JPH01177229A - Key distributing system - Google Patents
Key distributing systemInfo
- Publication number
- JPH01177229A JPH01177229A JP63000959A JP95988A JPH01177229A JP H01177229 A JPH01177229 A JP H01177229A JP 63000959 A JP63000959 A JP 63000959A JP 95988 A JP95988 A JP 95988A JP H01177229 A JPH01177229 A JP H01177229A
- Authority
- JP
- Japan
- Prior art keywords
- key
- center
- user
- terminal
- code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000006243 chemical reaction Methods 0.000 claims abstract description 8
- 238000000034 method Methods 0.000 claims description 6
- 230000015654 memory Effects 0.000 abstract description 4
- 238000013478 data encryption standard Methods 0.000 description 6
- 238000010586 diagram Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
Abstract
Description
【発明の詳細な説明】
〔産業上の利用分野〕
本発明は暗号に用いるキーを生成し配送するキー配送方
式に関する。DETAILED DESCRIPTION OF THE INVENTION [Field of Industrial Application] The present invention relates to a key distribution system for generating and distributing keys used in encryption.
集中型のネットワークにおける従来のキー配送方式では
、センタが各ユーザとの間のキー暗号化キーを全て持っ
ていて、このキー暗号化キーを用いてデータ暗号化キー
を暗号化して配送する方式が多用されている。この場合
、各ユーザは自分のキー暗号化キーのみを持っていれば
よく、他のユーザのキー暗号化キーを持っている必要は
ない。In the conventional key distribution method in a centralized network, the center has all the key encryption keys for each user, and the data encryption key is encrypted and distributed using this key encryption key. It is widely used. In this case, each user only needs to have his or her own key-encrypting key, and does not need to have the key-encrypting keys of other users.
上述の方式では、センタは各ユーザとの間のキー暗号化
キーを全て持つ必要があるので、ユーザ数が増えてくる
とメモリが増え、しかも新規ユーザの加入ごとにその端
末用キー暗号化キーを追加する必要があると言う問題点
を有している。In the above method, the center needs to hold all the key encryption keys for each user, so as the number of users increases, the memory increases, and each time a new user joins, the center needs to hold all the key encryption keys for that terminal. There is a problem in that it is necessary to add .
本発明のキー配送方式は、センタと複数の端末とから成
るネットワークにおけるセンタと端末との間で暗号に用
いるキーを配送するキー配送方式において、前記端末の
ユーザ側はキーKをこのユーザが所持するコードCIで
暗号化したEc+(K)とこのユーザの識別情報IDI
とを共にセンタへ送り、前記センタは受取ったID、を
あらかじめ定められた特定の変換で変換して前記コード
C1を作成し、このC1で受取った前記Ec+(K)を
復号することにより前記キーKを得て、前記センタ側は
前記、ユーザの識別情報IDIをあらかじめ定められた
特定の変換で変換したCIで前記キーKを暗号化したE
c+(K)を前記端末へ送り、この端末は受取ったEc
+(K)を前記ユーザが前もって所持しているコードC
2を用いて復号化することにより前記キーKを得ること
により構成される。The key distribution method of the present invention is a key distribution method in which a key used for encryption is distributed between a center and a terminal in a network consisting of a center and a plurality of terminals. Ec+(K) encrypted with code CI and this user's identification information IDI
The center converts the received ID using a predetermined specific conversion to create the code C1, and decrypts the Ec+(K) received by C1 to obtain the key. After obtaining the key K, the center side encrypts the key K with a CI obtained by converting the user's identification information IDI using a predetermined specific conversion.
c+(K) to the terminal, and this terminal receives Ec
+(K) is the code C that the user previously possesses.
2 to obtain the key K.
以下、本発明の実施例について図面を参照して説明する
。Embodiments of the present invention will be described below with reference to the drawings.
第3図は本発明が適用されるシステムの一例の構成図で
ある。このシステムはセンタ101と複数の端末102
,103.・・・とから成るネットワークで、例えばコ
ンピュータネットワーク、或いはパソコン通信システム
などである。センタと各端末には暗号用プログラムが設
けられていて、キーさえ与えられればデータ等の暗号化
が実行できるようになっている。暗号用プログラムは例
えばアメリカ商務省標準局が制定したデータ暗号標準(
Data Encryption 5tandard、
以下DBSと記す)である。FIG. 3 is a configuration diagram of an example of a system to which the present invention is applied. This system includes a center 101 and multiple terminals 102.
, 103. ..., such as a computer network or a personal computer communication system. The center and each terminal are equipped with an encryption program, so that data can be encrypted as long as a key is given. An example of an encryption program is the data encryption standard established by the U.S. Department of Commerce Bureau of Standards.
Data Encryption 5 standard,
(hereinafter referred to as DBS).
第1図および第2図は本発明の一実施例の流れ図で、第
1図(a)が端末でキーを生成してセンタへ送る場合の
端末での暗号化を、第1図(b)が同じくセンタでの復
号化を、第2図(a)がセンタでキーを生成して端末に
送る場合のセンタでの暗号化を、第2図(b)が同じく
端末での復号化のフローを示している。キーとしては送
信側(端末からセンタへ)と受信側(センタから端末へ
)とで共通のディジタル・パターンが設定される。各ユ
ーザはセンタあるいはネットワークの管理機関からキー
暗号化キーに+を与えられている。Figures 1 and 2 are flowcharts of one embodiment of the present invention. Figure 1(a) shows encryption at the terminal when a key is generated at the terminal and sent to the center, and Figure 1(b) shows the encryption at the terminal. is the same decryption at the center, Figure 2 (a) is the encryption at the center when a key is generated at the center and sent to the terminal, and Figure 2 (b) is the same decryption flow at the terminal. It shows. A common digital pattern is set as the key on the transmitting side (from the terminal to the center) and on the receiving side (from the center to the terminal). Each user is given a + key encryption key by the center or network management authority.
ここで、ユーザiの識別情報をIDIとすると、Klは
に+ =f (I D+ )
で与えられる。fはセンタと管理機関のみが知っている
関数で、例えば前記DBSと秘密のコードMKを用いて
kl =DESMK(IDI )
で与えられる。DES□はMKをキーとするDESによ
る変換を示す。なお、DESでなくても秘密の関数なら
ばよい。Here, if the identification information of user i is IDI, Kl is given by + = f (ID+). f is a function known only to the center and the management organization, and is given by, for example, kl =DESMK(IDI) using the DBS and secret code MK. DES□ indicates conversion by DES using MK as a key. Note that it does not need to be DES as long as it is a secret function.
第1図(a)において、端末のキー生成プログラムを起
動すると、ランダムに選んだWKをキーとしくステップ
■)、このWKをユーザが入力したキー暗号化キーに+
で暗号化してEWK=EKl(WK)を得て(ステップ
■)、EWKをユーザの識別情報IDIと共にセンタへ
送る(ステップ■)。センタでは第1図(b)に従って
、IDIからキー暗号化キーに+を作成しくステップ■
)、EWKを復号化してキーWKを得る(ステップ■)
。ここでEK (X)およびDK (X)はそれぞ
れXをキーにで暗号化および復号化することを意味する
。例えばここでもDESを使える。In Figure 1(a), when the key generation program of the terminal is started, a randomly selected WK is used as a key and this WK is used as the key encryption key input by the user.
EWK=EKl(WK) is obtained (step ■), and the EWK is sent to the center together with the user's identification information IDI (step ■). At the center, follow the steps in Figure 1 (b) to create a + from the IDI to the key encryption key.
), decrypt EWK to obtain key WK (step ■)
. Here, EK (X) and DK (X) mean encryption and decryption using X as a key, respectively. For example, you can use DES here as well.
第2図(a)ではセンタがランダムにキーWKを生成し
くステップ■)、送信者の識別情報IDIをもとにキー
暗号化キーに+ =f (IDI )を生成しくステッ
プ■)、これでキーWKを暗号化してEWK=EK+
(WK>を得て(ステップ■)、このEWKを端末に送
る(ステップ■)。In Fig. 2 (a), the center randomly generates the key WK (step ■), generates + = f (IDI) as the key encryption key based on the sender's identification information IDI (step ■), and then Encrypt the key WK and EWK=EK+
(WK> is obtained (step ■), and this EWK is sent to the terminal (step ■).
端末では第2図(b)に示すように、暗号化キーEWK
を受信すると、ユーザが入力したキー暗号化キーに、で
復号化してWKを得る(ステップ[株])。As shown in Figure 2(b), the terminal uses the encryption key EWK.
When the WK is received, it is decrypted using the key encryption key input by the user to obtain the WK (step [shares]).
以上の実施例においては、暗号化や変換fにDESを用
いてソフトウェアにより処理するものとして説明したが
、ハードウェアによって処理してもよい。また、IDI
はユーザの識別情報でなく、端末のアドレスそのものを
用いることもできる。In the above embodiments, it has been explained that the encryption and conversion f are processed by software using DES, but they may be processed by hardware. Also, IDI
can also use the address of the terminal itself instead of the user's identification information.
以上詳細に説明したように、本発明を用いればセンタの
メモリが少なくて、新規ユーザ加入時にも変更の必要が
なく、容易にキーを配送できると言う効果がある。As described above in detail, the present invention has the advantage that the memory of the center is small, there is no need to change the center even when a new user joins, and keys can be easily distributed.
第1図および第2図はそれぞれ端末からセンタへ、およ
びセンタから端末への本発明の一実施例の流れ図、第3
図は本発明の適用されるシステムの一例を示す構成図で
ある。
101・・・センタ、102,103・・・端末。1 and 2 are flowcharts of an embodiment of the present invention from a terminal to a center and from a center to a terminal, respectively;
The figure is a configuration diagram showing an example of a system to which the present invention is applied. 101...Center, 102, 103...Terminal.
Claims (1)
センタと端末との間で暗号に用いるキーを配送するキー
配送方式において、前記端末のユーザ側はキーKをこの
ユーザが所持するコードC_1で暗号化したE_C_1
(K)とこのユーザの識別情報ID_1とを共にセンタ
へ送り、前記センタは受取ったID_1をあらかじめ定
められた特定の変換で変換して前記コードC_1を作成
し、このC_1で受取った前記E_C_1(K)を復号
することにより前記キーKを得て、前記センタ側は前記
ユーザの識別情報ID_1をあらかじめ定められた特定
の変換で変換したC_1で前記キーKを暗号化したE_
C_1(K)を前記端末へ送り、この端末は受取ったE
_C_1(K)を前記ユーザが前もって所持しているコ
ードC_1を用いて復号化することにより前記キーKを
得ることを特徴とするキー配送方式。In a key distribution method in which a key used for encryption is distributed between a center and a terminal in a network consisting of a center and a plurality of terminals, the user side of the terminal encrypts the key K with the code C_1 owned by this user E_C_1
(K) and this user's identification information ID_1 are sent together to the center, the center converts the received ID_1 with a predetermined specific conversion to create the code C_1, and the E_C_1 ( K) to obtain the key K, and the center encrypts the key K with C_1, which is obtained by converting the user's identification information ID_1 using a predetermined specific conversion.
C_1(K) to the terminal, and this terminal receives E
A key distribution method characterized in that the key K is obtained by decoding _C_1(K) using a code C_1 that the user previously possesses.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP63000959A JPH0618367B2 (en) | 1988-01-05 | 1988-01-05 | Key delivery method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP63000959A JPH0618367B2 (en) | 1988-01-05 | 1988-01-05 | Key delivery method |
Publications (2)
Publication Number | Publication Date |
---|---|
JPH01177229A true JPH01177229A (en) | 1989-07-13 |
JPH0618367B2 JPH0618367B2 (en) | 1994-03-09 |
Family
ID=11488193
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP63000959A Expired - Lifetime JPH0618367B2 (en) | 1988-01-05 | 1988-01-05 | Key delivery method |
Country Status (1)
Country | Link |
---|---|
JP (1) | JPH0618367B2 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0793148A (en) * | 1992-10-21 | 1995-04-07 | Internatl Business Mach Corp <Ibm> | Software distribution system |
JPH08204702A (en) * | 1995-01-30 | 1996-08-09 | Nec Corp | Cipher key management equipment |
USRE39802E1 (en) | 1992-03-16 | 2007-08-28 | Fujitsu Limited | Storage medium for preventing an irregular use by a third party |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS5967747A (en) * | 1982-10-12 | 1984-04-17 | Fujitsu Ltd | System for transmitting key of encryptor |
-
1988
- 1988-01-05 JP JP63000959A patent/JPH0618367B2/en not_active Expired - Lifetime
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS5967747A (en) * | 1982-10-12 | 1984-04-17 | Fujitsu Ltd | System for transmitting key of encryptor |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
USRE39802E1 (en) | 1992-03-16 | 2007-08-28 | Fujitsu Limited | Storage medium for preventing an irregular use by a third party |
JPH0793148A (en) * | 1992-10-21 | 1995-04-07 | Internatl Business Mach Corp <Ibm> | Software distribution system |
JPH08204702A (en) * | 1995-01-30 | 1996-08-09 | Nec Corp | Cipher key management equipment |
Also Published As
Publication number | Publication date |
---|---|
JPH0618367B2 (en) | 1994-03-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5227613A (en) | Secure encrypted data communication system having physically secure ic cards and session key generation based on card identifying information | |
US6988198B1 (en) | System and method for initializing operation for an information security operation | |
EP3654580B1 (en) | Communication device and communication method used in decentralized network | |
CA2056886A1 (en) | Method for secure communication | |
US7266705B2 (en) | Secure transmission of data within a distributed computer system | |
JPH08297638A (en) | User authentication system | |
CN113239403A (en) | Data sharing method and device | |
JP2002508892A (en) | Two-way authentication and encryption system | |
JP2020513169A (en) | Data encryption method and system using device authentication key | |
JPH10171717A (en) | Ic card and cipher communication system using the same | |
CN110225028B (en) | Distributed anti-counterfeiting system and method thereof | |
JPH10107832A (en) | Cipher multi-address mail system | |
JP4615128B2 (en) | Voice and data encryption method using encryption key split combiner | |
JPH01177229A (en) | Key distributing system | |
JP3674772B2 (en) | Multiple server login cooperation system, client device, login management device, server device, and storage medium | |
JPH01212039A (en) | Cryptographic key common share device | |
JPH07336328A (en) | Cipher device | |
JP2002063139A (en) | Terminal equipment and server device and terminal authenticating method | |
JPH08139718A (en) | Cipher device and inter-terminal communication method using the cipher device | |
JPH01233851A (en) | Cryptographic device | |
JP2004347636A (en) | Ticket processing system and method therefor | |
CN112702420B (en) | Processing method and system for online and offline data interaction | |
JPH0373633A (en) | Cryptographic communication system | |
JP2000349748A (en) | Secret information sharing method | |
JPH10164048A (en) | Secret keeping communication method in large-scale service and subscriber equipment and server therefor |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EXPY | Cancellation because of completion of term |