JP2546504B2 - Pre-encryption processing device and post-decryption processing device in encryption - Google Patents

Pre-encryption processing device and post-decryption processing device in encryption

Info

Publication number
JP2546504B2
JP2546504B2 JP5174526A JP17452693A JP2546504B2 JP 2546504 B2 JP2546504 B2 JP 2546504B2 JP 5174526 A JP5174526 A JP 5174526A JP 17452693 A JP17452693 A JP 17452693A JP 2546504 B2 JP2546504 B2 JP 2546504B2
Authority
JP
Japan
Prior art keywords
encryption
plaintext
processing device
input
output
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
JP5174526A
Other languages
Japanese (ja)
Other versions
JPH0728407A (en
Inventor
浩 宮野
宏 宮内
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NEC Corp
Original Assignee
Nippon Electric Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nippon Electric Co Ltd filed Critical Nippon Electric Co Ltd
Priority to JP5174526A priority Critical patent/JP2546504B2/en
Publication of JPH0728407A publication Critical patent/JPH0728407A/en
Application granted granted Critical
Publication of JP2546504B2 publication Critical patent/JP2546504B2/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Description

【発明の詳細な説明】Detailed Description of the Invention

【0001】[0001]

【産業上の利用分野】本発明は、暗号化および復号装置
に関するものである。
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to an encryption / decryption device.

【0002】[0002]

【従来の技術】DES(昭51−108701暗号装
置、たとえば「現代暗号理論」池野信一、小山謙二著、
社団法人電子情報通信学会1986年の第3章に解説)
やRSA(上記「現代暗号理論」第6章に解説)に代表
される従来の暗号方式は、平文をある一定長の長さに区
切ることによってブロック化し、それぞれのブロックを
独立にあるいは順次暗号化することによって平文全体の
暗号文を得ることを特徴としている。
2. Description of the Related Art DES (Sho 51-108701 cryptographic device, for example, "Modern cryptographic theory" written by Shinichi Ikeno and Kenji Koyama,
(Explanation in Chapter 3 of the Institute of Electronics, Information and Communication Engineers 1986)
The conventional cryptosystems, such as RSA and RSA (discussed in Chapter 6 of "Modern Cryptography" above), are divided into blocks by dividing plaintext into certain lengths, and each block is encrypted independently or sequentially. It is characterized by obtaining the ciphertext of the whole plaintext by doing.

【0003】一般に上記のような従来の暗号系では大き
なファイルや通信文を暗号化しようとする場合、平文は
多くのブロックに分割される。これらのブロックは通常
同一の鍵で暗号化される。このような同一の鍵で暗号化
された多数のブロックは、平文が解読者に知れてしまう
と、秘密鍵を推定する手がかりとなるおそれがある。
Generally, in the conventional encryption system as described above, when an attempt is made to encrypt a large file or communication text, the plain text is divided into many blocks. These blocks are usually encrypted with the same key. If the plaintext of many blocks encrypted with such an identical key becomes known to the decryption person, there is a risk that it may be a clue to deduce the secret key.

【0004】[0004]

【発明が解決しようとする課題】本発明の目的は、暗号
方式において、暗号文と平文の両方が解読者に知れてし
まっても秘密鍵を容易に推定することが依然として困難
であるようにするための暗号化の前処理装置および復号
の後処理装置を提供することである。
SUMMARY OF THE INVENTION It is an object of the present invention to make it difficult in cryptographic systems to easily deduce the secret key even if both the ciphertext and the plaintext are known to the decrypter. It is to provide an encryption pre-processing device and a decryption post-processing device.

【0005】[0005]

【課題を解決するための手段】第1の発明の暗号化前処
理装置は、暗号装置の入力の前処理を行う暗号化前処理
装置において、暗号化されるべき平文の列を入力する入
力手段と、入力された平文列を予め定められた長さ毎に
区切ってブロック化するブロック化手段と、ランダムな
ビットを繰り返し発生する乱数発生手段と、前記ブロッ
ク化手段によってブロック化されたそれぞれのブロック
の予め定められた位置に前記乱数発生手段で発生したラ
ンダムなビットを挿入する挿入手段と、前挿入手段によ
ってランダムなビットを挿入されたブロックを順次暗号
装置に受け渡すための出力手段を有することを特徴とす
る。
According to a first aspect of the present invention, there is provided an encryption preprocessing device for inputting a plaintext string to be encrypted in an encryption preprocessing device for performing preprocessing of an input of an encryption device. A block unit that divides the input plaintext string into blocks by dividing it into predetermined lengths, a random number generator that repeatedly generates random bits, and each block that is blocked by the block unit. Inserting means for inserting a random bit generated by the random number generating means at a predetermined position, and output means for sequentially passing the block in which the random bit is inserted by the pre-inserting means to the encryption device. Is characterized by.

【0006】第2の発明の復号後処理装置は、暗号文を
復号する復号装置の出力に対して後処理を施して平文を
出力する復号後処理装置において、暗号装置から復号さ
れた平文列を受け取るための入力手段と、入力された平
文列を予め定められた長さ毎に区切ってブロック化する
ブロック化手段と、前記ブロック化手段によりブロック
化されたそれぞれのブロックから予め定められた位置の
ビット除去する冗長ビット除去手段と、前着冗長ビット
除去手段によって加工された平文列を最終的な平文とし
て出力する平文列出力手段を有することを特徴とする。
A decryption post-processing device according to a second aspect of the present invention is a decryption post-processing device that performs post-processing on an output of a decryption device for decrypting a ciphertext and outputs a plaintext, and outputs a plaintext string decrypted from the encryption device. Input means for receiving, blocking means for dividing the input plaintext string into blocks by a predetermined length, and a predetermined position from each block blocked by the blocking means. The present invention is characterized by including redundant bit removing means for removing bits and plaintext string output means for outputting the plaintext string processed by the preceding arrival redundant bit removing means as a final plaintext.

【0007】[0007]

【作用】本発明における暗号化の前処理および後処理に
ついて述べる。
The pre-processing and post-processing of encryption in the present invention will be described.

【0008】一般に暗号方式は、単に暗号文から平文が
推定できないだけではなく、暗号文と平文の組から暗号
鍵が容易に推定できないことが要求される。
Generally, a cryptosystem is required not only to be able to infer a plaintext from a ciphertext but also to be unable to easily infer an encryption key from a set of a ciphertext and a plaintext.

【0009】本発明の暗号化前処理装置および復号後処
理装置においては、本来の平文に冗長ビットを挿入する
ことにより実際に暗号化装置の入力となる平文を生成す
る仕組みになっている。挿入されるビット列は暗号化を
行う装置と同じ装置内で暗号化処理の直前に生成するこ
とが可能なので通常の平文と比較してその内容が第三者
に漏れる可能性が著しく小さい。したがって、本来の平
文が漏れたとしても実際に暗号化に用いられた平文の全
容を知られる可能性はほとんどなく、結果として既知平
文攻撃を喫するおそれが小さい。
In the pre-encryption processing apparatus and the post-decryption processing apparatus of the present invention, a redundant bit is inserted into the original plaintext to generate a plaintext that is actually input to the encryption apparatus. Since the bit string to be inserted can be generated immediately before the encryption processing in the same device as the device that performs the encryption, the possibility that the content will be leaked to a third party is significantly smaller than that of ordinary plain text. Therefore, even if the original plaintext is leaked, there is almost no possibility that the entire plaintext actually used for encryption is known, and as a result, a known plaintext attack is less likely to occur.

【0010】また、挿入するビットはその内容を予め受
信者と打ち合わせておく必要がなく、ブロック長と付加
するビットの位置だけを打ち合わせておけば十分であ
り、しかもこれらの情報は秘密にしておく必要もない。
したがって、送信者および受信者が管理しなければなら
ない秘密情報が増えることはない。
Further, it is not necessary to discuss the contents of the bit to be inserted with the receiver in advance, it is sufficient to discuss only the block length and the position of the bit to be added, and the information is kept secret. There is no need.
Therefore, the secret information that the sender and the receiver have to manage does not increase.

【0011】[0011]

【実施例】図1に第1の発明の暗号化前処理装置の実施
例を、図2に図1の実施例中に用いる乱数発生手段の一
構成例を、図3に第2の発明の復号後処理装置の実施例
を示した。
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS FIG. 1 shows an embodiment of an encryption preprocessing device of the first invention, FIG. 2 shows an example of the configuration of a random number generating means used in the embodiment of FIG. 1, and FIG. An embodiment of the post-decoding processing device has been shown.

【0012】図1の暗号化前処理装置は、前記DESや
RSAその他の方式に基づいて構成された暗号装置にお
ける暗号化処理に先立って、該暗号装置の安全性を強化
するための処理を施すものである。該暗号化前処理装置
は、平文列入力手段11、ブロック化手段12、乱数発
生手段13、挿入手段14および出力手段15からな
り、乱数発生手段13以外の各手段は入力が与えられる
と一定の作業を行い出力を発して次の入力待ちの状態に
入るという一連の動作を繰り返す。平文入力手段11
は、外部から平文を取り込む機能を有し、取り込んだ平
文をブロック化手段12に受け渡す機能を有する。ブロ
ック化手段12は、平文入力手段11から平文を受け取
ると一定のビット数毎に区切り、挿入手段14に受け渡
す。乱数発生手段13は、自動的に乱数を発生し、挿入
手段14に受け渡す。挿入手段14は、ブロック化手段
12からブロックを、乱数発生手段13から乱数を受け
取ると、ブロックの一定の位置に乱数を挿入して出力手
段15に受け渡す。出力手段15は前記暗号装置とのイ
ンターフェイスの機能を有し、挿入手段14から受け取
ったブロックを該暗号装置の入力として該暗号装置に受
け渡す。
The encryption preprocessing device shown in FIG .
For encryption devices configured based on RSA and other methods
Security of the encryption device prior to encryption processing
The processing for performing is performed. The before encryption processing apparatus, the plaintext string input means 11, the blocking means 12, random number generation means 13, insertion means 14 and output means 15 Tona
Input is given to each means other than the random number generation means 13.
And perform a certain work to issue an output and wait for the next input
Repeat a series of actions to enter. Plaintext input means 11
Has the function of importing plaintext from the outside,
It has a function of passing the sentence to the blocking means 12. Bro
The conversion means 12 receives the plaintext from the plaintext input means 11.
Then, it is divided into a certain number of bits and passed to the inserting means 14.
You. The random number generation means 13 automatically generates a random number and inserts it.
Deliver to the means 14. The inserting means 14 is a blocking means
Block from 12 and random number from random number generating means 13
When you take it, insert a random number in a certain position of the block and output it.
Hand over to dan 15. The output means 15 communicates with the encryption device.
Interface function and receives from the insertion means 14.
Received block as an input to the encryption device.
Give it away.

【0013】図2は、第1の発明の暗号化前処理装置の
一構成要素である乱数発生手段13の一構成例である。
この例では、計算機内のタイムスタンプを暗号鍵、初期
定数を平文としてDESによる暗号化を行い、暗号文を
回帰させて繰り返し暗号化を行う。この際、暗号文の先
頭の1ビットをランダムなビットとして挿入手段14に
受け渡す。挿入手段14がランダムなビットを1ビット
要求する度に、上記DESによる暗号化を行うことによ
り、乱数発生手段13としての機能が実現される。
FIG. 2 shows an example of the configuration of the random number generating means 13, which is a component of the encryption preprocessing device of the first invention.
In this example, DES encryption is performed using a time stamp in the computer as an encryption key and an initial constant as plaintext, and the ciphertext is regressed to repeatedly perform encryption. At this time, the leading 1 bit of the ciphertext is passed to the inserting means 14 as a random bit. The function as the random number generation means 13 is realized by performing encryption by the DES every time the insertion means 14 requests one random bit.

【0014】図3の復号後処理装置は、前記DESやR
SAその他の方式に基づいて構成された暗号装置におけ
る復号処理に引き続いて、該暗号装置の安全性を強化す
るための処理であるところの図1の処理に対応する処理
を施すものである。該復号後処理装置は、入力手段3
1、ブロック化手段32、冗長ビット除去手段33、平
文列出力手段34からなり、各手段は入力が与えられる
と一定の作業を行い出力を発して次の入力待ちの状態に
入るという一連の動作を繰り返す。入力手段11は、前
記暗号装置とのインターフェイスの機能を有し、該暗号
装置の出力を受け取ってブロック化手段32に受け渡す
機能を有する。ブロック化手段32は、入力手段31か
らデータを受け取ると一定のビット数毎に区切り、冗長
ビット除去手段33に受け渡す。冗長ビット除去手段3
4は、ブロック化手段32から受け取ったブロックから
一定の位置のビットを除去して平文列出力手段34に受
け渡す。平文列出力手段34は冗長ビット除去手段33
から受け取ったデータを装置の外部に出力する。
The post-decryption processing device shown in FIG .
In a cryptographic device configured based on SA or other method
Subsequent to the decryption process, the security of the encryption device is enhanced.
A process corresponding to the process of FIG. 1, which is a process for saving
Is to be applied. The decoder post-processing apparatus includes an input unit 3
1, blocking means 32, the redundant bit removing unit 33, Ri plaintext sequence output unit 34 Tona, each unit is given inputs
And perform a certain work to issue an output and wait for the next input
Repeat a series of actions to enter. The input means 11 is
It has the function of the interface with the encryption device.
Receive the output of the device and pass it to the blocking means 32
Have a function. Whether the blocking means 32 is the input means 31
When data is received from it, it is separated by a certain number of bits and redundant
It is delivered to the bit removing means 33. Redundant bit removing means 3
4 is from the block received from the blocking means 32
The bit at a fixed position is removed and received by the plaintext string output means 34.
Give it away. The plaintext string output means 34 is the redundant bit removing means 33.
The data received from the device is output to the outside of the device.

【0015】上記実施例における各ビット列の構造の例
を図4に示す。図4においてもとの平文列は上記ブロッ
ク化手段12において既にブロック化されたものを表し
ている。このブロック長は、必ずしも暗号化装置固有の
ブロック長と一致する必要はない。もとの平文列(p
1,p2,...)は、上記実施例において平文列入力
手段11が外部より受け取る平文列および平文列出力手
段33が外部に出力する平文列であり、暗号装置用の平
文は図1の出力手段15から暗号連鎖装置の暗号化部に
手渡され、かつ暗号連鎖装置の復号部から図3の入力手
段31に手渡されるビット列である。黒く描かれている
部分が挿入手段14で挿入され冗長ビット除去手段33
で除去される冗長ビットに該当する。
An example of the structure of each bit string in the above embodiment is shown in FIG. In FIG. 4, the original plaintext string represents the one already blocked by the blocking means 12. This block length does not necessarily have to match the block length unique to the encryption device. Original plaintext sequence (p
1, p2 ,. . . ) Is a plaintext string received by the plaintext string input means 11 from the outside and a plaintext string output by the plaintext string output means 33 to the outside in the above embodiment, and the plaintext for the cryptographic device is output from the output means 15 of FIG. 3 is a bit string that is handed to the encryption unit of and the handing to the input unit 31 of FIG. 3 from the decryption unit of the cipher chaining device. The portion drawn in black is inserted by the inserting means 14 and the redundant bit removing means 33 is inserted.
Corresponds to redundant bits removed in.

【0016】[0016]

【発明の効果】本発明では、暗号化処理されるブロック
の予め定められた位置にランダムなビットを冗長な情報
として挿入し、この冗長なビットは他とは全く独立に生
成しうるので暗号が解読されてしまった場合意外には他
に洩れる虞はない。したがって、選択平文攻撃は既知平
文攻撃を行い得る解読者に対してもこのビットは未知の
情報となり、解読を困難にする。暗号文の正当な受信者
にとって、復号の際にこの冗長ビットをあらかじめ知っ
ている必要はなく、共用すべき秘密情報が増大すること
もない。よって従来の暗号方式の安全性をより高めるこ
とができる。
According to the present invention, a random bit is inserted as redundant information in a predetermined position of a block to be encrypted, and the redundant bit can be generated completely independently of the other bits. If it is deciphered, there is no danger of it leaking to others. Therefore, in the selective plaintext attack, this bit becomes unknown information even for a decryption person who can make a known plaintext attack, which makes the decryption difficult. A legitimate recipient of the ciphertext does not need to know this redundant bit in advance at the time of decryption, and secret information to be shared does not increase. Therefore, the security of the conventional encryption method can be further enhanced.

【図面の簡単な説明】[Brief description of drawings]

【図1】第1の発明の暗号化前処理装置の一実施例を示
すブロック図。
FIG. 1 is a block diagram showing an embodiment of an encryption preprocessing apparatus of the first invention.

【図2】第1の発明における乱数発生手段の一構成例を
示すブロック図。
FIG. 2 is a block diagram showing an example of the configuration of the random number generating means in the first invention.

【図3】第2の発明の復号後処理装置の一実施例を示す
ブロック図。
FIG. 3 is a block diagram showing an embodiment of a post-decoding processing device of the second invention.

【図4】本発明において取り扱われるビット列の構造の
一例を示す図。
FIG. 4 is a diagram showing an example of a structure of a bit string handled in the present invention.

【符号の説明】[Explanation of symbols]

11 平文列入力手段 12 ブロツク化手段 13 乱数発生手段 14 挿入手段 15 出力手段 21 暗号化装置DES 31 入力手段 32 ブロック化手段 33 冗長ビット除去手段 34 平文列出力手段 11 Plain Text Sequence Input Means 12 Blocking Means 13 Random Number Generating Means 14 Inserting Means 15 Output Means 21 Encrypting Device DES 31 Input Means 32 Blocking Means 33 Redundant Bit Removing Means 34 Plain Text Sequence Output Means

Claims (2)

(57)【特許請求の範囲】(57) [Claims] 【請求項1】 暗号装置の入力の前処理を行う暗号化前
処理装置において、暗号化されるべき平文の列を入力す
る入力手段と、入力された平文列を予め定められた長さ
毎に区切ってブロック化するブロック化手段と、ランダ
ムなビットを繰り返し発生する乱数発生手段と、前記ブ
ロック化手段によってブロック化されたそれぞれのブロ
ックの予め定められた位置に前記乱数発生手段で発生し
たランダムなビットを挿入する挿入手段と、前挿入手段
によってランダムなビットを挿入されたブロックを順次
暗号装置に受け渡すための出力手段を有することを特徴
とする暗号における暗号化前処理装置。
1. An encryption preprocessing device for performing preprocessing of an input of an encryption device, input means for inputting a plaintext string to be encrypted, and input plaintext strings for each predetermined length. Blocking means for dividing into blocks, random number generating means for repeatedly generating random bits, and random numbers generated by the random number generating means at predetermined positions of each block blocked by the blocking means. An encryption pre-processing device in encryption, comprising: an inserting means for inserting a bit, and an output means for sequentially passing blocks in which random bits are inserted by the pre-inserting means to an encryption device.
【請求項2】 暗号文を復号する復号装置の出力に対し
て後処理を施して平文を出力する復号後処理装置におい
て、暗号装置から復号された平文列を受け取るための入
力手段と、入力された平文列を予め定められた長さ毎に
区切ってブロック化するブロック化手段と、前記ブロッ
ク化手段によりブロック化されたそれぞれのブロックか
ら予め定められた位置のビットを除去する冗長ビット除
去手段と、前記冗長ビット除去手段によって加工された
平文列を最終的な平文として出力する平文列出力手段を
有することを特徴とする暗号における復号後処理装置。
2. A decryption post-processing device that performs post-processing on the output of a decryption device for decrypting ciphertext to output plaintext, and input means for receiving the decrypted plaintext sequence from the encryption device. Blocking means for dividing the plaintext sequence into blocks by dividing it into predetermined lengths, and redundant bit removing means for removing bits at predetermined positions from each of the blocks blocked by the blocking means. A decryption post-processing device for encryption, comprising plaintext string output means for outputting the plaintext string processed by the redundant bit removing means as a final plaintext.
JP5174526A 1993-07-14 1993-07-14 Pre-encryption processing device and post-decryption processing device in encryption Expired - Fee Related JP2546504B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP5174526A JP2546504B2 (en) 1993-07-14 1993-07-14 Pre-encryption processing device and post-decryption processing device in encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP5174526A JP2546504B2 (en) 1993-07-14 1993-07-14 Pre-encryption processing device and post-decryption processing device in encryption

Publications (2)

Publication Number Publication Date
JPH0728407A JPH0728407A (en) 1995-01-31
JP2546504B2 true JP2546504B2 (en) 1996-10-23

Family

ID=15980071

Family Applications (1)

Application Number Title Priority Date Filing Date
JP5174526A Expired - Fee Related JP2546504B2 (en) 1993-07-14 1993-07-14 Pre-encryption processing device and post-decryption processing device in encryption

Country Status (1)

Country Link
JP (1) JP2546504B2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6941253B1 (en) 1999-09-17 2005-09-06 Nec Corporation Control code read-out system
KR101236835B1 (en) * 2011-02-28 2013-02-25 삼성중공업 주식회사 Encoding and decoding method using encoding codes
US9143326B2 (en) 2012-03-29 2015-09-22 International Business Machines Corporation Method and system for encrypting data

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4703805B2 (en) * 1999-11-16 2011-06-15 大日本印刷株式会社 ENCRYPTION DEVICE, ENCRYPTION METHOD, DECRYPTION DEVICE, DECRYPTION METHOD, AND COMMUNICATION SYSTEM
MXPA05007498A (en) 2003-01-15 2005-09-21 Matsushita Electric Ind Co Ltd Content protection system, key data generation apparatus, and terminal appparatus.
JP4552044B2 (en) * 2003-08-22 2010-09-29 独立行政法人情報通信研究機構 Encrypted data creation device and method, and program thereof
JP2006191508A (en) * 2005-01-07 2006-07-20 N-Crypt Inc Communication system, and communication method
JP2006191509A (en) * 2005-01-07 2006-07-20 N-Crypt Inc Communication system, and communication method
JP2006253745A (en) * 2005-03-08 2006-09-21 N-Crypt Inc Data processing apparatus, system, and method
JP4644053B2 (en) * 2005-06-29 2011-03-02 セイコープレシジョン株式会社 Encryption apparatus and method, decryption apparatus and method
JP4912772B2 (en) * 2005-09-22 2012-04-11 富士通株式会社 Encryption method, encryption / decryption method, encryption device, encryption / decryption device, transmission / reception system, and communication system
JP4829628B2 (en) * 2005-10-31 2011-12-07 富士通株式会社 Encryption method, encryption / decryption method, encryption device, encryption / decryption device, and communication system
JP2011151689A (en) * 2010-01-22 2011-08-04 Fujitsu Ltd Information processing apparatus and information processing method
JP2011259446A (en) * 2011-06-29 2011-12-22 Nti Corp Communication system and communication method
JP2011234398A (en) * 2011-06-29 2011-11-17 Nti Corp Data processing device, data processing system, and data processing method
JP5837625B2 (en) * 2014-01-06 2015-12-24 株式会社 エヌティーアイ Communication system and communication method
JP5837626B2 (en) * 2014-01-06 2015-12-24 株式会社 エヌティーアイ Data processing apparatus, data processing system, and data processing method
CN111682935A (en) * 2020-05-20 2020-09-18 广东志远科技有限公司 Method and system for addressing random encryption

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0233239A (en) * 1988-07-23 1990-02-02 Nintendo Co Ltd Communication control equipment

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0233239A (en) * 1988-07-23 1990-02-02 Nintendo Co Ltd Communication control equipment

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6941253B1 (en) 1999-09-17 2005-09-06 Nec Corporation Control code read-out system
KR101236835B1 (en) * 2011-02-28 2013-02-25 삼성중공업 주식회사 Encoding and decoding method using encoding codes
US9143326B2 (en) 2012-03-29 2015-09-22 International Business Machines Corporation Method and system for encrypting data
US9344274B2 (en) 2012-03-29 2016-05-17 International Business Machines Corporation Method and system for encrypting data
US9634827B2 (en) 2012-03-29 2017-04-25 International Business Machines Corporation Encrypting data
US10396977B2 (en) 2012-03-29 2019-08-27 International Business Machines Corporation Encrypting data
US11539505B2 (en) 2012-03-29 2022-12-27 Kyndryl, Inc. Encrypting data

Also Published As

Publication number Publication date
JPH0728407A (en) 1995-01-31

Similar Documents

Publication Publication Date Title
JP2546504B2 (en) Pre-encryption processing device and post-decryption processing device in encryption
EP0403656B1 (en) Communication equipment
JP3747520B2 (en) Information processing apparatus and information processing method
US7224795B2 (en) Variable-length key cryptosystem
EP0792041A2 (en) Method and apparatus for block encryption
KR20080093635A (en) Method for encrypting message for keeping integrity of message and apparatus, and method for decrypting message for keeping integrity of message and apparatus
US20080165965A1 (en) Method of two strings private key (symmetric) encryption and decryption algorithm
KR970064060A (en) Encryption / Decryption Method and Device
JPH118620A (en) System and method for efficiently executing authentication of communication channel and facilitating detection of illegal forgery
JPH11231778A (en) Device and method for enciphering and deciphering and recording medium recording the same methods
JP2004363739A (en) Enciphering device or deciphering device for common key cipher that can detect alteration
KR100834364B1 (en) System and memthod for encrypting and verifying messages using three-phase encryption
US20150127950A1 (en) Method of encrypting data
Asaad et al. Partial image encryption using RC4 stream cipher approach and embedded in an image
JPH0488736A (en) Data transmission system
JP5992651B2 (en) ENCRYPTION METHOD, PROGRAM, AND SYSTEM
JPH1028114A (en) Work quantity reducing method, ciphering secret key supply method, cipher system executing method, ciphered message data structure and computer medium
KR20010000738A (en) Provably secure public key encryption scheme based on computational diffie-hellman assumption
JP2541113B2 (en) Pre-encryption processing device and post-decryption processing device in cipher chain
KR100601634B1 (en) High speed copy protection method
CN112149166B (en) Unconventional password protection method and intelligent bank machine
JP2000224158A (en) Ciphering communication system
JPH1051440A (en) Device and method for cipher communication
JP2002023624A (en) Block cipher communication method and device therefor, and recording medium with block cipher communication program recorded thereon
US20180048629A1 (en) Expression and Method to Send and Receive Text Messages Encrypted For The Targeted Receiving User to Render Eavesdropping Useless.

Legal Events

Date Code Title Description
A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

Effective date: 19960618

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20070808

Year of fee payment: 11

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20080808

Year of fee payment: 12

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20080808

Year of fee payment: 12

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20090808

Year of fee payment: 13

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20090808

Year of fee payment: 13

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20100808

Year of fee payment: 14

LAPS Cancellation because of no payment of annual fees