JP2014050069A - Encryption communication system and encryption communication method - Google Patents

Encryption communication system and encryption communication method Download PDF

Info

Publication number
JP2014050069A
JP2014050069A JP2012193962A JP2012193962A JP2014050069A JP 2014050069 A JP2014050069 A JP 2014050069A JP 2012193962 A JP2012193962 A JP 2012193962A JP 2012193962 A JP2012193962 A JP 2012193962A JP 2014050069 A JP2014050069 A JP 2014050069A
Authority
JP
Japan
Prior art keywords
key
encryption
current
future
center device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
JP2012193962A
Other languages
Japanese (ja)
Other versions
JP5835162B2 (en
Inventor
Akio Okamoto
章雄 岡本
Masanori Otogawa
真徳 音川
Masanobu Nojiri
昌伸 野尻
Takayoshi Nobuhara
隆良 延原
Takashi Mori
崇 森
Keiji Oki
啓司 大木
Yuki Kakimoto
勇樹 柿元
Yuji Machida
雄治 町田
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NTT Electronics Corp
Nippon Telegraph and Telephone Corp
Nippon Telegraph and Telephone West Corp
West Japan Railway Co
Original Assignee
NTT Electronics Corp
Nippon Telegraph and Telephone Corp
Nippon Telegraph and Telephone West Corp
West Japan Railway Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NTT Electronics Corp, Nippon Telegraph and Telephone Corp, Nippon Telegraph and Telephone West Corp, West Japan Railway Co filed Critical NTT Electronics Corp
Priority to JP2012193962A priority Critical patent/JP5835162B2/en
Publication of JP2014050069A publication Critical patent/JP2014050069A/en
Application granted granted Critical
Publication of JP5835162B2 publication Critical patent/JP5835162B2/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

PROBLEM TO BE SOLVED: To obtain an encryption communication system and an encryption communication method which can prevent congestion in a communication path even when a communication speed is slow.SOLUTION: A plurality of connection devices 2 are connected with a center device 1 via a radio communication path 3. The center device 1 encrypts a plain text by a first current key and transmits it to the connection devices 2, and decrypts an encrypted text received from the connection device 2 by the first current key or old key. When an encryption key is generated, the center device 1 deletes the stored old key, updates a first future key with the generated encryption key, updates the first current key with the stored first future key, and updates the old key with the stored first current key. The connection device 2 encrypts a plain text by a second current key and transmits it to the center device 1, and decrypts an encrypted text received from the center device 1 by the second current key or a second future key. The connection device 2 substitutes the first current key and the first future key received from the center device 1 for the second current key and the second future key, respectively.

Description

本発明は、通信路を介して接続されたセンタ装置と複数の接続装置との間で暗号通信を行う際に、通信速度が遅い場合でも通信路の輻輳を防ぐことができる暗号通信システム及び暗号通信方法に関する。   The present invention relates to a cryptographic communication system and a cipher capable of preventing congestion of a communication path even when the communication speed is low when performing cryptographic communication between a center apparatus connected via a communication path and a plurality of connection apparatuses. It relates to a communication method.

従来、通信路を介して接続されたセンタ装置と複数の接続装置との間で暗号通信を行う場合には、接続装置の接続開始時に接続装置がセンタ装置に鍵配送を要求して暗号鍵を取得していた。   Conventionally, when performing encryption communication between a center device connected via a communication path and a plurality of connection devices, the connection device requests key distribution from the center device at the start of connection of the connection device and obtains an encryption key. I was getting.

図6は鍵配送処理を示す図である。接続装置が暗号鍵を取得するには、鍵配送要求、鍵配送、鍵配送応答の3wayの通信が最低限必要である。例えば、サーバ(センタ装置に対応)とクライアント(接続装置に対応)との間の暗号通信に広く用いられるSSL(Secure Socket Layer)においては、client helloが鍵配送要求に、premaster secret messageが鍵配送に、finishedが鍵配送応答に対応する(例えば、非特許文献1参照)。このSSLでは更に証明書の交換・認証等の処理のための通信が必要となる。   FIG. 6 is a diagram showing key distribution processing. In order for the connection device to acquire the encryption key, three-way communication of key distribution request, key distribution, and key distribution response is required at a minimum. For example, in SSL (Secure Socket Layer) widely used for cryptographic communication between a server (corresponding to a center device) and a client (corresponding to a connection device), client hello is a key distribution request and premaster secret message is key distribution In addition, finished corresponds to the key distribution response (see, for example, Non-Patent Document 1). This SSL further requires communication for processing such as certificate exchange and authentication.

センタ装置から接続装置に暗号鍵そのものを配送することは危険であるため、暗号鍵を生成するためのデータを送付し、双方で決められたアルゴリズムにより同じ鍵を共有する方法がしばしば用いられる(例えば、非特許文献2参照)。また、SSLでは乱数(premaster secret)を送付し、その値から決められたアルゴリズムにより計算する等により双方で同じ暗号鍵を生成する。   Since it is dangerous to deliver the encryption key itself from the center device to the connection device, a method of sending data for generating the encryption key and sharing the same key by an algorithm determined by both is often used (for example, Non-Patent Document 2). Also, in SSL, a random number (premaster secret) is sent, and the same encryption key is generated by both by calculating with an algorithm determined from the value.

The SSL Protocol Version 3.0、インターネット< URL : http://www.mozilla.org/projects/security/pki/nss/ssl/draft302.txt>The SSL Protocol Version 3.0, Internet <URL: http://www.mozilla.org/projects/security/pki/nss/ssl/draft302.txt> W. Diffie and M. E. Hellman, ”New Directions in Cryptography”, IEEE transactions on Information Theory, vol.IT-22, No.6, pp.644-654, Nov, 1976W. Diffie and M. E. Hellman, “New Directions in Cryptography”, IEEE transactions on Information Theory, vol.IT-22, No.6, pp.644-654, Nov, 1976

従来は、センタ装置で鍵が更新されていない場合でも、接続装置での通信の開始時や装置の立ち上げ時に鍵配送が行われていた。接続装置への鍵配送を減らすには、センタ装置で鍵が更新された場合のみ、鍵配送を行うことが望ましい。これを実現するには、センタ装置での鍵更新に同期して全ての接続装置への鍵配送を行う必要がある。しかし、複数の接続装置への鍵配送の衝突によって通信路の輻輳が発生する。これを避けるには鍵配送を順次行う必要があるが、一部の接続装置で新しい暗号鍵の配送が間に合わず通信ができない場合がある。この問題は、通信速度が例えば10Mbps以下の遅い場合に顕著となる。   Conventionally, even when the key has not been updated in the center device, key distribution has been performed at the start of communication at the connection device or at the time of startup of the device. In order to reduce key distribution to the connection device, it is desirable to perform key distribution only when the key is updated in the center device. In order to realize this, it is necessary to perform key distribution to all the connected devices in synchronization with the key update in the center device. However, communication path congestion occurs due to a collision of key distribution to a plurality of connection devices. In order to avoid this, it is necessary to perform key distribution sequentially, but there are cases in which communication cannot be performed because the distribution of a new encryption key is not in time for some connection devices. This problem becomes significant when the communication speed is slow, for example, 10 Mbps or less.

本発明は、上述のような課題を解決するためになされたもので、その目的は通信速度が遅い場合でも通信路の輻輳を防ぐことができる暗号通信システム及び暗号通信方法を得るものである。   The present invention has been made to solve the above-described problems, and an object of the present invention is to obtain an encryption communication system and an encryption communication method capable of preventing communication path congestion even when the communication speed is low.

本発明に係る暗号通信システムは、センタ装置と、前記センタ装置に通信路を介して接続された複数の接続装置とを備え、前記センタ装置は、暗号鍵を定期的に生成する暗号鍵生成部と、現在使用している第1の現行鍵と、前記第1の現行鍵の更新後に使用する第1の未来鍵と、前記第1の現行鍵の前に使用していた旧鍵とを保持し、前記暗号鍵生成部が前記暗号鍵を生成すると、保持していた前記旧鍵を削除し、前記暗号鍵を前記第1の未来鍵に更新し、保持していた前記第1の未来鍵を前記第1の現行鍵に更新し、保持していた前記第1の現行鍵を前記旧鍵に更新する第1の暗号鍵管理部と、前記第1の現行鍵で平文を暗号化して暗号文を得る第1の暗号化部と、前記第1の暗号化部から出力された前記暗号文を前記複数の接続装置の1つに送信する第1の暗号文送信部と、前記複数の接続装置の1つから送信された暗号文を受信する第1の暗号文受信部と、前記第1の暗号文受信部が受信した前記暗号文を前記第1の現行鍵で復号し、前記第1の現行鍵で復号できない場合は前記旧鍵で復号して平文を得る第1の復号部と、前記第1の現行鍵と前記第1の未来鍵を鍵配送用鍵で暗号化して前記複数の接続装置の1つに送信する暗号鍵送信部とを有し、前記接続装置は、前記暗号鍵送信部から送信された前記第1の現行鍵と前記第1の未来鍵を受信して前記鍵配送用鍵で復号する暗号鍵受信部と、現在使用している第2の現行鍵と、前記第2の現行鍵の更新後に使用する第2の未来鍵とを保持し、前記暗号鍵受信部から出力された前記第1の現行鍵と前記第1の未来鍵をそれぞれ前記第2の現行鍵と前記第2の未来鍵として置き換える第2の暗号鍵管理部と、前記第2の現行鍵で平文を暗号化する第2の暗号化部と、前記第2の暗号化部から出力された前記暗号文を前記センタ装置に送信する第2の暗号文送信部と、前記第1の暗号文送信部から送信された前記暗号文を受信する第2の暗号文受信部と、前記第2の暗号文受信部で受信された前記暗号文を前記第2の現行鍵で復号し、前記第2の現行鍵で復号できない場合は前記第2の未来鍵で復号して平文を得る第2の復号部とを有することを特徴とする。   An encryption communication system according to the present invention includes a center device and a plurality of connection devices connected to the center device via a communication path, and the center device periodically generates an encryption key. And a first current key that is currently used, a first future key that is used after updating the first current key, and an old key that was used before the first current key When the encryption key generation unit generates the encryption key, the old key held is deleted, the encryption key is updated to the first future key, and the first future key held Is updated to the first current key, the first current key that has been held is updated to the old key, and the plaintext is encrypted with the first current key and encrypted. A first encryption unit that obtains a sentence; and the ciphertext output from the first encryption unit A first ciphertext transmission unit that transmits the data, a first ciphertext reception unit that receives a ciphertext transmitted from one of the plurality of connection devices, and the first ciphertext reception unit that the first ciphertext reception unit has received. A first decryption unit for decrypting a ciphertext with the first current key and decrypting with the old key if the ciphertext cannot be decrypted with the first current key; and the first current key and the first An encryption key transmission unit that encrypts one future key with a key distribution key and transmits it to one of the plurality of connection devices, wherein the connection device transmits the first key transmitted from the encryption key transmission unit. Key receiving unit that receives the current key and the first future key and decrypts the key with the key for key distribution, the second current key that is currently used, and the second current key that is used after the update And the first current key and the first future key output from the encryption key receiving unit, respectively. A second encryption key management unit that replaces the second current key with the second future key, a second encryption unit that encrypts plaintext with the second current key, and the second encryption. A second ciphertext transmission unit that transmits the ciphertext output from the unit to the center device; and a second ciphertext reception unit that receives the ciphertext transmitted from the first ciphertext transmission unit; The ciphertext received by the second ciphertext receiving unit is decrypted with the second current key, and if it cannot be decrypted with the second current key, the plaintext is decrypted with the second future key. And a second decoding unit to be obtained.

本発明により、通信速度が遅い場合でも通信路の輻輳を防ぐことができる。   According to the present invention, communication path congestion can be prevented even when the communication speed is low.

本発明の実施の形態に係る暗号通信システムを示す全体図である。1 is an overall view showing a cryptographic communication system according to an embodiment of the present invention. 本発明の実施の形態に係るセンタ装置を示すブロック図である。It is a block diagram which shows the center apparatus which concerns on embodiment of this invention. 本発明の実施の形態に係る接続装置を示すブロック図である。It is a block diagram which shows the connection apparatus which concerns on embodiment of this invention. 本発明の実施の形態に係る鍵配送処理フローを示す図である。It is a figure which shows the key distribution processing flow which concerns on embodiment of this invention. 本発明の実施の形態における暗号鍵管理及び暗号通信の状況を示す図である。It is a figure which shows the condition of the encryption key management in embodiment of this invention, and encryption communication. 鍵配送処理を示す図である。It is a figure which shows a key delivery process.

本発明の実施の形態に係る暗号通信システム及び暗号通信方法について図面を参照して説明する。同じ又は対応する構成要素には同じ符号を付し、説明の繰り返しを省略する場合がある。   An encryption communication system and an encryption communication method according to an embodiment of the present invention will be described with reference to the drawings. The same or corresponding components are denoted by the same reference numerals, and repeated description may be omitted.

図1は、本発明の実施の形態に係る暗号通信システムを示す全体図である。1台のセンタ装置1に対して複数の接続装置2(最大で数千台)が10Mbps以下の低速の無線通信路3を介して接続されている。センタ装置1と接続装置2との間で双方向の暗号通信が行われ、接続装置2間の通信は無い。   FIG. 1 is an overall view showing a cryptographic communication system according to an embodiment of the present invention. A plurality of connection devices 2 (up to several thousand units) are connected to one center device 1 via a low-speed wireless communication path 3 of 10 Mbps or less. Bidirectional encryption communication is performed between the center device 1 and the connection device 2, and there is no communication between the connection devices 2.

図2は、本発明の実施の形態に係るセンタ装置を示すブロック図である。暗号鍵管理部4は、現在使用している第1の現行鍵と、第1の現行鍵の更新後に使用する第1の未来鍵と、第1の現行鍵の前に使用していた旧鍵とを保持している。   FIG. 2 is a block diagram showing the center device according to the embodiment of the present invention. The encryption key management unit 4 includes a first current key that is currently used, a first future key that is used after updating the first current key, and an old key that was used before the first current key. And holding.

平文入力部5は、平文を外部装置から入力する。暗号化部6は、平文入力部5から出力された平文を第1の現行鍵で暗号化して暗号文を得る。暗号文送信部7は、暗号化部6から出力された暗号文を複数の接続装置2の1つに送信する。   The plaintext input unit 5 inputs plaintext from an external device. The encryption unit 6 encrypts the plaintext output from the plaintext input unit 5 with the first current key to obtain a ciphertext. The ciphertext transmission unit 7 transmits the ciphertext output from the encryption unit 6 to one of the plurality of connection devices 2.

暗号文受信部8は、複数の接続装置2の1つから送信された暗号文を受信する。復号部9は、暗号文受信部8が受信した暗号文を第1の現行鍵で復号し、第1の現行鍵で復号できない場合は旧鍵で復号して平文を得る。平文出力部10は、復号部9から出力された平文を外部装置に出力する。   The ciphertext receiving unit 8 receives a ciphertext transmitted from one of the plurality of connection devices 2. The decrypting unit 9 decrypts the ciphertext received by the ciphertext receiving unit 8 with the first current key, and if it cannot be decrypted with the first current key, decrypts it with the old key to obtain plaintext. The plaintext output unit 10 outputs the plaintext output from the decryption unit 9 to an external device.

暗号鍵生成部11は、暗号鍵を定期的に生成する。暗号鍵生成部11が暗号鍵を生成すると、暗号鍵管理部4は、保持していた旧鍵を削除し、暗号鍵を第1の未来鍵に更新し、保持していた第1の未来鍵を第1の現行鍵に更新し、保持していた第1の現行鍵を旧鍵に更新する。   The encryption key generation unit 11 periodically generates an encryption key. When the encryption key generation unit 11 generates the encryption key, the encryption key management unit 4 deletes the retained old key, updates the encryption key to the first future key, and retains the retained first future key. Is updated to the first current key, and the held first current key is updated to the old key.

暗号鍵要求受信部12は、複数の接続装置2の1つから鍵配送要求パケットと接続装置番号を受信して暗号鍵管理部4に供給する。これに応じて暗号鍵管理部4は、暗号鍵送信部13に第1の現行鍵、第1の未来鍵、鍵生成時刻等を供給する。暗号鍵送信部13は、第1の現行鍵と第1の未来鍵を鍵配送用鍵で暗号化して、接続装置番号に対応する接続装置2に送信する。具体的には、暗号鍵送信部13は、第1の現行鍵、第1の未来鍵、次回鍵更新時刻、センタ装置1の時計における鍵配送時の時刻、及び鍵更新間隔のハッシュ値を算出し、ハッシュ前のデータとハッシュ値を暗号化して送信する。ハッシュ値は鍵配送時に通信エラーや改竄が発生していないことを検証するために用いる。暗号鍵配送応答受信部14は、鍵配送を行った接続装置2から鍵配送応答パケットを受信し、鍵配送完了を暗号鍵管理部4に伝える。   The encryption key request reception unit 12 receives the key distribution request packet and the connection device number from one of the plurality of connection devices 2 and supplies the key distribution request packet and the connection device number to the encryption key management unit 4. In response to this, the encryption key management unit 4 supplies the encryption key transmission unit 13 with the first current key, the first future key, the key generation time, and the like. The encryption key transmission unit 13 encrypts the first current key and the first future key with the key distribution key, and transmits the encrypted key to the connection device 2 corresponding to the connection device number. Specifically, the encryption key transmission unit 13 calculates a first current key, a first future key, a next key update time, a time at the time of key distribution in the clock of the center device 1, and a hash value of the key update interval. Then, the data before hashing and the hash value are encrypted and transmitted. The hash value is used to verify that no communication error or tampering has occurred during key distribution. The encryption key distribution response reception unit 14 receives a key distribution response packet from the connection device 2 that has performed the key distribution, and notifies the encryption key management unit 4 of the completion of key distribution.

図3は、本発明の実施の形態に係る接続装置を示すブロック図である。暗号鍵管理部15は、現在使用している第2の現行鍵と、第2の現行鍵の更新後に使用する第2の未来鍵とを保持している。   FIG. 3 is a block diagram showing the connection device according to the embodiment of the present invention. The encryption key management unit 15 holds a second current key that is currently used and a second future key that is used after the second current key is updated.

平文入力部16は、平文を外部装置から入力する。暗号化部17は、平文入力部16から出力された平文を第2の現行鍵で暗号化する。暗号文送信部18は、暗号化部17から出力された暗号文をセンタ装置1に送信する。   The plaintext input unit 16 inputs plaintext from an external device. The encryption unit 17 encrypts the plaintext output from the plaintext input unit 16 with the second current key. The ciphertext transmission unit 18 transmits the ciphertext output from the encryption unit 17 to the center device 1.

暗号文受信部19は、暗号文送信部7から送信された暗号文を受信する。復号部20は、暗号文受信部19で受信された暗号文を第2の現行鍵で復号し、第2の現行鍵で復号できない場合は第2の未来鍵で復号して平文を得る。平文出力部21は、復号部20から出力された平文を外部装置に出力する。   The ciphertext receiving unit 19 receives the ciphertext transmitted from the ciphertext transmitting unit 7. The decrypting unit 20 decrypts the ciphertext received by the ciphertext receiving unit 19 with the second current key, and if it cannot be decrypted with the second current key, decrypts it with the second future key to obtain plaintext. The plaintext output unit 21 outputs the plaintext output from the decryption unit 20 to the external device.

ここで、復号部20において第2の現行鍵で復号できた場合には、その後も復号部20及び暗号化部17は第2の現行鍵でそれぞれ復号及び暗号化をする。一方、復号部20において第2の未来鍵で復号できた場合は、それ以降は復号部20及び暗号化部17は第2の未来鍵でそれぞれ復号及び暗号化をする。ただし、接続装置2での暗号化には常に第2の現行鍵を用い、第2の現行鍵で復号できない場合にのみ第2の未来鍵で復号することとしてもよい。   Here, when the decryption unit 20 can decrypt with the second current key, the decryption unit 20 and the encryption unit 17 continue to decrypt and encrypt with the second current key. On the other hand, when the decryption unit 20 can decrypt with the second future key, the decryption unit 20 and the encryption unit 17 subsequently decrypt and encrypt with the second future key, respectively. However, it is possible to always use the second current key for encryption in the connection device 2 and decrypt with the second future key only when decryption with the second current key is impossible.

第2の現行鍵でも第2の未来鍵でも復号できない場合には通信エラーと判定し、鍵の切り替えは実行しない。なお、復号できたか否かは暗号化するデータにCRC(Cyclic Redundancy Check)を含めておき、CRC検証ができるか否かで判定する。このように第2の現行鍵を使用していて復号できなくなった時点で、第2の未来鍵に切り替えることにより、鍵配送を受けることなく暗号通信を継続することができる。   If neither the second current key nor the second future key can be decrypted, it is determined as a communication error, and the key is not switched. Whether or not decryption is possible is determined by including CRC (Cyclic Redundancy Check) in the data to be encrypted and performing CRC verification. As described above, when the second current key is used and decryption cannot be performed, the encryption communication can be continued without receiving key distribution by switching to the second future key.

暗号鍵受信部22は、暗号鍵送信部13から送信された第1の現行鍵と第1の未来鍵を受信して鍵配送用鍵で復号し、ハッシュ検証する。ハッシュ検証が成功した場合には受信した暗号鍵を暗号鍵管理部15に供給し、暗号鍵配送応答部24に暗号鍵受領を通知し、暗号鍵配送要求部23に次回鍵更新時刻と鍵更新間隔を供給し、接続装置2の時計を受信したセンタ装置1の時刻に合わせる。ハッシュ検証が失敗した場合には受信したパケットを破棄する。   The encryption key reception unit 22 receives the first current key and the first future key transmitted from the encryption key transmission unit 13, decrypts them with the key distribution key, and performs hash verification. If the hash verification is successful, the received encryption key is supplied to the encryption key management unit 15, the encryption key delivery response unit 24 is notified of receipt of the encryption key, and the encryption key delivery request unit 23 is notified of the next key update time and key update. The interval is supplied, and the clock of the connection device 2 is set to the time of the center device 1 that received it. If hash verification fails, the received packet is discarded.

暗号鍵管理部15は、暗号鍵受信部22から出力された第1の現行鍵と第1の未来鍵をそれぞれ第2の現行鍵と第2の未来鍵に更新する。暗号鍵受領を通知された暗号鍵配送応答部24は、鍵配送応答パケットを生成し、鍵配送用鍵で暗号化してセンタ装置1の暗号鍵配送応答受信部14に送信する。   The encryption key management unit 15 updates the first current key and the first future key output from the encryption key receiving unit 22 to the second current key and the second future key, respectively. The encryption key distribution response unit 24 notified of the reception of the encryption key generates a key distribution response packet, encrypts it with the key distribution key, and transmits it to the encryption key distribution response reception unit 14 of the center apparatus 1.

暗号鍵配送要求部23は、鍵配送時に受領した次回鍵更新時刻と鍵更新間隔から次々回鍵更新時刻を計算する。そして、鍵配達受領後、センタ装置1が次に鍵更新する時刻である次回鍵更新時刻からその次に鍵更新する時刻である次々回鍵更新時刻までの間のランダムな時刻に、鍵配送要求パケットを生成し、鍵配送要求パケットと接続装置番号をセンタ装置1に送信する。このように鍵配達受領後、次々回鍵更新時刻までに鍵配送要求を行うことで、途切れることなく暗号通信を継続することができる。なお、ランダムな時刻は乱数等を用いて決められる。   The encryption key distribution request unit 23 calculates the key update time one after another from the next key update time received at the time of key distribution and the key update interval. After receiving the key delivery, the key distribution request packet is received at a random time between the next key update time that is the next key update time of the center device 1 and the next key update time that is the next key update time. And the key distribution request packet and the connection device number are transmitted to the center device 1. As described above, after the key delivery is received, the key delivery request is made one after another until the key update time, so that the encrypted communication can be continued without interruption. The random time is determined using a random number or the like.

また、接続装置2の電源がOFFになっていると、暗号鍵配送要求部23が、次回鍵更新時刻から次々回鍵更新時刻までに鍵配送要求パケットをセンタ装置1に送信できない場合がある。その場合には、次々回線更新時刻以降に接続装置2の電源がONした時点で鍵配送要求パケットをセンタ装置1の暗号鍵配送応答受信部14に送信する。   If the connection device 2 is powered off, the encryption key distribution request unit 23 may not be able to transmit a key distribution request packet to the center device 1 from the next key update time to the next key update time. In this case, the key distribution request packet is transmitted to the encryption key distribution response receiving unit 14 of the center apparatus 1 when the power of the connection apparatus 2 is turned on after the line update time.

続いて、図4は、本発明の実施の形態に係る鍵配送処理フローを示す図である。接続装置2の初期化時に、センタ装置1が鍵配送用鍵を生成する(ステップS1)。接続装置2が鍵配送用鍵を受領して暗号鍵管理部15に書き込む(ステップS2)。鍵配送用鍵は配送する鍵を秘匿するために必要なものであり、接続装置2ごとに異なる鍵配送用鍵が予め生成され、センタ装置1の暗号鍵管理部4と接続装置2の暗号鍵管理部15に書き込まれている。   Next, FIG. 4 is a diagram showing a key distribution processing flow according to the embodiment of the present invention. When the connection device 2 is initialized, the center device 1 generates a key for key distribution (step S1). The connection device 2 receives the key distribution key and writes it in the encryption key management unit 15 (step S2). The key delivery key is necessary for concealing the key to be delivered, and a different key delivery key is generated for each connection device 2 in advance, and the encryption key management unit 4 of the center device 1 and the encryption key of the connection device 2 are generated. It is written in the management unit 15.

センタ装置1では定期的に(一定の鍵更新間隔で)通信用の暗号鍵の鍵更新が行われる(ステップS3)。鍵更新間隔は通信システムで決められる。センタ装置1は、第1の現行鍵と第1の未来鍵と旧鍵とを保持し、鍵更新が行われると、保持していた旧鍵を削除し、暗号鍵を第1の未来鍵に更新し、保持していた第1の未来鍵を第1の現行鍵に更新し、保持していた第1の現行鍵を旧鍵に更新する。   The center device 1 periodically updates the encryption key for communication (at a fixed key update interval) (step S3). The key update interval is determined by the communication system. The center device 1 holds the first current key, the first future key, and the old key. When the key is updated, the center device 1 deletes the held old key, and uses the encryption key as the first future key. The first future key that has been updated and retained is updated to the first current key, and the first current key that has been retained is updated to the old key.

接続装置2は、センタ装置1から受領した次回鍵更新時刻と鍵更新間隔から、次回鍵更新時刻から次々回鍵更新時刻までのランダムな時刻に決定される鍵配送用要求タイミングをチェックする(ステップS4)。鍵配送用要求タイミングを過ぎている場合には直ちに鍵配送要求パケットを生成し、鍵配送要求パケットと接続装置番号をセンタ装置1に送信する(ステップS5)。なお、鍵配送用要求のタイミングを超過した時点で接続装置の電源がOFFになっている場合には、その後初めて接続装置2の電源がONした時点で直ちに鍵配送要求を行う。   The connection device 2 checks the key delivery request timing determined at a random time from the next key update time to the next key update time from the next key update time and key update interval received from the center device 1 (step S4). ). If the key delivery request timing has passed, a key delivery request packet is immediately generated, and the key delivery request packet and the connection device number are transmitted to the center device 1 (step S5). If the connection device is turned off when the timing of the key delivery request is exceeded, the key delivery request is immediately made when the connection device 2 is turned on for the first time.

センタ装置1は接続装置2からの鍵配送要求を待ち(ステップS6)、鍵配送要求を受信すると第1の現行鍵、第1の未来鍵、センタ時刻、次回鍵更新時刻、鍵更新間隔のハッシュ値を算出する(ステップS7)。ハッシュ前のデータとハッシュ値を鍵配送用鍵で暗号化して接続装置2に送信する(ステップS8)。   The center device 1 waits for a key distribution request from the connection device 2 (step S6), and upon receiving the key distribution request, the first current key, first future key, center time, next key update time, hash of key update interval A value is calculated (step S7). The data before hashing and the hash value are encrypted with the key distribution key and transmitted to the connection device 2 (step S8).

接続装置2は鍵等を受領する(ステップS9)。これらを鍵配送用鍵で復号し、ハッシュ検証及び時刻合わせを行う。センタ装置1から受信した第1の現行鍵と第1の未来鍵が、それぞれ暗号鍵管理部15に保持されていた元の第2の現行鍵と第2の未来鍵に置き換わる。接続装置2は鍵配送応答パケットを生成する(ステップS10)。この鍵配送応答パケットを鍵配送用鍵で暗号化し、センタ装置1へ鍵配送応答を行う(ステップS11)。その後、鍵配送用要求タイミングのチェックS4に戻る。センタ装置1は鍵配送応答を受領した後、鍵配送完了を確認する(ステップS12)。その後、鍵配送要求受領待ちS6に戻る。   The connection device 2 receives the key or the like (step S9). These are decrypted with the key delivery key, and hash verification and time adjustment are performed. The first current key and the first future key received from the center device 1 are replaced with the original second current key and the second future key held in the encryption key management unit 15, respectively. The connection device 2 generates a key distribution response packet (step S10). The key delivery response packet is encrypted with the key delivery key, and a key delivery response is sent to the center apparatus 1 (step S11). Thereafter, the process returns to the key delivery request timing check S4. After receiving the key distribution response, the center device 1 confirms the completion of key distribution (step S12). Thereafter, the process returns to waiting for key distribution request reception S6.

なお、鍵配送用鍵やハッシュ値を用いることは鍵配送における一般的な方法であり、実用上の種々のバリエーションが考えられる。本実施の形態では鍵配送用鍵として共通鍵を用いるが、公開鍵でもよい。センタ装置1と接続装置2との間で時刻ずれが生じると接続装置2における鍵配送用要求タイミングにずれが生ずるため、鍵配送のたびに時刻合わせを行う。   Note that using a key distribution key or hash value is a general method for key distribution, and various practical variations are possible. In this embodiment, a common key is used as a key distribution key, but a public key may be used. When a time lag occurs between the center device 1 and the connection device 2, a key delivery request timing in the connection device 2 is distorted. Therefore, the time is adjusted every time the key is delivered.

鍵配送の一連の処理が済むと通信可能状態となる。通信可能状態では鍵配送用要求タイミングのチェックS4を常時行っており、鍵配送用要求タイミングを超過した場合には鍵配送要求が出される。   After a series of key distribution processes, communication is possible. In the communicable state, the key delivery request timing check S4 is always performed. When the key delivery request timing is exceeded, a key delivery request is issued.

続いて、図5は、本発明の実施の形態における暗号鍵管理及び暗号通信の状況を示す図である。図中でKnは暗号鍵であり、nは鍵の区別を示し、nが同じものは同じ鍵を示す。各装置が保持する鍵をカッコ内に示し、センタ装置1では(旧鍵、第1の現行鍵、第1の未来鍵)、接続装置2では(第2の現行鍵、第2の未来鍵)を示す。tKnは暗号鍵Knが第1の現行鍵から旧鍵になる鍵更新時刻を示し、tIは鍵更新間隔を示す。tnは暗号鍵Knが第1の現行鍵、Kn+1が第1の未来鍵として鍵配送される時刻を示す。   Next, FIG. 5 is a diagram showing the state of encryption key management and encryption communication in the embodiment of the present invention. In the figure, Kn is an encryption key, n indicates the distinction of keys, and the same n indicates the same key. The key held by each device is shown in parentheses. In the center device 1 (old key, first current key, first future key), in the connection device 2 (second current key, second future key). Indicates. tKn indicates the key update time when the encryption key Kn becomes the old key from the first current key, and tI indicates the key update interval. tn indicates a time when the encryption key Kn is delivered as the first current key and Kn + 1 is delivered as the first future key.

(1)接続装置2がセンタ装置1に鍵配送要求をする(図4のステップS5)。(2)センタ装置1は鍵配送要求を受けて、センタ装置1の現行鍵K1と未来鍵K2を接続装置2に送信する(図4のステップS8)。この際に次回鍵更新時刻tK1(K1が現行鍵から旧鍵となる時刻)と鍵更新間隔tIも送信する。(3)接続装置2は第1の現行鍵K1と第1の未来鍵K2を受信して確認した後、接続装置2の第2の現行鍵と第2の未来鍵をK1とK2にそれぞれ置き換え、センタ装置1に鍵配送応答を送信する(図4のステップS11)。(4)(5)センタ装置1と接続装置2は両者とも現行鍵K1で暗号化する。   (1) The connection device 2 makes a key distribution request to the center device 1 (step S5 in FIG. 4). (2) Upon receiving the key distribution request, the center device 1 transmits the current key K1 and future key K2 of the center device 1 to the connection device 2 (step S8 in FIG. 4). At this time, the next key update time tK1 (time when K1 becomes the old key from the current key) and the key update interval tI are also transmitted. (3) The connection device 2 receives and confirms the first current key K1 and the first future key K2, and then replaces the second current key and the second future key of the connection device 2 with K1 and K2, respectively. Then, a key distribution response is transmitted to the center device 1 (step S11 in FIG. 4). (4) (5) Both the center device 1 and the connection device 2 encrypt with the current key K1.

(6)時刻tK1においてセンタ装置1で鍵更新が行われる。新規に生成された暗号鍵K3が未来鍵に、未来鍵K2が現行鍵に、現行鍵K1が旧鍵になり、元の旧鍵K0は削除される。   (6) Key update is performed in the center device 1 at time tK1. The newly generated encryption key K3 becomes the future key, the future key K2 becomes the current key, the current key K1 becomes the old key, and the original old key K0 is deleted.

センタ装置1で鍵更新が行われた後も、接続装置2はセンタ装置1からの通信を受信するまではセンタ装置1での鍵更新を認識できない。このため、(7)接続装置2からセンタ装置1に通信する場合、接続装置2が古い鍵(センタ装置1の鍵更新前の第1の現行鍵)である接続装置2の第2の現行鍵K1で暗号化してしまう。この場合、センタ装置1は鍵更新後の第1の現行鍵K2で復号を試みるが、鍵不一致のため復号できないので、センタ装置1は旧鍵K1で復号する。これにより、途切れることなく暗号通信を継続することができる。   Even after the key update is performed in the center device 1, the connection device 2 cannot recognize the key update in the center device 1 until the communication from the center device 1 is received. Therefore, (7) when communicating from the connection device 2 to the center device 1, the second current key of the connection device 2 in which the connection device 2 is an old key (first current key before key update of the center device 1). Encrypt with K1. In this case, the center apparatus 1 attempts to decrypt with the first current key K2 after the key update, but cannot be decrypted due to the key mismatch, so the center apparatus 1 decrypts with the old key K1. Thereby, encryption communication can be continued without interruption.

(8)センタ装置1から通信する場合、センタ装置1の現行鍵K2で暗号化し、接続装置2は現行鍵K1で復号を試みるが、鍵不一致のため復号できないので、接続装置2は未来鍵K2で復号する。(9)未来鍵K2で復号に成功した後は、接続装置2は未来鍵K2で暗号化を行うようになる。なお、鍵更新の後に接続装置からの通信(7)が無く、センタ装置1からの通信(8)が最初に行われる場合も有る。   (8) When communicating from the center apparatus 1, the connection apparatus 2 tries to decrypt with the current key K2 of the center apparatus 1 and the connection apparatus 2 tries to decrypt with the current key K1. Decrypt with. (9) After successful decryption with the future key K2, the connection device 2 performs encryption with the future key K2. In some cases, after the key update, there is no communication (7) from the connection device, and communication (8) from the center device 1 is performed first.

(10)次回鍵更新時刻tK1から次々回鍵更新時刻(tK1+tI)までの間のランダムな時刻t2に、接続装置2がセンタ装置1に鍵配送要求をする(図4のステップS5)。(11)センタ装置1は鍵配送要求を受けて、センタ装置1の現行鍵K2と未来鍵K3を接続装置2に送信する(図4のステップS8)。(12)接続装置2は現行鍵K2と未来鍵K3を受信して確認した後、接続装置2の第2の現行鍵と第2の未来鍵をK2とK3にそれぞれ置き換え、センタ装置1に鍵配送応答を送信する(図4のステップS11)。(13)(14)センタ装置1と接続装置2は両者とも現行鍵K2で暗号化する。以降、同様のステップが繰り返される。   (10) At a random time t2 between the next key update time tK1 and the next key update time (tK1 + tI), the connection device 2 makes a key distribution request to the center device 1 (step S5 in FIG. 4). (11) Upon receiving the key distribution request, the center device 1 transmits the current key K2 and future key K3 of the center device 1 to the connection device 2 (step S8 in FIG. 4). (12) After receiving and confirming the current key K2 and the future key K3, the connecting device 2 replaces the second current key and the second future key of the connecting device 2 with K2 and K3, respectively, and the key to the center device 1 A delivery response is transmitted (step S11 in FIG. 4). (13) (14) Both the center apparatus 1 and the connection apparatus 2 encrypt with the current key K2. Thereafter, similar steps are repeated.

以上のように本実施の形態では、センタ装置1が第1の現行鍵と第1の未来鍵と旧鍵を保持し、接続装置2が第2の現行鍵と第2の未来鍵を保持する構成により、鍵配送の回数を最小限(鍵更新の回数×接続装置数)に抑えて、途切れることなく暗号通信を継続することができる。そして、各接続装置2は保持している鍵で復号ができなくなる時刻までに更新された鍵を受け取ればよいため、センタ装置1は鍵更新ごとに全ての接続装置2への鍵配送を同時に行う必要が無い。このため、通信速度が遅い場合でも他の接続装置への鍵配送との衝突による通信路の輻輳を防ぐことができる。具体的には、複数の接続装置2が次回鍵更新時刻から次々回鍵更新時刻までのランダムな時刻に鍵配送要求を行えば、複数の接続装置2への鍵配送のタイミングがずれるため、通信路の輻輳を防ぐことができる。   As described above, in the present embodiment, the center device 1 holds the first current key, the first future key, and the old key, and the connection device 2 holds the second current key and the second future key. According to the configuration, the number of times of key distribution can be minimized (number of times of key update × number of connected devices), and encryption communication can be continued without interruption. Since each connection device 2 only needs to receive the updated key by the time when it cannot be decrypted with the held key, the center device 1 simultaneously distributes keys to all the connection devices 2 every time the key is updated. There is no need. For this reason, even when the communication speed is low, congestion of the communication path due to a collision with key distribution to another connection device can be prevented. Specifically, if the plurality of connection devices 2 make key distribution requests at random times from the next key update time to the next key update time, the timing of key distribution to the plurality of connection devices 2 is shifted, so that the communication path Can be prevented.

なお、本実施の形態では、鍵配送要求タイミングを決定するため、センタ装置1の暗号鍵送信部13が次回鍵更新時刻と鍵更新間隔を接続装置2の暗号鍵受信部22に送信している。これに限らず、センタ装置1の暗号鍵送信部13が、次回鍵更新時刻、次々回鍵更新時刻、及び鍵更新間隔の少なくとも2つを接続装置2の暗号鍵受信部22に送信すればよい。また、接続装置2の第2の暗号鍵配送要求部23に鍵更新間隔を予め書き込んでおき、センタ装置1の暗号鍵送信部13が次回鍵更新時刻と次々回鍵更新時刻の少なくとも1つを接続装置2の暗号鍵受信部22に送信することでもよい。   In this embodiment, the encryption key transmission unit 13 of the center device 1 transmits the next key update time and the key update interval to the encryption key reception unit 22 of the connection device 2 in order to determine the key distribution request timing. . Not limited to this, the encryption key transmitting unit 13 of the center device 1 may transmit at least two of the next key update time, the next key update time, and the key update interval to the encryption key receiving unit 22 of the connection device 2. Also, the key update interval is written in advance in the second encryption key distribution request unit 23 of the connection device 2, and the encryption key transmission unit 13 of the center device 1 connects at least one of the next key update time and the key update time one after another. It may be transmitted to the encryption key receiving unit 22 of the device 2.

また、センタ装置1の暗号鍵送信部13が、第1の現行鍵と第1の未来鍵の代わりに、第1の現行鍵と第1の未来鍵を生成するためのデータを送信するようにしてもよい。この場合には、接続装置2は、受信したデータに基づいて第1の現行鍵と第1の未来鍵を生成する。   Further, the encryption key transmission unit 13 of the center device 1 transmits data for generating the first current key and the first future key instead of the first current key and the first future key. May be. In this case, the connection device 2 generates a first current key and a first future key based on the received data.

1 センタ装置、2 接続装置、3 無線通信路(通信路)、4 暗号鍵管理部(第1の暗号鍵管理部)、5,16 平文入力部、6 暗号化部(第1の暗号化部)、7 暗号文送信部(第1の暗号文送信部)、8 暗号文受信部(第1の暗号文受信部)、9 復号部(第1の復号部)、10,21 平文出力部、11 暗号鍵生成部、12 暗号鍵要求受信部、13 暗号鍵送信部、14 暗号鍵配送応答受信部、15 暗号鍵管理部(第2の暗号鍵管理部)、17 暗号化部(第2の暗号化部)、18 暗号文送信部(第2の暗号文送信部)、19 暗号文受信部(第2の暗号文受信部)、20 復号部(第2の復号部)、22 暗号鍵受信部、23 暗号鍵配送要求部、24 暗号鍵配送応答部 DESCRIPTION OF SYMBOLS 1 Center apparatus, 2 connection apparatus, 3 wireless communication path (communication path), 4 encryption key management part (1st encryption key management part), 5,16 plaintext input part, 6 encryption part (1st encryption part) ), 7 ciphertext transmission unit (first ciphertext transmission unit), 8 ciphertext reception unit (first ciphertext reception unit), 9 decryption unit (first decryption unit), 10, 21 plaintext output unit, DESCRIPTION OF SYMBOLS 11 Encryption key production | generation part, 12 Encryption key request | requirement reception part, 13 Encryption key transmission part, 14 Encryption key delivery response reception part, 15 Encryption key management part (2nd encryption key management part), 17 Encryption part (2nd Encryption unit), 18 ciphertext transmission unit (second ciphertext transmission unit), 19 ciphertext reception unit (second ciphertext reception unit), 20 decryption unit (second decryption unit), 22 encryption key reception Part, 23 encryption key delivery request part, 24 encryption key delivery response part

Claims (16)

センタ装置と、
前記センタ装置に通信路を介して接続された複数の接続装置とを備え、
前記センタ装置は、
暗号鍵を定期的に生成する暗号鍵生成部と、
現在使用している第1の現行鍵と、前記第1の現行鍵の更新後に使用する第1の未来鍵と、前記第1の現行鍵の前に使用していた旧鍵とを保持し、前記暗号鍵生成部が前記暗号鍵を生成すると、保持していた前記旧鍵を削除し、前記暗号鍵を前記第1の未来鍵に更新し、保持していた前記第1の未来鍵を前記第1の現行鍵に更新し、保持していた前記第1の現行鍵を前記旧鍵に更新する第1の暗号鍵管理部と、
前記第1の現行鍵で平文を暗号化して暗号文を得る第1の暗号化部と、
前記第1の暗号化部から出力された前記暗号文を前記複数の接続装置の1つに送信する第1の暗号文送信部と、
前記複数の接続装置の1つから送信された暗号文を受信する第1の暗号文受信部と、
前記第1の暗号文受信部が受信した前記暗号文を前記第1の現行鍵で復号し、前記第1の現行鍵で復号できない場合は前記旧鍵で復号して平文を得る第1の復号部と、
前記第1の現行鍵と前記第1の未来鍵を鍵配送用鍵で暗号化して前記複数の接続装置の1つに送信する暗号鍵送信部とを有し、
前記接続装置は、
前記暗号鍵送信部から送信された前記第1の現行鍵と前記第1の未来鍵を受信して前記鍵配送用鍵で復号する暗号鍵受信部と、
現在使用している第2の現行鍵と、前記第2の現行鍵の更新後に使用する第2の未来鍵とを保持し、前記暗号鍵受信部から出力された前記第1の現行鍵と前記第1の未来鍵をそれぞれ前記第2の現行鍵と前記第2の未来鍵として置き換える第2の暗号鍵管理部と、
前記第2の現行鍵で平文を暗号化する第2の暗号化部と、
前記第2の暗号化部から出力された前記暗号文を前記センタ装置に送信する第2の暗号文送信部と、
前記第1の暗号文送信部から送信された前記暗号文を受信する第2の暗号文受信部と、
前記第2の暗号文受信部で受信された前記暗号文を前記第2の現行鍵で復号し、前記第2の現行鍵で復号できない場合は前記第2の未来鍵で復号して平文を得る第2の復号部とを有することを特徴とする暗号通信システム。
A center device;
A plurality of connection devices connected to the center device via a communication path;
The center device is
An encryption key generator that periodically generates an encryption key;
Holding a first current key that is currently in use, a first future key that is used after updating the first current key, and an old key that was used before the first current key; When the encryption key generation unit generates the encryption key, the stored old key is deleted, the encryption key is updated to the first future key, and the stored first future key is changed to the first future key. A first encryption key management unit that updates to the first current key and updates the held first current key to the old key;
A first encryption unit that encrypts plaintext with the first current key to obtain a ciphertext;
A first ciphertext transmission unit that transmits the ciphertext output from the first encryption unit to one of the plurality of connection devices;
A first ciphertext receiving unit that receives a ciphertext transmitted from one of the plurality of connection devices;
A first decryption that decrypts the ciphertext received by the first ciphertext receiving unit with the first current key, and obtains a plaintext by decrypting with the old key if the ciphertext cannot be decrypted with the first current key; And
An encryption key transmission unit that encrypts the first current key and the first future key with a key distribution key and transmits the encrypted key to one of the plurality of connection devices;
The connecting device is
An encryption key receiving unit that receives the first current key and the first future key transmitted from the encryption key transmitting unit and decrypts them with the key distribution key;
The second current key currently used and the second future key used after the second current key is updated, and the first current key output from the encryption key receiving unit and the second current key A second encryption key manager that replaces the first future key with the second current key and the second future key, respectively.
A second encryption unit for encrypting plaintext with the second current key;
A second ciphertext transmission unit that transmits the ciphertext output from the second encryption unit to the center device;
A second ciphertext receiver that receives the ciphertext transmitted from the first ciphertext transmitter;
The ciphertext received by the second ciphertext receiving unit is decrypted with the second current key, and if it cannot be decrypted with the second current key, the plaintext is obtained by decrypting with the second future key. A cryptographic communication system comprising: a second decryption unit.
前記接続装置は、前記センタ装置が次に鍵更新する時刻である次回鍵更新時刻からその次に鍵更新する時刻である次々回鍵更新時刻までに鍵配送要求パケットを生成し、前記鍵配送要求パケットと接続装置番号を前記センタ装置に送信する暗号鍵配送要求部を更に有し、
前記センタ装置は、前記複数の接続装置の1つから前記鍵配送要求パケットと前記接続装置番号を受信する暗号鍵要求受信部を更に有し、
前記鍵配送要求パケットと前記接続装置番号を受信すると、前記暗号鍵送信部は、前記第1の現行鍵と前記第1の未来鍵を前記鍵配送用鍵で暗号化して、前記接続装置番号に対応する前記接続装置に送信することを特徴とする請求項1に記載の暗号通信システム。
The connection device generates a key distribution request packet from a next key update time that is a next key update time by the center device to a next key update time that is a next key update time, and the key distribution request packet And an encryption key distribution request part for transmitting the connection device number to the center device,
The center device further includes an encryption key request reception unit that receives the key distribution request packet and the connection device number from one of the plurality of connection devices,
Upon receiving the key distribution request packet and the connection device number, the encryption key transmission unit encrypts the first current key and the first future key with the key distribution key, and converts the key into the connection device number. The encryption communication system according to claim 1, wherein the communication is transmitted to the corresponding connection device.
前記複数の接続装置の前記暗号鍵配送要求部は、前記次回鍵更新時刻から前記次々回鍵更新時刻までのランダムな時刻に前記鍵配送要求パケットを生成し、前記センタ装置に送信することを特徴とする請求項2に記載の暗号通信システム。   The encryption key distribution request unit of the plurality of connection devices generates the key distribution request packet at a random time from the next key update time to the next key update time, and transmits the packet to the center device. The cryptographic communication system according to claim 2. 前記センタ装置の前記暗号鍵送信部は、前記次回鍵更新時刻、前記次々回鍵更新時刻、及び鍵更新間隔の少なくとも2つを前記接続装置の前記暗号鍵受信部に送信することを特徴とする請求項2又は3に記載の暗号通信システム。   The encryption key transmitting unit of the center device transmits at least two of the next key update time, the next key update time, and a key update interval to the encryption key receiving unit of the connection device. Item 4. The cryptographic communication system according to Item 2 or 3. 前記第2の暗号鍵配送要求部は鍵更新間隔を保持し、
前記センタ装置の前記暗号鍵送信部は、前記次回鍵更新時刻と前記次々回鍵更新時刻の少なくとも1つを前記接続装置の前記暗号鍵受信部に送信することを特徴とする請求項2又は3に記載の暗号通信システム。
The second encryption key distribution request unit holds a key update interval,
The said encryption key transmission part of the said center apparatus transmits at least one of the said next key update time and the said next key update time to the said encryption key reception part of the said connection apparatus, The Claim 2 or 3 characterized by the above-mentioned. The cryptographic communication system described
前記暗号鍵配送要求部は、前記接続装置の電源がOFFになっていて、前記次回鍵更新時刻から前記次々回鍵更新時刻までに前記鍵配送要求パケットを前記センタ装置に送信できなかった場合、前記次々回線更新時刻以降に前記接続装置の電源がONした時点で前記鍵配送要求パケットを前記センタ装置に送信することを特徴とする請求項2〜5の何れか1項に記載の暗号通信システム。   When the connection device is powered off and the encryption key distribution request unit cannot transmit the key distribution request packet to the center device from the next key update time to the next key update time, The cryptographic communication system according to any one of claims 2 to 5, wherein the key distribution request packet is transmitted to the center device when the power of the connection device is turned on after the line update time. 前記第2の復号部において前記第2の未来鍵で復号ができた場合は、それ以降は前記第2の復号部及び前記第2の暗号化部は前記第2の未来鍵でそれぞれ復号及び暗号化をすることを特徴とする請求項1〜6の何れか1項に記載の暗号通信システム。   If the second decryption unit can decrypt with the second future key, the second decryption unit and the second encryption unit are decrypted and encrypted with the second future key thereafter. The cryptographic communication system according to any one of claims 1 to 6, characterized in that: 前記暗号鍵送信部は、前記第1の現行鍵と前記第1の未来鍵の代わりに、前記第1の現行鍵と前記第1の未来鍵を生成するためのデータを送信することを特徴とする請求項1〜7の何れか1項に記載の暗号通信システム。   The encryption key transmission unit transmits data for generating the first current key and the first future key instead of the first current key and the first future key. The cryptographic communication system according to any one of claims 1 to 7. 通信路を介して接続されたセンタ装置と複数の接続装置との間で暗号通信を行う方法であって、
前記センタ装置が暗号鍵を定期的に生成するステップと、
前記センタ装置が、現在使用している第1の現行鍵と、前記第1の現行鍵の更新後に使用する第1の未来鍵と、前記第1の現行鍵の前に使用していた旧鍵とを保持し、前記暗号鍵が生成されると、保持していた前記旧鍵を削除し、前記暗号鍵を前記第1の未来鍵に更新し、保持していた前記第1の未来鍵を前記第1の現行鍵に更新し、保持していた前記第1の現行鍵を前記旧鍵に更新するステップと、
前記センタ装置が第1の現行鍵で平文を暗号化して前記複数の接続装置の1つに送信するステップと、
前記センタ装置が前記複数の接続装置の1つから送信された暗号文を受信し、前記第1の現行鍵で復号し、前記第1の現行鍵で復号できない場合は前記旧鍵で復号するステップと、
前記センタ装置が前記第1の現行鍵と前記第1の未来鍵を鍵配送用鍵で暗号化して前記複数の接続装置の1つに送信するステップと、
前記接続装置が、前記センタ装置から送信された前記第1の現行鍵と前記第1の未来鍵を受信して前記鍵配送用鍵で復号するステップと、
前記接続装置が、現在使用している第2の現行鍵と、前記第2の現行鍵の更新後に使用する第2の未来鍵とを保持し、受信した前記第1の現行鍵と前記第1の未来鍵をそれぞれ前記第2の現行鍵と前記第2の未来鍵に更新するステップと、
前記接続装置が、前記第2の現行鍵で平文を暗号化して前記センタ装置に送信するステップと、
前記接続装置が、前記センタ装置から送信された前記暗号文を受信し、前記第2の現行鍵で復号し、前記第2の現行鍵で復号できない場合は前記第2の未来鍵で復号するステップとを備えることを特徴とする暗号通信方法。
A method of performing cryptographic communication between a center device connected via a communication path and a plurality of connection devices,
The center device periodically generating an encryption key;
The first current key currently used by the center device, a first future key used after updating the first current key, and an old key used before the first current key When the encryption key is generated, the old key held is deleted, the encryption key is updated to the first future key, and the held first future key is Updating the first current key and updating the held first current key to the old key;
The center device encrypts a plaintext with a first current key and transmits it to one of the plurality of connection devices;
The center device receives a ciphertext transmitted from one of the plurality of connection devices, decrypts it with the first current key, and decrypts with the old key if it cannot be decrypted with the first current key When,
The center device encrypts the first current key and the first future key with a key distribution key and transmits the same to one of the plurality of connection devices;
The connection device receiving the first current key and the first future key transmitted from the center device and decrypting with the key delivery key;
The connection device holds a second current key currently used and a second future key used after updating the second current key, and receives the received first current key and the first Updating each of the future keys to the second current key and the second future key;
The connection device encrypts plaintext with the second current key and transmits it to the center device;
The connection device receives the ciphertext transmitted from the center device, decrypts it with the second current key, and decrypts it with the second future key if it cannot be decrypted with the second current key. An encryption communication method comprising:
前記接続装置が、前記センタ装置が次に鍵更新する時刻である次回鍵更新時刻からその次に鍵更新する時刻である次々回鍵更新時刻までに鍵配送要求パケットを生成し、前記鍵配送要求パケットと接続装置番号を前記センタ装置に送信するステップと、
前記センタ装置が、前記複数の接続装置の1つから前記鍵配送要求パケットと前記接続装置番号を受信するステップと、
前記センタ装置が、前記鍵配送要求パケットと前記接続装置番号を受信すると、前記第1の現行鍵と前記第1の未来鍵を前記鍵配送用鍵で暗号化して、前記接続装置番号に対応する前記接続装置に送信するステップとを更に備えることを特徴とする請求項9に記載の暗号通信方法。
The connection device generates a key distribution request packet from a next key update time, which is a time when the center device performs next key update, to a next key update time, which is a time when the key is updated next, and the key distribution request packet Transmitting the connection device number to the center device;
The center device receiving the key distribution request packet and the connection device number from one of the plurality of connection devices;
When the center device receives the key distribution request packet and the connection device number, the center device encrypts the first current key and the first future key with the key distribution key and corresponds to the connection device number. The encryption communication method according to claim 9, further comprising a step of transmitting to the connection device.
前記複数の接続装置は、前記次回鍵更新時刻から前記次々回鍵更新時刻までの間のランダムな時刻に前記鍵配送要求パケットを生成し、前記センタ装置に送信することを特徴とする請求項10に記載の暗号通信方法。   The plurality of connection devices generate the key distribution request packet at a random time between the next key update time and the next key update time, and transmit the packet to the center device. The encryption communication method described. 前記センタ装置は、前記次回鍵更新時刻、前記次々回鍵更新時刻、及び鍵更新間隔の少なくとも2つを前記接続装置に送信することを特徴とする請求項10又は11に記載の暗号通信方法。   The encryption communication method according to claim 10 or 11, wherein the center device transmits at least two of the next key update time, the next key update time, and a key update interval to the connection device. 前記複数の接続装置は鍵更新間隔を保持し、
前記センタ装置は、前記次回鍵更新時刻と前記次々回鍵更新時刻の少なくとも1つを前記接続装置に送信することを特徴とする請求項10又は11に記載の暗号通信方法。
The plurality of connection devices hold a key update interval;
12. The encryption communication method according to claim 10, wherein the center device transmits at least one of the next key update time and the next key update time to the connection device.
前記接続装置は、前記接続装置の電源がOFFになっていて、前記次回鍵更新時刻から前記次々回鍵更新時刻までに前記鍵配送要求パケットを前記センタ装置に送信できなかった場合、前記次々回線更新時刻以降に前記接続装置の電源がONした時点で前記鍵配送要求パケットを前記センタ装置に送信することを特徴とする請求項10〜13の何れか1項に記載の暗号通信方法。   If the connection device is powered off and the key distribution request packet cannot be transmitted to the center device between the next key update time and the next key update time, the connection device updates The encryption communication method according to claim 10, wherein the key distribution request packet is transmitted to the center device when the power of the connection device is turned on after the time. 前記接続装置は、前記第2の未来鍵で復号ができた場合は、それ以降は前記第2の未来鍵で暗号化及び復号をすることを特徴とする請求項9〜14の何れか1項に記載の暗号通信方法。   15. The connection device according to claim 9, wherein when the connection device can perform decryption using the second future key, encryption and decryption are performed using the second future key thereafter. The encryption communication method described in 1. 前記センタ装置は、前記第1の現行鍵と前記第1の未来鍵の代わりに、前記第1の現行鍵と前記第1の未来鍵を生成するためのデータを送信することを特徴とする請求項9〜15の何れか1項に記載の暗号通信方法。   The center device transmits data for generating the first current key and the first future key instead of the first current key and the first future key. Item 16. The encryption communication method according to any one of Items 9 to 15.
JP2012193962A 2012-09-04 2012-09-04 Cryptographic communication system and cryptographic communication method Active JP5835162B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2012193962A JP5835162B2 (en) 2012-09-04 2012-09-04 Cryptographic communication system and cryptographic communication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2012193962A JP5835162B2 (en) 2012-09-04 2012-09-04 Cryptographic communication system and cryptographic communication method

Publications (2)

Publication Number Publication Date
JP2014050069A true JP2014050069A (en) 2014-03-17
JP5835162B2 JP5835162B2 (en) 2015-12-24

Family

ID=50609279

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2012193962A Active JP5835162B2 (en) 2012-09-04 2012-09-04 Cryptographic communication system and cryptographic communication method

Country Status (1)

Country Link
JP (1) JP5835162B2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP6086416B1 (en) * 2016-08-03 2017-03-01 AI inside株式会社 Data processing system, data management device, method and program, data processing device, method and program
JP2018519706A (en) * 2015-08-19 2018-07-19 ▲騰▼▲訊▼科技(深▲セン▼)有限公司 Method, network access device, application server, and non-volatile computer readable storage medium for causing a network access device to access a wireless network access point
JP2018198385A (en) * 2017-05-24 2018-12-13 Necプラットフォームズ株式会社 Emergency call receiving system, device, method, and program

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2018519706A (en) * 2015-08-19 2018-07-19 ▲騰▼▲訊▼科技(深▲セン▼)有限公司 Method, network access device, application server, and non-volatile computer readable storage medium for causing a network access device to access a wireless network access point
JP6086416B1 (en) * 2016-08-03 2017-03-01 AI inside株式会社 Data processing system, data management device, method and program, data processing device, method and program
JP2018022997A (en) * 2016-08-03 2018-02-08 AI inside株式会社 Data processing system, data management device, method and program, data processing apparatus, method and program
JP2018198385A (en) * 2017-05-24 2018-12-13 Necプラットフォームズ株式会社 Emergency call receiving system, device, method, and program

Also Published As

Publication number Publication date
JP5835162B2 (en) 2015-12-24

Similar Documents

Publication Publication Date Title
US9525557B2 (en) Certificate issuing system, client terminal, server device, certificate acquisition method, and certificate issuing method
CN108599925B (en) Improved AKA identity authentication system and method based on quantum communication network
AU2015335689B2 (en) Efficient start-up for secured connections and related services
EP3678325A1 (en) Methods and apparatus for quantum-resistant network communication
JP5307191B2 (en) System and method for secure transaction of data between a wireless communication device and a server
JP5377540B2 (en) Key management system
US11223486B2 (en) Digital signature method, device, and system
WO2016098303A1 (en) Signature verification device, signature generation device, signature processing system, signature verification method, and signature generation method
JP2004266342A (en) System and terminal for radio ad hoc communication, decrypting method and encrypting method in the terminal, broadcast encrypting key distributing method, and program for making the terminal execute the method
CN103763356A (en) Establishment method, device and system for connection of secure sockets layers
CN111935712A (en) Data transmission method, system and medium based on NB-IoT communication
EP3811583B1 (en) Secure systems and methods for resolving audio device identity using remote application
JP2012235214A (en) Encryption communication device and encryption communication system
JP5378296B2 (en) Communication apparatus and communication method
US11949776B2 (en) Establishing a cryptographic tunnel between a first tunnel endpoint and a second tunnel endpoint where a private key used during the tunnel establishment is remotely located from the second tunnel endpoint
US10630466B1 (en) Apparatus and method for exchanging cryptographic information with reduced overhead and latency
JP5835162B2 (en) Cryptographic communication system and cryptographic communication method
JP2007110487A (en) Lan system and its communication method
WO2016134631A1 (en) Processing method for openflow message, and network element
CN113676448A (en) Off-line equipment bidirectional authentication method and system based on symmetric key
JP2023015282A (en) Second communication apparatus
CN113918971A (en) Block chain based message transmission method, device, equipment and readable storage medium
JP2009065226A (en) Authenticated key exchange system, authenticated key exchange method and program
JP2010068396A (en) Cryptographic device, terminal device, cryptographic program and method and program and method for processing information
JP2016039456A (en) Communication system, communication method, node, data processing device, and communication control device

Legal Events

Date Code Title Description
A621 Written request for application examination

Free format text: JAPANESE INTERMEDIATE CODE: A621

Effective date: 20150213

A977 Report on retrieval

Free format text: JAPANESE INTERMEDIATE CODE: A971007

Effective date: 20150917

TRDD Decision of grant or rejection written
A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

Effective date: 20151006

A61 First payment of annual fees (during grant procedure)

Free format text: JAPANESE INTERMEDIATE CODE: A61

Effective date: 20151019

R150 Certificate of patent or registration of utility model

Ref document number: 5835162

Country of ref document: JP

Free format text: JAPANESE INTERMEDIATE CODE: R150

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

S533 Written request for registration of change of name

Free format text: JAPANESE INTERMEDIATE CODE: R313533

R350 Written notification of registration of transfer

Free format text: JAPANESE INTERMEDIATE CODE: R350

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250