Encryption key generation device

A technology for encrypting keys and generating devices, applied to secure communication devices and key distribution, can solve problems such as inability to guarantee hacker resistance, and achieve the effect of reducing the amount of information and improving management

Inactive Publication Date: 2012-04-11
SUMITOMO ELECTRIC IND LTD +1
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this case, sufficient hacker

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption key generation device
  • Encryption key generation device
  • Encryption key generation device

Examples

Experimental program
Comparison scheme
Effect test

no. 1 Embodiment

[0087] Next, the encryption key generation operation performed in the first embodiment of the encryption key generation device of the present invention will be described. Furthermore, the encryption key generation device of the first embodiment has Figure 7 The structure shown, more specifically by figure 2 The hardware structure shown in (a) is realized. In this first embodiment, the scalability as the access control object is set to scalability L (layer) and scalability R (resolution level), and the number of layers of scalability L is N L Set to 3, the number of levels of scalability R N R Set to 3. At this time, the packets of each level in the scalability L and R are made into a 3×3 matrix component P i,j (i=0, 1, 2; j=0, 1, 2) for processing. also, Figure 8 is a conceptual diagram for explaining the encryption key generation operation performed by the first embodiment of the encryption key generation device of the present invention ( Figure 7 operation of the ...

no. 2 Embodiment

[0107] Next, the encryption key generation operation executed by the second embodiment of the encryption key generation device of the present invention will be described. In addition, the encryption key generation device of the second embodiment also has the same Figure 7 The structure shown, more specifically by figure 2 The hardware structure shown in (a) is realized. In this second embodiment, the scalability as the access control object is set to scalability L (layer) and scalability R (resolution level), and the number of levels of scalability L is N L Set to 3, the number of levels of scalability R N R Set to 2. At this time, the packets of each level in the scalability L and R are as a 3×2 matrix component P i,j (i=0, 1, 2; j=0, 1) are processed. also, Figure 10 is used to describe the encryption key generation operation performed in the second embodiment of the encryption key generation device of the present invention ( Figure 7 A conceptual diagram of the o...

no. 3 Embodiment

[0121] Next, the encryption key generation operation performed by the encryption key generation device according to the third embodiment of the present invention will be described. In addition, the encryption key generation device of the third embodiment also has the same Figure 7 The structure shown, more specifically, consists of figure 2 The hardware structure shown in (a) is realized. In this third embodiment, the scalability as the access control object is set to scalability L (layer) and scalability R (resolution level), and the number of layers of scalability L is N L Set to 4, the number of layers of scalability R N R Set to 3. At this time, the packets of each level in the scalability L and R are as a 4×3 matrix component P i,j (i=0, 1, 2; j=0, 1, 2, 3) are processed. also, Figure 12 is used to describe the encryption key generation operation performed in the third embodiment of the encryption key generation device of the present invention ( Figure 7 A conc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an encryption key generation device which has resistance against conspiratorial attacks and generates an encryption key having a reduced length and adapted to each scalability layer. In the encryption key generation device (400), a master key (K2,2) captured by an input means (450) is temporarily recorded in a recording means (470). A matrix generation means (462) generates key element matrices (M1 to M3) for keys (eR2, eR1, eR3) into which a key dividing means (461) divides the master key (K2,2). A hashing operation using a one-way hash function is repeated, and the resultant data is assigned to the coordinate components of the key element matrices (M1 to M3) in order to maintain the hierarchy of the scalability (L). Based on the key element matrices (M1 to M3), a key generation means (463) generates partial keys (K1,1 to K2,2) corresponding to the layers of the scalability (R, L). The partial keys (K1,1 to K2,2) are output by an output means (480) to an encoding means (410) or a decoding means (420).

Description

technical field [0001] The present invention relates to a device for generating an encryption key, which is used for data encoding (encryption) and decoding (de-encryption) of numbers with multiple levels of scalability, and in particular to a device for automatically generating encryption keys in various levels of scalability. A means of a partial key (hereinafter referred to as a partial key) corresponding to each hierarchical data unit. Background technique [0002] In recent years, with the spread of information and communication services via the Internet, services for transmitting data to an indeterminate number of parties, for example, distribution services of digital codes such as images (one frame of data including moving images), have also increased. Along with this, the protection technology of digital data in such a network environment (communication system) also needs to seek higher functions. [0003] Generally speaking, encoded digital images and the like are ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/14
CPCH04L9/08H04L9/088
Inventor 畑洋一柿井俊昭藤田康仁后藤由光贵家仁志西川清史藤吉正明今泉祥子
Owner SUMITOMO ELECTRIC IND LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products