JPS59107658A - Method and apparatus of private talk - Google Patents

Method and apparatus of private talk

Info

Publication number
JPS59107658A
JPS59107658A JP21670982A JP21670982A JPS59107658A JP S59107658 A JPS59107658 A JP S59107658A JP 21670982 A JP21670982 A JP 21670982A JP 21670982 A JP21670982 A JP 21670982A JP S59107658 A JPS59107658 A JP S59107658A
Authority
JP
Japan
Prior art keywords
signal
discrete
circuit
random number
analog signal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
JP21670982A
Other languages
Japanese (ja)
Other versions
JPH0527291B2 (en
Inventor
Yoshihiko Akaiwa
芳彦 赤岩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NEC Corp
Original Assignee
NEC Corp
Nippon Electric Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NEC Corp, Nippon Electric Co Ltd filed Critical NEC Corp
Priority to JP21670982A priority Critical patent/JPS59107658A/en
Priority to AU22257/83A priority patent/AU561204B2/en
Priority to GB08332970A priority patent/GB2132857B/en
Priority to CA000442943A priority patent/CA1206528A/en
Publication of JPS59107658A publication Critical patent/JPS59107658A/en
Publication of JPH0527291B2 publication Critical patent/JPH0527291B2/ja
Granted legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • H04K1/04Secret communication by frequency scrambling, i.e. by transposing or inverting parts of the frequency band or by inverting the whole band

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Synchronisation In Digital Transmission Systems (AREA)

Abstract

PURPOSE:To eliminate for a synchronizing circuit and to obtain almost infinite number of keys for the private talk by ciphering and transmitting discrete information being converted into private talk and applying private talk inversion to the said information by the information decoded at a receiving side. CONSTITUTION:An analog signal to be transmitted is inputted to a private talk converting circuit 2 where the signal is applied with private talk conversion. The private talk conversion is attained by dividing an input signal into plural bands and rearranging them, and as a signal selecting the combination of rearrangement, a signal from a discrete number generating circuit 4 inputting an output signal of a random number series generating circuit 3 is used. A part of an output of the circuit 3 is inputted to a ciphering circuit, where a ciphered output is obtained. A private talk analog signal and a ciphered discrete signal are obtained from a receiving signal at an input terminal 21 at a signal generating circuit 26, and the discrete signal is decoded at a deciphering circuit 25 and a random number series is obtained. This random number series is applied to a discrete number generating circuit 24, and its output becomes a control input to a private talk inverting circuit 22. On the other hand, the private talk analog signal is inputted to the circuit 22, where the said signal is subject to the control of an output of the circuit 24 and the original analog signal is reproduced.

Description

【発明の詳細な説明】 本発明は、アナログ信号の秘話通信方法および装置に係
り、特に秘話同期が容易になる秘話通信および装置に関
する。通信の秘密を守るために、これまで種々の秘話通
信技術が開発されてきた。
DETAILED DESCRIPTION OF THE INVENTION The present invention relates to a confidential communication method and device for analog signals, and more particularly to a confidential communication method and device that facilitates confidential communication synchronization. Various confidential communication techniques have been developed to protect the confidentiality of communications.

特に、アナログ信号を秘匿化するための秘話技術は、そ
の種類が多い。秘話の目的を達するために、送信信号に
何らかの変換を行えばよいのであるが、秘話強度を上げ
るためには、変換操作を時間的に変化させなければなら
ない。受信側で秘話の逆変換を行って送信信号を得るた
めには、送信側で時間とともに変化させた変換操作と同
期して秘話逆変換を行わなければならないので、受信側
では、そのための同期をとる必要がある。
In particular, there are many types of secret techniques for concealing analog signals. In order to achieve the purpose of secret speech, it is sufficient to perform some kind of conversion on the transmitted signal, but in order to increase the strength of secret speech, the conversion operation must be changed over time. In order to obtain a transmitted signal by inversely converting the confidential message on the receiving side, the inverse confidential conversion must be performed in synchronization with the conversion operation that changed over time on the transmitting side. I need to take it.

従来のアナログ秘話技術においては、同期をとるための
信号をアナログ信号とは独立に送信していた。例えば、
送信と受信側に別個に乱数発生器を持っており、会話に
先だち、同期用の信号を送信して、同期をとる方法や、
送信アナログ情報とともに、同期信号を常に送信する方
法が知られている。同期信号は、秘話変換の周期に対応
するものであるから、秘話強度を上げるためには、秘話
変換の周期を長くとる必要がある。その結果、同期を確
立するために長い時間を必要とすることζこなると同時
に、複雑な同期回路を必要とする欠点があった。
In conventional analog secret communication technology, signals for synchronization were transmitted independently of analog signals. for example,
There are separate random number generators on the transmitting and receiving sides, and a synchronization signal is sent prior to conversation to achieve synchronization.
A method is known in which a synchronization signal is always transmitted together with the transmitted analog information. Since the synchronization signal corresponds to the period of secret conversion, it is necessary to increase the period of secret conversion in order to increase the privacy strength. As a result, it takes a long time to establish synchronization, and at the same time, it requires a complicated synchronization circuit.

本発明の目的は、このような欠点のない、同期信号を全
く送る必要がないか、あったとしても、はるかに短い時
間で同期を確立することができる秘話方法および装置を
提供することにある。
The object of the present invention is to provide a confidential method and device which does not have such drawbacks and allows synchronization to be established in a much shorter time, without the need to send any synchronization signals. .

本発明によれば、乱数系列を発生し、該乱数系列によっ
て発生される離散値に対応して、送信すべきアナログ信
号に秘話変換を施して得られる第1のアナログ信号と、
前記乱数系列を暗号化して得られた第2の離散的な信号
とを合成して得られる信号を送信し、受信側においては
、送信側で行った第1および第2の信号の合成の逆操作
を行うことにより、第1のアナログ信号と第2の離散的
な信号とを分離し、第2の離散的信号を暗号復号化して
得られる信号によって発生された離散値に対応して、送
信側で行った秘話変換の逆変換を行うことによって、上
記目的を達成できる。
According to the present invention, a first analog signal obtained by generating a random number sequence and performing secret conversion on an analog signal to be transmitted in accordance with the discrete values generated by the random number sequence;
A signal obtained by combining the random number sequence with a second discrete signal obtained by encrypting the random number sequence is transmitted, and on the receiving side, the inverse of the combination of the first and second signals performed on the transmitting side is transmitted. By performing an operation, the first analog signal and the second discrete signal are separated, and the second discrete signal is decrypted and the discrete value generated by the signal obtained is transmitted. The above purpose can be achieved by performing inverse transformation of the secret transformation performed on the side.

以下、図面を用いて詳しい説明を行う。第1図は本発明
における秘話送信装置、第2図は、受信装置の実施例の
ブロック図である。送信すべきアナログ信号は入力端子
1から入力されて、秘話変換回路2に入力され、秘話の
ための変換が行われている。秘話変換は具体的にはどの
ような変換でもよく、例えば、入力信号を複数の帯域に
分割して入れ換える帯域分割入れ換え方式などが考えら
れる。このとき、入れ換え方には多数の組み合わせが考
えられる。この組み合わせを選択する信号(5) として、乱数系列発生回路3の出力信号を入力とする離
散的数値発生回路4を用いろ。この回路は例えば、第3
図のように、実現できる。乱数系列は入力端子31より
入力され、11次シフトレジスタの各段32 、33 
、34に格納される。今、乱数系列として2値の信号を
考えれば、この回路では3段のシフトレジスタを使用し
ているので、合計8とおりの組み合わせ方が得られる。
A detailed explanation will be given below using the drawings. FIG. 1 is a block diagram of an embodiment of the secret message transmitting device and FIG. 2 is a receiving device according to the present invention. An analog signal to be transmitted is input from an input terminal 1 and input to a confidential conversion circuit 2, where it is converted for confidential communication. Specifically, the secret conversion may be any type of conversion; for example, a band division/exchange method may be used in which the input signal is divided into a plurality of bands and exchanged. At this time, many combinations can be considered for the replacement method. As the signal (5) for selecting this combination, use the discrete number generation circuit 4 which receives the output signal of the random number sequence generation circuit 3 as input. This circuit, for example,
This can be achieved as shown in the figure. The random number sequence is input from the input terminal 31, and is input to each stage 32, 33 of the 11th order shift register.
, 34. Now, if we consider a binary signal as a random number series, this circuit uses a three-stage shift register, so a total of eight combinations can be obtained.

同図で変換回路35は、シフトレジスタの内容に応じて
秘話変換回路の制御信号を出力端子36に発生させ、こ
れを秘話変換回路2の制御信号入力とするものである。
In the figure, the conversion circuit 35 generates a control signal for the secret conversion circuit at an output terminal 36 in accordance with the contents of the shift register, and uses this as a control signal input to the secret conversion circuit 2.

乱数系列発生回路3の出力信号の一部は、暗号化回路5
に入力され暗号化された出力が得られる。
A part of the output signal of the random number sequence generation circuit 3 is sent to the encryption circuit 5.
is input and the encrypted output is obtained.

暗号化回路の実現法は例えば、第4図(a)のような自
己同期暗号化法が考えられる。乱数系列は入力端子41
より入力され、NgLM号の場合にはNを法とする加算
回路42によって、別途説明する関数発生回路46の出
力信号との加算が行われ、出力端子47より出力される
。それと同時に、出力信号の一部はシフトレジスタ43
 、44 、45に順次入力される。
A possible method for implementing the encryption circuit is, for example, a self-synchronized encryption method as shown in FIG. 4(a). Random number series is input terminal 41
In the case of the NgLM number, an addition circuit 42 modulo N performs addition with an output signal of a function generation circuit 46, which will be described separately, and output from an output terminal 47. At the same time, part of the output signal is transferred to the shift register 43.
, 44, and 45 in sequence.

(6) 関数発生回路46は各シフトレジスタの内容によって一
義的に定まる信号を発生させるものである。
(6) The function generating circuit 46 generates a signal uniquely determined by the contents of each shift register.

その詳しい動作は、暗号技術などでよく知られて1いる
ので、ここでは説明しない。ここで、暗号復号化回路2
5(第2図)の動作をfR4図(b)を用いて説明して
おく。後で説明するように、暗号化回路の出ぐ系列は、
受信側において、暗号復号化回路の入力端子48に受信
される。受信信号系列は一部シフトレジスタ43 、4
4 、45に順次入力されるとともに、先に説明した関
数発生回路46の出力と加算回路42によって加算され
、暗号化回路に入力されたのと同じ信号系列が得られる
。この動作は、回路実現が最も容易である2値(0,1
)の信号系列を考えると理解しやすい。今、信号遅延を
無視すれば、暗号化回路および暗号復号化回路のシフト
レジスタ43 、44 、45ζこはそれぞれ同じ値が
格納されている。したがって、各々の関数発生回路46
の出力も同じ値を発生することになる。暗号化回路の入
力端子41に入力された信号に対して、0あるいは1の
値が2度続けて加算されることになる。
The detailed operation is well known in cryptographic technology, etc., so it will not be explained here. Here, the encryption/decryption circuit 2
5 (FIG. 2) will be explained using fR4 diagram (b). As explained later, the sequence of encryption circuits is
On the receiving side, it is received at the input terminal 48 of the encryption/decryption circuit. Part of the received signal sequence is transferred to shift registers 43 and 4.
4 and 45, and is added to the output of the function generating circuit 46 described earlier by the adder circuit 42 to obtain the same signal sequence as that input to the encryption circuit. This operation is the easiest to implement in a circuit, which is binary (0, 1
) is easy to understand by considering the signal sequence. Now, if signal delays are ignored, the same values are stored in the shift registers 43, 44, and 45ζ of the encryption circuit and the encryption/decryption circuit, respectively. Therefore, each function generating circuit 46
The output of will also produce the same value. A value of 0 or 1 is added twice in succession to the signal input to the input terminal 41 of the encryption circuit.

2を法とする加算においてはよく知られているように、
入力信号に0を2度加算しても、あるいは1を2度加算
しても、その値は変化しない。したがって、復号化回路
の出力端子49には、暗号化回路の入力信号と同じ信号
系列が得られる。盗聴しようとするものが仮に暗号化回
路の出力信号を通信の途中で知り得たとしても、暗号復
号化回路の動作、特に、関数発生回路イ6の動作を知ら
なければ、もとの信号を知ることはできない。以上説明
した暗号化回路および復号化回路の動作は、従来の暗号
、復号技術と何ら変るものではなく、従来の技術がその
才ま使える。
As is well known in addition modulo 2,
Even if 0 is added twice to the input signal, or 1 is added twice to the input signal, the value does not change. Therefore, the same signal sequence as the input signal of the encryption circuit is obtained at the output terminal 49 of the decryption circuit. Even if the person trying to eavesdrop on the output signal of the encryption circuit during the communication, if he does not know the operation of the encryption/decryption circuit, especially the operation of the function generator circuit A6, he will not be able to retrieve the original signal. It's impossible to know. The operations of the encryption circuit and decryption circuit described above are no different from conventional encryption and decryption techniques, and the conventional techniques can be used to their full potential.

再び第1図にもどる。秘話変換回路2の出力の秘話信号
は、暗号化回路5の出力信号とともに、合成回路6によ
って合成されたのち、出力端子7から送信される。ここ
で、合成回路6は、例えば、第5図に示したように、周
波数軸で分離して合成することが考えられる。同図(a
)は、秘話アナログ信号の電カスベクトルであり、同図
(blは暗号化された離散的信号で変調された信号のス
ペクトルである。ここで、変調は、周波数帯を分離する
ために行ったものであり、必ずしも必要ではなく、単な
る周波数変換であってもよい。合成方法はその他時間軸
で分離する方法なども考えられ、いずれにせよ、受信側
で再び2つの信号を分離できる方法であればどのような
方法でもよい。
Return to Figure 1 again. The secret speech signal output from the secret speech conversion circuit 2 is combined with the output signal from the encryption circuit 5 by a synthesis circuit 6, and then transmitted from an output terminal 7. Here, it is conceivable that the synthesis circuit 6 separates and synthesizes on the frequency axis, as shown in FIG. 5, for example. The same figure (a
) is the electric cassette vector of the confidential analog signal, and in the same figure (bl is the spectrum of the signal modulated with the encrypted discrete signal. Here, the modulation was performed to separate the frequency bands. However, it is not necessarily necessary, and simple frequency conversion may be used.Other methods of synthesis such as separation on the time axis can be considered, and in any case, any method that allows the two signals to be separated again on the receiving side is possible. Any method is fine.

第2図は本発明における秘話受信装置の実施例を示すブ
ロック図である。入力端子21に受信された信号は、信
号分離回路26によって、送信側で合成された秘話アナ
ログ信号と暗号化された離散的信号が得られる。具体的
には、例えば、第5図に示したように周波数軸上で分離
して合成されている場合には、低域通過フィルタおよび
高域通過フィルタによっそ分離できる。離散的信号によ
って変調が行われている場合には、復調も行うものとす
る。
FIG. 2 is a block diagram showing an embodiment of the confidential message receiving device according to the present invention. The signal received at the input terminal 21 is processed by the signal separation circuit 26 into a confidential analog signal combined on the transmitting side and an encrypted discrete signal. Specifically, for example, when the signals are separated and synthesized on the frequency axis as shown in FIG. 5, separation can be easily performed using a low-pass filter and a high-pass filter. If modulation is performed using a discrete signal, demodulation is also performed.

暗号化された離散的信号は暗号復号回路25によって復
号され、送信した乱数系列が得られる。この乱数系列は
離散的数値発生回路24に加えられ、その出力は秘話逆
変換回路22の制御入力となる。
The encrypted discrete signal is decoded by the decryption circuit 25 to obtain the transmitted random number sequence. This random number sequence is applied to the discrete number generation circuit 24, and its output becomes the control input of the confidential speech inverse conversion circuit 22.

(9) ここで、離散的数値発生回路は、例えば、第3図で示し
たものと同じように動作し、レジスタ32゜33 、3
4の内容は送信側で秘話変換を行った際のレジスタの中
味と同じである。したがって、同一のレジスタ内容に対
して送信側と受信側離散的数値発生回路の内容を、秘話
変換が逆変換で元にもどるような数値に定めておけばよ
い。送信アナログ信号は、秘話逆変換回路22の出力と
して、出力端子27に得られる。
(9) Here, the discrete numerical value generating circuit operates in the same manner as shown in FIG.
The contents of 4 are the same as the contents of the register when secret conversion was performed on the transmitting side. Therefore, for the same register contents, the contents of the discrete numerical value generation circuits on the transmitting side and the receiving side may be determined to be such numerical values that the secret conversion returns to the original value by inverse conversion. The transmitted analog signal is obtained at the output terminal 27 as the output of the private speech inverse conversion circuit 22.

以上、述べたように本発明においては、秘話変換を行っ
た際の離散的情報を暗号化して送信して、受信側におい
ては、暗号を復号化して得られた情報によって秘話逆変
換を行うものであり、何ら同期情報を伝送する必要がな
い。そのために、従来技術のように、同期確立のために
要する時間あるいは、同期回路が不要になる効果がある
。また同期をとる必要がないため、使用できる乱数系列
に制限がなく、例えば物理的雑音から発生された乱数系
列を使用できるなど、秘話鍵が無限に近くとれる効果が
ある。
As described above, in the present invention, the discrete information obtained when secret conversion is performed is encrypted and transmitted, and the receiving side performs secret conversion inversely using the information obtained by decoding the code. Therefore, there is no need to transmit any synchronization information. Therefore, there is an effect that the time required to establish synchronization or the synchronization circuit as in the prior art is not required. Furthermore, since there is no need for synchronization, there is no limit to the random number sequences that can be used; for example, random number sequences generated from physical noise can be used, which has the effect of making it possible to obtain an almost infinite number of private keys.

(10) 離散的信号を暗号化する方法として、ここで説明した以
外に同期方式の暗号化法も知られており、本発明におい
てもこれを使用できる。このときには、ただし、暗号復
号のための同期をとる必要がある。しかし、この場合に
も、秘話変換のための乱数系列には何ら制限が加わらな
く、秘話鍵の個数も変らない。暗号回路の入力信号が乱
数系列であるので、暗号化のための周期は短くてもすむ
ので、従来の同期秘話方式に比べて、同期時間は短くな
る。
(10) In addition to the method described here, a synchronous encryption method is also known as a method for encrypting a discrete signal, and this can be used in the present invention as well. At this time, however, it is necessary to synchronize for encryption and decryption. However, even in this case, no restrictions are placed on the random number sequence for secret conversion, and the number of secret keys does not change. Since the input signal to the encryption circuit is a random number sequence, the cycle for encryption can be short, so the synchronization time is shorter than in the conventional synchronous secret communication method.

本発明で用いる乱数系列発生回路は、何ら限定する必要
がなく、例えば、送信すべきデータ信号、あるいはこれ
を暗号化した信号を用いてもよい。
The random number sequence generation circuit used in the present invention does not need to be limited in any way, and may use, for example, a data signal to be transmitted or a signal obtained by encrypting the data signal.

このときには、受信側の暗号復号器の出力には送信した
データ信号が得られるので、会話を行いながら、データ
伝送も行えるという効果もある。従来の秘話方式では、
例えば第5図(b)の部分には、同期信号を送っている
ので、この部分の帯域をみすみす損したのであるが、こ
の場合には、この帯域もデータ伝送として、有効に利用
していることになる。
At this time, since the transmitted data signal is obtained as the output of the decryptor on the receiving side, there is also the effect that data transmission can be performed while having a conversation. In the traditional secret method,
For example, since a synchronization signal is being sent to the part shown in Figure 5(b), the band for this part is wasted, but in this case, this band can also be used effectively for data transmission. It turns out.

【図面の簡単な説明】[Brief explanation of the drawing]

第1図は本発明の秘話受信装置の実施例を示すブロック
図、第2図は本発明の秘話受信装置の実施例を示すブロ
ック図、第3図は、本発明に用い化回路の実施例を示す
ブロック図、第5図は、本発明に用いる信号合成回路の
例の動作を示すスペクトル図である。 これらの図において、1,31.41は信号入力端子、
7 、27 、36 、47 、49は信号出力端子、
2は秘話変換回路、3は乱数発生回路、4.24は離散
的数値発生回路、5は暗号化回路、6は合成回路、26
は分離回路、25は暗号復号化回路、22は秘話逆変換
回路、32 、33 、34 、43 、旧、45はレ
ジスタ、35は変換回路、42は加算回路、46は閏数
発生回路第 1 図 第2図     C1 第3図 1 ( 笥4図 ) 0−
FIG. 1 is a block diagram showing an embodiment of the confidential message receiving device of the present invention, FIG. 2 is a block diagram showing an embodiment of the confidential message receiving device of the present invention, and FIG. 3 is an example of the circuit used in the present invention. FIG. 5 is a spectral diagram showing the operation of an example of the signal synthesis circuit used in the present invention. In these figures, 1, 31, 41 are signal input terminals,
7, 27, 36, 47, 49 are signal output terminals,
2 is a secret conversion circuit, 3 is a random number generation circuit, 4.24 is a discrete number generation circuit, 5 is an encryption circuit, 6 is a synthesis circuit, 26
25 is a separation circuit, 25 is an encryption/decryption circuit, 22 is a confidential inverse conversion circuit, 32, 33, 34, 43, old, 45 is a register, 35 is a conversion circuit, 42 is an addition circuit, 46 is a leap number generation circuit No. 1 Figure 2 C1 Figure 3 1 (Figure 4) 0-

Claims (5)

【特許請求の範囲】[Claims] (1)乱数系列を発生し、該乱数系列によって発生され
る離散値に対応して、送信すべきアナログ信号に秘話変
換を施して得られる第1のアナログ信号と、前記乱数系
列を暗号化して得られた第2の離散的な信号とを合成し
て得られる信号を送信し、受信側においては、送信側で
行った第1および第2の信号の合成の逆操作を行うこと
により、第1のアナログ信号と第2の離散的な信号とを
分離し、第2の離散的信号を暗号復号化して得られる信
号によって発生される離散値に対応して、送信側で行っ
た秘話変換の逆変換を行い、送信アナログ信号を得るこ
とを特徴とする秘話方法。
(1) Generating a random number sequence, and encrypting the first analog signal obtained by performing secret conversion on the analog signal to be transmitted in accordance with the discrete values generated by the random number sequence, and the random number sequence. The signal obtained by combining the obtained second discrete signal is transmitted, and the receiving side performs the inverse operation of combining the first and second signals performed on the transmitting side. The first analog signal and the second discrete signal are separated, and the second discrete signal is decrypted to generate a discrete value. A confidential communication method characterized by performing inverse conversion and obtaining a transmitted analog signal.
(2)乱数系列を発生させる手段と、該乱数系列によっ
て発生される離散値に対応して、送信すべきアナログ信
号に秘話変換を行う手段と、前記乱数(1) 系列を暗号化する暗号器と、該暗号器から得られる離散
的信号と前記秘話変換を行う手段から得られるアナログ
信号とを合成して得られる信号を送信することを特徴と
する秘話送信装置。
(2) means for generating a random number sequence; means for performing secret conversion into an analog signal to be transmitted in accordance with the discrete values generated by the random number sequence; and an encoder for encrypting the random number sequence (1). and a discrete signal obtained from the encoder and an analog signal obtained from the means for performing the secret speech conversion, and transmits a signal obtained by combining the discrete signal and the analog signal obtained from the means for performing secret speech conversion.
(3)乱数系列を暗号化する方法として自己同期暗号化
を用いた特許請求の範囲第(2)項記載の秘話送信装置
(3) The confidential message transmission device according to claim (2), which uses self-synchronized encryption as a method of encrypting the random number sequence.
(4)秘話変換を行うために発生させる離散値が乱数系
列をブロック単位lこ区切ることなく連続しての秘話送
信装置。
(4) A confidential message transmitting device in which the discrete values generated for performing confidential conversion are continuous without dividing the random number sequence into blocks.
(5)乱数系列を発生し、該乱数系列によって発生され
る離散値に対応して、送信すべきアナログ信号に秘話変
換を施して得られる第1のアナログ信号と、前記乱数系
列を暗号化した第2の離散信号とを合成して送信された
信号を受信する秘話受信装置において、送信側で行った
前記第1のアナログ信号と前記第2の離散的信号の合成
の逆操作を行うことにより第1のアナログ信号と第2の
離散(2) 的信号とを分離する手段と、前記第2の離散的信号の暗
号復号化を行う復号器と、該復号器から得られる信号に
よって離散的信号を発生させ、これに対応して、送信側
で行った秘話変換の逆操作を行う手段とを有し、これか
ら得られる信号を受信アナログ信号とすることを特徴と
する秘話受信装置。
(5) Generating a random number sequence, and encrypting the first analog signal obtained by encrypting the analog signal to be transmitted and encrypting the random number sequence in accordance with the discrete values generated by the random number sequence. In a confidential reception device that receives a signal transmitted by combining a second discrete signal, by performing a reverse operation of combining the first analog signal and the second discrete signal performed on the transmitting side. means for separating a first analog signal and a second discrete signal; a decoder for decoding the second discrete signal; and a signal obtained from the decoder to generate a discrete signal. What is claimed is: 1. A confidential communication receiving device, comprising means for generating a confidential communication and correspondingly performing a reverse operation of the confidential conversion performed on the transmitting side, and using a signal obtained from this as a received analog signal.
JP21670982A 1982-12-10 1982-12-10 Method and apparatus of private talk Granted JPS59107658A (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
JP21670982A JPS59107658A (en) 1982-12-10 1982-12-10 Method and apparatus of private talk
AU22257/83A AU561204B2 (en) 1982-12-10 1983-12-09 Voice encryption and decryption system
GB08332970A GB2132857B (en) 1982-12-10 1983-12-09 Voice encryption and decryption system
CA000442943A CA1206528A (en) 1982-12-10 1983-12-09 Voice encryption and decryption system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP21670982A JPS59107658A (en) 1982-12-10 1982-12-10 Method and apparatus of private talk

Related Child Applications (1)

Application Number Title Priority Date Filing Date
JP4052288A Division JPH0756975B2 (en) 1992-03-11 1992-03-11 Confidential receiver

Publications (2)

Publication Number Publication Date
JPS59107658A true JPS59107658A (en) 1984-06-21
JPH0527291B2 JPH0527291B2 (en) 1993-04-20

Family

ID=16692686

Family Applications (1)

Application Number Title Priority Date Filing Date
JP21670982A Granted JPS59107658A (en) 1982-12-10 1982-12-10 Method and apparatus of private talk

Country Status (4)

Country Link
JP (1) JPS59107658A (en)
AU (1) AU561204B2 (en)
CA (1) CA1206528A (en)
GB (1) GB2132857B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5272755A (en) * 1991-06-28 1993-12-21 Matsushita Electric Industrial Co., Ltd. Public key cryptosystem with an elliptic curve
US5351297A (en) * 1991-06-28 1994-09-27 Matsushita Electric Industrial Co., Ltd. Method of privacy communication using elliptic curves
US5442707A (en) * 1992-09-28 1995-08-15 Matsushita Electric Industrial Co., Ltd. Method for generating and verifying electronic signatures and privacy communication using elliptic curves
CN100358037C (en) * 1999-07-20 2007-12-26 三星电子株式会社 Scrambler and scrambling method

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2151886A (en) * 1983-12-21 1985-07-24 British Broadcasting Corp Conditional-access broadcast transmission
US5680460A (en) * 1994-09-07 1997-10-21 Mytec Technologies, Inc. Biometric controlled key generation
US5541994A (en) * 1994-09-07 1996-07-30 Mytec Technologies Inc. Fingerprint controlled public key cryptographic system
US5712912A (en) * 1995-07-28 1998-01-27 Mytec Technologies Inc. Method and apparatus for securely handling a personal identification number or cryptographic key using biometric techniques
US5740276A (en) * 1995-07-27 1998-04-14 Mytec Technologies Inc. Holographic method for encrypting and decrypting information using a fingerprint
US6289314B1 (en) * 1996-09-18 2001-09-11 Matsushita Electric Industrial Co., Ltd. Pay information providing system for descrambling information from plural sources and rescrambling the information before sending to a terminal or terminals
DE19715644A1 (en) * 1997-04-15 1998-10-22 Iks Gmbh Information Kommunika Identity verification procedures
CA2203212A1 (en) 1997-04-21 1998-10-21 Vijayakumar Bhagavatula Methodology for biometric encryption
US7841539B2 (en) 2007-02-15 2010-11-30 Alfred Hewton Smart card with random temporary account number generation

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS5382101A (en) * 1976-12-27 1978-07-20 Nissin Electric Co Ltd Method of transmitting signal
JPS56143744A (en) * 1980-04-09 1981-11-09 Nec Corp Data interchanging system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4052565A (en) * 1975-05-28 1977-10-04 Martin Marietta Corporation Walsh function signal scrambler
US4341925A (en) * 1978-04-28 1982-07-27 Nasa Random digital encryption secure communication system
GB2042849B (en) * 1979-02-20 1983-04-13 Payview Ltd Encoding of information

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS5382101A (en) * 1976-12-27 1978-07-20 Nissin Electric Co Ltd Method of transmitting signal
JPS56143744A (en) * 1980-04-09 1981-11-09 Nec Corp Data interchanging system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5272755A (en) * 1991-06-28 1993-12-21 Matsushita Electric Industrial Co., Ltd. Public key cryptosystem with an elliptic curve
US5351297A (en) * 1991-06-28 1994-09-27 Matsushita Electric Industrial Co., Ltd. Method of privacy communication using elliptic curves
US5442707A (en) * 1992-09-28 1995-08-15 Matsushita Electric Industrial Co., Ltd. Method for generating and verifying electronic signatures and privacy communication using elliptic curves
CN100358037C (en) * 1999-07-20 2007-12-26 三星电子株式会社 Scrambler and scrambling method

Also Published As

Publication number Publication date
CA1206528A (en) 1986-06-24
GB8332970D0 (en) 1984-01-18
AU2225783A (en) 1984-06-14
AU561204B2 (en) 1987-04-30
GB2132857B (en) 1986-09-03
GB2132857A (en) 1984-07-11
JPH0527291B2 (en) 1993-04-20

Similar Documents

Publication Publication Date Title
US5727064A (en) Cryptographic system for wireless communications
JPS59107658A (en) Method and apparatus of private talk
EP1994672B1 (en) Method and apparatus for synchronous stream cipher encryption with reserved codes
JP2000209195A (en) Cipher communication system
JPH11145933A (en) System and equipment for spread spectrum communication
JP3202544B2 (en) Encryption communication device and encryption device
JPH06188860A (en) Privacy receiver
JPS5970039A (en) Ciphering transmission system
RU2653470C1 (en) Method of the cryptogram transmission in the communication system and the device for its implementation
JP2000101567A (en) Ciphering and deciphering device and method therefor
JPH04192736A (en) Ciphering device
JPS6054542A (en) Method and device of private talking
JPH0446025B2 (en)
JPH02295245A (en) Encoding/decoding device
JPH1022990A (en) Information processor and its method
JPH03230637A (en) Privacy communication system and transmitter-receiver
JPH077941B2 (en) Secret story method
JPH057202A (en) Enciphering communication equipment and enciphering transmission system
JPS625746A (en) Transmission system for cipher synchronizing information
JPS61170141A (en) Ciphered dpcm coding and decoding device
JPS6037585A (en) Data feedback type cryptographer
JPS62147827A (en) Method of privacy communication
JPH09258655A (en) Data encryption device
JPH0385835A (en) Cryptographic system employing cyclic code logic
JPS6053347A (en) Privacy call communication device