JPH02199939A - System for verifying opposite party - Google Patents

System for verifying opposite party

Info

Publication number
JPH02199939A
JPH02199939A JP1018908A JP1890889A JPH02199939A JP H02199939 A JPH02199939 A JP H02199939A JP 1018908 A JP1018908 A JP 1018908A JP 1890889 A JP1890889 A JP 1890889A JP H02199939 A JPH02199939 A JP H02199939A
Authority
JP
Japan
Prior art keywords
sender
receiver
section
signal
bits
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
JP1018908A
Other languages
Japanese (ja)
Other versions
JP2907850B2 (en
Inventor
Noriyoshi Sonedaka
則義 曽根高
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NEC Corp
Original Assignee
NEC Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NEC Corp filed Critical NEC Corp
Priority to JP1018908A priority Critical patent/JP2907850B2/en
Publication of JPH02199939A publication Critical patent/JPH02199939A/en
Application granted granted Critical
Publication of JP2907850B2 publication Critical patent/JP2907850B2/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Abstract

PURPOSE:To secure the confidentiality even when an ID number of one party is intercepted by a 3rd party and to detect the presence of a forged data by the 3rd party immediately by using both receiver and sender ID numbers. CONSTITUTION:A basic decoding section D1 decodes a sender ID number by using a secret key S4 in common to the sender and the receiver. The secret hey S4 is obtained by a selection section D1-2 selecting either a secret key S3 outputted from a secret key register section D3 or a receiver ID number S6 outputted from a receiver ID number register section D4. Then a decoded signal S5 is decoded by using the receiver ID number S4 and the decoded signal is outputted to a transmission line T1. A basic cryptographic section E1 of the receiver side ciphers the decoded signal S7 by using the receiver ID number S4. A decoded signal S8 generated from the basic cryptographic section E1 is inputted to a sender ID number verification section E2, in which a sender ID number outputted from a sender ID number register section D2 and the decoded signal S8 are compared.

Description

【発明の詳細な説明】 [産業上の利用分野] 本発明は、任意の通信路において送信者が通信文をディ
ジタル署名して受信者が確認する相手認証方式に関する
DETAILED DESCRIPTION OF THE INVENTION [Field of Industrial Application] The present invention relates to a counterpart authentication method in which a sender digitally signs a message on an arbitrary communication path and the receiver confirms the digital signature.

[従来の技術] この種の相手認証方式については、例えば社団法人電子
通信学会から昭和61年に発行された刊行物″現代暗号
化理論“ (217頁から239頁)にいくつかの例が
示されている。
[Prior Art] Some examples of this type of other party authentication method are shown in the publication "Modern Cryptography Theory" (pages 217 to 239) published in 1986 by the Institute of Electronics and Communication Engineers. has been done.

第1の例は、送信者側のID番号を送/受信者共通の秘
密鍵で復号化して送出し、受信側では秘密鍵で復号化さ
れた信号より送信者側のIDI号を得る方式である。
The first example is a method in which the sender's ID number is decrypted using a secret key shared by the sender and receiver and then sent, and the receiver obtains the sender's IDI code from the signal decrypted with the secret key. be.

第2の例では送信者側が送信者側のID番号を受信側に
平文で送出し、その後、送信者のID番号を送/受信者
共通の秘密鍵でハツシュ関数りを施し、別の秘密鍵で復
号化して受信側に送出する。
In the second example, the sender side sends the sender's ID number to the receiver side in plain text, and then performs a hash function on the sender's ID number using a secret key shared by the sender and receiver, and then uses another secret key. decrypt it and send it to the receiving side.

この第2の例では、受信者側は、最初に送出されたID
番号を共通秘密鍵でハツシュ関数りを施して得られる値
と、後に送られて(るID番号をハツシュ関数りで圧縮
して復号化した信号を別の秘密鍵で暗号化することによ
り得られる値とが一致するかどうか比較して相手を認証
する。
In this second example, the recipient side uses the originally sent ID
A value obtained by applying a hash function to the number using a common secret key, and a signal obtained by compressing and decoding the ID number sent later using a hash function using another secret key. Authenticate the other party by comparing the values to see if they match.

第2図を参照して上記第1の方式について説明する。The first method will be explained with reference to FIG.

まず、送信者側では、送信者ID番号レジスタ部D2よ
り出力される送信者ID番号(IDI)Slと秘密鍵レ
ジスタ部D3より出力される秘密鍵(MK)S4を基本
復号化部D1によって復号化した後、復号化信号S5を
伝送路T1に出力する。
First, on the sender side, the sender ID number (IDI) Sl output from the sender ID number register section D2 and the secret key (MK) S4 output from the secret key register section D3 are decrypted by the basic decryption section D1. After decoding, the decoded signal S5 is output to the transmission line T1.

伝送路T1を経由して受信者側には復号化信号S6が供
給される。送信者側にあるものと同じ秘密鍵レジスタ部
D3より出力される秘密鍵(MK)S4を用いて復号化
信号S6を基本暗号化部E1によって暗号化した後、送
信者ID番号誌証部E2に復元信号(IDi ’ ) 
S8として出力する。
The decoded signal S6 is supplied to the receiver side via the transmission path T1. After the decrypted signal S6 is encrypted by the basic encryption unit E1 using the secret key (MK) S4 output from the same secret key register unit D3 as that on the sender side, the sender ID number record unit E2 Restore signal (IDi')
Output as S8.

送信者ID番号認証部E2は、期待する相手の送信者I
D番号レジスタ部D2からの送信者ID番号S1と復元
信号S8とを比較し、一致していれば認証結果信号S9
を出力する。
The sender ID number authentication section E2 identifies the expected sender I.
The sender ID number S1 from the D number register section D2 is compared with the restoration signal S8, and if they match, the authentication result signal S9 is sent.
Output.

この認証方式は、送信側において、 D (MK、101 )−Ci     ・・・(2−
1)受信側において、 E (MK、Ci )−IDi ’   ・・・(2−
2)期待する認証は、 ID1−IDI’  (但し、D −E −’)・・・
(2−3) ならば、相手を認証したとする方式である。
In this authentication method, on the sending side, D (MK, 101)-Ci...(2-
1) On the receiving side, E (MK, Ci)-IDi'...(2-
2) The expected authentication is ID1-IDI' (however, D -E -')...
(2-3) If so, the method assumes that the other party has been authenticated.

もしも、第3者において改ざん等が実施されていれば、 ID1≠IDi’        ・・・(2−4)と
なる。
If a third party has tampered with the data, ID1≠IDi' (2-4).

第3図は前述したm2の方式の構成例を示す。FIG. 3 shows an example of the configuration of the m2 method described above.

この方式は、送信者側で手順lとして、送信者ID番号
レジスタ部D2より出力される送信者ID番号(IDI
)Slを伝送路T1に送出する。次に、手順2として、
送信者ID番号S1を秘密鍵レジスタ部D3から出力さ
れる秘密鍵(MK)S4を使用してデータ圧縮部H1に
おいてハツシュ関数りを施し、圧縮信号Sllとして基
本復号化部D1に出力する。基本復号化部D1では入力
した圧縮信号811を他の秘密鍵レジスタ部D5より出
力された秘密鍵(MK2)SIOで復号化し、復号化信
号(Ci)S12として伝送路T1に出力する。
In this method, as step 1 on the sender side, the sender ID number (IDI) is output from the sender ID number register D2.
) Sl is sent to the transmission path T1. Next, as step 2,
The sender ID number S1 is subjected to a hash function in the data compression section H1 using a secret key (MK) S4 output from the secret key register section D3, and is outputted to the basic decoding section D1 as a compressed signal Sll. The basic decryption unit D1 decrypts the input compressed signal 811 using the secret key (MK2) SIO output from another secret key register unit D5, and outputs it to the transmission path T1 as a decrypted signal (Ci) S12.

伝送路T1を経由して受信者側には送信者ID番号Sl
による送信者ID番号513と復号化信号S12による
復号化信号S14が供給される。
The sender ID number Sl is sent to the receiver side via the transmission path T1.
A sender ID number 513 based on the sender ID number 513 and a decoded signal S14 based on the decoded signal S12 are supplied.

受信者側では、手順1として、受信した送信者ID番号
(IDi ’ )S13を送信者側にあるものと同じ秘
密鍵レジスタ部D3より出力される秘密鍵(MK)S4
で送信者にあるものと同じデータ圧縮部H1においてハ
ツシュ関数りを施した後、圧縮1=号(Chi’)Sl
lとして送信者ID番号認証部E2に出力する。
On the receiver side, as step 1, the received sender ID number (IDi') S13 is stored as a secret key (MK) S4 output from the same secret key register D3 as that on the sender side.
After the hash function is applied in the same data compression unit H1 as that in the sender, compression 1 = No. (Chi') Sl
It is output to the sender ID number authentication section E2 as 1.

次に、手順2として、受信した復号化信号(Ci’)S
14に対して送信者側のものと同じ他の秘密鍵レジスタ
部D5により出力される秘密m (MK2)S 10を
用いて基本暗号化部E1において暗号化を施した後、復
元信号(Chi ’ )515として送信者ID番号認
証部E2に出力する。送信者ID番号認証部E2では、
圧縮信号S11と復元信号S15とを比較し、一致して
いれば相手認証として認証結果信号S9を出力する。
Next, as step 2, the received decoded signal (Ci') S
14 is encrypted in the basic encryption unit E1 using the secret m(MK2)S10 outputted by another secret key register unit D5 which is the same as that on the sender side, and then the restoration signal (Chi' ) 515 to the sender ID number authentication section E2. In the sender ID number authentication section E2,
The compressed signal S11 and the restored signal S15 are compared, and if they match, an authentication result signal S9 is output as authentication of the other party.

この認証方式は次式で証明できる。This authentication method can be proven using the following formula.

送信側において、 千−順1 : H(MK、I DI )−Chi・・・
(3−1)手順2 : D (MK2.Chi )−C
i・・・(3−2)受信側において、 手順1:H(MK、ID1’ )−Chl’・・・(3
−3) 手順2 : E (MK2.Ci ’ )−Chi ’
・・・(3−4) ここで、送信者!D番号認証部E2は、Chi ’ −
Chi ’         ・・・(3−5)ならば
、相手認証したとする。
On the sending side, 1,000-order 1: H(MK, IDI)-Chi...
(3-1) Procedure 2: D (MK2.Chi)-C
i...(3-2) On the receiving side, Step 1: H(MK, ID1') - Chl'...(3
-3) Step 2: E (MK2.Ci')-Chi'
...(3-4) Here, the sender! The D number authentication section E2 is Chi'-
Chi' (3-5), it is assumed that the other party has been authenticated.

もしも、第3者において改ざん等が実施されていれば、 Chi’≠Chi ’         ・・・(3−
6)となり、改ざん等の有無か期待する相手ではないか
の判定ができる。
If tampering, etc. is carried out by a third party, Chi'≠Chi'...(3-
6), and it can be determined whether there has been tampering, etc., or whether the recipient is not the one expected.

[発明が解決しようとする課題] 上記第1の方式においては、2者間以上の相手との交信
に共通の秘密鍵を使用する場合、(2−3)式が成立し
ても、送信側は期待した受信側と交信ができるとは限ら
ない欠点がある。
[Problem to be Solved by the Invention] In the first system, when a common secret key is used for communication between two or more parties, even if equation (2-3) holds, the sending side has the disadvantage that it is not always possible to communicate with the expected recipient.

また、伝送路T1において、送信信号に伝送路品質劣化
の影響が存在する場合、(2−3)式が成立しても相手
を認証したとはならない欠点がある。
Further, in the transmission path T1, if there is an influence of transmission path quality deterioration on the transmission signal, there is a drawback that even if equation (2-3) holds, it does not mean that the other party has been authenticated.

一方、第2の方式においては、第1の方式の欠点の一部
は解決されるものの、送信者ID番号が平文で伝送路に
送出されるため、第3者による“なりすまし″が存在す
る可能性がある。また、第1の方式と同様2者間以上の
相手の交信に於いて、(3−5)式が成立しても期待す
る受信側との交信が期待できたとはならない過大なる欠
点が存在していた。
On the other hand, in the second method, although some of the shortcomings of the first method are resolved, since the sender ID number is sent to the transmission path in plain text, there is a possibility of "spoofing" by a third party. There is sex. In addition, as with the first method, in communication between two or more parties, even if equation (3-5) holds, there is an excessive drawback that the expected communication with the receiving side cannot be expected. was.

[課題を解決するための手段] 本発明は、任意の通信路において、送信者が通信文をデ
ィジタル署名して受信者が確認する相手認証方式であっ
て、送信者側は、nピッ)(nは自然数)からなる送信
者ID番号IDIを受信者側と共通に取り決めたnビッ
トからなる秘密鍵MKで復号化する所定のアルゴリズム
によりnビットからなる復号化信号Ciを生成する手段
と、前記復号化信号Ciを、nビットからなる受信者■
D番号IDjで復号化する所定のアルゴリズムによりn
ビットからなる復号化信号Cijを生成する手段と、該
復号化信号Cijを伝送路に送出する手段とを有し、受
信者側は、前記伝送路から受信した復号化信号Cij’
をnビットからなる受信者ID番号IDjにて暗号化す
る所定のアルゴリズムによりnビットからなる暗号化信
号Ci’を生成する手段と、前記暗号化信号Ci’を、
送信者側と共通に取り決めたnビットからなる秘密鍵M
Kで暗号化する所定のアルゴリズムによりnビットから
なる送信者ID番号ID1′を生成する手段と、送信さ
れてくる送信者ID番号ID+’ と認識している送信
者ID番号とが一致するかどうかを判別する手段とを有
することを特徴とする。
[Means for Solving the Problems] The present invention is a communication authentication method in which a sender digitally signs a message and the receiver confirms it in an arbitrary communication channel, and the sender side uses n-pi) ( means for generating a decrypted signal Ci consisting of n bits according to a predetermined algorithm for decoding the sender ID number IDI consisting of n is a natural number) with a secret key MK consisting of n bits agreed upon in common with the receiver side; The decoded signal Ci is received by a receiver consisting of n bits.
n by a predetermined algorithm for decoding with D number IDj
It has means for generating a decoded signal Cij consisting of bits, and means for transmitting the decoded signal Cij to a transmission path, and the receiver side receives the decoded signal Cij' from the transmission path.
means for generating an encrypted signal Ci' consisting of n bits by a predetermined algorithm for encrypting the encrypted signal Ci' with a recipient ID number IDj consisting of n bits;
Private key M consisting of n bits agreed upon in common with the sender
Whether the means for generating the sender ID number ID1' consisting of n bits using a predetermined algorithm encrypted with K matches the sent sender ID number ID+' and the recognized sender ID number. It is characterized by having a means for determining.

本発明によれば、送信者側における復号化のアルゴリズ
ムは、 D (MK、IDj )−Ci・・・(1)D (ID
j 、 Ci ) =Cij     ・・・(2)で
表わされ、受信者側における暗号化のアルゴリズムは、 E (IDj 、  Clj’ ) −Cl ’   
・・・(3)E (MK、Ci’ )−1DI ’  
 ・・・(4)で表わされる。
According to the present invention, the decoding algorithm at the sender side is D (MK, IDj)-Ci (1) D (ID
j, Ci) = Cij (2), and the encryption algorithm on the receiver side is E (IDj, Clj') - Cl'
...(3)E (MK, Ci')-1DI'
...It is expressed as (4).

[実施例] 第1図を参照して本発明の一実施例を説明する。[Example] An embodiment of the present invention will be described with reference to FIG.

送信者側は、手順1において次のように動作する。The sender side operates as follows in step 1.

基本復号化部D1によって、送信者ID番号S2を送/
受信共通の秘密鍵S4で復号化する。ここで、基本復号
化部D1は、例えばD E S (DATAENCRY
PTION 5TANDERD)のような慣用暗号化ア
ルゴリズムを有したものである。また、送信者ID番号
S2は、送信者ID番号レジスタ部D2から出力された
送信者ID番号S1と基本復号化部D1からの出力を戻
すことにより得られる復号化信号S5との一方を選択す
る選択部D1−1により得られる。手順1においては送
信者ID番号S1を選択したものである。更に、秘密鍵
S4は、秘密鍵レジスタ部D3から出力された秘密鍵S
3と受信者ID番号レジスタ部D4から出力された受信
者ID番号S6の一方を選択する選択部D1−2により
得られる。手順1においては秘密鍵S3を選択したもの
である。
The basic decoding unit D1 sends the sender ID number S2/
It is decrypted using the reception common secret key S4. Here, the basic decoding unit D1 is, for example, D E S (DATA ENCRY
It has a conventional encryption algorithm such as PTION 5TANDERD). Further, the sender ID number S2 selects one of the sender ID number S1 outputted from the sender ID number register section D2 and the decoded signal S5 obtained by returning the output from the basic decoding section D1. It is obtained by the selection section D1-1. In step 1, sender ID number S1 is selected. Furthermore, the secret key S4 is the secret key S output from the secret key register section D3.
3 and the recipient ID number S6 output from the recipient ID number register portion D4. In step 1, the secret key S3 is selected.

基本復号化部D1より復号化された復号化信号S5は、
選択部D1−3によって選択部D1−1に戻る経路を選
択される。
The decoded signal S5 decoded by the basic decoding unit D1 is
The selection unit D1-3 selects a route returning to the selection unit D1-1.

手順2においては次のように動作する。In step 2, the operation is as follows.

基本復号化部D1によって復号化信号S5を受信者ID
#号S4で復号化する。第1の選択部D1−1は復号化
信号S5を選択してS2とし、選択部D1−2は受信者
ID番号S6を選択してS4とする。また、選択部D1
−3は手順2で生成された復号化信号S5を選択し、伝
送路T1に出力する。伝送路T1を通過した復号化信号
は復号化信号S7として受信者側に入力する。
The basic decoding unit D1 converts the decoded signal S5 into a receiver ID.
It is decoded with # number S4. The first selection unit D1-1 selects the decoded signal S5 as S2, and the selection unit D1-2 selects the recipient ID number S6 as S4. In addition, selection section D1
-3 selects the decoded signal S5 generated in step 2 and outputs it to the transmission path T1. The decoded signal that has passed through the transmission path T1 is input to the receiver side as a decoded signal S7.

受信者側は手順1において次のように動作する。The recipient side operates as follows in step 1.

基本暗号化部E1によって復号化信号S7を受信者ID
番号S4で暗号化する。ここで、受信者ID番号S4は
、送信者側のものと同じ受信者lD番号レジスタ部D4
から出力された受信者ID番号S6と送信者側のものと
同じ秘密鍵レジスタ部D3から出力される秘密鍵S3と
の一方を選択する選択部E1−2に入力され、手順1に
おいては受信者ID番号S6を選択したものである。ま
た、復号化信号S7は、送信者側のものと同じ基本暗号
化部E1からの出力を戻すことにより得られる復元信号
S8と伝送路T1を通して受信した復号化信号S7との
一方を選択する選択部El−1に人力され、手順1にお
いては、復号化信号S7を選択する。基本暗号化部E1
によって復元された復元信号S8は、選択部E1−3で
選択部E1−1に戻る経路を選択される。
The basic encryption unit E1 converts the decrypted signal S7 into a receiver ID.
Encrypt with number S4. Here, the receiver ID number S4 is the same receiver ID number register part D4 as that on the sender side.
The receiver ID number S6 outputted from the sender side is input to the selection section E1-2 which selects one of the secret key S3 outputted from the same secret key register section D3 as that of the sender side. ID number S6 is selected. Further, the decrypted signal S7 is selected by selecting one of the restored signal S8 obtained by returning the output from the same basic encryption unit E1 as that on the sender side and the decrypted signal S7 received through the transmission path T1. In step 1, the decoded signal S7 is selected. Basic encryption part E1
The restored signal S8 restored by is selected by the selection unit E1-3 to return to the selection unit E1-1.

手順2においては次のように動作する。基本暗号化部E
1によって、復号化信号S7を秘密鍵S4で暗号化する
。選択部E1−1は手順1で生成された復元信号S8を
、選択部E1−2においては秘密鍵S3を、選択部E1
−3では送信者ID番号認証部E2に送出する経路を選
択しである。
In step 2, the operation is as follows. Basic encryption part E
1, the decrypted signal S7 is encrypted with the secret key S4. The selection unit E1-1 receives the restoration signal S8 generated in step 1, the selection unit E1-2 receives the secret key S3, and the selection unit E1-2 receives the secret key S3.
-3 selects the route for sending to the sender ID number authentication section E2.

基本暗号化部E1より生成された復元信号S8は、送信
者ID番号認証部E2に人力される。送信者ID番号認
証部E2において、送信者ID番号レジスタ部D2より
出力された送信者IDi号S1と復元信号S8を比較し
、一致しているかどうかの結果を認証結果信号S9とし
て出力する。
The restoration signal S8 generated by the basic encryption section E1 is manually input to the sender ID number authentication section E2. The sender ID number authentication section E2 compares the sender IDi number S1 output from the sender ID number register section D2 with the restoration signal S8, and outputs the result of whether or not they match as an authentication result signal S9.

1例として、送信する信号の平文を送信者ID番号とし
たが、特に送/受信者間で任意に取り決めたディジタル
署名文でもよい。
As an example, the plain text of the signal to be transmitted is the sender ID number, but it may also be a digital signature text arbitrarily agreed upon between the sender and the receiver.

[発明の効果] 以上説明したように、本発明の相手認証方式は、受信者
と送信者のIDの両方を使用する事から、一方のID番
号が第3者に分かっても秘密は保持でき、第3者の改ざ
ん等の有無も即座に検出できる。
[Effects of the Invention] As explained above, the other party authentication method of the present invention uses both the ID number of the recipient and the sender, so even if one ID number is known to a third party, confidentiality cannot be maintained. , the presence or absence of tampering by a third party can be immediately detected.

者ID番号レジスタ部、D5・・・秘密鍵レジスタ部、
El・・・基本暗号化部、E2・・・送信者ID番号認
証部。
person ID number register section, D5... private key register section,
El: basic encryption section, E2: sender ID number authentication section.

【図面の簡単な説明】[Brief explanation of the drawing]

第1図は、本発明の一実施例に係る相手認証方式の構成
例である。 第2図は、従来の相手認証方式の一例を示す構成例であ
る。 第3図は、従来の相手認証方式の他の構成例である。
FIG. 1 shows a configuration example of a partner authentication method according to an embodiment of the present invention. FIG. 2 is a configuration example showing an example of a conventional partner authentication method. FIG. 3 shows another example of the configuration of the conventional partner authentication method.

Claims (1)

【特許請求の範囲】[Claims] 1)任意の通信路において、送信者が通信文をディジタ
ル署名して受信者が確認する相手認証方式であって、送
信者側は、nビット(nは自然数)からなる送信者ID
番号IDiを受信者側と共通に取り決めたnビットから
なる秘密鍵MKで復号化する所定のアルゴリズムにより
nビットからなる復号化信号Ciを生成する手段と、前
記復号化信号Ciを、nビットからなる受信者ID番号
IDjで復号化する所定のアルゴリズムによりnビット
からなる復号化信号Cijを生成する手段と、該復号化
信号Cijを伝送路に送出する手段とを有し、受信者側
は、前記伝送路から受信した復号化信号Cij′をnビ
ットからなる受信者ID番号IDjにて暗号化する所定
のアルゴリズムによりnビットからなる暗号化信号Ci
′を生成する手段と、前記暗号化信号Ci′を、送信者
側と共通に取り決めたnビットからなる秘密鍵MKで暗
号化する所定のアルゴリズムによりnビットからなる送
信者ID番号IDi′を生成する手段と、送信されてく
る送信者ID番号IDi′と認識している送信者ID番
号とが一致するかどうかを判別する手段とを有すること
を特徴とする相手認証方式。
1) A communication authentication method in which the sender digitally signs a message and the receiver confirms it in any communication channel, and the sender side has a sender ID consisting of n bits (n is a natural number).
means for generating a decrypted signal Ci consisting of n bits by a predetermined algorithm for decoding the number IDi with a private key MK consisting of n bits agreed upon in common with the recipient side; The receiver side has means for generating a decoded signal Cij consisting of n bits by a predetermined algorithm for decoding with a receiver ID number IDj, and a means for sending the decoded signal Cij to a transmission path, and the receiver side has: An encrypted signal Ci consisting of n bits is generated by a predetermined algorithm that encrypts the decrypted signal Cij' received from the transmission path using the recipient ID number IDj consisting of n bits.
', and a predetermined algorithm for encrypting the encrypted signal Ci' with a private key MK consisting of n bits agreed upon in common with the sender side to generate a sender ID number IDi' consisting of n bits. and means for determining whether a sent sender ID number IDi' matches a recognized sender ID number.
JP1018908A 1989-01-28 1989-01-28 Remote authentication method Expired - Lifetime JP2907850B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP1018908A JP2907850B2 (en) 1989-01-28 1989-01-28 Remote authentication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP1018908A JP2907850B2 (en) 1989-01-28 1989-01-28 Remote authentication method

Publications (2)

Publication Number Publication Date
JPH02199939A true JPH02199939A (en) 1990-08-08
JP2907850B2 JP2907850B2 (en) 1999-06-21

Family

ID=11984700

Family Applications (1)

Application Number Title Priority Date Filing Date
JP1018908A Expired - Lifetime JP2907850B2 (en) 1989-01-28 1989-01-28 Remote authentication method

Country Status (1)

Country Link
JP (1) JP2907850B2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7831518B2 (en) * 2001-11-20 2010-11-09 Psi Systems, Inc. Systems and methods for detecting postage fraud using an indexed lookup procedure
US8463716B2 (en) 2001-11-20 2013-06-11 Psi Systems, Inc. Auditable and secure systems and methods for issuing refunds for misprints of mail pieces

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS5614280A (en) * 1979-07-17 1981-02-12 Fujitsu Ltd Coder
JPS5962241A (en) * 1982-07-08 1984-04-09 セ−イイ・ハニ−ウエル・ブル Method of confirming at least one information generation so-urce transmitted to second electronic device registered to memory of first electronic device and method of executing samethod
JPS60173950A (en) * 1984-02-20 1985-09-07 Nec Corp Ciphering device
JPS62208732A (en) * 1986-03-10 1987-09-14 Toshiba Corp Communication data protection system
JPS63237634A (en) * 1987-03-26 1988-10-04 Tokyo Electric Power Co Inc:The Secret communication system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS5614280A (en) * 1979-07-17 1981-02-12 Fujitsu Ltd Coder
JPS5962241A (en) * 1982-07-08 1984-04-09 セ−イイ・ハニ−ウエル・ブル Method of confirming at least one information generation so-urce transmitted to second electronic device registered to memory of first electronic device and method of executing samethod
JPS60173950A (en) * 1984-02-20 1985-09-07 Nec Corp Ciphering device
JPS62208732A (en) * 1986-03-10 1987-09-14 Toshiba Corp Communication data protection system
JPS63237634A (en) * 1987-03-26 1988-10-04 Tokyo Electric Power Co Inc:The Secret communication system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7831518B2 (en) * 2001-11-20 2010-11-09 Psi Systems, Inc. Systems and methods for detecting postage fraud using an indexed lookup procedure
US8463716B2 (en) 2001-11-20 2013-06-11 Psi Systems, Inc. Auditable and secure systems and methods for issuing refunds for misprints of mail pieces
US10783719B2 (en) 2001-11-20 2020-09-22 Psi Systems, Inc. Systems and methods for detecting postage fraud using an indexed lookup procedure

Also Published As

Publication number Publication date
JP2907850B2 (en) 1999-06-21

Similar Documents

Publication Publication Date Title
US7827408B1 (en) Device for and method of authenticated cryptography
CA2197915C (en) Cryptographic key recovery system
US5631961A (en) Device for and method of cryptography that allows third party access
US6973187B2 (en) Block encryption method and schemes for data confidentiality and integrity protection
US8045716B2 (en) System and method for the concealment of device input parameters
US20030123667A1 (en) Method for encryption key generation
JP2002500388A (en) System and method for deriving an initialization vector suitable for secure communication
US20190268145A1 (en) Systems and Methods for Authenticating Communications Using a Single Message Exchange and Symmetric Key
WO1990009009A1 (en) Data carrier and data communication apparatus using the same
KR970076418A (en) Encryption device and communication system to secure communication between devices
JP2020513117A (en) Method and system for improved authenticated encryption in a counter-based cryptosystem
RU2005104945A (en) EFFECTIVE ENCRYPTION AND AUTHENTICATION FOR DATA PROCESSING SYSTEMS
JPH0918469A (en) Equipment and system for cipher communication and ciphering device
US7894608B2 (en) Secure approach to send data from one system to another
JP2001251287A (en) Confidential transmitting method using hardware protection inside secret key and variable pass code
CN112738133A (en) RSA authentication method
KR20040009766A (en) Apparatus and method for transmitting and receiving in encryption system
KR100551992B1 (en) encryption/decryption method of application data
JPH08204701A (en) Electronic mail cipher communication system and cipher communication method
JP2005114870A (en) Cryptocommunication system
JPH02199939A (en) System for verifying opposite party
Klima et al. Side channel attacks on CBC encrypted messages in the PKCS# 7 format
JPH09200196A (en) Ciphering communication system
JPS63176043A (en) Secret information communicating system
JP2002215026A (en) Signed cipher communication method and device

Legal Events

Date Code Title Description
FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20080402

Year of fee payment: 9

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20090402

Year of fee payment: 10

EXPY Cancellation because of completion of term