JPS63146630A - Open key exchange system between cryptographic equipment - Google Patents

Open key exchange system between cryptographic equipment

Info

Publication number
JPS63146630A
JPS63146630A JP61295502A JP29550286A JPS63146630A JP S63146630 A JPS63146630 A JP S63146630A JP 61295502 A JP61295502 A JP 61295502A JP 29550286 A JP29550286 A JP 29550286A JP S63146630 A JPS63146630 A JP S63146630A
Authority
JP
Japan
Prior art keywords
cryptographic
equipment
data
slave
master
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
JP61295502A
Other languages
Japanese (ja)
Inventor
Mitsuru Yanagisawa
柳沢 充
Masako Morioka
森岡 雅子
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujitsu Ltd
Original Assignee
Fujitsu Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujitsu Ltd filed Critical Fujitsu Ltd
Priority to JP61295502A priority Critical patent/JPS63146630A/en
Publication of JPS63146630A publication Critical patent/JPS63146630A/en
Pending legal-status Critical Current

Links

Abstract

PURPOSE:To prevent cryptographic communication using a erroneous cryptographic key from being started in advance by allowing a master cryptographic equipment receiving a data from a slave cryptographic equipment to collate a common data with encripted data in its own equipment and starting the cryptographic communication when they are coincident. CONSTITUTION:The master cryptographic equipment reads an open key X from an open key storage section 4 of its own equipment and sends the key by a transmission/ reception section 2. The slave cryptographic equipment receiving the key uses a cryptographic/decoding section 1 so as to encript the common data stored in advance in the common data storage section 6 by using the cryptographic key and sends the open key Y of its own equipment and the said encripted data toward the master equipment. The master cryptographic equipment uses a cryptographic key generated by a cryptographic key generating section 3 from the received open key Y and the open key X of its own equipment to encrypt the common data A and compares it with the data received and encripted by the slave cryptographic equipment, and sends an acknowledge toward the slave cryptographic equipment to start the cryptographic communication when they are coincident.

Description

【発明の詳細な説明】 [概 要] 従来、公開鍵交換により暗号鍵を生成するDES方式の
暗号装置において、回線異常や暗号生成時の演算異常等
が発生したとき、対向する暗号装置双方で異なる暗号鍵
が生成され、その状態で暗号通信が開始されてしまうた
め、不都合を生ずるという問題点があった。本発明はこ
のような問題点を解決するために、公開鍵交換時にスレ
ーブ暗号装置で共通データを暗号化してマスター暗号装
置へ送り、マスター暗号装置でそのデータと、自装置内
で共通データを暗号化したデータとを照合することによ
り、異なる暗号鍵での暗号通信を防ぐようにしたもので
ある。
[Detailed Description of the Invention] [Summary] Conventionally, in a DES cryptographic device that generates cryptographic keys through public key exchange, when a line abnormality or an arithmetic abnormality during code generation occurs, both opposing cryptographic devices There is a problem in that different encryption keys are generated and encrypted communication is started in that state, causing inconvenience. In order to solve these problems, the present invention encrypts common data with a slave cryptographic device during public key exchange and sends it to the master cryptographic device, and the master cryptographic device encrypts that data and the common data within its own device. This method prevents encrypted communications using different encryption keys by comparing the encrypted data with the encrypted data.

[産業上の利用分野〕 本発明はコンピュータ間またはホストコンピュータと端
末装置間の通信におけるデータを保護する目的の暗号通
信の制御に閃するものであって、特に公開鍵交換方式に
より暗号鍵を生成して暗号通信を行なうD E S方式
の暗号装置の制御に係る。
[Industrial Application Field] The present invention is directed to the control of encrypted communication for the purpose of protecting data in communication between computers or between a host computer and a terminal device, and in particular, the present invention is directed to the control of encrypted communication for the purpose of protecting data in communication between computers or between a host computer and a terminal device. This invention relates to the control of a DES encryption device that performs encrypted communication.

[従来の技術] 第3図は暗号通信の系の構成の例を示す図であって、5
0はホストコンピュータ、51は通信制御装置、52は
マスター暗号装置、53.55は変復調装置(モデム)
、54は通信回線、56はスレーブ暗号装置、57は端
末装置を表している。
[Prior Art] FIG. 3 is a diagram showing an example of the configuration of an encrypted communication system, with 5
0 is a host computer, 51 is a communication control device, 52 is a master cryptographic device, 53.55 is a modem (modem)
, 54 represents a communication line, 56 represents a slave cryptographic device, and 57 represents a terminal device.

同図において、ホストコンピュータ50が端末装置57
に送信すべきデータは通信制御装置51によってマスタ
ー暗号装置52に送り込まれ、該マスター暗号装置52
によって暗号化された後、モデム53によって変調され
て通信回線54に送出される。そして、端末装置57は
、これを受信した後、モデム55で復調してからスレー
ブ暗号装置56で解読する。
In the figure, a host computer 50 is connected to a terminal device 57.
The data to be transmitted to the master cryptographic device 52 is sent by the communication control device 51 to the master cryptographic device 52.
The data is encrypted by the modem 53, modulated by the modem 53, and sent to the communication line 54. After receiving this, the terminal device 57 demodulates it with the modem 55 and decrypts it with the slave encryption device 56.

端末装置57の側からの送信の場合にはスレー166号
装置57で送信データを暗号化し、上記と逆の経路によ
って転送された信号がマスター暗号装置52によって解
読される。
In the case of transmission from the terminal device 57 side, the transmitted data is encrypted by the Sley 166 device 57, and the signal transferred by the reverse route to the above is decoded by the master encryption device 52.

このような暗号通信の方式の一つとして、公開鍵交換方
式がある。
As one of such cryptographic communication methods, there is a public key exchange method.

第4図は従来の公開鍵交換方式の手順を示す図であって
、 図中Mはマスター暗号装置、Sはスレーブ暗号装置、X
はマスター暗号装置の公開鍵、Yはスレーブ暗号装置の
公開鍵、YAKはマスター暗号装置が正常にYを受信し
たことを示す信号を表している。
FIG. 4 is a diagram showing the procedure of a conventional public key exchange system, in which M is a master cryptographic device, S is a slave cryptographic device, and X is a slave cryptographic device.
represents the public key of the master cryptographic device, Y represents the public key of the slave cryptographic device, and YAK represents a signal indicating that the master cryptographic device successfully received Y.

同図に示すように、従来の公開鍵交換方式においては、
まずマスター暗号装置Mがスレーブ暗号装置Sに対して
マスター暗号装置の公開鍵Xを送信し、これを受信した
スレーブ暗号装置Sはマスター暗号装置Mに対してスレ
ーブ暗号装置の公開鍵Yを送信し、これを受信したマス
ター暗号装置Mはスレーブ暗号装置Sに対して信号YA
Kを送信する。そして、マスター暗号装置MはYAK送
信後、スレーブ暗号装置SはYAK受信後にそれぞれ自
己の公開鍵と相手の公開鍵とを基に暗号鍵を生成すると
いう手順を採っていた。
As shown in the figure, in the conventional public key exchange method,
First, the master cryptographic device M transmits the public key X of the master cryptographic device to the slave cryptographic device S, and the slave cryptographic device S, which receives this, transmits the public key Y of the slave cryptographic device to the master cryptographic device M. , upon receiving this, the master cryptographic device M sends a signal YA to the slave cryptographic device S.
Send K. Then, after the master cryptographic device M transmits the YAK, and the slave cryptographic device S receives the YAK, the procedure is such that each generates a cryptographic key based on its own public key and the public key of the other party.

[発明が解決しようとする問題点コ 上述したような従来の公開鍵交換方式では、公開鍵の交
換によりマスター暗号装置、スレーブ暗号装置双方で生
成された暗号鍵を照合する手段がないため、回線異常に
より公開鍵にデータ誤りが生じたり、暗号鍵生成時に演
算異常が生ずることにより、双方で生成された暗号鍵が
異なる場合でも、暗号鍵が異なったまま暗号通信を開始
してしまうという欠点があった。
[Problems to be solved by the invention] In the conventional public key exchange system as described above, there is no way to verify the encryption keys generated by both the master encryption device and the slave encryption device by exchanging public keys. The drawback is that even if the encryption keys generated by both parties are different due to data errors in the public key due to an error or arithmetic errors occurring during encryption key generation, encrypted communication will start with the encryption keys being different. there were.

本発明は、このような従来の欠点に鑑み、マスター暗号
装置とスレーブ暗号装置とがそれぞれ生成した暗号鍵が
異なったものとなったとき、これを検出して、誤った暗
号鍵による暗号通信が開始されることを未然に防止する
ことのできる制御方式を提供することを目的としている
In view of these conventional drawbacks, the present invention detects when the encryption keys generated by the master encryption device and the slave encryption device are different, and prevents encrypted communication using the wrong encryption key. The purpose of the present invention is to provide a control method that can prevent such events from occurring.

[問題点を解決するための手段] 本発明によれば上述の目的は前記特許請求の範囲に記載
のとおり、公開鍵交換方式により暗号鍵を生成するDE
S方式による暗号装置において、公開鍵を先に送る側の
暗号装置をマスター暗号装置としその相手側の暗号装置
をスレーブ暗号装置とするとき、マスター暗号装置とス
レーブ暗号装置とに同一のデータを共通データとして保
持する手段を設け、通信に際してマスター暗号装置から
の公開鍵を受信したスレーブ暗号装置が共通データを暗
号化したデータを自己の公開鍵に付加して送信し、該デ
ータを受信したマスター暗号装置が該データと自装置内
で共通データを暗号化したデータとを照合してそれらが
一致したとき暗号通信を開始すること奇特徴とする暗号
装置間の公開鍵交換方式により達成される。
[Means for Solving the Problems] According to the present invention, the above-mentioned object is achieved by a DE that generates an encryption key using a public key exchange method, as described in the claims.
In a cryptographic device based on the S method, when the cryptographic device that sends the public key first is the master cryptographic device and the cryptographic device on the other side is the slave cryptographic device, the master cryptographic device and the slave cryptographic device share the same data. A slave cryptographic device that receives a public key from a master cryptographic device during communication adds data obtained by encrypting the common data to its own public key and transmits it, and the master cryptographic device that receives the data This is achieved by a public key exchange method between cryptographic devices in which the device compares the data with the encrypted common data within the device and starts encrypted communication when they match.

[作 用コ 本発明の方式においては、マスター暗号装置とスレーブ
暗号装置間の公開鍵交換時に相手公開鍵を先に受は取る
スレーブ暗号装置が先に暗号鍵を生成し、共通データを
暗号化したデータを自己公開鍵に付加して送り、マスタ
ー暗号装置では、スレーブ暗号装置からの公開鍵により
暗号鍵を生成し、これにより共通データを暗号化したデ
ータとスレーブ暗号装置からのデータを照合して、それ
らが一致していることを確認してから暗号通信を開始す
るので、マスター暗号装置とスレーブ暗号装置とがそれ
ぞれ異なる暗号鍵を用いることによる不都合を未然に防
止することが可能である。
[Function] In the method of the present invention, during public key exchange between a master cryptographic device and a slave cryptographic device, the slave cryptographic device receives and receives the other party's public key first, generates an encryption key first, and encrypts common data. The master cryptographic device generates an encryption key using the public key from the slave cryptographic device, and uses this to match the encrypted common data with the data from the slave cryptographic device. Since encrypted communication is started after confirming that they match, it is possible to prevent inconveniences caused by the master encryption device and slave encryption device using different encryption keys.

[実施例] 第1図は本発明の一実施例のブロック図であって、(a
)はマスター暗号装置、(b)はスレーブ暗号装置につ
いて示している。
[Embodiment] FIG. 1 is a block diagram of an embodiment of the present invention, in which (a
) shows the master encryption device, and (b) shows the slave encryption device.

第1図において、1は暗号化/解読部、2は送受信部、
3は暗号鍵生成部、4は自装置の公開鍵保持部、5は相
手装置の公開鍵保持部、6は共通データ保持部、7は制
御部、8は比較部を表している。
In FIG. 1, 1 is an encryption/decryption section, 2 is a transmission/reception section,
Reference numeral 3 represents an encryption key generation unit, 4 a public key holding unit of the own device, 5 a public key holding unit of the other device, 6 a common data holding unit, 7 a control unit, and 8 a comparison unit.

第1図において、通常の暗号データの送信の場合はホス
トからのデータが、暗号化/解読部1によって暗号化さ
れ、これが送受信部2によってモデムへ送り込まれる。
In FIG. 1, in the case of normal transmission of encrypted data, data from a host is encrypted by an encrypting/decoding section 1, and sent to a modem by a transmitting/receiving section 2.

また、受信の場合はモデムからのデータが送受信部を経
て暗号化/解読部1により解読されてこれがホスト側に
送られる。
Further, in the case of reception, data from the modem passes through the transmitting/receiving section, is decrypted by the encrypting/decoding section 1, and is sent to the host side.

このような暗号通信の開始に当たって、マスター暗号装
置は、自装置の公開鍵保持部4から公開鍵Xを読み出し
これを送受信部2が送出する。
At the start of such encrypted communication, the master cryptographic device reads out the public key X from the public key holding section 4 of the master cryptographic device, and the transmitting/receiving section 2 sends this out.

これを受けたスレーブ暗号装置は、この公開鍵Xを相手
装置の公開鍵保持部5に格納すると共に、該公開鍵Xと
自装置の公開鍵保持部4に予め保持していた公開鍵Yと
を用いて暗号鍵生成部3によって暗号鍵を生成する。そ
して、共通データ保持部6に予め格納しておいた共通デ
ータAを暗号化/解読部1により前記暗号鍵を用いて暗
号化し、自装置の公開鍵Yと該暗号化したデータとをマ
スター装置に向けて送出する。
Upon receiving this, the slave cryptographic device stores this public key X in the public key holding unit 5 of the other device, and also combines the public key An encryption key is generated by the encryption key generation unit 3 using the following. Then, the encryption/decryption unit 1 encrypts the common data A previously stored in the common data holding unit 6 using the encryption key, and transfers the public key Y of the own device and the encrypted data to the master device. Send it towards.

マスター暗号装置側では、受信した公開鍵Yと自装置の
公開鍵Xとから暗号鍵生成部3が生成した暗号鍵を用い
て、暗号化/解読部1が共通データ保持部6に保持して
いた共通データAを暗号化し、これとスレーブ暗号装置
から受信した暗号化されたデータとを比較して、それら
が一致すれば、スレーブ暗号装置に向けて肯定的応答Y
AKを送出し、暗号通信を開始する。
On the master cryptographic device side, the encryption/decryption unit 1 uses the encryption key generated by the encryption key generation unit 3 from the received public key Y and the own public key It encrypts the common data A received from the slave cryptographic device, compares it with the encrypted data received from the slave cryptographic device, and if they match, sends an affirmative response Y to the slave cryptographic device.
Sends AK and starts encrypted communication.

第2図は本発明における公開鍵交換方式の手順を説明す
る図で、上述した暗号装置の動作に係る信号の送受信の
関係を更に理解し易い形に表示したものである。
FIG. 2 is a diagram illustrating the procedure of the public key exchange method according to the present invention, and shows the relationship between transmission and reception of signals related to the operation of the above-mentioned cryptographic device in a form that is easier to understand.

図中Mはマスター暗号装置 Sはスレーブ暗号装置、X
はマスター暗号装置の公開鍵、Yはスレーブ暗号装置の
公開鍵、K、に′はそれぞれスレーブ暗号装置、マスタ
ー暗号装置において生成した暗号鍵、Aはマスター暗号
装置とスレーブ暗号装置とで持つ同一の共通データ、C
K(A)、CK’ (A)はともにAとに、に′により
DBS演算を施し、暗号化したデータ、YAKはマスタ
ー暗号装置が正常にYを受信したことを示す信号である
。以下図に従って説明する。
In the diagram, M is the master cryptographic device, S is the slave cryptographic device, and X
is the public key of the master cryptographic device, Y is the public key of the slave cryptographic device, K and ′ are the cryptographic keys generated in the slave cryptographic device and the master cryptographic device, respectively, and A is the same encryption key held by the master cryptographic device and the slave cryptographic device. Common data, C
Both K(A) and CK'(A) are data encrypted by performing a DBS operation on A, and YAK is a signal indicating that the master cryptographic device has normally received Y. The explanation will be given below according to the figures.

SはMからXを受信後、PKDS演算を用いてKを生成
し、CK(A)を作成し、YをCK(A)とともにMへ
返信する。MではYとCK(A )を受信後、同様にに
′を生成しCK′(A)を作成する。そこでMにおいて
はCK(A)=Cに′(A)であるかどうかのチェック
をすることにより暗号鍵がM、S双方で正常に生成され
たことの確認を行い、正常ならばSへYAKを送信し、
暗号通信を開始する。もしCK(A)≠CK’ (A)
であるならば、再度公開鍵交換を行い、異なる暗号鍵で
の暗号通信を開始することを防ぐ。
After receiving X from M, S generates K using a PKDS operation, creates CK(A), and returns Y to M together with CK(A). After receiving Y and CK(A), M similarly generates CK'(A). Therefore, in M, by checking whether CK(A)='(A) in C, it is confirmed that the encryption key has been successfully generated on both M and S, and if it is normal, it is sent YAK to S. and send
Start encrypted communication. If CK(A)≠CK'(A)
If so, public key exchange is performed again to prevent the start of encrypted communication using a different encryption key.

[発明の効果] 以上説明したように本発明の方式によれば、マスター暗
号装置とスレーブ暗号装置双方で、それぞれ生成された
暗号鍵が不一致であるまま暗号通信を開始してしまうこ
とによる異常な通信の発生を回避することができるので
、安定で確実な暗号通信を行なうことが可能であるとい
う利点がある。
[Effects of the Invention] As explained above, according to the method of the present invention, abnormalities caused by starting encrypted communication while the encryption keys generated by both the master encryption device and the slave encryption device do not match can be prevented. Since the occurrence of communication can be avoided, there is an advantage that stable and reliable encrypted communication can be performed.

【図面の簡単な説明】[Brief explanation of the drawing]

第1図は本発明の一実施例のブロック図、第2図は本発
明の公開鍵交換方式の手順を説明する図、第3図は暗号
通信の系の構成の例を示す図、第4図は従来の公開鍵交
換方式の手順を示す図である。 1・・・・・・暗号化/解読部、2・・・・・・送受信
部、3・・・・・・暗号鍵生成部、4・・・・・・自装
置の公開鍵保持部、5・・・・・・相手装置の公rFf
!i鍵保持部、6・・・・・・共通データ保持部、7・
・・・・・制御部、8・・・・・・比較部! 代理人 弁理士 井 桁 貞 − 第 1 図
FIG. 1 is a block diagram of an embodiment of the present invention, FIG. 2 is a diagram explaining the procedure of the public key exchange method of the present invention, FIG. 3 is a diagram showing an example of the configuration of an encrypted communication system, and FIG. The figure shows the procedure of a conventional public key exchange method. 1...Encryption/decryption unit, 2...Transmission/reception unit, 3...Encryption key generation unit, 4...Public key holding unit of own device, 5...Public rFf of the partner device
! i key holding unit, 6...common data holding unit, 7.
...control section, 8...comparison section! Agent Patent Attorney Sada Igeta - Figure 1

Claims (1)

【特許請求の範囲】 公開鍵交換方式により暗号鍵を生成するDES方式によ
る暗号装置において、公開鍵を先に送る側の暗号装置を
マスター暗号装置としその相手側の暗号装置をスレーブ
暗号装置とするとき、 マスター暗号装置とスレーブ暗号装置とに同一のデータ
を共通データとして保持する手段を設け、 通信に際してマスター暗号装置からの公開鍵を受信した
スレーブ暗号装置が共通データを暗号化したデータを自
己の公開鍵に付加して送信し、 該データを受信したマスター暗号装置が該データと自装
置内で共通データを暗号化したデータとを照合してそれ
らが一致したとき暗号通信を開始することを特徴とする
暗号装置間の公開鍵交換方式。
[Scope of Claims] In a DES-based cryptographic device that generates cryptographic keys using a public key exchange method, the cryptographic device that sends the public key first is a master cryptographic device, and the cryptographic device on the other side is a slave cryptographic device. When the master cryptographic device and the slave cryptographic device are provided with means for holding the same data as common data, the slave cryptographic device, which has received the public key from the master cryptographic device during communication, encrypts the common data and encrypts it as its own data. The master cryptographic device that receives the data by adding it to the public key compares the data with data encrypted from common data within its own device, and starts encrypted communication when they match. A public key exchange method between cryptographic devices.
JP61295502A 1986-12-10 1986-12-10 Open key exchange system between cryptographic equipment Pending JPS63146630A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP61295502A JPS63146630A (en) 1986-12-10 1986-12-10 Open key exchange system between cryptographic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP61295502A JPS63146630A (en) 1986-12-10 1986-12-10 Open key exchange system between cryptographic equipment

Publications (1)

Publication Number Publication Date
JPS63146630A true JPS63146630A (en) 1988-06-18

Family

ID=17821442

Family Applications (1)

Application Number Title Priority Date Filing Date
JP61295502A Pending JPS63146630A (en) 1986-12-10 1986-12-10 Open key exchange system between cryptographic equipment

Country Status (1)

Country Link
JP (1) JPS63146630A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2017169017A (en) * 2016-03-16 2017-09-21 本田技研工業株式会社 Communication network device and communication method for vehicle
JP2020145498A (en) * 2019-03-04 2020-09-10 株式会社東芝 Communication control device and communication system
JP2020145497A (en) * 2019-03-04 2020-09-10 株式会社東芝 Communication control device and communication system
JP2020145499A (en) * 2019-03-04 2020-09-10 株式会社東芝 Communication control device and communication system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2017169017A (en) * 2016-03-16 2017-09-21 本田技研工業株式会社 Communication network device and communication method for vehicle
JP2020145498A (en) * 2019-03-04 2020-09-10 株式会社東芝 Communication control device and communication system
JP2020145497A (en) * 2019-03-04 2020-09-10 株式会社東芝 Communication control device and communication system
JP2020145499A (en) * 2019-03-04 2020-09-10 株式会社東芝 Communication control device and communication system

Similar Documents

Publication Publication Date Title
US5297208A (en) Secure file transfer system and method
US4322576A (en) Message format for secure communication over data links
EP0403656B1 (en) Communication equipment
CN112702318A (en) Communication encryption method, decryption method, client and server
JPH09107350A (en) Inter-equipment communication protection device
JPH11289324A (en) Transmitter-receiver and transmission-reception method therefor
JP3570327B2 (en) Proxy encryption communication system and method, and recording medium recording program
JPS61501001A (en) Encrypted transmission system
US20050015597A1 (en) Information transmission system, and information sending apparatus and information receiving apparatus used therein
JPS63278438A (en) Cryptographic system by secret cryptograph procedure
JPS63146630A (en) Open key exchange system between cryptographic equipment
JP2003234734A (en) Mutual authentication method, server device, client device, mutual authentication program and storage medium stored with mutual authentication program
JPH01307341A (en) Mobile body data ciphered communication system
US8156328B1 (en) Encryption method and device
JP2000115159A (en) Work protection system and work protection method therefor
CN112149167A (en) Data storage encryption method and device based on master-slave system
JPH0435538A (en) Encipherment communication system
US7327845B1 (en) Transmission of encrypted messages between a transmitter and a receiver utilizing a one-time cryptographic pad
KR100924951B1 (en) Network Interworking Security Gateway Apparatus and Method
US20230224284A1 (en) Method of controlling security key of vehicle
JP4057009B2 (en) Transmitting apparatus, receiving apparatus, and program recording medium
JP2001127751A (en) Encryption communication terminal, encryption communication center device, encryption communication system and recording medium
JP3164347B2 (en) IC tag
JP2850391B2 (en) Confidential communication relay system
JP2003273894A (en) Bridge device and method for transmission