JPH01269975A - Simple type data ciphering system - Google Patents

Simple type data ciphering system

Info

Publication number
JPH01269975A
JPH01269975A JP9674188A JP9674188A JPH01269975A JP H01269975 A JPH01269975 A JP H01269975A JP 9674188 A JP9674188 A JP 9674188A JP 9674188 A JP9674188 A JP 9674188A JP H01269975 A JPH01269975 A JP H01269975A
Authority
JP
Japan
Prior art keywords
data
crc
random number
random numbers
obtd
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
JP9674188A
Other languages
Japanese (ja)
Inventor
Yasushi Nagasaka
長坂 康司
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NEC Corp
Original Assignee
NEC Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NEC Corp filed Critical NEC Corp
Priority to JP9674188A priority Critical patent/JPH01269975A/en
Publication of JPH01269975A publication Critical patent/JPH01269975A/en
Pending legal-status Critical Current

Links

Abstract

PURPOSE:To force a third person to erroneously recognize information as live information by subjecting the random components generated by adding check bits of CRC to information bits to a cyclic shift on a transmission side and generating random numbers and subjecting the reception data of the random number components to a reverse cyclic shift. CONSTITUTION:The CRC (Cyclic Redundancy Check Code) check bits are first added to the transmission data by a means 1 and the random numbers are obtd. by a means 2 for generating the random numbers on the data transmission side at the time of ciphering the data added with the CRC. The random number components and code words obtd. by a means 3 are cyclically shifted and are transmitted to a communication path. The same random numbers as the random numbers on the transmission side are obtd. by the means 4 and the random components obtd. by the means 5 are subjected to the reverse cyclic shift and the decoding of the CRC is executed by a means 6 to obtain reception data 12 on the data reception side. The third person is thereby forced to judge the data on the communication path as the correct data which is not ciphered.

Description

【発明の詳細な説明】 〔産業上の利用分野〕 本発明は、データの暗号化に関する。[Detailed description of the invention] [Industrial application field] The present invention relates to data encryption.

以下余白 〔従来の技術〕 従来の暗号化方式では#  CRC(Cyclic R
edundancy Check Code)チェック
ビットを付加したデータをランダムな方法で(CRCの
チェックビットを付加するメカニズムとは無関係な方法
・・・例えば、DES方式)、暗号化していた。
The following margin [Conventional technology] In the conventional encryption method, #CRC (Cyclic R
(edundancy check code) Data to which check bits have been added is encrypted using a random method (method unrelated to the mechanism for adding CRC check bits, such as the DES method).

〔発明が解決しようとする課題〕[Problem to be solved by the invention]

従来の暗号化方式では、CRCを付加したデータを暗号
化する場合、暗号化されたデータは。
In conventional encryption methods, when encrypting data with a CRC added, the encrypted data is

CRCに基づいて符号化されたデータではなくなってい
るため、第三者が傍受して、そのデータをCRCの規則
に基づいて復号化した場合、当然のことながら、誤シが
あると判断される。このような事象は殆どのデータに対
して起きるため。
Since the data is no longer encoded based on CRC, if a third party intercepts the data and decodes it based on CRC rules, it will naturally be determined that there is an error. . This type of event occurs with most data.

第三者にはデータが暗号化されていると判断されてしま
う可能性がある。もし、傍受されたデータが第三者には
暗号化されていないと思わせる事ができれば、暗号解読
に要する時間を引き延ばせることができる。そこで本発
明の技術的課題は、傍受されたデータが第三者には暗号
化されていないと思わせることができる簡易型データ暗
号化方式を提供することである。
A third party may be able to determine that the data is encrypted. If a third party can be made to believe that the intercepted data is not encrypted, the time it takes to decrypt it can be extended. Therefore, a technical problem of the present invention is to provide a simple data encryption method that can make a third party think that intercepted data is not encrypted.

〔課題を解決するための手段〕[Means to solve the problem]

本発明によれば、  CRC(C1yclic Red
undancyCheck Code )が付加された
データを暗号化する際、送信側では、情報ピットにCR
Cのチエツクピットを付加し9発生させた乱数分、サイ
クリックシフトを施すことにより、暗号化を行う手段と
、受信側では、乱数を発生させ、その乱数分(この乱数
は、秘密かつ送信側と同じ乱数を持つ)受信データを逆
サイクリックシフトし。
According to the present invention, CRC (Clyclic Red
When encrypting data with undancyCheck Code) added, on the sending side, CR is added to the information pit.
A means for encrypting by adding 9 check pits of C and applying cyclic shift to a random number generated by 9, and a means for encrypting by generating a random number on the receiving side, cyclically shifts the received data (with the same random number as).

CRC復号を行う手段とを有する簡易型データ暗号化方
式が得られる。
A simplified data encryption method having means for performing CRC decoding is obtained.

〔実施例〕〔Example〕

本発明の一実施例について1図面を参照して説明する。 An embodiment of the present invention will be described with reference to one drawing.

第1図は本発明の構成図を表す図である。FIG. 1 is a diagram showing a configuration diagram of the present invention.

データ送信側は、まず送信データをCRCのチエツクピ
ットを付加する手段1により、 CRCチェックビット
を付加する。その次に、乱数を発生させる手段2によシ
、乱数を得る。手段2では、乱数発生メカニズムと乱数
を発生させるだめの初期値を送受信間で秘密にしておく
必要がある。即ち、この乱数が、データ単位ごとの暗号
化の鍵となシ、シかもデータごと乱数は異なる。
The data transmitting side first adds CRC check bits to the transmitted data using means 1 for adding CRC check pits. Next, a random number is obtained by means 2 for generating a random number. In means 2, it is necessary to keep the random number generation mechanism and the initial value for generating the random numbers secret between the transmitter and the receiver. That is, this random number may be used as the encryption key for each data unit, and the random number may be different for each data unit.

そして2手段3により、得られた乱数分、符号語をサイ
クリックシフトする。これを1通信路に送り出す。まだ
は、メモリに格納する。
Then, by means 2 and 3, the code word is cyclically shifted by the obtained random number. This is sent to one communication channel. Not yet stored in memory.

データ受信側では、送信側の手続きと逆順序で行う。ま
ず2手段4により、送信側と同じ乱数を得る。その後1
手段5により得られた乱数分、逆サイクリックシフトを
行う。そして、逆サイクリックシフトしたものに2手段
6によりCRCの復号を行い、受信データ12を得る。
On the data receiving side, the procedure is performed in the reverse order of the procedure on the sending side. First, by means 2 and 4, the same random number as that on the sending side is obtained. then 1
A reverse cyclic shift is performed by the random number obtained by means 5. Then, CRC decoding is performed on the inversely cyclically shifted data by the second means 6 to obtain received data 12.

〔発明の効果〕〔Effect of the invention〕

以上の説明のとおり2本発明によれば、不当な第三者は
通信路上のデータを暗号化されていないデータと判断す
る。したがって、不当な第三者はまちがった情報を得る
ことになる。なぜなら2通信路上のデータは暗号化され
ておシ。
As described above, according to the present invention, an unauthorized third party determines that data on a communication path is unencrypted data. Therefore, an unjustified third party may obtain incorrect information. This is because the data on the second communication path is encrypted.

かつCRCチエツク符号が正しいものであるため。And the CRC check code is correct.

不当な第三者がCRC復号すると正しく復号できる(誤
シがないと判断される)。それ故、不当な第三者はその
情報が正しいものだと判断してしまう。
If an unauthorized third party decodes the CRC, it can be decoded correctly (it is determined that there are no errors). Therefore, an unjustified third party will judge that the information is correct.

従って、真の情報は簡単には不当な第三者に漏れること
はない。また、暗号化/復号化のメカニズムもサイクリ
ックシフトのみであるため比較的簡単であるという長所
を持つ。
Therefore, true information is not easily leaked to unauthorized third parties. Furthermore, since the encryption/decryption mechanism is only a cyclic shift, it has the advantage of being relatively simple.

本発明は、データがバイナリであるとき、特に有効であ
る。なぜなら、暗号化されたデータ/暗号化されていな
いデータともバイナリ形式となるゆえ、不当な第三者が
前後の情報から。
The invention is particularly effective when the data is binary. This is because both encrypted and unencrypted data are in binary format, so an unauthorized third party can access the information before and after the data.

傍受したデータが暗号化されているのか/いないのかを
判断することが難しくなるからである。
This is because it becomes difficult to determine whether the intercepted data is encrypted or not.

【図面の簡単な説明】[Brief explanation of the drawing]

第1図は2本発明を実施する暗号化方式の一構成図であ
る。 1 : CRCのチエツクピットを付加する手段。 2:乱数を発生させる手段、3:得られた乱数分、符号
語をサイクリックシフトする手段、4:送信側と同じ乱
数を発生させる手段、5:得られた乱数分、符号語を逆
サイクリックシフトする手段、6:CRCの復号手段、
11:送信データ、12:受信データ。
FIG. 1 is a diagram showing the configuration of an encryption system implementing the present invention. 1: A means of adding a CRC check pit. 2: means for generating random numbers; 3: means for cyclically shifting the code word by the obtained random number; 4: means for generating the same random number as on the sending side; 5: means for inversely shifting the code word by the obtained random number. means for click-shifting; 6: means for decoding CRC;
11: Transmission data, 12: Reception data.

Claims (1)

【特許請求の範囲】 1)CRCが付加されたデータを暗号化する際、送信側
では、情報ビットにCRCのチェックビットを付加し、
発生させた乱数分、サイクリックシフトを施すことによ
り、暗号化を行う手段と 受信側では、乱数を発生させ、その乱数分受信データを
逆サイクリックシフトし、CRC復号を行う手段とを もつことを特徴とする簡易型データ暗号化方式。
[Claims] 1) When encrypting data to which a CRC has been added, the transmitting side adds a CRC check bit to the information bits,
A means for performing encryption by performing a cyclic shift by the generated random number, and a means for generating a random number, reversely cyclically shifting the received data by the random number, and performing CRC decoding on the receiving side. A simple data encryption method featuring:
JP9674188A 1988-04-21 1988-04-21 Simple type data ciphering system Pending JPH01269975A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP9674188A JPH01269975A (en) 1988-04-21 1988-04-21 Simple type data ciphering system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP9674188A JPH01269975A (en) 1988-04-21 1988-04-21 Simple type data ciphering system

Publications (1)

Publication Number Publication Date
JPH01269975A true JPH01269975A (en) 1989-10-27

Family

ID=14173121

Family Applications (1)

Application Number Title Priority Date Filing Date
JP9674188A Pending JPH01269975A (en) 1988-04-21 1988-04-21 Simple type data ciphering system

Country Status (1)

Country Link
JP (1) JPH01269975A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4810051B2 (en) * 2000-06-07 2011-11-09 コネクサント システムズ,アイエヌシー. Method and apparatus for media access control in power line communication network system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4810051B2 (en) * 2000-06-07 2011-11-09 コネクサント システムズ,アイエヌシー. Method and apparatus for media access control in power line communication network system

Similar Documents

Publication Publication Date Title
US6021203A (en) Coercion resistant one-time-pad cryptosystem that facilitates transmission of messages having different levels of security
US3798605A (en) Centralized verification system
CA1258305A (en) Encryption/decryption system
KR101387799B1 (en) Encryption method for message authentication
KR100519839B1 (en) Encrypting speech coder
US5345507A (en) Secure message authentication for binary additive stream cipher systems
JP2628660B2 (en) Encryption / decryption method and apparatus
JPS62283742A (en) Data transmission
US10673830B2 (en) Devices for transmitting and communicating randomized data utilizing sub-channels
US4264781A (en) Apparatus for encoding and decoding data signals
US4805216A (en) Method and apparatus for continuously acknowledged link encrypting
WO2002011361A2 (en) Data encryption and decryption using error correction methodologies
US6125183A (en) Cryptosystem for optical storage
KR100517847B1 (en) Shared data refining device and shared data refining method
US20060126841A1 (en) Method and apparatus for a security system for wireless networks
KR20060011999A (en) Des algorithm-based encryption method
JPH01269975A (en) Simple type data ciphering system
CN105634736A (en) Method for data encryption
Diffie et al. Privacy and Authentication: An Introduction to Cryptography
JP3182617B2 (en) Encrypted communication method
JPS5917750A (en) Cipher system
KR20010008808A (en) Encryption method by scramble on wlan
JPS6338341A (en) Ciphering/deciphering equipment
KR20220019342A (en) Multiple Key Encrypt Algorithm with Mixing Array
JP2002217897A (en) Transmitter and receiver ciphering part of data