JPS59218061A - Cipher communication equipment - Google Patents

Cipher communication equipment

Info

Publication number
JPS59218061A
JPS59218061A JP58092666A JP9266683A JPS59218061A JP S59218061 A JPS59218061 A JP S59218061A JP 58092666 A JP58092666 A JP 58092666A JP 9266683 A JP9266683 A JP 9266683A JP S59218061 A JPS59218061 A JP S59218061A
Authority
JP
Japan
Prior art keywords
key information
signal
clock
storage section
clock device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
JP58092666A
Other languages
Japanese (ja)
Inventor
Tadaaki Okubo
大久保 忠明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Toshiba Corp
Original Assignee
Toshiba Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Toshiba Corp filed Critical Toshiba Corp
Priority to JP58092666A priority Critical patent/JPS59218061A/en
Publication of JPS59218061A publication Critical patent/JPS59218061A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/12Transmitting and receiving encryption devices synchronised or initially set up in a particular manner

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)

Abstract

PURPOSE:To make the decoding of key information difficult by providing plural kinds of key information generating means for both transmission and reception sides and changing over simultaneously it with an output of clock devices operat ed synchronizingly with each other. CONSTITUTION:The transmission side 11 and the reception side 16 are provided respectively with a common key information generating device 25. The key information generating device 25 is provided with a clock device 26 and a storage section 27. The clock device 26 of the transmission side 11 and the reception side 16 is operated synchronizingly and the key information identical to the key information extracted from the storage section 27 of the transmission side 11 or the information being the relation of definite function is extracted from the storage section 27 of the receiving side 16. Thus, an original signal is decoded at the reception side 16.

Description

【発明の詳細な説明】 〔発明の技術分野〕 この発明は例えば無線放送方式(一方向通信)において
、原信号を暗号化して放送し、特定の受信者、即゛ち解
読のだめの錐を利用できるものだけが原信号を復元する
ことが可能な暗号通信装置に関する・ 〔発明の技術的背景とその問題点〕 周知のように、原信号を暗号化し、契約した特定の受信
者のみが復号して視聴することができる有料テレビが開
発されている。この種の暗号化放送においては、信号暗
号化の方法と、それを解くための鍵を如何にして特定の
受信者のみに利用させるかがシステム設計上の要点とな
る。特に、復号手段については、上り回線が利用しにく
い無線放送の場合、複雑な手続をとることは実際上不可
能であシ、簡便な手段に限られる。
[Detailed Description of the Invention] [Technical Field of the Invention] The present invention, for example, in a wireless broadcasting system (one-way communication), encrypts and broadcasts an original signal, and uses a specific receiver, that is, a decoder. [Technical background of the invention and its problems] As is well known, the original signal is encrypted and only a specific contracted receiver can decrypt it. Pay-TV has been developed that allows users to watch TV. In this type of encrypted broadcasting, the key points in system design are the method of signal encryption and how to allow only specific recipients to use the key for decrypting the signal. In particular, with regard to decoding means, in the case of radio broadcasting where uplinks are difficult to use, it is practically impossible to use complicated procedures, and only simple means are used.

そこで、例えば磁気カードなどに鍵情報を記録し、契約
者にのみそのカードを渡して別途契約者側に用意された
復号器(デコーダ)にその鍵情報を入力して解読する方
法が考えられている。
Therefore, a method has been considered in which the key information is recorded on a magnetic card, for example, and the card is given only to the subscriber, and the key information is input into a decoder prepared separately by the subscriber to decrypt the card. There is.

第1図はその一例を示すものである。送信側11におい
て、入力される原信号mは例えば長nビットでブロック
化された2値系列となされている。この原信号mはシリ
アル/パラレル変換器12に供給されパラレル信号に変
換される。
FIG. 1 shows an example. On the transmitting side 11, the input original signal m is, for example, a binary sequence blocked with length n bits. This original signal m is supplied to a serial/parallel converter 12 and converted into a parallel signal.

このシリアル/パラレル変換器12より出力される各ビ
ット信号は排他的論理和(EX−OR)回路群13に供
給される。このEX−OR回路群1,9には鍵情報発生
器14より2値系列の鍵情報kが供給されている。この
鍵情報には前記原信号mと同長のnビットとなされてお
シ、前記EX−OR回路群13においそ、この鍵情報に
と前記パラレル信号に変換された原信号mとの排他的論
理和m■kがとられる。このEX−OR回路群13よυ
出力される暗号化されたパラレル信号は・千うレル/シ
リアル変換器15に供給され、シリアル信号に変換され
る。この変換された信号は回示せぬ送信a場によって送
信される。
Each bit signal output from the serial/parallel converter 12 is supplied to an exclusive OR (EX-OR) circuit group 13. The EX-OR circuit groups 1 and 9 are supplied with binary key information k from a key information generator 14. This key information has n bits of the same length as the original signal m, and is applied to the EX-OR circuit group 13 so that the key information is exclusively connected to the original signal m converted into the parallel signal. The logical sum m■k is taken. This EX-OR circuit group 13 υ
The output encrypted parallel signal is supplied to a serial/serial converter 15 and converted into a serial signal. This converted signal is transmitted by an unrepresented transmitting field.

一方、受信側16において、図示せぬ受信機で受信され
た暗号信号はシリアル/パラレル変換器17に供給され
、・クラレル信号とされる。
On the other hand, on the receiving side 16, the encrypted signal received by a receiver (not shown) is supplied to a serial/parallel converter 17 and converted into a Clarel signal.

このパラレル信号はEX−OR回路群18に供給される
。また、磁気カード19には前記送信側11の鍵情報発
生器14によって発生される鍵情報と同一の鍵情報ある
いは一意的関数関係にある2値系列が記録されておシ、
この磁気カード19はデコーダ20によって読取らノL
る。このデコーダ20の出力信号は前記丙イ?; tl
 kと等しく、この鍵情報には前記EX−OR回路群1
8に供給され、パラレル信号とされた暗号信号(m■k
)と排他的論理和(m■k)■kがとられる。このEX
−OR回路群18において復号されたパラレル信号から
在る原信号はパラレル/シリアル変換器21に供給され
、シリアル信号から々る原信号mが生成される。
This parallel signal is supplied to EX-OR circuit group 18. Further, the magnetic card 19 records the same key information as the key information generated by the key information generator 14 of the sending side 11 or a binary sequence having a unique functional relationship.
This magnetic card 19 is read by a decoder 20.
Ru. The output signal of this decoder 20 is the above-mentioned I? ;tl
k, and this key information includes the EX-OR circuit group 1.
The encrypted signal (mk
) and the exclusive OR (m■k)■k is taken. This EX
- The original signal from the parallel signal decoded in the OR circuit group 18 is supplied to the parallel/serial converter 21, and the original signal m from the serial signal is generated.

尚、上*i; tA成は一般化された暗号通信製U’j
、 ’fr:示す意味でシリアル/パラレル変換をしで
いるが、m■にあるいは(m■k)■になる)裏算が時
間軸上の置換えを伴わない場合はEX−OR回路71e
Z 、? 、 J 8はシリアル信号処理が可能である
In addition, the above *i; tA configuration is U'j made by generalized cryptographic communication.
, 'fr: Performs serial/parallel conversion in the meaning shown, but if subtraction does not involve replacement on the time axis (m■ or (m■k)■), the EX-OR circuit 71e
Z,? , J8 is capable of serial signal processing.

上記11q成によれば、磁気カード19夜有する受信者
のみが原信号を視聴することができる。
According to the above 11q configuration, only recipients who have a magnetic card 19 night can view the original signal.

しかし、この方法では磁気カード19を交換しない限シ
、鍵情報が一定であるため磁気カード′19が複製され
たり、暗号が解読され易い環境にされるという欠点があ
った。
However, this method has the drawback that unless the magnetic card 19 is replaced, the key information remains constant, creating an environment in which the magnetic card '19 is easily duplicated and the code is easily decoded.

〔発明の目的〕[Purpose of the invention]

この発明何5上記事情に基づいてなされたものであシ、
その目的とするところけP’lW報の7夏ヱリおよび解
読が比較的〃か1−<、機密性の保持機能が高い暗号通
信装置全提供しようとするものである。
This invention was made based on the above circumstances,
The purpose is to provide an encrypted communication device which has a relatively high level of confidentiality maintenance function and is capable of retrieving and decoding P'lW information in 7 summers.

〔発明の概要〕[Summary of the invention]

この発明は、送信114+1および受信側に相互に同期
動作される時計装置を設けるとともに、桟数の異なる鍵
情報音発生する手段を設け、前記時計装置の出力信号に
応じて送信側と受信側のQ蝮情報を同時に切換えること
により、鍵情報の解読を難しくしようとするものである
In this invention, the transmitting side 114+1 and the receiving side are provided with a clock device that operates in synchronization with each other, and a means for generating key information sounds with different numbers of bars is provided, and the transmitting side and the receiving side are operated in accordance with the output signal of the clock device. By switching the Q-key information at the same time, it is attempted to make it difficult to decipher the key information.

〔発明の実施例〕[Embodiments of the invention]

以下、この発明の一実施例にすしへて図面t−参  □
照して説明する。
The following is an example of this invention, and please refer to drawing □
I will refer to and explain.

第2図はこの発明の要部のみを示すものであシ、第1図
に示す磁気カード19に相当する改良された鍵情報生成
器である。この鍵情報生成器25には時言1装M26が
設けらiする。この時計装置26は周知の回路によって
構成さitておル、時計機能、カレンダ機能を有してい
る。この時削装僅26からは時間情報に対応した信号が
出力される。即ち、この信号は例えば5ビツト構成のカ
ウンタによって生成され、このカウンタは24時間毎に
カウント・アップされるようになされている。したがっ
て、このカウンタは33日毎にリセットされ、再び同様
のカウントが繰返される。この時計装置26より出方さ
れる信号は記憶部27に供給される。この記憶部27は
例えばリード・オンリー・メモリ(ROM)によって構
成されており、このROMには向えば32種類の鍵情報
が記憶されている。この鍵情報は送信側の鍵情報と同一
、または鍵情報と一意的関数関係にある。この@@(’
tf報は前記”’P nf’装置i’J2eの出力信号
によって順次変化さil、て取出され、第1図に示すデ
コーダ20VC倶給される。
FIG. 2 shows only the essential parts of the present invention, and is an improved key information generator corresponding to the magnetic card 19 shown in FIG. This key information generator 25 is provided with a timer unit M26. This clock device 26 is constituted by a well-known circuit and has a clock function, a calendar function, and a clock function. This time cutting device 26 outputs a signal corresponding to time information. That is, this signal is generated by, for example, a 5-bit counter, and this counter is incremented every 24 hours. Therefore, this counter is reset every 33 days and the same counting is repeated again. A signal output from this clock device 26 is supplied to a storage section 27. This storage unit 27 is constituted by, for example, a read-only memory (ROM), and 32 types of key information are stored in this ROM. This key information is the same as the sender's key information, or has a unique functional relationship with the key information. this@@('
The tf information is sequentially changed by the output signal il of the ``Pnf'' device i'J2e, and is taken out and fed to the decoder 20VC shown in FIG.

しかして、このデコーダ2θより鍵情報kが時計装置2
6の出力信号によシ変化され出力される。また、前記時
計装置26には電池28が接続されている。
Therefore, the key information k is transmitted from this decoder 2θ to the clock device 2.
The output signal is changed by the output signal of No. 6 and output. Further, a battery 28 is connected to the clock device 26.

一方、第1図に示す送信側11の鍵情報発生器14も第
2図と同様の構成となされる。この場合、記憶部27に
は礁情報が記憶されている。
On the other hand, the key information generator 14 on the sending side 11 shown in FIG. 1 also has the same configuration as that in FIG. 2. In this case, reef information is stored in the storage unit 27.

上記構成において、送信側11と受信側16の時計装置
26は同期して動作され、受信側16の記憶部27から
は送信1ii111の記憶部27よシ取出される鍵づ^
報と同一の外イ)!報あるいはこれと一意的関数関係に
ある情報が取出される。したがって、受信側16におい
て、原信号を復号することができる。
In the above configuration, the clock devices 26 of the transmitting side 11 and the receiving side 16 are operated in synchronization, and the clock devices 26 of the transmitting side 11 and the receiving side 16 are operated in synchronization, and the clock device 26 of the receiving side 16 is retrieved from the storage unit 27 of the transmitting side 1ii 111.
Same as the information)! The information or information having a unique functional relationship thereto is retrieved. Therefore, at the receiving end 16, the original signal can be decoded.

上記構成によれば、送信4JjlJ11および受信側1
6に同期動作される時計装置26奮設けるとともに、複
数の異なる鍵情報を記憶する記憶部27t−設け、前記
り情報盆前記時言1装置26の出力信号に応じて選択的
に取出し、原信号の暗号化あるいは復号を行っている。
According to the above configuration, the transmitting side 4JjlJ11 and the receiving side 1
A clock device 26 is provided which is operated synchronously with the clock device 26, and a storage section 27t is provided to store a plurality of different key information, and the information tray is selectively retrieved according to the output signal of the clock device 26 and the original signal is stored. is being encrypted or decrypted.

したがって、従来に比べて鍵情報の数が多く、シかも、
これら鍵情報が例えば1日単位で切換えられるため、鍵
情報の複製あるいは解読を行うことが比較的難しいもの
である。
Therefore, the number of key information is larger than before, and it may be difficult to
Since this key information is changed over, for example, on a daily basis, it is relatively difficult to copy or decipher the key information.

また、送信側11および受信f、1116における時計
装置26を確実に同期動作すれば、自動的に鍵情報を切
換えることができるため、無線放送において極めて便利
である。
Furthermore, if the clock devices 26 on the transmitting side 11 and the receiving side 1116 are reliably operated in synchronization, the key information can be automatically switched, which is extremely convenient in radio broadcasting.

尚、上記構成において、鈍イ〃報はROM力・らなる記
憶部27に記憶したが、これに限らず、他の回路によっ
て構成することも可能である。
In the above configuration, the dull alarm information is stored in the storage section 27 consisting of a ROM, but the present invention is not limited to this, and it is also possible to configure it using other circuits.

その他、この発明の要旨ヲ変えない範囲で植種変形実施
可能なことは勿論である。
It goes without saying that other planting modifications can be carried out without changing the gist of the invention.

〔発明の効果〕〔Effect of the invention〕

以上、詳述したようにこの発明によれば、鍵情報の複製
および解読が比較的難かしく、機密性や保持機能が高い
暗号通信装置を提供できる。
As described in detail above, according to the present invention, it is possible to provide an encrypted communication device in which copying and decoding of key information is relatively difficult, and which has high confidentiality and maintenance functions.

【図面の簡単な説明】[Brief explanation of the drawing]

第1図は従来の暗号通信装置の一例を示す構成図、第2
図はこの発明に係わる暗号通信装置の一実施例を示すも
のであシ、要部のみを示す構成図である。 11・・・送信側、16・・・受信側、13,1.8・
・・排他的論理和回路群、26・・・時計装置、27・
・・2記憶部。
Figure 1 is a configuration diagram showing an example of a conventional encrypted communication device;
The figure shows an embodiment of a cryptographic communication device according to the present invention, and is a configuration diagram showing only the main parts. 11... Sending side, 16... Receiving side, 13, 1.8.
・・Exclusive OR circuit group, 26・・Clock device, 27・
...2 memory section.

Claims (1)

【特許請求の範囲】[Claims] 送信側において、原信号に鍵情報を演算して暗号信号を
生成するとともに、受信側において、受傷された暗号信
号に前記鍵情報と同一の鍵情報を演算して原信号を取出
す暗号通信装置において、前記送信側および受信(11
11に同期動作される時計装置を設けるとともに、複数
の異なる鍵情報を発生する手段を有し、前記時計装置の
出力信号に応じて所定の鍵情報を選択的に取出す手段會
設けたことを特徴とする暗号通信製げ、。
In a cryptographic communication device, on a transmitting side, calculates key information on an original signal to generate an encrypted signal, and on a receiving side, calculates key information identical to the key information on a damaged encrypted signal to extract the original signal. , the sending side and the receiving side (11
11 is provided with a clock device operated synchronously, and has means for generating a plurality of different key information, and means for selectively extracting predetermined key information according to the output signal of the clock device. Created a cryptographic communication system.
JP58092666A 1983-05-26 1983-05-26 Cipher communication equipment Pending JPS59218061A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP58092666A JPS59218061A (en) 1983-05-26 1983-05-26 Cipher communication equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP58092666A JPS59218061A (en) 1983-05-26 1983-05-26 Cipher communication equipment

Publications (1)

Publication Number Publication Date
JPS59218061A true JPS59218061A (en) 1984-12-08

Family

ID=14060796

Family Applications (1)

Application Number Title Priority Date Filing Date
JP58092666A Pending JPS59218061A (en) 1983-05-26 1983-05-26 Cipher communication equipment

Country Status (1)

Country Link
JP (1) JPS59218061A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH01212041A (en) * 1988-02-18 1989-08-25 Hitachi Ltd Cryptographic communication system
JPH03297235A (en) * 1990-04-16 1991-12-27 Matsushita Electric Ind Co Ltd Radio communication equipment
JP2006174519A (en) * 2006-03-17 2006-06-29 Fujitsu Ltd Method and apparatus for security
JP2007258941A (en) * 2006-03-22 2007-10-04 Nec Personal Products Co Ltd Automatic updating system, and automatic updating method

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH01212041A (en) * 1988-02-18 1989-08-25 Hitachi Ltd Cryptographic communication system
JPH03297235A (en) * 1990-04-16 1991-12-27 Matsushita Electric Ind Co Ltd Radio communication equipment
JP2006174519A (en) * 2006-03-17 2006-06-29 Fujitsu Ltd Method and apparatus for security
JP2007258941A (en) * 2006-03-22 2007-10-04 Nec Personal Products Co Ltd Automatic updating system, and automatic updating method
JP4603499B2 (en) * 2006-03-22 2010-12-22 Necパーソナルプロダクツ株式会社 Automatic update system, automatic update method

Similar Documents

Publication Publication Date Title
CN108377183B (en) XDR data information encryption method, device, equipment and medium
EP0624013B1 (en) Device and method for data encryption
AU693094B2 (en) A repertoire of mappings for a cryptosystem
US7907725B2 (en) Simple universal hash for plaintext aware encryption
JPH05500298A (en) encryption device
RU2146421C1 (en) Decoding of data subjected to repeated transmission in encoding communication system
EP0713621A1 (en) Method and apparatus for uniquely encrypting a plurality of services at a transmission site
EP2183875A2 (en) Method and system for encryption of data
EP1258100A4 (en) System and method for secure cryptographic communications
KR100352783B1 (en) Software/data transmitting-receiving system
JPH04297157A (en) Data ciphering device
US6128386A (en) Multiple number base encoder/decoder using a corresponding exclusive or function
JPH01248891A (en) Encipherment key delivery system
JPS59218061A (en) Cipher communication equipment
JP4703805B2 (en) ENCRYPTION DEVICE, ENCRYPTION METHOD, DECRYPTION DEVICE, DECRYPTION METHOD, AND COMMUNICATION SYSTEM
JPH1155241A (en) Communication equipment with enciphered key system
US4724541A (en) Data-dependent binary encoder/decoder
JPH04335730A (en) Random ciphering communication system
WO2012060684A1 (en) Quantum-based random number generator (qrng) with multi output processor (mop)
JP4117095B2 (en) Encryption method
JPS5917750A (en) Cipher system
JPH09200195A (en) Ciphering communication system
KR100266629B1 (en) Stream encipher and decipher apparatus
JPS63308432A (en) Sequence generating method
US20080034206A1 (en) Encryption Method