WO1995034968A1 - Device for decoding decoding algorithms and method of encrypting and decoding such algorithms using the device - Google Patents
Device for decoding decoding algorithms and method of encrypting and decoding such algorithms using the device Download PDFInfo
- Publication number
- WO1995034968A1 WO1995034968A1 PCT/DE1995/000733 DE9500733W WO9534968A1 WO 1995034968 A1 WO1995034968 A1 WO 1995034968A1 DE 9500733 W DE9500733 W DE 9500733W WO 9534968 A1 WO9534968 A1 WO 9534968A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- decryption
- algorithm
- encrypted
- encryption
- decryption device
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
Definitions
- Decryption device for decryption algorithms and method for performing the encryption and decryption thereof
- the invention relates to a decryption device for decryption algorithms and the method for carrying out the encryption and decryption thereof, in that the decryption device grants access to authorized persons and excludes unauthorized persons from access.
- Digital information is being sent on an increasingly larger scale via secure distribution channels. However, this information should only reach certain recipients and should not be read by unauthorized persons. The procedures for transmitting such information are already very much adapted to the needs of the industry.
- Decryption device is not possible to pass on the decryption process and thus enable the exploration of the encryption algorithm.
- FIG. 1 is the
- Decryption device of decryption algorithms shows and the method for performing the encryption and decryption of digital information.
- the decryption device of decryption algorithms shown in FIG. 1 is used for the purpose of illustration in multiple personal computers, wherein digital information is sent to selected decryption owners.
- the decryption device shown here consists of an integrated circuit 1, a central processor CPU-2, an internal non-readable volatile memory with random access RAM-3 as working memory and a
- ROM-4 internal non-readable non-volatile random access memory ROM-4, in which an internal non-readable decryption algorithm (EI) is stored, and an interface 5 are assigned, which is arranged between the central processor CPU-2 and the personal computer 6 and with the personal computer 6 is connected to data path a, and is partially integrated in an integrated circuit.
- EI internal non-readable decryption algorithm
- the method for carrying out the transmission of the decryption algorithm is shown in FIG. 1 in that the decryption device is used in a number of personal computers, digital information being sent to selected owners of decryption devices.
- the distributor chooses an encryption algorithm VE. This is intended to encrypt the information transmitted later. This
- Encryption algorithm should be kept secret and must still be secure enough to offer security when encrypting messages.
- z. B different types of DES (e.g. with different S-boxes) or other encryption methods.
- Decryption algorithm EE encrypted to illegible algorithm EEV Any user of a decryption device who wants to receive a decryption algorithm can now report to the distribution point. This can e.g. B. verbally (also over the phone), in writing or electronically. He must identify himself using the decoder's public serial number. Since this serial number was only assigned once, the decryption device can be clearly identified. The distribution point can now decide whether the recipient is authorized to receive the decryption algorithm. This can also depend on payment.
- the distributor of the messages chooses an encryption algorithm VE, which is then to be used to encrypt the message to be transmitted later.
- This encryption algorithm is never publicly accessible, but is only transmitted in encrypted form.
- the manufacturer of the decryption device (the distributor of the
- Decryption algorithms and messages have internal Decryption algorithms EI and also the associated ones
- Encryption algorithms EIU of all decryption devices are stored in a database at the manufacturer or at the distributor.
- EI1UA the encryption algorithm also known only to the manufacturer of the decryption device, is suitable for EI IX.
- the decryption algorithm EE to be transmitted to the decryption device is encrypted. This is done in such a way that the
- Decryption algorithm EI matching encryption algorithm EIU to the illegible algorithm EEV is encrypted according to the following formula:
- EEV: EI1U (EE).
- Ciphertexts are available to use promising cracking algorithms. In this case, however, this is not possible due to the brevity of the transmitted encrypted decryption algorithm EEV.
- the central processor CPU-2 introduces one with the internal non-readable non-volatile memory with random access ROM-4 and the internal non-readable volatile memory with random access RAM-3
- the encrypted decryption algorithm EEV is read into the decryption device via interface 5.
- the decryption algorithm was previously entered in encrypted form by the user of the decryption device or read in another form.
- ROM-4 is stored using the internal non-readable non-volatile random access memory
- Decryption algorithm EEV decrypted with the internal decryption process EI This is done in such a way that the central processor CPU-2, the decryption device stored in the internal non-readable non-volatile memory with random access ROM-4, is entered into the personal computer 6, executes instructions of the decryption algorithm EI and decrypts the encrypted decryption algorithm EEV as follows:
- the decryption device is now ready for use.
- the CPU loads the key K and the message NV via the interface 5.
- Keys must be transmitted in a secure way that is not accessible to third parties; this can also be done by encryption.
- the message is then decrypted by the central processor CPU-2 using the decryption algorithm EE using the key K:
- NE: EE (NV, K).
- the decrypted information NE is then output by the central processor CPU-2 via the interface 5 and is available to the receiver.
- Decryption algorithm must be made known or already exists in the decryption device.
- the transmitted decryption algorithm can neither be passed on nor investigated, since it encrypts individually for each decryption device is transmitted and stored there is not readable and is only available for internal use of the decryption device with the corresponding serial number.
- EEV encrypted decryption algorithm for transmission
- VE encryption algorithm when distributing the information to encrypt the digital information suitable for EE
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU38627/95A AU3862795A (en) | 1994-06-16 | 1995-05-30 | Device for decoding algorithms and method of encrypting and decoding such algorithms using the device |
EP95920758A EP0765550A1 (en) | 1994-06-16 | 1995-05-30 | Device for decoding decoding algorithms and method of encrypting and decoding such algorithms using the device |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DEP4420970.3 | 1994-06-16 | ||
DE19944420970 DE4420970A1 (en) | 1994-06-16 | 1994-06-16 | Decryption device for decryption algorithms and method for performing the encryption and decryption thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1995034968A1 true WO1995034968A1 (en) | 1995-12-21 |
Family
ID=6520686
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/DE1995/000733 WO1995034968A1 (en) | 1994-06-16 | 1995-05-30 | Device for decoding decoding algorithms and method of encrypting and decoding such algorithms using the device |
Country Status (4)
Country | Link |
---|---|
EP (1) | EP0765550A1 (en) |
AU (1) | AU3862795A (en) |
DE (1) | DE4420970A1 (en) |
WO (1) | WO1995034968A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1035684A2 (en) * | 1999-03-05 | 2000-09-13 | Kabushiki Kaisha Toshiba | Cryptographic communication system |
EP1096720A2 (en) * | 1999-10-25 | 2001-05-02 | Kabushiki Kaisha Toshiba | Encryption algorithm management system |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE19747827C2 (en) * | 1997-02-03 | 2002-08-14 | Mannesmann Ag | Method and device for inserting a service key into a terminal |
EP1027784B2 (en) | 1997-10-28 | 2010-05-26 | First Data Mobile Holdings Limited | Method for digital signing of a message |
GB2332833A (en) * | 1997-12-24 | 1999-06-30 | Interactive Magazines Limited | Secure credit card transactions over the internet |
AU1541700A (en) * | 1999-12-09 | 2001-06-18 | Milinx Business Group, Inc. | Method and apparatus for secure e-commerce transactions |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0033014A1 (en) * | 1980-02-04 | 1981-08-05 | ANT Nachrichtentechnik GmbH | System for enciphering and deciphering data |
JPS5890849A (en) * | 1981-11-24 | 1983-05-30 | Nec Corp | Encryption test equipment |
FR2608338A1 (en) * | 1986-12-15 | 1988-06-17 | Dassault Electronique | Device for exchanging confidential data between a series of terminals and a concentrator |
FR2681165A1 (en) * | 1991-09-05 | 1993-03-12 | Gemplus Card Int | Process for transmitting confidential information between two chip cards |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
IL63102A (en) * | 1980-06-19 | 1984-03-30 | Oak Industries Inc | System for enciphering messages |
US4531020A (en) * | 1982-07-23 | 1985-07-23 | Oak Industries Inc. | Multi-layer encryption system for the broadcast of encrypted information |
CA1219930A (en) * | 1983-07-21 | 1987-03-31 | Takashi Kamitake | Information transmission system |
US4907273A (en) * | 1984-10-12 | 1990-03-06 | Wiedemer John D | High security pay television system |
DE3501178A1 (en) * | 1985-01-16 | 1986-07-17 | Blaupunkt-Werke Gmbh, 3200 Hildesheim | METHOD AND CIRCUIT ARRANGEMENT FOR PREVENTING THE UNAUTHORIZED RECEPTION OF ENCRYPTED TELEVISION SIGNALS |
JPH0783473B2 (en) * | 1986-10-27 | 1995-09-06 | 日本電気株式会社 | CATV addressable terminal device |
GB2214677B (en) * | 1988-01-26 | 1991-06-26 | Philips Electronic Associated | Decoding transmitted scrambled signals |
NL8900307A (en) * | 1989-02-08 | 1990-09-03 | Philips Nv | PUBLIC COMMUNICATION SYSTEM WITH DISTRIBUTED STATIONS, AND STATION AND SUBSTATIONS FOR USE IN SUCH A COMMUNICATION SYSTEM. |
US5029207A (en) * | 1990-02-01 | 1991-07-02 | Scientific-Atlanta, Inc. | External security module for a television signal decoder |
US5237610A (en) * | 1990-02-01 | 1993-08-17 | Scientific-Atlanta, Inc. | Independent external security module for a digitally upgradeable television signal decoder |
US4991208A (en) * | 1990-03-29 | 1991-02-05 | Gte Laboratories Incorporated | Video control system having session encryption key |
US5111504A (en) * | 1990-08-17 | 1992-05-05 | General Instrument Corporation | Information processing apparatus with replaceable security element |
-
1994
- 1994-06-16 DE DE19944420970 patent/DE4420970A1/en not_active Withdrawn
-
1995
- 1995-05-30 AU AU38627/95A patent/AU3862795A/en not_active Abandoned
- 1995-05-30 EP EP95920758A patent/EP0765550A1/en not_active Withdrawn
- 1995-05-30 WO PCT/DE1995/000733 patent/WO1995034968A1/en not_active Application Discontinuation
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0033014A1 (en) * | 1980-02-04 | 1981-08-05 | ANT Nachrichtentechnik GmbH | System for enciphering and deciphering data |
JPS5890849A (en) * | 1981-11-24 | 1983-05-30 | Nec Corp | Encryption test equipment |
FR2608338A1 (en) * | 1986-12-15 | 1988-06-17 | Dassault Electronique | Device for exchanging confidential data between a series of terminals and a concentrator |
FR2681165A1 (en) * | 1991-09-05 | 1993-03-12 | Gemplus Card Int | Process for transmitting confidential information between two chip cards |
Non-Patent Citations (1)
Title |
---|
PATENT ABSTRACTS OF JAPAN vol. 7, no. 186 (E - 193) 30 May 1983 (1983-05-30) * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1035684A2 (en) * | 1999-03-05 | 2000-09-13 | Kabushiki Kaisha Toshiba | Cryptographic communication system |
EP1035684A3 (en) * | 1999-03-05 | 2002-07-24 | Kabushiki Kaisha Toshiba | Cryptographic communication system |
US7096357B1 (en) | 1999-03-05 | 2006-08-22 | Kabushiki Kaisha Toshiba | Cryptographic communication terminal, cryptographic communication center apparatus, cryptographic communication system, and storage medium |
EP1096720A2 (en) * | 1999-10-25 | 2001-05-02 | Kabushiki Kaisha Toshiba | Encryption algorithm management system |
EP1096720A3 (en) * | 1999-10-25 | 2002-07-24 | Kabushiki Kaisha Toshiba | Encryption algorithm management system |
US7079655B1 (en) | 1999-10-25 | 2006-07-18 | Kabushiki Kaisha Toshiba | Encryption algorithm management system |
Also Published As
Publication number | Publication date |
---|---|
EP0765550A1 (en) | 1997-04-02 |
DE4420970A1 (en) | 1995-12-21 |
AU3862795A (en) | 1996-01-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE60314402T2 (en) | SYSTEM AND METHOD FOR STORING AND RECEIVING CRYPTOGRAPHIC SECRETS FROM DIFFERENT CUSTOM END USERS IN A NETWORK | |
DE69534192T2 (en) | A method for sharing secret information, generating a digital signature, and performing authentication in a communication system having a plurality of information processing devices and communication system for applying this method | |
DE69632707T2 (en) | Encryption device with double-feedforward hash function | |
DE69532227T2 (en) | SIGNAL SEND PROCEDURE AND COMMUNICATION SYSTEM | |
AT512289B1 (en) | CRYPTOGRAPHIC AUTHENTICATION AND IDENTIFICATION METHOD FOR MOBILE TELEPHONE AND COMMUNICATION DEVICES WITH REAL-TIME ENCRYPTION DURING THE ACTION PERIOD | |
DE2231835A1 (en) | PROCEDURE FOR SEVERAL STAGES OF ENCODING AND DECRYPTION OF BINARY DATA | |
DE19744961A1 (en) | Generate clear and unpredictable values | |
DE112012000971B4 (en) | data encryption | |
WO2000072502A1 (en) | Method for verifying the integrity and authorship of, and encoding and decoding texts | |
EP2098039A1 (en) | Method for transferring encoded messages | |
DE60023426T2 (en) | Electronic authentication system | |
WO1995034968A1 (en) | Device for decoding decoding algorithms and method of encrypting and decoding such algorithms using the device | |
EP2685682A2 (en) | Method and system for secure message transmission | |
WO2002078246A2 (en) | Method and device for the computer-assisted production of public cryptographic keys | |
DE4420967C2 (en) | Decryption device for digital information and method for carrying out the encryption and decryption of this using the decryption device | |
DE102006009725A1 (en) | Public code authenticating method, involves producing signature from combination of public code and generated authentication characteristic, and publishing public code, authentication characteristic and produced signature | |
EP0844762A2 (en) | Method for secure message exchange for mass services as well as subscriber apparatus and server apparatus herefor | |
DE102007046102B4 (en) | A method for protecting against modification of data and for authenticating the data transmitter in the data transmission by using encryption methods in which, with knowledge of encrypted and unencrypted data, other data can no longer be encrypted correctly as randomly. | |
EP0902568A2 (en) | Method for transmitting encrypted messages | |
WO2001022654A1 (en) | Method of recovering a cryptographic session key | |
DE19638623A1 (en) | Computer system with process for handling coded data | |
EP1304827A1 (en) | Secure data transmission method | |
EP2768184A1 (en) | Encryption method for emails | |
DE10245763A1 (en) | Timed Decryption Service Provider secure confidential communication system makes private decryption key available with time delay after encryption key | |
WO1995034150A1 (en) | Device and process for decryption of digital information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AU BR CN CZ JP KR NO PL RU SG US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH DE DK ES FR GB GR IE IT LU MC NL PT SE |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 1995920758 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref country code: US Ref document number: 1996 765166 Date of ref document: 19961216 Kind code of ref document: A Format of ref document f/p: F |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 1995920758 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 1995920758 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: JP Ref document number: 96501455 Format of ref document f/p: F |
|
NENP | Non-entry into the national phase |
Ref country code: JP Ref document number: 96501455 Format of ref document f/p: F |
|
NENP | Non-entry into the national phase |
Ref country code: JP Ref document number: 96501455 Format of ref document f/p: F |
|
NENP | Non-entry into the national phase |
Ref country code: JP Ref document number: 1996501455 Format of ref document f/p: F |
|
NENP | Non-entry into the national phase |
Ref country code: JP Ref document number: 1996501455 Format of ref document f/p: F |