JPH10126406A - Data cipher system in network - Google Patents

Data cipher system in network

Info

Publication number
JPH10126406A
JPH10126406A JP8299505A JP29950596A JPH10126406A JP H10126406 A JPH10126406 A JP H10126406A JP 8299505 A JP8299505 A JP 8299505A JP 29950596 A JP29950596 A JP 29950596A JP H10126406 A JPH10126406 A JP H10126406A
Authority
JP
Japan
Prior art keywords
data
encryption
register
encipher
transmission information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
JP8299505A
Other languages
Japanese (ja)
Inventor
Tetsuya Morizumi
哲也 森住
Tsugunori Yasui
嗣了 安井
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Toyo Communication Equipment Co Ltd
Original Assignee
Toyo Communication Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Toyo Communication Equipment Co Ltd filed Critical Toyo Communication Equipment Co Ltd
Priority to JP8299505A priority Critical patent/JPH10126406A/en
Publication of JPH10126406A publication Critical patent/JPH10126406A/en
Pending legal-status Critical Current

Links

Abstract

PROBLEM TO BE SOLVED: To limit time that is needed for encipher and decoding at a transmission destination without damaging the confidentiality of data through encipher by making data image data and inserting the key of cryptograph of the data into transmission information. SOLUTION: This system is provided with a serial in parallel out shift (S/P) register 12, encipher processing parts 13a and 13b and a parallel in serial out (P/S) register 14. It does not perform any encipher to an SMTP header 9 which does not need security, performs strong encipher to transmission information 10 which includes much significant information in the part 13b, performs weak encipher to image data 11 in the part 13a and then moves the contents from the S/P register 12 to the P/S register 14. That is, it performs a strong cipher system such as elliptic cipher, an RSA, a DES and nonlinear shift register to the transmission information 10 and performs a weak cipher system such as a linear shift register, simple inversion and replacement to the image data 11.

Description

【発明の詳細な説明】DETAILED DESCRIPTION OF THE INVENTION

【0001】[0001]

【発明の属する技術分野】本発明はネットワークにおけ
るデータの伝送、特にイメージデータの暗号化方式に関
する。
[0001] 1. Field of the Invention [0002] The present invention relates to data transmission on a network, and more particularly to an encryption method for image data.

【0002】[0002]

【従来の技術】近年、インターネット等、広域ネットワ
ーク整備され、これを利用したデータの伝送が一般的に
行われるようになった。図4はインターネットを利用し
た端末間のファクシミリ情報の伝送システムの形態を示
す概念図である。
2. Description of the Related Art In recent years, a wide area network such as the Internet has been developed, and data transmission using this network has been generally performed. FIG. 4 is a conceptual diagram showing a form of a system for transmitting facsimile information between terminals using the Internet.

【0003】端末1は、予め用意したデータ(テキスト、
イメージ)をインターネット2を介して他の端末3あるい
はゲートウェイ4を経由してFAX装置5に伝送する。
[0003] The terminal 1 is provided with data (text,
Image) is transmitted to the fax device 5 via the other terminal 3 or the gateway 4 via the Internet 2.

【0004】端末1は図5に示すようなフレームフォー
マットのデータを用意する。伝送すべきイメージデータ
6の直前に伝送先或いは送信元の情報(FAX番号、パスワ
ード、ユーザ名等)を記載した伝送情報7を付与し、更に
その直前にインターネットのメールのプロトコル(RFC08
21)で規定されたSMTPヘッダ8を付与しておく。
The terminal 1 prepares data in a frame format as shown in FIG. Image data to be transmitted
Transmission information 7 describing transmission destination or transmission source information (FAX number, password, user name, etc.) is added immediately before 6.The Internet mail protocol (RFC08
The SMTP header 8 specified in 21) is added.

【0005】周知の通り、インターネットはオープンな
ネットワーク環境であり、メールは不特定の複数のサー
バを経由して伝送先まで送達されることになるので、ク
ローズドな熱とワークに比して秘匿性が著しく低いとい
う欠点がある。そこで、インターネットを商用などに利
用する場合は、何らかのセキュリティ(暗号化)が必要と
なる。従来、一般的にはSMTPヘッダより後の伝送情報と
イメージデータに対して所定の暗号化を施した上で伝送
していた。
[0005] As is well known, the Internet is an open network environment, and mail is delivered to transmission destinations via a plurality of unspecified servers. Therefore, confidentiality is lower than closed heat and work. Has the disadvantage of being significantly lower. Therefore, when using the Internet for commercial purposes, some security (encryption) is required. Conventionally, generally, transmission information after the SMTP header and image data are transmitted after being subjected to predetermined encryption.

【本発明が解決しようとする課題】[Problems to be solved by the present invention]

【0006】しかしながら、上述したようにイメージデ
ータのような膨大なデータ量を呈する情報を伝送する場
合には、暗号化及び伝送先での復号化に時間がかかると
いう欠点があった。このため、ユーザーが長時間データ
の到着を待たされる、あるいは、通信処理に加えて暗号
化及び復号化処理が必要であるために、通信装置自体に
大きな負担がかかるといった問題が生じていた。この問
題に対処すべく、例えば比較的弱い暗号化方式を用いれ
ば、上述の処理時間を短縮することが可能であるが、伝
送情報7にはプライバシーに関わる情報やクレジットカ
ード番号などの極めて重要な情報が含まれる場合が多
い。従って、この例の様な弱い暗号化方式では安全性が
不十分である為、依然として強い暗号方式を用いなけれ
ばならず、上述の問題点を解決するには至っていないの
である。本発明はイメージデータのような膨大なデータ
量を呈する情報を伝送する場合であっても、暗号化によ
るデータの秘匿性を損なうことなく暗号化及び伝送先で
の復号化に要する時間を極限する暗号方式を提供するこ
とを目的とする。
[0006] However, as described above, when information having a huge data amount such as image data is transmitted, there is a drawback that it takes time to encrypt and decrypt at a transmission destination. For this reason, there has been a problem in that the user has to wait for the arrival of data for a long time, or the communication apparatus itself has a heavy load because encryption and decryption processing is required in addition to communication processing. To address this problem, for example, if a relatively weak encryption method is used, the above-described processing time can be reduced, but the transmission information 7 is extremely important, such as privacy-related information and credit card numbers. Often contains information. Therefore, security is insufficient with a weak encryption method as in this example, and a strong encryption method must still be used, and the above-mentioned problem has not been solved. The present invention minimizes the time required for encryption and decryption at a transmission destination without impairing the confidentiality of data by encryption even when transmitting information having a huge data amount such as image data. It is intended to provide an encryption method.

【0007】[0007]

【課題を解決するための手段】伝送すべきデータに伝送
情報を付与し、これをネットワーク上に接続した端末間
で送受信するシステムに於いて、前記伝送情報に施す暗
号の強さを前記データに施すそれよりも強くしたネット
ワークにおけるデータの暗号方式であって、特に、前記
データがイメージデータであること、若しくは前記伝送
情報に前記データの暗号鍵を挿入したことを特徴とする
ものである。
In a system for transmitting transmission information to data to be transmitted and transmitting / receiving the transmission / reception between terminals connected on a network, the strength of encryption applied to the transmission information is added to the data. An encryption method for data in a network that is stronger than the encryption method, wherein the data is image data, or an encryption key for the data is inserted in the transmission information.

【0008】[0008]

【発明の実施の形態】図1は本発明にかかる暗号化方式
の暗号化処理装置の一実施例の概念を示す図面である。
同図において12はシリアルイン・パラレルアウトシフト
レジスタ(S/Pレジスタ)であって、図中左方のデータ
生成部(図示しない)より到来したSMTPヘッダ9と伝送
情報10とイメージデータ11が保持されている状態を示し
ている。13a、13bは暗号化処理部であって、13aは弱い
暗号化を、13bは強い暗号化をそれぞれ施すものであ
る。14はパラレルイン・シリアルアウトシフトレジスタ
(P/Sレジスタ)であって、暗号化処理部13a、13bにて
暗号化を施したデータを保持しデータ列として次段に送
出するものである。 この暗号化装置は以下のように動
作する。セキュリティの必要のないSMTPヘッダ9につい
ては暗号化を施すことなくそのまま、重要な情報を多く
含む伝送情報10については暗号化処理部13bにて強い暗
号化を施した上で、イメージデータ11については暗号化
処理部13aにて弱い暗号化を施した上でS/Pレジスタ12か
らP/Sレジスタ14へ内容を移動する。具体的には、楕円
暗号、RSA, DES、非線形シフトレシ゛スタといった強い暗号方式
を伝送情報10に、線形シフトレシ゛スタ、簡単な転置、換置とい
った弱い暗号方式をイメージデータ11に施せばよい。こ
のような暗号方式を施すことによって伝送情報10につい
ては強い秘匿性を維持しつつ、データ量が比較的の少な
いので暗号化に要する処理時間はわずかであり、イメー
ジデータ11についても弱い暗号化を施すのみであるから
処理時間を大幅に短縮することが可能である。
DESCRIPTION OF THE PREFERRED EMBODIMENTS FIG. 1 is a diagram showing the concept of an embodiment of an encryption processing apparatus according to the present invention.
In the figure, reference numeral 12 denotes a serial-in / parallel-out shift register (S / P register), which holds an SMTP header 9, transmission information 10, and image data 11 arriving from a data generation unit (not shown) on the left side of the figure. It shows the state that is being done. 13a and 13b are encryption processing units, and 13a performs weak encryption and 13b performs strong encryption. Reference numeral 14 denotes a parallel-in / serial-out shift register (P / S register), which holds data encrypted by the encryption processing units 13a and 13b and sends it to the next stage as a data string. This encryption device operates as follows. The SMTP header 9 that does not require security is not subjected to encryption, and the transmission information 10 containing a lot of important information is subjected to strong encryption in the encryption processing unit 13b. After weak encryption is performed by the encryption processing unit 13a, the contents are moved from the S / P register 12 to the P / S register 14. More specifically, a strong encryption method such as elliptical encryption, RSA, DES, or a nonlinear shift register may be applied to the transmission information 10, and a weak encryption method such as a linear shift register, simple transposition, or transposition may be applied to the image data 11. By applying such an encryption method, while maintaining strong confidentiality for the transmission information 10, the processing time required for encryption is small because the data amount is relatively small, and weak encryption is also performed for the image data 11. Since only the application is performed, the processing time can be significantly reduced.

【0009】図2は本発明にかかる暗号化方式の復号化
処理装置の概念を示す図面であり、S/Pレジスタ21とP/S
レジスタ24の間に、弱い暗号化を復号する復号化処理部
22aと、強い暗号化を復号する復号化処理部22bとを配置
し、暗号化が施されたデータを元のデータ形式に復号す
るものである。この装置を用いることによって伝送先に
おける復号化も上述の暗号化と同様にその処理時間を大
幅に短縮することが可能となることは自明である。
FIG. 2 is a diagram showing the concept of a decryption processing device of the encryption system according to the present invention, wherein the S / P register 21 and the P / S
Between the registers 24, a decryption processing unit that decrypts weak encryption
22a and a decryption processing unit 22b for decrypting strong encryption are arranged to decrypt the encrypted data into the original data format. It is obvious that the use of this device can greatly reduce the processing time of the decryption at the transmission destination, similarly to the above-described encryption.

【0010】また、図3(a)、(b)に示すように、伝
送情報10にイメージデータに施す弱い暗号化方式の復号
鍵を記述しておくことで、弱い暗号方式の秘匿性を高め
ることもできる。例えば、弱い暗号化であってもその暗
号鍵すなわちこれを解読する為の復号鍵をランダムに頻
繁に変更することで暗号としての秘匿性を高めることが
できるのである。
[0010] As shown in FIGS. 3A and 3B, the confidentiality of the weak encryption method is improved by describing the weak encryption method decryption key to be applied to the image data in the transmission information 10. You can also. For example, even in the case of weak encryption, confidentiality as encryption can be improved by frequently and frequently changing the encryption key, that is, the decryption key for decrypting the encryption key.

【0011】更に、このとき伝送情報10の強い暗号化の
暗号鍵はSMTPヘッダ9に記述して伝送することもでき
る。尚、以上本発明をイメージデータをインターネット
を介して伝送する場合を例に説明したが、本発明はこれ
のみに限定されるものではなく、動画や音声と云った他
の如何なるデータであってのもよく、インターネット以
外のネットワークに適用可能なこと説明するまでもな
い。また、SMTPヘッダには一切暗号化を施さない例を示
したが、適宜暗号化を施しても良い。
Further, at this time, a strong encryption key of the transmission information 10 can be described in the SMTP header 9 and transmitted. Although the present invention has been described with reference to the case of transmitting image data via the Internet as an example, the present invention is not limited to this, and may be any other data such as moving images and audio. Needless to say, it is applicable to networks other than the Internet. In addition, although the example has been described in which the SMTP header is not encrypted at all, the encryption may be appropriately performed.

【0012】[0012]

【発明の効果】以上、本発明は上述したように構成する
ものであるから、イメージデータのような膨大なデータ
量を呈する情報を伝送する場合であっても、暗号化によ
るデータの秘匿性を損なうことなく暗号化及び伝送先で
の復号化に要する時間を極限する上で著しい効果を奏す
る。また、ユーザーが長時間データの到着を待たされる
といった不具合が解消でき、通信装置自体にかかる負担
を大幅に低減することもできる。
As described above, since the present invention is configured as described above, even when transmitting information having an enormous data amount such as image data, the confidentiality of the data by encryption is maintained. This has a remarkable effect in minimizing the time required for encryption and decryption at the transmission destination without loss. In addition, it is possible to solve the problem that the user has to wait for the arrival of data for a long time, and it is possible to greatly reduce the load on the communication device itself.

【0013】[0013]

【図面の簡単な説明】[Brief description of the drawings]

【図1】本発明にかかる暗号化方式の暗号化処理装置の
一実施例の概念を示す図面。
FIG. 1 is a diagram showing the concept of an embodiment of an encryption processing apparatus of an encryption system according to the present invention.

【図2】本発明にかかる暗号化方式の復号化処理装置の
一実施例の概念を示す図面。
FIG. 2 is a diagram showing the concept of an embodiment of a decryption processing device of an encryption system according to the present invention.

【図3】(a)、(b)は本発明にかかる暗号化方式の
他の実施例の概念を示す図面。
FIGS. 3A and 3B are diagrams showing the concept of another embodiment of the encryption system according to the present invention.

【図4】インターネットを利用した端末間のファクシミ
リ情報の伝送システムの形態を示す概念図。
FIG. 4 is a conceptual diagram showing a form of a system for transmitting facsimile information between terminals using the Internet.

【図5】データのフレームフォーマットの例を示す図。FIG. 5 is a diagram showing an example of a data frame format.

【符号の説明】[Explanation of symbols]

6、11 ・・・ イメージデータ 7、10 ・・・ 伝送情報 8、9 ・・・ SMTPヘッダ 12、21、31、41・・・シリアルイン・パラレル
アウトシフトレジスタ(S/Pレジスタ) 14、23、34、44・・・パラレルイン・シリアル
アウトシフトレジスタ(P/Sレジスタ)
6, 11 ... Image data 7, 10 ... Transmission information 8, 9 ... SMTP header 12, 21, 31, 41 ... Serial-in / parallel-out shift register (S / P register) 14, 23 , 34,44 ・ ・ ・ Parallel-in / serial-out shift register (P / S register)

Claims (3)

【特許請求の範囲】[Claims] 【請求項1】伝送すべきデータに伝送情報を付与し、こ
れをネットワーク上に接続した端末間で送受信するシス
テムに於いて、前記伝送情報に施す暗号の強さを前記デ
ータに施すそれよりも強くしたことを特徴とするネット
ワークにおけるデータの暗号方式。
In a system for transmitting transmission information to data to be transmitted and transmitting and receiving the transmission information between terminals connected on a network, the strength of encryption applied to the transmission information is set to be smaller than that applied to the data. A data encryption method in a network, characterized by being strengthened.
【請求項2】前記データがイメージデータであることを
特徴とする請求項1記載のネットワークにおけるデータ
の暗号方式
2. The data encryption method in a network according to claim 1, wherein said data is image data.
【請求項3】前記伝送情報に前記データの暗号鍵を挿入
したことを特徴とする請求項1又は2記載のネットワーク
におけるデータの暗号方式
3. The data encryption method in a network according to claim 1, wherein an encryption key of the data is inserted into the transmission information.
JP8299505A 1996-10-23 1996-10-23 Data cipher system in network Pending JPH10126406A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP8299505A JPH10126406A (en) 1996-10-23 1996-10-23 Data cipher system in network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP8299505A JPH10126406A (en) 1996-10-23 1996-10-23 Data cipher system in network

Publications (1)

Publication Number Publication Date
JPH10126406A true JPH10126406A (en) 1998-05-15

Family

ID=17873460

Family Applications (1)

Application Number Title Priority Date Filing Date
JP8299505A Pending JPH10126406A (en) 1996-10-23 1996-10-23 Data cipher system in network

Country Status (1)

Country Link
JP (1) JPH10126406A (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH11112491A (en) * 1997-10-06 1999-04-23 Toshiba Corp Call originating information monitoring method and terminal device
JP2000022684A (en) * 1998-07-01 2000-01-21 Nec Corp Method and system for data ciphering/deciphering communication
WO2001054099A1 (en) * 2000-01-21 2001-07-26 Sony Corporation Data authentication system
JP2002111652A (en) * 2000-07-26 2002-04-12 Rpk New Zealand Ltd Encryption processing for streaming media
JP2003005645A (en) * 2001-06-19 2003-01-08 Toshitada Kameda Method, system and apparatus encrypting, apparatus for decrypting and computer program
JP2003179595A (en) * 2001-12-13 2003-06-27 Celestar Lexico-Sciences Inc Cryptographic communication method, cryptographic communication system, computer for performing cryptographic communication, storage medium and program
JP2005539441A (en) * 2002-09-17 2005-12-22 エリコス ピッツォス Method and system for providing secure data delivery over public networks
JPWO2004034645A1 (en) * 2002-10-11 2006-02-09 松下電器産業株式会社 Method for protecting identification information in WLAN interconnection
JP2007522764A (en) * 2004-02-13 2007-08-09 アイブイアイ スマート テクノロジーズ インコーポレイテッド Method and apparatus for cryptographically processing data
JP2008028849A (en) * 2006-07-24 2008-02-07 Kddi Corp Hybrid encryption device and hybrid encryption method
JP2008125064A (en) * 2006-11-08 2008-05-29 Internatl Business Mach Corp <Ibm> Encrypted tape access control method and system via challenge-response protocol
US7519179B2 (en) 2003-05-29 2009-04-14 Sony Corporation Information transmission apparatus and method, information reception apparatus and method, and information-providing system
JP2009544183A (en) * 2006-07-13 2009-12-10 ドルビー・ラボラトリーズ・ライセンシング・コーポレーション Encryption of material expressing stimuli for human perception independent of codec
US8032943B2 (en) 1999-12-17 2011-10-04 Microsoft Corporation Accessing protected content in a rights-management architecture
US8332633B2 (en) 2000-07-26 2012-12-11 General Instrument Corporation Encryption processing for streaming media
JP2016517248A (en) * 2013-04-25 2016-06-09 ツリーボックス・ソリューションズ・ピーティーイー・リミテッド A method performed by at least one server for processing data packets from a first computing device to a second computing device to allow end-to-end encrypted communication
JP2018074478A (en) * 2016-11-01 2018-05-10 株式会社リコー Data processing system, data processing device, data processing method, and program
JP2021524217A (en) * 2018-09-17 2021-09-09 華為技術有限公司Huawei Technologies Co.,Ltd. Package sending method, package receiving method and network device

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH11112491A (en) * 1997-10-06 1999-04-23 Toshiba Corp Call originating information monitoring method and terminal device
JP2000022684A (en) * 1998-07-01 2000-01-21 Nec Corp Method and system for data ciphering/deciphering communication
US8032943B2 (en) 1999-12-17 2011-10-04 Microsoft Corporation Accessing protected content in a rights-management architecture
US7669052B2 (en) 2000-01-21 2010-02-23 Sony Corporation Authentication and encryption utilizing command identifiers
WO2001054099A1 (en) * 2000-01-21 2001-07-26 Sony Corporation Data authentication system
US8375206B2 (en) 2000-01-21 2013-02-12 Sony Corporation Authentication and encryption utilizing command identifiers
US7373506B2 (en) 2000-01-21 2008-05-13 Sony Corporation Data authentication system
JP2002111652A (en) * 2000-07-26 2002-04-12 Rpk New Zealand Ltd Encryption processing for streaming media
US8332633B2 (en) 2000-07-26 2012-12-11 General Instrument Corporation Encryption processing for streaming media
JP2003005645A (en) * 2001-06-19 2003-01-08 Toshitada Kameda Method, system and apparatus encrypting, apparatus for decrypting and computer program
JP2003179595A (en) * 2001-12-13 2003-06-27 Celestar Lexico-Sciences Inc Cryptographic communication method, cryptographic communication system, computer for performing cryptographic communication, storage medium and program
JP2005539441A (en) * 2002-09-17 2005-12-22 エリコス ピッツォス Method and system for providing secure data delivery over public networks
JPWO2004034645A1 (en) * 2002-10-11 2006-02-09 松下電器産業株式会社 Method for protecting identification information in WLAN interconnection
JP4619788B2 (en) * 2002-10-11 2011-01-26 パナソニック株式会社 Method for protecting identification information in WLAN interconnection
JP2009246988A (en) * 2002-10-11 2009-10-22 Panasonic Corp Identification information protection method in wlan interconnection
US7945777B2 (en) 2002-10-11 2011-05-17 Panasonic Corporation Identification information protection method in WLAN inter-working
US8145895B2 (en) 2003-05-29 2012-03-27 Sony Corporation Information transmission apparatus and method, information reception apparatus and method, and information-providing system
US7519179B2 (en) 2003-05-29 2009-04-14 Sony Corporation Information transmission apparatus and method, information reception apparatus and method, and information-providing system
JP2007522764A (en) * 2004-02-13 2007-08-09 アイブイアイ スマート テクノロジーズ インコーポレイテッド Method and apparatus for cryptographically processing data
JP2009544183A (en) * 2006-07-13 2009-12-10 ドルビー・ラボラトリーズ・ライセンシング・コーポレーション Encryption of material expressing stimuli for human perception independent of codec
JP2008028849A (en) * 2006-07-24 2008-02-07 Kddi Corp Hybrid encryption device and hybrid encryption method
JP2008125064A (en) * 2006-11-08 2008-05-29 Internatl Business Mach Corp <Ibm> Encrypted tape access control method and system via challenge-response protocol
US9141819B2 (en) 2006-11-08 2015-09-22 International Business Machines Corporation Encrypted tape access control via challenge-response protocol
JP2016517248A (en) * 2013-04-25 2016-06-09 ツリーボックス・ソリューションズ・ピーティーイー・リミテッド A method performed by at least one server for processing data packets from a first computing device to a second computing device to allow end-to-end encrypted communication
US10009321B2 (en) 2013-04-25 2018-06-26 Treebox Solutions Pte Ltd Method performed by at least one server for processing a data packet from a first computing device to a second computing device to permit end-to-end encryption communication
JP2018074478A (en) * 2016-11-01 2018-05-10 株式会社リコー Data processing system, data processing device, data processing method, and program
JP2021524217A (en) * 2018-09-17 2021-09-09 華為技術有限公司Huawei Technologies Co.,Ltd. Package sending method, package receiving method and network device
US11888904B2 (en) 2018-09-17 2024-01-30 Huawei Technologies Co., Ltd. Packet sending method, packet receiving method, and network device

Similar Documents

Publication Publication Date Title
JPH10126406A (en) Data cipher system in network
US7055027B1 (en) System and method for trusted inspection of a data stream
Pereira et al. The ESP CBC-mode cipher algorithms
EP0861540B1 (en) Apparatus and method for encrypting MPEG packets
US6061454A (en) System, method, and computer program for communicating a key recovery block to enable third party monitoring without modification to the intended receiver
EP2068526B1 (en) End-to-end network security with traffic visibility
US6704866B1 (en) Compression and encryption protocol for controlling data flow in a network
CA2416092A1 (en) Secure packet-based data broadcasting architecture
MXPA06009235A (en) Method and apparatus for cryptographically processing data.
US6546486B1 (en) Content screening with end-to-end encryption within a firewall
CN112347493A (en) Encryption, decryption and graying method for OFD (office file)
JPH09307542A (en) Data transmitter and data transmission method
KR100624691B1 (en) Apparatus and method for decryption processing of block encrypted data
JPH1022992A (en) Multi-address cipher communication method for message and storage medium
Kummert The PPP Triple-DES Encryption Protocol (3DESE)
WO2002067100A9 (en) Encryption and decryption system for multiple node network
JPH1041934A (en) Information ciphering decoding method and information ciphering decoder
JP4933286B2 (en) Encrypted packet communication system
JP2003244194A (en) Data encrypting apparatus, encryption communication processing method, and data relaying apparatus
CN100450119C (en) Method for transferring cryptograph in IP video meeting system
JPH0677954A (en) Apparatus and method for processing of code provided with arbitrary selective status encoding
JPH0646052A (en) Encipherment system in high speed transport mechanism
JP3759507B2 (en) Communication device, relay device, communication control method, and communication control program
WO2002011390A3 (en) Network security accelerator
Pereira et al. RFC2451: The ESP CBC-Mode Cipher Algorithms