Unlock instant, AI-driven research and patent intelligence for your innovation.

Communication system and communication device

A communication equipment and communication system technology, applied in transmission systems, wireless communication, digital transmission systems, etc., can solve problems such as target product attacks, and achieve the effect of improving confidentiality and integrity

Active Publication Date: 2016-09-07
RENESAS ELECTRONICS CORP
View PDF7 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to deal with the situation mentioned above, in the field of embedded devices, it often happens that the target product itself is physically attacked, so there is a case where the security function is concentrated on a hardware security module (HSM) with high anti-tampering performance. trend

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication system and communication device
  • Communication system and communication device
  • Communication system and communication device

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0026]

[0027] figure 1is a block diagram showing one configuration example of a communication device and one configuration example of a communication system configured by including the communication device. The communication system 10 is configured by including a first communication device 1_2 and a second communication device 1_1 coupled to each other via a network 5 so as to transmit and receive packets. Other communication devices may be coupled to the network 5 . In addition, the network 5 may be a hierarchical network, and may also be configured by including a relay device between the first communication device 1_2 and the second communication device 1_1. In addition, the network 5 may be any type of communication path through which data packets can be transmitted, regardless of whether it is wired or wireless.

[0028] The first communication device 1_2 and the second communication device 1_1 comprise data packet counters 6_2 and 6_1 respectively. The same random ...

no. 2 example

[0061]

[0062] due in reference to Figure 4 The example describing the first embodiment employs a simple increment in which the values ​​of the packet counters HSM-Host(6_1) and Host-HSM(6_2) are incremented by "1" respectively, so that an attacker can easily estimate the next count value possibility. Accordingly, it is effective to make it difficult for an attacker to estimate the next count value by setting the value to be incremented as a random number.

[0063] Figure 6 is a flowchart showing one example of a flow for setting the value to be incremented of the packet counter to a random number.

[0064]For example, the random number R1 (initial count value) to be set as the initial value of the packet counters HSM-Host(6_1) and Host-HSM(6_2) is compressed by using a lossy compression function such as SHA-256. The last bit of the fixed value obtained in compression is extracted and set to the value S1 to be incremented. R2 (=R1+S1) obtained by adding the value S1 t...

no. 3 example

[0070]

[0071] Based on the first embodiment and the second embodiment image 3 In the description of the configuration example shown in , a system is indicated that encrypts random numbers by using a common key CK shared between the host 4 and the HSM 3 in communication between the host 4 and the HSM 3 in advance. In contrast, when the encryption function is loaded on the host 4, or when the encryption can be calculated by the CPU 11_2 of the host 4, the public Key CK.

[0072] Figure 8 is a block diagram showing a configuration example of the ECU 2 in which the encryption function is also loaded on the host computer 4 . ECU corresponds to image 3 ECU-A(2_A) shown in. similar to image 3 Shown in the host computer 4 to be loaded on the ECU-A (2_A), the host computer 4 includes the CPU 11_2 coupled together via the bus 17_2, the interface (I / F) 12_3 with the CAN 5_2, and the interface with the network 5_1 (I / F) 12_2, ROM 15_2, RAM 16_2 and so on. According to the E...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A communication system and a communication device are provided. Devices between which packets are transmitted and received include mutually corresponding packet counters. The same random number value is given to the packet counters as their initial values and the packet counters are updated with packet transmission / reception. The transmission-side device generates a MAC value, draws out part thereof on the basis of a counted value of its own packet counter, sets it as a divided MAC value, generates a packet by adding the value to a message and transmits the packet onto a network. The reception-side device generates a MAC value on the basis of the message in the received packet, draws out part thereof on the basis of a counted value of its own packet counter, compares the part with the divided MAC value in the received packet and thereby performs message authentication.

Description

[0001] Cross References to Related Applications [0002] The entire disclosure of Japanese Patent Application No. 2015-036298 filed on February 26, 2015 including specification, drawings and abstract is hereby incorporated by reference in its entirety. Background technique [0003] The present invention relates to communication systems and communication devices, and more particularly to communication systems and communication devices advantageously used in communication wherein a portion of a Message Authentication Code (MAC) is included in communication data packets passing through a network. [0004] In various fields represented by, for example, the field of vehicle control systems, the importance of and demands for safety have increased. In order to deal with the situation mentioned above, in the field of embedded devices, it often happens that the target product itself is physically attacked, so there is a case where the security function is concentrated on a hardware sec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/0825H04L9/0869H04L9/3247H04L63/0442H04L63/08H04L9/3242H04L63/123H04L63/1441H04L2209/84H04W4/48H04L67/12H04W12/106H04L2101/622H04L69/22H04L69/324
Inventor 押田大介
Owner RENESAS ELECTRONICS CORP