WO2007125877A1 - 通信装置、及び通信システム - Google Patents
通信装置、及び通信システム Download PDFInfo
- Publication number
- WO2007125877A1 WO2007125877A1 PCT/JP2007/058768 JP2007058768W WO2007125877A1 WO 2007125877 A1 WO2007125877 A1 WO 2007125877A1 JP 2007058768 W JP2007058768 W JP 2007058768W WO 2007125877 A1 WO2007125877 A1 WO 2007125877A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- key
- data
- communication
- shared
- shared key
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3273—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
Definitions
- the present invention relates to encryption technology as information security technology, and in particular to technology for performing secret communication with a legitimate communication partner using a shared key.
- authentication key sharing is performed between devices for copyright protection of content, and for mobile phones, in order to prevent leakage of communication contents, authentication key sharing is performed between the mobile phone and the device that is the other party. After that, encrypted communication may be performed using the shared key.
- authentication key sharing refers to mutual authentication between devices, etc. to confirm whether the device at the other end of communication is a device that has been correctly created, and at the same time sharing the key (hereinafter, the key to be shared) Is called a shared key;).
- DTCP Digital
- IEEE 1394 IEEE 1394
- Non-Patent Document 1 There is an authentication key sharing method defined in a copyright protection standard called Transmission Content Protection (see Non-Patent Document 1). This method uses challenge 'response authentication with an elliptic DSA signature as an authentication method, and uses elliptic DH key sharing as a key sharing method. For details on challenge 'response authentication, elliptic DSA signatures and elliptic DH key sharing, see Non-Patent Document 2.
- proof of security means that the security of cryptographic methods can be proved mathematically, rather than empirically.
- problems that are considered mathematically difficult to solve for example, prime factorization problems and elliptic discrete logarithm problems
- this proof can be made, decryption of the ciphertext is more difficult than the problem considered to be difficult to solve. It is clear that Therefore, if such a proof can be obtained, there is a security proof for public key cryptography.
- KEM key encryption mechanisms
- Patent Document 1 International Publication No. WO05Z039100
- Non Patent Literature 1 White paper of DTCP Specification ⁇ URL: http: // www. Dtcp. Com / ata / spec, htm
- Non-Patent Document 2 Okamoto Ryumei, Yamamoto Hiroshi, “Contemporary Cryptography”, Industrial Books (1997)
- the authentication key sharing method using KEM has not proved the security against the security against the leak of the shared key and the security against the impersonation attack.
- an attacker spoofs the user (device) of the other party of communication, leaks information of a valid user (device) with an appropriate user (device), or causes the other person to communicate. It is an attack that tries to block it.
- the transmission source device for transmitting data may transmit data to an unauthorized device spoofing that it is a legitimate device. It will remain.
- an object of the present invention is to provide a communication apparatus and a communication system which can prove security against a spoof attack.
- the present invention is a communication apparatus for performing secret communication of data to be communicated using a key shared with an external apparatus of a communication counterpart, and is known without being known to a third party.
- Key generating means for generating a shared key to be shared using an encryption system that has been certified for security with the external device, and a key dependent function shared between the external device and the shared key and dependent on the shared key Means for judging whether the external device is valid or not by performing authentication using the authentication information, and when the external device is judged to be valid by the judgment means, the secret of the data to be communicated is determined.
- Data generation means for generating verification data using the communication target data and performing the same function as the key dependent function dependent on the shared key to verify the legitimacy of the communication target data at the time of communication; It is characterized by having.
- the communication device performs authentication using the shared key and the key dependent function, and further generates verification data using the same shared key and the key dependent function. Can prevent spoofing attacks. The reasons are shown below.
- the communication device If the communication device is subjected to a spoofing attack at the time of authentication, it can be determined by the authentication that the communication device is an unauthorized external device. Therefore, preventing transmission of data to be communicated subsequently prevents the spoofing attack. it can.
- the communication apparatus receives data to be communicated from an unauthorized device by a spoofing attack after authentication
- the communication device receives data to be communicated from an unauthorized device, but the communication partner is unauthorized. If it is known that the device is the device, the received communication object data may be discarded. In this case, verification data is also sent from an unauthorized device to verify the legitimacy of the data to be communicated. In the meanwhile, an unauthorized device can transmit valid verification data because it has a shared key and a key dependency function depending on it. I can't.
- the communication device Even if the communication device receives invalid device power or verification data, the received verification data is not generated by the key dependent function dependent on the shared key of the communication device, so the verification data generated by the communication device itself is It will be different, and it can be judged that the communication target data is illegal, that is, the device which has transmitted the communication target data is illegal. In this way, the communication device can prevent a spoofing attack by discarding the received communication target data when it is determined that the device transmitting the communication target data is incorrect.
- the communication device is secure against leakage because it generates a shared key to be shared according to a security certificate.
- the communication apparatus performs authentication and secret communication of the external apparatus by using the shared key that is safe against leakage, so security against these processes is also guaranteed.
- the communication apparatus In order for the communication apparatus to confirm that the external apparatus is valid, correct data for verification needs to be generated by the external apparatus. For this purpose, the communication apparatus and the external apparatus Need to share the same shared key. However, since the shared key is generated using a security proofed encryption method, it is leaked, that is, the probability that an unauthorized device can acquire the shared key is so small that it can be ignored. It can be proved mathematically that it becomes. Therefore, it is also possible to mathematically prove that an unauthorized device can not generate correct verification data. Therefore, the communication device can prove its security against spoofing attacks.
- the key generation unit generates the first key data, secretly transmits the first key data to the external device, and a second key generated by the external device.
- the first key data and the second key data are shared with the external device, and the shared first key data and the second key data are used.
- the shared key may be generated.
- the communication device generates the shared key using the first key data and the second key data shared secretly, so that the shared key can not be leaked to the outside. .
- the authentication is challenge response authentication
- the determination unit is the external Device power Assuming that the first key data is challenge data, the response data generated by applying the function to the challenge data and the shared key is received, and the challenge response authentication is performed.
- the communication device since the communication device does not need to transmit the challenge data again at the time of the challenge response authentication, the communication amount can be reduced.
- the key generation means calculates shared key data by an exclusive OR operation of the first key data and the second key data, and generates the calculated shared key data force as the shared key.
- the communication device calculates shared key data by performing an exclusive OR operation on the first key data and the second key data, so that the shared key data strength is also calculated using the first key data and the second key data. 2 Key It can be difficult to derive data.
- the key generation unit may use a part of the shared key data as the shared key.
- the communication device can generate the shared key by making it a part of the shared key data.
- the key generation unit uses the shared key data itself as the shared key.
- the communication device makes the shared key the same as the shared key data, and therefore does not need to generate the shared key again. Therefore, the amount of processing in the communication apparatus can be reduced.
- the key generation unit performs the key dependent function on the first key data and the second key data to generate shared key data, and generates the shared key from the generated shared key data. Let's go ahead.
- the communication device performs a function on the first key data and the second key data to convert it into the shared key data, thereby preventing the leakage of the first key data and the second key data.
- the key dependent function may be a one-way function dependent on the shared key.
- the communication device generates shared key data using a one-way function. As a result, since it is difficult to generate the generated shared key data strength first key data and second key data, security against leakage of the first key data and second key data can be enhanced.
- the shared key is a shared key for verification used in the authentication by the determination unit and the generation of the verification data
- the key generation unit further determines from the shared key data the external device and the external device. , And generates a shared key for encryption to be used for encryption and decryption of data to be communicated, and the communication apparatus further encrypts the data to be communicated using the shared key for encryption to encrypt the data to be encrypted. It is also possible to provide transmitting means for generating the encrypted data and transmitting the generated encrypted data to the external device together with the verification data.
- the communication device encrypts the communication target data using the encryption shared key to be shared with the external device to generate encrypted data, and the generated encrypted data is externally transmitted. As it is sent to the device, there is no leakage of communication target data.
- the shared key is a shared key for verification
- the key generation unit further generates a shared key for encryption to be shared with the external device from the shared key data
- the communication device further comprises: receiving means for receiving encrypted data obtained by encrypting communication target data from the external device with the encryption shared key, the data generating means receiving the encrypted data received by the receiving means. May be decoded to obtain decoded data, and the acquired decoded data may be used as communication target data to generate the verification data.
- the communication device generates decrypted data verification data that is decrypted using the encryption shared key to be shared with the external device. As long as you do not share the key and the valid verification shared key, you can not obtain valid decrypted data and valid verification data. In other words, only valid communication devices can obtain decoded data and verification data.
- the key generation unit may generate the shared key by using a key encapsulation mechanism as the key distribution.
- the communication device generates a shared key with the external device using a key encapsulation mechanism, so that the shared key is not leaked. Also, by using the key encapsulation mechanism, since it is secure against key leakage, security against spoofing attacks is proved at the time of authentication.
- FIG. 1 is a diagram showing an outline of a cryptographic communication system 1.
- FIG. 2 is a block diagram showing the configuration of an encrypted communication device A10.
- FIG. 3 is a block diagram showing the configuration of an encrypted communication device B20.
- FIG. 4 is a flowchart showing the operation of the cryptographic communication system 1. Continue to Figure 5.
- FIG. 5 is a flowchart showing the operation of the cryptographic communication system 1. Continue from Figure 4 and continue to Figure 6.
- FIG. 6 is a flowchart showing the operation of the cryptographic communication system 1. Continue from Figure 5 and continue to Figure 7.
- FIG. 7 is a flow chart showing the operation of the cryptographic communication system 1. Continue from Figure 6.
- a cryptographic communication system 1 according to a first embodiment of the present invention will be described. As shown in FIG. 1, the cryptographic communication system 1 is composed of a cryptographic communication device A10 and a cryptographic communication device B20, and the cryptographic communication device A10 and the cryptographic communication device B20 communicate via the communication path 30.
- the encrypted communication device A 10 and the encrypted communication device B 20 perform encrypted communication using the shared key with the other party of communication, while preventing the key leakage and the spoofing attack.
- the encryption communication in the encryption communication device A10 and the encryption communication device B20 is roughly divided into three phase operations.
- the first phase is a phase in which the cryptographic communication device A10 and the cryptographic communication device B20 perform mutual authentication and key distribution using KEM, and the devices share the key.
- each of the encrypted communication device A10 and the encrypted communication device B20 performs a spoofing attack against each other by performing challenge 'response authentication using the shared key. It is a phase to go and check that.
- the third phase is a phase in which encrypted data is transmitted and received between the encrypted communication device A 10 and the encrypted communication device B 20 through the communication path 30 using the shared key.
- the data is, for example, text data, music data, image data, and movie content data.
- KEM Key Encapsulation Mechanisms
- the key encapsulation mechanism is an algorithm for distributing a shared key between a transmitter and a receiver using public key cryptography, briefly described.
- the sender uses public key cryptography Encryption algorithm E Input the receiver's public key pk to generate a ciphertext C and a shared key K, and transmit the ciphertext C to the receiver.
- the receiver inputs the secret key sk and the ciphertext C to the public key decryption algorithm D, and obtains the same shared key ⁇ as the transmitter.
- the ciphertext C is also referred to as “KEM ciphertext of key data K” or the like.
- the purpose of the key encapsulation mechanism is to share communication key data communicated from the transmitting device to the receiving device by sharing the shared key K between the transmitting device and the receiving device by the key encapsulation mechanism.
- Using the common key encryption while information is being transmitted unilaterally from the sender having the transmitting device to the receiver having the receiving device, the sender can not intentionally create the shared key, and the fraud by the sender is suppressed. This is a feature of the conventional key distribution system.
- PSEC-KEM As such a key encapsulation mechanism, an algorithm called PSEC-KEM is disclosed.
- PSEC-KEM has the following system parameters:
- Non-Patent Document 2 The details of the elliptic curve, the order number and the hash function are described in Non-Patent Document 2, so the description is omitted here.
- noise functions G and H are shared by both the transmitting side and the receiving side.
- Zn is a set of ⁇ 0, 1,..., N ⁇ 1 ⁇
- x * P is an elliptic curve obtained by adding a point P on the elliptic curve E X times. Represents a point. Note that on the elliptic curve The point addition method is described in Non-Patent Document 2.
- the public key encryption algorithm KemE described below inputs the public key pk and outputs the shared key K and the ciphertext C.
- the sending device sends the ciphertext C to the communication partner (the receiving device).
- the transmitting device When this PSEC-KEM algorithm is applied to an encryption system that performs encrypted communication between the transmitting device and the receiving device, the transmitting device first acquires the public key pk of the communication destination receiving device, and the acquired public key Input pk to the aforementioned public key encryption algorithm KemE and share The key K and the ciphertext C are derived, and the ciphertext C is sent to the receiver. Then, the receiving device receives the ciphertext C from the transmitting device, inputs the received ciphertext and the secret key sk possessed by the receiving device into the public key decryption algorithm KemD described above, Derivate the key K
- the PSEC-KEM algorithm assumes that the input of the hash function H is (a * P
- V xor H (a * P I
- the PSEC-KEM algorithm finally derives the shared key K using the Diffie-Hellman problem, which is difficult to calculate a * W from a * P without using a secret key. Therefore, if you do not know the secret key, you can not derive the shared key K, and so on.
- the transmitting device and the receiving device can share the shared key K in secret, and thereafter, using the secret key encryption, the communication content data communicated from the transmitting device to the receiving device Can be encrypted by common key encryption using the shared key K.
- PSEC-KEM The PSEC-KEM algorithm described above proves that a receiver not knowing the secret key can not obtain the shared key K if the Diffie-Hellman problem on the elliptic curve described above is difficult. ing. Such proofs are called "security proofs" because they prove the security of the method.
- Other KEM algorithms of PSEC-KEM such as RSA-KEM and N TRU-KEM (refer to Japanese Patent Application Laid-Open Nos. 2004-201292 and 2004-201293) are also based on the same difficult mathematical problems as safety. It is sex proof.
- NTRU-KEM The details of NTRU-KEM are described in JP-A-2004-201292 and JP-A-2004-201293, so the description will be omitted.
- KEM ciphertext may be sent from both of the two encrypted communication devices using the KEM described above.
- a shared key (called KA) shared by sending a KEM ciphertext from one encrypted communication device A to another encrypted communication device B, and the encrypted communication device B to the encrypted communication device A perform the KEM encryption.
- key sharing is performed in a configuration in which such a dual power KEM encryption unit is sent.
- the following describes the cryptographic communication devices A10 and B20 that attack the cryptographic communication system 1, and the operation of these devices.
- the encryption communication device A10 includes an input / output unit 101, a transmission / reception unit 102, and a public key.
- the public key storage unit 103 stores the public key KPB of the encryption communication device B20.
- the public key KPB is given in advance in association with the cryptographic communication device B20 together with the secret key KSB. Also, in the encryption communication device A10, the public key KPB is given in advance from the outside and stored, or transmitted from the encryption communication device B20, received in advance via the communication path 30, and stored.
- the secret key storage unit 104 stores the secret key KSA of the encryption communication device A 10 and stores it.
- the secret key KSA is given in advance in association with the encryption communication device A10 together with the public key KPA.
- the KEM ciphertext generation unit 105 generates the KEM ciphertext KEMA for the key data KA and the key data KA using the public key KPB and the public key encryption algorithm KemE of the key encapsulation mechanism (KEM).
- KEM key encapsulation mechanism
- the KEM ciphertext generation unit 105 transmits the generated KEM ciphertext KEMA to the encryption communication device B 20 via the transmission / reception unit 102.
- the KEM ciphertext generation unit 105 outputs the generated key data KA to the shared key generation unit 107.
- the KEM ciphertext decryption unit 106 receives the KE from the encryption communication device B 20 via the transmission / reception unit 102.
- Public key encryption algorithm in M Receive KEM encrypted text KEMB, which is encrypted text in which key data KB is encrypted by KemE.
- the KEM ciphertext decryption unit 106 receives the secret key KSA and the KEM ciphertext KEMB as input values to the public key decryption algorithm KemD corresponding to the public key encryption algorithm KemE, and receives the received KEM cipher By decrypting the statement KEMB, key data KB is generated.
- the method of decrypting the key data KB is the same as the method of decrypting PSEC-KEM described above, so the description will be omitted.
- the KEM ciphertext decryption unit 106 outputs the generated key data KB to the shared key generation unit 107.
- the shared key generation unit 107 receives the key data KA from the KEM ciphertext generation unit 105 and receives the key data KB from the KEM ciphertext decryption unit 106.
- the shared key generation unit 107 generates the shared key KS for common key encryption and the shared key KH for MAC using the received key data KA and KB, and the generated shared key KS for shared key encryption and MAC
- the shared key KH is stored in the shared key storage unit 108.
- the shared key generation unit 107 generates the shared key data K by taking an exclusive OR (xor) of the key data KA and KB.
- I I indicates consolidation.
- the dividing position for acquiring the shared key KS for common key encryption and the shared key KH for MAC from the shared data K may be any position as long as it is the same as the side of the encryption communication device B20.
- the method of generating shared key data K may be any method as long as information on both key data KA and KB is included.
- a hash function value of key data KA and KB bits or data K connected nt may be used as shared key data K.
- the shared key storage unit 108 has an area for storing the shared key KS for common key encryption generated by the shared key generation unit 107 and the shared key KH for MAC.
- the challenge data generation unit 109 generates challenge data nA which is a random number, and transmits the generated challenge data nA to the encryption communication device B 20 via the transmission / reception unit 102.
- the challenge data generation unit 109 temporarily stores the generated challenge data nA.
- the response data generation unit 110 receives the challenge data nB and the response data rB for the challenge data nA transmitted by the challenge data generation unit 109 from the encrypted communication device B20 via the transmission / reception unit 102, or receives only the challenge data nB.
- the response data generation unit 110 When the response data generation unit 110 receives the challenge data nB and the response data rB from the encrypted communication device B 20, the response data generation unit 110 temporarily stores the received challenge data nB. The response data generation unit 110 receives the response data rB and the response data And a verification instruction for instructing verification of the response data to the response data verification unit 111.
- the response data generation unit 110 When the response data generation unit 110 receives a response data generation instruction to instruct generation of response data from the response data verification unit 111, the response data generation unit 110 instructs generation of a tampering detection code (MAC). And the temporarily stored challenge data nB are output to the MAC generation unit 112.
- MAC tampering detection code
- the response data generation unit 110 When receiving the MAC value HnB from the MAC generation unit 112, the response data generation unit 110 transmits the received MAC value HnB as response data rA to the encryption communication device B20 via the transmission / reception unit 102.
- the MAC value HnB will be described later in the description of the MAC generation unit 112. (When only challenge data nB is received)
- the response data generation unit 110 When receiving the challenge data nB from the encrypted communication device B 20, the response data generation unit 110 outputs a MAC generation instruction and the received challenge data nB to the MAC generation unit 112.
- the response data generation unit 110 uses the received MAC value HnB as the response data rA together with the challenge data nA generated by the challenge data generation unit 109. Transmit to the encrypted communication device B 20 via 102.
- the response data verification unit 111 When the response data verification unit 111 receives the verification instruction and the response data rB from the response data generation unit 110, the response data verification unit 111 acquires challenge data nA that is temporarily stored in the challenge data generation unit 109.
- the response data verification unit 111 outputs the MAC generation instruction and the acquired challenge data nA to the MAC generation unit 112.
- the response data verification unit 111 determines whether the MAC value HnA matches the response data rB.
- the response data generation unit 110 If it is determined that they match, the response data generation unit 110 outputs a response data generation instruction to the response data generation unit 110.
- the response data generation unit 110 cancels the entire process relating to the encrypted communication.
- the response data verification unit 111 When the response data verification unit 111 receives the response data rB from the encrypted communication device B 20 via the transmission / reception unit 102, the response data verification unit 111 acquires the challenge data nA temporarily stored in the challenge data generation unit 109, and Perform the same operation to verify the response data rB.
- the MAC generation unit 112 stores a keyed hash function Hash in advance.
- a keyed hash function is a one-way function that has keys and data as input and is dependent on keys.
- the keyed hash function Hash used in the present embodiment is a function that uses the MAC shared key KH and depends on the MAC shared key KH. The details of the keyed hash function are not The description is omitted because it is described on pages 189 to 195 of Patent Document 2.
- the MAC generation unit 112 uses the MAC shared key KH stored in the shared key storage unit 108 to tamper with the MAC target data to have a predetermined bit length t (t is 1 or more). Generate (calculate) the detection code value (MAC value).
- the MAC generation unit 112 From the DEM ciphertext generation unit 115, the MAC generation unit 112 generates a MAC generation instruction and data (hereinafter referred to as encryption target data) DA encrypted by the common key encryption and transmitted to the encryption communication device B20.
- encryption target data a MAC generation instruction and data
- the MAC shared key KH stored in the shared key storage unit 108 is acquired.
- the obtained MAC value HDA is output to the DEM ciphertext generation unit 115.
- the decrypted data DB ′ will be described later in the description of the common key decryption unit 114.
- SHAl (x) is the SHA1 hash function value of x, and
- the common key encryption unit 113 When the common key encryption unit 113 receives from the DEM ciphertext generation unit 115 the data to be encrypted DA and an encryption instruction to instruct encryption, the common key encryption unit 113 stores the common data stored in the shared key storage unit 108. Acquires the shared key KS for key encryption.
- the common key encryption unit 113 encrypts the encryption target data DA using the acquired common key encryption shared key KS and the common key encryption algorithm and encrypts the encryption target data.
- Generate coded data EDA ( Enc (KS, DA)) for DA.
- Enc (KS, DA) means a ciphertext obtained by encrypting data DA with the common key encryption using key KS.
- Common key encryption is, for example, DES encryption or AES encryption. The details of the common key encryption are described on pages 79 to 105 of Non-Patent Document 2, so the description will be omitted.
- the common key encryption unit 113 outputs the generated encrypted data Enc (KS, DA) to the DEM ciphertext generation unit 115.
- EDB Enc (KS, DB)
- the common key storage unit 108 stores the shared key KS for the common key encryption.
- the common key decryption unit 114 decrypts the encrypted data Enc (KS, DB) using the acquired shared key KS for common key encryption and the common key decryption algorithm. , Generate decrypted data DB,
- the common key decryption unit 114 outputs the generated decrypted data DB ′ to the DEM ciphertext decryption unit 116.
- the DEM ciphertext generation unit 115 When the DEM ciphertext generation unit 115 receives the encryption target data DA from the outside via the input / output unit 101, the DEM ciphertext generation unit 115 instructs the encryption and the received encryption target data DA to be a common key crypt. It outputs to the issue section 113.
- the DEM ciphertext generation unit 115 outputs the MAC instruction and the received data to be encrypted DA to the MAC generation unit 112.
- the DEM ciphertext generation unit 115 transmits the generated DEM ciphertext DEMA to the encryption communication device B 20 via the transmission / reception unit 102.
- EDB is encrypted data (Enc (KS, DB)) obtained by encrypting the data DB to be encrypted with the common key KS shared key KS possessed by the cryptographic communication device B 20, and the HDB is data to be encrypted MAC value for DB (H ash (KH, DB)).
- DEM Ciphertext Assuming that the bit length of DEMB is u, as described above, since the bit length of the MAC value HDB is t, it can be seen that u> t.
- the DEM ciphertext decryption unit 116 extracts data with a length of u-t bits as the leading power of the DEM ciphertext DEMB, sets the extracted data as the encrypted data EDB, and uses the remaining t-bit data as the MAC value HDB. Do.
- the DEM ciphertext decryption unit 116 When receiving the decrypted data DB ′ from the common key decryption unit 114, the DEM ciphertext decryption unit 116 outputs the MAC instruction and the decrypted data DB ′ to the MAC generation unit 112.
- the DEM ciphertext decryption unit 116 cancels the entire process related to cryptographic communication.
- the input / output unit 101 externally receives the encryption target data DA, and outputs the received encryption target data DA to the DEM ciphertext generation unit 115.
- the input / output unit 101 When receiving the decrypted data DB ′ from the DEM ciphertext decryption unit 116, the input / output unit 101 outputs the received decrypted data DB ′ to the outside.
- the transmission / reception unit 102 Upon receiving the KEM ciphertext KEMA from the KEM ciphertext generation unit 105, the transmission / reception unit 102 transmits the received KEM ciphertext KEMA to the encryption communication device B20 via the communication path 30.
- the transmission / reception unit 102 Upon receiving the KEM ciphertext KEM B from the cipher communication device B 20 via the communication path 30, the transmission / reception unit 102 outputs the received KEM ciphertext KEMB to the KEM ciphertext decryption unit 106.
- the transmission / reception unit 102 When receiving the challenge data nA from the challenge data generation unit 109, the transmission / reception unit 102 transmits the received challenge data nA to the encryption communication device B20 via the communication path 30.
- the transmission / reception unit 102 When receiving the response data rA from the response data generation unit 110, the transmission / reception unit 102 transmits the received response data rA to the encryption communication device B20 via the communication path 30.
- the transmission / reception unit 102 When receiving the challenge data nB and the response data rB or only the challenge data nB from the encrypted communication device B20 via the communication path 30, the transmission / reception unit 102 receives the challenge data nB and the response data rB, or The data nB is output to the response data generation unit 110.
- transmission / reception unit 102 Upon receipt of response data rB from encrypted communication device B 20 via communication path 30, transmission / reception unit 102 outputs received response data rB to response data verification unit 111. Do.
- the transmission / reception unit 102 When receiving the DEM report DEMA from the DEM report generation unit 115, the transmission / reception unit 102 transmits the received DEM ciphertext DEMA to the encryption communication device B20 via the communication path 30.
- the transmission / reception unit 102 When receiving the DEM ciphertext DEM B from the cipher communication device B 20 via the communication path 30, the transmission / reception unit 102 outputs the received DEM ciphertext DEMB to the DEM ciphertext decryption unit 116.
- the encryption communication device B20 includes an input / output unit 201, a transmission / reception unit 202, a public key storage unit 203, a secret key storage unit 204, a KEM ciphertext generation unit 205, and a KEM ciphertext decryption unit 20 6
- Shared key generation unit 207 shared key storage unit 208, challenge data generation unit 209, response data generation unit 210, response data verification unit 211, MAC generation unit 212, common key encryption unit 213, common key decryption unit 214, It comprises a DEM ciphertext generation unit 215 and a DEM ciphertext decryption unit 216.
- the public key storage unit 203 stores the public key KPA of the encryption communication device A10.
- the public key KPA is given in advance in association with the cryptographic communication device A10 together with the secret key KSA. Also, in the encryption communication device B20, the public key KPA is given in advance from the outside and stored, or transmitted from the encryption communication device A10, received in advance via the communication path 30, and stored.
- the secret key storage unit 204 stores and stores the secret key KSB of the encryption communication device B20.
- the secret key KSB is given in advance in association with the encryption communication device B20 together with the public key KPB.
- the KEM ciphertext generation unit 205 generates the KEM ciphertext KEMB for the key data KB and the key data KB using the public key KPA and the public key encryption algorithm KemE of the key encapsulation mechanism (KEM). How to generate key data KB and KEM ciphertext KEMB As the method is the same as the PSEC-KEM encryption shown above, the explanation is omitted.
- the KEM ciphertext generation unit 205 transmits the generated KEM ciphertext KEMB to the encryption communication device A 10 via the transmission / reception unit 202.
- the KEM ciphertext generation unit 205 outputs the generated key data KB to the shared key generation unit 207.
- the KEM ciphertext decryption unit 206 receives the KEM ciphertext KEMA from the encryption communication device A 10 via the transmission / reception unit 202.
- the KEM ciphertext decryption unit 206 gives the secret key KSB and the KEM ciphertext KEMA as input values to the public key decryption algorithm KemD corresponding to the public key encryption algorithm KemE, and receives the received KEM cipher
- the sentence KEMA is decrypted to generate key data KA.
- the method of decrypting the key data KA is the same as the method of decrypting the PSEC-KEM described above, so the description will be omitted.
- the KEM ciphertext decryption unit 206 outputs the generated key data KA to the shared key generation unit 207.
- the shared key generation unit 207 receives the key data KB from the KEM ciphertext generation unit 205 and receives the key data KA from the KEM ciphertext decryption unit 206.
- the shared key generation unit 207 generates the shared key KS for common key encryption and the shared key KH for MAC using the received key data KA and KB, and the generated shared key KS for shared key encryption and the MAC.
- the shared key KH is stored in the shared key storage unit 208.
- the shared key storage unit 208 has an area for storing the shared key KS for common key encryption generated by the shared key generation unit 207 and the shared key KH for MAC.
- Challenge data generation unit 209 The challenge data generation unit 209 generates challenge data nB, which is a random number, and transmits the generated challenge data nB to the encryption communication device B20 via the transmission / reception unit 202.
- the challenge data generation unit 209 temporarily stores the generated challenge data nB.
- the response data generation unit 210 receives the challenge data nA and the response data rA for the challenge data nB transmitted by the challenge data generation unit 209 from the encrypted communication device A10 via the transmission / reception unit 202, or only the challenge data nA Receive.
- the response data generation unit 210 When receiving the challenge data nA and the response data rA from the encryption communication device A 10, the response data generation unit 210 temporarily stores the received challenge data nA.
- the response data generation unit 210 outputs the response data rA and a verification instruction to instruct verification of the response data to the response data verification unit 211.
- response data generation unit 210 When receiving a response data generation instruction to instruct generation of response data from response data verification unit 211, response data generation unit 210 receives a MAC generation instruction and challenge data nA temporarily stored. Output to the MAC generation unit 212. When receiving the MAC value HnA from the MAC generation unit 212, the response data generation unit 210 transmits the received MAC value HnA as the response data rB to the encryption communication device A10 via the transmission / reception unit 202.
- the MAC value HnA will be described later in the description of the MAC generation unit 212.
- the response data generation unit 210 When receiving the challenge data nA from the encryption communication device A 10, the response data generation unit 210 outputs a MAC generation instruction and the received challenge data nA to the MAC generation unit 212.
- the response data generation unit 210 When the response data generation unit 210 receives the MAC value HnA from the MAC generation unit 112, the response data generation unit 210 takes the received MAC value HnA as the response data rB, and generates a challenge data generation unit 20. It transmits to encryption communication apparatus B20 via the transmission / reception part 202 with the challenge data nB produced
- the response data verification unit 211 When the response data verification unit 211 receives the verification instruction from the response data generation unit 210 and the response data rA, the response data verification unit 211 temporarily stores the challenge data generation unit 209 to obtain challenge data nB.
- the response data verification unit 211 outputs the MAC generation instruction and the acquired challenge data nB to the MAC generation unit 212.
- the response data verification unit 211 determines whether the MAC value HnB matches the response data rA.
- the response data generation unit 210 If it is determined that they match, the response data generation unit 210 outputs a response data generation instruction to the response data generation unit 210.
- the response data generation unit 210 cancels the entire process relating to the encrypted communication.
- the response data verification unit 211 When the response data verification unit 211 receives the response data rA from the encryption communication device A10 via the transmission / reception unit 202, the response data verification unit 211 acquires the challenge data nB temporarily stored in the challenge data generation unit 209, and Perform the same operation to verify the response data rA.
- the MAC generation unit 212 stores a keyed hash function Hash in advance.
- the MAC generation unit 112 uses the MAC shared key KH stored in the shared key storage unit 208 for the MAC target data DM to generate a MAC value HDM having a predetermined bit length t (t is 1 or more). Generate (calculate) The bit length of the MAC value generated by the MAC generation unit 212 is the same as the bit length of the MAC value generated by the MAC generation unit 112 of the cryptographic communication device A 20.
- the decryption data DA will be described later in the description of the common key decryption unit 214.
- the common key encryption unit 213 stores the data DB to be encrypted and an encryption instruction to instruct encryption from the DEM ciphertext generation unit 215 in the shared key storage unit 208. Acquire the shared key KS for common key encryption.
- the common key encryption unit 213 encrypts the encryption target data DB using the acquired common key encryption shared key KS and the common key encryption algorithm and encrypts the encryption target data DB.
- Generate coded data EDB ( Enc (KS, DB)) for DB.
- Enc (KS, DB) is This means a ciphertext obtained by encrypting the data DB with the common key encryption using the key KS.
- Common key encryption is, for example, DES encryption or AES encryption. Common key encryption is described on pages 79 to 105 of Non-Patent Document 2.
- the common key encryption unit 213 outputs the generated encrypted data Enc (KS, DB) to the DEM ciphertext generation unit 215.
- EDA Enc (KS, DA)
- the shared key storage unit 208 stores the shared key KS for common key encryption.
- the common key decryption unit 214 decrypts the encrypted data Enc (KS, DA) using the acquired shared key KS for common key encryption and the common key decryption algorithm. , Generate decryption data DA,
- the common key decryption unit 214 outputs the generated decrypted data DA to the DEM ciphertext decryption unit 216.
- the DEM ciphertext generation unit 215 When the DEM ciphertext generation unit 215 receives the encryption target data DB via the input / output unit 201 as well, the DEM ciphertext generation unit 215 transmits the encryption instruction and the received encryption target data DB to the common key encryption unit block. Output to 213.
- the DEM ciphertext generation unit 215 outputs the MAC instruction and the received encryption target data DB to the MAC generation unit 212.
- the DEM ciphertext generation unit 215 transmits the generated DEM ciphertext DEMB to the encryption communication device A 10 via the transmission / reception unit 202.
- EDA is encrypted data (Enc (KS, DA)) encrypted by the common key encryption shared key KS possessed by the encryption communication device A10, which is the encryption target data DA, and HDA is encrypted. It is the MA C value (Hash (KH, DA)) for the target data DA.
- the DEM ciphertext decryption unit 216 disassembles the DEM ciphertext DEMA by the same method as the method of decomposing the DEM ciphertext decryption unit 116 described above.
- the DEM ciphertext decryption unit 216 Upon receiving the decrypted data DA ′ from the common key decryption unit 214, the DEM ciphertext decryption unit 216 outputs the MAC instruction and the decrypted data DA ′ to the MAC generation unit 212.
- the DEM ciphertext decryption unit 216 outputs the decrypted data DA ′, that is, the encryption target data DA to the outside via the input / output unit 201.
- the DEM ciphertext decryption unit 216 cancels the entire process related to encrypted communication.
- the input / output unit 201 externally receives the encryption target data DB, and outputs the received encryption target data DB to the DEM ciphertext generation unit 215.
- the input / output unit 201 When the input / output unit 201 receives the decrypted data DA ′ from the DEM ciphertext decryption unit 216, the input / output unit 201 outputs the received decrypted data DA ′ to the outside.
- the transmission / reception unit 202 When receiving the KEM ciphertext KEMB from the KEM ciphertext generation unit 205, the transmission / reception unit 202 transmits the received KEM ciphertext KEMA to the encryption communication device A10 via the communication path 30. Ru.
- the transmission / reception unit 202 When receiving the KEM ciphertext KEM A from the encrypted communication device A 10 via the communication path 30, the transmission / reception unit 202 outputs the received KEM ciphertext KEMA to the KEM ciphertext decryption unit 206.
- the transmission / reception unit 202 When receiving the challenge data nB from the challenge data generation unit 209, the transmission / reception unit 202 transmits the received challenge data nB to the encryption communication device A10 via the communication path 30.
- the transmission / reception unit 202 When receiving the response data rB from the response data generation unit 210, the transmission / reception unit 202 transmits the received response data rB to the encryption communication device A10 via the communication path 30.
- the transmission / reception unit 202 receives the challenge data nA and the response data rA, or only the challenge data nA from the encrypted communication device A10 via the communication path 30, receives the challenge data nA and the response data rA, or The data nA is output to the response data generation unit 210.
- the transmission / reception unit 202 When receiving the response data rA from the encrypted communication device A 10 via the communication path 30, the transmission / reception unit 202 outputs the received response data rA to the response data verification unit 211.
- the transmission / reception unit 202 Upon receiving the DEM ciphertext DEMB from the DEM ciphertext generation unit 215, the transmission / reception unit 202 transmits the received DEM ciphertext DEMB to the encryption communication device A10 via the communication path 30.
- transmission / reception unit 202 Upon receipt of DEM ciphertext DEM A from cipher communication apparatus A 10 via communication path 30, transmission / reception unit 202 outputs received DEM ciphertext DEMA to DEM ciphertext decryption unit 216.
- the operation of the cryptographic communication system 1 is roughly divided into a key sharing phase in which the cryptographic communication device A10 and the cryptographic communication device B 20 share keys, a mutual authentication using a shared key, and a response authentication phase, sharing Encryption that sends and receives data using the specified key It consists of the communication phase.
- the cryptographic communication device A10 and the cryptographic communication device B20 perform mutual authentication and key delivery using KEM! Each other shares the key with each other.
- the transmission partner of each of the encrypted communication device A10 and the encrypted communication device B20 performs a spoofing attack. , To confirm.
- encrypted data is transmitted / received between the encryption communication device A 10 and the encryption communication device B 20 through the communication path 30 using the shared key.
- data are, for example, text data, music data, image data, and movie content data.
- the KEM ciphertext generation unit 105 of the encryption communication device A 10 uses the public key KPB and the KEM public key encryption algorithm KemE to perform KE on the key data KA and the key data KA.
- the KEM ciphertext generation unit 105 transmits the generated KEM ciphertext KEMA to the encryption communication device B20 (step S10).
- the KEM ciphertext decryption unit 206 of the encryption communication device B 20 receives the KEM ciphertext KEMA from the encryption communication device A 10 via the transmission / reception unit 202 (step S 15).
- the KEM ciphertext decryption unit 206 receives the received KEM ciphertext KE using the public key decryption algorithm KemD corresponding to the public key encryption algorithm KemE and the secret key KSB.
- step S20 Decrypt the MA to generate key data KA (step S20).
- the KEM ciphertext generation unit 205 of the encryption communication device B 20 uses the public key KPA and the KEM public key encryption algorithm KemE to generate KE for the key data KB and the key data KB.
- the KEM ciphertext generation unit 205 transmits the generated KEM ciphertext KEMB to the encryption communication device A10 (step S30).
- the shared key KH is stored in the shared key storage unit 208 (step S40).
- the KEM ciphertext decryption unit 106 of the encryption communication device A 10 receives the KEM ciphertext KEMB from the encryption communication device B 20 via the transmission / reception unit 102 (step S 45).
- the KEM ciphertext decryption unit 106 decrypts the received KEM ciphertext KEMB using the public key decryption algorithm KemD and the secret key KSA to generate key data KB (step S50).
- K KS II KH
- the KS and the MAC shared key KH are stored in the shared key storage unit 108 (step S60).
- the challenge data generation unit 109 of the encryption communication device A10 generates challenge data nA (step S65), and transmits the generated challenge data nA to the encryption communication device B20 (step S70).
- the response data generation unit 210 of the encryption communication device B20 receives the challenge range data nA from the encryption communication device A10 (step S75).
- the MAC generation unit 212 of the encrypted communication device B 20 uses the MAC shared key KH stored in the shared key storage unit 208 and the keyed hash function Hash stored in advance to use the challenge data nA.
- the challenge data generation unit 209 of the encryption communication device B20 generates challenge data nB (step S85).
- the challenge data generation unit 209 transmits the challenge data nB, and the response data generation unit 210 transmits the response data rB to the encryption communication device A10 (step S90).
- the response data generation unit 110 of the encryption communication device A10 receives the challenge range data nB and the response data rB from the encryption communication device B20 (step S95).
- the response data generation unit 110 outputs the response data rB and the verification instruction to the response data verification unit 111.
- the response data verification unit 111 acquires challenge data nA that is temporarily stored in the challenge data generation unit 109.
- the response data verification unit 111 outputs the MAC generation instruction and the acquired challenge data nA to the MAC generation unit 112.
- the MAC generation unit 112 calculates the MAC value HnA for the challenge data nA using the MAC shared key KH stored in the shared key storage unit 108 and the keyed hash function Hash, and calculates the calculated MAC value HnA. Output to response data verification unit 111.
- the response data verification unit 111 determines whether the MAC value HnA and the response data rB match (step S100).
- step S100 When it is determined that they do not match (“NG” in step S100), the process relating to the encrypted communication is stopped.
- the response data generation unit 110 If it is determined that they match ("OK" in step S100), the response data generation unit 110 outputs a response data generation instruction to the response data generation unit 110.
- the response data generation unit 110 When receiving the response data generation instruction from the response data verification unit 111, the response data generation unit 110 outputs the MAC generation instruction and the challenge data nB temporarily stored to the MAC generation unit 112.
- the response data generation unit 110 transmits the response data rA to the encryption communication device B 20 (step S 110).
- the response data verification unit 211 of the encryption communication device B20 receives the response data rA from the encryption communication device A10 (step S115).
- the response data verification unit 211 acquires the challenge data nB temporarily stored in the challenge data generation unit 209.
- the response data verification unit 211 outputs the MAC generation instruction and the acquired challenge data nB to the MAC generation unit 212.
- the MAC generation unit 212 receives the MAC generation instruction from the response data verification unit 211 and the challenge data n B, the MAC shared key KH stored in the shared key storage unit 208 and the hash function with key Hash
- the MAC value HnB for the challenge data nB is calculated, and the calculated MAC value HnB is output to the response data verification unit 211.
- the response data verification unit 211 determines whether the MAC value HnB matches the response data rA (step S120).
- step S120 When it is determined that they do not match (“NG” in step S120), the process related to encrypted communication is stopped.
- step S120 If it is determined that they match ("OK" in step S120), the process related to encrypted communication is continued.
- the DEM ciphertext generation unit 115 of the encryption communication device A10 receives the encryption target data DA via the input / output unit 101 (step S125).
- the common key encryption unit 113 of the encryption communication device A 10 uses the common key encryption shared key KS stored in the common key storage unit 108 and the common key encryption algorithm to generate the DEM ciphertext generation unit.
- the DEM ciphertext generation unit 115 concatenates the encrypted data E DA generated by the common key encryption unit 113 and the MAC value HDA calculated by the MAC generation unit 112 to obtain a DEM ciphertext.
- Generate DEMA ( Enc (KS, DA)
- HDA) step S 140.
- the DEM ciphertext generation unit 115 transmits the generated DEM ciphertext DEMA to the encryption communication device B 20 (step S 145).
- the DEM ciphertext decryption unit 216 of the encryption communication device B 20 receives the DEM ciphertext DEMA from the encryption communication device A 10 (step S 150).
- the DEM ciphertext decryption unit 216 separates the received DEM ciphertext DEMA into the encrypted data EDA and the MAC value HDA (step S155).
- the common key decryption unit 214 of the encryption communication device B20 uses the shared key KS for common key encryption stored in the shared key storage unit 208 and the common key decryption algorithm to obtain the DEM ciphertext decryption unit 214.
- the encrypted data EDA acquired by the D.216 is decrypted to generate a decrypted data DA (step S160).
- the MAC generation unit 212 of the encryption communication device B 20 uses the MAC shared key KH stored in the shared key storage unit 208 and the keyed hash function Hash to generate a shared key decryption unit 214.
- step S 170 If it is determined that they do not match (“NG” in step S 170), the process related to encrypted communication is stopped.
- step S170 the DEM ciphertext decryption unit 216 sends the decryption data DA ', that is, the encryption target data DA to the outside through the input / output unit 201. Output (step S175).
- the DEM ciphertext generation unit 215 of the encryption communication device B 20 receives the encryption target data DB from the outside via the input / output unit 201 (step S 180).
- the common key encryption unit 213 of the encryption communication device B20 receives the DEM ciphertext generation unit 215 using the common key encryption shared key KS stored in the common key storage unit 208 and the common key encryption algorithm.
- the DEM ciphertext generation unit 215 transmits the generated DEM ciphertext DEMB to the encryption communication device A 10 (step S 200).
- the DEM ciphertext decryption unit 116 of the encryption communication device A10 receives the DEM ciphertext DEMB from the encryption communication device B20 (step S205).
- the common key decryption unit 114 of the encryption communication device A 10 uses the shared key KS for common key encryption stored in the shared key storage unit 108 and the common key decryption algorithm to perform DEM ciphertext decryption.
- the encrypted data EDB acquired by the unit 116 is decrypted to generate decrypted data DB '(step S215).
- the MAC generation unit 112 of the encryption communication device A10 generates the common key decryption unit 114 using the MAC shared key KH stored in the shared key storage unit 108 and the keyed hash function Hash.
- the MAC value HDB '( Hash (KH, DB')) for the decoded data DB 'is calculated (step S220).
- the DEM ciphertext decryption unit 116 compares the MAC value HDB ′ calculated by the MAC generation unit 112 with the HDB, which has also been separated from the DEM ciphertext DEMB force, and determines whether or not there is a matching force (S Tep S 225).
- step S225 If it is determined that they do not match ("NG" in step S225), the process related to encrypted communication is stopped.
- the DEM ciphertext decryption unit 116 deciphers the decrypted data DB ′, that is, the encryption target data DB, Output to the outside through (step S230).
- the key sharing phase is the process from step S5 to step S60
- the challenge-response authentication phase is the process from step S65 to step S120
- the data encryption communication phase is the process from step S125 to step S230. Each corresponds.
- the key encapsulation mechanism (KEM) and the process of transmitting the DEM ciphertext are added with the process of performing the challenge 'response authentication using the MAC shared key,
- KEM key encapsulation mechanism
- the difficulty of leakage alone can guarantee the security against spoofing attacks.
- the present method since the present method also uses the key shared by the key encapsulation mechanism, it transmits encrypted data and data with a keyed hash value to the data. You can guarantee the safety of
- the encryption communication device A10! /, Correct,! /, Holds the secret key KSA! / Otherwise, the K EM ciphertext KEMB can not be decrypted to obtain the key data KB. Because of this, it is not possible to obtain the shared key KS for common key cryptography shared with the cryptographic communication device B 20 and the shared key KH for MAC. Therefore, decryption of the encrypted data EDB can not be performed in step S215. Similarly, if the cryptographic communication device B20 does not hold the correct secret key KSB, the KEM ciphertext KEMA can not be decrypted to obtain the key data KA.
- step S 160 ⁇ Can not decrypt encrypted data EDA.
- the correct secret key KSA or KSB is required.
- bi-directional authentication can be realized by sending KEM ciphertexts KEMB and KEMA from both devices.
- the challenge 'response authentication is performed using the MAC shared key KH. It is necessary to transmit the correct response data in order to be judged as the correct encrypted communication device.
- a MAC generation unit used in the DEM ciphertext generation unit is used to generate response data.
- the probability of being able to generate correct response data is extremely low, unless the MAC shared key KH is known.
- the encryption communication system 1 is configured with two encryption communication device powers, but is not limited to this.
- the encrypted communication system is configured such that encrypted communication is performed when data is transmitted / received (input / output) in a region A having tamper resistance and another region B in one computer device. You may also have two programming skills to do. These two programs are executed by the converter device, and the encryption communication of the present invention is performed between the two executed programs.
- Each of the program A and the program B includes an input / output step, a transmission / reception unit step, KEM ciphertext generation step, KEM ciphertext decryption step, shared key generation step, challenge data generation step, response data generation step, response data verification step, MAC generation step, common key encryption step, shared key decryption step, DE
- the M ciphertext generation step and the DEM ciphertext decryption step are included.
- Areas A and B are, similarly to the encrypted communication device shown above, a public key storage unit storing the public key of the communication partner, and a secret key storage unit storing the own secret key And a shared key storage unit having an area for storing the shared key KS for shared key encryption and the shared key KH for MAC.
- the contents of each storage section in area A are such that area A has tamper resistance, and therefore, they are not leaked to the outside, but the contents of each storage section in area B Also, it shall be a system that does not leak outside (eg, tamper resistance).
- each step performs the same operation as each component described in the above embodiment, the key sharing phase, the challenge 'response authentication phase, and the data encryption communication phase are realized as described above. Therefore, the description of the operation of each step is omitted.
- the present invention is not limited to the force applied to encrypted communication between two programs.
- the present invention may be applied to encrypted communication between an encrypted communication device and a program.
- the present invention may be applied to encrypted communication in the case where the encrypted communication device is a DVD device and the program is recorded on the DVD.
- the program is executed by execution means in the DVD apparatus, and the present invention is implemented between the component (for example, the same component as the encryption communication apparatus A10) included in the DVD apparatus and the executed program. Encryption communication is performed.
- each encrypted communication device transmits randomly generated challenge data to the device of the communication partner. It is not limited.
- Each encrypted communication device may use, as challenge data, key data (key data KB for encrypted communication device A10, key data KA for encrypted communication device B20 for encrypted communication device A10) obtained from the KEM ciphertext from the communication partner.
- key data key data (key data KB for encrypted communication device A10, key data KA for encrypted communication device B20 for encrypted communication device A10) obtained from the KEM ciphertext from the communication partner.
- the process of transmitting the challenge data can be reduced.
- the other party can perform the same authentication as in the challenge / response authentication phase by checking whether or not the key data generated by the other party matches the key data transmitted as the challenge data.
- the authentication of the communication partner is performed by judging whether or not there is a matching power.
- the shared key generation unit of each encryption communication device generates the shared key K, and uses a part of the generated shared key K as the shared key KS for shared key encryption, and the other parts
- the power with MAC as the shared key KH is not limited to this.
- the shared key generation unit of each encryption communication device is not limited to the power generated using the exclusive OR of the key KA and the key KB when generating the shared key K. Yes.
- the shared key generation unit may generate the shared key K using the hash function Hash used in the MAC generation unit.
- the shared key generation unit of each encryption communication apparatus may set Hash (KA, KB) as the shared key K, or may set Hash (KB, KA) as the shared key K.
- the shared key generation unit of each cryptographic communication apparatus may use SHA1 (KA II KB) as the shared key K, or SHA1 (KB). It is also possible to use II KA) as the shared key K.
- each encryption communication device stores the public key of the communication partner in advance in the public key storage unit, but is not limited to this.
- the encryption communication device may transmit the public key certificate issued by the certificate center (including the certificate center's signature on the public key and the public key itself) to the communication partner.
- the cryptographic communication device A10 receives a public key certificate for the public key KPB from the cryptographic communication device B20 which is the communication partner
- the cryptographic communication device B20 receives the public key for the public key KPA from the cryptographic communication device A10 which is the communication partner.
- the encryption communication apparatus that is the other party of communication has the public key of the certificate center, and before the key sharing phase, the public key certificate of each other is used by using the public key of the certificate center. If the certificate is verified and it is judged as the correct certificate, the public key storage unit stores the public key included in the public key certificate.
- each cryptographic communication device may receive a public key certificate from the certificate center.
- the method of calculating the keyed hash value is used when performing the challenge response authentication, but the present invention is not limited to this.
- the response data generated by encrypting the challenge data with the shared key KH for MAC may be exchanged.
- verification of the response data may be performed by decrypting the response data and comparing the result with the challenge data that the sender holds, and the challenger holds the challenge data.
- the result encrypted with the same method may be compared with the response data.
- the authentication method is not limited to the challenge response. Any authentication method may be used as long as the key data shared by KEM affects the authentication result.
- challenge-response authentication is not limited to the authentication method described in the above embodiment. It may be challenge / response certification by a method different from the method shown above.
- the encryption communication device A10 After executing step S65, the encryption communication device A10 encrypts the generated challenge data nA with the MAC shared key KH possessed by the encryption communication device A10 to generate encrypted data Enc (KH, nA).
- step S70 the encrypted communication device A10 transmits the generated encrypted data Enc (KH, n A) to the encrypted communication device B20.
- step S75 the cryptographic communication device B20 receives the encrypted data Enc (KH, nA).
- step S80 the encrypted communication device B20 decrypts the received encrypted data Enc (KH, nA) with the MAC shared key KH that it has, generates the decrypted data nA ', and generates the decrypted data nA'.
- KH, nA the received encrypted data Enc
- KH the MAC shared key
- the encrypted communication device 20 executes steps S85 and S90.
- the cryptographic communication device A10 compares the received response data with the challenge data nA stored therein to determine the legitimacy of the cryptographic communication device B20.
- the encrypted communication device B20 may generate the encrypted data Enc (KH, nB) by encrypting the generated challenge data nB with the MAC shared key KH held by the encrypted communication device B20.
- the encrypted communication device A10 decrypts the received encrypted data Enc (KH, nB) with the MAC shared key KH that it has, and generates and generates decrypted data nB '.
- One-way challenge ' may be response authentication. Even in that case, it is possible to prove the security against the spoofing attack of the certifier.
- the authentication may be performed by directly using the key data KA and the key data KB which are not necessary to create the MAC shared key KH. That is, since this is a one-way authentication, if the recipient of the KEM ciphertext has a correct U and a secret key, the key data KA or the key data KB can be acquired, so using the acquired key data If authentication is done ,.
- simple mutual authentication can also be performed by performing one-way authentication from encrypted communication device B 20 to encrypted communication device A 10. That is, since the key data can be shared, it can be confirmed that the cryptographic communication device B20 has a valid secret key KSB, so that the cryptographic communication device B20 can be confirmed to be valid. . After that, it is confirmed by challenge / response authentication whether or not the encrypted communication device A10 is a device that shares the key data KA, so that the legitimacy of the encrypted communication device A10 can be confirmed.
- one-way authentication may be performed using this, and even in the above case, one-way authentication from the encrypted communication device A10 to the encrypted communication device B20 is performed. You may go, of course.
- the encryption communication device B20 may be a memory card with an IC function.
- the configuration of the memory card with the IC function can be realized by the same components as the cryptographic communication device B 20, and thus the description thereof is omitted here.
- a memory card with an IC function is included in the concept of an encrypted communication device. That is, the present invention may be applied to encrypted communication between two memory cards with IC functions, or to encrypted communication between the encrypted communication device A10 shown above and a memory card with IC functions. Oh.
- KS is satisfied for shared key data K.
- shared key KS shared key encryption
- shared key KH shared key MAC
- each of the shared key KS for shared key encryption and the shared key KH for MAC is a value determined depending on the shared key data K, then.
- the strength of the cryptographic communication device B20 transmitting the response data rB and the challenge range data nB together to the cryptographic communication device A10 is not limited to this.
- the response data rB and the challenge data nB may be transmitted to the encryption communication device A10 at different timings.
- the cryptographic communication device A10 may receive the response data rB and the balance data nB at different timings! /.
- Each of the above devices is specifically a computer system comprising a microprocessor, a ROM, a RAM, a hard disk unit, a display unit, a keyboard, a mouse and the like.
- a computer program is stored in the RAM or the hard disk unit.
- Each device achieves its function by operating according to the microprocessor program.
- the computer program is configured by combining a plurality of instruction codes indicating instructions for the computer in order to achieve a predetermined function.
- the system LSI is a super-multifunctional LSI manufactured by integrating a plurality of components on one chip, and more specifically, is a computer system including a microprocessor, ROM, RAM and the like. is there. A computer program is stored in the RAM. Microprocessor Power The system LSI achieves its functions by operating according to the computer program.
- each part of the components constituting each of the above-described devices may be separately provided in one chip, or may be provided in one chip so as to include part or all.
- the system LSI is sometimes referred to as an IC, an LSI, a super LSI, or an ultra LSI depending on the degree of force integration.
- the method of circuit integration is not limited to LSI's, and implementation using dedicated circuitry or general purpose processors is also possible.
- FPGA field programmable gate array
- reconfigurable 'processor that can reconfigure connection and setting of circuit cells in the LSI.
- a part or all of the components constituting each of the above-described devices may be configured as a removable IC card or a single module power of each of the devices.
- the IC card or the module is a computer system including a microprocessor, a ROM, a RAM, and the like.
- the IC card or the module may include the above-described super-multifunctional LSI.
- the IC card or the module achieves its functions by the microprocessor operating according to the computer program. This IC card or this module may be tamper resistant!
- the present invention may be methods shown above. Further, the present invention may be a computer program that implements these methods by a computer, or may be a digital signal that is the computer program power.
- the present invention provides a computer readable recording medium capable of reading the computer program or the digital signal, such as a flexible disk, a hard disk, C. D-ROM, MO, DVD, DVD, DVD, RAM, BD (Blu-ray Disc), semiconductor memory, etc. may be used. Also, the digital signal may be recorded on these recording media.
- a computer readable recording medium capable of reading the computer program or the digital signal, such as a flexible disk, a hard disk, C. D-ROM, MO, DVD, DVD, DVD, RAM, BD (Blu-ray Disc), semiconductor memory, etc.
- the digital signal may be recorded on these recording media.
- the present invention transmits the computer program or the digital signal via an electric communication line, a wireless or wired communication line, a network represented by the Internet, data broadcasting, etc. It is good also as things.
- a computer system comprising a microprocessor and a memory, wherein the memory stores the computer program, and the microprocessor operates according to the computer program. It is also good.
- the present invention comprises a first encrypted communication device and a second encrypted communication device, and the key is distributed between the first encrypted communication device and the second encrypted communication device, and the shared key
- An encrypted communication system for transmitting content data from the first encrypted communication device to the second encrypted communication device using the second encrypted communication device, the first encrypted communication device receiving an input of the content data
- a first transmitting / receiving unit that transmits data to the second encrypted communication device and receives data from the second encrypted communication device; a first key and a first key encrypted;
- a first key ciphertext generation unit for generating a key ciphertext; a first key ciphertext decryption unit for decoding a second key ciphertext to generate a first decryption key;
- a first shared key generation unit that generates a first shared key based on the key and the first decryption key; and the first shared key
- the first shared key storage unit for storing, the first challenge range data generation unit for generating the first challenge data, and the first response data generation for generating the first
- a second encrypted communication device and an output unit for outputting decrypted content data, and data transmitted to the first encrypted communication device;
- a second key ciphertext generation unit for generating the second key ciphertext obtained by encrypting the second key and the second key;
- a second key ciphertext decryption unit that decrypts one key ciphertext to generate a second decryption key; and a second shared key based on the second key and the second decryption key.
- a second shared key generation unit for generating, a second shared key storage unit for storing the second shared key, a second challenge data generation unit for generating the second challenge data, and A second response data generation unit that generates the second response data for one challenge data;
- a second response data verification unit that verifies the first response data, and a data ciphertext decryption unit that decrypts the encrypted content data to generate the decrypted content data;
- the response data generation unit generates a keyed hash value using all or part of the first shared key as a key, using a keyed hash function for response data as the first response data.
- the first response data verification unit generates a keyed hash value using all or part of the first shared key as a key, using the keyed hash function for the response data, and generates the second hashed value.
- the data ciphertext generation unit used for verification of the response data, the data ciphertext generation unit, a keyed hash value using the encrypted content data as a part or part of the first shared key, a data encryption
- the second response data generation unit generates a keyed hash value with a key having all or part of the second shared key as a keyed hash function for response data.
- the second response data verification unit generates a keyed hash value using all or a part of the second shared key as the key.
- a keyed hash is generated using a keyed hash function and used for verification of the first response data, wherein the data ciphertext decryption unit uses all or part of the second shared key as a key
- a value is generated using the keyed hash function for data ciphertext.
- the keyed hash function for response data and the keyed hash function for data encrypted text may be identical.
- the first key ciphertext and the second key ciphertext may be generated using a key encapsulation mechanism.
- the first shared key generation unit is configured to perform an exclusive OR operation on the first key and the first decryption key as the first share.
- the second shared key generation unit may output an exclusive OR of the second key and the second decryption key as the second shared key.
- the first shared key generation unit is configured to connect the first key and the first decryption key in bit connection. And outputs a hash value calculated using a shared key generation hash function, which is a hash function for generating a shared key, as the first shared key, and the second shared key generation unit A hash value calculated using the shared key generation hash function may be output as the second shared key with respect to the bit concatenation of the second decryption key.
- the keyed hash function for response data and the keyed hash function for data encrypted text may be based on the shared key generation hash function. .
- the first encryption communication device does not include a first challenge data generation unit, and uses the first challenge data as the first key
- the second encrypted communication device may not include a second challenge data generation unit, and may use the second challenge data as the second key.
- the present invention includes a content transmitting device and a content receiving device, and performs key delivery between the content transmitting device and the content transmitting device, and performs encryption using the shared key.
- a content transmission device in an encrypted communication system for performing communication wherein the input unit receives an input of the content data; and a transmission / reception unit that transmits data to the content reception device and receives the content reception device power data;
- a first key ciphertext generation unit for generating a first key ciphertext obtained by encrypting a first key and the first key; and decrypting a second key ciphertext to be transmitted from the content reception apparatus.
- a first key ciphertext decryption unit that generates a first decryption key
- a shared key generation unit that generates a first shared key based on the first key and the first decryption key.
- a shared key for storing the first shared key And the paid section, the first
- a challenge data generation unit for generating the challenge data of the second response data generation unit;
- a response data generation unit for generating a first response data to the second challenge data transmitted from the content reception device power;
- a response data verification unit for verifying the response data in No.
- a keyed hash value using all or part of the key as a key is generated using a keyed hash function for response data to make the first response data, and the response data verification unit determines the first response data.
- a keyed hash value using all or a part of the shared key as a key is the keyed hash function for the response data.
- the data ciphertext generation unit generates a keyed hash value using all or a part of the first shared key as a key. It is characterized by generating using a keyed hash function.
- the first key ciphertext and the second key ciphertext may be generated using a key encapsulation mechanism.
- the keyed hash function for response data and the keyed hash function for data encrypted text may be based on the shared key generation hash function.
- the present invention includes a content transmitting device and a content receiving device, performs key delivery between the content transmitting device and the content receiving device, and uses a shared key.
- a content receiving apparatus in an encrypted communication system for performing encrypted communication, an output unit for outputting decoded content data, and data transmitted to the content transmitting apparatus for transmitting and receiving data for the content transmitting apparatus ,
- a second key ciphertext generation unit for generating a second key ciphertext obtained by encrypting the second key and the second key, and the first key ciphertext to be transmitted by the content transmission device.
- Shared key generation unit and shared key storage for storing the second shared key
- a challenge data generation unit for generating a second challenge data generates the second response data to the first challenge data transmitted the content transmission device or al
- a response data verification unit that verifies the first response data transmitted from the content transmission apparatus, and decrypts encrypted content data transmitted from the content transmission apparatus.
- a data ciphertext decryption unit for generating the content data
- the response data generation unit is configured to generate a keyed hash value using all or part of the second shared key as a response data.
- the second response data is generated using a keyed hash function
- the response data verification unit determines a keyed hash value with the second shared key partially or entirely as a key.
- the data ciphertext decryption unit is generated using a keyed hash function for response data and used for verification of the first response data. All or hash value with a key in which the part key of the shared key, characterized that you generated using a keyed hash function for data ciphertext.
- the first key ciphertext and the second key ciphertext may be generated by using a keying mechanism.
- Each device, each method, and computer program that constitute the present invention can be used in business, continuously and repeatedly in any industry where information needs to be handled safely and reliably.
- each device, each method, and each computer program that make up the present invention can be manufactured and sold on a business basis and continuously and repeatedly in the electronics manufacturing industry.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/298,579 US20090100264A1 (en) | 2006-04-28 | 2007-04-23 | Communication device and communication system |
JP2008513198A JPWO2007125877A1 (ja) | 2006-04-28 | 2007-04-23 | 通信装置、及び通信システム |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2006125925 | 2006-04-28 | ||
JP2006-125925 | 2006-04-28 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2007125877A1 true WO2007125877A1 (ja) | 2007-11-08 |
Family
ID=38655402
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2007/058768 WO2007125877A1 (ja) | 2006-04-28 | 2007-04-23 | 通信装置、及び通信システム |
Country Status (4)
Country | Link |
---|---|
US (1) | US20090100264A1 (ja) |
JP (1) | JPWO2007125877A1 (ja) |
CN (1) | CN101433014A (ja) |
WO (1) | WO2007125877A1 (ja) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015075796A1 (ja) * | 2013-11-21 | 2015-05-28 | 株式会社 東芝 | コンテンツ管理システム、ホスト装置及びコンテンツ鍵アクセス方法 |
JP2016096547A (ja) * | 2014-11-13 | 2016-05-26 | エルジー シーエヌエス カンパニー リミテッドLG CNS Co., Ltd. | 否認防止方法、このための決済管理サーバおよび使用者端末 |
Families Citing this family (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8959199B2 (en) * | 2008-03-18 | 2015-02-17 | Reduxio Systems Ltd. | Network storage system for a download intensive environment |
US20120291106A1 (en) * | 2010-01-19 | 2012-11-15 | Nec Corporation | Confidential information leakage prevention system, confidential information leakage prevention method, and confidential information leakage prevention program |
TWI420339B (zh) * | 2010-11-10 | 2013-12-21 | Ind Tech Res Inst | 軟體授權系統及方法 |
EP2813029B1 (en) * | 2012-02-09 | 2020-12-02 | Irdeto B.V. | System and method for generating and protecting cryptographic keys |
EP2712222B1 (en) * | 2012-09-25 | 2020-04-01 | Alcatel Lucent | Confidential provisioning of secret keys over the air |
US9866382B2 (en) * | 2012-12-21 | 2018-01-09 | Mobile Iron, Inc. | Secure app-to-app communication |
US9059974B2 (en) * | 2012-12-21 | 2015-06-16 | Mobile Iron, Inc. | Secure mobile app connection bus |
WO2014167389A1 (en) * | 2013-04-12 | 2014-10-16 | Nokia Siemens Networks Oy | Secure radio information transfer over mobile radio bearer |
EP2961207A1 (en) * | 2014-06-24 | 2015-12-30 | Gemalto SA | Method, server and telecommunications system for establishing, through an OTA server, a secured communication channel between an administrative agent comprised in a device and a third party server |
EP3002964A1 (en) * | 2014-10-02 | 2016-04-06 | Gemalto Sa | Method of sending a data from a secure token to a server |
ES2881632T3 (es) | 2015-02-27 | 2021-11-30 | Ericsson Telefon Ab L M | Disposiciones de seguridad en la comunicación entre un dispositivo de comunicación y un dispositivo de red |
US10690762B2 (en) * | 2015-05-29 | 2020-06-23 | Qualcomm Incorporated | Systems and methods for determining an upper bound on the distance between devices |
US10411886B1 (en) * | 2015-12-29 | 2019-09-10 | Amazon Technologies, Inc. | Authenticating secure channel establishment messages based on shared-secret |
US11153087B1 (en) | 2015-12-29 | 2021-10-19 | Amazon Technologies, Inc. | Hub-based token generation and endpoint selection for secure channel establishment |
JP6613909B2 (ja) * | 2016-01-15 | 2019-12-04 | 富士通株式会社 | 相互認証方法、認証装置および認証プログラム |
US10230700B2 (en) * | 2016-08-09 | 2019-03-12 | Lenovo (Singapore) Pte. Ltd. | Transaction based message security |
CN107483505B (zh) * | 2017-09-29 | 2020-10-16 | 武汉斗鱼网络科技有限公司 | 一种对视频聊天中的用户隐私进行保护的方法及系统 |
US10728240B2 (en) | 2017-10-19 | 2020-07-28 | Global Tel*Link Corporation | Variable-step authentication for communications in controlled environment |
CN107959688B (zh) * | 2017-12-14 | 2020-11-10 | 恒宝股份有限公司 | 一种终端和摄像设备相互认证的安全认证方法及其认证系统 |
JP7299708B2 (ja) * | 2019-01-15 | 2023-06-28 | グローリー株式会社 | 認証システム、管理装置及び認証方法 |
CN114902606A (zh) * | 2020-01-08 | 2022-08-12 | 索尼集团公司 | 信息处理装置、信息处理方法、程序和信息处理系统 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002152194A (ja) * | 2000-11-10 | 2002-05-24 | Toshiba Corp | 限定受信装置、限定受信装置認証方法及び暗号通信方法 |
JP2004159317A (ja) * | 2002-10-16 | 2004-06-03 | Matsushita Electric Ind Co Ltd | パスワード復元システム |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7334127B2 (en) * | 1995-04-21 | 2008-02-19 | Certicom Corp. | Key agreement and transport protocol |
EP1456732A1 (en) * | 2002-10-16 | 2004-09-15 | Matsushita Electric Industrial Co., Ltd. | Password recovery system |
US20040199786A1 (en) * | 2002-12-02 | 2004-10-07 | Walmsley Simon Robert | Randomisation of the location of secret information on each of a series of integrated circuits |
EP1475920A4 (en) * | 2002-12-03 | 2005-03-02 | Matsushita Electric Ind Co Ltd | KEY SHARING SYSTEM, SHARED KEY CREATING DEVICE, AND SHARED KEY RESTORING DEVICE |
WO2005039100A1 (en) * | 2003-10-16 | 2005-04-28 | Matsushita Electric Industrial Co., Ltd. | Encrypted communication system and communication device |
-
2007
- 2007-04-23 CN CN200780015366.4A patent/CN101433014A/zh active Pending
- 2007-04-23 WO PCT/JP2007/058768 patent/WO2007125877A1/ja active Application Filing
- 2007-04-23 US US12/298,579 patent/US20090100264A1/en not_active Abandoned
- 2007-04-23 JP JP2008513198A patent/JPWO2007125877A1/ja active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002152194A (ja) * | 2000-11-10 | 2002-05-24 | Toshiba Corp | 限定受信装置、限定受信装置認証方法及び暗号通信方法 |
JP2004159317A (ja) * | 2002-10-16 | 2004-06-03 | Matsushita Electric Ind Co Ltd | パスワード復元システム |
Non-Patent Citations (3)
Title |
---|
CHIDA E. ET AL.: "Fusei Riyo Boshi Kino o Yusuru Denshi Money Kyotaku no Koseiho", COMPUTER SECURITY SYMPOSIUM 2004 (CSS2004), vol. 2004, no. 11, 20 October 2004 (2004-10-20), pages 325 - 330, XP003018914 * |
OKAMOTO E.: "Ango Riron Nyumon", KYORITSU SHUPPAN CO., LTD., 25 February 1993 (1993-02-25), pages 133 - 135, XP003018912 * |
OKAMOTO T. AND YAMAMOTO H.: "Gendai Ango", SANGYO TOSHO KABUSHIKI KAISHA, 30 June 1997 (1997-06-30), pages 200 - 201, XP003018913 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015075796A1 (ja) * | 2013-11-21 | 2015-05-28 | 株式会社 東芝 | コンテンツ管理システム、ホスト装置及びコンテンツ鍵アクセス方法 |
US9979541B2 (en) | 2013-11-21 | 2018-05-22 | Kabushiki Kaisha Toshiba | Content management system, host device and content key access method |
JP2016096547A (ja) * | 2014-11-13 | 2016-05-26 | エルジー シーエヌエス カンパニー リミテッドLG CNS Co., Ltd. | 否認防止方法、このための決済管理サーバおよび使用者端末 |
Also Published As
Publication number | Publication date |
---|---|
CN101433014A (zh) | 2009-05-13 |
JPWO2007125877A1 (ja) | 2009-09-10 |
US20090100264A1 (en) | 2009-04-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2007125877A1 (ja) | 通信装置、及び通信システム | |
US10708072B2 (en) | Mutual authentication of confidential communication | |
Rodriguez-Henriquez et al. | A brief introduction to modern cryptography | |
Unger et al. | Improved strongly deniable authenticated key exchanges for secure messaging | |
CN104641592B (zh) | 用于无证书认证加密(clae)的方法和系统 | |
CN107094108B (zh) | 连接到数据总线的部件和在该部件中实现加密功能的方法 | |
US7813512B2 (en) | Encrypted communication system and communication device | |
JP2017063432A (ja) | 証明書不要公開鍵基盤に基づく安全なクライアント・サーバ通信プロトコルを設計するシステムと方法 | |
CN109274502B (zh) | 公钥加密及密钥签名的创建方法、设备及可读存储介质 | |
JP4130653B2 (ja) | 擬似公開鍵暗号方法及びシステム | |
EP2461564A1 (en) | Key transport protocol | |
KR20170035665A (ko) | 키 교환 장치 및 방법 | |
AU2015202599B2 (en) | Methods and devices for securing keys when key-management processes are subverted by an adversary | |
CN109951276B (zh) | 基于tpm的嵌入式设备远程身份认证方法 | |
JP6041864B2 (ja) | データの暗号化のための方法、コンピュータ・プログラム、および装置 | |
CN114448641A (zh) | 一种隐私加密方法、电子设备、存储介质以及芯片 | |
JP5171787B2 (ja) | サインクリプションシステムおよびサインクリプション生成方法 | |
CN110324357B (zh) | 数据发送方法及装置、数据接收方法及装置 | |
WO2020174515A1 (ja) | 暗号システム、鍵生成装置、鍵生成方法、鍵生成プログラム、および準同型演算装置 | |
CN118489130A (zh) | 加密装置、解密装置、可解密验证装置、密码系统、加密方法和加密程序 | |
JP6153454B2 (ja) | 署名装置、方法及びプログラム | |
TW202245436A (zh) | 產生訊息的簽章的方法、訊息認證方法以及加密裝置 | |
Blomqvist | Kleptography--Overview and a new proof of concept | |
Mandy Jr | Implementation of the ieee 1609.2 wave security services standard | |
CN114531235A (zh) | 一种端对端加密的通信方法及系统 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07742203 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2008513198 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 12298579 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 200780015366.4 Country of ref document: CN |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 07742203 Country of ref document: EP Kind code of ref document: A1 |