Encryption device, encryption method and encryption program

一种加密装置、密码密钥的技术,应用在安全通信装置、编码/译码装置、多个键/算法的用法等方向,能够解决无法进行密码通信等问题

Inactive Publication Date: 2014-01-29
MITSUBISHI ELECTRIC CORP
View PDF8 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Also, in one-time pad ciphers, cipher communication cannot be performed when cipher keys are exhausted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption device, encryption method and encryption program
  • Encryption device, encryption method and encryption program
  • Encryption device, encryption method and encryption program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0057] In Embodiment 1, a technique will be described in which, when the remaining amount (number of remaining bits) of an encryption key for one-time pad encryption (hereinafter referred to as an OTP encryption key) becomes smaller than a predetermined threshold value, the The encoding method of audio or the like is switched to a method (a method with a low bit rate) that reduces the amount of data when encoding audio or the like per unit time. Accordingly, the amount of OTP encryption keys consumed per unit time can be reduced, so the period until the OTP encryption keys are exhausted can be extended. Therefore, the OTP encryption communication can be continued for a longer period.

[0058] In addition, generally, when an encoding method with a higher bit rate is used, better sound quality or image quality is obtained, so when the OTP encryption key is sufficient, it is preferable to use an encoding method with a higher bit rate.

[0059] In Embodiment 1, the encoding metho...

Embodiment approach 2

[0161] In Embodiment 1, the description has been made on the premise that the terminal device is connected to the key sharing device. However, for example, when the terminal device is a portable terminal such as a mobile phone, there may be a situation where the terminal device and the key sharing device are not connected. In this case, there may be a case where the timing for transferring the OTP encryption key from the key sharing device to the terminal device does not match between the terminal devices, and thus the amount of the encryption key held between the terminal devices differs. .

[0162] For example, it is assumed that the terminal device A102 acquires an OTP encryption key from the key sharing device C104 at a certain point of time. Thereafter, it is assumed that a new OTP encryption key is shared between the key sharing device C104 and the key sharing device D105. Furthermore, it is assumed that the terminal device B103 has acquired the OTP encryption key from...

Embodiment approach 3

[0205] In Embodiments 1 and 2, it is determined whether or not the remaining amount of the OTP encryption key held by the terminal device is equal to or greater than a predetermined threshold, and if it is equal to or greater than the threshold, an encoding method with a higher bit rate is used. In rare cases, a lower bit rate encoding method is used. However, for example, in the case of transmitting audio or video data which is more important than usual, a situation may arise where it is desired to prevent degradation of audio quality and image quality due to the use of a low bit rate encoding method. In this case, encoding should be performed with a higher bit rate. In addition, there may be a situation in which it does not matter if deterioration of sound quality or image quality occurs due to a coding method using a low bit rate. In this case, encoding should be performed at a lower bit rate to suppress consumption of OTP encryption keys.

[0206] Therefore, in Embodimen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The purpose of the present invention is to shorten the period of time for which a cryptographic key for one-time pad (OTP) cryptography will be insufficient, when using OTP cryptography to encrypt and send data encoding audio or video. Terminal device A (102) uses the number of bits remaining in an OTP cryptographic key (401) to select one of two encoding methods to use for encoding outgoing data: encoding method A, or encoding method B (which has a lower bit rate than encoding method A). Terminal device A (102) uses the selected encoding method to encode the outgoing data and generate encoded data. Using the OTP cryptographic key, terminal device A (102) then generates encrypted transmission data (405) by using OTP cryptography to encrypt the generated encoded data, and sends the generated encrypted transmission data (405) to terminal device B (103).

Description

technical field [0001] The present invention relates to a technique of transmitting data encrypted using a one-time pad cipher. Background technique [0002] One-time pad ciphers are a way of common key ciphers that share secret keys on the sending and receiving sides. With regard to the one-time pad cipher, encryption is performed using an cipher key of the same amount (same number of bits) as that of the communication data. In addition, regarding the one-time pad password, the encryption key used once for encryption is not used, but the encryption key is made one-time. [0003] As a typical example of a one-time pad cipher, there is a Vernam cipher that calculates an exclusive OR bit by bit with respect to communication data and a cryptographic key, and uses the calculated result as encrypted data. [0004] In cryptographic communication using a one-time pad cipher, the same amount of cryptographic keys as communication data is consumed, so a large number of cryptographi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/14G09C1/00H04L9/20
CPCH04L9/0819H04L2209/34H04L9/0863H04L9/0656H04L9/0852H04L9/16G10L19/22G10L19/24
Inventor 柴田阳一
Owner MITSUBISHI ELECTRIC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products