[go: up one dir, main page]

JPH0728407A - Ciphering preprocessor and deciphering postprocessor by cipher - Google Patents

Ciphering preprocessor and deciphering postprocessor by cipher

Info

Publication number
JPH0728407A
JPH0728407A JP5174526A JP17452693A JPH0728407A JP H0728407 A JPH0728407 A JP H0728407A JP 5174526 A JP5174526 A JP 5174526A JP 17452693 A JP17452693 A JP 17452693A JP H0728407 A JPH0728407 A JP H0728407A
Authority
JP
Japan
Prior art keywords
plaintext
encryption
blocks
input
random
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
JP5174526A
Other languages
Japanese (ja)
Other versions
JP2546504B2 (en
Inventor
Hiroshi Miyano
浩 宮野
Hiroshi Miyauchi
宏 宮内
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NEC Corp
Original Assignee
NEC Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NEC Corp filed Critical NEC Corp
Priority to JP5174526A priority Critical patent/JP2546504B2/en
Publication of JPH0728407A publication Critical patent/JPH0728407A/en
Application granted granted Critical
Publication of JP2546504B2 publication Critical patent/JP2546504B2/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Abstract

PURPOSE:To provide a ciphering device and a deciphering device which prevent a cipher key from easily being estimated even when a 3rd party knows both a plaintext and a ciphertext by inserting random bits into the plaintext by a cipher system. CONSTITUTION:The ciphering preprocessor which preprocesses the input of the ciphering device has an input means 11 which inputs an array of plaintexts to be ciphered, a block dividing means 12 which sections the inputted plaintext array by predetermined length into blocks, and a random number generating means 13 which repeatedly generate the random bits. Further, the processor has an inserting means 14 which inserts the random bits generated by the random number generating means 13 at predetermined positions of the respective blocks generated by the block dividing means 12 and an output means 15 which passes the blocks, having the random bits inserted by the inserting means 14, to the ciphering device in order.

Description

【発明の詳細な説明】Detailed Description of the Invention

【0001】[0001]

【産業上の利用分野】本発明は、暗号化および復号装置
に関するものである。
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to an encryption / decryption device.

【0002】[0002]

【従来の技術】DES(昭51−108701暗号装
置、たとえば「現代暗号理論」池野信一、小山謙二著、
社団法人電子情報通信学会1986年の第3章に解説)
やRSA(上記「現代暗号理論」第6章に解説)に代表
される従来の暗号方式は、平文をある一定長の長さに区
切ることによってブロック化し、それぞれのブロックを
独立にあるいは順次暗号化することによって平文全体の
暗号文を得ることを特徴としている。
2. Description of the Related Art DES (Sho 51-108701 cryptographic device, for example, "Modern cryptographic theory" written by Shinichi Ikeno and Kenji Koyama,
(Explanation in Chapter 3 of the Institute of Electronics, Information and Communication Engineers 1986)
The conventional cryptosystems, such as RSA and RSA (discussed in Chapter 6 of "Modern Cryptography" above), are divided into blocks by dividing plaintext into certain lengths, and each block is encrypted independently or sequentially It is characterized by obtaining the ciphertext of the whole plaintext by doing.

【0003】一般に上記のような従来の暗号系では大き
なファイルや通信文を暗号化しようとする場合、平文は
多くのブロックに分割される。これらのブロックは通常
同一の鍵で暗号化される。このような同一の鍵で暗号化
された多数のブロックは、平文が解読者に知れてしまう
と、秘密鍵を推定する手がかりとなるおそれがある。
Generally, in the conventional encryption system as described above, when an attempt is made to encrypt a large file or communication text, the plain text is divided into many blocks. These blocks are usually encrypted with the same key. If the plaintext of many blocks encrypted with such an identical key becomes known to the decryption person, there is a risk that it may be a clue to deduce the secret key.

【0004】[0004]

【発明が解決しようとする課題】本発明の目的は、暗号
方式において、暗号文と平文の両方が解読者に知れてし
まっても秘密鍵を容易に推定することが依然として困難
であるようにするための暗号化の前処理装置および復号
の後処理装置を提供することである。
SUMMARY OF THE INVENTION It is an object of the present invention to make it difficult in cryptographic systems to easily deduce the secret key even if both the ciphertext and the plaintext are known to the decrypter. It is to provide an encryption pre-processing device and a decryption post-processing device.

【0005】[0005]

【課題を解決するための手段】第1の発明の暗号化前処
理装置は、暗号装置の入力の前処理を行う暗号化前処理
装置において、暗号化されるべき平文の列を入力する入
力手段と、入力された平文列を予め定められた長さ毎に
区切ってブロック化するブロック化手段と、ランダムな
ビットを繰り返し発生する乱数発生手段と、前記ブロッ
ク化手段によってブロック化されたそれぞれのブロック
の予め定められた位置に前記乱数発生手段で発生したラ
ンダムなビットを挿入する挿入手段と、前挿入手段によ
ってランダムなビットを挿入されたブロックを順次暗号
装置に受け渡すための出力手段を有することを特徴とす
る。
According to a first aspect of the present invention, there is provided an encryption preprocessing device for inputting a plaintext string to be encrypted in an encryption preprocessing device for performing preprocessing of an input of an encryption device. A block unit that divides the input plaintext string into blocks by dividing it into predetermined lengths, a random number generator that repeatedly generates random bits, and each block that is blocked by the block unit. Inserting means for inserting a random bit generated by the random number generating means at a predetermined position, and output means for sequentially passing the block in which the random bit is inserted by the pre-inserting means to the encryption device. Is characterized by.

【0006】第2の発明の復号後処理装置は、暗号文を
復号する復号装置の出力に対して後処理を施して平文を
出力する復号後処理装置において、暗号装置から復号さ
れた平文列を受け取るための入力手段と、入力された平
文列を予め定められた長さ毎に区切ってブロック化する
ブロック化手段と、前記ブロック化手段によりブロック
化されたそれぞれのブロックから予め定められた位置の
ビット除去する冗長ビット除去手段と、前着冗長ビット
除去手段によって加工された平文列を最終的な平文とし
て出力する平文列出力手段を有することを特徴とする。
A decryption post-processing device according to a second aspect of the present invention is a decryption post-processing device that performs post-processing on the output of a decryption device for decrypting a ciphertext and outputs a plaintext. Input means for receiving, blocking means for dividing the input plaintext string into blocks by a predetermined length, and a predetermined position from each block blocked by the blocking means. The present invention is characterized by including redundant bit removing means for removing bits and plaintext string output means for outputting the plaintext string processed by the preceding arrival redundant bit removing means as a final plaintext.

【0007】[0007]

【作用】本発明における暗号化の前処理および後処理に
ついて述べる。
The pre-processing and post-processing of encryption in the present invention will be described.

【0008】一般に暗号方式は、単に暗号文から平文が
推定できないだけではなく、暗号文と平文の組から暗号
鍵が容易に推定できないことが要求される。
Generally, a cryptosystem is required not only to be able to infer a plaintext from a ciphertext but also to be unable to easily infer an encryption key from a set of a ciphertext and a plaintext.

【0009】本発明の暗号化前処理装置および復号後処
理装置においては、本来の平文に冗長ビットを挿入する
ことにより実際に暗号化装置の入力となる平文を生成す
る仕組みになっている。挿入されるビット列は暗号化を
行う装置と同じ装置内で暗号化処理の直前に生成するこ
とが可能なので通常の平文と比較してその内容が第三者
に漏れる可能性が著しく小さい。したがって、本来の平
文が漏れたとしても実際に暗号化に用いられた平文の全
容を知られる可能性はほとんどなく、結果として既知平
文攻撃を喫するおそれが小さい。
In the pre-encryption processing apparatus and the post-decryption processing apparatus of the present invention, a redundant bit is inserted into the original plaintext to generate a plaintext that is actually input to the encryption apparatus. Since the bit string to be inserted can be generated immediately before the encryption processing in the same device as the device that performs the encryption, the possibility that the content will be leaked to a third party is significantly smaller than that of ordinary plain text. Therefore, even if the original plaintext is leaked, there is almost no possibility that the entire plaintext actually used for encryption is known, and as a result, a known plaintext attack is less likely to occur.

【0010】また、挿入するビットはその内容を予め受
信者と打ち合わせておく必要がなく、ブロック長と付加
するビットの位置だけを打ち合わせておけば十分であ
り、しかもこれらの情報は秘密にしておく必要もない。
したがって、送信者および受信者が管理しなければなら
ない秘密情報が増えることはない。
Further, it is not necessary to discuss the contents of the bit to be inserted with the receiver in advance, it is sufficient to discuss only the block length and the position of the bit to be added, and the information is kept secret. There is no need.
Therefore, the secret information that the sender and the receiver have to manage does not increase.

【0011】[0011]

【実施例】図1に第1の発明の暗号化前処理装置の実施
例を、図2に図1の実施例中に用いる乱数発生手段の一
構成例を、図3に第2の発明の復号後処理装置の実施例
を示した。
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS FIG. 1 shows an embodiment of an encryption preprocessing device of the first invention, FIG. 2 shows an example of the configuration of a random number generating means used in the embodiment of FIG. 1, and FIG. An embodiment of the post-decoding processing device has been shown.

【0012】図1において暗号化前処理装置は、平文列
入力手段11、ブロック化手段12、乱数発生手段1
3、挿入手段14および出力手段15とからなる。平文
の列が平文入力手段11から入力されると、ブロック化
手段12において該平文列を予め定められたビット数毎
に区切りブロック化する。挿入手段14では、乱数発生
手段13で生成されたランダムなビットを各々のブロッ
クの予め定められた位置に挿入する。出力装置15はそ
の結果得られたビットの列を暗号化装置の入力として暗
号化装置に受け渡す。
In FIG. 1, the encryption preprocessing apparatus comprises a plaintext string input means 11, a blocking means 12, and a random number generation means 1.
3, the insertion means 14 and the output means 15. When a plaintext string is input from the plaintext input means 11, the block forming means 12 divides the plaintext string into blocks by a predetermined number of bits. The inserting means 14 inserts the random bit generated by the random number generating means 13 into a predetermined position of each block. The output device 15 transfers the resulting bit string to the encryption device as an input of the encryption device.

【0013】図2は、第1の発明の暗号化前処理装置の
一構成要素である乱数発生手段13の一構成例である。
この例では、計算機内のタイムスタンプを暗号鍵、初期
定数を平文としてDESによる暗号化を行い、暗号文を
回帰させて繰り返し暗号化を行う。この際、暗号文の先
頭の1ビットをランダムなビットとして挿入手段14に
受け渡す。挿入手段14がランダムなビットを1ビット
要求する度に、上記DESによる暗号化を行うことによ
り、乱数発生手段13としての機能が実現される。
FIG. 2 shows an example of the configuration of the random number generating means 13, which is a component of the encryption preprocessing device of the first invention.
In this example, DES encryption is performed using a time stamp in the computer as an encryption key and an initial constant as plaintext, and the ciphertext is regressed to repeatedly perform encryption. At this time, the leading 1 bit of the ciphertext is passed to the inserting means 14 as a random bit. The function as the random number generation means 13 is realized by performing encryption by the DES every time the insertion means 14 requests one random bit.

【0014】図3において復号後処理装置は、入力手段
31、ブロック化手段32、冗長ビット除去手段33お
よび平文列出力手段34とからなる。入力手段31は、
暗号装置の復号装置から復号処理の済んだビット列を受
け取りブロック化手段32に受け渡す。ブロック化手段
32は該ビット列をあらかじめ定められたビット数毎に
区切りブロック化し、冗長ビット除去手段33に受け渡
す。冗長ビット除去手段33は、受け取った核ブロック
の予め定められた位置のビットを除去し平文列出力手段
33に受け渡す。平文列出力手段34は受け取ったビッ
ト列を外部に出力する。
In FIG. 3, the post-decoding processing device comprises input means 31, blocking means 32, redundant bit removing means 33, and plaintext sequence output means 34. The input means 31 is
The decrypted bit string is received from the decryption device of the encryption device and passed to the blocking means 32. The block forming means 32 divides the bit string into blocks by a predetermined number of bits, and transfers them to the redundant bit removing means 33. The redundant bit removing means 33 removes the bit at the predetermined position of the received kernel block and delivers it to the plaintext string output means 33. The plaintext string output means 34 outputs the received bit string to the outside.

【0015】上記実施例における各ビット列の構造の例
を図4に示す。図4においてもとの平文列は上記ブロッ
ク化手段12において既にブロック化されたものを表し
ている。このブロック長は、必ずしも暗号化装置固有の
ブロック長と一致する必要はない。もとの平文列(p
1,p2,...)は、上記実施例において平文列入力
手段11が外部より受け取る平文列および平文列出力手
段33が外部に出力する平文列であり、暗号装置用の平
文は図1の出力手段15から暗号連鎖装置の暗号化部に
手渡され、かつ暗号連鎖装置の復号部から図3の入力手
段31に手渡されるビット列である。黒く描かれている
部分が挿入手段14で挿入され冗長ビット除去手段33
で除去される冗長ビットに該当する。
An example of the structure of each bit string in the above embodiment is shown in FIG. In FIG. 4, the original plaintext string represents the one already blocked by the blocking means 12. This block length does not necessarily have to match the block length unique to the encryption device. Original plaintext sequence (p
1, p2 ,. . . ) Is a plaintext string received by the plaintext string input unit 11 from the outside and a plaintext string output by the plaintext string output unit 33 to the outside in the above embodiment. 3 is a bit string that is handed to the encryption unit and the handing to the input unit 31 of FIG. 3 from the decryption unit of the cipher chaining device. The portion drawn in black is inserted by the inserting means 14 and the redundant bit removing means 33 is inserted.
Corresponds to redundant bits removed in.

【0016】[0016]

【発明の効果】本発明では、暗号化処理されるブロック
の予め定められた位置にランダムなビットを冗長な情報
として挿入し、この冗長なビットは他とは全く独立に生
成しうるので暗号が解読されてしまった場合意外には他
に洩れる虞はない。したがって、選択平文攻撃は既知平
文攻撃を行い得る解読者に対してもこのビットは未知の
情報となり、解読を困難にする。暗号文の正当な受信者
にとって、復号の際にこの冗長ビットをあらかじめ知っ
ている必要はなく、共用すべき秘密情報が増大すること
もない。よって従来の暗号方式の安全性をより高めるこ
とができる。
According to the present invention, a random bit is inserted as redundant information in a predetermined position of a block to be encrypted, and the redundant bit can be generated completely independently of the other bits. If it is deciphered, there is no danger of it leaking to others. Therefore, in the selective plaintext attack, this bit becomes unknown information even for a decryption person who can make a known plaintext attack, which makes the decryption difficult. A legitimate recipient of the ciphertext does not need to know this redundant bit in advance at the time of decryption, and secret information to be shared does not increase. Therefore, the security of the conventional encryption method can be further enhanced.

【図面の簡単な説明】[Brief description of drawings]

【図1】第1の発明の暗号化前処理装置の一実施例を示
すブロック図。
FIG. 1 is a block diagram showing an embodiment of an encryption preprocessing apparatus of the first invention.

【図2】第1の発明における乱数発生手段の一構成例を
示すブロック図。
FIG. 2 is a block diagram showing an example of the configuration of the random number generating means in the first invention.

【図3】第2の発明の復号後処理装置の一実施例を示す
ブロック図。
FIG. 3 is a block diagram showing an embodiment of a post-decoding processing device of the second invention.

【図4】本発明において取り扱われるビット列の構造の
一例を示す図。
FIG. 4 is a diagram showing an example of a structure of a bit string handled in the present invention.

【符号の説明】[Explanation of symbols]

11 平文列入力手段 12 ブロツク化手段 13 乱数発生手段 14 挿入手段 15 出力手段 21 暗号化装置DES 31 入力手段 32 ブロック化手段 33 冗長ビット除去手段 34 平文列出力手段 11 Plain Text Sequence Input Means 12 Blocking Means 13 Random Number Generating Means 14 Inserting Means 15 Output Means 21 Encrypting Device DES 31 Input Means 32 Blocking Means 33 Redundant Bit Removing Means 34 Plain Text Sequence Output Means

Claims (2)

【特許請求の範囲】[Claims] 【請求項1】 暗号装置の入力の前処理を行う暗号化前
処理装置において、暗号化されるべき平文の列を入力す
る入力手段と、入力された平文列を予め定められた長さ
毎に区切ってブロック化するブロック化手段と、ランダ
ムなビットを繰り返し発生する乱数発生手段と、前記ブ
ロック化手段によってブロック化されたそれぞれのブロ
ックの予め定められた位置に前記乱数発生手段で発生し
たランダムなビットを挿入する挿入手段と、前挿入手段
によってランダムなビットを挿入されたブロックを順次
暗号装置に受け渡すための出力手段を有することを特徴
とする暗号における暗号化前処理装置。
1. An encryption preprocessing device for performing preprocessing of an input of an encryption device, input means for inputting a plaintext string to be encrypted, and input plaintext strings for each predetermined length. Blocking means for dividing into blocks, random number generating means for repeatedly generating random bits, and random numbers generated by the random number generating means at predetermined positions of each block blocked by the blocking means. An encryption pre-processing device in encryption, comprising: an inserting means for inserting a bit, and an output means for sequentially passing blocks in which random bits are inserted by the pre-inserting means to an encryption device.
【請求項2】 暗号文を復号する復号装置の出力に対し
て後処理を施して平文を出力する復号後処理装置におい
て、暗号装置から復号された平文列を受け取るための入
力手段と、入力された平文列を予め定められた長さ毎に
区切ってブロック化するブロック化手段と、前記ブロッ
ク化手段によりブロック化されたそれぞれのブロックか
ら予め定められた位置のビットを除去する冗長ビット除
去手段と、前記冗長ビット除去手段によって加工された
平文列を最終的な平文として出力する平文列出力手段を
有することを特徴とする暗号における復号後処理装置。
2. A decryption post-processing device that performs post-processing on the output of a decryption device for decrypting ciphertext to output plaintext, and input means for receiving the decrypted plaintext sequence from the encryption device. Blocking means for dividing the plaintext sequence into blocks by dividing it into predetermined lengths, and redundant bit removing means for removing bits at predetermined positions from each of the blocks blocked by the blocking means. A decryption post-processing device for encryption, comprising plaintext string output means for outputting the plaintext string processed by the redundant bit removing means as a final plaintext.
JP5174526A 1993-07-14 1993-07-14 Pre-encryption processing device and post-decryption processing device in encryption Expired - Fee Related JP2546504B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP5174526A JP2546504B2 (en) 1993-07-14 1993-07-14 Pre-encryption processing device and post-decryption processing device in encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP5174526A JP2546504B2 (en) 1993-07-14 1993-07-14 Pre-encryption processing device and post-decryption processing device in encryption

Publications (2)

Publication Number Publication Date
JPH0728407A true JPH0728407A (en) 1995-01-31
JP2546504B2 JP2546504B2 (en) 1996-10-23

Family

ID=15980071

Family Applications (1)

Application Number Title Priority Date Filing Date
JP5174526A Expired - Fee Related JP2546504B2 (en) 1993-07-14 1993-07-14 Pre-encryption processing device and post-decryption processing device in encryption

Country Status (1)

Country Link
JP (1) JP2546504B2 (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001142396A (en) * 1999-11-16 2001-05-25 Dainippon Printing Co Ltd Ciphering device, its method, ciphering/deciphering device, its method and communication system
JP2004320719A (en) * 2003-01-15 2004-11-11 Matsushita Electric Ind Co Ltd Work protection system, key data generating apparatus, and terminal device
JP2005072917A (en) * 2003-08-22 2005-03-17 National Institute Of Information & Communication Technology Encrypted data creation device and method, and program thereof
WO2006073201A1 (en) * 2005-01-07 2006-07-13 N-Crypt, Inc. Communication system and communication method
WO2006095895A1 (en) * 2005-03-08 2006-09-14 N-Crypt, Inc. Data processing apparatus
JP2007013503A (en) * 2005-06-29 2007-01-18 Seiko Precision Inc Encryption apparatus and method, decryption apparatus and method
JP2007116659A (en) * 2005-09-22 2007-05-10 Fujitsu Ltd Encryption method, encryption / decryption method, encryption device, encryption / decryption device, transmission / reception system, and communication system
JP2007148317A (en) * 2005-10-31 2007-06-14 Fujitsu Ltd Encryption method, encryption / decryption method, encryption device, encryption / decryption device, and communication system
EP1835655A1 (en) * 2005-01-07 2007-09-19 N-Crypt, Inc. Communication system and communication method
JP2011151689A (en) * 2010-01-22 2011-08-04 Fujitsu Ltd Information processing apparatus and information processing method
JP2011234398A (en) * 2011-06-29 2011-11-17 Nti Corp Data processing device, data processing system, and data processing method
JP2011259446A (en) * 2011-06-29 2011-12-22 Nti Corp Communication system and communication method
JP2014090492A (en) * 2014-01-06 2014-05-15 Nti Corp Data processing apparatus, data processing system, and data processing method
JP2014112870A (en) * 2014-01-06 2014-06-19 Nti Corp Communication system and communication method
CN111682935A (en) * 2020-05-20 2020-09-18 广东志远科技有限公司 Method and system for addressing random encryption

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3644320B2 (en) 1999-09-17 2005-04-27 日本電気株式会社 Control code reading system
KR101236835B1 (en) * 2011-02-28 2013-02-25 삼성중공업 주식회사 Encoding and decoding method using encoding codes
JP5875441B2 (en) 2012-03-29 2016-03-02 インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation Apparatus and method for encrypting data

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0233239A (en) * 1988-07-23 1990-02-02 Nintendo Co Ltd Communication control equipment

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0233239A (en) * 1988-07-23 1990-02-02 Nintendo Co Ltd Communication control equipment

Cited By (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001142396A (en) * 1999-11-16 2001-05-25 Dainippon Printing Co Ltd Ciphering device, its method, ciphering/deciphering device, its method and communication system
US8144869B2 (en) 2003-01-15 2012-03-27 Panasonic Corporation Content protection system, key data generation apparatus, and terminal apparatus
JP2004320719A (en) * 2003-01-15 2004-11-11 Matsushita Electric Ind Co Ltd Work protection system, key data generating apparatus, and terminal device
JP4574175B2 (en) * 2003-01-15 2010-11-04 パナソニック株式会社 Copyright protection system, key data generation device and terminal device
JP2005072917A (en) * 2003-08-22 2005-03-17 National Institute Of Information & Communication Technology Encrypted data creation device and method, and program thereof
TWI387297B (en) * 2005-01-07 2013-02-21 Ncrypt Inc Communication system and communication method
CN103220138A (en) * 2005-01-07 2013-07-24 恩克利普特株式会社 Communication system and communication method
JP2006191509A (en) * 2005-01-07 2006-07-20 N-Crypt Inc Communication system, and communication method
TWI501613B (en) * 2005-01-07 2015-09-21 Nti Inc Communication system and communication method
US8798270B2 (en) 2005-01-07 2014-08-05 Nti, Inc. Communication system and communication method
EP1835656A1 (en) * 2005-01-07 2007-09-19 N-Crypt, Inc. Communication system and communication method
EP1835655A1 (en) * 2005-01-07 2007-09-19 N-Crypt, Inc. Communication system and communication method
EP1835656A4 (en) * 2005-01-07 2011-11-02 Ncrypt Inc Communication system and communication method
WO2006073201A1 (en) * 2005-01-07 2006-07-13 N-Crypt, Inc. Communication system and communication method
EP1835655A4 (en) * 2005-01-07 2011-11-02 Ncrypt Inc Communication system and communication method
WO2006095895A1 (en) * 2005-03-08 2006-09-14 N-Crypt, Inc. Data processing apparatus
US8577022B2 (en) 2005-03-08 2013-11-05 Nti, Inc. Data processing apparatus
EP1865653A4 (en) * 2005-03-08 2011-11-02 Ncrypt Inc Data processing apparatus
KR101008135B1 (en) * 2005-03-08 2011-01-13 가부시끼가이샤 엔크립트 Data processing unit
EP1865653A1 (en) * 2005-03-08 2007-12-12 N-Crypt, Inc. Data processing apparatus
JP2006253745A (en) * 2005-03-08 2006-09-21 N-Crypt Inc Data processing apparatus, system, and method
JP2007013503A (en) * 2005-06-29 2007-01-18 Seiko Precision Inc Encryption apparatus and method, decryption apparatus and method
JP4644053B2 (en) * 2005-06-29 2011-03-02 セイコープレシジョン株式会社 Encryption apparatus and method, decryption apparatus and method
JP2007116659A (en) * 2005-09-22 2007-05-10 Fujitsu Ltd Encryption method, encryption / decryption method, encryption device, encryption / decryption device, transmission / reception system, and communication system
JP2007148317A (en) * 2005-10-31 2007-06-14 Fujitsu Ltd Encryption method, encryption / decryption method, encryption device, encryption / decryption device, and communication system
JP2011151689A (en) * 2010-01-22 2011-08-04 Fujitsu Ltd Information processing apparatus and information processing method
JP2011259446A (en) * 2011-06-29 2011-12-22 Nti Corp Communication system and communication method
JP2011234398A (en) * 2011-06-29 2011-11-17 Nti Corp Data processing device, data processing system, and data processing method
JP2014090492A (en) * 2014-01-06 2014-05-15 Nti Corp Data processing apparatus, data processing system, and data processing method
JP2014112870A (en) * 2014-01-06 2014-06-19 Nti Corp Communication system and communication method
CN111682935A (en) * 2020-05-20 2020-09-18 广东志远科技有限公司 Method and system for addressing random encryption

Also Published As

Publication number Publication date
JP2546504B2 (en) 1996-10-23

Similar Documents

Publication Publication Date Title
EP0403656B1 (en) Communication equipment
JP3747520B2 (en) Information processing apparatus and information processing method
US8155311B2 (en) Method and apparatus for encrypting message for maintaining message integrity, and method and apparatus for decrypting message for maintaining message integrity
US5815573A (en) Cryptographic key recovery system
EP0592808B1 (en) Commercial data masking
JP2546504B2 (en) Pre-encryption processing device and post-decryption processing device in encryption
US6535607B1 (en) Method and apparatus for providing interoperability between key recovery and non-key recovery systems
JP2004363739A (en) Tamper-detectable encryption / decryption device for common key encryption
Reyad et al. Key-based enhancement of data encryption standard for text security
KR100546375B1 (en) Hardware encryption device of interdependent parallel operation method with self error detection function and hardware encryption method
EP1841121A1 (en) Verifiable generation of weak symmetric keys for strong algorithms
JPH0227389A (en) Enciphering method and enciphering device/decoding device using enciphering method concerned
JPH0488736A (en) Data transmission system
JP5992651B2 (en) ENCRYPTION METHOD, PROGRAM, AND SYSTEM
Bhavitha et al. Performance evaluation of aes, des, rsa, and paillier homomorphic for image security
KR20150064042A (en) Method and device for digital data blocks encryption and decryption
JPH1028114A (en) Work quantity reducing method, ciphering secret key supply method, cipher system executing method, ciphered message data structure and computer medium
US5949883A (en) Encryption system for mixed-trust environments
JP2541113B2 (en) Pre-encryption processing device and post-decryption processing device in cipher chain
Abbasi et al. Cryptography: Security and integrity of data management
KR100601634B1 (en) Fast copy protection method
CN112149166B (en) Unconventional password protection method and intelligent bank machine
JP2000224158A (en) Ciphering communication system
JP2002023624A (en) Block cipher communication method and device therefor, and recording medium with block cipher communication program recorded thereon
Piper Basic principles of cryptography

Legal Events

Date Code Title Description
A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

Effective date: 19960618

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20070808

Year of fee payment: 11

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20080808

Year of fee payment: 12

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20080808

Year of fee payment: 12

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20090808

Year of fee payment: 13

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20090808

Year of fee payment: 13

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20100808

Year of fee payment: 14

LAPS Cancellation because of no payment of annual fees