[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

JPS5967747A - System for transmitting key of encryptor - Google Patents

System for transmitting key of encryptor

Info

Publication number
JPS5967747A
JPS5967747A JP57178862A JP17886282A JPS5967747A JP S5967747 A JPS5967747 A JP S5967747A JP 57178862 A JP57178862 A JP 57178862A JP 17886282 A JP17886282 A JP 17886282A JP S5967747 A JPS5967747 A JP S5967747A
Authority
JP
Japan
Prior art keywords
key
common
encryptor
encryption
master station
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
JP57178862A
Other languages
Japanese (ja)
Inventor
Toshiyuki Yamamoto
山元 利行
Masao Yamazawa
昌夫 山澤
Takayuki Ozaki
隆之 尾崎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujitsu Ltd
Original Assignee
Fujitsu Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujitsu Ltd filed Critical Fujitsu Ltd
Priority to JP57178862A priority Critical patent/JPS5967747A/en
Publication of JPS5967747A publication Critical patent/JPS5967747A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Small-Scale Networks (AREA)

Abstract

PURPOSE:To eliminate the need for the management of key even in multi-drop connection, by encrypting a common enryption key at a master station side and distributing it to slave stations, with each key formed between a data communication line encryptor of the master station side and each slave station side, by using the open key distributing system. CONSTITUTION:An open key KA is distributed from an encryptor 2 at master station side with a secret key alphaA and an open key YA is distributed from an encryptor 7 at slave station with an encryption key betaA. The arithmetic is executed at the encryptor 2 by the YA and alphaA and at the encryptor 7 by the XA and betaA to produce a key KA in common to both. A signal EKAK encrypting the common encryption key K with the key KA is transmitted from the encryptor 2 to the encryptor 7. The encryptor 7 decodes the common encryptor key with the key KA to obtain the common enryption key K. Thus, the key management is not required by only keeping the secrecy of the common encryption key K at the master station.

Description

【発明の詳細な説明】 (a)  発明のj支何分’if 本発明はマルチドロップ鼠続の通信システムに通用され
るデータ心情回祿暗号装置に共通な暗号化鍵を設定する
際、鍵管理の必要のない暗号装置のの鍵配送方式に関す
る。
[Detailed Description of the Invention] (a) Summary of the Invention The present invention provides a method for setting a common encryption key in a data processing encryption device used in a multi-drop communication system. This invention relates to a key distribution method for cryptographic devices that does not require management.

fb)  従米技9トjと問題点 マルチドrJツブ汲絖の心情システムに、J用されるデ
ータ通信回線暗号装置に、共通1.lt号化1ヰを設置
dに、マスター#1!(共通な暗号化魅を配送するため
の暗号iト)をセットしておいて、このマスター廊で共
」な暗号化鍵を廿号化して親局より配送するがあり、又
後者は共通な暗号化鍵を通信回縁で送れるものの、マス
タ邦の管理をする必要があり管μV不元分で一度マスタ
ーわLが漏れると通信回想上を流れる共i1な暗号化鍵
(は)剪胱さJ゛じCしまう欠点がある。
fb) The common 1. Install lt number 1 on d, master #1! (encryption key for delivering a common encryption key) is set, and the common encryption key is encrypted in this master channel and delivered from the master station, and the latter is a common encryption key. Although the encryption key can be sent over the communication line, it is necessary to manage the master key, and once the master key is leaked in the pipe μV, the common encryption key that flows over the communication network will be shredded. There is a drawback that J゛jiC.

(C)  発明の目的 本9色明の目的は、マルチドロツノ汰就の通信システム
に逸妥されるデータ遡信回線鴎号装〔lに共通な咄号化
鍵を設定する際、上記の欠点をなくし、鍵a理の全く必
要のない暗号装置の鍵配送方式の提供に′ある。
(C) Object of the Invention The purpose of this invention is to solve the above-mentioned drawbacks when setting a common encryption key for a data retrace line encryption system that is compromised in a multi-purpose communication system. The object of the present invention is to provide a key distribution method for a cryptographic device that eliminates the need for key management.

(d)  発明の構成 本発明は上記の目的を達成するために1親局側暗号装置
と各子局−りの暗号装置tMJで、各々−力性関数を吠
用した公開鍵配送方式で公開鍵を相互に配送し多い両省
共通の誕を生成し、この生成された、各親局と子局側で
異なる良で、共通の暗号化鍵を暗号化して、咳親ノり側
+1iち装置〃−ら各子局側へ送1hシ、該各子〜担り
の1111′g=J較阪では谷々の生成された鍵で、こ
の送1ばされできた共通の暗号化鍵を復号化することに
より、K親局及び各子局の絹号装置に共通なHty号化
誕が設定されることを%敵とする。
(d) Structure of the Invention In order to achieve the above object, the present invention uses a cryptographic device at one master station and a cryptographic device tMJ at each slave station, each using a public key distribution method using a force function. A common encryption key is generated between the two ministries by mutually distributing keys, and the generated common encryption key is encrypted on each master station and slave station side, and the cough parent side + 1 device is encrypted with a common encryption key. 1h is sent to each slave station, and 1111'g of each slave station is decrypted using the generated key of Taniya. By doing so, it is assumed that a common Hty code birth is set for the silk code devices of the K master station and each slave station.

tea  発明の央#例 以下本発明りl−に凡例につき−に従って説明する0 第1図はデーターm(ii回緘晰号賑ばを南するマルチ
ドロップ汝続り)ftllBシステムの1例のブロック
図1第2図は本発明の実施例の鍵配送方式の配送手順図
である。
Tea Central of the Invention #Example The present invention will be described below with reference to the legend.0 Figure 1 is a block diagram of an example of a data m (ii) multi-drop system that runs south of the bus. FIG. 1 and FIG. 2 are distribution procedure diagrams of the key distribution method according to the embodiment of the present invention.

図中1はホストコンビ二一タ、2,7〜9暗号装置、3
〜6はモデム、10〜12はデータ端末、13は通信回
線を示す。
In the figure, 1 is a host combinator, 2, 7 to 9 cryptographic devices, 3
-6 are modems, 10-12 are data terminals, and 13 is a communication line.

公開鍵配送方式(PKDS方式)とは一方向性関門 数(He l 1man及び叔erkleらのべき乗関
数)を使用した鍵配送方式であり、対向局から各自の公
開鍵X、  Yを各自の秘密鍵α、βを使用して配送し
あい、両局に共通な鍵を対向局で生成する方式である。
The public key distribution method (PKDS method) is a key distribution method using a one-way barrier number (the power function of Helman and Ankerkle et al.), in which the public keys This is a method in which keys α and β are used to distribute the keys to each other, and the opposite station generates a key common to both stations.

ポイントッーポイント接続の場合はこの公開鍵配送方式
を実施することで両者共通の鍵が生成されこれを暗号化
鍵として使用される。しかしマルチドロップ接続の場合
は親局と各々の子局間モ公開鍵配送方式を実施するγと
各々別々の鍵が出来てしまい、このままでは共通な暗号
化鍵として使用出来ない。そこでこの公開鍵配送方式で
生成された別々の鍵で共通の鎚を暗号化して親局側から
各子局側へと送信し、子局側では上記生成てれた別々の
鍵で復号化すれば共通な暗号化鍵が得られる。この鍵配
送方式の手順を第1図第2図を用いて以下説明する。親
局側の暗号装置2から公開鍵KAを秘密鍵α人で、子局
側の暗号装置1t7から公開鍵YAを秘密鍵βAで82
図の上段に示す如く各々配送しあう。暗号装置2では受
信した公開鍵YAと秘密鍵αAより、暗号装置7は受信
した公開MXAと秘密鍵βAより各々演算を行い両者共
通のMKAを生成する。この生成された鍵KAでもって
、共通の暗号化−Kを暗号化した信号EKA (K)を
暗号装[2より暗号装置7へと送信する。暗号装置7で
は上記の生成された11%!KAで、この送信されてき
たMKAで暗号化された共通の暗号化鍵を復号化して共
通の暗号化l1lIt!Kを得る。これと同様な操作を
、親局側の暗号装置2及び子局側の暗号装置81ujで
は第2図の中段に示す如く公開鍵XB YBを使用して
各々の秘密鍵αBβBを用いて配送しあい両者共通の鉢
KBを生成し共通の暗号化fi1!Kを、この生成され
た鍵KBにて暗号化した信号EXE(K)を暗号装置2
よシ暗号装[8に送9暗号装置8ではiii!Knで復
号化して共通の暗号化#!Kを得る。
In the case of a point-to-point connection, by implementing this public key distribution method, a key common to both parties is generated and used as an encryption key. However, in the case of a multi-drop connection, separate keys are created for γ, which implements the public key distribution method between the master station and each slave station, and cannot be used as a common encryption key as it is. Therefore, a common hammer is encrypted using separate keys generated using this public key distribution method and sent from the master station to each slave station, and the slave stations decrypt it using the separate keys generated above. A common encryption key can be obtained. The procedure of this key distribution method will be explained below using FIGS. 1 and 2. The public key KA is sent from the encryption device 2 on the master station side as the private key α, and the public key YA is sent as the private key βA from the encryption device 1t7 on the slave station side.
They are delivered to each other as shown in the upper part of the figure. The cryptographic device 2 performs calculations using the received public key YA and private key αA, and the cryptographic device 7 performs calculations using the received public MXA and private key βA to generate an MKA common to both. Using this generated key KA, a signal EKA (K), which is an encrypted common encryption -K, is transmitted from the encryption device [2 to the encryption device 7. In cryptographic device 7, the above generated 11%! The KA decrypts the sent common encryption key encrypted by the MKA and creates the common encryption l1lIt! Get K. A similar operation is carried out by the encryption device 2 on the master station side and the encryption device 81uj on the slave station side, as shown in the middle part of FIG. Generate a common pot KB and use common encryption fi1! The signal EXE(K) obtained by encrypting K with the generated key KB is sent to the encryption device 2.
Yoshi cipher system [send to 8 9 cipher device 8 iii! Decrypt with Kn and use common encryption #! Get K.

親局側の暗号装置2と子局側の暗号装置9間でも第2図
下段に示す如く以上と同様の操作を行ない暗号装R9は
共通な暗号化鍵Kを得る以上の如欠して親局側の暗号装
置2及び子局側の暗号装置7〜9は共通の暗号化鍵に′
6:得ることが出来る。従ってこの方式では親局側で共
通の暗号化UKの秘密を保てば鍵管理の必要はなくなる
The same operation as above is performed between the encryption device 2 on the master station side and the encryption device 9 on the slave station side, as shown in the lower part of FIG. The encryption device 2 on the central station side and the encryption devices 7 to 9 on the slave station side use a common encryption key.
6: It can be obtained. Therefore, in this system, if the master station maintains the secret of the common encryption UK, there is no need for key management.

(fl  発明の効果 以上詳細に説明せる如く本発明によれば、公開鍵配送方
式で親局側と各子局側のデータ通信回線暗ツブ接続の場
合でも鍵管理の必要がなくなる効果がある。
(fl) Effects of the Invention As explained in detail above, the present invention has the advantage of eliminating the need for key management even in the case of private data communication line connections between the master station and each slave station using the public key distribution method.

【図面の簡単な説明】[Brief explanation of drawings]

第1図はデータ通信回線暗号装置を有するマルチドロッ
プ接続の通信システムの1例のブロック図、第2図は本
発明の実施例の鍵配送方式の配送手順図である。 図中1はホストコンピュータ、2.7〜9は暗号装置、
3〜6はモデム、10〜12はデータ端末、13は通信
回想を示。
FIG. 1 is a block diagram of an example of a multi-drop connection communication system having a data communication line encryption device, and FIG. 2 is a distribution procedure diagram of a key distribution method according to an embodiment of the present invention. In the figure, 1 is a host computer, 2.7 to 9 are encryption devices,
3 to 6 are modems, 10 to 12 are data terminals, and 13 is a communication recollection.

Claims (1)

【特許請求の範囲】[Claims] マルチドロップwhのi11信システムに通用されるj
〜夕通信回癲qH−号装誼の共通な暗号化錐配送に隙し
、親局側暗号装置と谷子加側の暗号装置間で、名々一方
向性関数に1更用した公開鍵配送方式で公開鮭を相互(
C配送しあい両省共通の鍵を生成し、この生成さ)L/
こ、谷税局と子局向で典なる鍵で共通の1lli号化鍵
を扇号化して該親局側暗号装置から谷子hIj廿)リヘ
込(jj L ’i該谷子局bt+の暗号装置では否々
の生成いれた1に4 ”’にの送(flされできた共通
の暗号化ν18を覗す化することにより、該親局及び6
子〕1すの唱づ装置准に共通な暗号化鍵が設定されるこ
とを嚇C<<とjoる暗号装置の鍵配送方式。
J used in multi-drop wh i11 communication system
~ Evening Communication Circular QH - Taking advantage of the common encryption key distribution of encryption, public key distribution using a one-way function between the encryption device on the master station side and the encryption device on the Taniko side is carried out. Mutual public salmon (
C. A key common to both ministries is generated, and this generation) L/
Now, the common 1lli encryption key is fan-encrypted using the key that is the key for the valley tax bureau and the slave station, and then sent from the master station side encryption device to the valley tax station bt+ encryption device. Now, by making the generated common encryption ν18 visible, the master station and the 6
1. A key distribution method for cryptographic devices that threatens to set a common encryption key to all devices.
JP57178862A 1982-10-12 1982-10-12 System for transmitting key of encryptor Pending JPS5967747A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP57178862A JPS5967747A (en) 1982-10-12 1982-10-12 System for transmitting key of encryptor

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP57178862A JPS5967747A (en) 1982-10-12 1982-10-12 System for transmitting key of encryptor

Publications (1)

Publication Number Publication Date
JPS5967747A true JPS5967747A (en) 1984-04-17

Family

ID=16055980

Family Applications (1)

Application Number Title Priority Date Filing Date
JP57178862A Pending JPS5967747A (en) 1982-10-12 1982-10-12 System for transmitting key of encryptor

Country Status (1)

Country Link
JP (1) JPS5967747A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH01177229A (en) * 1988-01-05 1989-07-13 Nec Corp Key distributing system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH01177229A (en) * 1988-01-05 1989-07-13 Nec Corp Key distributing system

Similar Documents

Publication Publication Date Title
TW543312B (en) Multi-node encryption and key delivery
CN109412794B (en) Quantum key automatic charging method and system suitable for power business
JPH03243035A (en) System and method for ciphered communication
CN111385085B (en) Quantum three-level key system implementation method and system
JPH04297157A (en) Data ciphering device
JPH10107832A (en) Cipher multi-address mail system
CN105681253A (en) Data encryption transmission method, equipment and gateway in centralized network
CN103384233B (en) A kind of methods, devices and systems for acting on behalf of conversion
CN105376221A (en) Game message encryption mechanism based on dynamic password, and game system
CN107659405A (en) The encrypting and decrypting method that data communicate between a kind of transformer station boss station
JPH0193230A (en) System for sharing variable secret information
JPH01225251A (en) Secret key delivering system
JPS5967747A (en) System for transmitting key of encryptor
CN106961330A (en) Quantum key service station
CN106452754A (en) Multiplayer online dynamic encryption method and apparatus
JP2000059352A (en) Encryption communication system
JPH01212039A (en) Cryptographic key common share device
CN111010386B (en) Privacy protection and data supervision control method based on shared account book
CN112019553B (en) Data sharing method based on IBE/IBBE
JPS61163746A (en) Cipher key distributing system
CN104243409A (en) Terminal-to-terminal data transmission method
JPH06197105A (en) Multi-address key distributing device
JPH02195377A (en) Ic card provided with key sharing function
JPS6253042A (en) Distributing system for cryptographic key
JPS6346028A (en) Cryptographic key distribution system