摘要:
In a data encryption/decryption method including an encryption step and a decryption step. In the encryption step, there are prepared n pairs of secret keys and public keys in a public-key cryptographic scheme, where n is a positive integer. A new key is generated in accordance with at least one of the public keys. Data is encrypted in a common-key cryptographic scheme by use of the new key. There is prepared a (k,n) threshold logic (k is an integer equal to or less than n) having terms associated with the new key and the n public keys. A calculation of the threshold logic is conducted by use of the new key and the n public keys, and encrypted data and a result of the calculation of the threshold logic are stored. In the decryption step, the new key is restored from k secret keys selected from the n secret keys and the stored result of the threshold logic calculation in accordance with a threshold reverse logic corresponding to the threshold logic and stored data is decrypted by the restored key in the common-key cryptographic scheme.
摘要:
In an IC card incorporating residual multiplier hardware for implementing a high-speed algorithm for a residual multiplication arithmetic, a method and a device capable of executing public key encryption processing such as an elliptic curve encryption processing at a high speed. Residual arithmetic succeeding to generation of a random number and residual arithmetic in a signature generating processing can be executed by using a residual multiplier. Further, in order to use effectively the residual multiplier for arithmetic operation on an elliptic curve, the point on the elliptic curve is transformed from a two-dimensional affine coordinate system to a three-dimensional coordinate system. Additionally, multiplicative inverse arithmetic for realizing reverse transformation from the three-dimensional coordinate system to the two-dimensional affine coordinate system as well as for determining a signature s can be executed only with the residual multiplication arithmetic. By making use of the residual multiplier in this manner, the processing speed can be increased. Computation complexity can be reduced by storing previously those parameters which are used frequently and constant multiplies of a base point of the elliptic curve in the form of tables, which also contributes to increasing of processing speed.
摘要:
In an IC card incorporating residual multiplier hardware for implementing a high-speed algorithm for a residual multiplication arithmetic, a method and a device capable of executing a public key encryption processing such as an elliptic curve encryption processing at a high speed. Residual arithmetic succeeding to generation of a random number and residual arithmetic in a signature generating processing can be executed by using a residual multiplier. Further, in order to use effectively the residual multiplier for arithmetic operation on an elliptic curve, the point on the elliptic curve is transformed from a two-dimensional affine coordinate system to a three-dimensional coordinate system. Additionally, multiplicative inverse arithmetic for realizing reverse transformation from the three-dimensional coordinate system to the two-dimensional affine coordinate system as well as for determining a signature s can be executed only with the residual multiplication arithmetic. By making use of the residual multiplier in this manner, the processing speed can be increased. Computation complexity can be reduced by storing previously those parameters which are used frequently and constant multiplies of a base point of the elliptic curve in the form of tables, which also contributes to increasing of processing speed.
摘要:
A symmetric-key cryptographic technique capable of realizing both high-speed cryptographic processing having a high degree of parallelism, and alteration detection. The invention includes dividing plaintext composed of redundancy data and a message to generate plaintext blocks each having a predetermined length; generating a random number sequence based on a secret key, generating a random number block corresponding to one of the plaintext blocks from the random number sequence, outputting a feedback value obtained as a result of operation on the one plaintext block and the random number block, the feedback value being fed back for using the operation on another plaintext block, and performing an encryption operation using the one plaintext block, random number block, and feedback value.
摘要:
In a buffer and a state included in a pseudorandom number generating apparatus, the state has the configuration of assuming that the unit length of data processing is n, the state has a size of 3×n bits, and the buffer has a capacity of 32×n bits, and according to clock control, a state transformation section (state transformation function) for conducting a state alteration from time t to time t+1 uses a nonlinear function F (having an n-bit input and an n-bit output) twice, or two different nonlinear functions F and G respectively once. The state transformation section has such a configuration that a nonlinear function such as a round function of a block cipher sufficiently evaluated as to the cryptographic security and implementation.
摘要:
A symmetric-key cryptographic technique capable of realizing both high-speed cryptographic processing having a high degree of parallelism, and alteration detection. The invention includes dividing plaintext composed of redundancy data and a message to generate plaintext blocks each having a predetermined length, generating a random number sequence based on a secret key, generating a random number block corresponding to one of the plaintext blocks from the random number sequence, outputting a feedback value obtained as a result of operation on the one plaintext blocks and the random number block, the feedback value being fed back for using in the operation on another plaintext blocks, and performing an encryption operation using the one plaintext blocks, random number block, and feedback value.
摘要:
An identification code management method and management system includes that the issue and distribution of an ID code having a message authentication code are managed thereby to efficiently and reliably manage a material object using the ID code. An electronic circuit chip with an ID code having a message authentication code stored in a read-only area is used as an identification tag. The information at an ID code order receiving terminal and an identification tag production factory terminal are consolidated and collectively managed at an ID code management terminal. Thereby, the ID code management terminal is inquired of highly confidential information or requested to process the information as required so that an ID code utilization terminal is not required to store the same information.
摘要:
A plurality of work stations each imparted with a multi-window control function are interconnected through an integrated service digital network (ISDN), wherein control communication route is established among a plurality of stations between which interlocutory communication are to be performed. The work stations transfer control commands by way of the control communication route in accordance with operation by users under the control of an interlocution control program to thereby establish or disconnect a logical communication route between designated application programs of the work stations. So long as the logical communication route is established, the application programs can execute data processing in cooperation with each other. In that case, identical change of display in the windows corresponding to the application programs, respectively, takes place in the work stations. User can perform conference or document edition processing by designating the position of data of concern by a pointing object while conducting conversation by using a telephone set installed at the work station.
摘要:
An information service system including a plurality of receiving stations and information service facilities. The information service facilities include a memory circuit which stores beforehand a distribution destination information set of receiving station identifiers allocated to the receiving stations, distribution destination information set being disposed in a predetermined order within the memory circuit, a memory circuit for storing a plurality of information to be supplied to receiving stations, an enciphering circuit for generating an enciphering key for optical receiving stations within a group which performs broadcast communications, and enciphering the service information with the enciphering key, and a circuit for transmitting the enciphered service information and service destination codes of service destination receiving stations encoded from the distribution destination information set, through broadcast communications. Each receiving station includes a memory circuit for storing beforehand its own identifier and the distribution destination information set of the group which performs broadcast communications, a receiver unit for receiving the enciphered service information and the service destination codes from the information service facilities, and a deciphering circuit for generating a deciphering key corresponding to the distribution destination information set in accordance with the received service destination codes and the corresponding, and previously stored distribution destination information, only when the own identifier of the receiving station is contained in the service destination codes, and the deciphering the enciphered service information with the deciphering key.
摘要:
There are provided an encipher method of enciphering message data made by a microcomputer or the like at a high speed by using encipher keys which have previously been stored in a smart card or the like and a decipher method of deciphering the ciphertext made by the encipher method at a high speed by using the encipher keys. The encipher method and the decipher method are suitable for, particularly, a 32-bit microcomputer and include a process expressed by the function Rot.sub.2 i(x) (i=2, 3, 4) in each process. Rot.sub.2 i(x) is the process to circular shift a data train x of 32 bits to the left or right by 2.sup.i bits (i=2, 3, 4).