WO1987007796A1 - Ciphering and deciphering device - Google Patents

Ciphering and deciphering device Download PDF

Info

Publication number
WO1987007796A1
WO1987007796A1 PCT/SE1986/000275 SE8600275W WO8707796A1 WO 1987007796 A1 WO1987007796 A1 WO 1987007796A1 SE 8600275 W SE8600275 W SE 8600275W WO 8707796 A1 WO8707796 A1 WO 8707796A1
Authority
WO
WIPO (PCT)
Prior art keywords
code
bits
shift register
unit
ciphering
Prior art date
Application number
PCT/SE1986/000275
Other languages
French (fr)
Inventor
Stefan Santesson
Original Assignee
Datakonsult I Malmö Ab
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Datakonsult I Malmö Ab filed Critical Datakonsult I Malmö Ab
Priority to EP86903695A priority Critical patent/EP0309447B1/en
Priority to KR1019880700146A priority patent/KR920001575B1/en
Priority to AT86903695T priority patent/ATE83106T1/en
Priority to DE8686903695T priority patent/DE3687235T2/en
Priority to JP61503445A priority patent/JPH01503028A/en
Priority to US07/285,970 priority patent/US4972481A/en
Publication of WO1987007796A1 publication Critical patent/WO1987007796A1/en
Priority to DK060488A priority patent/DK60488A/en
Priority to NO1988880545A priority patent/NO880545D0/en
Priority to FI885698A priority patent/FI885698A0/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/12Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry

Definitions

  • the invention also relates to a deciphering de ⁇ vice which is associated with the ciphering device and designed for serially transmitted information, and which comprises an input for a sequence of bits to be deciphered, an output for the deciphered bit sequence, and a mixing unit connected between the input and the output, said mixing unit being adapted to receive both the bit sequence to be deciphered and a sequence of code bits for deciphering said bit sequence, and, by a mixing operation, to generate the deciphered bit sequence, and a code unit adapted to generate code bits and comprising a shift register into which bits from the ciphered bit sequence are shifted, and a memory containing code bits and ad ⁇ dressed with bits from the shift register.
  • this object is achiev ⁇ ed by means of a ciphering device of the type stated in the introduction to this specification, which is characterized by first means for selecting whether a bit in the bit sequence to be ciphered should be mixed with a code bit or not, and by means of a de ⁇ ciphering device of the type stated in the introduc ⁇ tion to this specification, which is characterized by first means for selecting whether a bit in the bit sequence to be deciphered should be mixed with a code bit or not.
  • the devices comprise means for selecting which bits in the ciphered bit. sequence should be used as address to the memory.
  • the present invention therefore comprises a shift register which is disposed between the two code units and the input of which is connected to the first code unit, and an EXOR gate which on its inputs receives bits from the shift register and the output of which is connected to the shift register of the second code unit. In this manner, it is possible to increase the number of addresses to the replacement memory which thus becomes so large that it is impossible to map it in a reasonable time.
  • the algorithm is of the type which generates a code that cannot be traced mathematically backwards in time, it becomes impossible to decipher previously tapped infor- mation by means of the deciphering device. The security requirement for information to be kept secret after the transmission is thus satisfied.
  • Fig- .l is a block diagram of a ciphering device according to the present invention.
  • Fig. 2 is block diagram of a deciphering device correspond ⁇ ing to the ciphering device of Fig. 1.
  • Fig. 3 is a block diagram showing one embodiment of the ciphering device having double code units.
  • the device comprises a second code .unit 4' the input of which is connected to the output of the first code unit 4 and which is designed in the same way as this, namely with a 16-bit shift register 9', a memory 5 ' , which may be a byte-organized ROM or EPROM, and a multiplexer 10'.
  • the code bits generated by the code unit 4 are supplied to the shift register S ' , the first thirteen bits of which are used for addressing the memory 5 ' and the last three bits of which serve as input signal to the multiplexer 10' for selecting which bit in the word addressed in the memory 5 ' should constitute a code bit.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Storage Device Security (AREA)

Abstract

A ciphering system comprising a ciphering device having an input (1) for a sequence of bits to be ciphered, and output (2) for the ciphered bit sequence, and a mixing unit (3) connected between the input (1) and the output (2). The mixing unit receives both the bit sequence to be ciphered and a sequence of code bits for ciphering the bit sequence and, by a mixing operation, generates the ciphered bit sequence. The output of the mixing unit (3) is connected to a code unit (4) for generating code bits. The code unit (4) comprises a memory (5) containing code bits and addressed with bits from the ciphered bit sequence for generating code bits. The ciphering device further has means (7) for selecting whether a bit in the bit sequence to be ciphered should be mixed with a code bit or not, and means (6) for selecting which bits in the ciphered bit sequence should be used for addressing the memory. These means are controlled by a programmable control unit (8). The deciphering device of the ciphering system is conceived in the same manner as the ciphering device, with the exception that the input of the code unit receives input signals from the input of the deciphering device. Since the ciphering and the deciphering device are designed in the same manner and their different units receive the same information, these devices will be automatically synchronized after an interruption. Further, the ciphering system is very rapid and the delay of the transmitted information is negligible.

Description

CIPHERING AND DECIPHERING DEVICE
The present invention relates to a ciphering device for serially transmitted information, compris¬ ing an input for a sequence of bits to be ciphered, an output for the ciphered bit sequence, and a mixing unit connected between the input and the output, said mixing unit being adapted to receive both the bit sequence to be ciphered and a sequence of code bits for ciphering said bit sequence, and, by a mixing operation, to generate the ciphered bit sequence, and a code unit adapted to generate code bits and comprising a shift register into which bits from the ciphered bit sequence are shifted, and a memory con¬ taining code bits and addressed with bits from the shift register. t The invention also relates to a deciphering de¬ vice which is associated with the ciphering device and designed for serially transmitted information, and which comprises an input for a sequence of bits to be deciphered, an output for the deciphered bit sequence, and a mixing unit connected between the input and the output, said mixing unit being adapted to receive both the bit sequence to be deciphered and a sequence of code bits for deciphering said bit sequence, and, by a mixing operation, to generate the deciphered bit sequence, and a code unit adapted to generate code bits and comprising a shift register into which bits from the ciphered bit sequence are shifted, and a memory containing code bits and ad¬ dressed with bits from the shift register. The use of computers, and especially the trans¬ mission of information between computers, has given rise to serious security problems. It is in fact rela¬ tively easy to tap data transmission, implying that sensitive information may come into the wrong hands. To obviate this risk, the information transmitted is often ciphered.
Data communication normally takes place in bina¬ ry form and in most of the ciphering systems hitherto known, ciphering takes place on the bit level in that the sequence of l's and 0's making up the message is mixed in a ciphering device with a sequence of code bits. When deciphering the message, the ciphered bit sequence is mixed with the same code bit sequence, whereby the message is received in clear.
In hitherto known ciphering devices, the gene¬ ration of code bits however takes a long time, causing delays in the transmission of information. This means that it is necessary either to decrease the rate at which the transmitter transmits the information or to provide buffers in the ciphering unit. In the latter case, measures must be taken to ensure that information is not lost when the receiving unit emits a signal indicating that it is no longer ready to receive infor- mation. Another difficulty resides in synchronizing the generation of code bits. In some devices (see e.g. GB 1,388,035), the information transmission is interrupted at regular intervals for checking whether the code bits in the ciphering and the deciphering device are synchronized. A third problem arises when the ciphering and the deciphering device should be linked to each other after an interruption of the data transmission. Such linking should preferably be effected rapidly and easily without any loss of information and without transmission of information that may give an indication of how the code bits are generated.
The above-mentioned problems entail that known ciphering devices become very expensive since a large number of sophisticated circuits are required for solving the synchronization and link-up problems.
Further, the known devices cannot be used in systems with severe demands on a high transmission rate. For parallel transmission, the above-mentioned synchronization and link-up problems have however been solved by means of a ciphering device shown in U.S. patent specification 4,431,865, which comprises a logic unit in which parallel-transmitted words to be ciphered are mixed with code words to obtain the ciphered words. The code words are generated by sup¬ plying the output signal from the logic unit, i.e. the ciphered words, to an addressing circuit comprising a parallel-to-series converter, a shift register and a selecting circuit. The selecting circuit selects some or all of the bits in the register for addressing a memory containing code words supplied to the logic unit. The device further comprises a computer which serves to supply code words to the memory and which during that operation can disconnect the register and the selecting circuit. The deciphering apparatus corresponding to this ciphering device is designed in a similar way, with the only exception that coded words are mixed in the logic unit with code words for obtaining the deciphered text.
As mentioned above, this device is however in¬ tended for use in connection with parallel informa¬ tion transmission and cannot be used for serial infor- mation transmission without prior modifications. Fur¬ ther, the device is designed for ciphering information from teletext systems and the like. Thus, it is not deisgned for protecting the transmitted information from unauthorized persons who may be interested in employing the information for commerical and/or illegal use, but instead for making people pay the subscription fee for this type of service. Anyone who manages to decipher the transmitted information will not have access to any secret information but only to information which may possibly be used for private purposes." In view hereof, this device has not been conceived so as to satisfy the high demands on security which must be placed on ciphering apparatuses intended for use in transmitting information between computers, and especially such information as should be kept secret for a long time after the transmission has been ef- fected and, thus, should not allow subsequent decipher¬ ing. The problem inherent in this device is in fact that for each word to be coded there is generated only one address to the memory, and that the entire word on this address is used for the coding. If the same information sequence is transmitted repeatedly, there is a risk that the coding takes place in the same way, which substantially facilitates unautho¬ rized deciphering. Further, if the deciphering appara¬ tus is stolen, previously tapped information may very well be deciphered by means of the deciperhing appara¬ tus.
The object of the present invention therefore is to provide a ciphering and deciphering system for ' serial information transmission which meets the very high demands on security placed on s'ystems for cipher¬ ing secret information, both during and after the transmission, which is less expensive than corresponding known systems, which does not notably limit the trans¬ mission rate and in which the synchronization and link-up problems have been overcome.
According to the invention, this object is achiev¬ ed by means of a ciphering device of the type stated in the introduction to this specification, which is characterized by first means for selecting whether a bit in the bit sequence to be ciphered should be mixed with a code bit or not, and by means of a de¬ ciphering device of the type stated in the introduc¬ tion to this specification, which is characterized by first means for selecting whether a bit in the bit sequence to be deciphered should be mixed with a code bit or not. In a preferred embodiment of the invention, the devices comprise means for selecting which bits in the ciphered bit. sequence should be used as address to the memory. These means, like the means for select- ing whether a bit in the bit sequence should be mixed with a code bit or not, may advantageously be controlled by a programmable unit.
The ciphering and deciphering system described above offers fully satisfactory protection against external tapping or deciphering attempts. In order to ensure that no one who has access to the message both in ciphered form and in clear should be able to map the content in the memory and subsequently use it for deciphering tapped information, the ci- phering and deciphering system in another embodiment comprises a further code unit the input of which is connected to the first code unit and which comprises a shift register and a memory containing code bits and addressed with bits from the shift register, and the output signal of which constitutes the code bit sequence for ciphering the bit sequence. When this additional code unit is used, it becomes impossible for anyone who has access to a message both in ciphered form and in clear, to map the content in the memories of the two code units.
It should however be possible, instead of establish¬ ing the specific contents of the memories, to deter¬ mine a very large memory replacing the other two memo¬ ries. One way of overcoming this problem is to increase the number of bits which are required for the memories to have their specific address. In a further embodiment, the present invention therefore comprises a shift register which is disposed between the two code units and the input of which is connected to the first code unit, and an EXOR gate which on its inputs receives bits from the shift register and the output of which is connected to the shift register of the second code unit. In this manner, it is possible to increase the number of addresses to the replacement memory which thus becomes so large that it is impossible to map it in a reasonable time. A further problem solved by the present invention is that related to information which should be kept secret for a long time after the transmission. In hitherto known devices, there is in fact a risk that unauthorized persons may tap the transmission of infor- mation and subsequently steel a deciphering device in order to decipher the tapped information. To prevent this, the present invention comprises in a further embodiment a shift register which is disposed between two code units and the input of which is connected to the first code unit, and a read-write memory which is addressed with bits from the shift register and the output of which is connected to the second code unit. The device further comprises a computer which is adapted to generate code bits according to a prede- termined algorithm and to write the generated code bits into the memory at regular intervals. If the algorithm is of the type which generates a code that cannot be traced mathematically backwards in time, it becomes impossible to decipher previously tapped infor- mation by means of the deciphering device. The security requirement for information to be kept secret after the transmission is thus satisfied.
The system according to the present invention has solved the problems inherent in prior art devices. Thus, there is no need of any special circuits for buffering or for handling control, checking and syn¬ chronizing signals, but the system can be composed of a few standard circuits, this making the system considerably cheaper than other corresponding systems. The present invention will now be described in some embodiments with reference to the accompanying drawings. Fig- .l is a block diagram of a ciphering device according to the present invention. Fig. 2 is block diagram of a deciphering device correspond¬ ing to the ciphering device of Fig. 1. Fig. 3 is a block diagram showing one embodiment of the ciphering device having double code units. Fig. 4 is a block diagram shewing one embodiment of the ciphering device having a shift register and an EXOR gate between the code units. Fig. 5 is a block diagram showing one embodiment of the ciphering device having a shift register and a programmable memory between the two code units. Fig. 6 is a block diagram showing one embodiment of the ciphering device comprising a code handling system between the two code units.
In Fig. 1, there is shown a ciphering device which is intended to be connected in a data link be¬ tween a transmitting and a receiving unit, on the transmitting side. This ciphering device substantially comprises an input 1 for information in clear from the transmitting unit, an output 2 for ciphered in- formation, a mixing unit 3 consisting of an EXOR gate, a code unit 4 for generating the code bits in the code bit sequence, and means 6, 7, 8 controlling certain 'selections in the device, as will be described in more detail hereinbelow. The code unit 4, which has an input connected to the output of the mixing unit 3, consists of a 16-bit shift register 9, a memory 5 which may be a byte-organized ROM or EPROM, and a multiplexer 10. The first thirteen bits of the shift register 9 are connected to the address inputs of the memory 5 and its last three bits are connected to the address inputs of the multiplexer 10. The outputs of the memory 5 are connected to the data inputs of the multiplexer 10. As mentioned above, certain selec¬ tions can be carried out in the ciphering device. The selections relate to whether an incoming data bit should be ciphered or not, and whether a ciphered bit should be loaded into the shift register 9 or not. The selections are controlled by the control unit 8 which is programmable. Its program follows one word (one word = one byte) through the ciphering and recommences at the beginning of the next word. For each bit in the word, a signal is supplied to one input of the means 7, which may consist of a logic AND gate, for determining whether the bit should be ciphered or not, and another signal is supplied to one input of the means 6, which may also consist of an AND gate, for determining whether the ciphered bit should be loaded into the register or not. The gate 7 receives on its other input a code bit from the multiplexer 10 and has its output connected to the mixing unit 3. The output of the gate 6 is con- nected to an enabling input of the register 9.
The deciphering device shown in Fig. 2 is in¬ tended to be connected in the other end of the data link to which the ciphering device is connected, be¬ fore the receiving unit. On its input 11, the decipher- ing device receives ciphered data from the ciphering device and, on its output 12, supplies deciphered data to the receiving unit. The deciphering device is built up in the same manner as the ciphering device, with the exception that the shift register 19 is con- nected to the input 11. Otherwise, the two devices consist of the same components and contain the same information (in the memories and the control units), and the deciphering device will therefore not be de¬ scribed in more detail here. in the following description, the function of the ciphering system will be described, starting with the generation of code bits. When the ciphering system is in operation, the shift register 9 is loaded with ciphered bits from the output of the mixing unit 3. A memory cell in the memory 5 is addressed with the first thirteen bits in the register. The content of the memory cell is supplied to the data inputs, of the multiplexer 10 which by means of the last three bits in the register 9 selects which of the eight bits in the addressed memory word should constitute a code bit. This way of generating a code bit also functions before any code bits have been loaded into the shift register 9 from the output of the mixing unit 3 since 0's alone may also form an address to the memory and the multiplexer. Thus, no special initiation routine is required when starting up the ciphering system. When a bit in the bit sequence to be ciphered is presented on the input of the mixing unit 3 , the control unit 8 supplies the gate 7 with a signal which indicates whether the code bit on the output of the multiplexer 10 should be supplied to the input of the mixing unit 3 and mixed with the bit concerned or whether this bit should pass through the mixing unit without being ciphered. This option of ciphering or not ciphering a bit makes the system still more reliable and, moreover, provides the possibility of allowing e.g. start and stop bits to pass through unciphered.
Further, the control unit 8 emits to the gate 6 a signal which indicates whether the bit concerned should be loaded into the register 9 or not, after it has passed through the mixing unit 3. If the bit is loaded into the register, the address to the memory 5 and to the multiplexer 10 is changed, and a new code bit is obtained. In some cases, it may be con- venient not to load bits from the mixing unit 3 into the register 9, for instance in the case of start and stop bits which when passing through unciphered always look the same. Naturally, this option also enhances the security of the system. The deciphering device operates in the same way. Since it is the same program that is in the control unit 18, the same bits will be loaded into the re- gister 19, the same memory cells will be addressed in the memory 15 whose content must of course be the same as in the memory 5 of the ciphering device, the same cede bits will be generated and the same bits will pass unciphered through the mixing unit 13. Thus, the ciphered bits will be mixed with the same code bits as they were mixed with in the ciphering device, and since the mixing unit consists of an EXOR gate, the original message will be recovered in clear on its output.
If a temporary interruption should occur on the data link, only the data which are output during the interruption will be lost. When the connection is again established, the contents of the registers 9, 19 may be entirely different, but since the same in¬ formation is supplied to the two registers, the devices will soon be synchronized again. The time it takes for the devices to be synςhronized depends on the program in the control unit and the length of the shift register. In this embodiment, it takes three words at most (one word = one byte).
The ciphering system described above is very fast. It is possible to communicate at a rate of up to 2 MBaud duplex. There is minimal delay in the ci- phering device. A data bit will leave the mixing unit in ciphered form after only T/2 where T = the time a data bit is active. This short delay time means that handshaking lines in an RS-232 port need not be processed in the ciphering device, but merely be sent unprocessed straight through it.
Although the ciphering system is of such a simple design, it is completely protected also from those who know exactly how it operates. The result of the ciphering operation depends on the message ciphered, the content in the memory 5 and the program in the control unit 8. In order to decipher messages, it is thus necessary to have access to the content in the memory and the program in the control unit. If there is even the faintest suspicion that the content in the memory and/or the control unit is known, the memory and/or the program in the control unit may very easily be exchanged. The control unit may also store several programs which are alternatingly connected by means of a push-button set associated with the control unit.
In Fig. 3, there is shown an embodiment of the ciphering device preventing anyone who has access to a message both in clear and in ciphered form from mapping the content in the memory by using the formula "clear EXOR ciphered text = code". In Fig. 3, the components shown in Fig. 1 appear with the same re- ference numerals. These units operate in the same manner as in the device shown in Fig. 1 and, therefore, will not be described here. In addition to these com¬ ponents, the device comprises a second code .unit 4' the input of which is connected to the output of the first code unit 4 and which is designed in the same way as this, namely with a 16-bit shift register 9', a memory 5 ' , which may be a byte-organized ROM or EPROM, and a multiplexer 10'. In this embodiment of the invention, the code bits generated by the code unit 4 are supplied to the shift register S ' , the first thirteen bits of which are used for addressing the memory 5 ' and the last three bits of which serve as input signal to the multiplexer 10' for selecting which bit in the word addressed in the memory 5 ' should constitute a code bit. In this embodiment of the device, the addresses to the memory unit 9 in the first code unit and the code from the memory 5 ' in the second code unit are related in no readable way to each other and, hence, it is not possible by tapping the input signals to and the output signals from the system, to map the content in the memories 5 and 5 ' . The de¬ ciphering device corresponding to this ciphering de- vice is designed in a corresponding way and will there¬ fore not be described here.
In Fig. 4, the device of Fig. 3 is supplemented with a shift register 40 and an EXOR gate 41. The shift register 40 receives on its input the code bits generated by the code unit 4. The first and the last bit in the shift register 40 are used as input signals to the EXOR gate 41 whose output is connected to the shift register 9 ' in the second code unit 4 ' . By in- coporating these two components in the device, the number of addresses which would have to be mapped to create a replacement memory for the memories 5 and 5' is considerably increased. If the length of the shift register 40 and of the shift registers 9 and 9' is 16 bits, the required number of addresses will be 2.81 x 10 14. When the shift register 40 and the EXOR gate 41 have been incorporated, it will thus be impossible in a reasonable time to create a re¬ placement memory for the other two memories. Further, when the system is correctly used the risk of periodic output data appearing in the cryptogram in connection with periodic input data will be eliminated in clear because of the extension of the registers by means of the shift register 40. The corresponding deciphering device (not shown) has a shift register and an EXOR gate which are connected in the same manner.
In Fig. 5, there is shown a variant of the device illustrated in Fig. 4, in which the EXOR gate 41 has been replaced by a read-write memory 42 which is ad- dressed with the content in the shift register 40 and the output of whi-ch is connected to the shift register 9 ' in the second code unit 4 ' . The content in the memory 42 can be exchanged by programming a new code from a keyboard 43. The purpose of the me- mory 42 is to prevent the transmitted, ciphered in¬ formation from being deciphered afterwards if any¬ one having tapped the transmitted information later appropriates a deciphering device. In order to decipher a message, it is thus necessary to have access to the code being in the memory 42 during the ciphering operation, and if this code is changed at regular intervals, subsequent deciphering will be impossible. The only thing that need be ensured is that the memory contains a sufficient amount of code so that subsequent deciphering cannot be effected by trying all possible codes which the memory might contain. As in the other embodiments, the deciphering device (not shown) is designed correspondingly.
In Fig. 6, there is shown a variant of the ci¬ phering device of Fig. 5, which overcomes the ^practical problems linked with the handling and transmission to the deciphering device of the codes which are sup¬ plied to the memory 42, and with the work effort re¬ quired for thus supplying the codes at regular inter¬ vals. The variant of the ciphering device illustrated in Fig. 6 comprises, in addition to the shift register 40 and the memory 42, a computer 43 having an input which by a line 51 is connected to the output of the mixing unit 3, address outputs which by an address bus 44 are connected to the memory 42, an in/output which by a data line 45 is connected to the memory 42, and a control signal output for transmitting a read-write signal on a line 46 to the memory 42. The device further comprises a buffer 47 which is connected to the shift register 40 and in which the content in the shift register is temporarily stored and which has tristate outputs connectible to the address bus 44. Finally, the device comprises a clock 48 which is programmable from the computer 43 which may be a one-chip computer having a nonvolatile and a volatile memory. The memory of the computer contains an algorithm which is stored in software and by means of which the computer creates a new code for the memory 42. The code is created during different time periods, and the length of a current time period is determined by the code created during the preceding time period, the clock 48 being used for establishing when a time period is terminated. When the code generated during a time period is finally created, it is temporarily stored in a buffer, awaiting the transmission to the memory 42. The computer 43 establishes suitable points of time for the transmission by analyzing the signals on the output from the mixing unit 3. When a prede- termined event occurs, for example no signals present on the output, the code temporarily stored in the buffer is transmitted to the memory. The computer then disconnects the outputs of the buffer 47 from the address bus by means of a control signal on a line 50, emits a write signal on the line 46 and ad¬ dresses the memory via the address bus 44 so that the generated code can be transmitted to the memory 42 by the data line 45.
The deciphering device (not shown) corresponding to this embodiment of the ciphering device is designed in a corresponding way with shift register, buffer, computer, memory etc. The computer in the deciphering device generates a new code to its memory by means of the same algorithm as used by the computer 43 of the ciphering device. The computer of the deciphering device further relies on the same criteria as the computer 43 for deciding when the transmission of a new code to the memory should take place. In this manner, the content in the two memories will always be the same.
It should also be pointed out that the code for prevenring deciphering of previously tapped information should be generated in such a manner that it cannot be mathematically traced backwards in time. To those skilled in the art, this type of algorithms is well known and will therefore not be described in more detail here. As mentioned above, major advantages of this code-generating method are that information can be kept secret also after transmission, that it is not necessary to transmit a code between the devices, and that the code generation is not dependent upon the information on the transmission line between the ciphering device and the deciphering device, but yet takes place synchronously in both devices.
In addition to establishing when a new code is finally created, the clock 48 is used for synchroniz¬ ing purposes. Synchronization is performed in that certain predetermined events, e.g. certain bit patterns or interruptions in the information transmission, are used as time references for the clocks in both devices. When such a predetermined event occurs, the clock is set to a known state. The advantage of this synchronizing procedure is that information common to both devices is used, this making synchronization very accurate. Many modifications and alterations may of course be carried out in the present invention without depart¬ ing from the scope of the accompanying claims, and the above specification should thus only be considered as an example which is in no way limitative of the invention. For example, it is possible to connect more than two code units in series and to provide components according to Figs. 4-6 between each pair of adjoining code units.

Claims

1. A ciphering device for serially transmitted information, comprising an input (1) for a sequence of bits to be ciphered, an output (2) for the ciphered bit sequence, and a mixing unit (3) connected between the input (1) and the output (2), said mixing unit (3) being adapted to receive both the bit sequence to be ciphered and a sequence of code bits for ciphering said bit sequence, and, by a mixing operation, to generate the ciphered bit sequence, and a code unit (4) adapted to generate code bits and comprising a shift register (9) into which bits from the ciphered bit sequence are shifted, and a memory (5) containing code bits and addressed with bits from said shift register (9), c h a r a c t e r i z e d by first means (7) for selecting whether a bit in the bit se¬ quence to be ciphered should be mixed, with a code bit or not.
2. Ciphering device as claimed in claim 1, c a ¬ r a c t e r i z e d by second means (6) for select- ing which bits in the ciphered bit sequence should be shifted into the shift register (9).
3. Ciphering device as claimed in claim 2, c h a ¬ r a c t e r i z e d by a programmable control unit
(8) for controlling said first (7) and said second (6) means.
4. Ciphering device as claimed in any one of the preceding claims, c h a r a c t e r i z e d in
' that the code unit (4) comprises a multiplexer (10) controlled by bits from the shift register (9) for selecting which bit in an addressed memory word should constitute a code bit.
5. Ciphering device as claimed in any one of the preceding claims, c h a r a c t e r i z e d by a further .code unit (4 ' ) the input of which is connected to the first code unit (4) and which com¬ prises a shift register (91 ) and a memory (5' ) con¬ taining code bits and addressed with bits from the shift register (91 ), and the output signal of which constitutes the code bit sequence for ciphering said bit sequence.
6. Ciphering device as claimed in any one of the preceding claims, c h a r a c t e r i z e d by a shift register (40) which is disposed between the two code units (4, 4') and the input of which is connected to the first code unit (4), and an EXOR gate (41) which on its inputs receives bits from the shift register (40) and the output of which is con¬ nected to the shift register (9' ) of said further code unit (4 ' ) .
7. Ciphering device as claimed in claim 5, c h a ¬ r a c t e r i z e d by a shift register (40) which is disposed between the code units (4, 4' ) and the input of which is connecte'd to the first code unit, and a read-write memory (42) which is addressed with bits from the shift register (40) and the output of which is connected to the shift register (9') of said further code unit (41).
8. Ciphering device as claimed in claim 7, c h a - r a c t e r i z e d by a computer (43) adapted to generate code bits according to a predetermined algo¬ rithm and to write the generated code bits into the memory (42 ) .
9. Ciphering device as claimed in claim 8, c h a - r a c t e r i z e d in that the computer (43) has an input connected to the output of the mixing unit (3), and is adapted to analyse the signals on the out¬ put of the mixing unit for establishing suitable points of time for writing the generated code bits into the memory (42 ) .
10. Ciphering device as claimed in claim 9, c h a r a c t e r i z e d by a programmable clock (48) connected to the computer (43) and set in a pre- detemined state when certain predetermined events occur on the output of the mixing unit (3).
11. Deciphering device for serially transmitted information, comprising an input (11) for a sequence of bits to be deciphered, an output (12) for the de¬ ciphered bit sequence, and a mixing unit (13) connected between the input (11) and the output (12), said mix¬ ing unit being adapted to receive both the bit sequence to be deciphered and a sequence of code bits for deci¬ phering said bit sequence, and, by a mixing operation, to generate the deciphered bit sequence, and a code unit (14) adapted to generate code bits and comprising a shift register (19) into which bits from the ciphered bit sequence are shifted, and a memory (15) containing code bits and addressed with bits from said shift register (19), c h a r a c t e r i z e d by first means (17) for selecting whether a bit in the bit sequence to be deciphered should be mixed with a code bit or not.
12. Deciphering device as claimed in claim 11, c h a r a c t e r i z e d by second means (16) for selecting which bits in the ciphered bit sequence should be shifted into the shift register (19).
13. Deciphering device as claimed in claim 12, c h a r a c t e r i z e d by a programmable control unit (18) for controlling said first (17) and said second (16) means.
14. Deciphering device as claimed in any one of the preceding claims, "c h a r a c t e r i z e d by a multiplexer (20) controlled by bits from the shift register (19) for selecting which bit in an addressed memory word should constitute a code bit.
15. Deciphering device as claimed in any one of claims 11-14, c h a r a c t e r i z e d by a further code unit the input of which is connected to the first code unit (14) and which comprises a 19 shift register and a memory containing code bits and addressed with bits from the shift register, and the output signal of which constitutes the code bit sequence for deciphering said bit sequence.
16. Deciphering device as claimed in any one of claims 11-15, c h a r a c t e r i z e d by a shift register which is disposed between the two code units (14) and the input of which is connected to the first code unit (14), and an EXOR gate which on its inputs receives bits from the shift register and the output of which is connected to the shift register of the said further code unit.
17. Deciphering device as claimed in claim 15, c h a r a c t e r i z e d by a shift register which is disposed between the two code units (14) and the input of which is connected to the first code unit (14), and a read-write memory which is addressed with bits from the shift register and the output of which is connected to the shift register of said further code unit.-
18. Deciphering device as claimed in claim 17, c h a r a c t e r i z e d by a computer which is adapted to generate code bits according to a prede¬ termined algorithm and to write the generated code bits into the memory.
19. Deciphering device as claimed in claim 18, c h a r a c t e r i z e d in that the computer has an input connected to the input of the mixing unit (13) and is adapted to analyse the signals on the input of the mixing unit for establishing suitable points of time for writing the generated code bits into the memory.
20. Deciphering device as claimed in claim 19, c h a r a c t e r i z e d by a programmable clock connected to the computer and set to a predetermined state when certain predetermined events occur on the input of the mixing unit (13).
PCT/SE1986/000275 1984-12-10 1986-06-09 Ciphering and deciphering device WO1987007796A1 (en)

Priority Applications (9)

Application Number Priority Date Filing Date Title
EP86903695A EP0309447B1 (en) 1986-06-09 1986-06-09 Ciphering and deciphering device
KR1019880700146A KR920001575B1 (en) 1984-12-10 1986-06-09 Ciphering and deciphering device
AT86903695T ATE83106T1 (en) 1986-06-09 1986-06-09 ENCRYPTION AND DECRYPTION DEVICE.
DE8686903695T DE3687235T2 (en) 1986-06-09 1986-06-09 DEVICE FOR ENCRYPTION AND UNLOCKING.
JP61503445A JPH01503028A (en) 1986-06-09 1986-06-09 Encryption and decryption equipment
US07/285,970 US4972481A (en) 1986-06-09 1986-06-09 Ciphering and deciphering device
DK060488A DK60488A (en) 1986-06-09 1988-02-05 CHIFTING AND DECREATING DEVICE
NO1988880545A NO880545D0 (en) 1986-06-09 1988-02-08 Encryption and decryption device.
FI885698A FI885698A0 (en) 1986-06-09 1988-12-08 KRYPTERINGS- OCH DEKRYPTERINGSANORDNING.

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
SE8406242A SE447859B (en) 1984-12-10 1984-12-10 Encoding and decoding appts.

Publications (1)

Publication Number Publication Date
WO1987007796A1 true WO1987007796A1 (en) 1987-12-17

Family

ID=20358096

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SE1986/000275 WO1987007796A1 (en) 1984-12-10 1986-06-09 Ciphering and deciphering device

Country Status (3)

Country Link
KR (1) KR920001575B1 (en)
SE (1) SE447859B (en)
WO (1) WO1987007796A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0457709A1 (en) * 1990-05-10 1991-11-21 Amper Datos S.A. Cipher machine
EP0673133A1 (en) * 1994-03-18 1995-09-20 Koninklijke KPN N.V. Cryptographic data processing using cascade of cryptographic elements in feedback structure
WO1998017028A1 (en) * 1996-10-15 1998-04-23 Ericsson Inc. Use of duplex cipher algorithms for satellite channels with delay

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB1388035A (en) * 1971-04-19 1975-03-19 Gretag Ag Method of and apparatus for encoded communications transmission
US3984668A (en) * 1974-03-20 1976-10-05 U.S. Philips Corporation Method for generating pseudo-random bit sequence words and a device for carrying out the method
US4133974A (en) * 1976-11-05 1979-01-09 Datotek, Inc. System for locally enciphering prime data
US4176247A (en) * 1973-10-10 1979-11-27 Sperry Rand Corporation Signal scrambler-unscrambler for binary coded transmission system
US4431865A (en) * 1979-10-10 1984-02-14 Telediffusion De France Digital signal enciphering and deciphering apparatus and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB1388035A (en) * 1971-04-19 1975-03-19 Gretag Ag Method of and apparatus for encoded communications transmission
US4176247A (en) * 1973-10-10 1979-11-27 Sperry Rand Corporation Signal scrambler-unscrambler for binary coded transmission system
US3984668A (en) * 1974-03-20 1976-10-05 U.S. Philips Corporation Method for generating pseudo-random bit sequence words and a device for carrying out the method
US4133974A (en) * 1976-11-05 1979-01-09 Datotek, Inc. System for locally enciphering prime data
US4431865A (en) * 1979-10-10 1984-02-14 Telediffusion De France Digital signal enciphering and deciphering apparatus and system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0457709A1 (en) * 1990-05-10 1991-11-21 Amper Datos S.A. Cipher machine
EP0673133A1 (en) * 1994-03-18 1995-09-20 Koninklijke KPN N.V. Cryptographic data processing using cascade of cryptographic elements in feedback structure
NL9400428A (en) * 1994-03-18 1995-11-01 Nederland Ptt Device for cryptographically processing data packets, as well as a method of generating cryptographic processing data.
US5809147A (en) * 1994-03-18 1998-09-15 Koninklijke Ptt Nederland Device for cryptographically processing data packets and method of generating cryptographic processing data
WO1998017028A1 (en) * 1996-10-15 1998-04-23 Ericsson Inc. Use of duplex cipher algorithms for satellite channels with delay
US5825889A (en) * 1996-10-15 1998-10-20 Ericsson Inc. Use of duplex cipher algorithms for satellite channels with delay

Also Published As

Publication number Publication date
SE8406242L (en) 1986-06-11
KR880701502A (en) 1988-07-27
SE447859B (en) 1986-12-15
KR920001575B1 (en) 1992-02-18
SE8406242D0 (en) 1984-12-10

Similar Documents

Publication Publication Date Title
US4322576A (en) Message format for secure communication over data links
US5301247A (en) Method for ensuring secure communications
EP0438154B1 (en) Multimedia network system
KR100234447B1 (en) Algorithm independent cryptographic key management
AU599035B2 (en) Data transmission system
US4972481A (en) Ciphering and deciphering device
US4206315A (en) Digital signature system and apparatus
KR950010705B1 (en) Encryption/decription apparatus and its communication network
US5222136A (en) Encrypted communication system
US4386234A (en) Cryptographic communication and file security using terminals
NO143601B (en) PROCEDURE FOR SETTING CODE TEXT GENERATORS IN CIFTING DEVICES
JPS62198237A (en) Method and apparatus for confidential communication
JPH01220925A (en) Control software updating system
US4431865A (en) Digital signal enciphering and deciphering apparatus and system
US4133974A (en) System for locally enciphering prime data
US4805216A (en) Method and apparatus for continuously acknowledged link encrypting
EP0651532A2 (en) Method for sequential encryption/decryption of externally stored computer object code
WO1987007796A1 (en) Ciphering and deciphering device
KR100284482B1 (en) Data encryption method
AU601370B2 (en) Ciphering and deciphering device
JP3195288B2 (en) Cryptographic communication device
US4555591A (en) Integrated circuit devices for secure data encryption
EP0160247B1 (en) Supervising and controlling system for a communication station in a tdma communication system
CN101449544B (en) Especially the message reception facility in field, relevant aircraft and method is exchanged in data securityization
NO144591B (en) CONNECTOR FOR CONTROL OF SEMIDUPLEX SYSTEMS FOR TRANSFER OF DATA

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AU DK FI JP KR NO US

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH DE FR GB IT LU NL SE

WWE Wipo information: entry into national phase

Ref document number: 1986903695

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 885698

Country of ref document: FI

WWP Wipo information: published in national office

Ref document number: 1986903695

Country of ref document: EP

WWG Wipo information: grant in national office

Ref document number: 1986903695

Country of ref document: EP