[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

JPH10145351A - Encryption system for data communication - Google Patents

Encryption system for data communication

Info

Publication number
JPH10145351A
JPH10145351A JP8296156A JP29615696A JPH10145351A JP H10145351 A JPH10145351 A JP H10145351A JP 8296156 A JP8296156 A JP 8296156A JP 29615696 A JP29615696 A JP 29615696A JP H10145351 A JPH10145351 A JP H10145351A
Authority
JP
Japan
Prior art keywords
encryption
random number
information
key
initial value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
JP8296156A
Other languages
Japanese (ja)
Inventor
Hidesuke Mannami
秀祐 万浪
Namio Miura
七三生 三浦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hitachi Ltd
Original Assignee
Hitachi Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hitachi Ltd filed Critical Hitachi Ltd
Priority to JP8296156A priority Critical patent/JPH10145351A/en
Publication of JPH10145351A publication Critical patent/JPH10145351A/en
Pending legal-status Critical Current

Links

Landscapes

  • Computer And Data Communications (AREA)

Abstract

PROBLEM TO BE SOLVED: To allow the system to apply high-speed processing to encryption and decoding with one instruction during communication and to realize the encryption system with a high encryption security by allowing a transmitter side and a receiver side of a network system to possess a same initial value and a same pseudo-random number generating means, so as to produce a random number series. SOLUTION: A same pseudo-random number generating formula is possessed by both a transmitter side and a receiver side. At the start of communication, an initial value for encryption is transmitted, and a random number series is calculated. An encryption key 27 is decided, based on the random number string and a specific number of transmission information. Key information 27, and length 26 of the key are changed for each information transmission. Encryption is made for transmission information 28 by using the encryption key through exclusive OR (XOR) processing. The receiver side calculates a random number series similar to the case of the transmitter side to decide the key information. The transmitter side and the receiver side possess the same initial value and the same pseudo-random number generating formula (to obtain the same key information) and use this key information to obtain decoding information 19.

Description

【発明の詳細な説明】DETAILED DESCRIPTION OF THE INVENTION

【0001】[0001]

【発明の属する技術分野】送信側(サーバ)と受信側
(クライアント)の間の通信情報を暗号化する情報処理
システム。
BACKGROUND OF THE INVENTION An information processing system for encrypting communication information between a transmitting side (server) and a receiving side (client).

【0002】[0002]

【従来の技術】従来の技術では、暗号強度の強い暗号化
方式(RSA暗号やDES暗号など)を採用すると、暗
号化及び復号化のアルゴリズムは複雑となり、暗号化/
復号化の処理時間に多くの処理時間を割かれていた。ま
た、暗号化処理の処理時間の短いアルゴリズムを採用す
ると、暗号化の鍵の長さが一定のために暗号化情報を簡
単に解読される恐れがあった。
2. Description of the Related Art In the prior art, if an encryption method having a high encryption strength (such as RSA encryption or DES encryption) is employed, the encryption and decryption algorithms become complicated, and
A lot of processing time was devoted to the decoding processing time. Further, if an algorithm having a short processing time for the encryption processing is adopted, the encryption information may be easily decrypted because the length of the encryption key is constant.

【0003】[0003]

【発明が解決しようとする課題】上記従来技術では、高
トラヒックのデータ通信システムでは暗号強度の強い暗
号化方式を採用することはできなかった。高トラヒック
のデータ通信システムの暗号化方式は、暗号の強度を弱
いものにするか、またはデータ通信のレスポンスタイム
を犠牲にしながら暗号強度の強い方式を採用しなければ
ならなかった。
In the above-mentioned prior art, an encryption system having a high encryption strength could not be adopted in a high traffic data communication system. As an encryption method for a high traffic data communication system, a method having a weak encryption strength or a method having a strong encryption strength must be adopted while sacrificing the response time of data communication.

【0004】特にインターネットのWWW(World
Wide Web)では、HTMLで記述されたペー
ジに示された情報の送受信が可能であり、最近はメガバ
イト単位の情報を交換することも多くなってきている
が、多くの情報は無暗号化状態で送受信されているか、
または、強度の弱い暗号化によって送受信されている場
合がほとんどである。
In particular, the Internet WWW (World
Wide Web) can transmit and receive information shown on a page described in HTML. Recently, information on a megabyte basis has been frequently exchanged. However, most information is not encrypted. Sent or received
Or, in most cases, transmission and reception are performed by weak encryption.

【0005】本発明の目的は、暗号化処理をデータ通信
のレスポンスタイムにほとんど影響を与えない程度に抑
えつつ、かつ暗号強度の強い暗号化方式を実現すること
にある。
[0005] It is an object of the present invention to realize an encryption method in which encryption processing is suppressed to a level that hardly affects the response time of data communication and encryption strength is high.

【0006】[0006]

【課題を解決するための手段】図1は本発明の概念を示
す図である。
FIG. 1 is a diagram showing the concept of the present invention.

【0007】最初に同一の擬似乱数発生の公式を送信
側、受信側の双方で所有しておく。通信の開始にあたっ
て、まず暗号化の初期値を送信し、送信側及び受信側で
乱数列を生成する。送信側では乱数列と送信情報の固有
番号から乱数列を計算し、鍵情報を決定する。鍵情報は
暗号強度を高めるために、毎回の情報送信ごとに鍵の内
容および鍵の長さを変更する。
[0007] First, the same pseudorandom number generation formula is owned by both the transmitting side and the receiving side. At the start of communication, first, an initial value of encryption is transmitted, and a random number sequence is generated on the transmission side and the reception side. The transmitting side calculates a random number sequence from the random number sequence and the unique number of the transmission information, and determines key information. The key information changes the key content and key length every time information is transmitted in order to increase the encryption strength.

【0008】送信情報本体は、この暗号化鍵を用いて簡
単な命令群により暗号化する。ここでの簡単な命令群と
は、排他的論理和(XOR)などの1機械語命令または
少数の機械語命令で構成される命令群のことである。
The transmission information body is encrypted by using a simple instruction group using the encryption key. Here, the simple instruction group is an instruction group composed of one machine language instruction such as exclusive OR (XOR) or a small number of machine language instructions.

【0009】受信側では、送信側と同様に暗号化の初期
値と擬似乱数発生の公式から乱数列を生成し、受信情報
の固有番号と乱数列から鍵情報を決定する。ここでは、
通信の開始前に擬似乱数発生の公式と暗号化の初期値を
共有しているため同じ乱数列を得ることができ、従って
同じ鍵情報を得ることができる。これにより得た鍵情報
を用いて、復号化の命令群(暗号化の命令群の逆変換)
により復号化を行う。
On the receiving side, a random number sequence is generated from the initial value of encryption and the formula of pseudorandom number generation, and key information is determined from the unique number of the received information and the random number sequence, as in the transmitting side. here,
Since the pseudorandom number generation formula and the encryption initial value are shared before the start of communication, the same random number sequence can be obtained, and therefore the same key information can be obtained. Using the key information thus obtained, a group of instructions for decryption (inverse conversion of a group of instructions for encryption)
To perform decryption.

【0010】[0010]

【発明の実施の形態】本発明の実施の形態例を図表で説
明する。
DESCRIPTION OF THE PREFERRED EMBODIMENTS Embodiments of the present invention will be described with reference to the drawings.

【0011】図2は本発明の処理手順を示す図である。FIG. 2 is a diagram showing a processing procedure of the present invention.

【0012】擬似乱数発生公式10と擬似乱数発生公式
20は、同一のものをそれぞれクライアント側、サーバ
側で記憶装置に保存しておく。
The same pseudo-random number generation formula 10 and pseudo-random number generation formula 20 are stored in a storage device on the client side and the server side, respectively.

【0013】擬似乱数発生の公式としては、M系列乱数
列を利用し、特性多項式としては1回の排他的論理和で
乱数が発生できる3項式を選んでおく。(例えば、f
(x)=1+x32+x521など。)また、乱数列の1つ
の値のビット数を32ビットとしておく。
An M-sequence random number sequence is used as a formula for pseudorandom number generation, and a three-nominal expression capable of generating random numbers by one exclusive OR is selected as a characteristic polynomial. (For example, f
Such as (x) = 1 + x 32 + x 521. Also, the number of bits of one value of the random number sequence is set to 32 bits.

【0014】データ通信の開始にあたって、サーバで初
期値21および初期値22を決定し、これをクライアン
トに送信する。(初期同期)クライアントではこれらを
初期値11および初期値12として保存する。初期値2
1および初期値22は32ビットで表現できる任意の正
の奇数にする。WWW(World Wide We
b)での情報交換の場合、該当HTMLページのロード
時にこの初期同期を行う。クライアント側では、初期値
11および初期値12を元にして、M系列乱数の特性多
項式より、乱数列13および乱数列14を作成する。サ
ーバ側でも同様に乱数列23および乱数列24を作成す
る。初期値が一致しているため、乱数列13と乱数列2
3、乱数列14と乱数列24は一致する。
At the start of data communication, the server determines an initial value 21 and an initial value 22 and transmits them to the client. (Initial synchronization) The client stores these as an initial value 11 and an initial value 12. Initial value 2
1 and the initial value 22 are any positive odd numbers that can be represented by 32 bits. WWW (World Wide We
In the case of the information exchange in b), this initial synchronization is performed when the corresponding HTML page is loaded. On the client side, based on the initial value 11 and the initial value 12, a random number sequence 13 and a random number sequence 14 are created from the characteristic polynomial of the M-sequence random number. Similarly, the server creates a random number sequence 23 and a random number sequence 24. Since the initial values match, the random number sequence 13 and the random number sequence 2
3. The random number sequence 14 and the random number sequence 24 match.

【0015】サーバはクライアントからの送信依頼を受
け取ると、暗号化鍵情報の作成処理を開始する。乱数列
23と送信情報固有番号25を利用して、暗号化鍵の長
さ26を作成する。この暗号化鍵の長さ26は作成処理
を短縮するために乱数列23を元にした簡単な演算で作
成する。例えば、乱数列23の先頭から固有番号25番
目を利用する等。
[0015] Upon receiving the transmission request from the client, the server starts the process of creating encryption key information. The length 26 of the encryption key is created using the random number sequence 23 and the transmission information unique number 25. The length 26 of the encryption key is created by a simple calculation based on the random number sequence 23 in order to shorten the creation process. For example, the 25th unique number from the top of the random number sequence 23 is used.

【0016】次に乱数列24と送信情報固有番号25を
利用して、暗号化鍵27を作成する。この暗号化鍵27
は、暗号化鍵の長さ26の値と同じ個数を作成する。
Next, an encryption key 27 is created using the random number sequence 24 and the transmission information unique number 25. This encryption key 27
Creates the same number as the value of the encryption key length 26.

【0017】この方法により決定した暗号化鍵の長さ2
6と暗号化鍵27とにより、送信情報28の暗号化を行
う。
The length 2 of the encryption key determined by this method
6 and the encryption key 27, the transmission information 28 is encrypted.

【0018】暗号化にあたっては、4バイト(=32ビ
ット)ごとに排他的論理和(XOR)のみを利用して暗
号化し、暗号化に利用する機械命令を最短(1命令)に
て行う。この処理を鍵を先頭から順番に利用しながら、
暗号化鍵の長さ26回行い、鍵を最後まで利用し終える
と、また最初から鍵を再利用して暗号化して行く。これ
により暗号化情報29を得る。
At the time of encryption, encryption is performed using only exclusive OR (XOR) every 4 bytes (= 32 bits), and machine instructions used for encryption are performed in the shortest (one instruction). This process uses keys in order from the top,
The length of the encryption key is 26 times, and when the key is used up to the end, the key is reused and encrypted from the beginning. Thus, the encrypted information 29 is obtained.

【0019】サーバは送信情報固有番号25と暗号化情
報29をクライアントに送信する。
The server transmits the transmission information unique number 25 and the encryption information 29 to the client.

【0020】復号化処理は、クライアントにて同様のこ
とを行う。
In the decryption processing, the client performs the same operation.

【0021】クライアントでは、まず乱数列13と送信
情報固有番号15を利用して、暗号化鍵の長さ16を作
成し、乱数列14と送信情報固有番号15を利用して、
暗号化鍵175を得る。
The client first creates a length 16 of the encryption key using the random number sequence 13 and the transmission information unique number 15, and uses the random number sequence 14 and the transmission information unique number 15
An encryption key 175 is obtained.

【0022】この方法によりサーバで決定した暗号化鍵
の長さ26と暗号化鍵27と同じものが得られる。
According to this method, the same encryption key length 26 and encryption key 27 determined by the server can be obtained.

【0023】復号化にあたっては、4バイトごとに、排
他的論理和(XOR)を利用して復号化し、復号化情報
19を得ることができる。この復号化情報19の内容は
送信情報28の内容と一致する。
In decoding, decoding is performed by using an exclusive OR (XOR) for every 4 bytes, and decoding information 19 can be obtained. The content of the decryption information 19 matches the content of the transmission information 28.

【0024】[0024]

【発明の効果】本発明によれば、暗号化データ通信にお
いて以下の利点が得られる。
According to the present invention, the following advantages can be obtained in encrypted data communication.

【0025】(1)暗号化の通信ごとに鍵の長さを変え
ていてるので解読されにくい。
(1) Since the length of the key is changed for each encryption communication, it is difficult to decipher the key.

【0026】従来の方法では高速な暗号化処理は、鍵の
長さが一定のために通信文とその原文を1組入手される
と鍵の解読が容易になされていた。本発明の方式では、
通信文と原文を1組入手されても、その時に利用された
初期値の特定は極めて困難である。
In the conventional method, in the high-speed encryption processing, since the length of the key is constant, the key is easily decrypted when a pair of a communication message and its original text is obtained. In the method of the present invention,
Even if one set of a message and an original is obtained, it is extremely difficult to specify the initial value used at that time.

【0027】(2)暗号化および復号化が高速 従来の暗号強度の強い暗号化方式では、変換単位(8バ
イト程度)ごとにビットシフトやビット反転を繰り返
し、機械語命令で10命令以上の処理を行うために暗号
化および復号化の速度が遅かったが、本発明の方式では
通信文の4バイト毎に機械語命令1命令で、暗号化及び
復号化を行うため高速処理が可能である。
(2) High-speed encryption and decryption In the conventional encryption method with a high encryption strength, bit shift and bit inversion are repeated for each conversion unit (about 8 bytes), and processing of 10 or more machine language instructions is performed. However, in the method of the present invention, encryption and decryption are performed with one machine language instruction for every four bytes of a message, so that high-speed processing is possible.

【図面の簡単な説明】[Brief description of the drawings]

【図1】本発明の概念を示す図である。FIG. 1 is a diagram showing the concept of the present invention.

【図2】本発明の処理手順を示す図である。FIG. 2 is a diagram showing a processing procedure of the present invention.

【符号の説明】[Explanation of symbols]

10…擬似乱数発生公式(クライアント側)、11…乱
数列13を発生させるための初期値、12…乱数列14
を発生させるための初期値、13…暗号化鍵の長さ16
を得るための乱数列、14…暗号化鍵17を得るための
乱数列、15…送信情報固有番号(クライアント側)、
16…暗号化鍵の長さ(クライアント側)、17…暗号
化鍵(クライアント側)、 19…復号化情報、
20…擬似乱数発生公式(サーバ側)、21…乱数列2
3を発生させるための初期値、22…乱数列24を発生
させるための初期値、23…暗号化鍵の長さ26を得る
ための乱数列、24…暗号化鍵27を得るための乱数
列、25…送信情報固有番号(サーバ側)、26…暗号
化鍵の長さ(サーバ側)、 27…暗号化鍵(サ
ーバ側)、28…送信情報、
29…暗号化情報。
10: pseudo-random number generation formula (client side), 11: initial value for generating random number sequence 13, 12: random number sequence 14
, 13... Length of the encryption key 16
, A random number sequence for obtaining the encryption key 17, 15 a transmission information unique number (client side),
16: length of encryption key (client side), 17: encryption key (client side), 19: decryption information,
20: pseudo-random number generation formula (server side), 21: random number sequence 2
3, an initial value for generating a random number sequence 24, a random number sequence for obtaining an encryption key length 26, a random number sequence for obtaining an encryption key 27 , 25 ... transmission information unique number (server side), 26 ... length of encryption key (server side), 27 ... encryption key (server side), 28 ... transmission information,
29. Encrypted information.

Claims (2)

【特許請求の範囲】[Claims] 【請求項1】通信回線を利用して情報を送受信するネッ
トワークシステムの送信側と受信側において、同一の初
期値と同一の擬似乱数発生手段を所有して乱数列を発生
させることにより通信中の暗号化および復号化処理を1
命令ないし数命令にて高速処理した暗号化方式。
1. A transmitting side and a receiving side of a network system for transmitting and receiving information using a communication line possess the same initial value and the same pseudo-random number generating means to generate a random number sequence, thereby enabling communication during communication. One encryption and decryption process
An encryption method that is processed at high speed with instructions or several instructions.
【請求項2】インターネットのWWW(world W
ide Web)を利用して情報を送受信するシステム
の送信側(サーバ)と受信側(クライアント)におい
て、同一の初期値と同一の擬似乱数発生手段を所有して
乱数列を発生させることにより通信中の暗号化および復
号化処理を1命令ないし数命令にて高速処理した暗号化
方式。
2. The Internet WWW (world W)
The transmitting side (server) and the receiving side (client) of the system for transmitting and receiving information using ide Web) have the same initial value and the same pseudo-random number generating means and generate a random number sequence, thereby performing communication. An encryption method in which the encryption and decryption processing of the above is performed at high speed with one or several instructions.
JP8296156A 1996-11-08 1996-11-08 Encryption system for data communication Pending JPH10145351A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP8296156A JPH10145351A (en) 1996-11-08 1996-11-08 Encryption system for data communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP8296156A JPH10145351A (en) 1996-11-08 1996-11-08 Encryption system for data communication

Publications (1)

Publication Number Publication Date
JPH10145351A true JPH10145351A (en) 1998-05-29

Family

ID=17829894

Family Applications (1)

Application Number Title Priority Date Filing Date
JP8296156A Pending JPH10145351A (en) 1996-11-08 1996-11-08 Encryption system for data communication

Country Status (1)

Country Link
JP (1) JPH10145351A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR19990046545A (en) * 1999-03-29 1999-07-05 최종욱 coding transmitting-receiving apparatus and method
KR20030067934A (en) * 2002-02-09 2003-08-19 공형윤 Security system of wireless network using random connection node convolutional technique
US7400730B2 (en) 2003-05-19 2008-07-15 Nec Corporation Cryptographic communication method in communication system
US7702904B2 (en) 2002-11-15 2010-04-20 Nec Corporation Key management system and multicast delivery system using the same
CN102662483A (en) * 2012-02-28 2012-09-12 浪潮电子信息产业股份有限公司 A method for cloud computing business intelligent terminal users to safely input information
JP2016513383A (en) * 2013-01-19 2016-05-12 トロンデルト オーユー Safe streaming method in numerical control manufacturing system and safe numerical control manufacturing system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR19990046545A (en) * 1999-03-29 1999-07-05 최종욱 coding transmitting-receiving apparatus and method
KR20030067934A (en) * 2002-02-09 2003-08-19 공형윤 Security system of wireless network using random connection node convolutional technique
US7702904B2 (en) 2002-11-15 2010-04-20 Nec Corporation Key management system and multicast delivery system using the same
US7400730B2 (en) 2003-05-19 2008-07-15 Nec Corporation Cryptographic communication method in communication system
CN102662483A (en) * 2012-02-28 2012-09-12 浪潮电子信息产业股份有限公司 A method for cloud computing business intelligent terminal users to safely input information
JP2016513383A (en) * 2013-01-19 2016-05-12 トロンデルト オーユー Safe streaming method in numerical control manufacturing system and safe numerical control manufacturing system

Similar Documents

Publication Publication Date Title
EP0635956B1 (en) Encryption apparatus, communication system using the same and method therefor
JP4828068B2 (en) Computer efficient linear feedback shift register
US7224795B2 (en) Variable-length key cryptosystem
US5345508A (en) Method and apparatus for variable-overhead cached encryption
US7978851B2 (en) Keystream encryption device, method, and program
US7742601B2 (en) Encryption method using synchronized continuously calculated pseudo-random key
CA2291435C (en) Encryption/decryption method and authentication method using multiple-affine key system and apparatuses using the same
US5444781A (en) Method and apparatus for decryption using cache storage
RU2146421C1 (en) Decoding of data subjected to repeated transmission in encoding communication system
JP2628660B2 (en) Encryption / decryption method and apparatus
US20080013730A1 (en) Method and apparatus for re-synchronization of a stream cipher during handoff
CN114172651B (en) SM9 public key encryption algorithm and decryption algorithm GPU acceleration implementation method
JPH10145351A (en) Encryption system for data communication
JP2005012466A (en) Message authentication method and system
WO1994021066A1 (en) A method and apparatus for generating a digital message authentication code
JP3358954B2 (en) Pseudo-random bit string generator and cryptographic communication method using the same
JPH04335730A (en) Random ciphering communication system
JP2003032244A (en) Stream cipher apparatus
JPH1091066A (en) Pseudo random bit string generator and cipher communication method using the same
JPH10161535A (en) Cipher communication device
CN114978699B (en) Data encryption and data decryption methods, devices, equipment and storage medium
JP2000165377A (en) Encryption protocol converter, encryption protocol converting method and recording medium recording encryption protocol conversion program
WO2006073200A1 (en) Communication system and communication method
CN117857205A (en) Communication data rapid encryption method based on byte encryption algorithm cascade
KR100317250B1 (en) Method of Cryptographing Data