Communication system and communication device
A communication equipment and communication system technology, applied in transmission systems, wireless communication, digital transmission systems, etc., can solve problems such as target product attacks, and achieve the effect of improving confidentiality and integrity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0026]
[0027] figure 1is a block diagram showing one configuration example of a communication device and one configuration example of a communication system configured by including the communication device. The communication system 10 is configured by including a first communication device 1_2 and a second communication device 1_1 coupled to each other via a network 5 so as to transmit and receive packets. Other communication devices may be coupled to the network 5 . In addition, the network 5 may be a hierarchical network, and may also be configured by including a relay device between the first communication device 1_2 and the second communication device 1_1. In addition, the network 5 may be any type of communication path through which data packets can be transmitted, regardless of whether it is wired or wireless.
[0028] The first communication device 1_2 and the second communication device 1_1 comprise data packet counters 6_2 and 6_1 respectively. The same random ...
no. 2 example
[0061]
[0062] due in reference to Figure 4 The example describing the first embodiment employs a simple increment in which the values of the packet counters HSM-Host(6_1) and Host-HSM(6_2) are incremented by "1" respectively, so that an attacker can easily estimate the next count value possibility. Accordingly, it is effective to make it difficult for an attacker to estimate the next count value by setting the value to be incremented as a random number.
[0063] Figure 6 is a flowchart showing one example of a flow for setting the value to be incremented of the packet counter to a random number.
[0064]For example, the random number R1 (initial count value) to be set as the initial value of the packet counters HSM-Host(6_1) and Host-HSM(6_2) is compressed by using a lossy compression function such as SHA-256. The last bit of the fixed value obtained in compression is extracted and set to the value S1 to be incremented. R2 (=R1+S1) obtained by adding the value S1 t...
no. 3 example
[0070]
[0071] Based on the first embodiment and the second embodiment image 3 In the description of the configuration example shown in , a system is indicated that encrypts random numbers by using a common key CK shared between the host 4 and the HSM 3 in communication between the host 4 and the HSM 3 in advance. In contrast, when the encryption function is loaded on the host 4, or when the encryption can be calculated by the CPU 11_2 of the host 4, the public Key CK.
[0072] Figure 8 is a block diagram showing a configuration example of the ECU 2 in which the encryption function is also loaded on the host computer 4 . ECU corresponds to image 3 ECU-A(2_A) shown in. similar to image 3 Shown in the host computer 4 to be loaded on the ECU-A (2_A), the host computer 4 includes the CPU 11_2 coupled together via the bus 17_2, the interface (I / F) 12_3 with the CAN 5_2, and the interface with the network 5_1 (I / F) 12_2, ROM 15_2, RAM 16_2 and so on. According to the E...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 