KR20170033575A - Device for receiving key data, server for providing decoding procedure and device for sending key data - Google Patents

Device for receiving key data, server for providing decoding procedure and device for sending key data Download PDF

Info

Publication number
KR20170033575A
KR20170033575A KR1020150131488A KR20150131488A KR20170033575A KR 20170033575 A KR20170033575 A KR 20170033575A KR 1020150131488 A KR1020150131488 A KR 1020150131488A KR 20150131488 A KR20150131488 A KR 20150131488A KR 20170033575 A KR20170033575 A KR 20170033575A
Authority
KR
South Korea
Prior art keywords
decryption
procedure
encrypted data
decryption procedure
procedures
Prior art date
Application number
KR1020150131488A
Other languages
Korean (ko)
Inventor
이원영
Original Assignee
주식회사 케이티
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 주식회사 케이티 filed Critical 주식회사 케이티
Priority to KR1020150131488A priority Critical patent/KR20170033575A/en
Publication of KR20170033575A publication Critical patent/KR20170033575A/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0457Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply dynamic encryption, e.g. stream encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The apparatus for receiving encrypted data includes an encrypted data receiving unit for receiving encrypted encrypted data based on an encryption key from an encrypted data transmitting apparatus, and an encrypted data receiving unit for receiving at least one decrypted procedure generated based on an encryption key from a decryption procedure providing server And at least one decryption procedure is configured to decrypt the encrypted data and determine whether or not the decryption has been completed.

Description

TECHNICAL FIELD [0001] The present invention relates to an encrypted data receiving apparatus, a decryption procedure providing server, and an encrypted data transmitting apparatus.

The present invention relates to an encrypted data receiving apparatus, a decryption procedure providing server, and an encrypted data transmitting apparatus.

"Encryption" refers to the conversion of data in the form of ciphertexts whose meaning is unknown, and it is possible to protect the data by encrypting the data to prevent the outflow of data. Encryption means to convert information into ciphertext using a cryptographic key, and decryption means to restore original information using a decryption key. The original data can not be restored except for the person having the decryption key, and the information can be protected if the decryption key is not leaked to the third party.

In connection with this encryption technique, Korean Unexamined Patent Publication No. 2006-0051957 discloses a method for distributing encrypted data, an encryption device, a decryption device, an encryption program, and a decryption program.

However, in a data encryption environment based on a cryptographic key / decryption key, there is a possibility that a cryptographic key and encrypted data may be leaked. If both the information are exposed, there is a risk that anyone can decrypt or encrypt the data.

The cryptographic data receiver includes a cryptographic data receiving device for receiving a procedure used for decryption from the decryption procedure providing server and decrypting the decrypted cryptographic data so that the decrypted cryptographic data can be decrypted without forwarding the cryptographic key from the sender, And an encrypted data transmitting apparatus. Decryption information (key, encryption decryption data) commonly provided between the encryption data sender, the encryption data receiver, and the decryption procedure providing server does not exist, thereby reducing the risk of data leakage and improving the security. A receiving apparatus, a decryption procedure providing server, and an encrypted data transmitting apparatus. It is another object of the present invention to provide an encrypted data receiving apparatus, a decryption proxy providing server, and an encrypted data transmitting apparatus that enable dynamic control of a decryption process by changing a decryption procedure. It is to be understood, however, that the technical scope of the present invention is not limited to the above-described technical problems, and other technical problems may exist.

According to an aspect of the present invention, there is provided a cryptographic apparatus including a cryptographic data receiving unit for receiving cryptographic data encrypted based on a cryptographic key from a cryptographic data transmitting apparatus, And a decryption procedure receiving unit for receiving at least one decryption procedure generated based on the key, wherein the at least one decryption procedure is configured to decrypt the encrypted data and determine whether or not the decryption has been completed can do.

According to another embodiment of the present invention, there is provided a communication apparatus including a receiving unit that receives an encryption key from an encrypted data transmission apparatus, a procedure generation unit that generates at least one decryption procedure based on the encryption key, The encrypted data is transmitted from the encrypted data transmission apparatus to the encrypted data reception apparatus, and the at least one decryption procedure is transmitted from the encrypted data transmission apparatus to the encrypted data reception apparatus, And decrypting the encrypted data and determining whether or not the decryption has been completed.

According to another embodiment of the present invention, there is provided a data processing apparatus including an encryption unit for generating encryption data for original data based on an encryption key, and a transmission unit for transmitting the generated encryption key to a decryption procedure server, And at least one decryption procedure is generated by the decryption procedure server based on the encryption key, and then transmitted to the encrypted data receiving apparatus, and the at least one decryption procedure is transmitted to the encrypted data receiving apparatus, And decides whether or not the decryption has been completed.

The above-described task solution is merely exemplary and should not be construed as limiting the present invention. In addition to the exemplary embodiments described above, there may be additional embodiments described in the drawings and the detailed description of the invention.

According to any one of the above-mentioned objects of the present invention, the cryptographic data receiver can decrypt the cryptographic data by receiving a procedure used for decryption from the decryption procedure providing server, It is possible to provide an encrypted data receiving apparatus, a decryption procedure providing server, and an encrypted data transmitting apparatus. Decryption information (key, encryption decryption data) commonly provided between the encryption data sender, the encryption data receiver, and the decryption procedure providing server does not exist, thereby reducing the risk of data leakage and improving the security. It is possible to provide a receiving apparatus, a decryption procedure providing server, and an encrypted data transmitting apparatus. It is also possible to provide an encrypted data receiving apparatus, a decrypting proxy providing server, and an encrypted data transmitting apparatus that can dynamically control the decryption process by changing a decryption procedure or the like.

1 is a configuration diagram of an encryption data system according to an embodiment of the present invention.
2 is a configuration diagram of an encrypted data transmitting apparatus according to an embodiment of the present invention.
3 is a flowchart of a method of transmitting cryptographic data in an encrypted data transmission apparatus according to an embodiment of the present invention.
4 is a configuration diagram of a decryption procedure providing server according to an embodiment of the present invention.
5 is an exemplary diagram illustrating a process of generating a decryption procedure based on an encryption key in a decryption procedure providing server according to an embodiment of the present invention.
6 is a flowchart of a method of providing a decryption procedure in a decryption procedure providing server according to an embodiment of the present invention.
7 is a configuration diagram of an encrypted data receiving apparatus according to an embodiment of the present invention.
8 is an exemplary diagram illustrating a process of decrypting encrypted data using a decryption procedure in an encrypted data receiving apparatus according to an embodiment of the present invention.
9 is a flowchart of a method for receiving cryptographic data in a cryptographic data receiving apparatus according to an embodiment of the present invention.

Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings, which will be readily apparent to those skilled in the art. The present invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. In order to clearly illustrate the present invention, parts not related to the description are omitted, and similar parts are denoted by like reference characters throughout the specification.

Throughout the specification, when a part is referred to as being "connected" to another part, it includes not only "directly connected" but also "electrically connected" with another part in between . Also, when an element is referred to as "including" an element, it is to be understood that the element may include other elements as well as other elements, And does not preclude the presence or addition of one or more other features, integers, steps, operations, components, parts, or combinations thereof.

In this specification, the term " part " includes a unit realized by hardware, a unit realized by software, and a unit realized by using both. Further, one unit may be implemented using two or more hardware, or two or more units may be implemented by one hardware.

In this specification, some of the operations or functions described as being performed by the terminal or the device may be performed in the server connected to the terminal or the device instead. Similarly, some of the operations or functions described as being performed by the server may also be performed on a terminal or device connected to the server.

Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings.

1 is a configuration diagram of an encryption data system according to an embodiment of the present invention. 1, the cryptographic data system 1 may include an encrypted data transmission apparatus 110, a decryption procedure provision server 120, and an encrypted data reception apparatus 130. [ The encrypted data transmission apparatus 110, the decryption procedure provision server 120 and the encrypted data reception apparatus 130 shown in FIG. 1 illustratively show the components that can be controlled by the cryptographic data system 1 .

Each component of the cryptographic data system 1 of Fig. 1 is generally connected via a network. For example, as shown in FIG. 1, the cryptographic data receiving apparatus 130 may be connected to the cryptographic data transmitting apparatus 110 and the decryption procedure providing server 120 through a network at the same time or at intervals.

A network refers to a connection structure in which information can be exchanged between nodes such as terminals and servers. An example of such a network is Wi-Fi, Bluetooth, Internet, LAN Network, wireless LAN, WAN, PAN, 3G, 4G, 5G, LTE, and the like.

The encrypted data transmission apparatus 110 can generate encrypted data for original data based on the encryption key. For example, the encrypted data transmitting apparatus 110 can encrypt original data with encrypted data using an encryption key.

The encrypted data transmission apparatus 110 can transmit the generated encryption key to the decryption procedure server 120. [ Further, the encrypted data transmitting apparatus 110 can transmit the generated encrypted data to the encrypted data receiving apparatus 130. [

The decryption procedure server 120 receives the encryption key from the encrypted data transmission device 110 and can generate at least one decryption procedure based on the encryption key. For example, the decryption procedure server 120 can generate at least one decryption procedure configured as one set based on the encryption key. At this time, at least one decryption procedure decrypts the encrypted data and determines whether or not the decryption has been completed. Each of the decryption procedures can decrypt different parts of the encrypted data as a unit of decryption, It is possible to determine whether or not the decoding has been completed based on the change in the output value, size or size of the decoded decoded data.

For example, whether or not the decoding has been completed may be determined when a specific instruction word is input to the decoded decoded data and the output value is output as a predetermined value or when the size of the decoded data matches the predetermined size . Further, each of the decryption procedures can be executed independently, and different portions of the encrypted data can be decrypted at different points in time.

The decryption procedure server 120 can generate and assign IDs corresponding to each of at least one of the decryption procedures, and determine a distribution order for at least one of the decryption procedures. For example, the decryption procedure server 120 provides the IDs of the decryption procedures corresponding to the next distribution sequence to the respective decryption procedures based on the distribution order, so that the decrypted procedure is the ID of the decryption procedure corresponding to the next distribution sequence It is possible to check whether or not a decryption procedure corresponding to the next distribution sequence exists in the encrypted data reception device 130 by using the encryption key.

The decryption procedure server 120 can transmit at least one decryption procedure to the encrypted data receiving apparatus 130. [ For example, the decryption procedure server 120 can sequentially transmit at least one decryption procedure on the basis of the completion of decryption and the distribution procedure for each decryption procedure. At this time, among the at least one decoded procedure, the decoded procedure can check whether there is a decoded procedure corresponding to the next distribution sequence. For example, the decryption procedure server 120 may transmit at least one decryption procedure to the encrypted data receiving device 130 in an arbitrary order different from the distribution procedure. At this time, at least one of the decryption procedures can decrypt the encrypted data based on the distribution order.

The decryption procedure server 120 receives the completion of decryption from each decryption procedure, and can transmit a deletion command to each decryption procedure based on whether or not the decryption has been completed. For example, when the decryption procedure server 120 receives a decryption completion signal from at least one decryption procedure, the decryption procedure server 120 can transmit a decryption instruction to the decryption procedure that has been decrypted.

The encrypted data receiving apparatus 130 can receive the encrypted password data from the encrypted data transmitting apparatus 110 based on the encryption key.

The encrypted data receiving apparatus 130 may receive at least one decryption procedure generated based on the encryption key from the decryption procedure providing server 120. [ At this time, the encrypted data receiving apparatus 130 can sequentially receive at least one decryption procedure based on the completion of decryption and the distribution procedure for each decryption procedure.

Here, the decryption procedure that has been decrypted in at least one of the decryption procedures can check whether there is a decryption procedure corresponding to the next distribution sequence. For example, each of the decryption procedures is given an ID by the decryption procedure server 120, the ID of the decryption procedure corresponding to the next distribution sequence is provided based on the distribution order, and the decrypted decryption procedure is decrypted It is possible to check whether or not the decryption procedure corresponding to the next distribution sequence exists in the encrypted data reception device 130 by using the ID of the decryption procedure corresponding to the distribution procedure. At this time, if the decryption procedure corresponding to the next distribution sequence of the decrypted decryption procedure is not present in the encrypted data reception device 130, the decrypted decryption procedure transmits its ID to the decryption procedure provision server 120 And the encrypted data receiving apparatus 130 can receive the decryption procedure corresponding to the next distribution sequence from the decryption procedure providing server 120. [

In addition, at least one of the decryption procedures may sequentially decrypt the encrypted data in accordance with the distribution order, and determine whether or not the decryption has been completed. For example, each of the decryption procedures can decrypt different parts of the encrypted data as a unit of decryption. Further, each of the decoding procedures can determine whether decoding has been completed based on a change in the output value, size, or size of the decoded data decoded by the respective decoding procedures.

At this time, each of the decryption procedures can be deleted based on whether or not the decryption has been completed. Further, each of the decryption procedures can be deleted based on the presence or absence of a decryption procedure corresponding to the next distribution sequence. That is, the decrypted decryption procedure can be deleted by itself, or can be deleted when receiving the deletion command from the decryption procedure server 120. [

2 is a configuration diagram of an encrypted data transmitting apparatus according to an embodiment of the present invention. Referring to FIG. 2, the encrypted data transmission apparatus 110 may include an encryption unit 210 and a transmission unit 220.

The encryption unit 210 can generate encryption data for the original data based on the encryption key.

The transmitting unit 220 can transmit the generated encryption key to the decryption procedure server. Also, the transmitting unit 220 can transmit the encrypted data to the encrypted data receiving apparatus 130. [

 3 is a flowchart of a method of transmitting cryptographic data in an encrypted data transmission apparatus according to an embodiment of the present invention. The method of transmitting the cipher data performed by the cipher data transmitting apparatus 110 according to the embodiment shown in Fig. 3 is the same as the method described with reference to the cipher data system 1 according to the embodiment shown in Fig. The present invention is also applied to a method of transmitting encrypted data performed by the encrypted data transmitting apparatus 110 according to the embodiment shown in Figs.

In step 310, the encrypted data transmitting apparatus 110 can generate encrypted data for the original data based on the encryption key. In step S320, the encrypted data transmission apparatus 110 transmits the generated encryption key to the decryption procedure server 120, and transmits the encrypted data to the encrypted data reception apparatus 130. [ At this time, at least one decryption procedure is generated by the decryption procedure server 120 based on the encryption key, and then transmitted to the encrypted data reception device 130. At least one decryption procedure decrypts the encrypted data, It can be judged whether or not it is completed.

In the above description, steps S310 to S320 may be further divided into additional steps or combined into fewer steps, according to an embodiment of the present invention. Also, some of the steps may be omitted as necessary, and the order between the steps may be changed.

4 is a configuration diagram of a decryption procedure providing server according to an embodiment of the present invention. 4, the decryption procedure providing server 120 includes a receiving unit 410, a procedure generating unit 420, an ID generating unit 430, a distribution order scheduler 440, a decryption procedure transmitting unit 450, (460).

The receiving unit 410 can receive the encryption key from the encrypted data transmitting apparatus 110. [

The procedure generator 420 can generate at least one decryption procedure based on the encryption key. Here, at least one decryption procedure can decrypt the encrypted data and determine whether or not the decryption has been completed. For example, the procedure generator 420 may generate at least one decryption procedure configured as one set based on the encryption key. At this time, each of the decryption procedures can decrypt different parts of the encrypted data as a unit of decryption, and determines whether or not the decryption has been completed based on a change in the output value, the size, or the size of the decrypted data, can do.

The ID generation unit 430 may generate and assign an ID corresponding to each of the at least one decoding procedure. For example, when the procedure generating unit 420 generates four decoded procedures, the ID generating unit 430 sets the ID of the first decoded procedure to '1' for the four decoded procedures, ID is 2, ID of the third decoding procedure is 3, and ID of the fourth decoding procedure is 4.

The distribution order scheduler 440 can determine a distribution order for at least one decoding procedure. At this time, at least one of the decryption procedures can sequentially decrypt the encrypted data in accordance with the distribution order. For example, when the decryption procedure server 120 generates four decryption procedures, the decryption procedure can determine the distribution order in the order of the first decryption procedure, the second decryption procedure, the third decryption procedure, and the fourth decryption procedure have.

In addition, the distribution order scheduler 440 can provide the IDs of the decoding procedures corresponding to the next distribution sequence to each of the decoding procedures based on the distribution order. At this time, the decrypted procedure can check whether the decryption procedure corresponding to the next distribution sequence exists in the encrypted data reception device 130 by using the ID of the decryption procedure corresponding to the next distribution sequence. For example, the distribution order scheduler 440 can provide the first decoding procedure '2', which is the ID of the second decoding procedure corresponding to the next distribution order, based on the distribution order. For example, the distribution order scheduler 440 may provide the IDs of the decryption procedures corresponding to the previous distribution order to each of the decryption procedures. Therefore, each of the decryption procedures can use the ID of the decryption procedure to judge whether or not the execution of the previous decryption procedure is in the execution state or to delete the previous decryption procedure.

The decryption procedure transmitting unit 450 can transmit at least one decryption procedure to the encrypted data receiving apparatus 130. [ The decoding procedure transmitting unit 450 can sequentially transmit at least one decoding procedure based on the decoding completion and the distribution order for each decoding procedure. At this time, among the at least one decoded procedure, the decoded procedure can check whether there is a decoded procedure corresponding to the next distribution order. For example, in the case where the decryption procedure server 120 generates four decryption procedures, the decryption procedure is performed in the order of the first decryption procedure, the second decryption procedure, the third decryption procedure, and the fourth decryption procedure, 130). At this time, when the first decryption procedure is transmitted to the encrypted data receiving apparatus 130, the first decryption procedure can check whether or not the second decryption procedure exists in the encrypted data receiving apparatus 130. [

A process of generating and transmitting the above-described decryption procedure will be described in detail with reference to FIG.

5 is an exemplary diagram illustrating a process of generating a decryption procedure based on an encryption key in a decryption procedure providing server according to an embodiment of the present invention. 5, the receiving unit 410 can receive the encryption key 500 from the encrypted data transmission apparatus 110. [

The procedure generator 420 generates a decryption procedure 1 '510, a' decryption procedure 2 '520, and a' decryption procedure 3 '530 reflecting the encryption key based on the encryption key, , And a decryption procedure 4 '540 that reflects the encryption key can be generated.

For example, suppose that the 'decryption procedure 2' 520 reflecting the encryption key is transmitted to the encrypted data reception device 130.

The ID generation unit 430 generates and assigns an ID corresponding to the 'decryption procedure 2' 520 reflecting the encryption key (550), and the distribution order scheduler 440 generates an ID corresponding to the 'encryption key' The ID information corresponding to the decryption procedure 3 '530 may be provided to the' Decryption Procedure 2 '520 (560).

The decryption procedure transmitting unit 450 can transmit the 'decryption procedure 2' 520 to the encrypted data receiving apparatus 130.

Returning to FIG. 2, the deleting unit 460 receives the completion of decoding from each of the decoding procedures, and can transmit a delete command to each of the decoding procedures based on whether decoding has been completed or not. For example, the deletion unit 460 may transmit a delete command to the decrypted decryption procedure.

6 is a flowchart of a method of providing a decryption procedure in a decryption procedure providing server according to an embodiment of the present invention. The method for providing the decryption procedure performed by the decryption procedure providing server 120 according to the embodiment shown in FIG. 6 is the same as that of the decryption procedure shown in FIG. . Therefore, even if omitted in the following description, the content already described with respect to the cryptographic data system 1 according to the embodiment shown in Figs. 1 to 5 is not limited to the decryption procedure providing server 120 according to the embodiment shown in Fig. 6 To a method for providing a decoding procedure performed by the decoding apparatus.

In step S610, the decryption procedure providing server 120 can receive the encryption key from the encrypted data transmission device 110. [ Here, the encryption key may be such that original text data is encrypted with encrypted data, and encrypted data is transmitted from encrypted data transmission device 110 to encrypted data reception device 130. In step S620, the decryption procedure providing server 120 can generate at least one decryption procedure based on the encryption key. For example, the decryption procedure providing server 120 can generate at least one decryption procedure configured as one set based on the encryption key. At this time, each of the decryption procedures may be configured to decrypt different parts of the encrypted data as a unit of decryption. In step S630, the decryption procedure providing server 120 may transmit at least one decryption procedure to the encrypted data receiving apparatus 130. [ Here, the at least one decryption procedure may be configured to decrypt the encrypted data and determine whether or not the decryption has been completed. For example, the decryption procedure providing server 120 can sequentially transmit at least one decryption procedure based on whether or not the decryption completion has been completed for each of the decryption procedures and the distribution order. At this time, among the at least one decoded procedure, the decoded procedure can be configured to check whether there is a decoded procedure corresponding to the next distribution order. Here, whether or not the decryption has been completed may be determined based on a change in the output value or the size of the decrypted data in which a part of the encrypted data is decrypted.

Although not shown in FIG. 6, the decryption procedure providing server 120 may further include a step of determining a distribution order for at least one decryption procedure. At this time, the at least one decryption procedure may be configured to sequentially decrypt the encrypted data in accordance with the distribution order.

Although not shown in FIG. 6, the decryption procedure providing server 120 may further include a step of generating an ID corresponding to each of the at least one decryption procedure. For example, the decryption procedure providing server 120 provides the IDs of the decryption procedures corresponding to the next distribution procedure to the respective decryption procedures based on the distribution procedure, and the decrypted procedure is the decryption procedure corresponding to the next distribution procedure ID to check whether or not a decryption procedure corresponding to the next distribution sequence exists in the encrypted data reception device 130. [

Although not shown in Fig. 6, the decryption procedure providing server 120 receives the completion of decryption from each decryption procedure, and can transmit a deletion command to each decryption procedure based on whether decryption has been completed or not.

In the above description, steps S610 to S630 may be further divided into further steps or combined into fewer steps, according to an embodiment of the present invention. Also, some of the steps may be omitted as necessary, and the order between the steps may be changed.

7 is a configuration diagram of an encrypted data receiving apparatus according to an embodiment of the present invention. The encrypted data receiving apparatus 130 may include an encrypted data receiving unit 710, a decrypted procedure receiving unit 720, and a procedure managing unit (not shown).

The encrypted data receiving unit 710 can receive the encrypted password data based on the encryption key from the encrypted data transmitting apparatus 110. [

The decryption procedure receiving unit 720 can receive at least one decryption procedure generated based on the encryption key from the decryption procedure providing server 120. [ For example, when four decoding procedures are generated from the decoding procedure providing server 120, the decoding procedure receiving unit 720 receives four decoding procedures from the decoding procedure providing server 120 as a first decoding procedure, , The third decoding procedure, and the fourth decoding procedure in that order.

At this time, at least one of the decryption procedures can sequentially decrypt the encrypted data in accordance with the distribution order and determine whether or not the decryption has been completed. Each of the decryption procedures decrypts different portions of the encrypted data as a unit of decryption, and can determine whether or not the decryption has been completed based on the change in the output value or the size of the decrypted data.

When the decoding procedure receiving unit 720 sequentially receives at least one decoding procedure based on whether or not each decoding procedure has been completed and the distribution order, the decoding procedure in which at least one of the decoding procedures has been decoded is performed in the next distribution sequence It is possible to check whether or not the corresponding decoding procedure exists. Each of the decryption procedures is given an ID by the decryption procedure server 120, and based on the distribution order, the ID of the decryption procedure corresponding to the next distribution sequence can be received, and the decryption procedure that has been decrypted corresponds to the next distribution sequence It is possible to check whether or not the decryption procedure corresponding to the next distribution sequence exists in the encrypted data reception device 130 by using the ID of the decryption procedure. At this time, if the decryption procedure corresponding to the next distribution sequence of the decrypted decryption procedure is not present in the encrypted data receiving device 130, the decrypted decryption procedure transfers its ID to the decryption procedure providing server 120 The decryption procedure receiving unit 720 can receive the decryption procedure corresponding to the next distribution sequence from the decryption procedure providing server 120. [ For example, when the decryption procedure receiving unit 720 receives the first decryption procedure from the decryption procedure providing server 120, the first decryption procedure decrypts the encrypted data and uses the ID of the second decryption procedure to perform the next distribution It is possible to check whether or not the first decryption procedure corresponding to the order exists in the encrypted data reception device 130. [

Further, each of the decryption procedures can be deleted based on whether or not the decryption has been completed, and can be deleted based on the presence or absence of the decryption procedure corresponding to the next distribution sequence.

A procedure management unit (not shown) can manage the respective decryption procedures. For example, the procedure management unit manages the download schedule of the decryption procedure, and can transmit the decryption procedure status information to the decryption procedure server 120. [ At this time, the status information on the decryption procedure may include whether to download, whether the decryption has been completed, whether to delete, whether to stop the decryption, and the like. That is, the procedure management unit can manage status information and reception (download) of the decryption procedure in cooperation with the decryption procedure server 120. [ On the other hand, each of the decryption procedures can transmit its own status information to the decryption procedure server 120. [

8 is an exemplary diagram illustrating a process of decrypting encrypted data using a decryption procedure in an encrypted data receiving apparatus according to an embodiment of the present invention. Referring to FIG. 8, the encrypted data receiving apparatus 130 can receive the encrypted data 800 encrypted based on the encryption key from the encrypted data transmission apparatus 110. FIG. The encrypted data receiving apparatus 130 may receive at least one decryption procedure generated based on the encryption key from the decryption procedure providing server 120. [

For example, when the cryptographic data receiving apparatus 130 receives the 'cryptographic key reflecting decryption procedure 1' 810 from the decryption procedure providing server 120, the 'cryptographic key reflecting decryption procedure 1' (812) of the decryption result 811 of the encryption key reflecting decryption procedure 811 and the 'encryption key reflecting decryption procedure 2' 814 using the ID of the 'encryption key reflecting decryption procedure 2' 814, which is the decryption procedure corresponding to the next distribution sequence, It is possible to check whether the encrypted data exists in the encrypted data receiving apparatus 130 (813).

The 'cryptographic key reflecting decryption procedure 2' 814 temporarily stores the decryption result 815 of the cryptographic data in the temporary storage 816 when the 'cryptographic key reflection decryption procedure 2' 814 is present in the cryptographic data receiving apparatus 130, , And determines whether the 'encryption key reflecting decoding procedure 3' 818 is present in the encrypted data receiving apparatus 130 by using the ID of the 'encryption key reflecting decoding procedure 3' 818 corresponding to the next distribution sequence (817).

The 'encryption key reflecting decoding procedure 3' 818 temporarily stores the decryption result 819 of the encrypted data in the temporary storage 820 when the 'encryption key reflecting decryption procedure 3' 818 is present in the encrypted data receiving device 130, And determines whether the 'encryption key reflecting decoding procedure 4' 822 exists in the encrypted data receiving apparatus 130 by using the ID of the 'encryption key reflecting decoding procedure 4' 822 which is a decoding procedure corresponding to the next distribution sequence (821).

The 'cryptographic key reflecting and decoding procedure 4' 822 stores the decryption result 823 of the cryptographic data in the temporary storage 824 when the 'cryptographic key reflecting decryption procedure 4' 822 exists in the cryptographic data receiving apparatus 130, can do.

In this way, for example, when there are ten cryptographic key reflecting decoding procedures, the cryptographic key reflecting decoding procedure can sequentially decode different parts according to the distribution order, and the cryptographic data receiving apparatus 130 Can obtain the plaintext for the encrypted data by collecting the temporarily stored decoding results 812, 816, 820, and 824. Further, the decrypted decryption procedure may be deleted from the decryption procedure providing server 120 by receiving the deletion command, or may be deleted by itself.

9 is a flowchart of a method for receiving cryptographic data in a cryptographic data receiving apparatus according to an embodiment of the present invention. The method for receiving the cipher data performed by the cipher data receiving apparatus 130 according to the embodiment shown in Fig. 9 is the same as the method for receiving the cipher data processed in the time-series processing in the cipher data system 1 according to the embodiment shown in Fig. 1 . Therefore, the content already described with respect to the cryptographic data system 1 according to the embodiment shown in Figs. 1 to 8 is not limited to the cryptographic data receiving apparatus 130 according to the embodiment shown in Fig. 9 The present invention is also applied to a method of receiving encrypted data.

In step S910, the encrypted data receiving apparatus 130 can receive the encrypted password data based on the encryption key from the encrypted data transmission apparatus 110. [

In step S920, the encrypted data receiving apparatus 130 can receive at least one decryption procedure generated based on the encryption key from the decryption procedure providing server 120. [ Here, the at least one decryption procedure can decrypt the encrypted data. Each of the decryption procedures may be configured to decrypt different parts of the encrypted data as a unit of decryption. In addition, at least one decoding procedure may be configured to judge whether decoding has been completed or not. The completion of the decryption may be determined based on a change in the output value or the size of the decrypted data decrypted by the respective decryption procedures and at least one decrypted procedure may be configured to decrypt the encrypted data sequentially in accordance with the distribution order .

For example, the encrypted data reception device 130 can sequentially receive at least one decryption procedure based on whether or not the decryption has been completed for each of the decryption procedures and the distribution procedure. Here, the decryption procedure that has been decrypted among the at least one decryption procedure may be configured to check whether there is a decryption procedure corresponding to the next distribution sequence. Each decryption procedure is given an ID by the decryption procedure server 120, The ID of the decryption procedure corresponding to the next distribution sequence is provided based on the distribution sequence, and the decryption procedure that has been decrypted uses the ID of the decryption procedure corresponding to the next distribution sequence to decrypt the encrypted data Device 130. < / RTI > At this time, if the decryption procedure corresponding to the next distribution sequence of the decrypted decryption procedure is not present in the encrypted data reception device 130, the decrypted decryption procedure transmits its ID to the decryption procedure provision server 120 , The encrypted data receiving apparatus 130 can receive the decryption procedure corresponding to the next distribution sequence from the decryption procedure providing server 120. [

Further, each of the decryption procedures may be configured to be deleted based on whether or not the decryption has been completed, and may be deleted based on the presence or absence of a decryption procedure corresponding to the next distribution sequence.

In the above description, steps S910 to S920 may be further divided into further steps or combined into fewer steps, according to an embodiment of the present invention. Also, some of the steps may be omitted as necessary, and the order between the steps may be changed.

The method for receiving the encrypted data in the encrypted data receiving apparatus described with reference to Figs. 1 to 9 can also be embodied in the form of a recording medium including a computer program stored in a medium executed by the computer or an instruction executable by the computer have. In addition, the method for receiving the encrypted data in the encrypted data receiving apparatus described with reference to Figs. 1 to 9 may also be implemented in the form of a computer program stored in a medium executed by the computer. Computer readable media can be any available media that can be accessed by a computer and includes both volatile and nonvolatile media, removable and non-removable media. In addition, the computer-readable medium may include both computer storage media and communication media. Computer storage media includes both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Communication media typically includes any information delivery media, including computer readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave, or other transport mechanism.

It will be understood by those skilled in the art that the foregoing description of the present invention is for illustrative purposes only and that those of ordinary skill in the art can readily understand that various changes and modifications may be made without departing from the spirit or essential characteristics of the present invention. will be. It is therefore to be understood that the above-described embodiments are illustrative in all aspects and not restrictive. For example, each component described as a single entity may be distributed and implemented, and components described as being distributed may also be implemented in a combined form.

The scope of the present invention is defined by the appended claims rather than the detailed description and all changes or modifications derived from the meaning and scope of the claims and their equivalents are to be construed as being included within the scope of the present invention do.

110: Password data transmitting device
120: Decryption procedure providing server
130: Password data receiving device
210:
220:
410:
420: Procedure generating unit
430: ID generation unit
440: Distribution Order Scheduler
450: decoded procedure transmission unit
460:
710:
720: decoding procedure receiver

Claims (21)

An apparatus for receiving encrypted data,
An encrypted data receiving unit for receiving the encrypted data encrypted based on the encryption key from the encrypted data transmitting apparatus; And
A decoding procedure receiver for receiving at least one decoding procedure generated based on the encryption key from a decoding procedure providing server
Lt; / RTI >
Wherein the at least one decryption procedure is configured to decrypt the encrypted data and determine whether or not the decryption has been completed.
The method according to claim 1,
Wherein each of the decryption procedures is configured to decrypt different parts of the encrypted data as a unit of decryption.
3. The method of claim 2,
Whether or not the decryption has been completed is determined based on a change in the output value, size, or size of decrypted data decrypted by the respective decryption procedures.
The method according to claim 1,
Wherein the at least one decryption procedure is configured to sequentially decrypt the encrypted data according to a distribution order.
5. The method of claim 4,
Wherein the decryption procedure receiver is configured to sequentially receive the at least one decryption procedure based on whether or not the decryption has been completed for each of the decryption procedures and the distribution procedure.
5. The method of claim 4,
Wherein the decryption procedure that has been decrypted among the at least one decryption procedure is configured to check whether there is a decryption procedure corresponding to the next distribution sequence.
The method according to claim 6,
Wherein each of the decryption procedures is given an ID by the decryption procedure server and is provided with an ID of a decryption procedure corresponding to a next distribution sequence based on the distribution procedure,
Wherein the decryption procedure that has been decrypted is configured to check whether a decryption procedure corresponding to the next distribution sequence exists in the encrypted data reception apparatus by using the ID of the decryption procedure corresponding to the next distribution sequence, Device.
8. The method of claim 7,
When the decryption procedure corresponding to the next distribution sequence of the decrypted decryption procedure is not present in the encrypted data reception apparatus,
Wherein the decrypted decryption procedure transmits its ID to the decryption procedure providing server,
Wherein the decryption procedure receiving unit is configured to receive a decryption procedure corresponding to the next distribution sequence from the decryption procedure providing server.
The method according to claim 1,
Wherein each of the decryption procedures is configured to be deleted based on whether or not the decryption has been completed.
10. The method of claim 9,
Wherein each of the decryption procedures is configured to be deleted based on whether or not there is a decryption procedure corresponding to a next distribution sequence.
A server for providing a decryption procedure,
A receiving unit for receiving an encryption key from an encrypted data transmitting apparatus;
A procedure generator for generating at least one decoding procedure based on the encryption key; And
A decryption procedure transmission unit for transmitting the at least one decryption procedure to the encrypted data receiving apparatus,
Lt; / RTI >
Wherein the encryption key encrypts the original text data with encrypted data,
The encrypted data is transmitted from the encrypted data transmission device to the encrypted data reception device,
Wherein the at least one decryption procedure is configured to decrypt the encrypted data and to determine whether or not the decryption has been completed.
12. The method of claim 11,
Wherein the procedure generation unit is configured to generate the at least one decryption procedure configured as one set based on the encryption key.
13. The method of claim 12,
Wherein each of the decryption procedures is configured to decrypt different parts of the encrypted data as a unit of decryption.
14. The method of claim 13,
Wherein the completion of the decryption is determined based on a change in an output value, a size, or a size of decrypted data in which a part of the encrypted data is decrypted.
12. The method of claim 11,
And a distribution order scheduler for determining a distribution order for the at least one decoding procedure
Further comprising:
Wherein the at least one decryption procedure is configured to sequentially decrypt the encrypted data according to the distribution order.
16. The method of claim 15,
Wherein the decryption procedure transmission unit is configured to sequentially transmit the at least one decryption procedure based on whether or not the decryption has been completed for each of the decryption procedures and the distribution procedure.
16. The method of claim 15,
Wherein the decrypted procedure of the at least one decryption procedure is configured to check whether a decryption procedure corresponding to the next distribution sequence exists.
18. The method of claim 17,
An ID generation unit for generating and giving an ID corresponding to each of the at least one decoding procedure,
And further comprising:
19. The method of claim 18,
Wherein the distribution sequence scheduler provides the IDs of the decryption procedures corresponding to the next distribution sequence to the respective decryption procedures based on the distribution sequence,
Wherein the decrypted procedure is configured to check whether a decryption procedure corresponding to the next distribution sequence exists in the encrypted data reception apparatus by using the ID of the decryption procedure corresponding to the next distribution sequence, .
12. The method of claim 11,
A deletion unit configured to receive the completion of the decoding from each of the decoding procedures and to transmit a delete command to each of the decoding procedures based on whether or not the decoding is completed,
Lt; / RTI > Decryption procedure providing server.
An apparatus for transmitting encrypted data,
An encryption unit for generating encrypted data for original data based on the encryption key; And
A transmitting unit for transmitting the generated encryption key to a decryption procedure server and transmitting the encrypted data to an encrypted data receiving apparatus,
Lt; / RTI >
At least one decryption procedure is generated by the decryption procedure server based on the encryption key, and then transmitted to the encrypted data reception device,
Wherein the at least one decryption procedure is configured to decrypt the encrypted data and determine whether or not the decryption has been completed.
KR1020150131488A 2015-09-17 2015-09-17 Device for receiving key data, server for providing decoding procedure and device for sending key data KR20170033575A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020150131488A KR20170033575A (en) 2015-09-17 2015-09-17 Device for receiving key data, server for providing decoding procedure and device for sending key data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020150131488A KR20170033575A (en) 2015-09-17 2015-09-17 Device for receiving key data, server for providing decoding procedure and device for sending key data

Publications (1)

Publication Number Publication Date
KR20170033575A true KR20170033575A (en) 2017-03-27

Family

ID=58497030

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020150131488A KR20170033575A (en) 2015-09-17 2015-09-17 Device for receiving key data, server for providing decoding procedure and device for sending key data

Country Status (1)

Country Link
KR (1) KR20170033575A (en)

Similar Documents

Publication Publication Date Title
JP2016513825A (en) Safety communication method and apparatus
EP3476078B1 (en) Systems and methods for authenticating communications using a single message exchange and symmetric key
CN104821944A (en) Hybrid encrypted network data security method and system
CN111371790B (en) Data encryption sending method based on alliance chain, related method, device and system
CN106411504B (en) Data encryption system, method and device
CN110401527B (en) Data encryption and decryption method and device and storage medium
US10050964B2 (en) Method and system for securing data communicated in a network
US20150229621A1 (en) One-time-pad data encryption in communication channels
CN105007254A (en) Data transmission method and system, and terminal
CN113300999B (en) Information processing method, electronic device, and readable storage medium
CN105959281A (en) File encrypted transmission method and device
CN112087302A (en) Device for encrypting and decrypting algorithm of asymmetric dynamic token
CN111181944A (en) Communication system, information distribution method, device, medium, and apparatus
CN114499836A (en) Key management method, key management device, computer equipment and readable storage medium
CN114338005A (en) Data transmission encryption method and device, electronic equipment and storage medium
CN106487761B (en) Message transmission method and network equipment
KR101695361B1 (en) Terminology encryption method using paring calculation and secret key
KR20170084802A (en) Methdo and system for transmitting secure data in a terminal
JP5745493B2 (en) Key sharing system, key sharing method, program
JP2000305849A (en) Transmitter and its method, receiver and its method and communication system
CN102510431A (en) Method, system, device and user terminal for obtaining remote resource
CN113779629A (en) Key file sharing method and device, processor chip and server
KR20170033575A (en) Device for receiving key data, server for providing decoding procedure and device for sending key data
KR20150034591A (en) Cloud server for re-encrypting the encrypted data and re-encrypting method thereof
JP2018042081A (en) Data transmitting/receiving method and sensing system