JP2808651B2 - Encryption communication method - Google Patents

Encryption communication method

Info

Publication number
JP2808651B2
JP2808651B2 JP1102314A JP10231489A JP2808651B2 JP 2808651 B2 JP2808651 B2 JP 2808651B2 JP 1102314 A JP1102314 A JP 1102314A JP 10231489 A JP10231489 A JP 10231489A JP 2808651 B2 JP2808651 B2 JP 2808651B2
Authority
JP
Japan
Prior art keywords
station
information
public
center
value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
JP1102314A
Other languages
Japanese (ja)
Other versions
JPH02281838A (en
Inventor
初一 田中
武 近澤
井上  徹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Mitsubishi Electric Corp
Original Assignee
Mitsubishi Electric Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mitsubishi Electric Corp filed Critical Mitsubishi Electric Corp
Priority to JP1102314A priority Critical patent/JP2808651B2/en
Publication of JPH02281838A publication Critical patent/JPH02281838A/en
Application granted granted Critical
Publication of JP2808651B2 publication Critical patent/JP2808651B2/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Description

【発明の詳細な説明】 〔産業上の利用分野〕 この発明は,通信局間で秘密鍵を共有して秘密通信を
行う際の暗号通信方式に関するものである。
Description: BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to an encryption communication system for performing secret communication by sharing a secret key between communication stations.

〔従来の技術〕[Conventional technology]

第2図は例えばDH方式(W.Diffie and M.E.Hellman,N
ew Directions in Cryptography,″IEEE Trans,Infrom.
Theory,vol.IT−22,No.6,pp.644−654,Nov.(1976)と
呼ばれる従来の暗号通信方式を示す図であり,図におい
て,(101)は通信局A,(102)は通信局B,(103)は上
記通信局4(101)内の秘密情報格納メモリ,(104)は
上記通信局B(102)内の秘密情報格納メモリ,(105)
は通信路である。
FIG. 2 shows a DH method (W. Diffie and MEHellman, N.
ew Directions in Cryptography, "IEEE Trans, Infrom.
It is a diagram showing a conventional cryptographic communication system called Theory, vol. IT-22, No. 6, pp. 644-654, Nov. (1976), where (101) is a communication station A, (102) Is the communication station B, (103) is the secret information storage memory in the communication station 4 (101), (104) is the secret information storage memory in the communication station B (102), (105)
Is a communication path.

次に動作について説明する。 Next, the operation will be described.

秘密通信を行うネットワークあるいはシステムの構築
時に,業務pとGF(p)の原始元gを公開しておく。局
A(101)と局B(102)との間で共通の鍵を持ちたい場
合,まず局A(101)は〔0,p−1〕の間の整数XAをロラ
ンダムに選び,局内の秘密情報格納メモリ(103)に秘
密に保持しておく。局B(102)も〔0,p−1〕の間の整
数XBをランダムに選び,局内の秘密情報格納メモリ(10
4)に秘密に保持しておく。
When constructing a network or system for performing secret communication, the business p and the primitive element g of GF (p) are made public. If you want to have a common key between a station A (101) and a station B (102), first station A (101) is chosen to b randomly integer X A between [0, p-1], station In the secret information storage memory (103). Station B (102) is also randomly selects an integer X B between [0, p-1], the secret information storage memory (10 station
4) Keep it secret.

そして、局A(101)は秘密情報格納メモリ(103)の
情報より を計算し,通信路(105)を介して局B(102)へ送る。
同様に、局B(102)も秘密情報確認メモリ(104)の情
報により を計算し,通信路(105)を介して局A(101)へ送る。
このようにYAとYBを交換してから、局A(101)は鍵KAB
を次のように計算する。
Then, the station A (101) obtains the information from the secret information storage memory (103). Is calculated and sent to the station B (102) via the communication path (105).
Similarly, the station B (102) also uses the information in the secret information confirmation memory (104). Is calculated and sent to the station A (101) via the communication path (105).
After exchanging Y A and Y B in this way, station A (101) sets the key K AB
Is calculated as follows.

局B(102)も鍵KABを次のように計算する。 Station B (102) also calculates key K AB as follows.

以上の方法で局A(101)と局B(102)は鍵 を秘密に共有でき,この鍵で暗号化/復合化を行うこと
ができる。
Station A (101) and station B (102) are key Can be secretly shared, and encryption / decryption can be performed with this key.

〔発明が解決しようとする課題〕[Problems to be solved by the invention]

従来の暗号通信方式は以上のような構成されているの
で,秘密通信を行う時の鍵を共有する場合,相手局との
通信が必要で,また,第三の局がなりすまして不正に鍵
を共有できてしまうなどの問題点があつた。
Since the conventional cryptographic communication system is configured as described above, when sharing a key for performing secret communication, communication with the partner station is necessary, and the third station impersonates the key by impersonating it. There were problems such as being able to share.

この発明は上記のような問題点を解消するためになさ
れたもので,通信局間の相互通信を必要とせず,第三の
局がなりすまして不正に鍵を共有できない暗号通信方式
を得ることを目的とする。
SUMMARY OF THE INVENTION The present invention has been made to solve the above-mentioned problems, and it is an object of the present invention to provide a cryptographic communication system which does not require mutual communication between communication stations and in which a third station can impersonate and share a key illegally. Aim.

〔課題を解決するための手段〕[Means for solving the problem]

この発明に係る暗号通信方式は、第1の公開情報nと
第2の公開情報eと秘密情報gとを有し各局を統括する
センタを設け、各局がセンタに自己のID情報Iを登録
し、センタは上記センタの第2の公開情報eと乱数Rと
上記センタの第1の公開情報nとから所定の格納値αを
計算し、この格納値αを各局の秘密情報格納メモリに送
出するとともに、上記各局のID情報Iと上記センタの第
1の公開情報nと第2の公開情報eとから中間値sを計
算し、この中間値sと上記センタの秘密情報gと上記乱
数Rと上記センタの第1の公開情報nとから各局の公開
値βを計算し、さらに上記センタの秘密情報gと上記乱
数Rと上記センタの第1の公開情報nと第2の公開情報
eとから各局の公開値Gを計算し、上記公開値β、Gと
上記ID情報Iとを各局に公開し、各局は、相手局の公開
値β、Gと相手局のID情報Iと上記センタの第2の公開
情報eとから上記公開値Gが正当であることを確認して
から、上記公開された相手局の公開値Gと自局の秘密情
報格納メモリに格納された格納値αと上記センタの第1
の公開情報nとから互いに共通の鍵Kを生成することを
特徴とするものである。
The cryptographic communication system according to the present invention has a center that has first public information n, second public information e, and secret information g and controls each station, and each station registers its ID information I in the center. , The center calculates a predetermined stored value α from the second public information e of the center, the random number R, and the first public information n of the center, and sends the stored value α to the secret information storage memory of each station. At the same time, an intermediate value s is calculated from the ID information I of each station, the first public information n and the second public information e of the center, and the intermediate value s, the secret information g of the center, the random number R, The public value β of each station is calculated from the first public information n of the center, and further calculated from the secret information g of the center, the random number R, the first public information n of the center, and the second public information e. The public value G of each station is calculated, and the public values β and G and the ID information I are disclosed to each station. Each station confirms that the public value G is valid based on the public values β and G of the partner station, the ID information I of the partner station, and the second public information e of the center, and then releases the public information. And the stored value α stored in the secret information storage memory of the own station and the first value of the center.
And generating a common key K from the public information n.

〔作用〕[Action]

各局はセンタ(1)に自局のID情報を登録すると,セ
ンタ(1)はこのID情報から一つの公開値を計算し,上
記ID情報と共に各局に公開する。
When each station registers its own ID information in the center (1), the center (1) calculates one public value from this ID information and discloses it to each station together with the ID information.

またセンタ(1)は上記ID情報から一つの格納値を計
算し,局内の秘密情報格納メモリ(3),(6)に送出
する。
The center (1) calculates one stored value from the ID information and sends it to the secret information storage memories (3) and (6) in the office.

各局間で通信を行う場合,相手局の公開された一つの
公開値の正当性を確認してから,その公開値と自局の秘
密情報格納メモリに格納れた格納値とを演算して互いに
共通の鍵を生成する。
When communication is performed between stations, the validity of one published value of the partner station is checked, then the published value and the stored value stored in the secret information storage memory of the own station are calculated, and the values are mutually determined. Generate a common key.

〔発明の実施例〕(Example of the invention)

以下,この発明の実施例を図について説明する。第1
図(a),(b)は本発明の一実施例による暗号通信方
式を示す図であり,図において,(1)はセンタ,
(2)は通信局A,(3)はこの通信局A(2)内の秘密
情報格納メモリ,(4)は公開リスト,(5)は通信局
B,(6)はこの通信局B(5)内の秘密情報格納メモ
リ,(7)は通信路である。
Hereinafter, an embodiment of the present invention will be described with reference to the drawings. First
FIGS. 1A and 1B are diagrams showing an encryption communication method according to an embodiment of the present invention. In FIG.
(2) is a communication station A, (3) is a secret information storage memory in the communication station A (2), (4) is a public list, and (5) is a communication station.
B and (6) are secret information storage memories in the communication station B (5), and (7) is a communication path.

次に動作について説明する。 Next, the operation will be described.

秘密通信を行うネツトワークあるいはシステムの構築
時に,2つの大きな素数p,qを選び,それらの積をn=p
・q,nのオイラー関数(nと互いに素なる数の個数をオ
イラー関数と呼びφ(n)で表す)をφ(n)=(p−
1)・(q−1)とする。次にgcd(e,φ(n)=1を
満たす整数eを選ぶ。さらに,GF(p)およびGF(q)
の原始元をgとする。ここで,n,eをセンタ(1)の公開
情報,p,q,gをセンタ(1)の秘密情報とする。
When constructing a network or system that performs secret communication, two large prime numbers p and q are selected, and their product is expressed as n = p
The Euler function of q, n (the number of numbers which are mutually prime to n is called an Euler function and is represented by φ (n)) is represented by φ (n) = (p−
1) · (q-1). Next, an integer e that satisfies gcd (e, φ (n) = 1 is selected. Further, GF (p) and GF (q)
Let g be a primitive element of. Here, n and e are the public information of the center (1), and p, q and g are the secret information of the center (1).

さて,局A(2)がこのネツトワークあるいはシステ
ムに加入する際,局A(2)はID情報IDAをセンタ
(1)へ送る。センタ(1)は, IDA=sA e(modn) GA=ge・RA(modn) α=e・RA(modφ(n)) を計算し,αを格納値として局A(2)内の秘密情報
格納メモリ(3)へ送り,GAとβを公開値として公開
リスト(4)にID情報IDAとともに載せる。なお、ここ
で、RAはセンタが局A用に生成した乱数である。局B
(5)も加入する際に,ID情報IDBをセンタ(1)へ送
り,局B(5)内の秘密情報格納メモリ(6)に格納値
αを送つてもらい,公開リスト(4)にはID情報IDB
とともに公開値GBとβを載せてもらう。以下同様に,
加入するすべての局に対して以上のような処理をする。
Now, when the station A (2) joins this network or system, the station A (2) sends the ID information ID A to the center (1). Center (1), ID A = s A e ( modn) G A = g e · RA (modn) α A = e · R A (modφ (n)) Was calculated, alpha A feed to the secret information storage memory in the station A (2) as a stored value (3), placed together with the ID information ID A into publicized list (4) G A and beta A as the public values. Here, R A is a random number generated for the station A by the center. Station B
When (5) also subscribes, the ID information ID B is sent to the center (1), the stored value α B is sent to the secret information storage memory (6) in the station B (5), and the public list (4) is sent. Has ID information ID B
You get put on the public value G B and β B with. Similarly,
The above processing is performed for all the stations to be joined.

局A(2)と局B(5)が鍵を共有しない場合を考え
る。局A(2)は公開値eと共通鍵を生成した相手局B
(5)のID情報IDBと公開された公開値GBを用い
て, βB e(mod n)=GB・IDB(mod n)=sB Be・ge・RB(m
od n) をチエツクし,公開値GBが改ざんされていないことを確
認し,その公開値GBと秘密情報格納メモリ(3)内に格
納されている局A(2)自身の秘密情報である格納値α
を用いて, を生成する。ここで局B(5)が局A(2)と同様に,
相手局A(2)の公開値GAが改ざんされていないことを
確認してから,その公開値GA秘密情報格納メモリ(6)
内に格納されている局B(5)自身の秘密情報である格
納値αを用いて, を生成する。
Let us consider a case where the station A (2) and the station B (5) do not share a key. The station A (2) is the partner station B that has generated the public value e and the common key.
ID information ID B with the published public value G B (5), using a β B, β B e (mod n) = G B · ID B (mod n) = s B Be · g e · RB ( m
od n) was a checking, confirms that the public values G B has not been tampered, with its public value G B and the secret information storage memory (3) a station is stored in the A (2) its own secret information A stored value α
Using A , Generate Here, station B (5) is similar to station A (2),
Other station A from the public value G A (2) is sure that it has not been tampered with, the public value G A secret information storage memory (6)
Using the stored value α B which is the secret information of the station B (5) itself stored in Generate

は一致するので,共通鍵 を通信路(7)を介さずに共有でき,この鍵で暗号化/
復号化を行うことができる。
Match, so the secret key Can be shared without passing through the communication channel (7).
Decryption can be performed.

〔発明の効果〕〔The invention's effect〕

このようにこの発明によれば、第1の公開情報nと第
2の公開情報eと秘密情報gとを有し各局を統括するセ
ンタを設け、各局がセンタに自己のID情報Iを登録し、
センタは上記センタの第2の公開情報eと乱数Rと上記
センタの第1の公開情報nとから所定の格納値αを計算
し、この格納値αを各局の秘密情報格納メモリに送出す
るとともに、上記各局のID情報Iと上記センタの第1の
公開情報nと第2の公開情報eとから中間値sを計算
し、この中間値sと上記センタの秘密情報gと上記乱数
Rと上記センタの第1の公開情報nとから各局の公開値
βを計算し、さらに上記センタの秘密情報gと上記乱数
Rと上記センタの第1の公開情報nと第2の公開情報e
とから各局の公開値Gを計算し、上記公開値β、Gと上
記ID情報Iとを各局に公開し、各局は、相手局の公開値
β、Gと相手局のID情報Iと上記センタの第2の公開情
報eとから上記公開値Gが正当であることを確認してか
ら、上記公開された相手局の公開値Gと自局の秘密情報
格納メモリに格納された格納値αと上記センタの第1の
公開情報nとから互いに共通の鍵Kを生成するようにし
たので、通信局間の相互通信が不要だけでなく,不正な
なりしましで第三の局が共通鍵を得ることができない効
果がある。
As described above, according to the present invention, a center having the first public information n, the second public information e, and the secret information g is provided, and each station registers its own ID information I in the center. ,
The center calculates a predetermined stored value α from the second public information e of the center, the random number R, and the first public information n of the center, and sends the stored value α to the secret information storage memory of each station. Calculating an intermediate value s from the ID information I of each station, the first public information n and the second public information e of the center, and calculating the intermediate value s, the secret information g of the center, the random number R, The public value β of each station is calculated from the first public information n of the center, and the secret information g of the center, the random number R, the first public information n of the center, and the second public information e are further calculated.
The public value G of each station is calculated from the above, and the public values β, G and the ID information I are made public to each station. Each station makes the public values β, G of the partner station, the ID information I of the partner station, and the center After confirming that the public value G is valid from the second public information e, the public value G of the disclosed partner station and the stored value α stored in the secret information storage memory of the own station are obtained. Since the common key K is generated from the first public information n of the center, the mutual communication between the communication stations is not only unnecessary, but also the third station uses the common key in an unauthorized manner. There is an effect that cannot be obtained.

【図面の簡単な説明】[Brief description of the drawings]

第1図(a),(b)はこの発明の一実施例による暗号
通信方式を示す図,第2図は従来の暗号通信方式を示す
図である。 (1)はセンタ,(2)は通信局A,(3)は秘密情報格
納メモリ,(4)は公開リスト,(5)は通信局B,
(6)は秘密情報格納メモリ,(7)は通信路,(10
1)は通信局A,(102)は通信局B,(103),(104)は秘
密情報格納メモリ,(105)は通信路である。 なお,図中,同一符号は同一,又は相当部分を示す。
1 (a) and 1 (b) are diagrams showing an encrypted communication system according to an embodiment of the present invention, and FIG. 2 is a diagram showing a conventional encrypted communication system. (1) is a center, (2) is a communication station A, (3) is a secret information storage memory, (4) is a public list, (5) is a communication station B,
(6) is a secret information storage memory, (7) is a communication path, (10)
1) is a communication station A, (102) is a communication station B, (103) and (104) are secret information storage memories, and (105) is a communication path. In the drawings, the same reference numerals indicate the same or corresponding parts.

フロントページの続き (56)参考文献 特開 平2−248131(JP,A) 特開 平2−152340(JP,A) 特開 平2−82837(JP,A) (58)調査した分野(Int.Cl.6,DB名) G09C 1/00 - 5/00 H04L 9/00 - 9/38 H04K 1/00 - 3/00 JICSTファイル(JOIS)Continuation of the front page (56) References JP-A-2-248131 (JP, A) JP-A-2-152340 (JP, A) JP-A-2-82837 (JP, A) (58) Fields investigated (Int) .Cl. 6 , DB name) G09C 1/00-5/00 H04L 9/00-9/38 H04K 1/00-3/00 JICST file (JOIS)

Claims (1)

(57)【特許請求の範囲】(57) [Claims] 【請求項1】各局が秘密情報格納メモリを有し、局間で
通信を行う場合、上記秘密情報格納メモリ内に格納され
た情報から暗号化して上記通信を行うための共通の暗号
鍵を生成する暗号通信方式において、 第1の公開情報nと第2の公開情報eと秘密情報gとを
有し各局を統括するセンタを設け、各局がセンタに自己
のID情報Iを登録し、センタは上記センタの第2の公開
情報eと乱数Rと上記センタの第1の公開情報nとから
式(1)で所定の格納値αを計算し、この格納値αを各
局の秘密情報格納メモリに放出するとともに、上記各局
のID情報Iと上記センタの第1の公開情報nと第2の公
開情報eとから式(2)で中間値sを計算し、この中間
値sと上記センタの秘密情報gと上記乱数Rと上記セン
タの第1の公開情報nとから式(3)で各局の公開値β
を計算し、さらに上記センタの秘密情報gと上記乱数R
と上記センタの第1の公開情報nと第2の公開情報eと
から式(4)で各局の公開値Gを計算し、上記公開値
β、Gと上記ID情報Iとを各局に公開し、各局は、相手
局の公開値β、Gと相手局のID情報Iと上記センタの第
2の公開情報eとから式(5)で上記公開値Gが正当で
あることを確認してから、上記公開された相手局の公開
値Gと自局の秘密情報格納メモリに格納された格納値α
と上記センタの第1の公開情報nとから式(6)で互い
に共通の鍵Kを生成することを特徴とする暗号通信方
式。 α=e・R(modφ(n)) (1) I=se(modn) (2) β=s・gR(modn) (3) G=ge・R(modn) (4) β(modn)=G・I(modn)=se・geR(modn)
(5) K=Gα(modn) (6)
When each station has a secret information storage memory and communicates between stations, a common encryption key for performing the communication by encrypting the information stored in the secret information storage memory is generated. In a cryptographic communication system, a center having first public information n, second public information e, and secret information g is provided, and each station registers its own ID information I in the center. From the second public information e of the center, the random number R, and the first public information n of the center, a predetermined storage value α is calculated by equation (1), and this storage value α is stored in the secret information storage memory of each station. At the same time, an intermediate value s is calculated from the ID information I of each station, the first public information n and the second public information e of the center by equation (2), and the intermediate value s and the secret of the center are calculated. From the information g, the random number R, and the first public information n of the center, Expression (3) Public value of each station β
Is calculated, and the secret information g of the center and the random number R
From the first public information n and the second public information e of the center, the public value G of each station is calculated by equation (4), and the public values β, G and the ID information I are disclosed to each station. After each station confirms that the public value G is valid from equation (5) based on the public values β and G of the partner station, the ID information I of the partner station, and the second public information e of the center, , The published value G of the disclosed partner station and the stored value α stored in the secret information storage memory of the own station.
And a first public information n of the center and a common key K is generated by equation (6). α = e · R (modφ (n)) (1) I = s e (modn) (2) β = s · g R (modn) (3) G = g e · R (modn) (4) β e (modn) = G · I ( modn) = s e · g eR (modn)
(5) K = G α (modn) (6)
JP1102314A 1989-04-22 1989-04-22 Encryption communication method Expired - Lifetime JP2808651B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP1102314A JP2808651B2 (en) 1989-04-22 1989-04-22 Encryption communication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP1102314A JP2808651B2 (en) 1989-04-22 1989-04-22 Encryption communication method

Publications (2)

Publication Number Publication Date
JPH02281838A JPH02281838A (en) 1990-11-19
JP2808651B2 true JP2808651B2 (en) 1998-10-08

Family

ID=14324131

Family Applications (1)

Application Number Title Priority Date Filing Date
JP1102314A Expired - Lifetime JP2808651B2 (en) 1989-04-22 1989-04-22 Encryption communication method

Country Status (1)

Country Link
JP (1) JP2808651B2 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2581440B2 (en) * 1994-05-11 1997-02-12 日本電気株式会社 Scramble communication method

Also Published As

Publication number Publication date
JPH02281838A (en) 1990-11-19

Similar Documents

Publication Publication Date Title
Merkle Protocols for public key cryptosystems
JP2870163B2 (en) Key distribution method with authentication function
Diffie et al. Multiuser cryptographic techniques
JP4545831B2 (en) Data card verification device
CA2174261C (en) Key agreement and transport protocol with implicit signatures
US5442707A (en) Method for generating and verifying electronic signatures and privacy communication using elliptic curves
JP2606419B2 (en) Cryptographic communication system and cryptographic communication method
CN109728906B (en) Anti-quantum-computation asymmetric encryption method and system based on asymmetric key pool
US11838426B2 (en) Computer implemented method and system for obtaining digitally signed data
US20100054464A1 (en) Process for establishing a common cryptographic key for n subscribers
CN109905229B (en) Anti-quantum computing Elgamal encryption and decryption method and system based on group asymmetric key pool
JP2725478B2 (en) Encryption key distribution method
Lee et al. Secure key transfer protocol based on secret sharing for group communications
Jeng et al. An ECC-based blind signature scheme
US7778423B2 (en) Method for establishing a common key for a group of at least three subscribers
CN109905236B (en) Anti-quantum computing Elgamal encryption and decryption method and system based on private key pool
EP2395698B1 (en) Implicit certificate generation in the case of weak pseudo-random number generators
JP2948294B2 (en) Terminal in key distribution system with authentication function
Nguyen et al. No-key protocol for deniable encryption
Zhu et al. A Survey to Design Privacy Preserving Protocol Using Chaos Cryptography.
JP2808651B2 (en) Encryption communication method
JP2831685B2 (en) Encryption communication method
JP2002527993A (en) Method for establishing a common key between a central office and a group of subscribers
JP3074164B2 (en) Exclusive key agreement
JP2730080B2 (en) Encryption communication method