JPH063905B2 - Authentication method between the center and the user - Google Patents

Authentication method between the center and the user

Info

Publication number
JPH063905B2
JPH063905B2 JP59164277A JP16427784A JPH063905B2 JP H063905 B2 JPH063905 B2 JP H063905B2 JP 59164277 A JP59164277 A JP 59164277A JP 16427784 A JP16427784 A JP 16427784A JP H063905 B2 JPH063905 B2 JP H063905B2
Authority
JP
Japan
Prior art keywords
center
encryption key
card
key
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
JP59164277A
Other languages
Japanese (ja)
Other versions
JPS6143034A (en
Inventor
俊温 家木
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ENU TEI TEI DEETA TSUSHIN KK
Nippon Telegraph and Telephone Corp
Original Assignee
ENU TEI TEI DEETA TSUSHIN KK
Nippon Telegraph and Telephone Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ENU TEI TEI DEETA TSUSHIN KK, Nippon Telegraph and Telephone Corp filed Critical ENU TEI TEI DEETA TSUSHIN KK
Priority to JP59164277A priority Critical patent/JPH063905B2/en
Publication of JPS6143034A publication Critical patent/JPS6143034A/en
Publication of JPH063905B2 publication Critical patent/JPH063905B2/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)

Description

【発明の詳細な説明】 〔発明の技術分野〕 この発明は、センタと端末間の通信にICカードを用い
る場合のセンタと利用者間の相手認証方法に関するもの
である。
Description: TECHNICAL FIELD The present invention relates to a method for authenticating a partner between a center and a user when an IC card is used for communication between the center and a terminal.

〔従来技術〕[Prior art]

従来のICカードを用いた通信方式は一般に第1図のよ
うな構成をとっている。
A conventional communication system using an IC card generally has a configuration as shown in FIG.

第1図において、1は有線網、2は端末機、3はセンタ
であり、端末機2にICカードを用いて入力し、センタ
3でこれを確認し、以後、両者間で通信が行われる。こ
のような、有線網1ではオンラインスコープ4等による
タッピングにより、また、無線網では無線機により通信
の内容を盗読されるおそれがある。このことは、個人の
プライバシーの侵害等の社会問題の原因となる。
In FIG. 1, 1 is a wired network, 2 is a terminal device, 3 is a center, which is input to the terminal device 2 by using an IC card and confirmed by the center 3, and thereafter, communication is performed between them. . In such a wired network 1, the contents of communication may be read by tapping by the online scope 4 or the like, and by a wireless device in a wireless network. This causes social problems such as invasion of individual privacy.

これに対処するため、第2図のようにRSA法、DES
法を用いた暗号化装置5を端末機2、センタ3と有線網
1の間にそれぞれ置く方法が現在研究されている。しか
し、前者の方法においては、処理がきわめて複雑なこ
と、暗号化データがぼう大になることから実用化されて
いない。また、後者においても鍵が長いこと、鍵の配送
が難しいこと、処理が難しいこと等問題点があり、装置
はきわめて高価なものとなっている。これらの方式にお
いては、個人が暗号化鍵、復号化鍵の保持、持ち運び、
管理を安全に行えないという点を、守秘能力の強いアル
ゴリズムを使うことによって解決しようとするため、上
記の問題点が生じている。
In order to deal with this, as shown in FIG. 2, RSA method, DES
A method of placing the encryption device 5 using the method between the terminal 2, the center 3 and the wired network 1 is currently being studied. However, the former method has not been put to practical use because the processing is extremely complicated and the encrypted data becomes very large. The latter also has problems such as long keys, difficult key distribution, and difficult processing, which makes the device extremely expensive. In these methods, an individual holds and carries an encryption key and a decryption key,
The problem described above occurs because an attempt is made to solve the problem that the management cannot be performed safely by using an algorithm with strong confidentiality.

〔発明の概要〕[Outline of Invention]

この発明は、これらの問題点を解決するため、アルゴリ
ズムの簡易な暗号方式の鍵を、個人が手軽に持ち運びで
き、鍵を安全に格納でき、かつ、暗号化処理の可能なI
Cカードに格納し、しかも、暗号化鍵、復号化鍵を通信
のたびに変更することによりセキュリティを確保したも
ので、その目的は、アルゴリズムの簡易な暗号方式によ
り、セキュリティを確保することにある。
In order to solve these problems, the present invention makes it possible for an individual to easily carry a key of an encryption method having a simple algorithm, store the key safely, and enable encryption processing.
The security is ensured by storing it in the C card and changing the encryption key and the decryption key each time communication is performed. The purpose is to ensure the security by the simple encryption method of the algorithm. .

以下この発明を図面について説明する。The present invention will be described below with reference to the drawings.

〔発明の実施例〕Example of Invention

第3図はICカードの構成の一例を示す図である。6は
ICカード、7はメモリIC、8はCPU、9は配線、
10はコンタクトである。ICカード6においては、メ
モリIC7、CPU8はモールドされており、この内容
を不正に読むことができない。すなわち、ICカード6
へのアクセスは、コンタクト10を通す方法に限定され
る。したがって、CPU8の中にプログラムを入れてお
き、暗号化鍵、復号化鍵の外部への送出を禁止し、外部
へ送出するデータの暗号化をプログラムにより行えば、
端末を介して回線へ送出するデータのセキュリティは保
たれる。
FIG. 3 is a diagram showing an example of the configuration of an IC card. 6 is an IC card, 7 is a memory IC, 8 is a CPU, 9 is wiring,
10 is a contact. In the IC card 6, the memory IC 7 and the CPU 8 are molded, and the contents cannot be read illegally. That is, the IC card 6
Access to is limited to the way through contacts 10. Therefore, if the program is stored in the CPU 8 to prohibit the sending of the encryption key and the decryption key to the outside and the data to be sent to the outside is encrypted by the program,
The security of the data sent to the line via the terminal is maintained.

第4図はこの発明の一実施例を示す構成ならびに信号の
授受を示す図であり、銀行のセンタおよび公衆電話網の
交換機センタが相手の認証を行う場合を示している。こ
の場合、センタ3は、ICカード6より送られてくる個
人のPIDコードとパスワードにより認証を行うが、パ
スワードを送る場合は、偽証を防止するため暗号化を行
う。すなわち、ICカード6のメモリIC7は個人ファ
イル11として使用されており、その中にPID11
a、暗号化鍵11b、パスワード11cが格納されてい
る。一方、センタ3のファイル中には、システム利用者
ファイル12があり、各利用者ごとのPID12a、暗
号化鍵12b、パスワード12cが格納されている。
FIG. 4 is a diagram showing a configuration and signal transmission / reception according to an embodiment of the present invention, and shows a case where a bank center and a public telephone network switch center authenticate each other. In this case, the center 3 authenticates with the PID code and password of the individual sent from the IC card 6, but when sending the password, encryption is performed to prevent forgery. That is, the memory IC 7 of the IC card 6 is used as the personal file 11, and the PID 11
a, an encryption key 11b, and a password 11c are stored. On the other hand, in the file of the center 3, there is the system user file 12, and the PID 12a, the encryption key 12b, and the password 12c for each user are stored.

個人がセンタ3にアクセスする際、まずICカード6よ
りPID11aをセンタ3に送り、センタ3はPID1
1aに対応するシステム利用者ファイル12をさがす。
次に、ICカード6より暗号化鍵11bでパスワード1
1cを暗号化し、センタ3に送る。この場合の暗号アル
ゴリズムは簡易なもので良く、第4図の実施例では暗号
化鍵11bとパスワード11cの排他的論理和をとる場
合(バーナム暗号方式)を示している。暗号器13は、
CPU8内にプログラムされている。
When an individual accesses the center 3, the IC card 6 first sends the PID 11a to the center 3, and the center 3 sends the PID 1
The system user file 12 corresponding to 1a is searched.
Next, the password 1 from the IC card 6 with the encryption key 11b
1c is encrypted and sent to the center 3. The encryption algorithm in this case may be a simple one, and the embodiment of FIG. 4 shows the case where the exclusive OR of the encryption key 11b and the password 11c is obtained (Vernam encryption method). The encryption device 13
It is programmed in the CPU 8.

この方法の利点は、復号化も暗号化鍵11bと同じもの
でよく、アルゴリズムもまた同じで良い点である。
The advantage of this method is that the decryption may be the same as the encryption key 11b and the algorithm may be the same.

センタ3では、受けとったデータをシステム利用者ファ
イル12の暗号化鍵12bで復号し、パスワード12c
が一致すれば本人として認証する。しかし、この方式で
はアルゴリズムが簡易であるため、暗号化鍵11b(1
2b)を固定しておくと、セキュリティ上問題である。
At the center 3, the received data is decrypted by the encryption key 12b of the system user file 12, and the password 12c
If the two match, the person is authenticated. However, since the algorithm is simple in this method, the encryption key 11b (1
Fixing 2b) is a security problem.

そこで、通信終了時に、第5図に示した方法により、セ
ンタ3からICカード6へ、次回通信時に用いる新暗号
化鍵14を配送する。すなわち、センタ3で、通信終了
時に新暗号化鍵14を生成し、現在の暗号化鍵で暗号化
してカードに送る。ICカード6は暗号化データを現在
の暗号化鍵で復号化し、新暗号化鍵14を取り出して、
現在の暗号化鍵の代りに格納する。この方法によれば、
個人は、常に、独自の暗号化鍵11bを安全に保有し、
通信のたびに新しい暗号化鍵を用いるため、高度なセキ
ュリティが確保される。
Therefore, at the end of communication, the new encryption key 14 used at the next communication is delivered from the center 3 to the IC card 6 by the method shown in FIG. That is, the center 3 generates a new encryption key 14 at the end of communication, encrypts it with the current encryption key, and sends it to the card. The IC card 6 decrypts the encrypted data with the current encryption key, extracts the new encryption key 14,
Store instead of the current encryption key. According to this method
Individuals always have their own encryption key 11b safely
A high level of security is ensured because a new encryption key is used for each communication.

なお、上記の実施例では、暗号化鍵を復号化鍵にも用い
たが、このように両者を同一のものとせず異なるものを
用いてもよい。
Although the encryption key is also used as the decryption key in the above embodiment, different keys may be used instead of the same key.

〔発明の効果〕〔The invention's effect〕

以上詳細に説明したように、この発明は、センタと端末
間を網で結び、前記センタまたは端末の一方から送出す
るデータを暗号化鍵で暗号化して送出し、他方で復号化
鍵を用いて復号し前記データを得てパスワードの一致を
判定して相手の認証を行う通信において、前記網に送出
したデータの暗号化鍵を前記端末で用いるICカードに
格納しておき、復号化鍵を前記センタのシステム利用者
ファイルに格納しておき、1回の通信のたびに前記IC
カードに格納された暗号化鍵と前記利用者ファイルに格
納された復号化鍵を変え、さらに次回の通信に用いる暗
号化鍵と復号化鍵の配送を現在の暗号化鍵と復号化鍵を
用いて行って前記ICカードに暗号化鍵を、また前記シ
ステム利用者ファイルに復号化鍵をそれぞれ格納してお
くようにし、個人の暗号化鍵を安全に格納できるICカ
ードおよび多人数の人間の暗号化鍵を安全に管理するセ
ンタにより実行され、しかも、暗号化鍵を通信のたびに
変えるため、以下の利点を有する。
As described above in detail, according to the present invention, the center and the terminal are connected by the network, the data transmitted from one of the center and the terminal is encrypted by the encryption key and transmitted, and the other uses the decryption key. In the communication in which the data is decrypted, the password is determined to be the same, and the other party is authenticated, the encryption key of the data transmitted to the network is stored in the IC card used in the terminal, and the decryption key is stored in the IC card. It is stored in the system user file of the center, and the IC is used for each communication.
The encryption key stored in the card and the decryption key stored in the user file are changed, and the delivery of the encryption key and the decryption key used for the next communication is performed using the current encryption key and the decryption key. The encryption key is stored in the IC card, and the decryption key is stored in the system user file, so that the personal encryption key can be safely stored and the encryption of a large number of people. Since the encryption key is executed safely by the center, and the encryption key is changed every communication, the following advantages are obtained.

(1)簡易な暗号アルゴリズムにかかわらず高度なセキュ
リティが確保できる。
(1) High security can be secured regardless of the simple encryption algorithm.

(2)アルゴリズムが簡易であるため、ICカードによる
暗号化・復号化が実現でき、システムのコストが安くて
すむ。
(2) Since the algorithm is simple, encryption / decryption with an IC card can be realized, and the system cost is low.

(3)暗号化鍵がICカードに格納されているため、IC
カードを持っている人間は、どのような通信システムに
おいても、暗号化通信が可能である。
(3) Since the encryption key is stored in the IC card, the IC
A person holding a card can perform encrypted communication in any communication system.

(4)暗号化鍵が個人対応で異なるため、一般データの通
信においても、受信者による送信者の認証が可能であ
る。
(4) Since the encryption key is different for each person, the sender can be authenticated by the receiver even in general data communication.

(5)万一、1つの暗号化鍵が見破られても、1個人のセ
キュリティがおびやかされるだけで、システム全体とし
ては大きなダメージは受けない。また個人のセキュリテ
ィも鍵を変えることで、ふたたび確保される。
(5) Even if one encryption key is discovered, the security of one person is threatened, and the system as a whole is not seriously damaged. Also, personal security can be secured again by changing the key.

【図面の簡単な説明】[Brief description of drawings]

第1図は従来の暗号化を行わない場合のセンタと端末間
の通信システムを示す図、第2図はRSA,DES等の
暗号器を用いた通信システムを示す図、第3図はICカ
ードの構成例を示す図、第4図はこの発明の一実施例に
よる暗号化通信システムと信号の授受を示す図、第5図
はこの発明による暗号化鍵の更新方法を示す図である。 図中、1は有線網、2は端末機、3はセンタ、4はオン
ラインスコープ、5は暗号化装置、6はICカード、7
はメモリIC、8はCPU、9は配線、10はコンタク
ト、11はICカード内の個人ファイル、12はセンタ
内のシステム利用者ファイル、13は暗号器(復号
器)、14は新暗号化鍵である。
FIG. 1 is a diagram showing a communication system between a center and a terminal when conventional encryption is not performed, FIG. 2 is a diagram showing a communication system using an encryption device such as RSA or DES, and FIG. 3 is an IC card. FIG. 4 is a diagram showing an example of the configuration of FIG. 4, FIG. 4 is a diagram showing signal transmission / reception with an encrypted communication system according to an embodiment of the present invention, and FIG. 5 is a diagram showing an encryption key updating method according to the present invention. In the figure, 1 is a wired network, 2 is a terminal, 3 is a center, 4 is an online scope, 5 is an encryption device, 6 is an IC card, and 7
Is a memory IC, 8 is a CPU, 9 is a wiring, 10 is a contact, 11 is a personal file in the IC card, 12 is a system user file in the center, 13 is an encoder (decryptor), and 14 is a new encryption key. Is.

Claims (2)

【特許請求の範囲】[Claims] 【請求項1】センタと端末間を網で結び、前記センタま
たは端末の一方から送出するデータを暗号化鍵で暗号化
して送出し、他方で復号化鍵を用いて復号し前記データ
を得てパスワードの一致を判定して相手の認証を行う通
信において、前記網に送出したデータの暗号化鍵を前記
端末で用いるICカードに格納しておき、復号化鍵を前
記センタのシステム利用者ファイルに格納しておき、1
回の通信のたびに前記ICカードに格納された暗号化鍵
と前記利用者ファイルに格納された復号化鍵を変え、さ
らに次回の通信に用いる暗号化鍵と復号化鍵の配送を現
在の暗号化鍵と復号化鍵を用いて行って前記ICカード
に暗号化鍵を、また前記システム利用者ファイルに復号
化鍵をそれぞれ格納しておくことを特徴とするセンタと
利用者間の相手認証方法。
1. A center and a terminal are connected by a network, data transmitted from one of the center and the terminal is encrypted with an encryption key and transmitted, and the other is decrypted using a decryption key to obtain the data. In the communication for authenticating the other party by judging the coincidence of passwords, the encryption key of the data sent to the network is stored in the IC card used in the terminal, and the decryption key is stored in the system user file of the center. Store it 1
The encryption key stored in the IC card and the decryption key stored in the user file are changed for each communication, and the distribution of the encryption key and the decryption key used for the next communication is performed by the current encryption. Authentication method between the center and the user, characterized in that the encryption key and the decryption key are used to store the encryption key in the IC card and the decryption key in the system user file. .
【請求項2】暗号化鍵と復号化鍵は同一のものを用いる
ことを特徴とする特許請求の範囲第1項記載のセンタと
利用者間の相手認証方法。
2. The partner authentication method between the center and the user according to claim 1, wherein the same encryption key and decryption key are used.
JP59164277A 1984-08-07 1984-08-07 Authentication method between the center and the user Expired - Lifetime JPH063905B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP59164277A JPH063905B2 (en) 1984-08-07 1984-08-07 Authentication method between the center and the user

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP59164277A JPH063905B2 (en) 1984-08-07 1984-08-07 Authentication method between the center and the user

Publications (2)

Publication Number Publication Date
JPS6143034A JPS6143034A (en) 1986-03-01
JPH063905B2 true JPH063905B2 (en) 1994-01-12

Family

ID=15790028

Family Applications (1)

Application Number Title Priority Date Filing Date
JP59164277A Expired - Lifetime JPH063905B2 (en) 1984-08-07 1984-08-07 Authentication method between the center and the user

Country Status (1)

Country Link
JP (1) JPH063905B2 (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH01231451A (en) * 1988-01-22 1989-09-14 Iwatsu Electric Co Ltd Communication control system
JP2850391B2 (en) * 1989-08-16 1999-01-27 国際電信電話株式会社 Confidential communication relay system
DE69220016T2 (en) * 1991-12-27 1998-01-02 Zexel Corp Locking system
JP4910629B2 (en) * 2006-10-26 2012-04-04 富士通株式会社 Information access system, read / write device, and active contactless information storage device
JP2009171253A (en) * 2008-01-16 2009-07-30 Trinity Security Systems Inc Key sharing method, authentication method, authentication program, recording medium, and communication system
JP2008167505A (en) * 2008-03-26 2008-07-17 Dainippon Printing Co Ltd Public key encryption processing system and method
JP2010056673A (en) * 2008-08-26 2010-03-11 Tss Lab:Kk Authentication processing method, authentication processing program, recording medium, and authentication processing system
JP2015192352A (en) * 2014-03-28 2015-11-02 富士通株式会社 Program, cipher processing method, and cipher processing device

Also Published As

Publication number Publication date
JPS6143034A (en) 1986-03-01

Similar Documents

Publication Publication Date Title
US11622265B2 (en) Security system for handheld wireless devices using time-variable encryption keys
US6151677A (en) Programmable telecommunications security module for key encryption adaptable for tokenless use
US4969188A (en) Process and apparatus for the protection of secret elements in a network of encrypting devices with open key management
CN100517354C (en) Computer implemented method for securely acquiring a binding key and securely binding system
JP2883243B2 (en) Remote party authentication / encryption key distribution method
RU2415470C2 (en) Method of creating security code, method of using said code, programmable device for realising said method
JP4954628B2 (en) Authentication device, authenticator and authentication method using true random number generator or pseudorandom number generator
US6460138B1 (en) User authentication for portable electronic devices using asymmetrical cryptography
KR980007143A (en) Authentication method, communication method and information processing device
JPH09167098A (en) Communication system for portable device
US20010054147A1 (en) Electronic identifier
JP2000261427A (en) Encryption communication terminal, encryption communication center equipment, encryption communication system and storage medium
US20020018570A1 (en) System and method for secure comparison of a common secret of communicating devices
US20020091932A1 (en) Qualification authentication method using variable authentication information
JPH0575598A (en) Key data sharing device
JPH09147072A (en) Personal authentication system, personal authentication card and center equipment
US7177425B2 (en) Device and method for securing information associated with a subscriber in a communication apparatus
JPH063905B2 (en) Authentication method between the center and the user
JPH04247737A (en) Enciphering device
US20030097559A1 (en) Qualification authentication method using variable authentication information
JP4372403B2 (en) Authentication system
JP2003134107A (en) System, method and program for individual authentication
JP2003309552A (en) Control system for electronic certificate by portable telephone
CN113162766B (en) Key management method and system for key component
JPH0373633A (en) Cryptographic communication system