摘要:
The present invention offers a prime calculating apparatus for achieving prime calculation where producing identical primes is avoided by simple management techniques. The prime calculating apparatus stores a known prime q and management information unique in the use range of primes. The prime calculating apparatus reads the management information; generates random information R based on the read management information; reads prime q; calculates prime candidate N, according to N=2×random information R×prime q+1, using the read prime q and generated random information R; tests whether the calculated prime candidate N is a prime; and outputs the calculated prime candidate N as a prime when the primality of the calculated prime candidate N is determined. Herewith, the prime calculating apparatus is able to calculate prime candidates from unique management information while avoiding producing identical primes.
摘要:
An encryption transmission apparatus and an encryption reception apparatus avoid attack that takes advantage of a re-transmission request. A server apparatus encrypts a content key five times, thereby generating five encrypted content keys, calculates a hash value of the content key, and transmits the five encrypted content keys and the hash value. An image playback apparatus receives the five encrypted content keys and the hash value, decrypts the five encrypted content keys thereby generating five content keys, calculates hash values, each corresponding to the generated content keys, and compares the calculated hash values with the received hash value, respectively. If at least one of the five calculated hash values matches the received hash value, the corresponding content key is considered correct. Conversely, if none of the five calculated hash values matches the received hash value, it is considered a decryption error.
摘要:
Provided is an obfuscating apparatus for making a program analysis more difficult. The obfuscating apparatus creates a table for inputting the same number of arguments, for multiplying and squaring operations, and sets the output values of the table so that the outputs may depend on those arguments. To the squaring operations, more specifically, there are added and tabulated the adding operations using the arguments necessary only for the multiplications, so that the number of arguments is equalized to that of the multiplications. In this case, moreover, the outputs depend on all the arguments, so that the presence/absence of the added argument is unknown unlike the case, in which dummy arguments not to be actually processed are added.
摘要:
A program obfuscating device for generating obfuscated program from which unauthorized analyzer cannot obtain confidential information easily. The program obfuscating device stores original program that contains authorized program instructions and confidential process instruction group containing confidential information that needs to be kept confidential, generates process instructions which, when executed in predetermined order, provide same result, with execution of last process instruction thereof, as the confidential process instruction group, inserts the process instructions into the original program at position between start of the original program and the confidential process instruction group so as to be executed in the predetermined order, in place of the confidential process instruction group, generates dummy block as dummy of the process instructions, and inserts the dummy block and control instruction, which causes the dummy block to be bypassed, into the original program, and inserts branch instruction into the dummy block.
摘要:
A program converter (1) converts a program (P) which performs arithmetic addition processing to execute encryption, into a converted program (tP) which performs processing equivalent to the processing of the program (P). The program converter (1) includes: a key data extraction unit (10) which extracts key data from the program (P); an addition table generation unit (11) which generates an addition table from the extracted key data; a conversion table extraction unit (12) which extracts a conversion table from the program (P); a table merger unit (13) which generates a merger table by merging the generated-addition table and the extracted conversion table; a random number generation unit (14) which generates a random number; a table randomization unit (15) which generates a randomized merger table by randomizing the merger table using the generated random number; and a converted-program generation unit (16) which generates the converted program (tP) according to the generated randomized merger table.
摘要:
The present invention pertains to a transmission apparatus for generating an encrypted text by encrypting a plaintext, which includes a parameter storage unit for storing a random parameter (the number of terms whose coefficients indicate 1) adapted to an encryption key and an encryption apparatus and a decryption apparatus; an encryption unit for generating, from the plaintext, the encrypted text using the encryption key and the random parameter stored in the parameter storage unit, complying with an encryption algorithm based on the NTRU™ method; and a key updating unit for updating the random parameter stored in the parameter storage unit and the encryption key, as time passes.
摘要:
Provided is a game system in which a plurality of game execution apparatuses, having internal structures different from each other, are capable of proceeding with a game while sharing characteristics of a character appearing in the game. A stationary game apparatus 100 obtains character data from a server apparatus 600, and writes the character data to a memory card 300. The stationary game apparatus 100 executes a stationary game software program stored in a DVD 500, using the character data stored in the memory card 300. A portable game apparatus 200 executes a portable game software program stored in a cartridge 400, using the character data stored in the memory card 300.
摘要:
The present invention offers a prime calculating apparatus for calculating a prime which can be determined whether it has been duly generated. The prime calculating apparatus (i) generates a random number, (ii) calculates a multiplication value R by multiplying a management identifier by the random number, and (iii) calculate a prime candidate N, according to N=2×(multiplication value R+w)×prime q+1, with respect to w satisfying an equation of 2×w×prime q+1=verification value (mod management information). Then, the prime calculating apparatus judges whether the calculated prime candidate N is a prime, and outputs the calculated prime candidate N as a prime when determining that it is a prime.
摘要:
An encryption device encrypts a message, and includes a function value output unit that calculates a function value of the message using a one-way converting function. The encryption device also includes a numerical array output unit having an initial array decision unit that generates an initial decision array V1 having n1 elements of 1, n2 elements of −1, and (n−n1−n2) elements of 0. Further, the numerical array output unit includes an array element replacement unit that changes the array element of the initial array V1 generated by the initial array decision unit according to an input integer X, and outputs the array V. The encryption device also includes a text generation unit that generates encrypted text, based on the message, according to a polynomial which corresponds to the array V.
摘要:
A positional information storage system stores and verifies positional information of a mobile terminal apparatus. The positional information storage system stores (i) the positional information, (ii) time information, and (iii) signature data that is generated by placing a digital signature on a combination of the time information and the positional information of the mobile terminal apparatus only if a user of the mobile terminal apparatus is successfully authenticated. The positional information storage system also verifies whether the signature data is authentic. With this construction, it is possible to authenticate a person carrying the mobile terminal apparatus, and to verify whether data to be stored in the memory has been tampered with.