摘要:
A program converter (1) converts a program (P) which performs arithmetic addition processing to execute encryption, into a converted program (tP) which performs processing equivalent to the processing of the program (P). The program converter (1) includes: a key data extraction unit (10) which extracts key data from the program (P); an addition table generation unit (11) which generates an addition table from the extracted key data; a conversion table extraction unit (12) which extracts a conversion table from the program (P); a table merger unit (13) which generates a merger table by merging the generated-addition table and the extracted conversion table; a random number generation unit (14) which generates a random number; a table randomization unit (15) which generates a randomized merger table by randomizing the merger table using the generated random number; and a converted-program generation unit (16) which generates the converted program (tP) according to the generated randomized merger table.
摘要:
The present invention pertains to a transmission apparatus for generating an encrypted text by encrypting a plaintext, which includes a parameter storage unit for storing a random parameter (the number of terms whose coefficients indicate 1) adapted to an encryption key and an encryption apparatus and a decryption apparatus; an encryption unit for generating, from the plaintext, the encrypted text using the encryption key and the random parameter stored in the parameter storage unit, complying with an encryption algorithm based on the NTRU™ method; and a key updating unit for updating the random parameter stored in the parameter storage unit and the encryption key, as time passes.
摘要:
An unauthorized apparatus detection device, playback device, unauthorized apparatus detection system, information collection device, unauthorized apparatus detection method, a program, recording medium, apparatus information update method, and integrated circuit can detect clones of a playback device. In a management server 2, a reception processing unit 241 acquires a user terminal identifier and a first random number from a user terminal targeted for unauthorized apparatus detection, judges whether a second management server random number, which is stored in a storage unit 23 in correspondence with the user terminal identifier, matches the first user terminal random number. If the two fail to match, a display unit 22 displays a message indicating that a clone exists. If the two match, a terminal information generation unit 243 generates a new random number, and writes the generated random number as the second random number in the storage unit 23. A transmission processing unit 246 transmits the generated random number to the user terminal via a transmission/reception unit 246 and the user terminal updates the first user terminal random number to the generated random number.
摘要:
Provided is a game system in which a plurality of game execution apparatuses, having internal structures different from each other, are capable of proceeding with a game while sharing characteristics of a character appearing in the game. A stationary game apparatus 100 obtains character data from a server apparatus 600, and writes the character data to a memory card 300. The stationary game apparatus 100 executes a stationary game software program stored in a DVD 500, using the character data stored in the memory card 300. A portable game apparatus 200 executes a portable game software program stored in a cartridge 400, using the character data stored in the memory card 300.
摘要:
The present invention offers a prime calculating apparatus for calculating a prime which can be determined whether it has been duly generated. The prime calculating apparatus (i) generates a random number, (ii) calculates a multiplication value R by multiplying a management identifier by the random number, and (iii) calculate a prime candidate N, according to N=2×(multiplication value R+w)×prime q+1, with respect to w satisfying an equation of 2×w×prime q+1=verification value (mod management information). Then, the prime calculating apparatus judges whether the calculated prime candidate N is a prime, and outputs the calculated prime candidate N as a prime when determining that it is a prime.
摘要:
An encryption device encrypts a message, and includes a function value output unit that calculates a function value of the message using a one-way converting function. The encryption device also includes a numerical array output unit having an initial array decision unit that generates an initial decision array V1 having n1 elements of 1, n2 elements of −1, and (n−n1−n2) elements of 0. Further, the numerical array output unit includes an array element replacement unit that changes the array element of the initial array V1 generated by the initial array decision unit according to an input integer X, and outputs the array V. The encryption device also includes a text generation unit that generates encrypted text, based on the message, according to a polynomial which corresponds to the array V.
摘要:
A positional information storage system stores and verifies positional information of a mobile terminal apparatus. The positional information storage system stores (i) the positional information, (ii) time information, and (iii) signature data that is generated by placing a digital signature on a combination of the time information and the positional information of the mobile terminal apparatus only if a user of the mobile terminal apparatus is successfully authenticated. The positional information storage system also verifies whether the signature data is authentic. With this construction, it is possible to authenticate a person carrying the mobile terminal apparatus, and to verify whether data to be stored in the memory has been tampered with.
摘要:
An RSA decryption apparatus that is used in an IC card or the like counters a differential fault attack. The RSA decryption apparatus computes at high speed a public key used in data verification, without having to obtain the public key from an external source. The RSA decryption apparatus includes a remainder computation unit 412 that calculates dp=d mod (p−1), and an inverse computation unit 414 that finds an inverse of dp over a residue field with p−1 as a modulus. The RSA decryption apparatus verifies a decipher text with use of the inverse of dp as the public key. The reduced bit count in inverse computation compared to if the inverse of d is found as the public key increases computing speed.
摘要:
A content management server comprises: a first connection detection unit that detects whether or not the content management server is connected with the content-using device; a content management unit that manages the content according to a result of the detection by the first connection detection unit and holds information on how the content-using device controls the use of the content. A content-using device comprises: a second connection detection unit that detects whether or not the content-using device is connected with the content management server; a second selection unit that specifies a method for controlling the use of the content according to a result of the detection by the second connection detection unit; and a content control unit that controls the use of the content according to the method specified by the second selection unit.
摘要:
To aim to provide a monitoring system and a program execution apparatus that are capable of maintaining the security intensity even in the case where an unauthentic install module is invalidated. Install modules included in an apparatus each monitor an install module, which is a monitoring target indicated by a monitoring pattern included therein, as to whether the install module performs malicious operations. An install module that performs malicious operations is invalidated in accordance with an instruction from an update server. The monitoring patterns are restructured by the update server such that the install modules except the invalidated install module are each monitored by at least another one of the install modules. The restructured monitoring patterns are distributed to the install modules except the invalidated install module.