüsselungsverfahren, bei denen mit Kenntnis von verschlüsselten und unverschlüsselten Daten andere Daten nicht mehr als zufällig richtig verschlüsselt werden können. | |
DE69332261T2 (de) | Verfahren zur Authentifizierung eines Datenverarbeitungssystems aus einer Computerdiskette | |
WO2001022654A1 (fr) | Procede de decryptage de documents cryptes selon un procede de cryptage hybride en cas de perte de la cle cryptographique privee | |
DE102008037794A1 (de) | Einmalpasswort-Generator |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 19961202 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT CH DE ES FR GB LI NL |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN WITHDRAWN |
|
18W | Application withdrawn |
Withdrawal date: 19970325 |
|
RBV | Designated contracting states (corrected) |
Designated state(s): AT CH DE ES FR GB LI NL |