JPS59178040A - System for distributing and processing key information - Google Patents

System for distributing and processing key information

Info

Publication number
JPS59178040A
JPS59178040A JP58053095A JP5309583A JPS59178040A JP S59178040 A JPS59178040 A JP S59178040A JP 58053095 A JP58053095 A JP 58053095A JP 5309583 A JP5309583 A JP 5309583A JP S59178040 A JPS59178040 A JP S59178040A
Authority
JP
Japan
Prior art keywords
key information
section
unit
receiving
transmission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
JP58053095A
Other languages
Japanese (ja)
Other versions
JPH0614641B2 (en
Inventor
Chihiro Endo
千尋 遠藤
Hiroya Tanaka
田中 泰也
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujitsu Ltd
Original Assignee
Fujitsu Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujitsu Ltd filed Critical Fujitsu Ltd
Priority to JP58053095A priority Critical patent/JPH0614641B2/en
Publication of JPS59178040A publication Critical patent/JPS59178040A/en
Publication of JPH0614641B2 publication Critical patent/JPH0614641B2/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)

Abstract

PURPOSE:To distribute easily and freely new key information at any time by providing respectively a transmission unit and a deciding unit having a specific bit pattern promised preliminarily at a transmission section and a receiving section. CONSTITUTION:Key information K1 used at present point of time is transmitted between the transmission section 1 and the receiving section 2 by utilizing the 1st order key information KX. This key information K2 exists normally in a key information setting section 6 and a key information storing section 13. A transmission data is ORed exclusively with bit to bit correspondence and outputted from a ciphering section 4. A receiving signal bit and the key information K1 in the key information storing section 13 are ORed exclusively with bit to bit correspondence at the receiving section 2 and extracted as a receiving data. In setting the new key information K2, a selector 7 of the transmission section 1 selects contents of a specific bit pattern transmission unit 8 and the contents are transmitted in the form of deciphering state. A specific bit pattern detecting unit 16 of the receiving section 2 detects the coincidence of contents between a shift register 14 and the storing section 15 and informs the transmission of the key information K2.

Description

【発明の詳細な説明】 (4) 発明の技術分野 本発明は、鍵情報配送処理方式、特に送信データを暗号
化して伝送する暗号情報伝送システムにおいて、新らし
く設定した鍵情報を回線を介して随時伝送できるように
し、鍵情報の更新を容易にかつ自由に行い得るようにし
た鍵情報配送処理方式に関するものである。
Detailed Description of the Invention (4) Technical Field of the Invention The present invention relates to a key information distribution processing system, particularly an encrypted information transmission system that encrypts and transmits transmission data, by transmitting newly set key information via a line. The present invention relates to a key information distribution processing method that allows key information to be transmitted at any time and to update key information easily and freely.

(B)  技術の背景と問題点 いわゆる暗号情報伝送システムにおいては、送受信両端
において鍵情報をもち合い、受信側では受信情報を当該
鍵情報によって′M読するようにされる。このような鍵
情報は必要に応じて随時変更できるようにすることが望
まれるが、当該変更の都度オペレータが送受両端におい
て鍵情報の設定を行うようにすることは好ましくない。
(B) Technical Background and Problems In a so-called encrypted information transmission system, key information is shared at both the sending and receiving ends, and the receiving side reads the received information using the key information. Although it is desirable to be able to change such key information at any time as necessary, it is not preferable for the operator to set the key information at both the transmitting and receiving ends each time the key information is changed.

また一方では、鍵情報であることから自由に盗聴される
形で伝送されることは好捷しくないが、受信端において
鍵情報の伝送をいわば確実に判断できる形で通知してや
ることが必要となる。
On the other hand, since it is key information, it is not good for it to be transmitted in a form that can be freely intercepted, but it is necessary to notify the receiving end in a way that allows it to reliably determine whether the key information has been transmitted. .

(C)  発明の目的と構成 情報にもとづいて送信データを暗号化する暗号化処理部
と新しく使用する鍵情報を選択的に設定する鍵情報設定
部とを有する送信部、および与えられた鍵情報にもとづ
いて受信データを復号化する復号化処理部と新しく使用
する鍵情報が抽出されて設定される鍵情報保持部とを有
する受信部をそなえてなる暗号情報伝送システムにおい
て、上記送信部と上記受信部とで予め約束された特定ビ
ット・パターンを送出する特定ビット・パターン送出ユ
ニットが上記送信部にもうけられると共に、上記特定ビ
ット・パターンを受信する特定ビット・パターン判定ユ
ニットが上記受信部にもうけられてなり、上記受信部は
上記特定ビット・ノ9ターン判定ユニットによる判定結
果にもとづいて上記新しく使用する鍵情報を受信するよ
うにしたことを特徴としている。以下図面を参照しつつ
説明する。
(C) A transmitting unit having an encryption processing unit that encrypts transmitted data based on the purpose of the invention and configuration information, and a key information setting unit that selectively sets key information to be newly used, and the given key information An encrypted information transmission system comprising: a receiving section having a decryption processing section that decrypts received data based on the data; and a key information holding section in which new key information to be used is extracted and set; The transmitting section includes a specific bit pattern sending unit that sends out a specific bit pattern agreed upon in advance with the receiving section, and the receiving section includes a specific bit pattern determining unit that receives the specific bit pattern. The receiving section receives the new key information to be used based on the determination result by the specific bit/nine turn determining unit. This will be explained below with reference to the drawings.

(D)  発明の実施例 第1図は本発明の一実施例構成を示し、第2図は第1図
図示の暗号化処理部の一実施例を示すO第1図において
、1は送信部、2は受信部、3は回線、4は暗号化処理
部、5は第1順位鍵情報(KX)保持部、6は鍵情報設
定部、7はセレクタであって暗号化処理部4からの出力
と後述する特定ビット・パターン送出ユニットからの出
力とを選択的に抽出するもの、8は特定ビット・7No
ターン送出ユニツトであって特定ピント・パターンとし
て例えば64ビツトの連続″A”を与えるもの、9は送
信側モデム、10は受信側モデム、11は復号化処理部
、12は第1順位鍵情報(KX)保持部、13は鍵情報
保持部、14はシフトレジスタ、15は特定ビット・パ
ターン保持部、16は特定ビット・パターン検出ユニッ
トを表わしている。
(D) Embodiment of the Invention FIG. 1 shows the configuration of an embodiment of the present invention, and FIG. 2 shows an embodiment of the encryption processing section shown in FIG. , 2 is a reception unit, 3 is a line, 4 is an encryption processing unit, 5 is a first-order key information (KX) holding unit, 6 is a key information setting unit, and 7 is a selector that receives information from the encryption processing unit 4. 8 is a specific bit/7 No. that selectively extracts the output and the output from a specific bit/pattern sending unit described later
9 is a transmitting modem, 10 is a receiving modem, 11 is a decryption processing unit, and 12 is a unit that provides 64-bit continuous "A" as a specific focus pattern; 12 is a first order key information ( 13 is a key information holding unit, 14 is a shift register, 15 is a specific bit/pattern holding unit, and 16 is a specific bit/pattern detection unit.

また第2図において符号4,5.6は第1図に対応し、
17はシフト・レジスタ、18はEOR回路を表わして
いる。
Also, in Fig. 2, the symbols 4, 5.6 correspond to those in Fig. 1,
17 represents a shift register, and 18 represents an EOR circuit.

説明を簡単にするために、送信部1と受信部2とにおい
ては、上述の第1順位鍵情報K Xを利用して、現時点
において使用する鍵情報に1が伝送されておシ、両端に
おいて正しく送受信が行われているものとする。なお、
上記情報KXは、いわばメインの鍵情報であって、通常
は殆んどそのままの形では使用されないものと考えてよ
く、必要に応じて送受両端で鍵情報の確認を行う如き場
合に使用されるものと考えてよい。
To simplify the explanation, in the transmitting section 1 and the receiving section 2, 1 is transmitted as the key information to be used at the present time using the above-mentioned first order key information KX, and at both ends. It is assumed that transmission and reception are performed correctly. In addition,
The above information KX is the main key information, so it can be considered that it is not normally used in its original form, but is used when necessary to confirm the key information at both the sending and receiving ends. You can think of it as a thing.

上記状態の下では、現に使用中の鍵情報に1は、鍵情報
設定部6と鍵情報保持B13とに存在しているーそして
、送信デ゛−夕は例えは8ピット単位で第2図図示の如
くシフト・レジスタ17にセットされ、鍵情報設定部6
上の鍵情報に1とビット対応に排他的オア論理をとられ
て暗号化処理部4から出力される。通常の場合、セレク
タ7は暗号化処理部4からの出力を選択しておシ、回線
3を介して受信部2に伝送される。
Under the above state, the key information currently in use is 1 in the key information setting section 6 and the key information holding B13 - and the transmission date is set in units of 8 pits as shown in Figure 2. is set in the shift register 17 as shown in FIG.
The above key information is subjected to exclusive OR logic corresponding to 1 and bits and is output from the encryption processing unit 4. Normally, the selector 7 selects the output from the encryption processing section 4 and transmits it to the receiving section 2 via the line 3.

受信部2においては、受信信号ビットと鍵情報保持部1
3内の鍵情報に1とがピット対応に排他的オア論理をと
られて、受信r−夕として抽出される0 通常上述の如く伝送されるが、送信部1において新しく
鍵情報に2を設定する場合、次のように処理される。即
ち、送信部1のセレクタ7は特定ビット・・ぐターン送
出ユニツ(・8の内容を選択し、当該内容が非暗号化状
態の形で伝送される。受信部2においては、受信信号ビ
ットを順次シフト・レジスタ14に入力しておシ、当該
シフト・レジスタ14の内容が例えば64ビツトの連続
+1 Al1とたつたとすると、特定ビット・・やター
ン保持部15の内容とピット対応で一致する。特定ビッ
ト・パターン検出ユニット16は、この旨を検出して、
次に新しい鍵情報に2が伝送されてくる状態にあること
を通報する。
In the receiving section 2, the received signal bits and the key information holding section 1
Exclusive OR logic is applied to the key information in 3 and 1 corresponding to the pit, and 0 is extracted as the received r-t. Normally, it is transmitted as described above, but the transmitter 1 newly sets 2 to the key information. If so, the process is as follows: That is, the selector 7 of the transmitter 1 selects the contents of a specific bit... If the data is sequentially input to the shift register 14, and the contents of the shift register 14 are, for example, 64 consecutive bits +1 Al1, they match the specific bits and the contents of the turn holding section 15 in terms of pit correspondence. The specific bit pattern detection unit 16 detects this and
Next, it is notified that 2 is about to be transmitted as new key information.

このとき、送信部1においては、新鍵情報に2を送信デ
ータとみなして、鍵情報に1にて暗号化して送出する。
At this time, the transmitter 1 considers 2 in the new key information to be transmission data, encrypts it with 1 in the key information, and sends it out.

受信部2においては、当該データを鍵情報に1にもとづ
いて復号し、その結果の情報(新鍵情報に2)を鍵情報
保持部13にセットする。当該鍵情報に2が正しく受取
られたことを待って、送信部1において、鍵情報設定部
6に新鍵情報に2がセットされる。
The receiving unit 2 decrypts the data based on the key information 1, and sets the resulting information (new key information 2) in the key information holding unit 13. After waiting for 2 to be correctly received as the key information, in the transmitting section 1, 2 is set as the new key information in the key information setting section 6.

■ 発明の詳細 な説明した如く、本発明によれば、新しい鍵情報を容易
にかつ自由に随時配送できるので、現使用中のシステム
情報が漏洩するおそれがない。
(2) As described in detail, according to the present invention, new key information can be easily and freely distributed at any time, so there is no risk of leakage of system information currently in use.

また一般には、特定ビット・・母ターンを伝送すること
自体が秘とされておシ、鍵情報が洩れる危険率も十分小
さい。そして、特定ビット・パターンが伝送されること
を知っている受信部においては、新しい鍵情報の受信を
ミスすることはない。
Furthermore, in general, the transmission of a specific bit, ie, the mother turn, itself is kept secret, and the risk of key information being leaked is sufficiently small. A receiving unit that knows that a specific bit pattern will be transmitted will not miss receiving new key information.

【図面の簡単な説明】[Brief explanation of drawings]

第1図は本発明の一実施例構成、第2図は第1図図示の
暗号化処理部の一実施例を示す。 図中、1は送信部、2は受信部、4は暗号化処理部、6
は鍵情報設定部、7はセレクタ、8は特定ビット・パタ
ーン送出ユニット、11は復号化処理部、13は鍵情報
保持部、16は特定ビット・パターン検出ユニットを表
わしている○ 特許出願人 富士通株式会社 代理人弁理士  森   1)    寛(外1名)
FIG. 1 shows the configuration of an embodiment of the present invention, and FIG. 2 shows an embodiment of the encryption processing section shown in FIG. In the figure, 1 is a transmitting section, 2 is a receiving section, 4 is an encryption processing section, 6
indicates a key information setting unit, 7 a selector, 8 a specific bit pattern sending unit, 11 a decryption processing unit, 13 a key information holding unit, and 16 a specific bit pattern detection unit.○ Patent applicant Fujitsu Agent Patent Attorney Co., Ltd. Mori 1) Hiroshi (1 other person)

Claims (1)

【特許請求の範囲】[Claims] 与えられた鍵情報にもとづいて送信データを暗号化する
暗号化処理部と新しく使用する鍵情報を選択的に設定す
る鍵情報設定部とを有する送信部、および与えられた鍵
情報にもとついて受信データを復号化する復号化処理部
と新しく使用する鍵情報が抽出されて設定される鍵情報
保持部とを有する受信部をそなえてなる暗号情報伝送シ
ステムにおいて、上記送信部と上記受信部とで予め約束
された特定ビット・パターンを送出する特定ビット・・
ぐターン送出ユニットが上記送信部にもうけられると共
に、上記特定ビット・パターンを受信する%定ビット・
パターン判定ユニットが上記受信部にもうけられてなり
、上記受信部は上記特定ビット・パターン判定ユニット
による判定結果にもとづいて上記新しく使用する鍵情報
を受信するようにしたことを特徴とする鍵情報配送処理
方式。
A transmitting unit having an encryption processing unit that encrypts transmitted data based on given key information and a key information setting unit that selectively sets key information to be newly used; In an encrypted information transmission system comprising a receiving unit having a decryption processing unit that decrypts received data and a key information holding unit in which new key information to be used is extracted and set, the transmitting unit and the receiving unit are A specific bit that sends out a specific bit pattern promised in advance...
A turn sending unit is provided in the transmitting section, and a % constant bit sending unit is provided in the transmitting section.
Key information distribution characterized in that a pattern determination unit is provided in the receiving section, and the receiving section receives the newly used key information based on the determination result by the specific bit/pattern determination unit. Processing method.
JP58053095A 1983-03-29 1983-03-29 Key information delivery processing method Expired - Lifetime JPH0614641B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP58053095A JPH0614641B2 (en) 1983-03-29 1983-03-29 Key information delivery processing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP58053095A JPH0614641B2 (en) 1983-03-29 1983-03-29 Key information delivery processing method

Publications (2)

Publication Number Publication Date
JPS59178040A true JPS59178040A (en) 1984-10-09
JPH0614641B2 JPH0614641B2 (en) 1994-02-23

Family

ID=12933218

Family Applications (1)

Application Number Title Priority Date Filing Date
JP58053095A Expired - Lifetime JPH0614641B2 (en) 1983-03-29 1983-03-29 Key information delivery processing method

Country Status (1)

Country Link
JP (1) JPH0614641B2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS61177046A (en) * 1985-02-01 1986-08-08 Oki Electric Ind Co Ltd Cipher communication system
JPS6462044A (en) * 1987-09-02 1989-03-08 Matsushita Electric Ind Co Ltd Digital radio communication equipment

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH08128539A (en) * 1994-10-28 1996-05-21 Mori Assoc Kk Opening and closing plug structure

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS5652948A (en) * 1979-10-05 1981-05-12 Nec Corp Random number switching system of privacy data communication system
JPS5730438A (en) * 1980-06-19 1982-02-18 Oak Industries Inc Two-stage encoding for high frequency signal

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS5652948A (en) * 1979-10-05 1981-05-12 Nec Corp Random number switching system of privacy data communication system
JPS5730438A (en) * 1980-06-19 1982-02-18 Oak Industries Inc Two-stage encoding for high frequency signal

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS61177046A (en) * 1985-02-01 1986-08-08 Oki Electric Ind Co Ltd Cipher communication system
JPH0439935B2 (en) * 1985-02-01 1992-07-01 Oki Electric Ind Co Ltd
JPS6462044A (en) * 1987-09-02 1989-03-08 Matsushita Electric Ind Co Ltd Digital radio communication equipment

Also Published As

Publication number Publication date
JPH0614641B2 (en) 1994-02-23

Similar Documents

Publication Publication Date Title
US6073236A (en) Authentication method, communication method, and information processing apparatus
US4322576A (en) Message format for secure communication over data links
US6915434B1 (en) Electronic data storage apparatus with key management function and electronic data storage method
US5159633A (en) Multimedia network system
US5406624A (en) Data processor systems
US4352952A (en) Data security module
RU2147790C1 (en) Method for transferring software license to hardware unit
US6393564B1 (en) Decrypting device
US7106861B1 (en) Digital AV data transmitting unit, digital AV data receiving unit, digital AV data transmitting/receiving unit, and medium
US20020146019A1 (en) Method of transmitting data through a data bus
WO1996008912A3 (en) Conditional access system
EP0471839B1 (en) Encryption apparatus
HUP0201358A2 (en) Method for managing symmetric key in a communication network and device for processing data in a communication network
JPH01122227A (en) Transmission equipment
JPH09502845A (en) Key distribution device in encryption system
JPS6145833B2 (en)
AU2000248149A1 (en) System and method for secure cryptographic communications
WO1990006646A1 (en) Data encryption key failure monitor
JP2595899B2 (en) Online message encryption device
JPS60248043A (en) Communication system
JPS59178040A (en) System for distributing and processing key information
KR20040021674A (en) Method of creating a virtual private network using a public network
JPH0777933A (en) Network data ciphering device
JPS60102038A (en) Cipher communication system
JPS6095475A (en) Key generation system for cryptographer