JPH0728407A - Ciphering preprocessor and deciphering postprocessor by cipher - Google Patents
Ciphering preprocessor and deciphering postprocessor by cipherInfo
- Publication number
- JPH0728407A JPH0728407A JP5174526A JP17452693A JPH0728407A JP H0728407 A JPH0728407 A JP H0728407A JP 5174526 A JP5174526 A JP 5174526A JP 17452693 A JP17452693 A JP 17452693A JP H0728407 A JPH0728407 A JP H0728407A
- Authority
- JP
- Japan
- Prior art keywords
- plaintext
- encryption
- blocks
- input
- random
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000000903 blocking effect Effects 0.000 claims description 12
- 238000007781 pre-processing Methods 0.000 claims description 12
- 238000012805 post-processing Methods 0.000 claims description 8
- 238000012545 processing Methods 0.000 description 6
- 238000010586 diagram Methods 0.000 description 4
- 238000004891 communication Methods 0.000 description 2
- 238000003780 insertion Methods 0.000 description 2
- 230000037431 insertion Effects 0.000 description 2
- 238000000034 method Methods 0.000 description 1
Abstract
Description
【0001】[0001]
【産業上の利用分野】本発明は、暗号化および復号装置
に関するものである。BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to an encryption / decryption device.
【0002】[0002]
【従来の技術】DES(昭51−108701暗号装
置、たとえば「現代暗号理論」池野信一、小山謙二著、
社団法人電子情報通信学会1986年の第3章に解説)
やRSA(上記「現代暗号理論」第6章に解説)に代表
される従来の暗号方式は、平文をある一定長の長さに区
切ることによってブロック化し、それぞれのブロックを
独立にあるいは順次暗号化することによって平文全体の
暗号文を得ることを特徴としている。2. Description of the Related Art DES (Sho 51-108701 cryptographic device, for example, "Modern cryptographic theory" written by Shinichi Ikeno and Kenji Koyama,
(Explanation in Chapter 3 of the Institute of Electronics, Information and Communication Engineers 1986)
The conventional cryptosystems, such as RSA and RSA (discussed in Chapter 6 of "Modern Cryptography" above), are divided into blocks by dividing plaintext into certain lengths, and each block is encrypted independently or sequentially It is characterized by obtaining the ciphertext of the whole plaintext by doing.
【0003】一般に上記のような従来の暗号系では大き
なファイルや通信文を暗号化しようとする場合、平文は
多くのブロックに分割される。これらのブロックは通常
同一の鍵で暗号化される。このような同一の鍵で暗号化
された多数のブロックは、平文が解読者に知れてしまう
と、秘密鍵を推定する手がかりとなるおそれがある。Generally, in the conventional encryption system as described above, when an attempt is made to encrypt a large file or communication text, the plain text is divided into many blocks. These blocks are usually encrypted with the same key. If the plaintext of many blocks encrypted with such an identical key becomes known to the decryption person, there is a risk that it may be a clue to deduce the secret key.
【0004】[0004]
【発明が解決しようとする課題】本発明の目的は、暗号
方式において、暗号文と平文の両方が解読者に知れてし
まっても秘密鍵を容易に推定することが依然として困難
であるようにするための暗号化の前処理装置および復号
の後処理装置を提供することである。SUMMARY OF THE INVENTION It is an object of the present invention to make it difficult in cryptographic systems to easily deduce the secret key even if both the ciphertext and the plaintext are known to the decrypter. It is to provide an encryption pre-processing device and a decryption post-processing device.
【0005】[0005]
【課題を解決するための手段】第1の発明の暗号化前処
理装置は、暗号装置の入力の前処理を行う暗号化前処理
装置において、暗号化されるべき平文の列を入力する入
力手段と、入力された平文列を予め定められた長さ毎に
区切ってブロック化するブロック化手段と、ランダムな
ビットを繰り返し発生する乱数発生手段と、前記ブロッ
ク化手段によってブロック化されたそれぞれのブロック
の予め定められた位置に前記乱数発生手段で発生したラ
ンダムなビットを挿入する挿入手段と、前挿入手段によ
ってランダムなビットを挿入されたブロックを順次暗号
装置に受け渡すための出力手段を有することを特徴とす
る。According to a first aspect of the present invention, there is provided an encryption preprocessing device for inputting a plaintext string to be encrypted in an encryption preprocessing device for performing preprocessing of an input of an encryption device. A block unit that divides the input plaintext string into blocks by dividing it into predetermined lengths, a random number generator that repeatedly generates random bits, and each block that is blocked by the block unit. Inserting means for inserting a random bit generated by the random number generating means at a predetermined position, and output means for sequentially passing the block in which the random bit is inserted by the pre-inserting means to the encryption device. Is characterized by.
【0006】第2の発明の復号後処理装置は、暗号文を
復号する復号装置の出力に対して後処理を施して平文を
出力する復号後処理装置において、暗号装置から復号さ
れた平文列を受け取るための入力手段と、入力された平
文列を予め定められた長さ毎に区切ってブロック化する
ブロック化手段と、前記ブロック化手段によりブロック
化されたそれぞれのブロックから予め定められた位置の
ビット除去する冗長ビット除去手段と、前着冗長ビット
除去手段によって加工された平文列を最終的な平文とし
て出力する平文列出力手段を有することを特徴とする。A decryption post-processing device according to a second aspect of the present invention is a decryption post-processing device that performs post-processing on the output of a decryption device for decrypting a ciphertext and outputs a plaintext. Input means for receiving, blocking means for dividing the input plaintext string into blocks by a predetermined length, and a predetermined position from each block blocked by the blocking means. The present invention is characterized by including redundant bit removing means for removing bits and plaintext string output means for outputting the plaintext string processed by the preceding arrival redundant bit removing means as a final plaintext.
【0007】[0007]
【作用】本発明における暗号化の前処理および後処理に
ついて述べる。The pre-processing and post-processing of encryption in the present invention will be described.
【0008】一般に暗号方式は、単に暗号文から平文が
推定できないだけではなく、暗号文と平文の組から暗号
鍵が容易に推定できないことが要求される。Generally, a cryptosystem is required not only to be able to infer a plaintext from a ciphertext but also to be unable to easily infer an encryption key from a set of a ciphertext and a plaintext.
【0009】本発明の暗号化前処理装置および復号後処
理装置においては、本来の平文に冗長ビットを挿入する
ことにより実際に暗号化装置の入力となる平文を生成す
る仕組みになっている。挿入されるビット列は暗号化を
行う装置と同じ装置内で暗号化処理の直前に生成するこ
とが可能なので通常の平文と比較してその内容が第三者
に漏れる可能性が著しく小さい。したがって、本来の平
文が漏れたとしても実際に暗号化に用いられた平文の全
容を知られる可能性はほとんどなく、結果として既知平
文攻撃を喫するおそれが小さい。In the pre-encryption processing apparatus and the post-decryption processing apparatus of the present invention, a redundant bit is inserted into the original plaintext to generate a plaintext that is actually input to the encryption apparatus. Since the bit string to be inserted can be generated immediately before the encryption processing in the same device as the device that performs the encryption, the possibility that the content will be leaked to a third party is significantly smaller than that of ordinary plain text. Therefore, even if the original plaintext is leaked, there is almost no possibility that the entire plaintext actually used for encryption is known, and as a result, a known plaintext attack is less likely to occur.
【0010】また、挿入するビットはその内容を予め受
信者と打ち合わせておく必要がなく、ブロック長と付加
するビットの位置だけを打ち合わせておけば十分であ
り、しかもこれらの情報は秘密にしておく必要もない。
したがって、送信者および受信者が管理しなければなら
ない秘密情報が増えることはない。Further, it is not necessary to discuss the contents of the bit to be inserted with the receiver in advance, it is sufficient to discuss only the block length and the position of the bit to be added, and the information is kept secret. There is no need.
Therefore, the secret information that the sender and the receiver have to manage does not increase.
【0011】[0011]
【実施例】図1に第1の発明の暗号化前処理装置の実施
例を、図2に図1の実施例中に用いる乱数発生手段の一
構成例を、図3に第2の発明の復号後処理装置の実施例
を示した。DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS FIG. 1 shows an embodiment of an encryption preprocessing device of the first invention, FIG. 2 shows an example of the configuration of a random number generating means used in the embodiment of FIG. 1, and FIG. An embodiment of the post-decoding processing device has been shown.
【0012】図1において暗号化前処理装置は、平文列
入力手段11、ブロック化手段12、乱数発生手段1
3、挿入手段14および出力手段15とからなる。平文
の列が平文入力手段11から入力されると、ブロック化
手段12において該平文列を予め定められたビット数毎
に区切りブロック化する。挿入手段14では、乱数発生
手段13で生成されたランダムなビットを各々のブロッ
クの予め定められた位置に挿入する。出力装置15はそ
の結果得られたビットの列を暗号化装置の入力として暗
号化装置に受け渡す。In FIG. 1, the encryption preprocessing apparatus comprises a plaintext string input means 11, a blocking means 12, and a random number generation means 1.
3, the insertion means 14 and the output means 15. When a plaintext string is input from the plaintext input means 11, the block forming means 12 divides the plaintext string into blocks by a predetermined number of bits. The inserting means 14 inserts the random bit generated by the random number generating means 13 into a predetermined position of each block. The output device 15 transfers the resulting bit string to the encryption device as an input of the encryption device.
【0013】図2は、第1の発明の暗号化前処理装置の
一構成要素である乱数発生手段13の一構成例である。
この例では、計算機内のタイムスタンプを暗号鍵、初期
定数を平文としてDESによる暗号化を行い、暗号文を
回帰させて繰り返し暗号化を行う。この際、暗号文の先
頭の1ビットをランダムなビットとして挿入手段14に
受け渡す。挿入手段14がランダムなビットを1ビット
要求する度に、上記DESによる暗号化を行うことによ
り、乱数発生手段13としての機能が実現される。FIG. 2 shows an example of the configuration of the random number generating means 13, which is a component of the encryption preprocessing device of the first invention.
In this example, DES encryption is performed using a time stamp in the computer as an encryption key and an initial constant as plaintext, and the ciphertext is regressed to repeatedly perform encryption. At this time, the leading 1 bit of the ciphertext is passed to the inserting means 14 as a random bit. The function as the random number generation means 13 is realized by performing encryption by the DES every time the insertion means 14 requests one random bit.
【0014】図3において復号後処理装置は、入力手段
31、ブロック化手段32、冗長ビット除去手段33お
よび平文列出力手段34とからなる。入力手段31は、
暗号装置の復号装置から復号処理の済んだビット列を受
け取りブロック化手段32に受け渡す。ブロック化手段
32は該ビット列をあらかじめ定められたビット数毎に
区切りブロック化し、冗長ビット除去手段33に受け渡
す。冗長ビット除去手段33は、受け取った核ブロック
の予め定められた位置のビットを除去し平文列出力手段
33に受け渡す。平文列出力手段34は受け取ったビッ
ト列を外部に出力する。In FIG. 3, the post-decoding processing device comprises input means 31, blocking means 32, redundant bit removing means 33, and plaintext sequence output means 34. The input means 31 is
The decrypted bit string is received from the decryption device of the encryption device and passed to the blocking means 32. The block forming means 32 divides the bit string into blocks by a predetermined number of bits, and transfers them to the redundant bit removing means 33. The redundant bit removing means 33 removes the bit at the predetermined position of the received kernel block and delivers it to the plaintext string output means 33. The plaintext string output means 34 outputs the received bit string to the outside.
【0015】上記実施例における各ビット列の構造の例
を図4に示す。図4においてもとの平文列は上記ブロッ
ク化手段12において既にブロック化されたものを表し
ている。このブロック長は、必ずしも暗号化装置固有の
ブロック長と一致する必要はない。もとの平文列(p
1,p2,...)は、上記実施例において平文列入力
手段11が外部より受け取る平文列および平文列出力手
段33が外部に出力する平文列であり、暗号装置用の平
文は図1の出力手段15から暗号連鎖装置の暗号化部に
手渡され、かつ暗号連鎖装置の復号部から図3の入力手
段31に手渡されるビット列である。黒く描かれている
部分が挿入手段14で挿入され冗長ビット除去手段33
で除去される冗長ビットに該当する。An example of the structure of each bit string in the above embodiment is shown in FIG. In FIG. 4, the original plaintext string represents the one already blocked by the blocking means 12. This block length does not necessarily have to match the block length unique to the encryption device. Original plaintext sequence (p
1, p2 ,. . . ) Is a plaintext string received by the plaintext string input unit 11 from the outside and a plaintext string output by the plaintext string output unit 33 to the outside in the above embodiment. 3 is a bit string that is handed to the encryption unit and the handing to the input unit 31 of FIG. 3 from the decryption unit of the cipher chaining device. The portion drawn in black is inserted by the inserting means 14 and the redundant bit removing means 33 is inserted.
Corresponds to redundant bits removed in.
【0016】[0016]
【発明の効果】本発明では、暗号化処理されるブロック
の予め定められた位置にランダムなビットを冗長な情報
として挿入し、この冗長なビットは他とは全く独立に生
成しうるので暗号が解読されてしまった場合意外には他
に洩れる虞はない。したがって、選択平文攻撃は既知平
文攻撃を行い得る解読者に対してもこのビットは未知の
情報となり、解読を困難にする。暗号文の正当な受信者
にとって、復号の際にこの冗長ビットをあらかじめ知っ
ている必要はなく、共用すべき秘密情報が増大すること
もない。よって従来の暗号方式の安全性をより高めるこ
とができる。According to the present invention, a random bit is inserted as redundant information in a predetermined position of a block to be encrypted, and the redundant bit can be generated completely independently of the other bits. If it is deciphered, there is no danger of it leaking to others. Therefore, in the selective plaintext attack, this bit becomes unknown information even for a decryption person who can make a known plaintext attack, which makes the decryption difficult. A legitimate recipient of the ciphertext does not need to know this redundant bit in advance at the time of decryption, and secret information to be shared does not increase. Therefore, the security of the conventional encryption method can be further enhanced.
【図1】第1の発明の暗号化前処理装置の一実施例を示
すブロック図。FIG. 1 is a block diagram showing an embodiment of an encryption preprocessing apparatus of the first invention.
【図2】第1の発明における乱数発生手段の一構成例を
示すブロック図。FIG. 2 is a block diagram showing an example of the configuration of the random number generating means in the first invention.
【図3】第2の発明の復号後処理装置の一実施例を示す
ブロック図。FIG. 3 is a block diagram showing an embodiment of a post-decoding processing device of the second invention.
【図4】本発明において取り扱われるビット列の構造の
一例を示す図。FIG. 4 is a diagram showing an example of a structure of a bit string handled in the present invention.
11 平文列入力手段 12 ブロツク化手段 13 乱数発生手段 14 挿入手段 15 出力手段 21 暗号化装置DES 31 入力手段 32 ブロック化手段 33 冗長ビット除去手段 34 平文列出力手段 11 Plain Text Sequence Input Means 12 Blocking Means 13 Random Number Generating Means 14 Inserting Means 15 Output Means 21 Encrypting Device DES 31 Input Means 32 Blocking Means 33 Redundant Bit Removing Means 34 Plain Text Sequence Output Means
Claims (2)
処理装置において、暗号化されるべき平文の列を入力す
る入力手段と、入力された平文列を予め定められた長さ
毎に区切ってブロック化するブロック化手段と、ランダ
ムなビットを繰り返し発生する乱数発生手段と、前記ブ
ロック化手段によってブロック化されたそれぞれのブロ
ックの予め定められた位置に前記乱数発生手段で発生し
たランダムなビットを挿入する挿入手段と、前挿入手段
によってランダムなビットを挿入されたブロックを順次
暗号装置に受け渡すための出力手段を有することを特徴
とする暗号における暗号化前処理装置。1. An encryption preprocessing device for performing preprocessing of an input of an encryption device, input means for inputting a plaintext string to be encrypted, and input plaintext strings for each predetermined length. Blocking means for dividing into blocks, random number generating means for repeatedly generating random bits, and random numbers generated by the random number generating means at predetermined positions of each block blocked by the blocking means. An encryption pre-processing device in encryption, comprising: an inserting means for inserting a bit, and an output means for sequentially passing blocks in which random bits are inserted by the pre-inserting means to an encryption device.
て後処理を施して平文を出力する復号後処理装置におい
て、暗号装置から復号された平文列を受け取るための入
力手段と、入力された平文列を予め定められた長さ毎に
区切ってブロック化するブロック化手段と、前記ブロッ
ク化手段によりブロック化されたそれぞれのブロックか
ら予め定められた位置のビットを除去する冗長ビット除
去手段と、前記冗長ビット除去手段によって加工された
平文列を最終的な平文として出力する平文列出力手段を
有することを特徴とする暗号における復号後処理装置。2. A decryption post-processing device that performs post-processing on the output of a decryption device for decrypting ciphertext to output plaintext, and input means for receiving the decrypted plaintext sequence from the encryption device. Blocking means for dividing the plaintext sequence into blocks by dividing it into predetermined lengths, and redundant bit removing means for removing bits at predetermined positions from each of the blocks blocked by the blocking means. A decryption post-processing device for encryption, comprising plaintext string output means for outputting the plaintext string processed by the redundant bit removing means as a final plaintext.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP5174526A JP2546504B2 (en) | 1993-07-14 | 1993-07-14 | Pre-encryption processing device and post-decryption processing device in encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP5174526A JP2546504B2 (en) | 1993-07-14 | 1993-07-14 | Pre-encryption processing device and post-decryption processing device in encryption |
Publications (2)
Publication Number | Publication Date |
---|---|
JPH0728407A true JPH0728407A (en) | 1995-01-31 |
JP2546504B2 JP2546504B2 (en) | 1996-10-23 |
Family
ID=15980071
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP5174526A Expired - Fee Related JP2546504B2 (en) | 1993-07-14 | 1993-07-14 | Pre-encryption processing device and post-decryption processing device in encryption |
Country Status (1)
Country | Link |
---|---|
JP (1) | JP2546504B2 (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001142396A (en) * | 1999-11-16 | 2001-05-25 | Dainippon Printing Co Ltd | Ciphering device, its method, ciphering/deciphering device, its method and communication system |
JP2004320719A (en) * | 2003-01-15 | 2004-11-11 | Matsushita Electric Ind Co Ltd | Work protection system, key data generating apparatus, and terminal device |
JP2005072917A (en) * | 2003-08-22 | 2005-03-17 | National Institute Of Information & Communication Technology | Encrypted data creation device and method, and program thereof |
WO2006073201A1 (en) * | 2005-01-07 | 2006-07-13 | N-Crypt, Inc. | Communication system and communication method |
WO2006095895A1 (en) * | 2005-03-08 | 2006-09-14 | N-Crypt, Inc. | Data processing apparatus |
JP2007013503A (en) * | 2005-06-29 | 2007-01-18 | Seiko Precision Inc | Encryption apparatus and method, decryption apparatus and method |
JP2007116659A (en) * | 2005-09-22 | 2007-05-10 | Fujitsu Ltd | Encryption method, encryption / decryption method, encryption device, encryption / decryption device, transmission / reception system, and communication system |
JP2007148317A (en) * | 2005-10-31 | 2007-06-14 | Fujitsu Ltd | Encryption method, encryption / decryption method, encryption device, encryption / decryption device, and communication system |
EP1835655A1 (en) * | 2005-01-07 | 2007-09-19 | N-Crypt, Inc. | Communication system and communication method |
JP2011151689A (en) * | 2010-01-22 | 2011-08-04 | Fujitsu Ltd | Information processing apparatus and information processing method |
JP2011234398A (en) * | 2011-06-29 | 2011-11-17 | Nti Corp | Data processing device, data processing system, and data processing method |
JP2011259446A (en) * | 2011-06-29 | 2011-12-22 | Nti Corp | Communication system and communication method |
JP2014090492A (en) * | 2014-01-06 | 2014-05-15 | Nti Corp | Data processing apparatus, data processing system, and data processing method |
JP2014112870A (en) * | 2014-01-06 | 2014-06-19 | Nti Corp | Communication system and communication method |
CN111682935A (en) * | 2020-05-20 | 2020-09-18 | 广东志远科技有限公司 | Method and system for addressing random encryption |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3644320B2 (en) | 1999-09-17 | 2005-04-27 | 日本電気株式会社 | Control code reading system |
KR101236835B1 (en) * | 2011-02-28 | 2013-02-25 | 삼성중공업 주식회사 | Encoding and decoding method using encoding codes |
JP5875441B2 (en) | 2012-03-29 | 2016-03-02 | インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation | Apparatus and method for encrypting data |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0233239A (en) * | 1988-07-23 | 1990-02-02 | Nintendo Co Ltd | Communication control equipment |
-
1993
- 1993-07-14 JP JP5174526A patent/JP2546504B2/en not_active Expired - Fee Related
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0233239A (en) * | 1988-07-23 | 1990-02-02 | Nintendo Co Ltd | Communication control equipment |
Cited By (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001142396A (en) * | 1999-11-16 | 2001-05-25 | Dainippon Printing Co Ltd | Ciphering device, its method, ciphering/deciphering device, its method and communication system |
US8144869B2 (en) | 2003-01-15 | 2012-03-27 | Panasonic Corporation | Content protection system, key data generation apparatus, and terminal apparatus |
JP2004320719A (en) * | 2003-01-15 | 2004-11-11 | Matsushita Electric Ind Co Ltd | Work protection system, key data generating apparatus, and terminal device |
JP4574175B2 (en) * | 2003-01-15 | 2010-11-04 | パナソニック株式会社 | Copyright protection system, key data generation device and terminal device |
JP2005072917A (en) * | 2003-08-22 | 2005-03-17 | National Institute Of Information & Communication Technology | Encrypted data creation device and method, and program thereof |
TWI387297B (en) * | 2005-01-07 | 2013-02-21 | Ncrypt Inc | Communication system and communication method |
CN103220138A (en) * | 2005-01-07 | 2013-07-24 | 恩克利普特株式会社 | Communication system and communication method |
JP2006191509A (en) * | 2005-01-07 | 2006-07-20 | N-Crypt Inc | Communication system, and communication method |
TWI501613B (en) * | 2005-01-07 | 2015-09-21 | Nti Inc | Communication system and communication method |
US8798270B2 (en) | 2005-01-07 | 2014-08-05 | Nti, Inc. | Communication system and communication method |
EP1835656A1 (en) * | 2005-01-07 | 2007-09-19 | N-Crypt, Inc. | Communication system and communication method |
EP1835655A1 (en) * | 2005-01-07 | 2007-09-19 | N-Crypt, Inc. | Communication system and communication method |
EP1835656A4 (en) * | 2005-01-07 | 2011-11-02 | Ncrypt Inc | Communication system and communication method |
WO2006073201A1 (en) * | 2005-01-07 | 2006-07-13 | N-Crypt, Inc. | Communication system and communication method |
EP1835655A4 (en) * | 2005-01-07 | 2011-11-02 | Ncrypt Inc | Communication system and communication method |
WO2006095895A1 (en) * | 2005-03-08 | 2006-09-14 | N-Crypt, Inc. | Data processing apparatus |
US8577022B2 (en) | 2005-03-08 | 2013-11-05 | Nti, Inc. | Data processing apparatus |
EP1865653A4 (en) * | 2005-03-08 | 2011-11-02 | Ncrypt Inc | Data processing apparatus |
KR101008135B1 (en) * | 2005-03-08 | 2011-01-13 | 가부시끼가이샤 엔크립트 | Data processing unit |
EP1865653A1 (en) * | 2005-03-08 | 2007-12-12 | N-Crypt, Inc. | Data processing apparatus |
JP2006253745A (en) * | 2005-03-08 | 2006-09-21 | N-Crypt Inc | Data processing apparatus, system, and method |
JP2007013503A (en) * | 2005-06-29 | 2007-01-18 | Seiko Precision Inc | Encryption apparatus and method, decryption apparatus and method |
JP4644053B2 (en) * | 2005-06-29 | 2011-03-02 | セイコープレシジョン株式会社 | Encryption apparatus and method, decryption apparatus and method |
JP2007116659A (en) * | 2005-09-22 | 2007-05-10 | Fujitsu Ltd | Encryption method, encryption / decryption method, encryption device, encryption / decryption device, transmission / reception system, and communication system |
JP2007148317A (en) * | 2005-10-31 | 2007-06-14 | Fujitsu Ltd | Encryption method, encryption / decryption method, encryption device, encryption / decryption device, and communication system |
JP2011151689A (en) * | 2010-01-22 | 2011-08-04 | Fujitsu Ltd | Information processing apparatus and information processing method |
JP2011259446A (en) * | 2011-06-29 | 2011-12-22 | Nti Corp | Communication system and communication method |
JP2011234398A (en) * | 2011-06-29 | 2011-11-17 | Nti Corp | Data processing device, data processing system, and data processing method |
JP2014090492A (en) * | 2014-01-06 | 2014-05-15 | Nti Corp | Data processing apparatus, data processing system, and data processing method |
JP2014112870A (en) * | 2014-01-06 | 2014-06-19 | Nti Corp | Communication system and communication method |
CN111682935A (en) * | 2020-05-20 | 2020-09-18 | 广东志远科技有限公司 | Method and system for addressing random encryption |
Also Published As
Publication number | Publication date |
---|---|
JP2546504B2 (en) | 1996-10-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP0403656B1 (en) | Communication equipment | |
JP3747520B2 (en) | Information processing apparatus and information processing method | |
US8155311B2 (en) | Method and apparatus for encrypting message for maintaining message integrity, and method and apparatus for decrypting message for maintaining message integrity | |
US5815573A (en) | Cryptographic key recovery system | |
EP0592808B1 (en) | Commercial data masking | |
JP2546504B2 (en) | Pre-encryption processing device and post-decryption processing device in encryption | |
US6535607B1 (en) | Method and apparatus for providing interoperability between key recovery and non-key recovery systems | |
JP2004363739A (en) | Tamper-detectable encryption / decryption device for common key encryption | |
Reyad et al. | Key-based enhancement of data encryption standard for text security | |
KR100546375B1 (en) | Hardware encryption device of interdependent parallel operation method with self error detection function and hardware encryption method | |
EP1841121A1 (en) | Verifiable generation of weak symmetric keys for strong algorithms | |
JPH0227389A (en) | Enciphering method and enciphering device/decoding device using enciphering method concerned | |
JPH0488736A (en) | Data transmission system | |
JP5992651B2 (en) | ENCRYPTION METHOD, PROGRAM, AND SYSTEM | |
Bhavitha et al. | Performance evaluation of aes, des, rsa, and paillier homomorphic for image security | |
KR20150064042A (en) | Method and device for digital data blocks encryption and decryption | |
JPH1028114A (en) | Work quantity reducing method, ciphering secret key supply method, cipher system executing method, ciphered message data structure and computer medium | |
US5949883A (en) | Encryption system for mixed-trust environments | |
JP2541113B2 (en) | Pre-encryption processing device and post-decryption processing device in cipher chain | |
Abbasi et al. | Cryptography: Security and integrity of data management | |
KR100601634B1 (en) | Fast copy protection method | |
CN112149166B (en) | Unconventional password protection method and intelligent bank machine | |
JP2000224158A (en) | Ciphering communication system | |
JP2002023624A (en) | Block cipher communication method and device therefor, and recording medium with block cipher communication program recorded thereon | |
Piper | Basic principles of cryptography |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 19960618 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20070808 Year of fee payment: 11 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20080808 Year of fee payment: 12 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20080808 Year of fee payment: 12 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20090808 Year of fee payment: 13 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20090808 Year of fee payment: 13 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20100808 Year of fee payment: 14 |
|
LAPS | Cancellation because of no payment of annual fees |