[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

JPH01177229A - Key distributing system - Google Patents

Key distributing system

Info

Publication number
JPH01177229A
JPH01177229A JP63000959A JP95988A JPH01177229A JP H01177229 A JPH01177229 A JP H01177229A JP 63000959 A JP63000959 A JP 63000959A JP 95988 A JP95988 A JP 95988A JP H01177229 A JPH01177229 A JP H01177229A
Authority
JP
Japan
Prior art keywords
key
center
user
terminal
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
JP63000959A
Other languages
Japanese (ja)
Other versions
JPH0618367B2 (en
Inventor
Eiji Okamoto
栄司 岡本
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NEC Corp
Original Assignee
NEC Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NEC Corp filed Critical NEC Corp
Priority to JP63000959A priority Critical patent/JPH0618367B2/en
Publication of JPH01177229A publication Critical patent/JPH01177229A/en
Publication of JPH0618367B2 publication Critical patent/JPH0618367B2/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Abstract

PURPOSE:To prevent an increase in memory by providing a program for cipher between a center and each terminal and making ciphering of data executable if a key is given. CONSTITUTION:This system is constituted of a center 101 and plural terminals 102, 103.... The user of each terminal sends a ciphered key EC1(K) obtained by ciphering a key K with the code C1 held by the user to the center 101 together with the identifying information (ID1) of the user and the center 101 produces the code C1 by converting the received information ID1 by performing prefixed specific conversion and decodes the ciphered key EC1 (K) so as to obtain the key K. Then the center 101 sends the ciphered key EC1(K) produced by ciphering the key K by using the code C1 obtained by performing prefixed specifiic conversion on the identifying information ID1 to the terminal and, on the terminal side, when the user decodes the received ciphered key EC1(K) by using the code C1 held by the user in advance and obtains the key K. Therefore, it is not necessary to increase the number of memories to be used at the center 101.

Description

【発明の詳細な説明】 〔産業上の利用分野〕 本発明は暗号に用いるキーを生成し配送するキー配送方
式に関する。
DETAILED DESCRIPTION OF THE INVENTION [Field of Industrial Application] The present invention relates to a key distribution system for generating and distributing keys used in encryption.

〔従来の技術〕[Conventional technology]

集中型のネットワークにおける従来のキー配送方式では
、センタが各ユーザとの間のキー暗号化キーを全て持っ
ていて、このキー暗号化キーを用いてデータ暗号化キー
を暗号化して配送する方式が多用されている。この場合
、各ユーザは自分のキー暗号化キーのみを持っていれば
よく、他のユーザのキー暗号化キーを持っている必要は
ない。
In the conventional key distribution method in a centralized network, the center has all the key encryption keys for each user, and the data encryption key is encrypted and distributed using this key encryption key. It is widely used. In this case, each user only needs to have his or her own key-encrypting key, and does not need to have the key-encrypting keys of other users.

〔発明が解決しようとする問題点〕[Problem that the invention seeks to solve]

上述の方式では、センタは各ユーザとの間のキー暗号化
キーを全て持つ必要があるので、ユーザ数が増えてくる
とメモリが増え、しかも新規ユーザの加入ごとにその端
末用キー暗号化キーを追加する必要があると言う問題点
を有している。
In the above method, the center needs to hold all the key encryption keys for each user, so as the number of users increases, the memory increases, and each time a new user joins, the center needs to hold all the key encryption keys for that terminal. There is a problem in that it is necessary to add .

〔問題点を解決するための手段〕[Means for solving problems]

本発明のキー配送方式は、センタと複数の端末とから成
るネットワークにおけるセンタと端末との間で暗号に用
いるキーを配送するキー配送方式において、前記端末の
ユーザ側はキーKをこのユーザが所持するコードCIで
暗号化したEc+(K)とこのユーザの識別情報IDI
とを共にセンタへ送り、前記センタは受取ったID、を
あらかじめ定められた特定の変換で変換して前記コード
C1を作成し、このC1で受取った前記Ec+(K)を
復号することにより前記キーKを得て、前記センタ側は
前記、ユーザの識別情報IDIをあらかじめ定められた
特定の変換で変換したCIで前記キーKを暗号化したE
c+(K)を前記端末へ送り、この端末は受取ったEc
+(K)を前記ユーザが前もって所持しているコードC
2を用いて復号化することにより前記キーKを得ること
により構成される。
The key distribution method of the present invention is a key distribution method in which a key used for encryption is distributed between a center and a terminal in a network consisting of a center and a plurality of terminals. Ec+(K) encrypted with code CI and this user's identification information IDI
The center converts the received ID using a predetermined specific conversion to create the code C1, and decrypts the Ec+(K) received by C1 to obtain the key. After obtaining the key K, the center side encrypts the key K with a CI obtained by converting the user's identification information IDI using a predetermined specific conversion.
c+(K) to the terminal, and this terminal receives Ec
+(K) is the code C that the user previously possesses.
2 to obtain the key K.

〔実施例〕〔Example〕

以下、本発明の実施例について図面を参照して説明する
Embodiments of the present invention will be described below with reference to the drawings.

第3図は本発明が適用されるシステムの一例の構成図で
ある。このシステムはセンタ101と複数の端末102
,103.・・・とから成るネットワークで、例えばコ
ンピュータネットワーク、或いはパソコン通信システム
などである。センタと各端末には暗号用プログラムが設
けられていて、キーさえ与えられればデータ等の暗号化
が実行できるようになっている。暗号用プログラムは例
えばアメリカ商務省標準局が制定したデータ暗号標準(
Data Encryption 5tandard、
以下DBSと記す)である。
FIG. 3 is a configuration diagram of an example of a system to which the present invention is applied. This system includes a center 101 and multiple terminals 102.
, 103. ..., such as a computer network or a personal computer communication system. The center and each terminal are equipped with an encryption program, so that data can be encrypted as long as a key is given. An example of an encryption program is the data encryption standard established by the U.S. Department of Commerce Bureau of Standards.
Data Encryption 5 standard,
(hereinafter referred to as DBS).

第1図および第2図は本発明の一実施例の流れ図で、第
1図(a)が端末でキーを生成してセンタへ送る場合の
端末での暗号化を、第1図(b)が同じくセンタでの復
号化を、第2図(a)がセンタでキーを生成して端末に
送る場合のセンタでの暗号化を、第2図(b)が同じく
端末での復号化のフローを示している。キーとしては送
信側(端末からセンタへ)と受信側(センタから端末へ
)とで共通のディジタル・パターンが設定される。各ユ
ーザはセンタあるいはネットワークの管理機関からキー
暗号化キーに+を与えられている。
Figures 1 and 2 are flowcharts of one embodiment of the present invention. Figure 1(a) shows encryption at the terminal when a key is generated at the terminal and sent to the center, and Figure 1(b) shows the encryption at the terminal. is the same decryption at the center, Figure 2 (a) is the encryption at the center when a key is generated at the center and sent to the terminal, and Figure 2 (b) is the same decryption flow at the terminal. It shows. A common digital pattern is set as the key on the transmitting side (from the terminal to the center) and on the receiving side (from the center to the terminal). Each user is given a + key encryption key by the center or network management authority.

ここで、ユーザiの識別情報をIDIとすると、Klは に+ =f (I D+ ) で与えられる。fはセンタと管理機関のみが知っている
関数で、例えば前記DBSと秘密のコードMKを用いて kl =DESMK(IDI ) で与えられる。DES□はMKをキーとするDESによ
る変換を示す。なお、DESでなくても秘密の関数なら
ばよい。
Here, if the identification information of user i is IDI, Kl is given by + = f (ID+). f is a function known only to the center and the management organization, and is given by, for example, kl =DESMK(IDI) using the DBS and secret code MK. DES□ indicates conversion by DES using MK as a key. Note that it does not need to be DES as long as it is a secret function.

第1図(a)において、端末のキー生成プログラムを起
動すると、ランダムに選んだWKをキーとしくステップ
■)、このWKをユーザが入力したキー暗号化キーに+
で暗号化してEWK=EKl(WK)を得て(ステップ
■)、EWKをユーザの識別情報IDIと共にセンタへ
送る(ステップ■)。センタでは第1図(b)に従って
、IDIからキー暗号化キーに+を作成しくステップ■
)、EWKを復号化してキーWKを得る(ステップ■)
。ここでEK  (X)およびDK  (X)はそれぞ
れXをキーにで暗号化および復号化することを意味する
。例えばここでもDESを使える。
In Figure 1(a), when the key generation program of the terminal is started, a randomly selected WK is used as a key and this WK is used as the key encryption key input by the user.
EWK=EKl(WK) is obtained (step ■), and the EWK is sent to the center together with the user's identification information IDI (step ■). At the center, follow the steps in Figure 1 (b) to create a + from the IDI to the key encryption key.
), decrypt EWK to obtain key WK (step ■)
. Here, EK (X) and DK (X) mean encryption and decryption using X as a key, respectively. For example, you can use DES here as well.

第2図(a)ではセンタがランダムにキーWKを生成し
くステップ■)、送信者の識別情報IDIをもとにキー
暗号化キーに+ =f (IDI )を生成しくステッ
プ■)、これでキーWKを暗号化してEWK=EK+ 
(WK>を得て(ステップ■)、このEWKを端末に送
る(ステップ■)。
In Fig. 2 (a), the center randomly generates the key WK (step ■), generates + = f (IDI) as the key encryption key based on the sender's identification information IDI (step ■), and then Encrypt the key WK and EWK=EK+
(WK> is obtained (step ■), and this EWK is sent to the terminal (step ■).

端末では第2図(b)に示すように、暗号化キーEWK
を受信すると、ユーザが入力したキー暗号化キーに、で
復号化してWKを得る(ステップ[株])。
As shown in Figure 2(b), the terminal uses the encryption key EWK.
When the WK is received, it is decrypted using the key encryption key input by the user to obtain the WK (step [shares]).

以上の実施例においては、暗号化や変換fにDESを用
いてソフトウェアにより処理するものとして説明したが
、ハードウェアによって処理してもよい。また、IDI
はユーザの識別情報でなく、端末のアドレスそのものを
用いることもできる。
In the above embodiments, it has been explained that the encryption and conversion f are processed by software using DES, but they may be processed by hardware. Also, IDI
can also use the address of the terminal itself instead of the user's identification information.

〔発明の効果〕〔Effect of the invention〕

以上詳細に説明したように、本発明を用いればセンタの
メモリが少なくて、新規ユーザ加入時にも変更の必要が
なく、容易にキーを配送できると言う効果がある。
As described above in detail, the present invention has the advantage that the memory of the center is small, there is no need to change the center even when a new user joins, and keys can be easily distributed.

【図面の簡単な説明】[Brief explanation of the drawing]

第1図および第2図はそれぞれ端末からセンタへ、およ
びセンタから端末への本発明の一実施例の流れ図、第3
図は本発明の適用されるシステムの一例を示す構成図で
ある。 101・・・センタ、102,103・・・端末。
1 and 2 are flowcharts of an embodiment of the present invention from a terminal to a center and from a center to a terminal, respectively;
The figure is a configuration diagram showing an example of a system to which the present invention is applied. 101...Center, 102, 103...Terminal.

Claims (1)

【特許請求の範囲】[Claims]  センタと複数の端末とから成るネットワークにおける
センタと端末との間で暗号に用いるキーを配送するキー
配送方式において、前記端末のユーザ側はキーKをこの
ユーザが所持するコードC_1で暗号化したE_C_1
(K)とこのユーザの識別情報ID_1とを共にセンタ
へ送り、前記センタは受取ったID_1をあらかじめ定
められた特定の変換で変換して前記コードC_1を作成
し、このC_1で受取った前記E_C_1(K)を復号
することにより前記キーKを得て、前記センタ側は前記
ユーザの識別情報ID_1をあらかじめ定められた特定
の変換で変換したC_1で前記キーKを暗号化したE_
C_1(K)を前記端末へ送り、この端末は受取ったE
_C_1(K)を前記ユーザが前もって所持しているコ
ードC_1を用いて復号化することにより前記キーKを
得ることを特徴とするキー配送方式。
In a key distribution method in which a key used for encryption is distributed between a center and a terminal in a network consisting of a center and a plurality of terminals, the user side of the terminal encrypts the key K with the code C_1 owned by this user E_C_1
(K) and this user's identification information ID_1 are sent together to the center, the center converts the received ID_1 with a predetermined specific conversion to create the code C_1, and the E_C_1 ( K) to obtain the key K, and the center encrypts the key K with C_1, which is obtained by converting the user's identification information ID_1 using a predetermined specific conversion.
C_1(K) to the terminal, and this terminal receives E
A key distribution method characterized in that the key K is obtained by decoding _C_1(K) using a code C_1 that the user previously possesses.
JP63000959A 1988-01-05 1988-01-05 Key delivery method Expired - Lifetime JPH0618367B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP63000959A JPH0618367B2 (en) 1988-01-05 1988-01-05 Key delivery method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP63000959A JPH0618367B2 (en) 1988-01-05 1988-01-05 Key delivery method

Publications (2)

Publication Number Publication Date
JPH01177229A true JPH01177229A (en) 1989-07-13
JPH0618367B2 JPH0618367B2 (en) 1994-03-09

Family

ID=11488193

Family Applications (1)

Application Number Title Priority Date Filing Date
JP63000959A Expired - Lifetime JPH0618367B2 (en) 1988-01-05 1988-01-05 Key delivery method

Country Status (1)

Country Link
JP (1) JPH0618367B2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0793148A (en) * 1992-10-21 1995-04-07 Internatl Business Mach Corp <Ibm> Software distribution system
JPH08204702A (en) * 1995-01-30 1996-08-09 Nec Corp Cipher key management equipment
USRE39802E1 (en) 1992-03-16 2007-08-28 Fujitsu Limited Storage medium for preventing an irregular use by a third party

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS5967747A (en) * 1982-10-12 1984-04-17 Fujitsu Ltd System for transmitting key of encryptor

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS5967747A (en) * 1982-10-12 1984-04-17 Fujitsu Ltd System for transmitting key of encryptor

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
USRE39802E1 (en) 1992-03-16 2007-08-28 Fujitsu Limited Storage medium for preventing an irregular use by a third party
JPH0793148A (en) * 1992-10-21 1995-04-07 Internatl Business Mach Corp <Ibm> Software distribution system
JPH08204702A (en) * 1995-01-30 1996-08-09 Nec Corp Cipher key management equipment

Also Published As

Publication number Publication date
JPH0618367B2 (en) 1994-03-09

Similar Documents

Publication Publication Date Title
US5227613A (en) Secure encrypted data communication system having physically secure ic cards and session key generation based on card identifying information
US6988198B1 (en) System and method for initializing operation for an information security operation
EP3654580B1 (en) Communication device and communication method used in decentralized network
CA2056886A1 (en) Method for secure communication
US7266705B2 (en) Secure transmission of data within a distributed computer system
JPH08297638A (en) User authentication system
CN113239403A (en) Data sharing method and device
JP2002508892A (en) Two-way authentication and encryption system
JP2020513169A (en) Data encryption method and system using device authentication key
JPH10171717A (en) Ic card and cipher communication system using the same
CN110225028B (en) Distributed anti-counterfeiting system and method thereof
JPH10107832A (en) Cipher multi-address mail system
JP4615128B2 (en) Voice and data encryption method using encryption key split combiner
JPH01177229A (en) Key distributing system
JP3674772B2 (en) Multiple server login cooperation system, client device, login management device, server device, and storage medium
JPH01212039A (en) Cryptographic key common share device
JPH07336328A (en) Cipher device
JP2002063139A (en) Terminal equipment and server device and terminal authenticating method
JPH08139718A (en) Cipher device and inter-terminal communication method using the cipher device
JPH01233851A (en) Cryptographic device
JP2004347636A (en) Ticket processing system and method therefor
CN112702420B (en) Processing method and system for online and offline data interaction
JPH0373633A (en) Cryptographic communication system
JP2000349748A (en) Secret information sharing method
JPH10164048A (en) Secret keeping communication method in large-scale service and subscriber equipment and server therefor

Legal Events

Date Code Title Description
EXPY Cancellation because of completion of term