WO2004015916A1 - 暗号化復号化装置及び方法、暗号化装置及び方法、復号化装置及び方法、並びに送受信装置 - Google Patents
暗号化復号化装置及び方法、暗号化装置及び方法、復号化装置及び方法、並びに送受信装置 Download PDFInfo
- Publication number
- WO2004015916A1 WO2004015916A1 PCT/JP2003/010186 JP0310186W WO2004015916A1 WO 2004015916 A1 WO2004015916 A1 WO 2004015916A1 JP 0310186 W JP0310186 W JP 0310186W WO 2004015916 A1 WO2004015916 A1 WO 2004015916A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- encryption
- decryption
- mode
- processing
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims description 91
- 238000012545 processing Methods 0.000 claims abstract description 356
- 230000008569 process Effects 0.000 claims description 64
- 238000011144 upstream manufacturing Methods 0.000 claims description 31
- 230000003111 delayed effect Effects 0.000 claims description 29
- 230000001934 delay Effects 0.000 claims description 6
- 230000000873 masking effect Effects 0.000 claims description 6
- 238000000547 structure data Methods 0.000 claims description 5
- 238000006243 chemical reaction Methods 0.000 claims description 3
- 238000013478 data encryption standard Methods 0.000 description 15
- 238000010586 diagram Methods 0.000 description 12
- 230000005540 biological transmission Effects 0.000 description 9
- 238000004891 communication Methods 0.000 description 5
- 239000000284 extract Substances 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 239000008186 active pharmaceutical agent Substances 0.000 description 1
- 230000002457 bidirectional effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0637—Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
- H04L2209/046—Masking or blinding of operations, operands or results of the operations
Definitions
- the present invention relates to encryption and decryption techniques for encryption.
- an encryption function is implemented in the TV terminal in order to realize the encryption function.
- a method is used that combines a secret key encryption method represented by DES (data encryption standard) encryption and a public key encryption method represented by RSA (Rivest-Shamir-Adleman) encryption. .
- the secret key cryptosystem uses a common key for encryption and decryption.Decryption is performed by executing the encryption algorithm in reverse order using ⁇ used for encryption. This is a method to obtain the original text before applying. This method is realized by a simple exclusive-OR logical repetition algorithm. Although high-speed processing is possible, it is necessary for the sender and the receiver to have a common key, and key distribution is required. ⁇ It has the characteristic that it is difficult to hold.
- Public key cryptography uses a function called a trapdoor function that can easily perform the operation of a function and that is very difficult to calculate the inverse function.
- the key used for conversion is different. Therefore, the key can be distributed and stored easily, but the calculation is more complicated than the secret key cryptosystem, and the encryption and decryption requires more processing time than the secret key cryptosystem.
- authentication and key distribution are performed using public key encryption, and data encryption is performed using private key encryption. By performing encryption, it is possible to take advantage of each advantage.
- an operation called an ECB (electronic code book) mode in which an input data size is 64 bits and an output data size is 64 bits is performed as a basic process. If the distribution of the frequency of occurrence of characters or words is statistically processed in advance for the encryption algorithm of this encryption method, the encryption can be performed by matching with the frequency distribution of the character string pattern of the obtained encrypted text. There is a possibility that the plaintext before conversion is estimated.
- a method has been devised in which a ciphertext is created by calculating an exclusive OR of an encrypted 64 bit encryption block and the next input 64 bit input data.
- the mode in which encryption is performed by this method is called CBC (cipher block chaining) mode.
- the data unit used for communication such as packet communication, is determined in advance.
- the block decoding method in which 64 bits constitute one block, the number of bits per block (6 If a data unit that is divisible by 4 bits) is input, fractional data less than one block will be generated.
- the data If the data has a fractional part, it performs an exclusive OR operation on the result of the decryption operation of the previous block and the fractional data and performs encryption.
- One of the modes for performing such a rounding process is a CFB (cipher feedback) mode.
- CFB cipher feedback
- a ciphertext can be obtained even if the data is less than 64 bits.
- both encryption and decryption (decryption) operations usually, 56-bit data is used as a key, but under certain conditions, there is a mode in which 40-bit data is used as a key. . In this case, as in the other modes, the operation itself is performed in 64 bits, but the valid data of the key is 40 bits.
- the secret key cryptosystem corresponds to a combination of a plurality of modes, that is, one of the ECB mode, the CBC mode, and the CFB mode and one of the 56-bit key mode and the 40-bit key mode. Mode exists.
- an encryption device or a decryption device compatible with all modes is generally used.
- a related technique is disclosed, for example, in US Pat. No. 5,835,599.
- a conventional DES encryption-based encryption or decryption device includes a circuit for each of a plurality of modes, selects one of the plurality of modes as appropriate according to system requirements, and It is configured to perform an encryption operation or a decryption operation using a circuit.
- a device for realizing this requires not only a function of performing encryption or decryption for each mode, but also a function of performing an operation on a plurality of keys, and the circuit scale becomes enormous.
- operations on a plurality of keys need to be executed in parallel, if the number of keys that need to be processed increases, the device also needs to have as many processing circuits as the number of keys.
- An object of the present invention is to provide an encryption / decryption device, an encryption device, a decryption device, and a transmission / reception device in which a processing circuit is shared by a plurality of encryption modes to reduce the circuit scale.
- the encryption / decryption device of the present invention receives encrypted data or data to be encrypted, analyzes the data structure, outputs information related to encryption as control data, and outputs the encrypted data or the encrypted data.
- Process data to be encrypted A data structure analysis block output as input data, an encryption / decryption switching signal indicating whether to perform encryption or decryption according to the control data, and the processing block input data.
- a data control block that outputs a mode selection signal indicating whether processing should be performed in this mode, and encrypting or decrypting the processing block input data according to the encryption Z decryption switching signal.
- a shared processing block that outputs an encrypted result or a decrypted result.
- the shared processing block performs an electronic code book (ECB) process using the input key data, thereby providing a CBC (cipher block chaining). It is configured to be able to perform encryption and decryption in both the mode and the CFB (cipher feedback) mode. Also encrypted with the indicated mode is intended to perform the decryption.
- EBC electronic code book
- the encryption and decryption processes in a plurality of symbol modes can be realized by a shared processing block, there is no need to provide a processing circuit for each symbol mode. Therefore, the circuit area of the encryption / decryption device can be reduced, and the cost can be suppressed.
- the encryption device of the present invention receives data to be encrypted, analyzes the data structure, obtains and outputs control data, and outputs the data to be encrypted as processing block input data.
- a data structure analysis block a data control block that outputs a mode selection signal indicating in which mode the processing block input data is to be processed in accordance with the control data, and an encryption for the processing block input data.
- a shared processing block that outputs an obtained encryption result.
- the shared processing block performs ECB processing using the input key data, so that the shared processing block can perform any of the CBC mode and the CFB mode. It is configured to be able to perform encryption, and performs encryption in the mode indicated by the mode selection signal. And performs reduction.
- the decryption device of the present invention receives the encrypted data, analyzes the data structure, and outputs information related to encryption as control data.
- a data structure analysis block that outputs the encrypted data as processing block input data; a data control block that outputs a mode selection signal indicating in which mode the processing block input data is to be processed according to the control data;
- a shared processing block that decrypts the processing block input data and outputs the obtained decryption result, wherein the shared processing block performs ECB processing using the input key data. It is configured so that decoding can be performed in any of the CBC mode and the CFB mode, and performs decoding in the mode indicated by the mode selection signal.
- the transmitting and receiving apparatus of the present invention includes: a downstream PHY unit that converts a received signal into data and outputs the data; a downstream data processing unit that separates and outputs downstream data and key data from the data; A first encryption / decryption device that decrypts and outputs the downstream data using the key data, a storage unit that stores the decrypted downstream data, and reads from the storage unit A second encryption / decryption device that encrypts and outputs the encrypted upstream data, and an upstream data process that adds the key data used for encryption to the encrypted upstream data and outputs the encrypted upstream data. And an upstream PHY unit that converts the data output by the upstream data processing unit into a signal and transmits the signal.
- Each of the first and second encryption / decryption devices receives the downstream data including the encrypted data or the upstream data including the data to be encrypted, and analyzes the data structure.
- a data structure analysis block that outputs information related to encryption as control data, and outputs the encrypted data or the data to be encrypted as processing block input data; and
- a data control block that outputs an encryption / decryption switching signal indicating which of the encryptions is to be performed, and a mode selection signal indicating in which mode the processing block input data is to be processed; and the processing block.
- the input data is encrypted or decrypted according to the encryption / decryption switching signal, and the obtained data is obtained.
- the shared processing block performs ECB processing using the input key data, so that encryption and decryption can be performed in both the CBC mode and the CFB mode. And performs encryption or decryption in the mode indicated by the mode selection signal.
- encryption and decryption can be performed in many encryption modes using the same hardware, so that the circuit area can be reduced and the cost can be reduced. Since many functions can be provided at low cost, the cost performance of an encryption / decryption device or the like can be improved.
- FIG. 1 is a block diagram showing a configuration of an encryption / decryption device according to an embodiment of the present invention.
- FIG. 2 is a block diagram showing an example of the configuration of the shared processing block in FIG.
- FIG. 3 is an explanatory diagram showing a flow of processing performed by the shared processing block of FIG.
- FIG. 4 is an explanatory diagram showing combinations of data selected by the first to fourth selectors of the shared processing block of FIG.
- FIG. 5 is a block diagram showing another example of the configuration of the encryption / decryption device according to the embodiment of the present invention.
- FIG. 6 is a block diagram of a transmission / reception device using the encryption / decryption device of FIG. BEST MODE FOR CARRYING OUT THE INVENTION
- FIG. 1 is a block diagram showing a configuration of an encryption / decryption device according to an embodiment of the present invention.
- the encryption / decryption device 23 in FIG. 1 includes a data structure analysis block 2, a shared processing block 4, and a data control block 6.
- the encryption / decryption device 23 in FIG. 1 is configured by a center device and a plurality of terminal devices. In the two-way communication network, description will be given as being included in one of the terminal devices, but may be included in the center device.
- the center device transmits the downstream data SD including the encrypted data to the terminal device.
- the downstream data SD includes video data and transmission control data.
- the terminal device receives upstream data including data to be encrypted, encrypts the data, and transmits the encrypted data to the center device.
- the data structure analysis block 2 receives the downstream data SD and performs a syntax analysis thereof.
- the downstream data SD has, for example, a moving picture experts group (MPEG) structure in video data and a MAC (media access control) structure as a sublayer for network processing embedded in the MPEG structure.
- MPEG moving picture experts group
- MAC media access control
- the data structure analysis block 2 deciphers the header part in the MPEG structure data, extracts information for extracting the MAC structure data, and then extracts the MAC structure data.
- the header part in the MAC structure data is analyzed, and if there is an extended field called an extension header in addition to the normal header, the extension header is analyzed.
- the extension header enables extension of the data structure, and has information on the necessity of encryption and other information necessary for processing for encryption or decryption.
- the data structure analysis block 2 determines that the downstream data SD is not encrypted. In this case, the data structure analysis program 2 fixes the TEK (traffic encryption key) control data T K to, for example, a value “0” and outputs it to the data control block 6.
- TEK traffic encryption key
- the data structure analysis block 2 parses a field for storing information related to encryption. If it is confirmed that the data is not encrypted, the same processing as when there is no extension header is performed. If encryption is confirmed, SID (service ID) and key sequence number (key sequence number), which are information related to encryption, are extracted from the extension header, and TEK $ lj Output as control data TK to data control block 6.
- SID service ID
- key sequence number key sequence number
- the data structure analysis block 2 receives the data to be encrypted as the upstream data SU and analyzes the data structure.
- the data structure analysis program 2 extracts the SID and the key sequence number from the data included in the upstream data SU, and outputs the extracted data to the data control block 6 as ⁇ control data ⁇ .
- the data structure analysis block 2 outputs the encrypted data having the MP ⁇ G structure included in the downstream data SD or the data to be encrypted included in the upstream data SU to the shared processing block 4 as processing block input data EC. Power.
- the data structure analysis block 2 counts the number of bits of the received downstream data SD or upstream data SU packet, and determines that the number of bits of the stream packet is 64 bits or less, a multiple of 64 bits, or 6 bits. Determine whether it is a multiple of 4 bits or the sum of a fraction of 64 bits or less, and the number of bits (packet count) output as processing block input data EC in the bucket.
- the data structure analysis block 2 should encrypt the requested result and that the downstream data SD should be decrypted if received, and the upstream data SU should be encrypted if received. Something is also output to the data control block 6 as TEK control data TK.
- the data control block 6 performs processing using the TEK control data TK received from the data structure analysis block 2.
- the SID and the key sequence number are checked to determine whether or not these data are predetermined valid numerical values. If it determines that the value is invalid, it does nothing. If it is determined that the value is valid, the data control block 6 checks whether or not the mode is the 56-bit key mode. For encryption and decryption, a 56-bit key is used as a standard, but keys of other lengths are also used. In the following, it is assumed that a 56-bit or 40-bit key is used as an example. 5 6-bit key mode Whether it is a code or not uniquely corresponds to the SID and the key sequence number.
- the data control block 6 outputs information indicating whether or not the mode is the 56-bit key mode as a mode selection signal MS.
- the data control block 6 outputs an encrypted Z decryption switching signal SS indicating whether to perform encryption or decryption to the shared processing block 4 in accordance with the TEK control data TK. Further, the data control block 6 refers to the control data block 1: and outputs a signal indicating the CFB mode when the number of bits of the packet of the processing block input data EC is 64 bits or less, and a multiple of 64 bits. If, the signal indicating the CBC mode is output to the shared processing block 4 as the mode selection signal MS. If the bit number of the packet is the sum of a multiple of 64 bits and a fraction of 64 bits or less, the data control block 6 switches the mode selection signal MS as follows according to the packet count.
- the data control block 6 when the data structure analysis block 2 outputs the processing block input data EC corresponding to a multiple of 64 bits, the signal indicating the CBC mode is output and the processing block input data EC corresponding to a fraction of 64 bits or less is output. If so, the data control block 6 outputs a signal indicating the CFB mode as the mode selection signal MS. Further, the data control block 6 outputs, as the mode selection signal MS, whether it is in the initial state in which the processing of each mode is started or in the steady state thereafter.
- the data structure analysis block 2 notifies the data control block 6 whether or not to perform processing in the ECB mode according to the received downstream data SD or upstream data SU by using the EK control data TK.
- the data control block 6 outputs a signal indicating the ECB mode as a mode selection signal MS.
- the data control block 6 switches the mode selection signal MS in accordance with the S ID, the key sequence number, the bucket count, and the like, and outputs the mode selection signal MS to the shared processing block 4.
- the shared processing block 4 is commonly used for processing in a plurality of encryption modes. That is, the shared processing block 4 performs the ECB processing using the initial vector data IV and the key data KD input from the outside, so that in any of the encryption modes of the ECB mode, the CBC mode, and the CFB mode,
- the processing block input data EC is configured to be able to perform encryption and decryption.
- the common processing block 4 performs encryption or decryption in the mode indicated by the mode selection signal MS in accordance with the encryption / decryption switching signal SS, and converts the obtained encryption result or decryption result into processed data DC. Is output as
- FIG. 2 is a block diagram showing an example of the configuration of the shared processing block 4 in FIG.
- the shared processing block 4 of FIG. 2 includes a first selector 41, a second selector 42, a third selector 43, a fourth selector 44, a bit mask unit 46, an ECB processing unit 47, A delay unit 48 and an exclusive OR operation unit 49 are provided.
- the first selector 41 selects one of the processing block input data EC and the encryption processing data PD output by the ECB processor 47 according to the encryption Z decryption switching signal SS and the mode selection signal MS. Output to exclusive OR operator 49.
- the delay unit 48 receives the processing block input data EC and the encryption processing data PD as inputs and delays each of them by the time required for the ECB processor 47 to perform the ECB processing on the 64-bit data. Output to the second selector 42.
- the second selector 42 receives the processing block input data EC, the initial vector data IV, and the delayed processing block input data ECD output from the delay unit 48 according to the encryption Z decryption switching signal SS and the mode selection signal MS. Then, one of the delayed encrypted processing data PDD is selected and output to the exclusive OR operator 49.
- the exclusive OR calculator 49 calculates the exclusive OR of the output of the first selector 41 and the output of the second selector 42 for each corresponding bit, and outputs the result to the fourth selector 44.
- the third selector 43 includes an encryption Z decryption switching signal SS and a mode selection signal. According to the MS, one of the processing block input data EC, the exclusive OR data ER output by the exclusive OR calculator 49, the delayed processing block input data ECD, and the delayed encryption processing data PDD is output. Select and output to EC B processor 47.
- the bit mask unit 46 masks a part of the key data KD as necessary according to the mode selection signal MS, and outputs the key data KD to the ECB processor 47 as key data suitable for the mode.
- the fourth selector 44 selects one of the encrypted data PD and the exclusive OR data ER output by the exclusive OR calculator 49 according to the encryption / decryption switching signal SS and the mode selection signal MS. Select to output as encryption result or decryption result.
- the ECB processor 47 performs one of the encryption process and the decryption process as the ECB process on the output of the third selector 43 according to the encryption Z decryption switching signal S S and the mode selection signal M S.
- the £ ⁇ 8 processor 47 performs ECB processing using key data conforming to the mode output by the bit mask unit 46, and uses the obtained result as signal processing data PD as the first selector 41 and the fourth selector. Output to selector 44 and delay unit 48.
- FIG. 3 is an explanatory diagram showing a flow of processing performed by the shared processing block 4 in FIG.
- the upper part shows the flow of the encryption processing
- the lower part shows the flow of the decryption processing.
- Processes El, E2, E3, E9, D1, D2, D3, and D9 represent ECB processes, respectively.
- the shared processing block 4 performs the processing in the CBC mode continuously in both the encryption processing and the decryption processing when it is necessary to perform the processing in the CBC mode, and then performs the CFB processing as necessary. Perform processing according to the mode.
- the processing in the rightmost column including the processings E 9 and D 9 indicates the processing in the CFB mode.
- FIG. 4 is an explanatory diagram showing combinations of data selected by the first to fourth selectors 4 :! to 44 of the shared processing block 4 in FIG.
- the operation of the shared processing block 4 during the decryption processing will be described with reference to FIGS. 2, 3 and 4.
- a signal indicating decryption is input to the shared processing block 4 as the encryption / decryption switching signal SS.
- Different cases will be described depending on whether the mode is the 56-bit key mode, the CBC mode or the CFB mode, or the initial state or the steady state.
- the ECB process in the ECB processor 47 is a decryption process in the case of the CBC mode and an encryption process in the case of the CFB mode.
- the shared processing block 4 receives the encrypted data C as input, performs “Decrypt” processing as ECB processing, and obtains data I.
- the shared processing block 4 calculates the exclusive OR of the obtained data I and the input initial vector data IV, and outputs the result as unencrypted data D.
- a signal indicating that the mode is the 56-bit key mode and the initial state of the CBC mode is input to the common processing block 4 as the mode selection signal MS.
- the first selector 41 selects and outputs the encrypted data PD output from the ECB processor 47.
- the second selector 42 selects and outputs the initial vector data IV.
- the exclusive OR operator 49 is composed of the cryptographic processing data PD and the initial vector data IV. Is obtained for each corresponding bit, and the obtained exclusive OR data ER is output.
- the third selector 43 selects the processing block input data EC and outputs it to the ECB processor 47. Since the signal indicating that the mode is the 56-bit key mode is input to the bit mask unit 46 as the mode selection signal MS, the input 56-bit key data KD is output to the ECB processor 47 without masking. I do.
- the ECB processor 47 uses the 56-bit key data output from the bit mask unit 46 to perform decryption processing as ECB processing on the processing block input data EC output from the third selector, and obtain the obtained data. Outputs signal processing data PD.
- the fourth selector selects the exclusive OR data ER output by the exclusive OR calculator 49 and outputs the decrypted result as processed data DC.
- the shared processing block 4 receives the encrypted data C, performs “Decrypt” processing, and obtains data I.
- the shared processing block 4 obtains an exclusive OR of the obtained data I and the encrypted data C used in the preceding ECB processing, and outputs the result as unencrypted data D.
- the common processing block 4 receives, as the mode selection signal MS, a signal indicating that it is in the 56-bit key mode and that it is in the normal state of the CBC mode.
- the first selector 41 selects and outputs the signal processing data PD output from the ECB processor 47.
- the second selector 42 selects and outputs the delayed processing block input data ECD output from the delay unit 48.
- the exclusive OR calculator 49 obtains the exclusive OR of the encryption processing data PD and the delayed processing block input data ECD for each corresponding bit, and outputs the obtained exclusive OR data ER.
- the third selector 43 selects the processing block input data EC and sets the EC B processor Output to 47. Since the signal indicating that the mode is the 56-bit key mode is input to the bit mask unit 46 as the mode selection signal MS, the input 56-bit key data KD is output to the ECB processor 47 without being masked. I do.
- the ECB processor 47 uses the 56-bit key data output from the bit mask unit 46 to perform decryption processing on the processing block input data EC output from the third selector as ECB processing, and obtain the obtained data. It outputs the encrypted data PD.
- the fourth selector selects the exclusive-OR data ER output by the exclusive-OR calculator 49 and outputs the decoding result as processed data DC.
- the shared processing block 4 receives the encrypted data C, performs “EncryptPt” processing, and obtains data I.
- the shared processing block 4 obtains an exclusive OR of the obtained data I and the input initial vector data IV data, and outputs the result as unencrypted data D.
- the process in this case will be described with reference to FIG.
- the shared processing block 4 A signal indicating that the mode is the 56-bit key mode and the initial state of the CFB mode is input as the mode selection signal MS.
- the first selector 41 selects and outputs the encrypted data PD output from the ECB processor 47.
- the second selector 42 selects and outputs the initial vector data IV.
- the exclusive OR calculator 49 obtains the exclusive OR of the encrypted data PD and the initial vector data IV for each corresponding bit, and outputs the obtained exclusive OR data ER.
- the third selector 43 selects the processing block input data EC and outputs it to the ECB processor 47. Since the signal indicating that the mode is the 56-bit key mode is input to the bit mask unit 46 as the mode selection signal MS, the input 56-bit key data KD is output to the ECB processor 47 without being masked. I do.
- the ECB processor 47 performs encryption processing as ECB processing on the processing block input data EC output from the third selector using the 56-bit key data output from the bit mask unit 46, and obtains the obtained data. Outputs the cryptographic processing data PD.
- the fourth selector selects the exclusive-OR data ER output by the exclusive-OR calculator 49 and outputs the decoding result as processed data DC.
- the shared processing block 4 receives the encrypted data C used in the previous ECB processing and performs “Encrypty” processing to obtain data I.
- the shared processing block 4 obtains an exclusive OR of the obtained data I and the next encrypted data C, and outputs the result as unencrypted data D.
- the shared processing block 4 has a 56-bit key mode as the mode selection signal MS and a CFB mode setting. A signal indicating a normal state is input.
- the first selector 41 selects and outputs the encrypted data PD output from the ECB processor 47.
- the second selector 42 selects and outputs the processing block input data EC.
- the exclusive OR operator 49 calculates the exclusive OR of the encryption processing data PD and the processing block input data EC for each corresponding bit, and outputs the obtained exclusive OR data ER.
- the third selector 43 selects the delayed processing block input data E CD output from the delay unit 48 and outputs it to the E CB processor 47. Since the signal indicating that the mode is the 56-bit key mode is input to the bit mask unit 46 as the mode selection signal MS, the input 56-bit key data KD is not masked and the ECB is not masked. Output to processor 47.
- the ECB processor 47 uses the 56-bit key data output from the bit mask unit 46 to encrypt the delayed processing block input data E CD output from the third selector as ECB processing.
- the encryption processing is performed, and the obtained encrypted processing data PD is output.
- the fourth selector selects the exclusive-OR data ER output by the exclusive-OR calculator 49, and outputs a decoding result as processed data DC.
- a signal indicating encryption is input to the shared processing block 4 as the encryption / decryption switching signal SS.
- the mode is the 56-bit key mode, whether the mode is the CBC mode or the CFB mode, or the initial state or the steady state.
- the ECB process in the ECB processor 47 is an encryption process in both the CBC mode and the CFB mode.
- the shared processing block 4 calculates the exclusive OR of the input initial vector data IV and the unencrypted data D, and outputs the result as data I.
- the shared processing block 4 performs “Encrypty” processing as ECB processing on the obtained data I to obtain and output encrypted data C.
- a signal indicating that the mode is the 56-bit key mode and the initial state of the CBC mode is input to the shared processing block 4 as the mode selection signal MS.
- the first selector 41 selects and outputs the processing block input data EC.
- the second selector 42 selects and outputs the initial vector data IV.
- the exclusive OR operation unit 49 calculates the exclusive OR of the processing block input data EC and the initial vector data IV for each corresponding bit, and outputs the obtained exclusive OR data ER.
- the third selector 43 selects the exclusive OR data ER and outputs it to the ECB processor 47. Since the signal indicating that the mode is the 56-bit key mode is input to the bit mask unit 46 as the mode selection signal MS, the input 56-bit key data KD is directly masked without masking the input 56-bit key data KD. Output to 47.
- the ECB processor 47 performs an encryption process as an ECB process on the exclusive OR data ER output from the third selector using the 56-bit key data output from the bit mask device 46, and obtains It outputs the encrypted data PD.
- the 4th Selector selects the encrypted data PD and outputs the encryption result as processed data DC.
- the shared processing block 4 calculates the exclusive OR of the unencrypted data D and the encrypted data C obtained in the preceding ECB process, and outputs the result as data I.
- the shared processing block 4 performs “Encryptj processing as ECB processing on the obtained data I to obtain and output encrypted data C.
- the common processing block 4 receives, as the mode selection signal MS, a signal indicating that it is in the 56-bit key mode and that it is in the normal state of the CBC mode.
- the first selector 41 selects and outputs the processing block input data EC.
- the second selector 42 selects and outputs the delayed encrypted data PDD output from the delay unit 48.
- the exclusive OR calculator 49 calculates the exclusive OR of the processing block input data EC and the delayed encrypted processing data PDD for each corresponding bit, and outputs the obtained exclusive OR data ER.
- the third selector 43 selects the exclusive OR data ER and outputs it to the ECB processor 47. Since the signal indicating that the mode is the 56-bit key mode is input to the bit mask unit 46 as the mode selection signal MS, the input 56-bit key data KD is not subjected to the ECB processing without being masked. Output to the container 47.
- the ECB processor 47 performs an encryption process as an ECB process on the exclusive OR data ER output from the third selector using the 56-bit key data output from the bit mask device 46, and obtains It outputs the encrypted data PD.
- the fourth selector selects the encrypted data PD and outputs the encryption result as processed data DC. 1 1) If not in 56-bit key mode and in the initial state of CBC mode
- cases are the same as cases 9) and 10), except for the following points. That is, a signal indicating that the mode is not the 56-bit key mode is input to the shared processing block 4 as the mode selection signal MS. Since the signal indicating that the mode is not the 56-bit key mode is input to the bit mask unit 46 as the mode selection signal MS, unnecessary bits (for example, upper 16 bits) of the input 56-bit key data KD are input. Is masked and output to the ECB processor 47 as 40-bit key data. The £ $ 8 processor 47 performs ECB processing using the 40-bit key data output from the bit mask unit 46.
- the shared processing block 4 receives the unencrypted data D as input and performs “Encrypt” processing.
- the shared processing block 4 obtains an exclusive OR of the data obtained in this processing and the input initial vector data IV data, and outputs the result as encrypted data C.
- a signal indicating that the mode is the 56-bit key mode and that the CFB mode is in the initial state is input to the shared processing block 4 as the mode selection signal MS.
- the first selector 41 selects and outputs the encrypted data PD output from the ECB processor 47.
- the second selector 42 selects and outputs the initial vector data IV.
- the exclusive OR calculator 49 calculates the exclusive OR of the encrypted data PD and the initial vector data IV for each corresponding bit, and obtains the obtained exclusive OR data ER Is output.
- the third selector 43 selects the processing block input data EC and outputs it to the ECB processor 47. Since the signal indicating that the mode is the 56-bit key mode is input to the bit mask unit 46 as the mode selection signal MS, the input 56-bit key data KD is output to the ECB processor 47 without masking. I do.
- the ECB processor 47 uses the 56-bit key data output from the bit mask unit 46 to perform encryption processing as ECB processing on the processing block input data EC output from the third selector, and obtain the obtained data. Outputs the cryptographic processing data PD.
- the fourth selector selects the exclusive OR data ER output from the exclusive OR calculator 49 and outputs the encryption result as processed data DC.
- the shared processing block 4 receives the encrypted data C obtained in the previous ECB processing and performs “Encrypty” processing.
- the shared processing block 4 obtains an exclusive OR of the data obtained in this processing and the unencrypted data D, and outputs the result as encrypted data.
- a signal indicating that the mode is 56-bit key mode and the CFB mode is in a normal state is input to the shared processing block 4 as the mode selection signal IS.
- the first selector 41 selects and outputs the encrypted data PD output from the ECB processor 47.
- the second selector 42 selects and outputs the processing block input data EC.
- the exclusive OR calculator 49 obtains the exclusive OR of the encryption processing data PD and the processing block input data EC for each corresponding bit, and outputs the obtained exclusive OR data ER.
- the third selector 43 receives the delayed encrypted data PD output from the delay unit 48. Select D and output to EC B processor 47. Since the signal indicating that the mode is the 56-bit key mode is input to the bit mask unit 46 as the mode selection signal MS, the input 56-bit key data KD is output to the ECB processor 47 without masking. I do.
- the ECB processor 47 uses the 56-bit key data output from the bit mask unit 46 to perform encryption processing as ECB processing on the delayed encrypted data PDD output from the third selector. Then, the obtained encrypted data PD is output.
- the fourth selector selects the exclusive OR data ER output from the exclusive OR calculator 49 and outputs the encryption result as processed data DC.
- a signal indicating that the mode is not the 56-bit key mode is input to the shared processing block 4 as the mode selection signal MS. Since a signal indicating that the mode is not the 56-bit key mode is input to the bit mask unit 46 as the mode selection signal MS, unnecessary bits (for example, upper 1 bits) of the input 56-bit key data KD (6 bits) is masked and output to the ECB processor 47 as 40-bit key data.
- the £ $ 8 processor 47 performs ECB processing using the 40-bit key data output from the bit mask unit 46.
- the third selector 43 selects and outputs the processing block input data EC
- the fourth selector 44 selects the encryption processing data PD. Output.
- the processor 8 performs an encryption process when the encryption / decryption switching signal SS indicates encryption, and performs a decryption process when the encryption / decryption switching signal SS indicates decryption.
- the encryption / decryption device in FIG. 1 can perform encryption and decryption in the ECB mode in addition to the CBC mode and the CFB mode. Wear.
- the encryption / decryption device in FIG. 1 may be used as an encryption device.
- the configuration and operation corresponding to the decryption in the above description are unnecessary.
- the encryption / decryption switching signal S S is unnecessary, and the first to fourth selectors and the ECB processor may operate according to the mode selection signal MS.
- the delay unit receives the cryptographic process data PD as an input, delays this, and outputs it.
- the second selector selects and outputs any one of the processing block input data E C, the initial vector data IV, and the delayed cryptographic processing data P DD output from the delay unit.
- the third selector selects and outputs any one of the processing block input data E C, the exclusive OR data E R output by the exclusive OR operation unit, and the delayed encryption processing data P DD.
- the fourth selector selects one of the encryption processing data PD and the exclusive-OR data ER and outputs it as an encryption result.
- the encryption / decryption device of FIG. 1 may be used as a decryption device.
- the input upstream data is only decrypted and output, and the configuration and operation corresponding to the encryption in the above description are unnecessary. Therefore, the first selector that always outputs the encryption processing data PD and the fourth selector that always outputs the exclusive OR data ER output by the exclusive OR operation unit are unnecessary. Also, the encryption / decryption switching signal S S is unnecessary, and the second and third selectors and the ECB processor may operate in accordance with the mode selection signal MS.
- the delay device receives the processing block input data EC as input, delays the input, and outputs the delayed data.
- the second selector selects and outputs one of the processing block input data EC, the initial vector data IV, and the delayed processing block input data ECD output by the delay unit.
- the third selector is the processing block input data Data EC and delayed processing block input data ECD are selected and output.
- the exclusive OR operation unit obtains the exclusive OR of the encrypted data PD and the output of the second selector, and outputs the result as the decryption result.
- the present invention can also be realized by performing processing by software using a processor such as a CPUDSP (digital signal processor).
- a processor such as a CPUDSP (digital signal processor).
- the encryption / decryption device of the present invention if the mode selection signal is changed, any one of the ECB mode, the CBC mode, and the CFB mode, and the 56-bit key mode or the 4 In any of the modes combined with any of the 0-bit key modes, the same hardware can perform decryption on the encrypted data and obtain decrypted data.
- the encryption / decryption switching signal is changed, the data can be encrypted and decrypted by the same hardware in any mode. Therefore, the circuit scale of the encryption / decryption device can be reduced.
- FIG. 5 is a block diagram showing another example of the configuration of the encryption / decryption device according to the embodiment of the present invention.
- the encryption / decryption device shown in FIG. 5 includes a data structure analysis block 202, a shared processing block 4, a data control block 206, first and second input selectors 206 and 208, And an output selector 209.
- the encryption / decryption device in FIG. 5 is a device that performs encryption and decryption using the Triple DES (triple DES) method.
- the shared processing block 4 may be the same as that described with reference to FIG.
- the data structure analysis block 202 performs the same operation as the data structure analysis block 2 in FIG. 1 and determines whether or not this stream data should be processed by the triple DES method from the header of the input stream data. The result is also output to the data control block 206 as TEK control data T.
- Data control block 206 performs the same operation as data control block 6 in FIG.
- the signal indicating the triple DES mode is also used as the mode selection signal MS as the shared processing block 4, Output to input selectors 207 and 208.
- the data control block 206 outputs the output control signal OS to the output selector 209.
- the input selector 207 outputs a downstream stream according to the mode selection signal MS.
- Data or the processed data DC output by the shared processing block 4 is selected and output to the data structure analysis block 202.
- the input selector 208 selects the upstream data SU or the processed data DC according to the mode selection signal MS, and outputs it to the data structure analysis block 202.
- the output selector 209 selects the processed data DC or the value "0" according to the output control signal OS, and outputs the selected data as the processed data TD of the encryption / decryption device in FIG.
- the data control block 206 normally has an input selector 20 to select the downstream data S D and the upstream data SU, respectively.
- the mode selection signal MS is output to 7, 208, and the output control signal OS is output to the output selector 209 so as to select the processed data DC.
- the shared processing block 4 performs the first processing on the input downstream data SD or upstream data SU, and outputs the processed data DC to the input selectors 207, 208 and the output selector 209.
- the processed data DC that has been subjected to the first processing by 4 is input again to the data structure analysis block 202, and the shared processing block 4 performs the second processing.
- the processed data D ⁇ ⁇ C is input to the playback data structure analysis block 202, and the third processing is performed by the shared processing block 4.
- the output selector 209 selects the processed data DC, and the result of the encryption or decryption processing by the triple DES method is output as the processed data TD .
- the input selectors 207 and 208 select the downstream data SD and the upstream data SU, respectively.
- both of encryption and decryption can be performed.
- encryption using the Triple DES method can be performed. Encryption can be performed.
- the encryption / decryption device of FIG. 5 since the encryption / decryption process is performed three times in the shared processing block 4, the encryption / decryption by the triple DS method can be performed.
- the processing in the shared processing block 4 may be performed more than three times.
- FIG. 6 is a block diagram of a transmission / reception device using the encryption / decryption device of FIG.
- the transmitting / receiving apparatus 100 in FIG. 6 includes a PHY 110, a MAC section 20, an image processing section 32, an interface section 34, and a tuner 52.
- the P HY section 10 includes a downstream P HY section 11 and an upstream P HY section 12.
- the MAC unit 20 includes a downstream data processing unit 21, an upstream data processing unit 22, encryption and decryption devices 23 and 24, a CPU 26, and a storage unit 28. ing.
- Each of the encryption / decryption devices 23 and 24 is the same as the encryption / decryption device in FIG.
- the encryption / decryption device shown in FIG. 5 may be used as the encryption / decryption devices 23 and 24.
- the tuner 52 selects one of the channels used for transmission, converts the signal transmitted from the center device 80 into a lower frequency signal, and Output to the Ream PHY section 11.
- the downstream PHY unit 11 converts the received signal into a baseband signal, further converts the signal into data, and performs error correction, and outputs the data to the downstream data processing unit 21.
- the downstream data processing unit 21 separates downstream data SD, key data KD, initial vector data IV, and the like from the received data according to the information of the header, and outputs the separated data to the encryption / decryption device 23. .
- the encryption / decryption device 23 decrypts the encryption and outputs the obtained processed data DC to the bus 29.
- the CPU 26 stores the processed data DC in the storage unit 28 via the bus 29. '
- the CPU 26 reads data from the storage unit 28 and supplies the data to the image processing unit 32.
- the image processing section 32 performs necessary processing for displaying the received data as an image, and outputs the obtained data to a display (not shown) via the interface section 34 for display. .
- the CPU 26 reads the data from the storage unit 28 and supplies the data to the encryption / decryption device 24 via the path 29 as the upstream data SU.
- the encryption / decryption device 24 encrypts the received data and outputs the obtained processed data DC to the upstream data processing unit 22 as described with reference to FIG. .
- the upstream data processing unit 22 performs processing such as adding a header to the received data, and outputs the data to the upstream PHY unit 12.
- the up stream PHY section 12 converts the received data into an electric signal, further converts this into a frequency used for transmission, and transmits it to the center device 80.
- the encryption / decryption apparatus and method according to the present invention provide many functions at low cost. For example, it is useful for encryption and decryption in a transmission / reception device, a data recording / reproducing device, and the like.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2004527392A JP4235174B2 (ja) | 2002-08-08 | 2003-08-08 | 暗号化復号化装置、暗号化装置、復号化装置、及び送受信装置 |
US10/523,720 US7532726B2 (en) | 2002-08-08 | 2003-08-08 | Encryption/decryption device and method, encryption device and method, decryption device and method, and transmission/reception apparatus |
EP03784640A EP1531578A1 (en) | 2002-08-08 | 2003-08-08 | Encrypting/decrypting device and method, encrypting device and method, decrypting device and method, and transmitting/receiving device |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2002-231284 | 2002-08-08 | ||
JP2002231284 | 2002-08-08 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2004015916A1 true WO2004015916A1 (ja) | 2004-02-19 |
Family
ID=31711739
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2003/010186 WO2004015916A1 (ja) | 2002-08-08 | 2003-08-08 | 暗号化復号化装置及び方法、暗号化装置及び方法、復号化装置及び方法、並びに送受信装置 |
Country Status (6)
Country | Link |
---|---|
US (1) | US7532726B2 (ja) |
EP (1) | EP1531578A1 (ja) |
JP (1) | JP4235174B2 (ja) |
KR (1) | KR20050032588A (ja) |
CN (1) | CN100521599C (ja) |
WO (1) | WO2004015916A1 (ja) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2010109639A (ja) * | 2008-10-30 | 2010-05-13 | Fujitsu Microelectronics Ltd | 共通鍵ブロック暗号におけるスワップ回路及び、それを有する暗号化・復号化回路 |
Families Citing this family (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4199477B2 (ja) * | 2002-04-17 | 2008-12-17 | パナソニック株式会社 | デジタル双方向通信制御装置およびその方法 |
US20100195538A1 (en) * | 2009-02-04 | 2010-08-05 | Merkey Jeffrey V | Method and apparatus for network packet capture distributed storage system |
CA2619141C (en) * | 2004-12-23 | 2014-10-21 | Solera Networks, Inc. | Method and apparatus for network packet capture distributed storage system |
KR100749414B1 (ko) * | 2005-12-10 | 2007-08-14 | 한국전자통신연구원 | 무선 인터넷 시스템의 암호화 장치 및 그 방법과, 복호화장치 및 그 방법 |
WO2007069236A2 (en) * | 2005-12-14 | 2007-06-21 | Nds Limited | Method and system for usage of block cipher encryption |
CN101401141B (zh) * | 2006-03-14 | 2011-12-07 | 日本电气株式会社 | 信息处理系统以及信息处理方法 |
US8379841B2 (en) * | 2006-03-23 | 2013-02-19 | Exegy Incorporated | Method and system for high throughput blockwise independent encryption/decryption |
US8036377B1 (en) | 2006-12-12 | 2011-10-11 | Marvell International Ltd. | Method and apparatus of high speed encryption and decryption |
US8538012B2 (en) | 2007-03-14 | 2013-09-17 | Intel Corporation | Performing AES encryption or decryption in multiple modes with a single instruction |
US8538015B2 (en) | 2007-03-28 | 2013-09-17 | Intel Corporation | Flexible architecture and instruction for advanced encryption standard (AES) |
US20080263366A1 (en) * | 2007-04-19 | 2008-10-23 | Microsoft Corporation | Self-verifying software to prevent reverse engineering and piracy |
US8594322B2 (en) * | 2007-07-10 | 2013-11-26 | Stmicroelectronics S.R.L. | Encoding/decoding apparatus |
US8521732B2 (en) | 2008-05-23 | 2013-08-27 | Solera Networks, Inc. | Presentation of an extracted artifact based on an indexing technique |
US8625642B2 (en) | 2008-05-23 | 2014-01-07 | Solera Networks, Inc. | Method and apparatus of network artifact indentification and extraction |
IL199616A0 (en) * | 2009-06-28 | 2010-05-17 | Chaim Shen Orr | Pattern-free encryption |
CN101710964B (zh) * | 2009-11-17 | 2012-09-05 | 深圳国微技术有限公司 | Mpeg2传输流数据包的加密和解密方法 |
US8239733B2 (en) * | 2009-11-27 | 2012-08-07 | Skymedi Corporation | Memory device with protection capability and method of accessing data therein |
US8849991B2 (en) | 2010-12-15 | 2014-09-30 | Blue Coat Systems, Inc. | System and method for hypertext transfer protocol layered reconstruction |
JP5225414B2 (ja) * | 2011-03-08 | 2013-07-03 | 株式会社東芝 | 暗号演算装置 |
US8666985B2 (en) | 2011-03-16 | 2014-03-04 | Solera Networks, Inc. | Hardware accelerated application-based pattern matching for real time classification and recording of network traffic |
CN103580851A (zh) * | 2013-11-13 | 2014-02-12 | 福建省视通光电网络有限公司 | 信息加密及解密方法 |
CN109804596B (zh) * | 2016-12-09 | 2023-05-09 | 密码研究公司 | 具有加掩码的输入的可编程块密码器 |
CN118523902A (zh) * | 2024-07-22 | 2024-08-20 | 之江实验室 | 一种基于软件定义的多种加解密模式切换方法及装置 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH07261662A (ja) * | 1994-03-22 | 1995-10-13 | Fujitsu Ltd | 暗号演算回路 |
JPH10215244A (ja) * | 1996-11-27 | 1998-08-11 | Sony Corp | 情報伝送装置及び方法並びに情報受信装置及び方法並びに情報記憶媒体 |
JP2000075785A (ja) * | 1998-08-26 | 2000-03-14 | Fujitsu Ltd | 高速暗号処理回路および処理方法 |
JP2001177518A (ja) * | 1999-12-17 | 2001-06-29 | Nec Corp | 暗号化方法、復号化方法及び装置 |
JP2002297030A (ja) * | 2001-03-29 | 2002-10-09 | Toshiba Corp | 暗号処理装置及び暗号処理方法並びにプログラム |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4791669A (en) | 1985-11-30 | 1988-12-13 | Nec Corporation | Encryption/decryption system |
US5070528A (en) * | 1990-06-29 | 1991-12-03 | Digital Equipment Corporation | Generic encryption technique for communication networks |
KR100345969B1 (ko) * | 1993-08-10 | 2002-10-25 | 소니 가부시끼 가이샤 | 확산부호발생방법및장치 |
JPH09212457A (ja) | 1996-01-30 | 1997-08-15 | Mitsubishi Electric Corp | デジタル双方向通信端末における暗号化・復号化装置 |
US5835599A (en) | 1996-04-15 | 1998-11-10 | Vlsi Technology, Inc. | Muti-cycle non-parallel data encryption engine |
JP2001177514A (ja) | 1999-12-17 | 2001-06-29 | Ntt Docomo Inc | 通信方法および通信装置 |
US7184549B2 (en) * | 2000-01-14 | 2007-02-27 | Mitsubishi Denki Kabushiki Kaisha | Method and apparatus for encryption, method and apparatus for decryption, and computer-readable medium storing program |
-
2003
- 2003-08-08 EP EP03784640A patent/EP1531578A1/en not_active Withdrawn
- 2003-08-08 CN CNB038190184A patent/CN100521599C/zh not_active Expired - Fee Related
- 2003-08-08 JP JP2004527392A patent/JP4235174B2/ja not_active Expired - Fee Related
- 2003-08-08 US US10/523,720 patent/US7532726B2/en not_active Expired - Fee Related
- 2003-08-08 KR KR1020057001976A patent/KR20050032588A/ko not_active Application Discontinuation
- 2003-08-08 WO PCT/JP2003/010186 patent/WO2004015916A1/ja active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH07261662A (ja) * | 1994-03-22 | 1995-10-13 | Fujitsu Ltd | 暗号演算回路 |
JPH10215244A (ja) * | 1996-11-27 | 1998-08-11 | Sony Corp | 情報伝送装置及び方法並びに情報受信装置及び方法並びに情報記憶媒体 |
JP2000075785A (ja) * | 1998-08-26 | 2000-03-14 | Fujitsu Ltd | 高速暗号処理回路および処理方法 |
JP2001177518A (ja) * | 1999-12-17 | 2001-06-29 | Nec Corp | 暗号化方法、復号化方法及び装置 |
JP2002297030A (ja) * | 2001-03-29 | 2002-10-09 | Toshiba Corp | 暗号処理装置及び暗号処理方法並びにプログラム |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2010109639A (ja) * | 2008-10-30 | 2010-05-13 | Fujitsu Microelectronics Ltd | 共通鍵ブロック暗号におけるスワップ回路及び、それを有する暗号化・復号化回路 |
Also Published As
Publication number | Publication date |
---|---|
US7532726B2 (en) | 2009-05-12 |
CN100521599C (zh) | 2009-07-29 |
EP1531578A1 (en) | 2005-05-18 |
JPWO2004015916A1 (ja) | 2005-12-02 |
JP4235174B2 (ja) | 2009-03-11 |
CN1675877A (zh) | 2005-09-28 |
US20050286720A1 (en) | 2005-12-29 |
KR20050032588A (ko) | 2005-04-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4235174B2 (ja) | 暗号化復号化装置、暗号化装置、復号化装置、及び送受信装置 | |
US6504930B2 (en) | Encryption and decryption method and apparatus using a work key which is generated by executing a decryption algorithm | |
EP1689113B1 (en) | Block cipher apparatus using auxiliary transformation | |
KR101139580B1 (ko) | 송신 장치 및 수신 장치, 및, 데이터 전송 시스템 | |
JPH1075240A (ja) | データ送信を保護する方法およびデータを暗号化または解読化する装置 | |
KR100991222B1 (ko) | 암호화 및 복호를 위한 장치, 방법 및 기록 매체 | |
EP2449719B1 (en) | Pattern-free encryption | |
US7035290B1 (en) | Method and system for temporary interruption of video data transmission | |
JP3769804B2 (ja) | 解読化方法および電子機器 | |
EP1994672B1 (en) | Method and apparatus for synchronous stream cipher encryption with reserved codes | |
CN117375836A (zh) | 基于rsa加密算法的长文本分段加解密方法及系统 | |
JP4395527B2 (ja) | 情報処理装置 | |
JP2000224158A (ja) | 暗号通信システム | |
KR100494560B1 (ko) | Rijndael암호를 이용한 블록 데이터 실시간암호복호화 장치 및 방법 | |
Huang et al. | Real-time mode hopping of block cipher algorithms for mobile streaming | |
US7583800B2 (en) | Encryption apparatus and method in a wireless communications system | |
US20090041245A1 (en) | Confidential information processing device,confidential information processing apparatus, and confidential information processing method | |
JP4752239B2 (ja) | 共通鍵暗号方法及び装置 | |
KR20060003328A (ko) | 향상된 cfm 모드 시스템 | |
JPH09233065A (ja) | 暗号化装置及び暗号化方法 | |
JP2001285281A (ja) | 暗号方式 | |
CN101237461A (zh) | 流加密及解密方法及装置 | |
CN114143022A (zh) | 数据加密方法、数据传输方法和数据解密方法及相关装置 | |
JPH0465939A (ja) | 暗号装置 | |
JPH08202262A (ja) | 信号処理装置および信号処理方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): CN JP KR US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 1020057001976 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2004527392 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 20038190184 Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 10523720 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2003784640 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 1020057001976 Country of ref document: KR |
|
WWP | Wipo information: published in national office |
Ref document number: 2003784640 Country of ref document: EP |