WO2015104629A1 - Dispositif de contrôle d'informations de clés, dispositif de mise à jour d'informations de clés, programme et support d'enregistrement, procédé de mise à jour d'informations de clés, et système de mise à jour d'informations de clés - Google Patents

Dispositif de contrôle d'informations de clés, dispositif de mise à jour d'informations de clés, programme et support d'enregistrement, procédé de mise à jour d'informations de clés, et système de mise à jour d'informations de clés Download PDF

Info

Publication number
WO2015104629A1
WO2015104629A1 PCT/IB2015/000006 IB2015000006W WO2015104629A1 WO 2015104629 A1 WO2015104629 A1 WO 2015104629A1 IB 2015000006 W IB2015000006 W IB 2015000006W WO 2015104629 A1 WO2015104629 A1 WO 2015104629A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
communication
group
group key
information control
Prior art date
Application number
PCT/IB2015/000006
Other languages
English (en)
Japanese (ja)
Inventor
健司 安
尚弘 福田
健治 蔵前
洋一 増田
智樹 高添
Original Assignee
パナソニックIpマネジメント株式会社
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by パナソニックIpマネジメント株式会社 filed Critical パナソニックIpマネジメント株式会社
Publication of WO2015104629A1 publication Critical patent/WO2015104629A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • H04L9/0833Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key

Definitions

  • the present invention relates to a key information control device, a key information update device, a program, a recording medium, a key information update method, and a key information update system that update a group key used in a plurality of devices.
  • a key encryption key is shared between a control device and a communication device using a unique key of the communication device. Thereafter, the control device updates the group key using multicast communication. At this time, the control device encrypts the group key using the key encryption key.
  • This group key is managed by a key identifier called an EPOCH value included in the nonce space in the encrypted message. The group key is updated when a predetermined condition (number of times of encrypted communication, time) is reached.
  • the communication message may not be transmitted to all the communication devices.
  • the communication device is a wireless device
  • the wireless communication state deteriorates due to noise, and the communication message is not transmitted.
  • the communication message is lost on the communication path. In this case, there is a possibility that the communication message cannot be transmitted to other communication devices.
  • An object of the present invention is to provide a key information control device, a key information update device, a program and a recording medium, a key information update method, and a key information update system capable of performing communication even when group key update fails. To do.
  • a key information control apparatus is a key information control apparatus for controlling a group key used in a network including a plurality of communication devices, wherein the group key is Key management means for changing the key identifier each time it is updated and generating the key identifier and a new group key, and multicast communication for transmitting the key identifier and the group key generated by the key management means by multicast communication Means for detecting the communication device that has not received the group key with reference to the key identifier in the information transmitted from the communication device, and the group key by the communication quality detection unit. When the communication device that has not received the message is detected, the communication device is connected to the communication device by unicast communication with a retransmission function.
  • a key information control device is the key information control device according to the first aspect, wherein the key management means increases the value of the key identifier each time the key is changed to a new group key. And the communication quality detecting means changes the group key transmitted by the multicast communication when the key identifier included in the information transmitted from the communication device is smaller than the key identifier changed by the key managing means. It is characterized by detecting that it has not been received.
  • a key information control device is the key information control device according to the first or second aspect, wherein the port number used by the multicast communication means and the unicast communication means are used.
  • a different value is assigned depending on the port number.
  • a key information control apparatus is the key information control apparatus according to any one of the first to third aspects, wherein the unicast communication means includes the key in addition to the group key. The latest key identifier generated by the management means is transmitted.
  • a key information control apparatus is the key information control apparatus according to any one of the first to fourth aspects, wherein the communication quality detection means is provided for a predetermined period for each of the communication devices.
  • a key information control apparatus is the key information control apparatus according to any one of the first to fifth aspects, wherein the communication device does not receive a group key by the communication quality detection means. And a notification means for notifying the communication device or another communication device when the message is detected.
  • a key information control program is a key information control program for controlling a group key used in a network including a plurality of communication devices, and each time the group key is updated.
  • Key management means for changing the key identifier to generate the key identifier and a new group key
  • multicast communication means for transmitting the key identifier and the group key generated by the key management means by multicast communication
  • the communication device Communication quality detection means for detecting the communication device that has not received the group key with reference to the key identifier in the information transmitted from the communication, and the communication that has not received the group key by the communication quality detection means When a device is detected, the group is transmitted to the communication device by unicast communication with a retransmission function.
  • a computer-readable recording medium recording a key information control program is a computer-readable recording medium storing a key information control program for controlling a group key used in a network including a plurality of communication devices.
  • a key management unit that changes a key identifier each time the group key is updated and generates the key identifier and a new group key, and the computer generated by the key management unit.
  • a key information updating apparatus is a key information updating apparatus that has a group key used in a network including a key information control apparatus and a plurality of communication devices, and updates the group key.
  • Key management means for updating the group key to a group key received by multicast communication from the key information control apparatus, and encryption processing for encrypting or decrypting data using the group key updated by the key management means And whether the group key has been updated by comparing the key identifier that is changed each time the group key is updated with the key identifier that the user owns in the information transmitted from the other communication device Unicast communication with a retransmission function when it is detected by the communication quality detection means that the group key is not updated by the communication quality detection means Therefore and a unicast communication means for requesting group key.
  • a key information update device is the key information update device according to the ninth aspect, wherein the communication quality detection means is transmitted from the key information control device or the other communication device.
  • the key identifier included in the received information is larger than the key identifier stored in itself, it is detected that the group key transmitted by the multicast communication is not received.
  • a key information update program is a key information update program that has a group key used in a network including a key information control device and a plurality of communication devices, and updates the group key.
  • a key management means for updating the group key to a group key received by multicast communication from the information control apparatus; a cipher for encrypting or decrypting data using the group key updated by the key management means; Whether the group key is updated by comparing the key identifier that is changed each time the group key is updated among the information transmitted from the processing means and other communication devices with the key identifier that the user has.
  • a communication quality detection means for detecting the group key, and when the communication quality detection means detects that the group key has not been updated, a retransmission function is provided. To function as a unicast communication means for requesting the group key by unicast communication.
  • a computer-readable recording medium recording a key information update program has a group key used in a network including a key information control device and a plurality of communication devices, and updates the group key.
  • a key information updating method includes a group key used in a network including a key information control device and a plurality of communication devices, and updates the key. Transmitting a new group key by multicast communication from the key information control device, updating a group key of the communication device to a group key transmitted from the key information control device, and transmitting from the communication device.
  • a key information update system is a key information update system that has a group key used in a network including a key information control device and a plurality of communication devices, and updates the group key.
  • Key management means for updating the group key of the communication device to a group key transmitted from the key information control apparatus, and encryption processing for encrypting or decrypting data using the group key updated by the key management means Means for detecting communication quality, wherein the communication device detects whether the group key has been updated by comparing a key identifier that is changed each time the group key is updated with a key identifier that the device has. And a communication method for transmitting the group key by the key information control device when it is detected by the communication quality detecting means that the group key has not been updated. Switching from multicast communication to the unicast communication with the retransmission function, and a communication means for transmitting the group key to the communication device by resending function unicast communication.
  • a key information update system is the key information update system according to the fourteenth aspect, wherein the key information control device sets an interval for transmitting the group key by multicast communication as a predetermined period.
  • the communication device detects that the group key has not been received by the multicast communication when the group key has not been received beyond the predetermined period.
  • a key information updating method is a key information updating method for updating a group key used in a network including a key information control device and a plurality of communication devices, the key information control device Unlike the group key, a step of generating a recovery key used in a network including the key information control device and the plurality of communication devices, and the key information control device and the communication device by the key information control device And a step of distributing the recovery key, a step of transmitting a new group key by multicast communication from the key information control device, and a group key transmitted from the key information control device. And updating a group key of the communication device.
  • a key information update method is the key information update method according to the sixteenth aspect, wherein the key information control apparatus transmits the key information control apparatus from the communication device. Detecting a communication device that has not updated the group key with reference to a key identifier that is changed each time the group key is updated in the information, and the key information control device updates the group key. Transmitting a group key encrypted using the recovery key when an uncommitted communication device is detected.
  • a key information update method according to an eighteenth aspect of the present invention is the key information update method according to the sixteenth aspect, wherein the key information control device cannot transmit a message using the group key by the communication device. The method further includes the step of transmitting a message encrypted using the recovery key. Effects of the Invention According to the present invention, communication can be performed even when the group key update fails.
  • the nonce value exchanged in the key information update system shown as embodiment of this invention is shown, (a) is a 1st structural example, (b) is a 2nd structural example.
  • the key information update system shown as an embodiment of the present invention it is a sequence diagram showing an example of a communication procedure when no communication failure occurs.
  • the key information update system shown as embodiment of this invention it is a sequence diagram which shows an example of the nonce value when updating a group key.
  • the key information update system shown as embodiment of this invention it is a sequence diagram which shows an example of a communication procedure when a communication failure is detected by a key information control apparatus.
  • it is a sequence diagram which shows an example of a communication procedure when a communication failure is detected by a communication apparatus.
  • it is a sequence diagram which shows an example of a communication procedure when a communication failure is detected by the timer of a communication apparatus. It is a flowchart which shows an example of the process sequence of the key information control apparatus in the key information update system shown as embodiment of this invention.
  • the key information update system shown as embodiment of this invention it is a sequence diagram which shows an example of a communication procedure when determining a communication failure by a counter value and an EPOCH value.
  • the key information update system shown as an embodiment of the present invention it is a sequence diagram showing an example of a communication procedure when multicast communication and unicast communication are used together for a communication device that has failed in communication.
  • 6 is a flowchart showing an example of a processing procedure for setting a communication device to a normal mode or a guarantee mode in the key information update system shown as the embodiment of the present invention.
  • the key information update system shown as an embodiment of the present invention it is a flowchart showing an example of a processing procedure for transmitting a key update message every predetermined period by the key information control device.
  • the key information update system shown as embodiment of this invention it is a sequence diagram which shows an example of the communication procedure which transmits a group key using a recovery key from a key information control apparatus to a some communication apparatus.
  • the key information update system includes a key information control device 1 and a plurality of communication devices 2A, 2B, 2C (hereinafter simply referred to as communication device 2 when collectively referred to).
  • the key information control device 1 and the communication device 2 are connected to the communication relay device 100.
  • the key information control device 1 and the communication device 2 can communicate with each other by relaying information by the communication relay device 100.
  • the communication relay device 100 is connected to a communication network NT such as the Internet by wire.
  • the communication relay device 100 corresponds to, for example, a broadband router.
  • the communication device 2 is various devices installed in a home, for example.
  • the communication device 2 ⁇ / b> A is a wireless communication device that exchanges wireless signals with the communication relay device 100.
  • the communication devices 2B and 2C are wiredly connected to the communication relay device 100 via a communication line.
  • the communication device 2 may perform wired communication or wireless communication. Wireless communication generally has lower communication quality than wired communication.
  • the communication apparatus 2 may be in a sleep state at an arbitrary timing, and may be activated by a certain period or some external trigger. This sleep state includes a state in which operation is performed with a minimum amount of power and communication cannot be performed. There may be three or more communication devices 2.
  • the key information control device 1 communicates with a plurality of communication devices 2 and controls the plurality of communication devices 2.
  • the key information control device 1 performs encrypted communication with the communication device 2. For this purpose, the key information control apparatus 1 performs an authentication process and a key distribution process with each communication device 2. Further, the key information control apparatus 1 updates a group key used in a network including a plurality of communication devices 2.
  • the key information control apparatus 1 has functional units as shown in FIG.
  • the key information control device 1 is a computer that can read and execute a program.
  • the key information control device 1 functions as each unit as shown in FIG. 2 by executing a program by a computer.
  • This program is a key information control program for updating a group key used in a network including a plurality of communication devices 2 in the present embodiment.
  • the key information control device 1 includes a control unit 11, a communication unit 12, an authentication processing unit 13, an authentication information storage unit 14, a key management unit 15, and an encryption processing unit 16. Further, the key information control apparatus 1 includes a communication quality measuring unit 17 and a communication quality storage unit 18. Further, the key information control apparatus 1 has a timer unit 19.
  • the communication unit 12 performs communication with the communication device 2.
  • the communication unit 12 communicates with the communication device 2 by either the multicast communication method or the unicast communication method. The switching of the communication method is controlled by the control unit 11.
  • the control unit 11 controls each unit of the key information control device 1.
  • the control unit 11 executes the key information control program 11b stored in the storage unit 11a as a computer-readable recording medium on which the program is recorded.
  • the authentication processing unit 13 performs authentication processing with the communication device 2 connected to the key information control device 1.
  • the authentication processing unit 13 only needs to be able to execute various existing authentication processes.
  • the authentication processing unit 13 reads the authentication information stored in the authentication information storage unit 14 during the authentication process.
  • the authentication information is, for example, the node ID of the communication device 2 and a device unique key KD (Key of Device) (or password).
  • the authentication processing unit 13 compares the authentication information transmitted from the communication device 2 with the authentication information stored in the authentication information storage unit 14 to determine whether the communication device 2 has a legitimate authority. . Note that it may be determined whether the communication device 2 has a legitimate authority using a public key and a secret key instead of the device unique key KD.
  • the key management unit 15 manages key information used when the key information control device 1 performs encrypted communication with the communication device 2.
  • the key management unit 15 includes a device unique key KD of the communication device 2 (key for device authentication and key encryption key distribution by unicast), a key encryption key KEK (Key Encryption Key).
  • the group key K (Gn) is managed.
  • the managed key information is stored in the key management table 15a.
  • the device unique key KD for each communication device 2 is key information for encrypting the key encryption key KEK sent to the communication device 2 by the key information control device 1 and authenticating the communication device 2. This device unique key KD is set in advance and shared by the key information control device 1 and each communication device 2.
  • the key encryption key KEK is a key for key encryption.
  • the key information control device 1 derives the key encryption key KEK.
  • the key encryption key KEK is shared by all the communication devices 2 and the key information control device 1 during authentication and key distribution.
  • the device unique key KD of the communication device 2 is key information (encryption key) for encrypting a key encryption key (KEK) between the key information control device 1 and the communication device 2 and distributing it to the communication device 2. ).
  • the key information control device 1 can have a device unique key KD having a different value for each device of the communication device 2 in order to enhance security.
  • the group key K (Gn) is key information for performing encrypted multicast communication between the key information control device 1 and all the communication devices 2.
  • the key information control device 1 derives the group key K (Gn).
  • the group key K (Gn) is encrypted with the key encryption key KEK and distributed to all communication devices 2 by multicast communication.
  • n in the group key K (Gn) is a key version. Every time a new key is generated by the key management unit 15, n is increased to 1, 2, 3,.
  • the key management unit 15 derives a key encryption key KEK and a group key K (Gn), and holds device unique keys KD of all communication devices 2 in advance.
  • the key management unit 15 causes the communication unit 12 to transmit the derived key encryption key KEK to each communication device 2. Further, the key management unit 15 updates the group key K (Gn) by multicast communication.
  • the key management unit 15 manages key identifiers.
  • the key identifier is a value (EPOCH value) that is changed every time the group key K (Gn) is updated.
  • the key management unit 15 updates the old EPOCH value to a new EPOCH value every time the group key is updated.
  • the encryption processing unit 16 performs message encryption processing using the key information stored in the key management table 15a.
  • the encryption processing unit 16 decrypts the encrypted data using the key information stored in the key management table 15a from the encryption information received by the communication unit 12. At this time, the encryption processing unit 16 selects and uses appropriate key information stored in the key management table 15a.
  • the communication quality measuring unit 17 measures the communication quality with each communication device 2.
  • the communication quality measuring unit 17 refers to the EPOCH value in the information transmitted from the communication device 2.
  • the communication quality measuring unit 17 detects a communication device 2 that has not received the group key K (Gn) transmitted by multicast communication (communication quality detection means). Further, the communication quality measuring unit 17 may detect the communication quality by using a nonce value counter value, as will be described later.
  • the communication quality storage unit 18 stores the EPOCH value referred to by the communication quality measurement unit 17 for each communication device 2.
  • the EPOCH value is referred to by the communication quality measuring unit 17. Thereby, the communication quality measuring unit 17 can determine that the communication quality is low for the communication device 2 having the missing EPOCH value. In such a key information control device 1, the control unit 11 changes the communication method of the communication unit 12.
  • the communication unit 12 transmits the EPOCH value and the group key K (Gn) generated by the key management unit 15 to the plurality of communication devices 2 by multicast communication in the normal group key K (Gn) update process (multicast communication). means).
  • the communication unit 12 transmits a unicast communication with a retransmission function to the communication device 2.
  • the timer unit 19 measures an interval at which the group key K (Gn) is transmitted by multicast communication.
  • the control unit 11 sets a predetermined period for the transmission interval of the group key K (Gn).
  • the timer unit 19 is controlled by the control unit 11 to clear the timer value and measure the timer value.
  • the communication device 2 has functional units as shown in FIG. 3, for example.
  • the communication device 2 is a computer that can read and execute a program.
  • the communication device 2 functions as each unit as shown in FIG. 3 by executing a program by a computer.
  • This program is a key information update program for updating the group key held by itself in this embodiment. Thereby, the communication device 2 functions as a key information update device.
  • the communication device 2 includes a control unit 21, a communication unit 22, an authentication processing unit 23, a key management unit 24, and an encryption processing unit 25.
  • the communication device 2 includes a communication quality measuring unit 26 and a communication quality storage unit 27.
  • the communication device 2 has a timer unit 28.
  • the communication unit 22 performs communication between the key information control device 1 and another communication device 2.
  • the communication unit 22 communicates with the key information control apparatus 1 by either the multicast communication method or the unicast communication method.
  • the switching of the communication method is controlled by the control unit 21.
  • the control unit 21 controls each unit of the communication device 2.
  • the control unit 21 executes a key information update program 21b stored in a storage unit 21a as a computer-readable recording medium on which the program is recorded.
  • the authentication processing unit 23 performs authentication processing with the key information control device 1.
  • the authentication processing unit 23 only needs to be able to execute various existing authentication processes.
  • the authentication processing unit 23 reads preset authentication information during the authentication process.
  • the authentication information is, for example, the node ID of the communication device 2 and a device unique key KD (Key of Device) (or password).
  • the authentication processing unit 23 transmits authentication information from the communication unit 22 to the key information control device 1 in response to a request from the key information control device 1.
  • the key management unit 24 manages key information used when encrypted communication is performed between the key information control device 1 and another communication device 2.
  • the key management unit 24 manages the device unique key KD, the key encryption key KEK, and the group key K (Gn) of the communication device 2.
  • the managed key information is stored in the key management table 24a. Further, the key management unit 24 stores the key identifier in the key management table 24a.
  • the encryption processing unit 25 performs message encryption processing using the key information stored in the key management table 24a.
  • the encryption processing unit 25 decrypts the encrypted data using the key information stored in the key management table 24a from the encryption information received by the communication unit 22. At this time, the encryption processing unit 25 selects and uses appropriate key information stored in the key management table 24a.
  • the communication quality measuring unit 26 measures the communication quality with the key information control device 1.
  • the communication quality measuring unit 26 refers to the EPOCH value in the information transmitted from the key information control device 1 or another communication device 2.
  • the communication quality measuring unit 26 compares the EPOCH value of the received information with the EPOCH value if it is held in the key management table 24a. As a result of this comparison, the communication quality measuring unit 26 detects that the two EPOCH values are different and the difference between the EPOCH values.
  • the communication quality measurement unit 26 detects that the updated group key K (Gn) has not been received (communication quality detection means). Further, the communication quality measuring unit 26 may detect that the group key K (Gn) is not received as the communication quality with reference to the timer value.
  • the communication quality storage unit 27 stores the EPOCH value referred to by the communication quality measurement unit 26.
  • the EPOCH value is referred to by the communication quality measuring unit 26. Thereby, the communication quality measuring unit 26 can determine that the communication quality is low when the EPOCH value is missing.
  • the communication device 2 obtains the group key K (Gn) by unicast communication with a retransmission function.
  • the communication device 2 transmits a key request message to the key information control device 1.
  • the communication unit 22 acquires the current group key K (Gn) by unicast communication (communication means).
  • the timer unit 28 measures the interval at which the group key K (Gn) is received by multicast communication.
  • the reception interval of the group key K (Gn) is set in advance with the key information control device 1 in advance.
  • the timer unit 28 is controlled by the control unit 21 to clear the timer value and measure the timer value. Thereby, the timer unit 28 detects that the group key K (Gn) has not been received by multicast communication when the group key K (Gn) has not been received for a predetermined period.
  • the key information control device 1 performs encrypted communication with the communication device 2. For this purpose, the key information control device 1 authenticates each communication device 2. Thereafter, the key information control device 1 distributes a key encryption key KEK that can be encrypted and communicated only with each communication device 2. Furthermore, the key information control apparatus 1 distributes a group key K (Gn) that can be encrypted and communicated with all the communication devices 2. As a result, the group key K (Gn) is shared by the key information control apparatus 1 and all the communication devices 2. In the group key K (Gn), Gn corresponds to the age of the group key (EPOCH value). As shown in FIG.
  • such a key information update system transmits a group key S1 from the key information control device 1 to the communication device 2 by multicast communication.
  • the group key S1 is transmitted to the communication device 2 via the communication relay device 100.
  • the communication device 2A is a wireless communication device
  • a wireless signal S2a is transmitted from the communication relay device 100 to the communication device 2A.
  • the communication devices 2B and 2C are wired communication devices
  • wired signals S2b and S2c are transmitted from the communication relay device 100 to the communication devices 2B and 2C. For example, it is assumed that the wireless signal S2a disappears due to a communication failure caused by noise or the like.
  • the communication device 2A cannot receive the group key S1 used by the key information control device 1 and the other communication devices 2B and 2C. Therefore, the communication device 2A cannot decrypt information transmitted by multicast communication that is subsequently encrypted with the group key S1. Further, the communication device 2A transmits information encrypted with the old group key. Therefore, the information transmitted from the communication device 2A cannot be decrypted by the key information control device 1 and the other communication devices 2B and 2C. Therefore, the key information update system of this embodiment enables communication even when the group key update fails. For this reason, the key information update system detects a communication failure. When a communication failure is detected, the key information update system updates the group key of the communication device 2 in which the communication failure has occurred using both multicast communication and unicast communication.
  • a packet communicated in the key information update system includes a nonce shown in FIG. 4A or 4B in addition to the IP address and UDP.
  • the nonce is used as one of parameters at the time of data encryption, and is added to the header part of the transmission data message.
  • the nonce illustrated in FIG. 4A includes an EPOCH value and a counter value.
  • the nonce shown in FIG. 4B includes an EPOCH value, a node ID, and a counter value.
  • the EPOCH value is an identifier of the group key K (Gn).
  • the EPOCH value is changed every time the group information K (Gn) is updated by the key information control apparatus 1.
  • the key information control device 1 increments the EPOCH value every time the group key K (Gn) is updated.
  • the node ID is an identifier for identifying the key information control device 1 and the communication device 2.
  • the key information control device 1 and the communication device 2 store their node IDs in a message when transmitting data.
  • the counter value represents the number of times that the encrypted multicast communication is performed using the group key K (Gn) identified by the EPOCH value. This counter value is managed by each of the key information control device 1 and the communication device 2. The counter value is counted up every time the key information control device 1 and the communication device 2 transmit data.
  • the group key K (Gn) is updated by the key information control device 1 before the counter value reaches the maximum value.
  • an authentication process and a key distribution process P1 are performed between the key information control apparatus 1 and the communication device 2C.
  • the key information control device 1 After determining that the communication device 2C is a valid device, the key information control device 1 distributes the key encryption key KEK by unicast communication.
  • the key information control apparatus 1 distributes the group key K (G1) by multicast communication. At this time, the key information control apparatus 1 transmits the encrypted information obtained by the function E (KEK, K (G1)) by multicast communication.
  • This function E is a function for encrypting the group key K (G1) using the key encryption key KEK.
  • This key encryption key KEK is the key encryption key KEK distributed in process P1.
  • the communication device 2C receives the function E multicast-transmitted from the key information control device 1, it decrypts it. At this time, the communication device 2C performs an operation of a function D (KEK, E (KEK, K (Gn))).
  • This function D is a function for decrypting the encrypted information obtained by E (KEK, K (Gn)) using the key encryption key KEK. Accordingly, the communication device 2C can decrypt the group key K (G1).
  • the key information control apparatus 1 performs authentication processing and key distribution processing P2 and P3 for the communication device 2B and the communication device 2A. Furthermore, the key information control apparatus 1 distributes the group keys K (G2) and K (G3) every time the authentication process and the key distribution processes P2 and P3 are completed. Thereby, the key information control apparatus 1 and all the communication apparatuses 2 can perform the data communication process P4 by the encrypted multicast communication using the group key K (G3).
  • the key information control device 1 and the communication device 2 perform key update processing P5. In this key update process P5, a new group key K (G4) generated by the key information control apparatus 1 is distributed to all the communication devices 2 by multicast communication.
  • Each communication device 2 receives the group key K (G4) by multicast communication, and updates the group key K (G3) stored in the key management table 24a to a new group key K (G4). . Thereafter, for example, the encrypted data is transmitted from the key information control device 1 to all the communication devices 2.
  • This encrypted data includes encryption information obtained by the function E (K (G4), data).
  • Each communication device 2 receives the encrypted data transmitted from the key information control device 1 by multicast communication.
  • Each communication device 2 decrypts the encrypted data with the group key K (G4). As a result, each communication device 2 performs an operation of function D (K (G4), E (K (G4), data)). Can get the data.
  • the encrypted data encrypted using the group key K (G1) is transmitted by the communication device 2C.
  • a nonce value is added to the encrypted data.
  • This encrypted data is transmitted to the communication device 2A, the communication device 2B, and the key information control device 1 by multicast communication.
  • the key information control apparatus 1 transmits a key update message including a new group key K (G2) by multicast communication.
  • the communication device 2C updates the group key K (G1) to a new group key K (G2).
  • the key information control apparatus 1 detects that the group key K (Gn) has not been received in the key information update system described above will be described with reference to FIG. First, as described with reference to FIG. 5, the key information update system performs authentication processing and key distribution processing P1, P2, and P3 between the key information control device 1 and the communication devices 2A, 2B, and 2C. . Furthermore, the key information control apparatus 1 distributes the group key K (Gn) by multicast communication after the authentication process and the key distribution process.
  • the key information control apparatus 1 and the communication devices 2A, 2B, and 2C perform the data communication process P4 using the latest group key K (G3). Thereafter, when the update timing of the group key K (Gn) is reached, the key information control apparatus 1 performs a key update process P5 for distributing the group key K (G4) to the communication devices 2A, 2B, and 2C by multicast communication. (Multicast communication means).
  • the EPOCH value corresponding to this group key K (G4) is “3”. At this time, it is assumed that the key update message transmitted from the key information control apparatus 1 to the communication device 2A is not received by the communication device 2A due to communication failure.
  • the communication device 2A transmits the encrypted data encrypted with the group key K (G3) as the old group key K (Gn).
  • the EPOCH value corresponding to this group key K (G3) is “2”.
  • the encrypted data is received by the communication devices 2B and 2C and the key information control device 1.
  • the key information control device 1 refers to the EPOCH value in the information transmitted from the communication device 2A.
  • the EPOCH value held by the key information control apparatus 1 is “3”
  • the EPOCH value of the information transmitted from the communication device 2A is “2”.
  • the key information control device 1 detects the communication device 2A as a communication device that has not received the group key K (G4) transmitted by multicast communication (communication quality detection means). In this case, the key information control apparatus 1 transmits the group key K (G4) to the communication device 2A by unicast communication with a retransmission function (unicast communication means). At this time, the key information control apparatus 1 encrypts the new group key K (G4) with the key encryption key KEK distributed in the authentication process and the key distribution process P3. When transmitting the group key K (G4) by unicast communication, the key information control apparatus 1 performs unicast communication with a retransmission function.
  • This unicast communication with a retransmission function repeats unicast communication until a reception response is received from the communication device 2. For example, even if the key information control apparatus 1 performs unicast communication twice and the group key K (G4) disappears due to communication failure, the key information control apparatus 1 transmits the group key K (G4 to the communication device 2A by the third unicast communication. ) Can be sent.
  • the group key K (G4) transmitted by the unicast communication is decrypted using the key encryption key KEK of the communication device 2A.
  • the communication device 2A can update the group key K (G3) to the latest group key K (G4).
  • the communication device 2A Upon receiving the latest group key K (G4), the communication device 2A transmits a reception response to the key information control device 1 by unicast communication. Further, the key information control apparatus 1 may transmit the latest EPOCH value in addition to the group key K (Gn) by unicast communication with a retransmission function. In this case, the communication device 2A can update the group key K (G3) to the group key K (G4) and update the stored EPOCH value “2” to the latest EPOCH value “3”. As described above, according to the key information update system, even when the group key K (Gn) transmitted by multicast communication is lost due to communication failure, the communication method for transmitting the group key K (Gn) is automatically multicast communication. To unicast communication with resending function.
  • the key information update system switches the multicast communication method to the unicast communication with a retransmission function that requires a reception response and transmits the group key K (Gn), thereby more reliably updating the group key K (Gn).
  • the key management unit 15 greatly changes the value of the EPOCH value every time it is changed to a new group key.
  • the key information control apparatus 1 receives the group key transmitted by multicast communication when the EPOCH value transmitted from the communication device 2 is smaller than the EPOCH value changed by the key management unit 15 by the communication quality measuring unit 17. Can be detected.
  • the key information control device 1 can transmit the latest EPOCH value generated by the key management unit 15 in addition to the latest group key. As a result, the latest EPOCH value can be transmitted from the key information control apparatus 1 to the communication device 2 by unicast communication with a retransmission function.
  • the key information update system can easily start multicast communication using the group key immediately after transmitting the latest EPOCH value from the key information control device 1 to the communication device 2.
  • the key information update system performs authentication processing and key distribution processing P1, P2, and P3 between the key information control device 1 and the communication devices 2A, 2B, and 2C.
  • the key information control apparatus 1 and the communication devices 2A, 2B, and 2C perform the data communication process P4 using the latest group key K (G3).
  • the key information control apparatus 1 transmits the encrypted data encrypted with the new group key K (G4) by multicast communication.
  • the EPOCH value corresponding to this group key K (G4) is “3”.
  • this encrypted data is received by the communication devices 2A, 2B, 2C.
  • the communication devices 2B and 2C can successfully decrypt the encrypted data with the new group key K (G4) obtained by the key update process P5.
  • the communication device 2A attempts to decrypt it with the group key K (G3) stored in the key management table 24a, the decryption fails.
  • the communication device 2A refers to the EPOCH value in the information transmitted from the key information control device 1. Then, while the EPOCH value held by the communication device 2A is “2”, the EPOCH value of the information transmitted from the key information control apparatus 1 is “3”. As a result, the communication device 2A detects that the latest group key K (Gn) has not been received (communication quality detection means). In this case, the communication device 2A requests the key information control device 1 to transmit the latest group key K (Gn) by unicast communication with a retransmission function (unicast communication means). Note that a new group key request message is normally sent in plain text. This plaintext message is a configuration example of ⁇ MSG, EPOCH, D_2A ⁇ .
  • MSG is an identifier indicating a request
  • EPOCH is an EPOCH value received from the key information control apparatus 1 by the communication device 2A
  • D_2A is an identifier or ID that can identify the communication device 2A.
  • the communication device 2A adds the message authentication code (MAC) information to the key request message for requesting a new group key K (Gn) by using the encryption key KEK distributed in the authentication process and the key distribution process P3. May be.
  • the message authentication code information is information for proving that the communication device 2A is used.
  • the request with the message authentication code (MAC) added is, for example, a configuration example of ⁇ MSG, EPOCH, D_2A, MAC (KD_2A, MSG, D_2A, EPOCH) ⁇ .
  • the function MAC calculates KD_2A as key information, MSG, D_2A, and EPOCH as messages, and outputs a MAC value.
  • This MAC value includes the device unique key KD of the communication device 2A. For this reason, if the device unique key KD is different, the MAC values do not match even if the same MSG, D_2A and EPOCH are input. Therefore, the MAC value is information that proves the communication device 2A.
  • MSG is an identifier (including a character string) indicating a request.
  • EPOCH is an EPOCH value received from the key information control apparatus 1 by the communication device 2A.
  • D_2A is an identifier or node ID that can identify the communication device 2A.
  • the communication device 2A performs unicast communication with a retransmission function when requesting the group key K (Gn) by unicast communication. This unicast communication with a retransmission function repeats unicast communication until a reception response is received from the key information control apparatus 1.
  • the communication device 2A transmits the group key K to the key information control device 1 by the third unicast communication.
  • (Gn) key request message can be transmitted.
  • the key request message of the group key K (Gn) transmitted by the unicast communication is verified using the device unique key KD of the communication device 2A of the key information control device 1 when message authentication is added.
  • the message authentication code is not added, it is determined that the communication partner is not a valid communication device 2A.
  • the key information control apparatus 1 performs unicast communication so as to transmit the latest group key K (G4) to the communication device 2A. .
  • the key information control apparatus 1 may transmit the group key K (G4) by unicast communication with a retransmission function.
  • the communication device 2A receives the latest group key K (G4) from the key information control device 1 in response to the key request message of the group key K (Gn)
  • the communication device 2A can decrypt it using the key encryption key KEK. Accordingly, the communication device 2A can update the group key K (G3) to the latest group key K (G4).
  • the communication device 2A Upon receiving the latest group key K (G4), the communication device 2A transmits a reception response to the key information control device 1 by unicast communication. Further, the key information control apparatus 1 may transmit the latest EPOCH value in addition to the group key K (Gn) by unicast communication with a retransmission function. In this case, the communication device 2A can update the group key K (G3) to the group key K (G4) and update the stored EPOCH value “2” to the latest EPOCH value “3”. As described above, according to the key information update system, even when the group key K (Gn) transmitted by multicast communication is lost due to communication failure, the communication method for transmitting the group key K (Gn) is automatically multicast communication. To unicast communication with resending function.
  • the key information update system transmits the key request message of the group key K (Gn) by the unicast communication with a retransmission function that requires a reception response by the communication device 2, so that the latest group key is transmitted from the key information control device 1.
  • K (Gn) can be obtained. Therefore, according to the communication device 2, even when the latest group key K (Gn) is lost by multicast communication, the group key K (Gn) can be updated more reliably.
  • the communication device 2 performs multicast communication when the EPOCH value included in the information transmitted from the key information control device 1 or another communication device 2 is larger than the EPOCH value stored in the communication device 2 (self). It can be detected that the group key transmitted by is not received.
  • the communication device 2 can request a key update message when its own EPOCH value is small and its own group key K (Gn) is old. In this way, it is possible to refer to the EPOCH value, detect that the key update message by multicast communication has disappeared, and switch to unicast communication with a retransmission function to perform key update. As a result, the group key can be reliably updated without making an inquiry to the communication partner, and multicast communication using the group key can be performed without performing the authentication process and the key update process for the entire system again.
  • the communication device 2 detects that the group key K (Gn) has not been received in the key information update system described above will be described with reference to FIG.
  • the communication device 2 When receiving the key update message for distributing the latest group key K (G3), the communication device 2 activates the timer unit 28. When the communication device 2 has not received a key update message including the group key K (Gn) for a predetermined time t, it detects that the group key has not been received by multicast communication. In this case, the communication device 2A requests the key information control device 1 to transmit the latest group key K (Gn) by unicast communication with a retransmission function (unicast communication means). Note that a new group key request message is normally sent in plain text. This plaintext message is a configuration example of ⁇ MSG, EPOCH, D_2A ⁇ . MSG is an identifier indicating a request.
  • EPOCH is an EPOCH value received from the key information control apparatus 1 by the communication device 2A.
  • D_2A is an identifier or ID that can identify the communication device 2A.
  • the communication device 2A encrypts message authentication (MAC) information in a key request message for requesting a new group key K (Gn) by using the key encryption key KEK distributed in the authentication process and the key distribution process P3. May be added.
  • the message authentication code information is information for proving that the communication device 2A is used.
  • the request with the message authentication code (MAC) added is, for example, a configuration example of ⁇ MSG, EPOCH, D_2A, MAC (KD_2A, MSG, D_2A, EPOCH) ⁇ .
  • the function MAC calculates KD_2A as key information, MSG, D_2A, and EPOCH as messages, and outputs a MAC value.
  • This MAC value includes the device unique key KD of the communication device 2A. For this reason, if the device unique key KD is different, the MAC values do not match even if the same MSG, D_2A and EPOCH are input. Therefore, the MAC value is information that proves the communication device 2A.
  • MSG is an identifier (including a character string) indicating a request.
  • EPOCH is an EPOCH value received from the key information control apparatus 1 by the communication device 2A.
  • D_2A is an identifier or node ID that can identify the communication device 2A.
  • the key request message of the group key K (Gn) transmitted by the unicast communication is verified using the device unique key KD of the communication device 2A of the key information control device 1 when message authentication is added.
  • the message authentication code is not added, it is determined that the communication partner is not a valid communication device 2A.
  • the key information control apparatus 1 performs unicast communication so as to transmit the latest group key K (G4) to the communication device 2A.
  • the communication device 2A receives the latest group key K (G4) from the key information control device 1 in response to the key request message of the group key K (Gn), the communication device 2A can decrypt it using the key encryption key KEK.
  • the communication device 2A can update the group key K (G3) to the latest group key K (G4).
  • the communication device 2A Upon receiving the latest group key K (G4), the communication device 2A transmits a reception response to the key information control device 1 by unicast communication.
  • the interval at which the key information control device 1 transmits the group key by multicast communication is set as a predetermined period.
  • the communication device 2 when the communication device 2 has not received a group key for a predetermined period, it detects that the group key has not been received by multicast communication. According to this key information update system, the communication device 2 can easily detect a communication failure in the key update message.
  • FIG. 10 is a flowchart showing an operation procedure of the key information control apparatus 1. This operation is a process performed by the key information control apparatus 1 as a computer executing the key information control program 11b stored in the storage unit 11a as a recording medium.
  • the communication unit 12 receives a message transmitted from the outside.
  • the control unit 11 determines whether or not the message received in step S ⁇ b> 1 is a key request message transmitted from the communication device 2.
  • control unit 11 refers to the address information or the node ID and identifies the communication device 2 that is the message transmission source.
  • the control unit 11 refers to the encrypted data added to the nonce value to determine whether the received message is a key request message. If it is a key request message, the process proceeds to step S3, and if not, the process proceeds to step S5.
  • the communication unit 12 transmits the latest group key K (Gn) by unicast communication with a retransmission function.
  • the key management unit 15 reads the latest group key K (Gn) from the key management table 15a according to the control of the control unit 11.
  • the key management unit 15 reads the key encryption key KEK corresponding to the communication device 2 that is the transmission source of the key request message and causes the encryption processing unit 16 to encrypt the key encryption key KEK.
  • the communication unit 12 receives a reception response from the communication device 2 by unicast communication in response to the transmission of the group key K (Gn) in step S3.
  • the communication quality measuring unit 17 determines whether or not the EPOCH value (received EPOCH value) included in the message received in step S1 is older than the current EPOCH value. At this time, the communication quality measuring unit 17 compares the magnitude relationship between the EPOCH value currently stored in the key management table 15a and the received EPOCH value.
  • step S6 If the received EPOCH value is smaller than the EPOCH value stored in the key management table 15a, the received EPOCH value is old and the process proceeds to step S6. If both EPOCH values are the same, the process proceeds to step S9.
  • step S ⁇ b> 6 the control unit 11 records device information including the node ID and EPOCH value included in the message received in step S ⁇ b> 1 in the communication quality storage unit 18.
  • the communication unit 12 transmits a key update message for updating the group key K (Gn) by unicast communication.
  • the key management unit 15 reads the latest group key K (Gn) from the key management table 15a under the control of the control unit 11.
  • the encryption processing unit 16 encrypts the group key K (Gn) with the key encryption key KEK under the control of the control unit 11.
  • the communication unit 12 transmits a key update message including the encrypted group key K (Gn) and including the node ID of the message transmission source device.
  • the port number B for this unicast communication is desirably a value different from the port number A used for multicast communication.
  • the communication unit 12 receives a reception response to the key update message transmitted in step S7 by unicast communication.
  • the encryption processing unit 16 decrypts the message received in step S1 with the latest group key K (Gn).
  • the control unit 11 performs various processes according to the message decoded in step S9.
  • step S11 the control unit 11 determines whether or not the counter value included in the nonce value is equal to or greater than a threshold value.
  • This threshold value is a preset value, for example, a value such as 232-1 according to the allocated bit amount of the counter value. If the counter value is greater than or equal to the threshold value, the process proceeds to step S12. If not, the process ends.
  • step S12 the communication unit 12 transmits a key update message including the latest group key K (Gn) in order to update the group key K (Gn) of all the communication devices 2.
  • This key update message includes a value obtained by encrypting the latest group key K (Gn) derived by the key management unit 15 with the key encryption key KEK.
  • the communication unit 12 transmits the key update message by the multicast communication method.
  • the communication unit 12 may set the port number A used for multicast communication (multicast communication means) to a value different from the port number B used for unicast communication (unicast communication means).
  • the control unit 11 determines whether there is a communication device 2 in the guarantee mode among the communication devices 2. If there is a communication device 2 in the guarantee mode, the process proceeds to step S14, and if not, the process ends. This guarantee mode will be described later.
  • the communication unit 12 transmits a key update message to the communication device 2 by unicast communication with a retransmission function.
  • the communication unit 12 may use a port number B having a value different from the port number A used in multicast communication.
  • the key information control apparatus 1 can transmit the group key K (Gn) by unicast communication in response to the key request message from the communication device 2.
  • the key information control apparatus 1 can transmit the latest group key K (Gn) to the communication device 2 by unicast communication with a retransmission function.
  • the key information control apparatus 1 can update the group keys K (Gn) of all the communication devices 2 by multicast communication when the counter value is equal to or greater than the threshold value.
  • FIG. 11 is a flowchart showing an operation procedure of the communication device 2.
  • This operation is a process performed by the communication device 2 as a computer executing the key information update program 21b stored in the control unit 21.
  • the communication unit 22 receives a message transmitted from the outside.
  • the control unit 21 determines whether or not the message received in step S21 is a key update message transmitted from the key information control device 1 by multicast communication.
  • the control unit 21 refers to the address information or the node ID to identify whether the message transmission source is the key information control apparatus 1.
  • the control unit 21 refers to the encrypted data added to the nonce value to determine whether or not the received message is a key update message. If it is a key update message, the process proceeds to step S23; otherwise, the process proceeds to step S24.
  • step S23 the control unit 21 uses the encryption processing unit 25 to decrypt the key update message received in step S21.
  • the encryption processing unit 25 decrypts the key update message using the key encryption key KEK stored in the key management table 24a to obtain the latest group key K (Gn).
  • the key management unit 24 updates the latest group key K (Gn) stored in the key management table 24a to the group key K (Gn) extracted from the key update message.
  • the communication quality measuring unit 26 determines whether or not the EPOCH value (received EPOCH value) included in the message received in step S21 is newer than the current EPOCH value.
  • the communication quality measuring unit 26 compares the magnitude relationship between the EPOCH value currently stored in the key management table 24a and the received EPOCH value. If the received EPOCH value is larger than the EPOCH value stored in the key management table 24a, the process proceeds to step S25 because the received EPOCH value is new. If both EPOCH values are the same, the process proceeds to step S29. In step S25, the control unit 21 temporarily stores the message received in step S21. In the next step S26, the communication unit 22 transmits a key request message requesting the latest group key K (Gn). At this time, the communication unit 22 transmits a key request message to which message authentication using the device unique key KD is added by unicast communication.
  • the communication unit 22 receives the key update message transmitted from the key information control apparatus 1 by unicast communication in response to the key request message transmitted in step S26.
  • the port number B of the key update message may be different from the port number A used for multicast communication.
  • the communication unit 22 performs reception using the port number B corresponding to unicast communication.
  • the control unit 21 uses the encryption processing unit 25 to decrypt the key update message received in step S27.
  • the encryption processing unit 25 decrypts the key update message using the key encryption key KEK stored in the key management table 24a to obtain the latest group key K (Gn).
  • the key management unit 24 updates the latest group key K (Gn) stored in the key management table 24a to the group key K (Gn) extracted from the key update message.
  • the encryption processing unit 16 decrypts the message temporarily stored in step S25 using the latest group key K (Gn) updated in step S28.
  • the communication unit 22 performs various multicast communication processes according to the message received in step S21. As described above, the communication device 2 can update the group key K (Gn) when the key update message is transmitted from the key information control device 1 by multicast communication.
  • the communication device 2 transmits a key request message by unicast communication, receives the latest group key K (Gn) by unicast communication, and obtains the group key K (Gn). Can be updated. Furthermore, even if the communication device 2 does not hold the latest group key K (Gn), the communication device 2 can temporarily store the message and acquire and decrypt the latest group key K (Gn). Furthermore, in the key information update system described above, the key information control device 1 and the communication device 2 assign different values for the port number used for multicast communication and the port number used for unicast communication. This eliminates the need to describe a key obtained by encrypting the message in the message transmitted from the key information control device 1 and the communication device 2.
  • FIG. 12 shows a sequence diagram of encrypted data communication using the group key K (G1) by the communication device 2A.
  • the communication device 2A starts communication, it is assumed that the authentication processing and the initial group key K (G1) can be shared between the key information control device 1 and all the communication devices 2.
  • the communication device 2A repeats the multicast communication until the counter value reaches the maximum value.
  • the key information control device 1 determines a communication failure for each communication device 2 using a counter value.
  • the key information control device 1 transmits a key update message by multicast communication at the update timing of the group key K (Gn).
  • a key update message is distributed.
  • the EPOCH value of each key update message increases to 1, 2, 3, and 4 each time K (G2), K (G3), K (G4), and K (G5) are updated.
  • the key update message with EPOCH values 0, 1, and 4 is received by the communication device 2A.
  • the communication device 2A performs multicast communication using the group keys K (G1), K (G2), and the group key K (G5) corresponding to the EPOCH values 0, 1, and 4, thereby performing the key information control apparatus 1. Can communicate with.
  • the key update messages with EPOCH values 2 and 3 are lost before reaching the communication device 2A. Accordingly, the communication device 2A cannot perform multicast communication using the group keys K (G3) and K (G4) corresponding to the EPOCH values 2 and 3.
  • the key information control apparatus 1 determines a communication failure using the EPOCH value for each communication device 2.
  • the key information control device 1 determines a communication failure for each communication device 2 using the counter value or the EPOCH value.
  • the key information control apparatus 1 determines communication failure of the communication device 2A in the communication sequence as shown in FIG. In this case, as shown in FIG. 13, the key information control apparatus 1 sends a group key K (Gn) to the communication device 2A by unicast communication each time the group key K (Gn) is transmitted to the communication device 2A by multicast communication. ).
  • the operation of the key information control apparatus 1 in such a key information update system is shown in FIG.
  • the control unit 11 controls the timer unit 19 to set a predetermined time t as a timer value for communication failure determination.
  • the timer unit 19 performs a timer process for starting and measuring time.
  • step S43 the control unit 11 determines whether the timer value measured by the timer unit 19 has reached a predetermined time t and has expired. If the timer value has expired, the process proceeds to step S44; otherwise, the timer process in step S42 is continued.
  • the key information control device 1 At a predetermined time t during which the timer process is continued, the key information control device 1 accumulates the counter value in the message transmitted from the communication device 2 by the communication quality storage unit 18. Alternatively, the key information control device 1 stores the EPOCH value included in the message transmitted from the communication device 2.
  • step S ⁇ b> 44 the communication quality measuring unit 17 aggregates the number of unreceived times at the predetermined time t for each communication device 2.
  • the communication quality measuring unit 17 as a non-reception detecting unit refers to the counter value in the message for each communication device 2 stored in the communication quality storage unit 18.
  • the communication quality measuring unit 17 detects missing in the counter value.
  • the communication quality measuring unit 17 measures the number of unreceived messages transmitted from the communication device 2 at the predetermined time t for each communication device 2.
  • the communication quality measuring unit 17 as a communication quality detecting unit refers to the EPOCH value in the message for each communication device 2 stored in the communication quality storage unit 18.
  • the communication quality measuring unit 17 detects a gap in the EPOCH value.
  • the communication quality measuring unit 17 measures the number of times the group key K (Gn) has not been received by the communication device 2 at the predetermined time t for each communication device 2.
  • the control unit 11 determines whether or not there is a communication device 2 for which the number of unreceived times counted in step S44 is greater than a predetermined threshold. If there is a communication device 2 whose number of unreceptions is greater than the threshold, the process proceeds to step S46, and if not, the process proceeds to step S47.
  • step S46 the control unit 11 sets the communication device 2 corresponding to the fact that the number of unreceived times is larger than the threshold value in the guarantee mode. In this guarantee mode, as shown in FIG.
  • step S47 the control unit 11 sets the communication device 2 that does not fall under the condition that the number of unreceived times is larger than the threshold value to the normal mode.
  • This normal mode is an operation mode in which only multicast communication is performed as described above.
  • the communication quality storage unit 18 accumulates the counter value received for a predetermined time t [minute] for each communication device 2. In the case of the communication sequence shown in FIG. 12, the communication quality storage unit 18 stores 0, 3, 4, and 6 as counter values corresponding to the communication device 2A.
  • the communication quality measuring unit 17 refers to the counter value accumulated in the communication quality storage unit 18 and detects a message that has not reached the key information control device 1.
  • the communication quality measuring unit 17 detects that the messages of the counter values 1, 2, and 5 have been transmitted to the communication device 2A but have not reached (not received) the key information control device 1. .
  • the control unit 11 determines that 3 times out of 7 times is the number of unreceived times during the predetermined time t.
  • the control unit 11 compares the number of unreceived messages with a preset threshold (for example, twice).
  • the control unit 11 Since the number of unreceived messages exceeds the threshold, the control unit 11 sets the operation mode of the communication device 2A to the guaranteed mode. Thereby, as shown in FIG. 13, the control part 11 transmits a message by the multicast communication with respect to 2 A of communication apparatuses, and also transmits a message by the unicast communication with resending. Similarly, the key information control apparatus 1 stores the EPOCH value received at the predetermined time t [minutes] for each communication device 2 by the communication quality storage unit 18. In the case of the communication sequence shown in FIG. 12, the communication quality storage unit 18 stores 0, 1, and 4 as EPOCH values corresponding to the communication device 2A.
  • the communication quality measuring unit 17 refers to the EPOCH value stored in the communication quality storage unit 18 and detects a key update message that has not reached the communication device 2A.
  • the communication quality measuring unit 17 detects that the key update message having the EPOCH values of 2 and 3 has not reached (not received) the communication device 2A.
  • the control unit 11 determines that 2 out of 4 times is the number of unreceived times during the predetermined time t.
  • the control unit 11 compares the number of unreceived messages with a preset threshold (for example, twice). Since the number of unreceived messages exceeds the threshold, the control unit 11 sets the operation mode of the communication device 2A to the guaranteed mode.
  • the control part 11 transmits a message by the multicast communication with respect to 2 A of communication apparatuses, and also transmits a message by the unicast communication with resending.
  • the operation mode for the communication device 2 determined to have a communication failure is set to the guarantee mode.
  • the key information control apparatus 1 can transmit a message to the communication apparatus 2 by unicast communication with retransmission in addition to multicast communication.
  • the key information update system can reliably receive the key update message transmitted by multicast communication to the communication device 2 in the unstable communication path.
  • the key information control apparatus 1 when the key information control device 1 detects an unstable communication path, the key information control apparatus 1 notifies the communication device 2 or other communication device 2 in the unstable communication path.
  • Communication means For example, as shown in FIG. 15, it is assumed that a communication failure occurs in the communication device 2A after the group key K (G3) is distributed to all the communication devices 2 and the data communication process P4 is performed.
  • the key information control apparatus 1 transmits a key request message by multicast communication, and further transmits a key request message by unicast communication. In this case, the key information control apparatus 1 notifies an unstable communication path under the control of the control unit 11.
  • the control unit 11 notifies the communication devices 2A and 2C that communicate with the communication device 2A and the communication device 2A in the unstable communication path. At this time, the control unit 11 performs notification based on the information of the communication device 2 whose authentication is permitted by the authentication process and the key distribution processes P1, P2, and P3. According to such a key information control device 1, by notifying the communication device 2 on the unstable communication path, the communication device 2 on the unstable communication path can be notified by the communication device 2 on the unstable communication path in addition to the multicast communication. You can change the setting to send a message by cast communication.
  • the key information control device 1 when any communication device 2 communicates with the communication device 2 in an unstable communication path, a message is transmitted by unicast communication with a retransmission function in addition to multicast communication. You can change the setting to Thereby, according to this key information update system, a message can be reliably received by a communication partner. Furthermore, in the key information update system described above, the key information control apparatus 1 sets the interval at which the group key K (Gn) is transmitted by multicast communication as a predetermined period. On the other hand, when the communication device 2 has not received the group key K (Gn) for a predetermined period of time, it detects that the group key K (Gn) has not been received by multicast communication.
  • the key information control apparatus 1 operates according to a processing procedure as shown in FIG. First, in step S51, the key information control apparatus 1 performs timer setting for updating the group key K (Gn) by the timer unit 19. At this time, the control unit 11 sets a predetermined period for transmitting the key request message. In the next step S52, the timer unit 19 measures the predetermined period set in step S51. In the next step S53, the control unit 11 determines whether or not the timer value measured by the timer unit 19 has reached a predetermined time and has expired. If the timer value has expired, the process proceeds to step S54; otherwise, the timer process in step S52 is continued.
  • step S54 the communication unit 12 transmits a key update message for the latest group key K (Gn) derived by the encryption processing unit 16 by multicast communication according to the control of the control unit 11.
  • the key update message is transmitted from the key information control apparatus 1 every predetermined period.
  • the communication device 2 can measure a predetermined period by the timer unit 28 and detect a communication failure when the key update message is not received after the predetermined period.
  • the communication device 2 can transmit a key request message to the key information control device 1 when a communication failure is detected.
  • the timer unit 19 and the timer unit 28 measure the predetermined period.
  • the present invention is not limited to this, and a time for periodically transmitting the key update message may be set.
  • the key information update system since the key update message is periodically transmitted using a timer or time, a communication failure can be easily detected by the communication device 2.
  • the key request message can be transmitted immediately after the communication device 2 detects a communication failure. Therefore, according to this key information update system, it is possible to shorten the period for the communication device 2 with poor communication to resume communication using the new group key K (Gn).
  • the key information update system described above may distribute the recovery key to the key information control apparatus 1 and all the communication devices 2 in addition to the key encryption key KEK in the authentication process and the key distribution process. This recovery key is used to temporarily perform communication when the communication device 2 has a communication failure.
  • the key information control device 1 differs from the group key K (Gn) in that the key information control device 1 and a plurality of communication devices 2 are connected.
  • the recover key may be a recover key by generating a group key K (G0) or a group key K (G (maximum value of n)).
  • the group key is used from the group key K (G1).
  • the group key may be used from the group key K (G0).
  • the key information control device 1 distributes a recovery key after performing an authentication process between the key information control device 1 and the communication device 2. Thereafter, the key information update system transmits a new group key K (Gn) from the key information control device 1 to the communication device 2 by multicast communication. Thereby, the key information update system updates the group key K (Gn) of the communication device 2 to the group key K (Gn) transmitted from the key information control apparatus 1. Thereby, the key information update system sets the group key K (Gn) for the key information control device 1 and all the communication devices 2. At this time, a recovery key may be set. The key information control device 1 performs encrypted communication with the communication device 2 using the recovery key. For example, as shown in FIG.
  • a key update message for updating the latest group key K (Gn) to the group key K (G4) is transmitted.
  • the key information control apparatus 1 can detect that the updated group key K (G4) has not been received with reference to the EPOCH value transmitted from the communication devices 2A and 2B.
  • the key information control apparatus 1 transmits the group key K (G4) encrypted using the recovery key.
  • the key information control apparatus 1 transmits a key update message encrypted with one recovery key to both the communication devices 2A and 2B by unicast communication with a retransmission function.
  • a key update message is transmitted to a plurality of communication devices 2 by unicast communication with a retransmission function using a single recovery key. Can be sent.
  • the new group key K (Gn) can be easily distributed again only to the specific communication device 2. That is, it is not necessary to update the group key K (Gn) of all the communication devices 2, and it can be updated to a new group key K (Gn) with minimal communication.
  • the communication device 2 performs encrypted communication with the key information control device 1 and the other communication device 2 using the recovery key. For example, as illustrated in FIG.
  • the communication device 2 ⁇ / b> A cannot receive the multicast communication key update message (K (G4)) transmitted from the key information control apparatus 1.
  • K (G4) multicast communication key update message
  • the communication device 2A urgently needs to transmit a message to the other communication device 2 and the key information control device 1.
  • the communication device 2A cannot obtain a reception response even if it transmits a message encrypted with the old group key K (G3) by multicast communication. Therefore, the communication device 2A encrypts the message using the recovery key, and performs unicast communication with a retransmission function to the other communication devices 2 and the key information control device 1.
  • the communication device 2A can transmit the message to the other communication device 2 and the key information control device 1 by encrypting it with the recovery key even when the highly urgent message cannot be transmitted by multicast communication.
  • the above-described embodiment is an example of the present invention.
  • the present invention is not limited to the above-described embodiment, and various modifications can be made depending on the design and the like as long as the technical idea according to the present invention is not deviated from this embodiment. Of course, it is possible to change.

Abstract

L'invention concerne un dispositif de contrôle d'informations de clés, etc., avec lequel une communication est possible même si une mise à jour de clés de groupes a échoué. Des clés (K(Gn)) de groupes qui sont utilisées dans un réseau comprenant un dispositif (1) de contrôle d'informations de clés et une pluralité de dispositifs (2A, 2B, 2C) de communication sont mises à jour. De nouvelles clés (K(G1), K(G2), K(G3)) de groupes sont émises à partir du dispositif (1) de contrôle d'informations de clés par une communication en diffusion groupée, et les clés de groupes des dispositifs (2A, 2B, 2C) de communication sont mises à jour en adoptant les clés (K(Gn)) de groupes émises à partir du dispositif (1) de contrôle d'informations de clés. La valeur EPOCH, qui est une valeur figurant dans les informations émises à partir des dispositifs (2A, 2B, 2C) de communication qui est mise à jour chaque fois que la clé de groupe est mise à jour, est vérifiée et, si un dispositif (2A) de communication qui n'a pas reçu la clé (K(G3)) de groupe mise à jour est détecté, un message de mise à jour de clé est envoyé au dispositif (2A) de communication par une communication d'envoi individuel dotée d'une fonction de réémission.
PCT/IB2015/000006 2014-01-10 2015-01-05 Dispositif de contrôle d'informations de clés, dispositif de mise à jour d'informations de clés, programme et support d'enregistrement, procédé de mise à jour d'informations de clés, et système de mise à jour d'informations de clés WO2015104629A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2014-003550 2014-01-10
JP2014003550A JP6108235B2 (ja) 2014-01-10 2014-01-10 鍵情報制御装置、鍵情報更新装置、プログラム及び記録媒体、鍵情報更新方法、鍵情報更新システム

Publications (1)

Publication Number Publication Date
WO2015104629A1 true WO2015104629A1 (fr) 2015-07-16

Family

ID=53523582

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2015/000006 WO2015104629A1 (fr) 2014-01-10 2015-01-05 Dispositif de contrôle d'informations de clés, dispositif de mise à jour d'informations de clés, programme et support d'enregistrement, procédé de mise à jour d'informations de clés, et système de mise à jour d'informations de clés

Country Status (2)

Country Link
JP (1) JP6108235B2 (fr)
WO (1) WO2015104629A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113055159A (zh) * 2021-01-25 2021-06-29 兴业证券股份有限公司 一种数据脱敏方法和装置
US20220386117A1 (en) * 2021-05-28 2022-12-01 Cisco Technology, Inc. Encrypted nonces as rotated device addresses

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP6814976B2 (ja) * 2016-10-04 2021-01-20 パナソニックIpマネジメント株式会社 通信装置及び通信システム
US10530748B2 (en) 2016-10-24 2020-01-07 Fisher-Rosemount Systems, Inc. Publishing data across a data diode for secured process control communications
US10270745B2 (en) * 2016-10-24 2019-04-23 Fisher-Rosemount Systems, Inc. Securely transporting data across a data diode for secured process control communications
JP7263098B2 (ja) 2018-12-27 2023-04-24 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ 端末、通信方法、および、プログラム

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS6182547A (ja) * 1984-09-29 1986-04-26 Hitachi Ltd 秘密通信方式
JPH09319673A (ja) * 1996-05-27 1997-12-12 Matsushita Electric Works Ltd 暗号鍵更新方法およびそのシステム
JPH11274999A (ja) * 1998-03-25 1999-10-08 Hitachi Ltd 移動体通信方法および移動体通信システム
JP2000269951A (ja) * 1999-03-12 2000-09-29 Kodo Ido Tsushin Security Gijutsu Kenkyusho:Kk グループ暗号鍵の検証及び配送方法
JP2002247022A (ja) * 2001-02-22 2002-08-30 Nippon Telegr & Teleph Corp <Ntt> 情報配送方法、情報利用方法及びその実施装置並びにその処理プログラムと記録媒体
JP2003101533A (ja) * 2001-09-25 2003-04-04 Toshiba Corp 機器認証管理システム及び機器認証管理方法
JP2010517330A (ja) * 2007-01-18 2010-05-20 パナソニック電工株式会社 共有グループ鍵を利用して第2ノードグループを第1ノードグループに再加入させるための方法およびシステム

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS6182547A (ja) * 1984-09-29 1986-04-26 Hitachi Ltd 秘密通信方式
JPH09319673A (ja) * 1996-05-27 1997-12-12 Matsushita Electric Works Ltd 暗号鍵更新方法およびそのシステム
JPH11274999A (ja) * 1998-03-25 1999-10-08 Hitachi Ltd 移動体通信方法および移動体通信システム
JP2000269951A (ja) * 1999-03-12 2000-09-29 Kodo Ido Tsushin Security Gijutsu Kenkyusho:Kk グループ暗号鍵の検証及び配送方法
JP2002247022A (ja) * 2001-02-22 2002-08-30 Nippon Telegr & Teleph Corp <Ntt> 情報配送方法、情報利用方法及びその実施装置並びにその処理プログラムと記録媒体
JP2003101533A (ja) * 2001-09-25 2003-04-04 Toshiba Corp 機器認証管理システム及び機器認証管理方法
JP2010517330A (ja) * 2007-01-18 2010-05-20 パナソニック電工株式会社 共有グループ鍵を利用して第2ノードグループを第1ノードグループに再加入させるための方法およびシステム

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113055159A (zh) * 2021-01-25 2021-06-29 兴业证券股份有限公司 一种数据脱敏方法和装置
CN113055159B (zh) * 2021-01-25 2023-11-21 兴业证券股份有限公司 一种数据脱敏方法和装置
US20220386117A1 (en) * 2021-05-28 2022-12-01 Cisco Technology, Inc. Encrypted nonces as rotated device addresses
US11902775B2 (en) * 2021-05-28 2024-02-13 Cisco Technology, Inc. Encrypted nonces as rotated device addresses

Also Published As

Publication number Publication date
JP6108235B2 (ja) 2017-04-05
JP2015133589A (ja) 2015-07-23

Similar Documents

Publication Publication Date Title
WO2015104629A1 (fr) Dispositif de contrôle d&#39;informations de clés, dispositif de mise à jour d&#39;informations de clés, programme et support d&#39;enregistrement, procédé de mise à jour d&#39;informations de clés, et système de mise à jour d&#39;informations de clés
JP5975594B2 (ja) 通信端末及び通信システム
TWI454112B (zh) 通信網路金鑰管理
JP6617173B2 (ja) 複数のマネージャまたはアクセスポイントを有する無線ネットワークにおける独立したセキュリティ
JP6899378B2 (ja) ネットワークノード
US20140298037A1 (en) Method, apparatus, and system for securely transmitting data
US20170111357A1 (en) Authentication method and authentication system
US20120170751A1 (en) Cryptographic communication with mobile devices
JP5364796B2 (ja) 暗号情報送信端末
US8509438B2 (en) Key management in a wireless network using primary and secondary keys
JPWO2011114373A1 (ja) 通信装置、プログラムおよび方法
JPWO2008096396A1 (ja) 無線通信装置および暗号鍵更新方法
US8325914B2 (en) Providing secure communications for active RFID tags
JP2018182665A (ja) 通信装置、通信システム及び暗号化通信制御方法
US10348489B2 (en) Internet of things (IOT) method for updating a master key
WO2018177385A1 (fr) Procédé, appareil et dispositif de transmission de données
WO2011142353A1 (fr) Dispositif et procédé de communication
KR20150135032A (ko) Puf를 이용한 비밀키 업데이트 시스템 및 방법
WO2014147934A1 (fr) Dispositif de communication, système de communication et procédé de communication
US20120254617A1 (en) Method and system for establishing security connection between switch equipments
JP6179815B2 (ja) 暗号化データ通信装置、暗号化データ通信方法、プログラム、及び、記録媒体
JP4725070B2 (ja) 正規コンテンツ確認方法、コンテンツ送受信システム、送信機、および受信機
TWI455554B (zh) Communication systems, communication devices and communication methods, and computer programs
JPWO2020188679A1 (ja) 通信システム
KR20210126319A (ko) 키 관리 장치 및 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15735564

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15735564

Country of ref document: EP

Kind code of ref document: A1