WO2004086672A1 - 暗号化および復号のための装置、方法、プログラム並びに記録媒体 - Google Patents
暗号化および復号のための装置、方法、プログラム並びに記録媒体 Download PDFInfo
- Publication number
- WO2004086672A1 WO2004086672A1 PCT/JP2003/003596 JP0303596W WO2004086672A1 WO 2004086672 A1 WO2004086672 A1 WO 2004086672A1 JP 0303596 W JP0303596 W JP 0303596W WO 2004086672 A1 WO2004086672 A1 WO 2004086672A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- key
- ciphertext
- stream
- encryption
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/12—Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
- H04L2209/125—Parallelization or pipelining, e.g. for accelerating processing of cryptographic operations
Definitions
- the present invention relates to an apparatus, a method, a program, and a recording medium for encryption and decryption applied to stream encryption.
- Figure 1A illustrates a block cipher.
- the plaintext information bit string is divided into predetermined lengths (blocks), and each block is encrypted by the encryptor 1.
- the encrypted text is also divided for each block.
- encryption is performed by applying a random number generated by an encryptor (random number generator) 2 to an information bit string bit by bit.
- the bit sequence of plaintext is m1, m2, m3,...
- the bit sequence of random numbers is r1, r2, r3,.
- mod. 2 operation is exclusive OR Is realized.
- random numbers that are safe for cryptography need not only be statistically uniform, but also that future random numbers cannot be predicted from past random numbers.
- stream cipher is faster than Block II, and is suitable for encrypting a large amount of data such as image data and transmitting it in real time.
- stream encryption can reduce the circuit size. For this reason, stream encryption is used in spite of the fact that DES (Data Encryption Standard) and AES (Advanced Encryption Standard) 7 lock encryption are standardized.
- RC 4 (Rivest Cipher) 4 Stream Cipher) is used in wireless LAN (IEEE 802.11)
- WEP Wired Equivalent Privacy protocol
- an encryption key is generated from an IV (Initial Vector) and a common key, and a network packet (computer data) is encrypted.
- the encryption key is transmitted using a method such as a public key encryption system at a certain time interval, different keys can be used on the transmitting side and the receiving side. Data transfer must be interrupted, making real-time communication difficult.
- Japanese Patent Laid-Open No. 2000-2000 discloses an encryption communication system that generates key generation information based on information of a ciphertext bucket, and generates an encryption key and a decryption key based on the key generation information and a master key.
- 224158 The one described in this document is intended for bucket communication, and has a problem that it is difficult to apply it to a continuous stream of video data, music data, and the like. To synchronize the stream data, a synchronization signal is required, but this is not described in JP-A-2000-224158.
- An object of the present invention can be applied to a continuous stream of video data or the like, and it is not necessary to increase the data to be transmitted, and it is not necessary to make a significant change to an existing system.
- An object of the present invention is to provide an apparatus, a method, a program, and a recording medium for decoding and decoding. Disclosure of the invention
- the invention according to claim 1 is a stream cipher encryption device that generates a ciphertext by exclusive-OR of key data and information data, wherein a synchronization signal is input, and a part of the ciphertext in the ciphertext at the previous time is input.
- a key data generation cow that extracts data and generates key data from a part of the extracted ciphertext;
- This is an encryption device comprising encryption means for encrypting information data using key data.
- the invention of claim 7 is directed to a stream cipher encryption method for generating a cipher text by exclusive-ORing key data and information data, comprising the steps of: Key data generation step of extracting key data and generating a key data from a part of the extracted ciphertext;
- the invention according to claim 12 is a program for causing a computer to execute a stream cipher encryption method for generating a cipher text by exclusive-ORing key data and information data,
- the invention according to claim 13 is a computer-readable recording medium that stores a program for executing a stream encryption method.
- the invention according to claim 14 is a stream cipher decryption apparatus for decrypting cipher text by exclusive-OR of cipher text and key data
- Key data generation means for receiving a synchronization signal, extracting a part of the ciphertext at a previous time, and generating key data from the extracted ciphertext;
- Decryption means for decrypting the ciphertext with the key data. is there.
- the invention according to claim 20 is a stream cipher decryption method for decrypting cipher text by exclusive-OR of cipher text and key data
- the invention according to claim 25 is a program for causing a computer to execute a stream cipher decoding method for decoding ciphertext by exclusive-OR of ciphertext and key data,
- the invention according to claim 26 is a computer-readable recording medium that stores a program for causing a computer to execute a stream cipher decryption method.
- FIG. 1 is a schematic diagram for explaining an outline of a conventional block cipher and stream cipher.
- FIG. 2 is a schematic diagram showing a configuration of transmission data in conventional encryption.
- FIG. 3 is a block diagram used for explaining the encryptor according to the present invention. You.
- FIG. 4 is a block diagram showing the configuration of an encryptor according to the present invention.
- FIG. 5 is a block diagram showing the configuration of a decryptor according to the present invention.
- FIG. 6 is a block diagram showing a configuration of an example of an encryption key generation unit. BEST MODE FOR CARRYING OUT THE INVENTION
- FIG. 3 schematically shows an encryption device according to the present invention.
- Reference numeral 11a denotes an exclusive OR gate (hereinafter, abbreviated as EX-OR gate) to which an IV having the same bit length as the encryption key of the stream cipher extracted from the ciphertext is input.
- Ex-OR gate 1 1a receives symmetric key 1a.
- the common key 12a is a secret key shared between the transmitting side and the receiving side.
- How to extract the IV from the ciphertext is predetermined by the transmitting side and the receiving side. For example, when encrypting video data, it is predetermined to use a predetermined number of bits from a predetermined position within one frame, for example, the beginning of one frame of valid video data, as the IV. In this case, the time interval is the frame period.
- the encryption key 13a is obtained at the output of the EX-OR gate 11a. With this encryption key 13a, data to be transmitted, for example, video data, is encrypted by stream encryption. Reference numeral 15a indicates a cipher text (encrypted data). The encryption is performed by performing an exclusive OR operation on the encryption key 13a and the transmission data for one or more bits.
- the IV extracted from the ciphertext 15 a is then supplied to the EX— ⁇ R gate 11 b, and exclusive with the common key 12 b Logical disjunction is required.
- EX— 0 R gate 1 lb The encryption key 1 3b is obtained from this.
- stream encryption is performed, and a ciphertext 15b is obtained at time tn.
- the IV extracted from the ciphertext 15 b is supplied to the EX_0 R gate 11 c, and the exclusive OR with the common key 12 c is obtained. Is required. EX — 0 R Gate 1 1.
- the encryption key 13 c is obtained from. Stream encryption is performed by performing an exclusive OR operation on the encryption key 13c and the transmission data to one or more bits, and a ciphertext 15c is obtained at time tn + 1.
- the decoding unit on the receiving side extracts and stores a portion corresponding to IV from the data received at the time one step before. Then, an exclusive OR is performed with the common key shared with the receiving side to generate an encryption key. Decryption is performed using this encryption key.
- the encryption key used for stream encryption is generated based on the IV, so that the encryption key can be changed over time. Therefore, highly secure encryption is possible.
- the advantage is that there is no time overhead.
- the present invention having these features requires little change to existing real-time communication means and does not impair real-time performance.
- FIG. 4 shows an embodiment of the configuration of the encryption unit on the transmission side.
- Reference numeral 21 indicates the encryption unit as a whole.
- the k-bit plaintext is supplied to EX-OR gate 22.
- the k-bit stream key from the stream encryption core 23 is supplied to the EX-OR gate 22, and the ciphertext is output from the EX-OR gate 22.
- the cipher text output from the R gate 22 is transmitted and fed back to the encryption key generation unit 24.
- the encryption key generation unit 24 internally has an n-bit common key. A part of the data in the ciphertext is used as an IV, an encryption key is generated from the common key and the IV, and the generated encryption key is sent to the stream encryption core 23.
- the stream key from the stream cryptographic core 13 is supplied to the EX-OR gate 22 for encryption.
- the encryption key generation unit 24 generates an encryption key having a key length of 480 bits in parallel, and generates a 40-bit stream key from the encryption key.
- the exclusive-OR of the 40-bit stream key from the stream cryptographic core 23 and the plaintext parallelized every 40 bits is obtained.
- -A synchronization signal (Sync) is supplied to the stream encryption core 23 and the encryption key generation unit 24, and the key is updated at each time specified by the synchronization signal.
- a frame sync signal or a vertical sync signal can be used as the sync signal (Sync).
- Exclusive OR of the encryption key and the plaintext is taken for each bit. May be. However, it is possible to improve the encryption speed by performing the parallel processing as in the embodiment.
- FIG. 5 shows an embodiment of the configuration of the decoding unit on the receiving side.
- Reference numeral 31 indicates the decoding unit as a whole.
- the received ciphertext is supplied to EX-0R gate 32.
- the stream key from the stream encryption core 33 is supplied to the EX-OR gate 32, and the plaintext is output from the EX-OR gate 32.
- the ciphertext is also input to the encryption key generation unit 34.
- the encryption key generation unit 34 has a common key inside, and generates an encryption key having a key length of 480 bits in parallel from a part of the IV in the cipher text and the common key.
- the encryption key is supplied to the stream encryption core 33.
- the stream cryptographic core 3 3 generates a stream key of 4 ⁇ bits, and the exclusive OR of the ciphertext parallelized every 40 bits and the stream key is expressed by an EX-OR gate 3.
- the result is calculated by 2 and the plain text is obtained at the output of the EX-OR gate 3 2.
- the encryption key generation unit 34 extracts and holds the IV for decryption in the next step from the received ciphertext.
- a synchronization signal (Sync) is supplied to the stream encryption core 33 and the encryption key generation unit 34, and the key is updated at each time specified by the synchronization signal.
- FIG. 6 shows a configuration of an example of the encryption key generation unit 4.
- the encryption key generation unit 34 has the same configuration as that of FIG.
- Reference numeral 41 indicates an IV read control unit.
- a clock, encrypted data, and a synchronization signal (Sync) are supplied to the read control unit 41.
- Sync synchronization signal
- 40 bits of encrypted data are read in synchronization with the clock, and a predetermined portion of the encrypted data to be used as an IV is extracted.
- the extracted 480-bit IV 42 and the 480 bit The secret key 44 of the packet is supplied to the EX-OR gate 43, and the 480-bit encryption key is output from the EX-OR gate 43.
- the IV is extracted from the ciphertext transmitted or received one step before.
- the present invention has an advantage that there is no time overhead because an IV can be extracted while transmitting or receiving a ciphertext. Therefore, there is an advantage that there is almost no need to make changes to the existing real-time communication means and that the real-time performance is not impaired.
- the present invention is not limited to the above-described embodiment, and various modifications and applications are possible without departing from the gist of the present invention.
- the key length of the above-described encryption key is an example, and an encryption key having an arbitrary key length can be used.
- the segment of the ciphertext from which the IV is extracted is not limited to one frame of the video signal, and may be any length such as one field.
- the present invention can be applied to encryption of information data such as music data other than video data.
- the cryptographic keys generated by the cryptographic key generators 24 and 34 are used as EX-0 R gates 22 and 3 2 May be supplied respectively.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2003/003596 WO2004086672A1 (ja) | 2003-03-25 | 2003-03-25 | 暗号化および復号のための装置、方法、プログラム並びに記録媒体 |
US10/545,739 US20060233361A1 (en) | 2003-03-25 | 2003-03-25 | Device, method, and program for encrypton and decryption and recording medium |
JP2004569926A JPWO2004086672A1 (ja) | 2003-03-25 | 2003-03-25 | 暗号化および復号のための装置、方法、プログラム並びに記録媒体 |
KR1020057017320A KR100991222B1 (ko) | 2003-03-25 | 2003-03-25 | 암호화 및 복호를 위한 장치, 방법 및 기록 매체 |
CNA038261995A CN1759562A (zh) | 2003-03-25 | 2003-03-25 | 用于加密和解密的装置、方法、程序及记录介质 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2003/003596 WO2004086672A1 (ja) | 2003-03-25 | 2003-03-25 | 暗号化および復号のための装置、方法、プログラム並びに記録媒体 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2004086672A1 true WO2004086672A1 (ja) | 2004-10-07 |
Family
ID=33045129
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2003/003596 WO2004086672A1 (ja) | 2003-03-25 | 2003-03-25 | 暗号化および復号のための装置、方法、プログラム並びに記録媒体 |
Country Status (5)
Country | Link |
---|---|
US (1) | US20060233361A1 (ja) |
JP (1) | JPWO2004086672A1 (ja) |
KR (1) | KR100991222B1 (ja) |
CN (1) | CN1759562A (ja) |
WO (1) | WO2004086672A1 (ja) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2009534936A (ja) * | 2006-04-18 | 2009-09-24 | インターデイジタル テクノロジー コーポレーション | 無線通信を保護するための方法およびシステム |
US7801297B2 (en) * | 2003-11-20 | 2010-09-21 | Ntt Docomo, Inc. | Communication device and communication control method |
US20100296653A1 (en) * | 2006-09-14 | 2010-11-25 | Richardson Ric B | System of dependant keys across multiple pieces of related scrambled information |
JP2019075733A (ja) * | 2017-10-18 | 2019-05-16 | Necプラットフォームズ株式会社 | 通信システム、通信装置、及びその方法 |
US10455111B2 (en) | 2016-03-31 | 2019-10-22 | Megachips Corporation | Encryption device, computer-readable recording medium, and encryption method |
CN113489589A (zh) * | 2021-09-06 | 2021-10-08 | 蜂巢能源科技有限公司 | 数据加密、解密方法、装置及电子设备 |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7055039B2 (en) * | 2003-04-14 | 2006-05-30 | Sony Corporation | Protection of digital content using block cipher crytography |
KR20060107282A (ko) * | 2005-04-07 | 2006-10-13 | 엘지전자 주식회사 | 데이터 재생방법, 데이터 기록재생 플레이어 및 데이터전송방법 |
US8090098B2 (en) | 2006-11-13 | 2012-01-03 | Electronics And Telecommunications Research Institute | Method of generating message authentication code using stream cipher and authentication/encryption and authentication/decryption methods using stream cipher |
KR100848642B1 (ko) * | 2007-02-22 | 2008-07-28 | 고려대학교 산학협력단 | 영상 프레임을 암호화하는 방법과 복원하는 방법 |
CN101632084B (zh) * | 2007-03-13 | 2012-05-02 | Nxp股份有限公司 | 对至少二维的数据集的加密和解密 |
EP2232764A1 (en) * | 2007-12-05 | 2010-09-29 | Uniloc Usa, Inc. | System and method for device bound public key infrastructure |
US10148433B1 (en) * | 2009-10-14 | 2018-12-04 | Digitalpersona, Inc. | Private key/public key resource protection scheme |
KR102023526B1 (ko) * | 2012-10-29 | 2019-09-20 | 아이디 퀀티크 에스.에이. | 양자 키 분배 시스템에서 생성된 비밀키의 안전성을 높이는 방법 |
CN103879157B (zh) * | 2014-01-20 | 2016-10-05 | 珠海艾派克微电子有限公司 | 成像盒存储芯片的参数发送方法、存储芯片及成像盒 |
US10382208B2 (en) * | 2016-04-29 | 2019-08-13 | Olympus Sky Technologies, S.A. | Secure communications using organically derived synchronized processes |
CN107634827A (zh) * | 2017-10-15 | 2018-01-26 | 天津飞眼无人机科技有限公司 | 无人机保密通信系统 |
CN108616351B (zh) * | 2018-03-26 | 2020-09-18 | 山东大学 | 一种全动态加密解密方法及加密解密装置 |
CN113794551A (zh) * | 2021-09-13 | 2021-12-14 | 北京江南天安科技有限公司 | 一种长报文数据的等长分组加密方法及密文解密方法 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH09162859A (ja) * | 1995-12-07 | 1997-06-20 | Fujitsu Ltd | スクランブル方法及び装置、デスクランブル方法及び装置、並びに、データ伝達方法及びシステム |
JP2000224158A (ja) * | 1999-02-01 | 2000-08-11 | Toyo Commun Equip Co Ltd | 暗号通信システム |
JP2002247542A (ja) * | 2001-02-14 | 2002-08-30 | Matsushita Electric Ind Co Ltd | 映像秘匿装置 |
JP2003508975A (ja) * | 1999-08-29 | 2003-03-04 | インテル・コーポレーション | デジタル・ビデオ・コンテンツ伝送の暗号化および解読の方法および装置 |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS61141231A (ja) * | 1984-12-13 | 1986-06-28 | Sony Corp | 送信方式 |
US4856063A (en) * | 1988-01-27 | 1989-08-08 | Technical Communication Corporation | No-overhead synchronization for cryptographic systems |
US20010031050A1 (en) * | 2000-02-14 | 2001-10-18 | Lateca Computer Inc. N.V. | Key generator |
US20020044651A1 (en) * | 2000-05-16 | 2002-04-18 | Tuvell Walter E. | Method and apparatus for improving the security of cryptographic ciphers |
FI20002608A (fi) * | 2000-11-28 | 2002-05-29 | Nokia Corp | Päästä-päähän -tahdistksen ylläpitäminen tietoliikeneyhteydellä |
CN1524362A (zh) * | 2001-07-06 | 2004-08-25 | �ʼҷ����ֵ�������˾ | 加密帧的下一个包中的流加密信息冗余 |
-
2003
- 2003-03-25 US US10/545,739 patent/US20060233361A1/en not_active Abandoned
- 2003-03-25 WO PCT/JP2003/003596 patent/WO2004086672A1/ja active Application Filing
- 2003-03-25 KR KR1020057017320A patent/KR100991222B1/ko not_active IP Right Cessation
- 2003-03-25 JP JP2004569926A patent/JPWO2004086672A1/ja active Pending
- 2003-03-25 CN CNA038261995A patent/CN1759562A/zh active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH09162859A (ja) * | 1995-12-07 | 1997-06-20 | Fujitsu Ltd | スクランブル方法及び装置、デスクランブル方法及び装置、並びに、データ伝達方法及びシステム |
JP2000224158A (ja) * | 1999-02-01 | 2000-08-11 | Toyo Commun Equip Co Ltd | 暗号通信システム |
JP2003508975A (ja) * | 1999-08-29 | 2003-03-04 | インテル・コーポレーション | デジタル・ビデオ・コンテンツ伝送の暗号化および解読の方法および装置 |
JP2002247542A (ja) * | 2001-02-14 | 2002-08-30 | Matsushita Electric Ind Co Ltd | 映像秘匿装置 |
Non-Patent Citations (1)
Title |
---|
Gendai Ango, Sangyo Tosho Kabushiki Kaisha, 30 June 1997, pages 73-75 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7801297B2 (en) * | 2003-11-20 | 2010-09-21 | Ntt Docomo, Inc. | Communication device and communication control method |
JP2009534936A (ja) * | 2006-04-18 | 2009-09-24 | インターデイジタル テクノロジー コーポレーション | 無線通信を保護するための方法およびシステム |
US20100296653A1 (en) * | 2006-09-14 | 2010-11-25 | Richardson Ric B | System of dependant keys across multiple pieces of related scrambled information |
US8284929B2 (en) | 2006-09-14 | 2012-10-09 | Uniloc Luxembourg S.A. | System of dependant keys across multiple pieces of related scrambled information |
US10455111B2 (en) | 2016-03-31 | 2019-10-22 | Megachips Corporation | Encryption device, computer-readable recording medium, and encryption method |
JP2019075733A (ja) * | 2017-10-18 | 2019-05-16 | Necプラットフォームズ株式会社 | 通信システム、通信装置、及びその方法 |
CN113489589A (zh) * | 2021-09-06 | 2021-10-08 | 蜂巢能源科技有限公司 | 数据加密、解密方法、装置及电子设备 |
Also Published As
Publication number | Publication date |
---|---|
US20060233361A1 (en) | 2006-10-19 |
KR100991222B1 (ko) | 2010-11-01 |
JPWO2004086672A1 (ja) | 2006-06-29 |
CN1759562A (zh) | 2006-04-12 |
KR20060003330A (ko) | 2006-01-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP3901909B2 (ja) | 暗号化装置およびプログラムを記録した記録媒体 | |
KR100991222B1 (ko) | 암호화 및 복호를 위한 장치, 방법 및 기록 매체 | |
US7200232B2 (en) | Method and apparatus for symmetric-key decryption | |
US8687800B2 (en) | Encryption method for message authentication | |
US6504930B2 (en) | Encryption and decryption method and apparatus using a work key which is generated by executing a decryption algorithm | |
JP7353375B2 (ja) | エポック鍵交換を用いたエンドツーエンドの二重ラチェット暗号化 | |
WO1990009009A1 (en) | Data carrier and data communication apparatus using the same | |
JPH1075240A (ja) | データ送信を保護する方法およびデータを暗号化または解読化する装置 | |
JP2010140026A (ja) | 連鎖暗号モードのための方法および装置 | |
JPH05500298A (ja) | 暗号化装置 | |
JP2011512562A (ja) | アクセス及び通信に関するデータのランダム暗号化及び復号化方法 | |
Reyad et al. | Key-based enhancement of data encryption standard for text security | |
JPH1022994A (ja) | 暗号化装置および復号化装置、暗号化方法および復号化方法、ならびにそれらを用いた通信システム | |
Asaad et al. | Partial image encryption using RC4 stream cipher approach and embedded in an image | |
CN107534558A (zh) | 用于保护经由数据总线传输的数据的信息安全的方法以及数据总线系统 | |
CN107896149A (zh) | 基于三个群运算的128位对称加密方法 | |
Kumar et al. | Expansion of Round Key generations in Advanced Encryption Standard for secure communication | |
US7436966B2 (en) | Secure approach to send data from one system to another | |
JP2007500481A (ja) | Desアルゴリズムに基づく暗号化方法。 | |
EP3996321A1 (en) | Method for processing encrypted data | |
JP2000224158A (ja) | 暗号通信システム | |
JPH1117673A (ja) | 共通鍵暗号通信方法及びその通信ネットワーク | |
JPH06209313A (ja) | 機密保持装置およびその方法 | |
JP3202544B2 (ja) | 暗号通信装置及び暗号化装置 | |
JP2001016197A (ja) | 自己同期型ストリーム暗号システム及びこれを用いたmac生成方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): CN JP KR US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2004569926 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020057017320 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 20038261995 Country of ref document: CN |
|
WWP | Wipo information: published in national office |
Ref document number: 1020057017320 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2006233361 Country of ref document: US Ref document number: 10545739 Country of ref document: US |
|
WWP | Wipo information: published in national office |
Ref document number: 10545739 Country of ref document: US |