JPS6115438A - Ciphering communication system - Google Patents

Ciphering communication system

Info

Publication number
JPS6115438A
JPS6115438A JP59135932A JP13593284A JPS6115438A JP S6115438 A JPS6115438 A JP S6115438A JP 59135932 A JP59135932 A JP 59135932A JP 13593284 A JP13593284 A JP 13593284A JP S6115438 A JPS6115438 A JP S6115438A
Authority
JP
Japan
Prior art keywords
key
signal
ciphering
dial
communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
JP59135932A
Other languages
Japanese (ja)
Inventor
Meiki Yahata
矢幡 明樹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Toshiba Corp
Original Assignee
Toshiba Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Toshiba Corp filed Critical Toshiba Corp
Priority to JP59135932A priority Critical patent/JPS6115438A/en
Publication of JPS6115438A publication Critical patent/JPS6115438A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)

Abstract

PURPOSE:To simplify the operation of ciphering of an open key ciphering system by using a dial signal or a signal relating to the communication destination other than the dial signal to read a ciphering key of the communication destination from the stored open ciphering key, thereby ciphering information. CONSTITUTION:A signal representing a destination such as a dial pulse or a multi-frequency signal is transmitted from a dial signal generator 1 to a communication controller 2 and a line is set with the opposite party terminal device. A dial number detector 3 outputs an address signal corresponding to the opposite party. A key generating circuit 4 stores all open ciphering keys of subscriber terminals and outputs the open ciphering key of the opposite party to a ciphering device 6 based on an address from the detector 3. The ciphering device 6 ciphers the information from the information source 5 by using the given key and transmits the result to the opposite party terminal device through the controller 2.

Description

【発明の詳細な説明】 〔発明の技術分野〕 この発明は暗号通信方式に係り、特に公開鍵暗号方式で
通信情報を暗号化して送出する暗号通信方式に関する。
DETAILED DESCRIPTION OF THE INVENTION [Technical Field of the Invention] The present invention relates to a cryptographic communication system, and particularly to a cryptographic communication system in which communication information is encrypted and transmitted using a public key cryptosystem.

〔発明の技術的背景とその問題点〕[Technical background of the invention and its problems]

最近、金融機関等でセキュリティの問題の重要性が認識
され出し、暗号通信の需要が高まっている。暗号化の方
式は例えば米国では、DES(D ata E ncr
yption 3 tandard )と呼ばれる規格
によって標準化されている。この暗号化方式は一般に暗
号鍵と解読鍵とが同じものである。
Recently, financial institutions and the like have begun to recognize the importance of security issues, and the demand for encrypted communications is increasing. For example, in the United States, the encryption method is DES (Data Encryption).
It has been standardized by a standard called yption 3 standard. In this encryption method, the encryption key and decryption key are generally the same.

第3図はこのような暗号化方式を適用した通信システム
の構成を示したもので、a−eの5端末間で暗号通信を
行なう場合の例である。a〜eの各端末は自端末を除い
た他の4端末に当てられた暗号・解読鍵Kijを保管し
ている。この方式では暗号鍵と解読鍵とが共通のため、
鍵が第三者に分ると簡単に解読されるおそれがある。従
って、加入端末数が増大すると鍵の管理に大きな負担が
かかるという欠点がある。また、各端末から見ると自端
末だけ鍵の管理を確実にしていても、他端末での鍵の保
管状況次第で第3者に解読・盗聴されるという不安が常
に付きまとうことになる。このような事情から、従来で
は暗号鍵および解読鍵を短い周期(例えば1日毎)で変
更するという方法がとられており、その運用が非常に煩
雑であった。
FIG. 3 shows the configuration of a communication system to which such an encryption method is applied, and is an example of encrypted communication between five terminals a to e. Each of the terminals a to e stores an encryption/decryption key Kij assigned to the other four terminals except for the own terminal. In this method, the encryption key and decryption key are common, so
If the key is known to a third party, it may be easily decrypted. Therefore, as the number of subscriber terminals increases, there is a drawback that key management becomes a heavy burden. Furthermore, even if each terminal manages its own keys reliably, there is always the fear that a third party could decrypt or eavesdrop on the key depending on how other terminals store the key. Under these circumstances, conventional methods have been used in which encryption keys and decryption keys are changed at short intervals (for example, every day), which is very complicated to operate.

このような問題を解決讐るため最近、公開鍵暗号方式と
呼ばれる暗号方式が注目されるようになった。この方式
は第4図に示すように暗号鍵KEi  (i−a、b、
c、d、e)と解読鍵KO+とを別個のものとして、暗
号鍵の方は公開するというものである。すなわち、端末
aに情報を送る場合を例にとれば、どの端末から送る場
合でも暗号鍵として端末aに当てられた鍵KEaを使用
するのである。この場合、暗号鍵から解読鍵を見付は出
すことはできないように鍵を設定する。
In order to solve these problems, a cryptographic method called public key cryptography has recently attracted attention. This method uses the encryption key KEi (ia, b,
c, d, e) and the decryption key KO+ are made separate, and the encryption key is made public. That is, taking the case of sending information to terminal a as an example, the key KEa assigned to terminal a is used as the encryption key no matter which terminal sends the information. In this case, the key is set so that the decryption key cannot be found from the encryption key.

このようにすると、暗号鍵の数は加入端末数だけあれば
よく、しかも鍵の保管は自端末の解読鍵のみでよいので
、鍵の管理が非常に東になる。従って、この公開鍵暗号
方式は今後、超LSIがさらに発達して端末のハードウ
ェアが簡単になれば、極めて有用な方式となると考えら
れる。
In this way, the number of encryption keys is equal to the number of subscriber terminals, and the only key to be stored is the decryption key of the terminal itself, making key management much easier. Therefore, it is believed that this public key cryptosystem will become extremely useful in the future as VLSIs develop further and terminal hardware becomes simpler.

しかしながら、この公開鍵暗号方式は第3図に示した暗
号鍵と解読鍵が共通の暗号方式と異なり、各端末に当て
られる暗号鍵が一定であるにも拘らず、相手端末を呼出
す都度その相手端末の暗号鍵を調べて暗号化を行なわな
ければならないという煩雑さがある。
However, this public key encryption method is different from the encryption method shown in Figure 3 in which the encryption key and decryption key are common, and even though the encryption key assigned to each terminal is constant, each time the other terminal is called, There is the complication of having to check the encryption key of the terminal and perform encryption.

(発明の目的) この発明の目的は、公開鍵暗号方式により通信情報を暗
号化して伝送する際に必要な操作を簡略化できる暗号通
信方式を提供することにある。
(Objective of the Invention) An object of the present invention is to provide a cryptographic communication method that can simplify operations required when transmitting communication information after encrypting it using a public key cryptographic method.

〔発明の概要〕[Summary of the invention]

この発明の暗号通信方式は、複数の相手端末に当てられ
た公開暗号鍵を予め記憶しておき、通信先を呼出すため
のダイヤル信号あるいはこの信号以外の通信先に関する
信号によって、記憶されている公開暗号鍵の中から通信
先の暗号鍵を選択してその暗号鍵の信号を自動的に発生
するようにしたものである。なお、このような鍵発生手
段は例えばROMを使用して実現することができる。
The encrypted communication system of the present invention stores public encryption keys assigned to a plurality of communication terminals in advance, and uses a dial signal for calling a communication destination or a signal related to communication destinations other than this signal to make the stored public encryption keys The encryption key of the communication destination is selected from among the encryption keys, and a signal of that encryption key is automatically generated. Note that such a key generation means can be realized using, for example, a ROM.

〔発明の効果〕〔Effect of the invention〕

′この発明によれば、通信先を呼出すと、自動的にその
相手に当てられた暗号鍵が発生されて通信情報の暗号化
がなされるので、呼出し操作と鍵の選択操作を別個に行
なう場合に比べて操作が簡略化される。従つ゛で、通信
先の端末に当てられた暗号鍵の選択を間違うことにより
通信ができないというような不都合がなく、敏速、確実
に通信を行なうことが可能となる。
'According to this invention, when a communication destination is called, an encryption key assigned to the communication partner is automatically generated and the communication information is encrypted. Therefore, when the calling operation and the key selection operation are performed separately, Operation is simplified compared to . Therefore, there is no inconvenience such as being unable to communicate due to the wrong selection of the encryption key applied to the communication destination terminal, and it is possible to communicate quickly and reliably.

〔発明の実施例〕[Embodiments of the invention]

第1図はこの発明の一実施例の暗号通信システムの送信
部の構成を示したものである。この図において、ダイヤ
ル信号発生器1は通信先を呼出すためのダイヤル信号を
発生する回路であり、通常のダイヤル式電話機の場合は
ダイヤルパルスを発生し、また押しボタン電話機の場合
は多周波信号を発生する。このダイヤル信号は通信制御
装置2を介して第2図に示す交換網に送出されるととも
に、ダイヤル番号検知回路3に入力される。なお、ダイ
ヤル番号検知回路3に入力される信号はダイヤル信号そ
のものでもよいが、通信先がわかる信号であればダイヤ
ル信号以外の信号でもよく、例えば押しボタン電話機の
場合は押しボタンの接点動作により得られる電気信号(
接点信号)でもよい。ダイヤル信号ダイヤル番号検知回
路3はダイヤル信号から通信先(端末)を知り、その通
信先。
FIG. 1 shows the configuration of a transmitting section of a cryptographic communication system according to an embodiment of the present invention. In this figure, a dial signal generator 1 is a circuit that generates a dial signal for calling a communication destination, and in the case of a normal dial type telephone, it generates a dial pulse, and in the case of a push button telephone, it generates a multifrequency signal. Occur. This dial signal is sent to the exchange network shown in FIG. 2 via the communication control device 2, and is also input to the dial number detection circuit 3. Note that the signal input to the dial number detection circuit 3 may be the dial signal itself, but it may also be a signal other than the dial signal as long as it indicates the destination of the communication. electrical signal (
(contact signal) may also be used. The dial signal dial number detection circuit 3 detects the communication destination (terminal) from the dial signal.

を示す信号を鍵発生回路4に供給する。、鍵発生回路4
は予め第4図(b)に示すような公開鍵リストの内容、
すなわち加入端末のうちの自端末以外の端末(勿論、自
端末を含んでいても差支えない)に当てられている公開
暗号鍵KEiを記憶し、たちのであって、例えばROM
により構成される。そして、鍵発生回路4はダイヤル番
号検知回路3から通信先を示す信号が与えられると、そ
の通信先の端末に当てられている公開暗号鍵をROMの
対応する番地から読出して出力する。
A signal indicating this is supplied to the key generation circuit 4. , key generation circuit 4
is the content of the public key list as shown in FIG. 4(b) in advance,
In other words, the public encryption key KEi assigned to the subscriber terminals other than the own terminal (of course, this may include the own terminal) is stored, for example, in a ROM.
Consisted of. When the key generation circuit 4 receives a signal indicating the communication destination from the dial number detection circuit 3, it reads out the public encryption key assigned to the communication destination terminal from the corresponding address in the ROM and outputs it.

この動作を本発明が適用される通信網を示す第2図を参
照して説明する。例えば端末aから端末dへ通信を行な
う場合を考える。端末dのダイヤル番号が’2612”
であるとすると、ダイヤル番号検知回路3は“”261
2°゛を検知し、このダイヤル番号に対応したアドレス
゛°4”を指定する一号を鍵発生回路4に与える。これ
により鍵発生回路4は端末dに当てられた公開暗号鍵K
Edの信号、すなわち鍵コードを発生する。
This operation will be explained with reference to FIG. 2, which shows a communication network to which the present invention is applied. For example, consider a case where communication is performed from terminal a to terminal d. The dial number of terminal d is '2612'
Assuming that, the dial number detection circuit 3 is “”261
2° is detected, and a number specifying the address "°4" corresponding to this dial number is given to the key generation circuit 4. As a result, the key generation circuit 4 generates the public encryption key K assigned to the terminal d.
Generates an Ed signal, that is, a key code.

鍵発生回路4からの鍵コードは暗号器6に供給される。The key code from the key generation circuit 4 is supplied to the encoder 6.

暗号器6は通信情報源5から通信すべき情報(ディジタ
ルデータ)の供給を受けており、この通信情報を鍵発生
回路4からの鍵コードにより暗号化して送信回路7に送
る。送信回路7は例えばデータ・モデムであり、暗号器
6からの暗号化された通信情報を所定の信号形態に変換
し、通信先への接続を持って通信制御装置2を通して交
換網8へ送出する。
The encoder 6 is supplied with information (digital data) to be communicated from the communication information source 5, encrypts this communication information using the key code from the key generation circuit 4, and sends it to the transmission circuit 7. The transmitting circuit 7 is, for example, a data modem, which converts the encrypted communication information from the encoder 6 into a predetermined signal form, and sends it to the switching network 8 through the communication control device 2 with a connection to the communication destination. .

以上のようにして、この発明によれば通信網確立のため
のダイヤル操作に伴い自動的に通信先の公開暗号鍵が選
択され、それに基いて通信情報が暗号化されて送出され
る。従って、ダイヤル操作と公開鍵リストからの通信先
の暗号鍵検索・選択操作ζを別個に行なう方法に比べて
送信操作が簡略化され、また暗号鍵を間違うことがない
という利点がある。
As described above, according to the present invention, the public encryption key of the communication destination is automatically selected in conjunction with a dial operation for establishing a communication network, and communication information is encrypted and sent based on the public encryption key. Therefore, compared to a method in which the dialing operation and the encryption key search/selection operation ζ of the communication destination from the public key list are performed separately, the transmission operation is simplified, and there is an advantage that there is no possibility of entering the wrong encryption key.

なお、この発明の方式によるとダイヤル操作を間違える
と暗号鍵も間違った相手の端末に当てられた鍵となって
しまうことにより、間違った相手と通信網が確立されて
しまうことになるが、通常この種の暗号通信システムで
はダイヤル後にアイデントコードを送出し通信先を確認
してから通信を開始する方法がとられるので、実際には
間違った相手に不用意に情報が漏れてしまうおそれはな
い。
According to the system of this invention, if the dialing operation is incorrect, the encryption key will be assigned to the wrong terminal, and a communication network will be established with the wrong terminal. This type of encrypted communication system sends an ident code after dialing and confirms the destination before starting communication, so there is actually no risk of information being inadvertently leaked to the wrong party. .

この発明は上記した実施例に限定されるものではなく、
その要旨を逸脱しない範囲で種々変形実施が可能である
This invention is not limited to the above embodiments,
Various modifications can be made without departing from the gist of the invention.

【図面の簡単な説明】[Brief explanation of the drawing]

′第1図はこの発明の一実施例の暗号通信方式の構成を
説明するための図、第2図はこの発明の方式が適用され
る通信網の概略構成図、第3図は暗号鍵と解読鍵とに共
通の鍵を用いる一般的な暗号通信システムの構成を説明
するための図、第4図(a)(b)は公開鍵暗号方式に
よる暗号通信システムの構成と公開鍵リストを示す図で
ある。 1・・・ダイヤル信号発生器、2・・・通信制御装置、
3・・・ダイヤル番号検知回路、4・・・鍵発生回路、
5・・・情報信号源、6用暗号器、7・・・送信回路、
8・・・交換網。 出願人代理人 弁理士 鈴江武彦 第1図 第2図
'Figure 1 is a diagram for explaining the configuration of an encrypted communication system according to an embodiment of the present invention, Figure 2 is a schematic configuration diagram of a communication network to which the system of this invention is applied, and Figure 3 is a diagram for explaining the configuration of an encrypted communication system according to an embodiment of the present invention. Figures 4(a) and 4(b) are diagrams for explaining the configuration of a general cryptographic communication system that uses a common key for decryption and decryption, and show the configuration and public key list of a cryptographic communication system using public key cryptography It is a diagram. 1...Dial signal generator, 2...Communication control device,
3...Dial number detection circuit, 4...Key generation circuit,
5... Information signal source, 6 encoder, 7... Transmission circuit,
8... Exchange network. Applicant's agent Patent attorney Takehiko Suzue Figure 1 Figure 2

Claims (1)

【特許請求の範囲】[Claims] 通信先を呼出すためのダイヤル信号を発生するダイヤル
信号発生手段と、このダイヤル信号発生手段からダイヤ
ル信号またはこの信号以外の通信先に関する信号を受け
、予め記憶した複数の相手端末の公開暗号鍵から通信先
の公開暗号鍵を選択してその公開暗号鍵の信号を発生す
る鍵発生手段と、この鍵発生手段からの鍵信号を受け、
その鍵信号によって与えられる公開暗号鍵に基き通信情
報を暗号化して送出する手段とを備えたことを特徴とす
る暗号通信方式。
A dial signal generating means for generating a dial signal for calling a communication destination, and receiving a dial signal or a signal related to a communication destination other than this signal from the dial signal generation means, and communicating from public encryption keys of a plurality of communication destination terminals stored in advance. a key generation means for selecting a public encryption key and generating a signal of the public encryption key; and receiving a key signal from the key generation means;
A cryptographic communication system comprising means for encrypting and transmitting communication information based on a public cryptographic key given by the key signal.
JP59135932A 1984-06-30 1984-06-30 Ciphering communication system Pending JPS6115438A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP59135932A JPS6115438A (en) 1984-06-30 1984-06-30 Ciphering communication system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP59135932A JPS6115438A (en) 1984-06-30 1984-06-30 Ciphering communication system

Publications (1)

Publication Number Publication Date
JPS6115438A true JPS6115438A (en) 1986-01-23

Family

ID=15163212

Family Applications (1)

Application Number Title Priority Date Filing Date
JP59135932A Pending JPS6115438A (en) 1984-06-30 1984-06-30 Ciphering communication system

Country Status (1)

Country Link
JP (1) JPS6115438A (en)

Similar Documents

Publication Publication Date Title
US6266418B1 (en) Encryption and authentication methods and apparatus for securing telephone communications
US5450493A (en) Secure communication method and apparatus
US4182933A (en) Secure communication system with remote key setting
EP0538216B1 (en) Method for identification and exchange of encryption keys
US4797672A (en) Voice network security system
US7284123B2 (en) Secure communication system and method for integrated mobile communication terminals comprising a short-distance communication module
JPH04506137A (en) Key distribution method in public communication networks considering security level
EP0660564A2 (en) Secure communication setup method
JPH10242956A (en) Privacy telephone set
KR100287674B1 (en) Communication method
JPH11507782A (en) Method and apparatus for transmitting secret connection establishment information and service information between a subscriber terminal and one or more digital exchanges
JP4827717B2 (en) COMMUNICATION SYSTEM, TRANSMITTING TERMINAL TERMINAL DEVICE, AND RECEIVING SIDE TERMINAL DEVICE
WO1991012680A1 (en) Apparatus and method for data communication
JPS6115438A (en) Ciphering communication system
JPH09149023A (en) Information communication processor and information communication processing method
JPH07336328A (en) Cipher device
JPH0817380B2 (en) Confidential information communication method and confidential information communication device
JPH05122217A (en) Ciphering communication method
JPH07303104A (en) Storage type communication system with ciphering function
JPH09130618A (en) Facsimile equipment
KR101728338B1 (en) Call Security System
JPH06112936A (en) Ciphering communication system
KR100227790B1 (en) Information sending and receiving method in facsimile communication
JPH0334640A (en) Method and device for confidential facsimile communication
JPH05244153A (en) Digital communication equipment