JPH0433429A - Code device - Google Patents

Code device

Info

Publication number
JPH0433429A
JPH0433429A JP2140444A JP14044490A JPH0433429A JP H0433429 A JPH0433429 A JP H0433429A JP 2140444 A JP2140444 A JP 2140444A JP 14044490 A JP14044490 A JP 14044490A JP H0433429 A JPH0433429 A JP H0433429A
Authority
JP
Japan
Prior art keywords
key
data
encryption
enciphered
decoding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
JP2140444A
Other languages
Japanese (ja)
Other versions
JP3005245B2 (en
Inventor
Shigeo Tsujii
重男 辻井
Baha Erudein Muhammad Abuder Ajiz Hassan
ハッサン バハ エルディン モハメド アブデル アジズ
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NEC Corp
Original Assignee
NEC Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NEC Corp filed Critical NEC Corp
Priority to JP2140444A priority Critical patent/JP3005245B2/en
Publication of JPH0433429A publication Critical patent/JPH0433429A/en
Application granted granted Critical
Publication of JP3005245B2 publication Critical patent/JP3005245B2/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Abstract

PURPOSE: To perform highly stable encipherment by receiving enciphered data from a transmitting means and decoding the data into their original data by relying upon a key given from a key distribution center and a random key kept in the recording medium held by a receiving means. CONSTITUTION: A decoding and converting section 104 decodes an enciphered key sent from a host which is a key distribution center by using a terminal key from the IC card 102 held by a user. An enciphering and converting section 105 generates random numbers by enciphering the random key from a memory card 103 held by the user by using the enciphered key decoded by means of the decoding and converting section 104. When the section 104 performs decoding as a receiving means, the section 104 can decode enciphered data into the original data by only inputting the enciphered data in place of input data. Therefore, highly stable encipherment can be performed.

Description

【発明の詳細な説明】 〔産業上の利用分野〕 本発明はコンピュータネットワークでデータ・メツセー
ジを暗号化する暗号装置に関する。
DETAILED DESCRIPTION OF THE INVENTION [Field of Industrial Application] The present invention relates to an encryption device for encrypting data messages in a computer network.

〔従来の技術〕[Conventional technology]

コンピュータネットワークの暗号装置として、アイビー
エム・システム・ジャーナル(IBM SYSTEMJ
OURNAL)に掲載されている暗号装置がよく知られ
ている。この暗号装置では、端末とホストとの間に自動
的に暗号鍵を設定している。
As a computer network encryption device, IBM SYSTEMJ
The cryptographic device published in OURNAL) is well known. In this encryption device, an encryption key is automatically set between the terminal and the host.

〔発明が解決しようとする課題〕[Problem to be solved by the invention]

上記した従来の暗号装置では、ネットワーク内で閉じて
暗号鍵を設定するために、ネットワーク回線から情報を
盗まれることはないが、不正ユーザが端末を使うことは
防げないという欠点があった。
In the above-mentioned conventional encryption device, since the encryption key is set within the network, information cannot be stolen from the network line, but there is a drawback that it cannot prevent unauthorized users from using the terminal.

本発明の目的は、このような欠点を除去し、安全性の高
い暗号化を行う暗号装置を提供することにある。
An object of the present invention is to eliminate such drawbacks and provide an encryption device that performs highly secure encryption.

〔課題を解決するための手段〕[Means to solve the problem]

本発明は、コンピュータネットワークのデータを秘匿す
るための暗号装置において、 データを暗号化する送信手段と、 この送信手段から送られてきた暗号化データを元のデー
タに戻す受信手段とを備え、 前記送信手段では、鍵配送センターから与えられた鍵と
、この送信手段の有する記録媒体に保管されているラン
ダム鍵とに依存してデータを暗号化して前記受信手段に
送り、 前記受信手段では、前記送信手段から送られた暗号化デ
ータを受け取り前記鍵配送センターから与えられた鍵と
、受信手段の有する記録媒体に保管されているランダム
鍵とに依存して元のデータに戻すことを特徴とする。
The present invention provides a cryptographic device for concealing data on a computer network, comprising: a transmitting means for encrypting the data; and a receiving means for returning the encrypted data sent from the transmitting means to the original data; The transmitting means encrypts data depending on a key given from the key distribution center and a random key stored in a recording medium owned by the transmitting means, and sends the encrypted data to the receiving means. The method is characterized in that it receives encrypted data sent from a transmitting means and restores it to the original data depending on a key given from the key distribution center and a random key stored in a recording medium owned by the receiving means. .

〔実施例〕〔Example〕

第1図は本発明の一実施例を示すブロック図である。コ
ンピュータネットワークにおいて、ユーザが端末にて暗
号化/復号化を行う例である。
FIG. 1 is a block diagram showing one embodiment of the present invention. This is an example in which a user performs encryption/decryption at a terminal in a computer network.

この暗号装置は、データを暗号化/復号化するための暗
号化/復号化装置101を有しており、この暗号化/復
号化装置は、内部をあけられないように物理的に保護さ
れている。
This encryption device has an encryption/decryption device 101 for encrypting/decrypting data, and this encryption/decryption device is physically protected so that the inside thereof cannot be opened. There is.

暗号化/復号化装置101内には、復号化変換部104
と、暗号化変換部105と、排他的論理和演算部106
とが設けられている。
The encryption/decryption device 101 includes a decryption converter 104.
, an encryption conversion unit 105 , and an exclusive OR operation unit 106
is provided.

復号化変換部104は、鍵配送センターであるホストか
ら送られてくる暗号化鍵をユーザの持つICカード10
2からの端末鍵を用いて復号化する。
The decryption conversion unit 104 transfers the encryption key sent from the host, which is the key distribution center, to the IC card 10 held by the user.
Decrypt using the terminal key from 2.

暗号化変換部105は、復号化変換部104で復号され
た暗号化鍵を用いて、ユーザの持つメモリカード103
からのランダム鍵を暗号化して乱数を生成する。
The encryption converter 105 uses the encryption key decrypted by the decryptor converter 104 to convert the memory card 103 held by the user.
Generate random numbers by encrypting the random key from .

排他的論理和演算部106は、入力データ(メツセージ
)と、前記乱数との排他的論理和をとって、暗号化デー
タを出力する。
The exclusive OR calculation unit 106 performs an exclusive OR operation on the input data (message) and the random number, and outputs encrypted data.

この端末がコンピュータネットワークの他の端末を相手
に通信する場合の動作を説明する。
The operation when this terminal communicates with other terminals on the computer network will be explained.

まず、暗号装置が送信手段として暗号化を行う場合の動
作について説明する。暗号化に当たっては、まずデータ
と、コンピュータネットワークのホストから送られた暗
号化鍵とを、暗号化/復号化装置101の復号化変換部
104が受け取る。ここで、暗号化鍵KSは端末鍵KT
で暗号化されてE、、(KS)の形でホストから送られ
る。そこで、ユーザが持つICカード102から、端末
鍵KTを復号化変換部104に入力し、端末鍵KTで復
号化変換を行って暗号化鍵KSを得、暗号化変換部10
5に入力する。
First, the operation when the encryption device performs encryption as a transmission means will be explained. For encryption, first, the decryption conversion unit 104 of the encryption/decryption device 101 receives data and an encryption key sent from the host of the computer network. Here, the encryption key KS is the terminal key KT
is encrypted and sent from the host in the form of E, , (KS). Therefore, the terminal key KT is inputted from the IC card 102 held by the user to the decryption conversion unit 104, decryption conversion is performed using the terminal key KT, and the encryption key KS is obtained.
Enter 5.

次に、ユーザが持つメモリカード103からランダムビ
ット列であるランダム鍵RNを暗号化変換部105に入
力し、このランダム鍵RNを、暗号化鍵KSで暗号化し
て乱数R3を生成し、排他的論理和演算部106に入力
する。排他的論理和演算部106では、入力データと乱
数R3との排他的論理和をとって、暗号化データを出力
する。この暗号化データは、コンピュータネットワーク
の他の端末に送られる。
Next, a random key RN, which is a random bit string, is input from the memory card 103 held by the user to the encryption conversion unit 105, and this random key RN is encrypted with the encryption key KS to generate a random number R3, and an exclusive logic It is input to the sum calculation unit 106. The exclusive OR calculation unit 106 performs an exclusive OR operation on the input data and the random number R3, and outputs encrypted data. This encrypted data is sent to other terminals in the computer network.

復号化変換と対応する暗号化変換は、例えばアメリカ商
務省連邦標準局が制定しているアメリカ標準暗号(DB
S>を用いることができる。
The encryption conversion corresponding to the decryption conversion is, for example, the American Standard Cipher (DB) established by the Federal Bureau of Standards of the US Department of Commerce.
S> can be used.

ランダム鍵RNは、メモリカード103に格納されてい
る長いビット系列であるが、呼び出される毎に出力開始
位置を変えて、毎回同じ出力とならないようにする。例
えば、前回の次から開始する。
The random key RN is a long bit sequence stored in the memory card 103, but the output start position is changed each time it is called, so that the output is not the same each time. For example, start from the previous time.

ビット系列の全てを使いきったならば、最初からスター
トするのではなく、ずらして開始すれば実行上実際のラ
ンダム鍵長よりも長い系列とみなせる。
Once all of the bit sequence has been used, instead of starting from the beginning, if you shift the start, it can be treated as a sequence longer than the actual random key length.

次に、暗号装置が受信手段として復号化を行う場合、上
記暗号化において、入力データの代わりに暗号化データ
を入力するだけで、元のデータに復元できる。
Next, when the encryption device performs decryption as a receiving means, the original data can be restored by simply inputting encrypted data instead of input data in the above encryption.

以上の実施例において、端末鍵を記録するICカード1
02とランダム鍵を記録するメモリカード103は一例
であって、これらカードは一体にしてもよく、また他の
記録媒体を用いることもできる。
In the above embodiment, the IC card 1 that records the terminal key
02 and the memory card 103 that records the random key are just one example, and these cards may be integrated, or other recording media may be used.

また第1図の端末で暗号化/復号化する相手は、端末で
はなく、ホストの場合もある。さらに、送信側も受信側
もホストの場合がある。これらのときは、ユーザが持っ
ているICカード及びメモリカードの内容はホストの記
録媒体に記録される。
Furthermore, the party to whom encryption/decryption is performed by the terminal in FIG. 1 may be not the terminal but the host. Additionally, both the sender and the receiver may be hosts. In these cases, the contents of the IC card and memory card held by the user are recorded on the host's recording medium.

このとき、念のためそのホスト固有の鍵で暗号化してお
いて記録することもできる。なお、送受信側ともホスト
のときは、端末鍵という名称はふされしくなく、2次通
信鍵とでも呼ぶべきであるが、働きは同じである。
At this time, you can also encrypt and record it using a key unique to that host just in case. Note that when both the sending and receiving sides are hosts, the name terminal key is inappropriate and should be called a secondary communication key, but the function is the same.

また本実施例において、送信側と受信側の端末鍵を複数
個用意しておいて、必要に応じて取り替えることもでき
、こうすることにより安全性を高めることができる。
Furthermore, in this embodiment, a plurality of terminal keys for the transmitting side and the receiving side can be prepared and replaced as needed, thereby increasing security.

105  ・・・・・暗号化変換部 106 ・・・・・排他的論理和演算部〔発明の効果〕 以上説明したように、本発明を用いれば不正ユーザの端
末使用を防止でき安全性の高い暗号化を行えるので、コ
ンピュータネットワークに用いて効果が大きい。
105 ... Encryption conversion section 106 ... Exclusive OR operation section [Effects of the invention] As explained above, by using the present invention, it is possible to prevent unauthorized users from using the terminal, resulting in high security. Since it can perform encryption, it is highly effective when used in computer networks.

【図面の簡単な説明】[Brief explanation of drawings]

第1図は本発明の一実施例を示すブロック図である。 101  ・・・・・暗号化/復号化装置102  ・
・・・・ICカード 103  ・・・・・メモリカード 104  ・・・・・復号化変換部
FIG. 1 is a block diagram showing one embodiment of the present invention. 101... Encryption/decryption device 102 ・
...IC card 103 ...Memory card 104 ...Decoding conversion unit

Claims (1)

【特許請求の範囲】[Claims] (1)コンピュータネットワークのデータを秘匿するた
めの暗号装置において、 データを暗号化する送信手段と、 この送信手段から送られてきた暗号化データを元のデー
タに戻す受信手段とを備え、 前記送信手段では、鍵配送センターから与えられた鍵と
、この送信手段の有する記録媒体に保管されているラン
ダム鍵とに依存してデータを暗号化して前記受信手段に
送り、 前記受信手段では、前記送信手段から送られた暗号化デ
ータを受け取り前記鍵配送センターから与えられた鍵と
、受信手段の有する記録媒体に保管されているランダム
鍵とに依存して元のデータに戻すことを特徴とする暗号
装置。
(1) An encryption device for concealing data on a computer network, comprising a transmitting means for encrypting data, and a receiving means for returning the encrypted data sent from the transmitting means to the original data, The means encrypts data depending on a key given from a key distribution center and a random key stored in a recording medium owned by the transmitting means, and sends the encrypted data to the receiving means, and the receiving means transmits the data to the transmitting means. A cipher characterized by receiving encrypted data sent from a means and restoring it to the original data depending on a key given from the key distribution center and a random key stored in a recording medium possessed by the receiving means. Device.
JP2140444A 1990-05-30 1990-05-30 Encryption device Expired - Lifetime JP3005245B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2140444A JP3005245B2 (en) 1990-05-30 1990-05-30 Encryption device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2140444A JP3005245B2 (en) 1990-05-30 1990-05-30 Encryption device

Publications (2)

Publication Number Publication Date
JPH0433429A true JPH0433429A (en) 1992-02-04
JP3005245B2 JP3005245B2 (en) 2000-01-31

Family

ID=15268777

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2140444A Expired - Lifetime JP3005245B2 (en) 1990-05-30 1990-05-30 Encryption device

Country Status (1)

Country Link
JP (1) JP3005245B2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001502495A (en) * 1996-10-15 2001-02-20 エリクソン インコーポレイテッド Use of the double encryption algorithm for satellite channels with delay

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001502495A (en) * 1996-10-15 2001-02-20 エリクソン インコーポレイテッド Use of the double encryption algorithm for satellite channels with delay

Also Published As

Publication number Publication date
JP3005245B2 (en) 2000-01-31

Similar Documents

Publication Publication Date Title
CN1307819C (en) Method and apparatus for secure distribution of public/private key pairs
US6606386B2 (en) Cryptographic key split combiner
KR100683342B1 (en) Digital data recording device, digital data memory device, and digital data utilizing device for converting management information which contains restrictive information using a different key in each management information send/receive session
JPH08234658A (en) Method for generation of encoding key
JPS6127751B2 (en)
JPH06102822A (en) File security system
JPH08328962A (en) System composed of terminal equipment and memory card connected to the same
US7617402B2 (en) Copyright protection system, encryption device, decryption device and recording medium
US7894608B2 (en) Secure approach to send data from one system to another
JP2001251287A (en) Confidential transmitting method using hardware protection inside secret key and variable pass code
JP2000115162A (en) Secure communication equipment and storage device
JPH10171717A (en) Ic card and cipher communication system using the same
JP2001142396A (en) Ciphering device, its method, ciphering/deciphering device, its method and communication system
JP4731034B2 (en) Copyright protection system, encryption device, decryption device, and recording medium
US20010009583A1 (en) Secret key registration method, secret key register, secret key issuing method, cryptographic communication method and cryptographic communication system
JPH01212039A (en) Cryptographic key common share device
JPH0756507A (en) Ciphering and deciphering device for data security protection device
JPH07336328A (en) Cipher device
KR20000072516A (en) end-to-end data encryption/decryption method and device for mobile data communication
JP2001194991A (en) Ciphering method and cipher communication method
EP0892519A2 (en) System and method for secure data transmission
JPH0433429A (en) Code device
JPH0491531A (en) Confidential data transferring method using ic card
JPS5917750A (en) Cipher system
JP2000267565A (en) Enciphering and deciphering device, and computer- readable recording medium recorded with program

Legal Events

Date Code Title Description
FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20071119

Year of fee payment: 8

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20081119

Year of fee payment: 9

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20081119

Year of fee payment: 9

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20091119

Year of fee payment: 10

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20091119

Year of fee payment: 10

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20101119

Year of fee payment: 11

EXPY Cancellation because of completion of term
FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20101119

Year of fee payment: 11