+

WO2017030117A1 - Communication data encryption/decryption method and system - Google Patents

Communication data encryption/decryption method and system Download PDF

Info

Publication number
WO2017030117A1
WO2017030117A1 PCT/JP2016/073907 JP2016073907W WO2017030117A1 WO 2017030117 A1 WO2017030117 A1 WO 2017030117A1 JP 2016073907 W JP2016073907 W JP 2016073907W WO 2017030117 A1 WO2017030117 A1 WO 2017030117A1
Authority
WO
WIPO (PCT)
Prior art keywords
ciphertext
key sequence
exclusive
plaintext
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/JP2016/073907
Other languages
French (fr)
Japanese (ja)
Inventor
幹太 松浦
ミオドラッグ ミハイエビッチ
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Tokyo NUC
Original Assignee
University of Tokyo NUC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Tokyo NUC filed Critical University of Tokyo NUC
Publication of WO2017030117A1 publication Critical patent/WO2017030117A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/34Encoding or coding, e.g. Huffman coding or error correction

Definitions

  • the present invention relates to encryption / decryption of communication data using stream encryption.
  • a stream cipher uses a key sequence generated by a pseudo-random number generator using a secret key or initialization vector as a seed, and encryption is performed by exclusive OR operation for each bit of the plaintext sequence and the key sequence.
  • a text sequence is generated, and in decryption, a plaintext sequence is generated by exclusive OR operation for each bit of the ciphertext sequence and the key sequence.
  • stream ciphers are classified into an external synchronization type and a self-synchronization type when focusing on the synchronization of the key sequence generator.
  • Non-Patent Documents 1 to 8 Various stream ciphers have been proposed. For specific examples, eSTREAM and ISO standards that are stream cipher evaluation projects can be referred to. The security and processing performance of stream ciphers depend largely on the security and processing performance of the key sequence generator, but recently, interest in lightweight key sequence generators is high (Non-Patent Documents 1 to 8).
  • the stream cipher has a smaller load on the device than the block cipher, and the stream cipher is advantageous when performing cryptographic communication while saving computer resources such as memory and processing capacity.
  • a device with scarce computer resources such as a sensor
  • a computer-rich device such as a PC (asymmetric computer resource environment)
  • the processing cost is still too high for a device with scarce computer resources. There are challenges.
  • a device with low computer resources such as a sensor
  • a device with high computer resources such as a PC
  • the device with low computer resources operates as a sender (ie, encryption is not performed). Both when operating as a receiver (ie when performing decryption), and reducing the cost of operation on the side of a device with scarce computer resources and theoretically strict safety. is important.
  • JH Kong, L.-M.Ang, KP Seng “A comprehensive survey of modern symmetric cryptographic solutions for resource constrained environments”, Journal of Network and Computer Applications, vol. 49, pp. 15-50, 2015.
  • An object of the present invention is to provide an encryption / decryption method and system capable of reducing the operation cost on the side of a device having scarce computer resources while ensuring safety in data transmission / reception between devices. is there.
  • the communication data encryption / decryption method employed by the present invention is: A method for encrypting / decrypting communication data between a first device and a second device, comprising:
  • the first device includes a key sequence generator, an exclusive OR operator, an error correction decoder, and an embedder.
  • the second device includes a key sequence generator, an exclusive OR operator, an error correction encoder, and a decimator
  • the encryption method in the first device is: Performing an exclusive OR operation of the plaintext and the first key sequence to generate a first ciphertext; Generating a second ciphertext by embedding the first ciphertext using a second key sequence;
  • the decoding method in the second device is: Generating a third ciphertext by performing decimation on the second ciphertext received from the first device using a second key sequence; Performing an exclusive OR operation of the third ciphertext and the first key sequence to output a plaintext;
  • the encryption method in the second device is: Performing an exclusive OR operation of the plaintext and the third key sequence to generate a 1 ′ ciphertext; Generating a second 'ciphertext by error correcting encoding the first'ciphertext;
  • the communication data encryption / decryption system employed by the present invention is: An encryption / decryption system for communication data between a first device and a second device, wherein the first device comprises a key sequence generator, an exclusive OR operator, an error correction decoder, an embedder, With The second device includes a key sequence generator, an exclusive OR operator, an error correction encoder, and a decimator,
  • the encryption means in the first device is: The key sequence generator for generating a first key sequence and a second key sequence;
  • the exclusive OR calculator that performs an exclusive OR operation of the input plaintext and the first key sequence to generate a first ciphertext;
  • Consists of The decoding means in the second device is: The key sequence generator for generating a first key sequence and a second key sequence;
  • the decimator for generating a third ciphertext by performing decim
  • the processing capability of the first device is higher than the processing capability of the second device.
  • a plurality of key sequence generators are used.
  • the first key sequence and the third key sequence are generated by the first key sequence generator
  • the second key sequence and the fourth key sequence are the first key sequence. It is generated by a second key sequence generator that is separate from the sequence generator.
  • the second key sequence and the fourth key sequence may be generated by different key sequence generators
  • the first key sequence and the third key sequence may be generated by further different key sequence generators.
  • the first key sequence to the fourth key sequence may be generated by the same key sequence generator.
  • the present invention is a device that operates as an encryption device and a decryption device,
  • the device includes a key sequence generator, an exclusive OR operator, an error correction decoder, an embedder, a transmission unit, and a reception unit.
  • the encryption device The key sequence generator for generating a first key sequence and a second key sequence;
  • the exclusive OR calculator that performs an exclusive OR operation between the plaintext and the first key sequence to generate a first ciphertext;
  • the embedder for embedding the first ciphertext using a second key sequence to generate a second ciphertext;
  • the transmitting means for transmitting the second ciphertext;
  • Consists of The decryption device Decimation is performed using the fourth key sequence on the second 'ciphertext generated by error correction encoding the first' ciphertext generated by the exclusive OR operation of the plaintext and the third key sequence.
  • the receiving means for receiving the generated 3 ′ ciphertext;
  • the key sequence generator for generating a third key sequence and a fourth key sequence;
  • the error correction decoder for generating a 4 ′ ciphertext by performing error correction decoding of the 3 ′ ciphertext using a fourth key sequence;
  • the exclusive OR operator for executing the exclusive OR operation of the 4 ′ ciphertext and the third key sequence and outputting plaintext;
  • a device consisting of In one aspect, the device is a device rich in computer resources (first device).
  • the present invention is a device that operates as an encryption device and a decryption device,
  • the device includes a key sequence generator, an exclusive OR operator, an error correction encoder, a decimator, transmission means, and reception means
  • the encryption device is: The key sequence generator for generating a first key sequence and a second key sequence;
  • the exclusive OR calculator that performs an exclusive OR operation between the plaintext and the first key sequence to generate a first ciphertext;
  • the error correction encoder for error correcting encoding the first ciphertext to generate a second ciphertext;
  • the decimator for generating a third ciphertext by performing decimation on the second ciphertext using the second key sequence;
  • the transmitting means for transmitting a third ciphertext; Consists of The decoding device
  • the receiving means for receiving the 2 ′ ciphertext generated by embedding the first ′ ciphertext generated by the exclusive OR operation of the plaintext and the third key sequence using the fourth key sequence.
  • the key sequence generator for generating a third key sequence and a fourth key sequence;
  • the decimator that performs decimation on the second 'ciphertext using the fourth key sequence to generate a third'ciphertext;
  • the exclusive OR calculator for executing an exclusive OR operation of a 3 ′ ciphertext and a third key sequence and outputting a plaintext;
  • Device is a device (2nd device) with scarce computer resources.
  • the encryption / decryption method employed by the present invention is as follows: A first step of generating a first ciphertext by performing an exclusive OR operation between the plaintext and the first key sequence; A second step of error correcting encoding the first ciphertext to generate a second ciphertext; A third step of generating a third ciphertext by performing decimation on the second ciphertext using the second key sequence; A fourth step of generating a fourth ciphertext by performing error correction decryption on the third ciphertext using the second key sequence; A fifth step of executing an exclusive OR operation of the fourth ciphertext and the first key sequence to output a plaintext; Consists of.
  • the first to third steps are performed by the second device, and the fourth to fifth steps are performed by the first device.
  • the encryption / decryption system employed by the present invention is: In an encryption / decryption system comprising an encryption device and a decryption device,
  • the encryption device is: An exclusive OR calculator that performs an exclusive OR operation between the plaintext and the first key sequence to generate a first ciphertext;
  • An error correction encoder that performs error correction encoding of the first ciphertext to generate a second ciphertext;
  • a decimator that performs decimation on the second ciphertext using the second key sequence to generate a third ciphertext;
  • Consists of The decoding device An error correction decoder for generating a fourth ciphertext by performing error correction decoding on the third ciphertext using the second key sequence;
  • An exclusive OR calculator that executes an exclusive OR operation of the fourth ciphertext and the first key sequence and outputs a plaintext; Consists of.
  • the encryption device is included in a second device and the decryption device is included in the first device.
  • the first to second steps are performed by the first device, and the third to fourth steps are performed by the second device.
  • the encryption / decryption system employed by the present invention is: In an encryption / decryption system comprising an encryption device and a decryption device,
  • the encryption device is: An exclusive OR calculator that performs an exclusive OR operation between the plaintext and the first key sequence to generate a first ciphertext;
  • Consists of The decoding device A decimator that performs decimation on the second ciphertext using the second key sequence to generate a third ciphertext;
  • An exclusive OR calculator that executes an exclusive OR operation of the third ciphertext and the first key sequence and outputs a plaintext; Consists of.
  • the encryption device is included in a first device and the decryption device is included in a second device.
  • the encryption method employed by the present invention is: Performing an exclusive OR operation of the plaintext and the first key sequence to generate a first ciphertext; Generating a second ciphertext by error-correcting the first ciphertext; Performing a decimation on the second ciphertext using the second key sequence to generate a third ciphertext; Consists of.
  • the encryption device employed by the present invention is: An exclusive OR calculator that performs an exclusive OR operation between the plaintext and the first key sequence to generate a first ciphertext; An error correction encoder that performs error correction encoding of the first ciphertext to generate a second ciphertext; A decimator that performs decimation on the second ciphertext using the second key sequence to generate a third ciphertext; Consists of.
  • the said encryption method and apparatus are implement
  • the decoding method adopted by the present invention is as follows: Generated by performing decimation using the second key sequence on the second ciphertext generated by error correction encoding the first ciphertext generated by the exclusive OR operation of the plaintext and the first key sequence A decryption method of the third ciphertext, Generating a fourth ciphertext by performing error correction decoding on the third ciphertext using the second key sequence; Performing an exclusive OR operation of the fourth ciphertext and the first key sequence to output a plaintext; It has.
  • the decoding device employed by the present invention is: Generated by performing decimation using the second key sequence on the second ciphertext generated by error correction encoding the first ciphertext generated by the exclusive OR operation of the plaintext and the first key sequence A third ciphertext decryption device, An error correction decoder for generating a fourth ciphertext by performing error correction decoding on the third ciphertext using the second key sequence; An exclusive OR calculator that executes an exclusive OR operation of the fourth ciphertext and the first key sequence and outputs a plaintext; Consists of.
  • the decoding method and apparatus are implemented by a first device.
  • encryption methods employed by the present invention are: Performing an exclusive OR operation of the plaintext and the first key sequence to generate a first ciphertext; Generating a second ciphertext by embedding the first ciphertext using a second key sequence; Consists of.
  • Other encryption devices adopted by the present invention are: An exclusive OR calculator that performs an exclusive OR operation between the plaintext and the first key sequence to generate a first ciphertext; An embedder for embedding the first ciphertext using the second key sequence to generate a second ciphertext; Consists of.
  • the encryption method and apparatus are implemented by a first device.
  • decoding methods employed by the present invention are: A method for decrypting a second ciphertext generated by embedding a first ciphertext generated by an exclusive OR operation between a plaintext and a first key sequence using a second key sequence, Performing a decimation on the second ciphertext using the second key sequence to generate a third ciphertext; Performing an exclusive OR operation of the third ciphertext and the first key sequence to output a plaintext; Consists of.
  • decoding devices adopted by the present invention are: A decryption device for a second ciphertext generated by embedding a first ciphertext generated by an exclusive OR operation between a plaintext and a first key sequence using a second key sequence, A decimator that performs decimation on the second ciphertext using the second key sequence to generate a third ciphertext; An exclusive OR calculator that executes an exclusive OR operation of the third ciphertext and the first key sequence and outputs a plaintext; Consists of.
  • the decoding method and apparatus are implemented by a second device.
  • the present invention provides a computer program for causing a computer to execute the above encryption method, A computer program for causing a computer to execute the decoding method; A computer program for causing a computer to execute the encryption / decryption method; It can also be defined as
  • the transmitter / receiver shares prior information (key sequence) necessary for error generation and correction, the sender intentionally generates an error, and the receiver corrects it. Insertion processing (embedding) is expensive, but thinning processing (decimation) for dropping signals is low cost, and error correction decoding is expensive, but error correction coding is low cost If the device with scarce computer resources is the sender and the device with rich computer resources is the receiver, the sender performs decimation and error correction coding, while the receiver performs error correction decoding and If the resource-rich device is the sender and the computer-poor device is the receiver, the sender performs embedding while the receiver performs decimation, and loads the processing with high computational resources. By deviating toward the richer device side, the operating cost of the device side with scarce computer resources was lowered. In addition, power consumption can be significantly reduced by reducing the operating cost on the device side where the computer resources are scarce.
  • the safety can be reduced to a problem well-known in the field of coding theory (decoding after noise insertion or signal loss).
  • the security of the cipher text when the device rich in computer resources is the sender depends on the security of the adopted key sequence generator and the embedding (insertion) of the binary vector using the key sequence.
  • the security of the ciphertext when the sender is a device with scarce computer resources depends on the security of the key sequence generator to be adopted and the decimation of the binary vector using the key sequence.
  • the present invention proposes a cryptographic processing scheme, and the specific configuration of each block or component is not limited. For example, it is used in combination with existing technology or stream encryption technology that will be developed in the future. Can do.
  • the component is a black box (for example, the key sequence generation of the element technology does not depend on a specific algorithm)
  • the proposed method itself is not used because the specific algorithm is broken. It does not fail.
  • the communication data encryption / decryption system includes a first device and a second device.
  • FIG. 1 shows one first device and one second device for convenience, the encryption / decryption system includes one or more first devices and one or more second devices. It may be.
  • the first device and the second device both include a computer and have communication functions such as Bluetooth and Wifi.
  • the computer includes an input unit, a storage unit, a processing unit (arithmetic unit or CPU), an output unit, and the like as hardware, and executes predetermined processing by software (computer program).
  • the first device is rich in computer resources (CPU, memory, etc.), and the second device is scarce in computer resources.
  • the first device has a higher processing capability (calculation capability) than the second device, and the second device can operate with lower power consumption.
  • Examples of the first device include PCs (desktops, laptops, notebooks, etc.), servers, mobile computers (smartphones, mobile phones, PDAs, tablets, wearable computers with predetermined computer resources, etc.), tag readers, etc.
  • PCs desktops, laptops, notebooks, etc.
  • servers mobile computers (smartphones, mobile phones, PDAs, tablets, wearable computers with predetermined computer resources, etc.), tag readers, etc.
  • the second device examples include a sensor (IC built-in), an RFID tag, an IC tag, an IC card, and a wearable computer.
  • the second device is a sensor (a wearable sensor, an embedded sensor, etc.) that can be employed in a wireless sensor network (WSN) or a ubiquitous sensor network (USN).
  • WSN wireless sensor network
  • USB ubiquitous sensor network
  • Both the first device and the second device are provided with an input unit, an output unit, and a communication function (transmission unit, reception unit), and can communicate via a computer network (typically the Internet).
  • Data can be transmitted and received (typically wireless) between the first device and the second device.
  • a second device for example, a sensor
  • data acquired by the sensor is transmitted to the first device (a server or a host computer) via a wireless network.
  • Both the first device and the second device include an encryption device and a decryption device, and encryption communication is performed in the exchange of data.
  • data (bit string) transmitted from the first device to the second device is encrypted by the encryption device of the first device and transmitted to the second device
  • the data received by the second device is
  • the data (bit string) decrypted (decrypted) by the decryption device of the two devices and first transmitted from the second device to the device is encrypted by the encryption device of the second device and transmitted to the first device
  • Data received by one device is decoded (decoded) by the decoding device of the first device.
  • bidirectional encrypted communication of data is performed between the first device and the second device, but only in one direction from the first device to the second device, or from the second device to the first device. Encryption communication may be employed only in one direction.
  • Each component of the encryption device and the decryption device can be configured by computer hardware / software.
  • the first device includes a key sequence generator, an exclusive OR operator, an embedder (embedder), an error correction decoder, and data transmission / reception means.
  • the encryption device of the first device (upper diagram in FIG. 2) is composed of a key sequence generator, an exclusive OR operator, and an embedder, and the decryption device (upper diagram in FIG. 3) is a key sequence generator, exclusive It consists of a logical sum operator and an error correction decoder.
  • the first device rich in computer resources performs random bit embedding after performing a bitwise exclusive OR operation (stream cipher operation) with a lightweight key sequence generator during transmission, that is, in encryption processing.
  • the first device performs stream cipher operation after performing error correction decoding at the time of reception, that is, in the decoding process.
  • the second device includes a key sequence generator, an exclusive OR calculator, a decimation unit (decimator), an error correction encoder, and data transmission / reception means.
  • the encryption device (lower diagram in FIG. 3) of the second device is composed of a key sequence generator, an exclusive OR operator, a decimation unit, and an error correction encoder, and the decryption device (lower diagram in FIG. 2) is a key sequence generator. Unit, an exclusive OR calculator, and a decimation unit.
  • the second device with scarce computer resources performs error correction coding after performing stream cipher operation during transmission, that is, encryption processing, and further performs decimation (decimation processing). Further, the second device performs stream cipher computation after decimation at the time of reception, that is, in the decryption process.
  • the types of key sequence generators and stream ciphers that can be used in this embodiment are not limited, and the present invention can be implemented using existing techniques.
  • a block cipher that operates in the CTR mode may be employed.
  • the means for synchronizing the key sequence generators of the first device and the second device is not limited.
  • the key sequence generator is a lightweight key sequence generator.
  • a lightweight key sequence generator although not limited thereto, for example, Trivium (Non-patent Document 3) or Grain v1 (Non-patent Document 8) proposed by eSTREAM can be employed.
  • the error correction code is a technique for correcting an error that occurs in a transmission path by providing redundancy to information to be transmitted.
  • the encoder adds redundant bits to the information sequence.
  • a decoder corrects bit errors occurring in the communication path.
  • the decoder corrects the error using the added redundant bits.
  • the transmitter / receiver shares prior information (key sequence) necessary for error generation and correction, the sender intentionally generates an error, and the receiver corrects it.
  • the key sequence (secret parameter) supplied from the key sequence generator is used when the embedder, the decimation unit, and the error correction decoder perform the embedding process, the decimation process, and the decoding process, respectively.
  • Insertion processing is expensive, but thinning processing (decimation) for dropping signals is low cost, and error correction decoding is expensive, but error correction coding is low cost
  • the second device performs decimation and error correction coding, while the first device performs error correction decoding and the first device
  • the sender or the second device is the receiver, the first device performs embedding while the second device performs decimation so that the processing with high load is biased toward the first device.
  • the operation cost of the second device can be kept low.
  • LDPC codes low-density parity-check code
  • Non-Patent Documents 9 and 10 Non-Patent Documents 9 and 10 can be referred to.
  • codes other than the LDPC code include, but are not limited to, an LT (Luby-Transform) code exemplified as an RS (Reed-Solomon) code and a fountain code.
  • embedding and insertion are substantially synonymous in the process of adding bits to a binary bit string.
  • the embedding is used from the viewpoint of the embedding side (sender), and since the key sequence knows where to embed bits, “deterministic insertion” is performed. Insertion is also used when viewed from the standpoint of a third party (including an attacker). For third parties who do not know the key sequence, it is not possible to distinguish between embedded (inserted) bits and stochastic noise.
  • decimation and deletion are substantially synonymous in the process of dropping bits from a binary bit string.
  • the encryption device in the first device is: A key sequence generator for generating a first key sequence and a second key sequence; An exclusive OR calculator that executes an exclusive OR operation of the input plaintext and the first key sequence to generate a first ciphertext; An embedder for embedding the first ciphertext using the second key sequence to generate a second ciphertext; Consists of
  • the decoding device in the second device is: A key sequence generator for generating a first key sequence and a second key sequence; A decimator that performs decimation on the second ciphertext received from the first device using the second key sequence to generate a third ciphertext; An exclusive OR calculator that executes an exclusive OR operation of the third ciphertext and the first key sequence and outputs a plaintext; Consists of.
  • the encryption method in the first device is Performing an exclusive OR operation of the plaintext and the first key sequence to generate a first ciphertext; Generating a second ciphertext by embedding the first ciphertext using a second key sequence; With The decoding method in the second device is: Performing decimation on the second ciphertext received from the first device using the second key sequence to generate a third ciphertext; Performing an exclusive OR operation of the third ciphertext and the first key sequence to output a plaintext; Is provided.
  • the encryption device in the second device includes a key sequence generator for generating a third key sequence and a fourth key sequence, An exclusive OR calculator that performs an exclusive OR operation of the plaintext and the third key sequence to generate a 1 ′ ciphertext; An encoder for error-correcting the first 'ciphertext to generate a second'ciphertext; A decimator that performs decimation on the second 'ciphertext using the fourth key sequence to generate a third'ciphertext; Consists of The decoding device in the first device is: A key sequence generator for generating a third key sequence and a fourth key sequence; A decoder that performs error correction decoding on the 3 ′ ciphertext received from the second device using a fourth key sequence to generate a 4 ′ ciphertext; An exclusive OR calculator that performs an exclusive OR operation of the 4 ′ ciphertext and the third key
  • the encryption method in the second device is Performing an exclusive OR operation of the plaintext and the third key sequence to generate a 1 ′ ciphertext; Generating a second ciphertext by error correcting encoding the first ciphertext; Performing decimation on the second 'ciphertext using the fourth key sequence to generate a third'ciphertext;
  • the decoding method in the first device is: Generating a 4 ′ ciphertext by performing error correction decoding on the 3 ′ ciphertext received from the second device using a fourth key sequence; Performing an exclusive OR operation of the 4 ′ ciphertext and the second key sequence to output plaintext; It has.
  • FIG. 4 shows an overall view of the encryption / decryption system in the asymmetric computer resource environment.
  • the figure shows a lightweight key sequence generator, an encoding block, a decoding block, an embedding block, and a decimation block exemplified as a key sequence generator.
  • the lightweight key sequence generator generates binary key sequences X, X * , and X ** .
  • the binary key sequence X is generated by the first lightweight key sequence generator, and the binary key sequences X * and X ** are generated by the second lightweight key.
  • coding block provide the encoding ⁇ 0,1 ⁇ n ⁇ ⁇ 0,1 ⁇ n + m .
  • embedding block m random bits are inserted (embedded) into a given n-dimensional binary vector using the binary key sequence X * .
  • decimation block a predetermined n bits are selected by performing decimation on a given n + m-dimensional binary vector using a binary key sequence X ** (or X * ).
  • An n-dimensional binary vector which is a segment of a key sequence generated by a binary key sequence generator.
  • An n-dimensional binary vector which is a segment of a key sequence generated by a binary key sequence generator.
  • n + m-dimensional binary vector which is a segment of a key sequence generated by a binary key sequence generator.
  • An m-dimensional binary vector the elements of which are realized by independent, iso-distributed (iid) binary random variables.
  • Decimation operator i.e. binary vector of (n + m) dimensions under the control of vector X ** From According to the above, a predetermined n bits are selected.
  • FIG. 5 shows the encryption / decryption system shown in FIG. 4 in an organized manner.
  • Encryption in the first device uses key sequence generation and random bit embedding (see the upper diagram in FIG. 2), and encryption in the second device uses key sequence generation, encoding, and decimation (see the lower diagram in FIG. 3). ).
  • Decryption (decryption) in the first device uses key sequence generation and decryption (see the upper diagram in FIG. 3), and decryption (decryption) in the second device uses key sequence generation and decimation (see the lower diagram in FIG. 2). .
  • the first device When the first device is a sender and the second device is a receiver, the first device performs embedding while the second device performs decimation, the second device is the sender, and the first device is the receiver In the second device, the second device performs the decimation and error correction coding, while the first device performs error correction decoding, and the second device is biased toward the first device by biasing the high-load processing to the second device.
  • the operating cost of the device can be kept low.
  • the processing amount in the device 1 according to the proposed stream cipher is A first key sequence generation unit, a second key sequence generation unit in the key sequence generator, Decryption in BEC, Random bit generation, Embedded blocks, Consists of
  • the processing amount in the device 2 related to the proposed stream cipher is A first key sequence generation unit, a second key sequence generation unit in the key sequence generator, Encoding in BEC, Decimation block, Consists of When Trivium (Non-Patent Document 3) is used as the first key sequence generation unit, Grain v1 (Non-Patent Document 8) is used as the second key sequence generation unit, and LDPC code (Non-Patent Document 9) is used as the encoding and decoding code. It becomes as follows.
  • the present invention can be used as a security technique for such a system.
  • the application range is greatly widened.
  • security of critical infrastructure such as electric power, healthcare embedded in people or using mobile devices, services for elderly people, agriculture using various sensors, fishery support and disaster countermeasure systems, can be used without carrying a computer
  • Applications such as next-generation credit card payments on the go can be expected to have significant market applications as well as global markets.
  • the utility value is high as those basic technologies.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The objective of the present invention is to reduce operating costs on a device side having poor computer resources, while maintaining security. In the present invention, an encryption device comprises: an exclusive OR computing unit which executes an exclusive OR computation between plaintext and a first keystream to generate first encrypted text; an error correcting coding unit which subjects the first encrypted text to error correction coding to generate second encrypted text; and a decimator which subjects the second encrypted text to decimation using a second keystream to generate third encrypted text; and a decryption device comprises: an error correcting decoding unit which subjects the third encrypted text to error correcting decoding using the second keystream to generate fourth encrypted text; and an exclusive OR computing unit which executes an exclusive OR computation between the fourth encrypted text and the first keystream and outputs plaintext.

Description

通信データの暗号化/復号方法及びシステムCommunication data encryption / decryption method and system

本発明は、ストリーム暗号を用いた通信データの暗号化/復号に関するものである。 The present invention relates to encryption / decryption of communication data using stream encryption.

今日のコンピュータネットワーク社会において、通信内容の機密性を確保する暗号技術は情報セキュリティの中核の1つである。暗号には公開鍵暗号と共通鍵暗号があり、共通鍵暗号は、ブロック暗号とストリーム暗号に大別できることが知られている。 In today's computer network society, encryption technology that ensures the confidentiality of communication contents is one of the cores of information security. It is known that there are public key cryptography and common key cryptography, and the common key cryptography can be roughly divided into block cipher and stream cipher.

ストリーム暗号は、秘密鍵ないし初期化ベクトルをシードとして、疑似乱数生成器によって生成した鍵系列を用いるものであり、暗号化においては、平文系列と鍵系列のビット毎の排他的論理和演算によって暗号文系列を生成し、復号においては、暗号文系列と鍵系列のビット毎の排他的論理和演算によって平文系列を生成する。また、ストリーム暗号は、鍵系列生成器の同期に着目すると、外部同期型と自己同期型に分類される。 A stream cipher uses a key sequence generated by a pseudo-random number generator using a secret key or initialization vector as a seed, and encryption is performed by exclusive OR operation for each bit of the plaintext sequence and the key sequence. A text sequence is generated, and in decryption, a plaintext sequence is generated by exclusive OR operation for each bit of the ciphertext sequence and the key sequence. Further, stream ciphers are classified into an external synchronization type and a self-synchronization type when focusing on the synchronization of the key sequence generator.

ストリーム暗号については、様々なものが提案されており、具体例については、ストリーム暗号評価プロジェクトであるeSTREAMやISO規格を参照することができる。ストリーム暗号の安全性及び処理性能は、鍵系列生成器の安全性及び処理性能に依存する部分が大きいが、最近では、軽量鍵系列生成器についての関心も高い(非特許文献1~8)。 Various stream ciphers have been proposed. For specific examples, eSTREAM and ISO standards that are stream cipher evaluation projects can be referred to. The security and processing performance of stream ciphers depend largely on the security and processing performance of the key sequence generator, but recently, interest in lightweight key sequence generators is high (Non-Patent Documents 1 to 8).

ストリーム暗号は、ブロック暗号に比べてデバイスにかかる負荷が小さく、メモリーや処理能力といった計算機資源を節約して暗号通信を行う場合、ストリーム暗号は有利である。しかし、センサー等の計算機資源の乏しいデバイスが、PCのような計算機資源豊かなデバイスと暗号通信を行う環境(非対称計算機資源環境)では、計算機資源の乏しいデバイスにとって処理が依然として動作コストが高すぎるという課題がある。 The stream cipher has a smaller load on the device than the block cipher, and the stream cipher is advantageous when performing cryptographic communication while saving computer resources such as memory and processing capacity. However, in an environment where a device with scarce computer resources, such as a sensor, performs cryptographic communication with a computer-rich device such as a PC (asymmetric computer resource environment), the processing cost is still too high for a device with scarce computer resources. There are challenges.

ワイヤレス・センサーネットワーク(WSN)やユビキタス・センサーネットワーク(USN)に例示されるように、高性能な計算機だけでなく情報処理能力の低いウェラブルデバイスやセンサーなどのデバイスを含む複雑なネットワークシステムを構築し、新たなサービスと市場を創出する期待が高まっている。そのようなネットワークシステムのためのセキュリティ技術のニーズがあるものの、現在のストリーム暗号技術は必ずしもそのニーズに応えられるものであるとは言えない。 Construct complex network systems that include not only high-performance computers but also devices such as wearable devices and sensors with low information processing capabilities, as exemplified by wireless sensor networks (WSN) and ubiquitous sensor networks (USN) And there are growing expectations of creating new services and markets. Although there is a need for security technology for such a network system, the current stream encryption technology cannot always meet that need.

計算機資源の乏しいデバイス(センサ等)が計算機資源の豊かなデバイス(PC等)と暗号通信を行うという非対称的な環境において、計算機資源の乏しいデバイスが送信者として動作する場合(すなわち、暗号化を行う場合)でも、また、受信者として動作する場合(すなわち、復号を行う場合)でも、計算機資源の乏しいデバイス側の動作コストが低いことと、理論的に厳密な安全性と、を両立させることが重要である。
J.H. Kong, L.-M. Ang, K.P. Seng, “A comprehensive survey of modern symmetric cryptographic solutions for resource constrained environments”, Journal of Network and Computer Applications, vol. 49,pp. 15-50, 2015. ISO/IEC 18033-4:2011 (Information technology - Security techniques - Lightweight cryptography - Part4: Stream Chiphers). ISO/IEC 29192-3:2012 (Information technology - Security techniques - Lightweight cryptography - Part3: Stream Chiphers). F. Busching and L.Wolf, “The Rebirth of One-Time PadsSecure Data Transmission from BAN to Sink”,IEEE Internet of Things Journal, vol. 2, no. 1, pp.63-71, Feb. 2015. P. Zhang, C. Lin, Y. Jiang, Y. Fan, and X. (Sherman) Shen, “A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks”, IEEE Transactions on Parallel and Distributed Systems,vol. 25, no. 9, pp. 2211-2221, Sept. 2014. G. Bansod, N. Raval, and N. Pisharoty, “Implementation of a New Lightweight Encryption Design for Embedded Security”, IEEE Transactions on Information Forensic and Security, vol. 10, no. 1, pp.142-151, Jan. 2015. Q. Yu and C.N. Zhang, “A lightweight secure data transmission protocol for resource constrained devices”, Security Comm. Networks vol. 3, pp. 362-370, 2010. Grain v1: The eSTREAM portfolio of stream ciphers. Available: http://www.ecrypt.eu.org/stream/e2-grain.html V. Jamali, Y. Karimian, J. Huber, and M.A. Attari, “On the Design of Fast Convergent LDPC Codes for the BEC: An Optimization Approach”, IEEE Transactions on Communications, vol. 63, no. 2, pp.351-363, Feb. 2015. L. Lan, L. Zeng, Y.Y. Tai, L. Chen, S. Lin, and K. Abdel-Ghaffar, “Construction of Quasi-Cyclic LDPC Codes for AWGN and Binary Erasure Channels: A Finite Field Approach”, IEEE Transactions on Information Theory, vol. 53, no. 7, pp. 2429-2458, July 2007.
In an asymmetric environment where a device with low computer resources (such as a sensor) performs cryptographic communication with a device with high computer resources (such as a PC), the device with low computer resources operates as a sender (ie, encryption is not performed). Both when operating as a receiver (ie when performing decryption), and reducing the cost of operation on the side of a device with scarce computer resources and theoretically strict safety. is important.
JH Kong, L.-M.Ang, KP Seng, “A comprehensive survey of modern symmetric cryptographic solutions for resource constrained environments”, Journal of Network and Computer Applications, vol. 49, pp. 15-50, 2015. ISO / IEC 18033-4: 2011 (Information technology-Security techniques-Lightweight cryptography-Part4: Stream Chiphers). ISO / IEC 29192-3: 2012 (Information technology-Security techniques-Lightweight cryptography-Part3: Stream Chiphers). F. Busching and L. Wolf, “The Rebirth of One-Time Pads Secure Data Transmission from BAN to Sink”, IEEE Internet of Things Journal, vol. 2, no. 1, pp.63-71, Feb. 2015. P. Zhang, C. Lin, Y. Jiang, Y. Fan, and X. (Sherman) Shen, “A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks”, IEEE Transactions on Parallel and Distributed Systems, vol. 25 , no. 9, pp. 2211-2221, Sept. 2014. G. Bansod, N. Raval, and N. Pisharoty, “Implementation of a New Lightweight Encryption Design for Embedded Security”, IEEE Transactions on Information Forensic and Security, vol. 10, no. 1, pp.142-151, Jan. 2015. Q. Yu and CN Zhang, “A lightweight secure data transmission protocol for resource constrained devices”, Security Comm. Networks vol. 3, pp. 362-370, 2010. Grain v1: The eSTREAM portfolio of stream ciphers. Available: http://www.ecrypt.eu.org/stream/e2-grain.html V. Jamali, Y. Karimian, J. Huber, and MA Attari, “On the Design of Fast Convergent LDPC Codes for the BEC: An Optimization Approach”, IEEE Transactions on Communications, vol. 63, no. 2, pp.351 -363, Feb. 2015. L. Lan, L. Zeng, YY Tai, L. Chen, S. Lin, and K. Abdel-Ghaffar, “Construction of Quasi-Cyclic LDPC Codes for AWGN and Binary Erasure Channels: A Finite Field Approach”, IEEE Transactions on Information Theory, vol. 53, no. 7, pp. 2429-2458, July 2007.

本発明は、デバイス間のデータの送受信における安全性を確保するものでありながら、計算機資源の乏しいデバイス側の動作コストを低くできる暗号化/復号方法及びシステムを提供することを目的とするものである。 An object of the present invention is to provide an encryption / decryption method and system capable of reducing the operation cost on the side of a device having scarce computer resources while ensuring safety in data transmission / reception between devices. is there.

 本発明が採用した通信データの暗号化/復号方法は、
 第1デバイスと第2デバイス間の通信データの暗号化/復号方法であって、
 前記第1デバイスは、鍵系列生成器と、排他的論理和演算器と、誤り訂正復号器と、エンベッダと、を備え、
 前記第2デバイスは、鍵系列生成器と、排他的論理和演算器と、誤り訂正符号化器と、デシメータと、を備え、
 前記第1デバイスが送信機、前記第2デバイスが受信機の場合には、
 前記第1デバイスにおける暗号化方式は、
 平文と第1鍵系列の排他的論理和演算を実行して第1暗号文を生成するステップと、
 前記第1暗号文に対して第2鍵系列を用いて埋め込みを実行して第2暗号文を生成するステップと、
 を備え、
 前記第2デバイスにおける復号方式は、
 前記第1デバイスから受信した第2暗号文に対して第2鍵系列を用いてデシメーションを実行して第3暗号文を生成するステップと、
 第3暗号文と第1鍵系列の排他的論理和演算を実行して平文を出力するステップと、
を備え、
 前記第2デバイスが送信機、前記第1デバイスが受信機の場合には、
 前記第2デバイスにおける暗号化方式は、
 平文と第3鍵系列の排他的論理和演算を実行して第1´暗号文を生成するステップと、
 第1´暗号文を誤り訂正符号化して第2´暗号文を生成するステップと、
 第2´暗号文に対して第4鍵系列を用いてデシメーションを実行して第3´暗号文を生成するステップと、
 を備え、
 前記第1デバイスにおける復号方式は、
 前記第2デバイスから受信した第3´暗号文を第4鍵系列を用いて誤り訂正復号して第4´暗号文を生成するステップと、
 第4´暗号文と第3鍵系列の排他的論理和演算を実行して平文を出力するステップと、
 を備えている、
 通信データの暗号化/復号方法。
The communication data encryption / decryption method employed by the present invention is:
A method for encrypting / decrypting communication data between a first device and a second device, comprising:
The first device includes a key sequence generator, an exclusive OR operator, an error correction decoder, and an embedder.
The second device includes a key sequence generator, an exclusive OR operator, an error correction encoder, and a decimator,
When the first device is a transmitter and the second device is a receiver,
The encryption method in the first device is:
Performing an exclusive OR operation of the plaintext and the first key sequence to generate a first ciphertext;
Generating a second ciphertext by embedding the first ciphertext using a second key sequence;
With
The decoding method in the second device is:
Generating a third ciphertext by performing decimation on the second ciphertext received from the first device using a second key sequence;
Performing an exclusive OR operation of the third ciphertext and the first key sequence to output a plaintext;
With
When the second device is a transmitter and the first device is a receiver,
The encryption method in the second device is:
Performing an exclusive OR operation of the plaintext and the third key sequence to generate a 1 ′ ciphertext;
Generating a second 'ciphertext by error correcting encoding the first'ciphertext;
Performing decimation on the second 'ciphertext using the fourth key sequence to generate a third'ciphertext;
With
The decoding method in the first device is:
Generating a 4 ′ ciphertext by performing error correction decoding on the 3 ′ ciphertext received from the second device using a fourth key sequence;
Performing an exclusive OR operation of the 4 ′ ciphertext and the third key sequence to output plaintext;
With
Communication data encryption / decryption method.

 本発明が採用した通信データの暗号化/復号システムは、
 第1デバイスと第2デバイス間の通信データの暗号化/復号システムであって、 前記第1デバイスは、鍵系列生成器と、排他的論理和演算器と、誤り訂正復号器と、エンベッダと、を備え、
 前記第2デバイスは、鍵系列生成器と、排他的論理和演算器と、誤り訂正符号化器と、デシメータと、を備え、
 前記第1デバイスが送信機、前記第2デバイスが受信機の場合には、
 前記第1デバイスにおける暗号化手段は、
 第1鍵系列、第2鍵系列を生成する前記鍵系列生成器と、
 入力された平文と第1鍵系列の排他的論理和演算を実行して第1暗号文を生成する前記排他的論理和演算器と、
 前記第1暗号文に対して第2鍵系列を用いて埋め込みを実行して第2暗号文を生成する前記エンベッダと、
 からなり、
 前記第2デバイスにおける復号手段は、
 第1鍵系列、第2鍵系列を生成する前記鍵系列生成器と、
 前記第1デバイスから受信した第2暗号文に対して第2鍵系列を用いてデシメーションを実行して第3暗号文を生成する前記デシメータと、
 第3暗号文と第1鍵系列の排他的論理和演算を実行して平文を出力する前記排他的論理和演算器と、
 からなり、
 前記第2デバイスが送信機、前記第1デバイスが受信機の場合には、
 前記第2デバイスにおける暗号化手段は
 第3鍵系列、第4鍵系列を生成する前記鍵系列生成器と、
 平文と第3鍵系列の排他的論理和演算を実行して第1´暗号文を生成する前記排他的論理和演算器と、
 第1´暗号文を誤り訂正符号化して第2´暗号文を生成する前記誤り訂正符号化器と、
 第2´暗号文に対して第4鍵系列を用いてデシメーションを実行して第3´暗号文を生成する前記デシメータと、
 からなり、
 前記第1デバイスにおける復号手段は、
 第3鍵系列、第4鍵系列を生成する前記鍵系列生成器と、
 前記第2デバイスから受信した第3´暗号文を第4鍵系列を用いて誤り訂正復号して第4´暗号文を生成する誤り訂正復号器と、
 第4´暗号文と第3鍵系列の排他的論理和演算を実行して平文を出力する排他的論理和演算器と、
 からなる。
The communication data encryption / decryption system employed by the present invention is:
An encryption / decryption system for communication data between a first device and a second device, wherein the first device comprises a key sequence generator, an exclusive OR operator, an error correction decoder, an embedder, With
The second device includes a key sequence generator, an exclusive OR operator, an error correction encoder, and a decimator,
When the first device is a transmitter and the second device is a receiver,
The encryption means in the first device is:
The key sequence generator for generating a first key sequence and a second key sequence;
The exclusive OR calculator that performs an exclusive OR operation of the input plaintext and the first key sequence to generate a first ciphertext;
The embedder for generating a second ciphertext by embedding the first ciphertext using a second key sequence;
Consists of
The decoding means in the second device is:
The key sequence generator for generating a first key sequence and a second key sequence;
The decimator for generating a third ciphertext by performing decimation on the second ciphertext received from the first device using a second key sequence;
Executing the exclusive OR operation of the third ciphertext and the first key sequence to output a plaintext;
Consists of
When the second device is a transmitter and the first device is a receiver,
The encryption means in the second device includes a key sequence generator for generating a third key sequence and a fourth key sequence,
The exclusive OR calculator that performs an exclusive OR operation of the plaintext and the third key sequence to generate a 1 'ciphertext;
The error correction encoder for error correcting encoding the first 'ciphertext to generate the second'ciphertext;
The decimator that performs decimation on the second 'ciphertext using the fourth key sequence to generate a third'ciphertext;
Consists of
The decoding means in the first device is:
The key sequence generator for generating a third key sequence and a fourth key sequence;
An error correction decoder for generating a 4 ′ ciphertext by performing error correction decoding on the 3 ′ ciphertext received from the second device using a fourth key sequence;
An exclusive OR calculator that performs an exclusive OR operation of the 4 ′ ciphertext and the third key sequence and outputs a plaintext;
Consists of.

 1つの態様では、第1デバイスの処理能力は、第2デバイスの処理能力よりも高い。
 1つの態様では、複数の鍵系列生成器が用いられ、例えば、第 1鍵系列と第3鍵系列が第1鍵系列生成器によって生成され、第2鍵系列と第4鍵系列が第1鍵系列生成器と別個の第 2鍵系列生成器によって生成される。
 また、第2鍵系列と第4鍵系列をさらに異なる鍵系列生成器によって生成してもよく、また、第1鍵系列と第3鍵系列をさらに異なる鍵系列生成器によって生成してもよい。また、第1鍵系列~第4鍵系列を同一の鍵系列生成器によって生成してもよい。
In one aspect, the processing capability of the first device is higher than the processing capability of the second device.
In one aspect, a plurality of key sequence generators are used. For example, the first key sequence and the third key sequence are generated by the first key sequence generator, and the second key sequence and the fourth key sequence are the first key sequence. It is generated by a second key sequence generator that is separate from the sequence generator.
Further, the second key sequence and the fourth key sequence may be generated by different key sequence generators, and the first key sequence and the third key sequence may be generated by further different key sequence generators. Further, the first key sequence to the fourth key sequence may be generated by the same key sequence generator.

 本発明が採用した他の技術手段は、暗号化装置及び復号装置として動作するデバイスであって、
 前記デバイスは、鍵系列生成器と、排他的論理和演算器と、誤り訂正復号器と、エンベッダと、送信手段と、受信手段と、を備え、
 暗号化装置は、
 第1鍵系列、第2鍵系列を生成する前記鍵系列生成器と、
 平文と第1鍵系列の排他的論理和演算を実行して第1暗号文を生成する前記排他的論理和演算器と、
 第1暗号文に対して第2鍵系列を用いて埋め込みを実行して第2暗号文を生成する前記エンベッダと、
 第2暗号文を送信する前記送信手段と、
 からなり、
 復号装置は、
 平文と第3鍵系列の排他的論理和演算により生成された第1´暗号文を誤り訂正符号化して生成された第2´暗号文に対して第4鍵系列を用いてデシメーションを実行して生成された第3´暗号文を受信する前記受信手段と、
 第3鍵系列、第4鍵系列を生成する前記鍵系列生成器と、
 第3´暗号文を第4鍵系列を用いて誤り訂正復号して第4´暗号文を生成する前記誤り訂正復号器と、
 第4´暗号文と第3鍵系列の排他的論理和演算を実行して平文を出力する前記排他的論理和演算器と、
 からなる、デバイス。
 1つの態様では、当該デバイスは、計算機資源が豊富なデバイス(第1デバイス)である。
Another technical means adopted by the present invention is a device that operates as an encryption device and a decryption device,
The device includes a key sequence generator, an exclusive OR operator, an error correction decoder, an embedder, a transmission unit, and a reception unit.
The encryption device
The key sequence generator for generating a first key sequence and a second key sequence;
The exclusive OR calculator that performs an exclusive OR operation between the plaintext and the first key sequence to generate a first ciphertext;
The embedder for embedding the first ciphertext using a second key sequence to generate a second ciphertext;
The transmitting means for transmitting the second ciphertext;
Consists of
The decryption device
Decimation is performed using the fourth key sequence on the second 'ciphertext generated by error correction encoding the first' ciphertext generated by the exclusive OR operation of the plaintext and the third key sequence. The receiving means for receiving the generated 3 ′ ciphertext;
The key sequence generator for generating a third key sequence and a fourth key sequence;
The error correction decoder for generating a 4 ′ ciphertext by performing error correction decoding of the 3 ′ ciphertext using a fourth key sequence;
The exclusive OR operator for executing the exclusive OR operation of the 4 ′ ciphertext and the third key sequence and outputting plaintext;
A device consisting of
In one aspect, the device is a device rich in computer resources (first device).

 本発明が採用した他の技術手段は、暗号化装置及び復号装置として動作するデバイスであって、
 前記デバイスは、鍵系列生成器と、排他的論理和演算器と、誤り訂正符号化器と、デシメータと、送信手段と、受信手段と、を備え、
 前記暗号化装置は、
 第1鍵系列、第2鍵系列を生成する前記鍵系列生成器と、
 平文と第1鍵系列の排他的論理和演算を実行して第1暗号文を生成する前記排他的論理和演算器と、
 第1暗号文を誤り訂正符号化して第2暗号文を生成する前記誤り訂正符号化器と、
 第2暗号文に対して第2鍵系列を用いてデシメーションを実行して第3暗号文を生成する前記デシメータと、
 第3暗号文を送信する前記送信手段と、
 からなり、
 前記復号装置は、
 平文と第3鍵系列の排他的論理和演算により生成された第1´暗号文に対して第4鍵系列を用いて埋め込みを実行して生成された第2´暗号文を受信する前記受信手段と、
 第3鍵系列、第4鍵系列を生成する前記鍵系列生成器と、
 第2´暗号文に対して第4鍵系列を用いてデシメーションを実行して第3´暗号文を生成する前記デシメータと、
 第3´暗号文と第3鍵系列の排他的論理和演算を実行して平文を出力する前記排他的論理和演算器と、
 からなる、デバイス、である。
 1つの態様では、当該デバイスは、計算機資源が乏しいデバイス(第2デバイス)である。
Another technical means adopted by the present invention is a device that operates as an encryption device and a decryption device,
The device includes a key sequence generator, an exclusive OR operator, an error correction encoder, a decimator, transmission means, and reception means,
The encryption device is:
The key sequence generator for generating a first key sequence and a second key sequence;
The exclusive OR calculator that performs an exclusive OR operation between the plaintext and the first key sequence to generate a first ciphertext;
The error correction encoder for error correcting encoding the first ciphertext to generate a second ciphertext;
The decimator for generating a third ciphertext by performing decimation on the second ciphertext using the second key sequence;
The transmitting means for transmitting a third ciphertext;
Consists of
The decoding device
The receiving means for receiving the 2 ′ ciphertext generated by embedding the first ′ ciphertext generated by the exclusive OR operation of the plaintext and the third key sequence using the fourth key sequence. When,
The key sequence generator for generating a third key sequence and a fourth key sequence;
The decimator that performs decimation on the second 'ciphertext using the fourth key sequence to generate a third'ciphertext;
The exclusive OR calculator for executing an exclusive OR operation of a 3 ′ ciphertext and a third key sequence and outputting a plaintext;
Device.
In one aspect, the said device is a device (2nd device) with scarce computer resources.

 本発明が採用した暗号化/復号方法は、
 平文と第1鍵系列の排他的論理和演算を実行して第1暗号文を生成する第1ステップと、
 第1暗号文を誤り訂正符号化して第2暗号文を生成する第2ステップと、
 第2暗号文に対して第2鍵系列を用いてデシメーションを実行して第3暗号文を生成する第3ステップと、
 第3暗号文を第2鍵系列を用いて誤り訂正復号して第4暗号文を生成する第4ステップと、
 第4暗号文と第1鍵系列の排他的論理和演算を実行して平文を出力する第5ステップと、
 からなる。
 1つの態様では、第1ステップ~第3ステップは第2デバイスによって実行され、第4ステップ~第5ステップは第1デバイスによって実行される。
The encryption / decryption method employed by the present invention is as follows:
A first step of generating a first ciphertext by performing an exclusive OR operation between the plaintext and the first key sequence;
A second step of error correcting encoding the first ciphertext to generate a second ciphertext;
A third step of generating a third ciphertext by performing decimation on the second ciphertext using the second key sequence;
A fourth step of generating a fourth ciphertext by performing error correction decryption on the third ciphertext using the second key sequence;
A fifth step of executing an exclusive OR operation of the fourth ciphertext and the first key sequence to output a plaintext;
Consists of.
In one aspect, the first to third steps are performed by the second device, and the fourth to fifth steps are performed by the first device.

 本発明が採用した暗号化/復号システムは、
 暗号化装置と復号装置とからなる暗号化/復号システムにおいて、
 前記暗号化装置は、
 平文と第1鍵系列の排他的論理和演算を実行して第1暗号文を生成する排他的論理和演算器と、
 第1暗号文を誤り訂正符号化して第2暗号文を生成する誤り訂正符号化器と、
 第2暗号文に対して第2鍵系列を用いてデシメーションを実行して第3暗号文を生成するデシメータと、
 からなり、
 前記復号装置は、
 第3暗号文を第2鍵系列を用いて誤り訂正復号して第4暗号文を生成する誤り訂正復号器と、
 第4暗号文と第1鍵系列の排他的論理和演算を実行して平文を出力する排他的論理和演算器と、
 からなる。
 1つの態様では、前記暗号化装置は第2デバイスに含まれ、前記復号装置は第1デバイスに含まれる。
The encryption / decryption system employed by the present invention is:
In an encryption / decryption system comprising an encryption device and a decryption device,
The encryption device is:
An exclusive OR calculator that performs an exclusive OR operation between the plaintext and the first key sequence to generate a first ciphertext;
An error correction encoder that performs error correction encoding of the first ciphertext to generate a second ciphertext;
A decimator that performs decimation on the second ciphertext using the second key sequence to generate a third ciphertext;
Consists of
The decoding device
An error correction decoder for generating a fourth ciphertext by performing error correction decoding on the third ciphertext using the second key sequence;
An exclusive OR calculator that executes an exclusive OR operation of the fourth ciphertext and the first key sequence and outputs a plaintext;
Consists of.
In one aspect, the encryption device is included in a second device and the decryption device is included in the first device.

 本発明が採用した他の暗号化/復号方法は、
 平文と第1鍵系列の排他的論理和演算を実行して第1暗号文を生成する第1ステップと、
 第1暗号文に対して第2鍵系列を用いて埋め込みを実行して第2暗号文を生成する第2ステップと、
 第2暗号文に対して第2鍵系列を用いてデシメーションを実行して第3暗号文を生成する第3ステップと、
 第3暗号文と第1鍵系列の排他的論理和演算を実行して平文を出力する第4ステップと、
 からなる。
 1つの態様では、第1ステップ~第2ステップは第1デバイスによって実行され、第3ステップ~第4ステップは第2デバイスによって実行される。
Other encryption / decryption methods employed by the present invention are:
A first step of generating a first ciphertext by performing an exclusive OR operation between the plaintext and the first key sequence;
A second step of generating a second ciphertext by embedding the first ciphertext using a second key sequence;
A third step of generating a third ciphertext by performing decimation on the second ciphertext using the second key sequence;
A fourth step of executing an exclusive OR operation of the third ciphertext and the first key sequence to output plaintext;
Consists of.
In one aspect, the first to second steps are performed by the first device, and the third to fourth steps are performed by the second device.

 本発明が採用した暗号化/復号システムは、
 暗号化装置と復号装置とからなる暗号化/復号システムにおいて、
 前記暗号化装置は、
 平文と第1鍵系列の排他的論理和演算を実行して第1暗号文を生成する排他的論理和演算器と、
 前記第1暗号文に対して第2鍵系列を用いて埋め込みを実行して第2暗号文を生成するエンベッダと、
 からなり、
 前記復号装置は、
 第2暗号文に対して第2鍵系列を用いてデシメーションを実行して第3暗号文を生成するデシメータと、
 第3暗号文と第1鍵系列の排他的論理和演算を実行して平文を出力する排他的論理和演算器と、
 からなる。
 1つの態様では、前記暗号化装置は第1デバイスに含まれ、前記復号装置は第2デバイスに含まれる。
The encryption / decryption system employed by the present invention is:
In an encryption / decryption system comprising an encryption device and a decryption device,
The encryption device is:
An exclusive OR calculator that performs an exclusive OR operation between the plaintext and the first key sequence to generate a first ciphertext;
An embedder for embedding the first ciphertext using a second key sequence to generate a second ciphertext;
Consists of
The decoding device
A decimator that performs decimation on the second ciphertext using the second key sequence to generate a third ciphertext;
An exclusive OR calculator that executes an exclusive OR operation of the third ciphertext and the first key sequence and outputs a plaintext;
Consists of.
In one aspect, the encryption device is included in a first device and the decryption device is included in a second device.

 本発明が採用した暗号化方法は、
 平文と第1鍵系列の排他的論理和演算を実行して第1暗号文を生成するステップと、
 第1暗号文を誤り訂正符号化して第2暗号文を生成するステップと、
 第2暗号文に対して第2鍵系列を用いてデシメーションを実行して第3暗号文を生成するステップと、
 からなる。
 本発明が採用した暗号化装置は、
 平文と第1鍵系列の排他的論理和演算を実行して第1暗号文を生成する排他的論理和演算器と、
 第1暗号文を誤り訂正符号化して第2暗号文を生成する誤り訂正符号化器と、
 第2暗号文に対して第2鍵系列を用いてデシメーションを実行して第3暗号文を生成するデシメータと、
 からなる。
 1つの態様では、上記暗号化方法及び装置は、第2デバイスによって実現される。
The encryption method employed by the present invention is:
Performing an exclusive OR operation of the plaintext and the first key sequence to generate a first ciphertext;
Generating a second ciphertext by error-correcting the first ciphertext;
Performing a decimation on the second ciphertext using the second key sequence to generate a third ciphertext;
Consists of.
The encryption device employed by the present invention is:
An exclusive OR calculator that performs an exclusive OR operation between the plaintext and the first key sequence to generate a first ciphertext;
An error correction encoder that performs error correction encoding of the first ciphertext to generate a second ciphertext;
A decimator that performs decimation on the second ciphertext using the second key sequence to generate a third ciphertext;
Consists of.
In one aspect, the said encryption method and apparatus are implement | achieved by the 2nd device.

 本発明が採用した復号方法は、
 平文と第1鍵系列の排他的論理和演算により生成された第1暗号文を誤り訂正符号化して生成された第2暗号文に対して第2鍵系列を用いてデシメーションを実行して生成された第3暗号文の復号方法であって、
 第3暗号文を第2鍵系列を用いて誤り訂正復号して第4暗号文を生成するステップと、
 第4暗号文と第1鍵系列の排他的論理和演算を実行して平文を出力するステップと、
 を備えている。
 本発明が採用した復号装置は、
 平文と第1鍵系列の排他的論理和演算により生成された第1暗号文を誤り訂正符号化して生成された第2暗号文に対して第2鍵系列を用いてデシメーションを実行して生成された第3暗号文の復号装置であって、
 第3暗号文を第2鍵系列を用いて誤り訂正復号して第4暗号文を生成する誤り訂正復号器と、
 第4暗号文と第1鍵系列の排他的論理和演算を実行して平文を出力する排他的論理和演算器と、
 からなる。
 1つの態様では、上記復号方法及び装置は、第1デバイスによって実現される。
The decoding method adopted by the present invention is as follows:
Generated by performing decimation using the second key sequence on the second ciphertext generated by error correction encoding the first ciphertext generated by the exclusive OR operation of the plaintext and the first key sequence A decryption method of the third ciphertext,
Generating a fourth ciphertext by performing error correction decoding on the third ciphertext using the second key sequence;
Performing an exclusive OR operation of the fourth ciphertext and the first key sequence to output a plaintext;
It has.
The decoding device employed by the present invention is:
Generated by performing decimation using the second key sequence on the second ciphertext generated by error correction encoding the first ciphertext generated by the exclusive OR operation of the plaintext and the first key sequence A third ciphertext decryption device,
An error correction decoder for generating a fourth ciphertext by performing error correction decoding on the third ciphertext using the second key sequence;
An exclusive OR calculator that executes an exclusive OR operation of the fourth ciphertext and the first key sequence and outputs a plaintext;
Consists of.
In one aspect, the decoding method and apparatus are implemented by a first device.

 本発明が採用した他の暗号化方法は、
 平文と第1鍵系列の排他的論理和演算を実行して第1暗号文を生成するステップと、
 第1暗号文に対して第2鍵系列を用いて埋め込みを実行して第2暗号文を生成するステップと、
 からなる。
 本発明が採用した他の暗号化装置は、
 平文と第1鍵系列の排他的論理和演算を実行して第1暗号文を生成する排他的論理和演算器と、
 第1暗号文に対して第2鍵系列を用いて埋め込みを実行して第2暗号文を生成するエンベッダと、
 からなる。
 1つの態様では、上記暗号化方法及び装置は、第1デバイスによって実現される。
Other encryption methods employed by the present invention are:
Performing an exclusive OR operation of the plaintext and the first key sequence to generate a first ciphertext;
Generating a second ciphertext by embedding the first ciphertext using a second key sequence;
Consists of.
Other encryption devices adopted by the present invention are:
An exclusive OR calculator that performs an exclusive OR operation between the plaintext and the first key sequence to generate a first ciphertext;
An embedder for embedding the first ciphertext using the second key sequence to generate a second ciphertext;
Consists of.
In one aspect, the encryption method and apparatus are implemented by a first device.

 本発明が採用した他の復号方法は、
 平文と第1鍵系列の排他的論理和演算により生成された第1暗号文に対して第2鍵系列を用いて埋め込みを実行して生成された第2暗号文の復号方法であって、
 第2暗号文に対して第2鍵系列を用いてデシメーションを実行して第3暗号文を生成するステップと、
 第3暗号文と第1鍵系列の排他的論理和演算を実行して平文を出力するステップと、
 からなる。
 本発明が採用した他の復号装置は、
 平文と第1鍵系列の排他的論理和演算により生成された第1暗号文に対して第2鍵系列を用いて埋め込みを実行して生成された第2暗号文の復号装置であって、
 第2暗号文に対して第2鍵系列を用いてデシメーションを実行して第3暗号文を生成するデシメータと、
 第3暗号文と第1鍵系列の排他的論理和演算を実行して平文を出力する排他的論理和演算器と、
 からなる。
 1つの態様では、上記復号方法及び装置は、第2デバイスによって実現される。
Other decoding methods employed by the present invention are:
A method for decrypting a second ciphertext generated by embedding a first ciphertext generated by an exclusive OR operation between a plaintext and a first key sequence using a second key sequence,
Performing a decimation on the second ciphertext using the second key sequence to generate a third ciphertext;
Performing an exclusive OR operation of the third ciphertext and the first key sequence to output a plaintext;
Consists of.
Other decoding devices adopted by the present invention are:
A decryption device for a second ciphertext generated by embedding a first ciphertext generated by an exclusive OR operation between a plaintext and a first key sequence using a second key sequence,
A decimator that performs decimation on the second ciphertext using the second key sequence to generate a third ciphertext;
An exclusive OR calculator that executes an exclusive OR operation of the third ciphertext and the first key sequence and outputs a plaintext;
Consists of.
In one aspect, the decoding method and apparatus are implemented by a second device.

 本発明は、上記暗号化方法をコンピュータに実行させるためのコンピュータプログラム、
 上記復号方法をコンピュータに実行させるためのコンピュータプログラム、
 上記暗号化/復号方法をコンピュータに実行させるためのコンピュータプログラム、
 として規定することもできる。
The present invention provides a computer program for causing a computer to execute the above encryption method,
A computer program for causing a computer to execute the decoding method;
A computer program for causing a computer to execute the encryption / decryption method;
It can also be defined as

 本発明では、誤り生成と訂正に必要な事前情報(鍵系列)を送受信者が共有しておき、送信者が意図的に誤りを発生させ、受信者がそれを訂正する。
 挿入処理(埋め込み)は高コストであるが、信号を欠落させる間引き処理(デシメーション)は低コストであること、及び、誤り訂正復号は高コストであるが、誤り訂正符号化は低コストであることに着目し、計算機資源が乏しいデバイスが送信者、計算機資源が豊かなデバイスが受信者の場合には、送信者においてデシメーション、誤り訂正符号化を行う一方、受信者において誤り訂正復号を行い、計算機資源が豊かなデバイスが送信者、計算機資源が乏しいデバイスが受信者の場合には、送信者において埋め込みを行う一方、受信者においてデシメーションを行うという非対称的な方式とし、負荷の高い処理を計算機資源が豊かなデバイス側へ偏らせることによって、計算機資源の乏しいデバイス側の動作コストを低くした。
 また、計算機資源が乏しいデバイス側の動作コストを低くすることで、消費電力を大幅に抑えることができる。
In the present invention, the transmitter / receiver shares prior information (key sequence) necessary for error generation and correction, the sender intentionally generates an error, and the receiver corrects it.
Insertion processing (embedding) is expensive, but thinning processing (decimation) for dropping signals is low cost, and error correction decoding is expensive, but error correction coding is low cost If the device with scarce computer resources is the sender and the device with rich computer resources is the receiver, the sender performs decimation and error correction coding, while the receiver performs error correction decoding and If the resource-rich device is the sender and the computer-poor device is the receiver, the sender performs embedding while the receiver performs decimation, and loads the processing with high computational resources. By deviating toward the richer device side, the operating cost of the device side with scarce computer resources was lowered.
In addition, power consumption can be significantly reduced by reducing the operating cost on the device side where the computer resources are scarce.

 本発明では、符号技術を応用したことにより、安全性を符号理論分野で良く知られている問題(雑音の挿入あるいは信号の欠落を経た後の復号という課題)に帰着させることができた。
 計算機資源が豊かなデバイスが送信者の場合における暗号化テキストの安全性は、採用する鍵系列生成器の安全性と、鍵系列を用いたバイナリベクトルの埋め込み(挿入)に依存する。
 計算機資源が乏しいデバイスが送信者の場合における暗号化テキストの安全性は、採用する鍵系列生成器の安全性と、鍵系列を用いたバイナリベクトルのデシメーションに依存する。
In the present invention, by applying the coding technique, the safety can be reduced to a problem well-known in the field of coding theory (decoding after noise insertion or signal loss).
The security of the cipher text when the device rich in computer resources is the sender depends on the security of the adopted key sequence generator and the embedding (insertion) of the binary vector using the key sequence.
The security of the ciphertext when the sender is a device with scarce computer resources depends on the security of the key sequence generator to be adopted and the decimation of the binary vector using the key sequence.

 本発明は暗号処理のスキームを提案するものであり、各ブロックないし構成要素の具体的な構成は限定されず、例えば、既存の技術あるいは将来開発されるであろうストリーム暗号技術と組み合わせて用いることができる。
 本発明は、構成要素をブラックボックスとしているため(例えば、要素技術の鍵系列生成が特定のアルゴリズムに依存しているわけではないため)、特定のアルゴリズムが破られたからといって提案方式自体が破綻するわけではない。
The present invention proposes a cryptographic processing scheme, and the specific configuration of each block or component is not limited. For example, it is used in combination with existing technology or stream encryption technology that will be developed in the future. Can do.
In the present invention, since the component is a black box (for example, the key sequence generation of the element technology does not depend on a specific algorithm), the proposed method itself is not used because the specific algorithm is broken. It does not fail.

本実施形態に係る通信データの暗号化/復号システムを構成する第1デバイスと第2デバイスを示す図である。It is a figure which shows the 1st device and 2nd device which comprise the encryption / decryption system of the communication data which concern on this embodiment. 第1デバイスが送信機(暗号化装置)、第2デバイスが受信機(復号装置)として動作する場合のブロック図である。It is a block diagram in case a 1st device operate | moves as a transmitter (encryption apparatus) and a 2nd device as a receiver (decryption apparatus). 第2デバイスが送信機(暗号化装置)、第1デバイスが受信機(復号装置)として動作する場合のブロック図である。It is a block diagram in case a 2nd device operate | moves as a transmitter (encryption apparatus) and a 1st device operates as a receiver (decryption apparatus). 暗号化/復号システムの全体を示すブロック図である。It is a block diagram which shows the whole encryption / decryption system. 暗号化/復号システム(非対称計算機資源環境)における暗号化、復号を対比して示す図である。It is a figure which contrasts and shows encryption in a encryption / decryption system (asymmetric computer resource environment).

[A]通信データの暗号化/復号システムの全体構成
図1に示すように、通信データの暗号化/復号システムは、第1デバイスと第2デバイスとを備えている。図1では便宜上、1つの第1デバイスと、1つの第2デバイスを示すが、暗号化/復号システムは、1つあるいは複数の第1デバイスと、1つあるいは複数の第2デバイスと、を備えていてもよい。第1デバイス、第2デバイスは共にコンピュータを含んでいると共に、Bluetooth、Wifi等の通信機能を備えている。コンピュータは、ハードウェアとして、入力部、記憶部、処理部(演算部ないしCPU)、出力部等を備えており、ソフトウェア(コンピュータプログラム)によって所定の処理を実行する。
[A] Overall Configuration of Communication Data Encryption / Decryption System As shown in FIG. 1, the communication data encryption / decryption system includes a first device and a second device. Although FIG. 1 shows one first device and one second device for convenience, the encryption / decryption system includes one or more first devices and one or more second devices. It may be. The first device and the second device both include a computer and have communication functions such as Bluetooth and Wifi. The computer includes an input unit, a storage unit, a processing unit (arithmetic unit or CPU), an output unit, and the like as hardware, and executes predetermined processing by software (computer program).

本実施形態では、第1デバイスは計算機資源(CPU、メモリ等)が豊かであり、第2デバイスは計算機資源が乏しい。第1デバイスは第2デバイスよりも処理能力(計算能力)が高く、また、第2デバイスはより小さい消費電力で動作可能である。 In this embodiment, the first device is rich in computer resources (CPU, memory, etc.), and the second device is scarce in computer resources. The first device has a higher processing capability (calculation capability) than the second device, and the second device can operate with lower power consumption.

第1デバイスとしては、PC(デスクトップ、ラップトップ、ノートブック等)、サーバ、モバイルコンピュータ(スマートフォン、携帯電話、PDA、タブレット、所定の計算機資源を備えたウェラブルコンピュータ等)、タグリーダ等が例示される。 Examples of the first device include PCs (desktops, laptops, notebooks, etc.), servers, mobile computers (smartphones, mobile phones, PDAs, tablets, wearable computers with predetermined computer resources, etc.), tag readers, etc. The

第2デバイスとしては、センサー(IC内蔵)、RFIDタグ、ICタグ、ICカード、ウェアラブルコンピュータが例示される。1つの態様では、第2デバイスは、ワイヤレス・センサーネットワーク(WSN)やユビキタス・センサーネットワーク(USN)で採用され得るセンサー(ウェラブルセンサー、埋め込み型センサー等)である。 Examples of the second device include a sensor (IC built-in), an RFID tag, an IC tag, an IC card, and a wearable computer. In one aspect, the second device is a sensor (a wearable sensor, an embedded sensor, etc.) that can be employed in a wireless sensor network (WSN) or a ubiquitous sensor network (USN).

第1デバイス、第2デバイスは共に、入力部、出力部、通信機能(送信手段、受信手段)を備えており、コンピュータネットワーク(典型的にはインターネット)を介して通信可能となっており、第1デバイスと第2デバイスとの間でデータの送受信(典型的には無線)が可能となっている。例えば、第2デバイス(例えばセンサ)に入力されたデータ(センサで取得されたデータ)は、ワイヤレスネットワークを介して第1デバイス(サーバやホストコンピュータ)に送信される。 Both the first device and the second device are provided with an input unit, an output unit, and a communication function (transmission unit, reception unit), and can communicate via a computer network (typically the Internet). Data can be transmitted and received (typically wireless) between the first device and the second device. For example, data input to a second device (for example, a sensor) (data acquired by the sensor) is transmitted to the first device (a server or a host computer) via a wireless network.

第1デバイス、第2デバイスは共に、暗号化装置、復号装置を備えており、データのやり取りにおいて、暗号通信が行われる。通信時に、第1デバイスから第2デバイスに送信されるデータ(ビット列)は、第1デバイスの暗号化装置で暗号化されて第2デバイスに送信され、第2デバイスで受信されたデータは、第2デバイスの復号装置で復号(解読)され、第2デバイスから第1にデバイスに送信されるデータ(ビット列)は、第2デバイスの暗号化装置で暗号化されて第1デバイスに送信され、第1デバイスで受信されたデータは、第1デバイスの復号装置で復号(解読)される。本実施形態では、第1デバイスと第2デバイスとの間でデータの双方向の暗号通信が行われるが、第1デバイスから第2デバイスへの一方向のみ、あるいは、第2デバイスから第1デバイスへの一方向のみに暗号通信を採用してもよい。暗号化装置、復号装置の各構成要素は、コンピュータのハードウェア/ソフトウェアによって構成することができる。 Both the first device and the second device include an encryption device and a decryption device, and encryption communication is performed in the exchange of data. During communication, data (bit string) transmitted from the first device to the second device is encrypted by the encryption device of the first device and transmitted to the second device, and the data received by the second device is The data (bit string) decrypted (decrypted) by the decryption device of the two devices and first transmitted from the second device to the device is encrypted by the encryption device of the second device and transmitted to the first device, Data received by one device is decoded (decoded) by the decoding device of the first device. In the present embodiment, bidirectional encrypted communication of data is performed between the first device and the second device, but only in one direction from the first device to the second device, or from the second device to the first device. Encryption communication may be employed only in one direction. Each component of the encryption device and the decryption device can be configured by computer hardware / software.

第1デバイスは、鍵系列生成器、排他的論理和演算器、埋め込み器(エンベッダ)、誤り訂正復号器、データの送受信手段を備えている。第1デバイスの暗号化装置(図2上図)は、鍵系列生成器、排他的論理和演算器、埋め込み器から構成され、復号装置(図3上図)は、鍵系列生成器、排他的論理和演算器、誤り訂正復号器から構成される。 The first device includes a key sequence generator, an exclusive OR operator, an embedder (embedder), an error correction decoder, and data transmission / reception means. The encryption device of the first device (upper diagram in FIG. 2) is composed of a key sequence generator, an exclusive OR operator, and an embedder, and the decryption device (upper diagram in FIG. 3) is a key sequence generator, exclusive It consists of a logical sum operator and an error correction decoder.

計算機資源の豊かな第1デバイスは、送信時すなわち暗号化処理において、軽量な鍵系列生成器とビット毎の排他的論理和演算(ストリーム暗号演算)を行ってからランダムビット埋め込みを行う。また、第1デバイスは、受信時すなわち復号処理において、誤り訂正復号を行ってからストリーム暗号演算を行う。 The first device rich in computer resources performs random bit embedding after performing a bitwise exclusive OR operation (stream cipher operation) with a lightweight key sequence generator during transmission, that is, in encryption processing. In addition, the first device performs stream cipher operation after performing error correction decoding at the time of reception, that is, in the decoding process.

第2デバイスは、鍵系列生成器、排他的論理和演算器、間引き器(デシメータ)、誤り訂正符号化器、データの送受信手段を備えている。第2デバイスの暗号化装置(図3下図)は、鍵系列生成器、排他的論理和演算器、間引き器、誤り訂正符号化器から構成され、復号装置(図2下図)は、鍵系列生成器、排他的論理和演算器、間引き器から構成される。 The second device includes a key sequence generator, an exclusive OR calculator, a decimation unit (decimator), an error correction encoder, and data transmission / reception means. The encryption device (lower diagram in FIG. 3) of the second device is composed of a key sequence generator, an exclusive OR operator, a decimation unit, and an error correction encoder, and the decryption device (lower diagram in FIG. 2) is a key sequence generator. Unit, an exclusive OR calculator, and a decimation unit.

計算機資源の乏しい第2デバイスは、送信時すなわち暗号化処理において、ストリーム暗号演算を行ってから誤り訂正符号化を行い、さらにデシメーション(間引き処理)を行う。また、第2デバイスは、受信時すなわち復号処理において、デシメーションを行ってからストリーム暗号演算を行う。 The second device with scarce computer resources performs error correction coding after performing stream cipher operation during transmission, that is, encryption processing, and further performs decimation (decimation processing). Further, the second device performs stream cipher computation after decimation at the time of reception, that is, in the decryption process.

本実施形態に用いられ得る鍵系列生成器及びストリーム暗号の種類は限定されず、既存の技術を用いて本発明を実施することができる。鍵系列生成器は1つあるいは複数であってもよく、1つの鍵系列生成器に含まれる擬似乱数生成器の個数は限定されず、1つあるいは複数であってもよい。本実施形態では、複数種類の鍵系列を用いるが、これらの鍵系列は共通の疑似乱数生成器によって生成してもよく、あるいは、それぞれ別個の疑似乱数生成器によって生成してもよい。また、鍵系列生成器において、CTRモード(Counter Mode)で動作するブロック暗号を採用してもよい。第1デバイスと第2デバイスの鍵系列生成器の同期の手段は限定されない。望ましくは、鍵系列生成器は、軽量鍵系列生成器である。軽量鍵系列生成器としては、これらに限定されないものの、例えば、eSTREAMで提案されているTrivium(非特許文献3)やGrain v1(非特許文献8)を採用することができる。 The types of key sequence generators and stream ciphers that can be used in this embodiment are not limited, and the present invention can be implemented using existing techniques. There may be one or a plurality of key sequence generators, and the number of pseudo-random number generators included in one key sequence generator is not limited, and may be one or a plurality. In this embodiment, a plurality of types of key sequences are used. These key sequences may be generated by a common pseudo random number generator, or may be generated by separate pseudo random number generators. In the key sequence generator, a block cipher that operates in the CTR mode (Counter Mode) may be employed. The means for synchronizing the key sequence generators of the first device and the second device is not limited. Preferably, the key sequence generator is a lightweight key sequence generator. As a lightweight key sequence generator, although not limited thereto, for example, Trivium (Non-patent Document 3) or Grain v1 (Non-patent Document 8) proposed by eSTREAM can be employed.

ランダムな雑音が挿入されたり信号が欠落したりしても、それらの誤りを訂正できる符号技術がある。誤り訂正符号は、送信する情報に冗長性を持たせることにより、伝送路で発生する誤りを訂正する技術である。符号化器は、情報系列に冗長ビットを付加する。通信路で発生したビット誤りを訂正するのが復号器である。復号器は、付加されている冗長ビットを用いて誤りを訂正する。 There are coding techniques that can correct such errors even when random noise is inserted or signals are lost. The error correction code is a technique for correcting an error that occurs in a transmission path by providing redundancy to information to be transmitted. The encoder adds redundant bits to the information sequence. A decoder corrects bit errors occurring in the communication path. The decoder corrects the error using the added redundant bits.

本発明では、誤り生成と訂正に必要な事前情報(鍵系列)を送受信者が共有しておき、送信者が意図的に誤りを発生させ、受信者がそれを訂正する。埋め込み器、間引き器、誤り訂正復号器が、それぞれ、埋め込み処理、間引き処理、復号処理を実行する際に、鍵系列生成器から供給される鍵系列(秘密パラメータ)が用いられる。挿入処理(埋め込み)は高コストであるが、信号を欠落させる間引き処理(デシメーション)は低コストであること、及び、誤り訂正復号は高コストであるが、誤り訂正符号化は低コストであることに着目し、第2デバイスが送信者、第1デバイスが受信者の場合には、第2デバイスにおいてデシメーション、誤り訂正符号化を行う一方、第1デバイスにおいて誤り訂正復号を行い、第1デバイスが送信者、第2デバイスが受信者の場合には、第1デバイスにおいて埋め込みを行う一方、第2デバイスにおいてデシメーションを行うという非対称的な方式とし、負荷の高い処理を第1デバイス側へ偏らせることによって、第2デバイスの動作コストを低く抑えることを可能とした。 In the present invention, the transmitter / receiver shares prior information (key sequence) necessary for error generation and correction, the sender intentionally generates an error, and the receiver corrects it. The key sequence (secret parameter) supplied from the key sequence generator is used when the embedder, the decimation unit, and the error correction decoder perform the embedding process, the decimation process, and the decoding process, respectively. Insertion processing (embedding) is expensive, but thinning processing (decimation) for dropping signals is low cost, and error correction decoding is expensive, but error correction coding is low cost When the second device is the sender and the first device is the receiver, the second device performs decimation and error correction coding, while the first device performs error correction decoding and the first device When the sender or the second device is the receiver, the first device performs embedding while the second device performs decimation so that the processing with high load is biased toward the first device. Thus, the operation cost of the second device can be kept low.

符号技術を応用したことにより、安全性を符号理論分野で良く知られている問題(雑音の挿入あるいは信号の欠落を経た後の復号という課題)に帰着させることができた。データの符号化と誤り訂正技術は確立されており、本発明に適用され得る符号は限定されないが、1つの例示として、LDPC符号(low-density parity-check code:低密度パリティ検査符号)を挙げることができる。LDPC符号は、当業者に知られており、より具体的な内容については、例えば、非特許文献9、10を参照することができる。また、LDPC符号以外の符号としては、限定されないものの、RS(Reed-Solomon)符号、噴水(Fountain)符号として例示するLT(Luby Transform)符号を挙げることができる。 By applying the coding technique, the safety can be reduced to a well-known problem in the field of coding theory (decoding after noise insertion or signal loss). Data encoding and error correction techniques have been established, and codes that can be applied to the present invention are not limited, but an LDPC code (low-density parity-check code) is an example. be able to. LDPC codes are known to those skilled in the art, and for more specific content, for example, Non-Patent Documents 9 and 10 can be referred to. Further, codes other than the LDPC code include, but are not limited to, an LT (Luby-Transform) code exemplified as an RS (Reed-Solomon) code and a fountain code.

なお、本明細書において、埋め込み (embedding)と挿入(insertion)は、バイナリビット列にビットを追加するという処理においては、実質的に同義である。埋め込みは、埋め込む側(送信者)の立場で見た場合に用い、どこにビットを埋め込むかを鍵系列で知っているので、「確定的に挿入」する。なお、挿入は、第三者(含む攻撃者)の立場で見た場合にも用いられる。鍵系列を知らない第三者にとっては、埋め込まれた(挿入された)ビットと確率的に生じた雑音とを区別できない。同様に、デシメーション(decimation)と削除(deletion)は、バイナリビット列からビットを欠落させるという処理においては、実質的に同義である。 In this specification, embedding and insertion are substantially synonymous in the process of adding bits to a binary bit string. The embedding is used from the viewpoint of the embedding side (sender), and since the key sequence knows where to embed bits, “deterministic insertion” is performed. Insertion is also used when viewed from the standpoint of a third party (including an attacker). For third parties who do not know the key sequence, it is not possible to distinguish between embedded (inserted) bits and stochastic noise. Similarly, decimation and deletion are substantially synonymous in the process of dropping bits from a binary bit string.

[B]非対称計算機資源環境における暗号化方式及び復号方式
[B-1]第1デバイスから第2デバイスへのデータ送信(図2)
 第1デバイスが送信機、第2デバイスが受信機の場合は、
 第1デバイスにおける暗号化装置は、
 第1鍵系列、第2鍵系列を生成する鍵系列生成器と、
 入力された平文と第1鍵系列の排他的論理和演算を実行して第1暗号文を生成する排他的論理和演算器と、
 第1暗号文に対して第2鍵系列を用いて埋め込みを実行して第2暗号文を生成するエンベッダと、
 からなり、
 第2デバイスにおける復号装置は、
 第1鍵系列、第2鍵系列を生成する鍵系列生成器と、
 第1デバイスから受信した第2暗号文に対して第2鍵系列を用いてデシメーションを実行して第3暗号文を生成するデシメータと、
 第3暗号文と第1鍵系列の排他的論理和演算を実行して平文を出力する排他的論理和演算器と、
 からなる。
[B] Encryption method and decryption method in an asymmetric computer resource environment [B-1] Data transmission from the first device to the second device (FIG. 2)
If the first device is a transmitter and the second device is a receiver,
The encryption device in the first device is:
A key sequence generator for generating a first key sequence and a second key sequence;
An exclusive OR calculator that executes an exclusive OR operation of the input plaintext and the first key sequence to generate a first ciphertext;
An embedder for embedding the first ciphertext using the second key sequence to generate a second ciphertext;
Consists of
The decoding device in the second device is:
A key sequence generator for generating a first key sequence and a second key sequence;
A decimator that performs decimation on the second ciphertext received from the first device using the second key sequence to generate a third ciphertext;
An exclusive OR calculator that executes an exclusive OR operation of the third ciphertext and the first key sequence and outputs a plaintext;
Consists of.

 第1デバイスが送信機、前記第2デバイスが受信機の場合は、
 第1デバイスにおける暗号化方式は、
 平文と第1鍵系列の排他的論理和演算を実行して第1暗号文を生成するステップと、
 第1暗号文に対して第2鍵系列を用いて埋め込みを実行して第2暗号文を生成するステップと、
 を備え、
 第2デバイスにおける復号方式は、
 第1デバイスから受信した第2暗号文に対して第2鍵系列を用いてデシメーションを実行して第3暗号文を生成するステップと、
 第3暗号文と第1鍵系列の排他的論理和演算を実行して平文を出力するステップと、
 を備える。
If the first device is a transmitter and the second device is a receiver,
The encryption method in the first device is
Performing an exclusive OR operation of the plaintext and the first key sequence to generate a first ciphertext;
Generating a second ciphertext by embedding the first ciphertext using a second key sequence;
With
The decoding method in the second device is:
Performing decimation on the second ciphertext received from the first device using the second key sequence to generate a third ciphertext;
Performing an exclusive OR operation of the third ciphertext and the first key sequence to output a plaintext;
Is provided.

[B-2]第2デバイスから第1デバイスへのデータ送信(図3)
 第2デバイスが送信機、前記第1デバイスが受信機の場合は、
 第2デバイスにおける暗号化装置は
 第3鍵系列、第4鍵系列を生成する鍵系列生成器と、
 平文と第3鍵系列の排他的論理和演算を実行して第1´暗号文を生成する排他的論理和演算器と、
 第1´暗号文を誤り訂正符号化して第2´暗号文を生成する符号化器と、
 第2´暗号文に対して第4鍵系列を用いてデシメーションを実行して第3´暗号文を生成するデシメータと、
 からなり、
 第1デバイスにおける復号装置は、
 第3鍵系列、第4鍵系列を生成する鍵系列生成器と、
 第2デバイスから受信した第3´暗号文を第4鍵系列を用いて誤り訂正復号して第4´暗号文を生成する復号器と、
 第4´暗号文と第3鍵系列の排他的論理和演算を実行して平文を出力する排他的論理和演算器と、
 からなる。
[B-2] Data transmission from the second device to the first device (FIG. 3)
If the second device is a transmitter and the first device is a receiver,
The encryption device in the second device includes a key sequence generator for generating a third key sequence and a fourth key sequence,
An exclusive OR calculator that performs an exclusive OR operation of the plaintext and the third key sequence to generate a 1 ′ ciphertext;
An encoder for error-correcting the first 'ciphertext to generate a second'ciphertext;
A decimator that performs decimation on the second 'ciphertext using the fourth key sequence to generate a third'ciphertext;
Consists of
The decoding device in the first device is:
A key sequence generator for generating a third key sequence and a fourth key sequence;
A decoder that performs error correction decoding on the 3 ′ ciphertext received from the second device using a fourth key sequence to generate a 4 ′ ciphertext;
An exclusive OR calculator that performs an exclusive OR operation of the 4 ′ ciphertext and the third key sequence and outputs a plaintext;
Consists of.

 第2デバイスが送信機、前記第1デバイスが受信機の場合は、
 第2デバイスにおける暗号化方式は、
 平文と第3鍵系列の排他的論理和演算を実行して第1´暗号文を生成するステップと、
 第1暗号文を誤り訂正符号化して第2´暗号文を生成するステップと、
 第2´暗号文に対して第4鍵系列を用いてデシメーションを実行して第3´暗号文を生成するステップと、
 を備え、
 第1デバイスにおける復号方式は、
 第2デバイスから受信した第3´暗号文を第4鍵系列を用いて誤り訂正復号して第4´暗号文を生成するステップと、
 第4´暗号文と第2鍵系列の排他的論理和演算を実行して平文を出力するステップと、
 を備えている。
If the second device is a transmitter and the first device is a receiver,
The encryption method in the second device is
Performing an exclusive OR operation of the plaintext and the third key sequence to generate a 1 ′ ciphertext;
Generating a second ciphertext by error correcting encoding the first ciphertext;
Performing decimation on the second 'ciphertext using the fourth key sequence to generate a third'ciphertext;
With
The decoding method in the first device is:
Generating a 4 ′ ciphertext by performing error correction decoding on the 3 ′ ciphertext received from the second device using a fourth key sequence;
Performing an exclusive OR operation of the 4 ′ ciphertext and the second key sequence to output plaintext;
It has.

[C]暗号化/復号システムにおけるデータの流れ
[C-1]暗号化/復号システムの全体図
 図4に、非対称計算機資源環境における暗号化/復号システムの全体図を示す。図には、鍵系列生成器として例示する軽量鍵系列生成器、符号化ブロック、復号グロック、埋め込みブロック、デシメーションブロックが示してある。
 軽量鍵系列生成器は、バイナリ鍵系列X、X*、X**を生成する。1つの好ましい態様では、生成される鍵系列の独立性を担保するために、バイナリ鍵系列Xを第1軽量鍵系列生成器で生成し、バイナリ鍵系列X*、X**を第2軽量鍵系列生成器で生成する。
 符号化ブロックにおいて、符号化{0,1}n→{0,1}n+mを提供する。
 埋め込みブロックにおいて、所与のn次元バイナリベクトルに対して、バイナリ鍵系列X*を用いてmランダムビットを挿入する(埋め込む)。
 デシメーションブロックにおいて、所与のn+m次元バイナリベクトルに対して、バイナリ鍵系列X**(あるいはX*)を用いてデシメーションを実行して、所定のnビットを選択する。
[C] Data Flow in Encryption / Decryption System [C-1] Overall View of Encryption / Decryption System FIG. 4 shows an overall view of the encryption / decryption system in the asymmetric computer resource environment. The figure shows a lightweight key sequence generator, an encoding block, a decoding block, an embedding block, and a decimation block exemplified as a key sequence generator.
The lightweight key sequence generator generates binary key sequences X, X * , and X ** . In one preferred embodiment, in order to ensure the independence of the generated key sequence, the binary key sequence X is generated by the first lightweight key sequence generator, and the binary key sequences X * and X ** are generated by the second lightweight key. Generate with a sequence generator.
In the coding block, provide the encoding {0,1} n → {0,1 } n + m .
In the embedding block, m random bits are inserted (embedded) into a given n-dimensional binary vector using the binary key sequence X * .
In the decimation block, a predetermined n bits are selected by performing decimation on a given n + m-dimensional binary vector using a binary key sequence X ** (or X * ).

[C-2]暗号化/復号システムにおける各ベクトル、演算子の表記

Figure JPOXMLDOC01-appb-I000001
n次元バイナリベクトルであって、平文系列のセグメントである。 [C-2] Notation of each vector and operator in the encryption / decryption system
Figure JPOXMLDOC01-appb-I000001
An n-dimensional binary vector that is a plaintext segment.

Figure JPOXMLDOC01-appb-I000002
n次元バイナリベクトルであって、バイナリ鍵系列生成器によって生成された鍵系列のセグメントである。
Figure JPOXMLDOC01-appb-I000002
An n-dimensional binary vector, which is a segment of a key sequence generated by a binary key sequence generator.

Figure JPOXMLDOC01-appb-I000003
n次元バイナリベクトルであって、バイナリ鍵系列生成器によって生成された鍵系列のセグメントである。
Figure JPOXMLDOC01-appb-I000003
An n-dimensional binary vector, which is a segment of a key sequence generated by a binary key sequence generator.

Figure JPOXMLDOC01-appb-I000004
n+m次元バイナリベクトルであって、バイナリ鍵系列生成器によって生成された鍵系列のセグメントである。
Figure JPOXMLDOC01-appb-I000004
An n + m-dimensional binary vector, which is a segment of a key sequence generated by a binary key sequence generator.

Figure JPOXMLDOC01-appb-I000005
n次元バイナリベクトルであって、ビット埋め込み(挿入)あるいはビットデシメーションを備えたチャネルへの入力である。
Figure JPOXMLDOC01-appb-I000005
An n-dimensional binary vector that is input to a channel with bit embedding (insertion) or bit decimation.

Figure JPOXMLDOC01-appb-I000006
m次元バイナリベクトルであって、その要素は、独立同分布(i.i.d.)バイナリランダム変数によって実現される。
Figure JPOXMLDOC01-appb-I000006
An m-dimensional binary vector, the elements of which are realized by independent, iso-distributed (iid) binary random variables.

Figure JPOXMLDOC01-appb-I000007
l+m次元バイナリベクトルであって、入力が
Figure JPOXMLDOC01-appb-I000008
の時のランダムビット埋め込みを伴うチャネルにおける、ベクトルXにより制御されるベクトルyへのランダムベクトルrの挿入(埋め込み)ブロックの出力である。
Figure JPOXMLDOC01-appb-I000007
l + m dimensional binary vector with input
Figure JPOXMLDOC01-appb-I000008
Is the output of the insertion (embedding) block of the random vector r into the vector y controlled by the vector X * in the channel with random bit embedding at.

Figure JPOXMLDOC01-appb-I000009
ベクトルX*によって制御されるn次元のバイナリベクトルにランダムmビットを挿入する演算子である。したがって、
Figure JPOXMLDOC01-appb-I000010
とすると、
Figure JPOXMLDOC01-appb-I000011
及び
 ベクトルyの各ビットの直後にランダムビットを1ビット挿入するか否かをベクトルX*で指定する場合には、
Figure JPOXMLDOC01-appb-I000012
 i=2,3,…,nに対して、
Figure JPOXMLDOC01-appb-I000013
とし、
 i=1,2,…,nに対して、Xi *=1ならば、
Figure JPOXMLDOC01-appb-I000014
とする。
 また、ベクトルyの各ビットの直前にランダムビット1ビット挿入するか否かをベクトルX*で指定する場合には、
 i=1,2,…,nに対して、
Figure JPOXMLDOC01-appb-I000015
とし、
 i=1,2,…,nに対して、Xi *=1ならば、
Figure JPOXMLDOC01-appb-I000016
とする。
Figure JPOXMLDOC01-appb-I000009
An operator that inserts random m bits into an n-dimensional binary vector controlled by the vector X * . Therefore,
Figure JPOXMLDOC01-appb-I000010
Then,
Figure JPOXMLDOC01-appb-I000011
And when specifying by vector X * whether or not to insert 1 random bit immediately after each bit of vector y,
Figure JPOXMLDOC01-appb-I000012
For i = 2,3, ..., n,
Figure JPOXMLDOC01-appb-I000013
age,
For i = 1,2, ..., n, if X i * = 1,
Figure JPOXMLDOC01-appb-I000014
And
In addition, when designating whether to insert 1 random bit immediately before each bit of the vector y with the vector X * ,
For i = 1,2, ..., n,
Figure JPOXMLDOC01-appb-I000015
age,
For i = 1,2, ..., n, if X i * = 1,
Figure JPOXMLDOC01-appb-I000016
And

Figure JPOXMLDOC01-appb-I000017
l-m次元バイナリベクトルであって、入力が
Figure JPOXMLDOC01-appb-I000018
の時のビット欠落を伴うチャネルにおける、ベクトルXにより制御されるデシメーションブロックの出力である。
Figure JPOXMLDOC01-appb-I000017
an lm-dimensional binary vector whose input is
Figure JPOXMLDOC01-appb-I000018
Is the output of the decimation block controlled by the vector X * in the channel with bit loss at.

Figure JPOXMLDOC01-appb-I000019
デシメーションの演算子であり、すなわち、
Figure JPOXMLDOC01-appb-I000020
とすると、ベクトルX*によってベクトルyの各ビットの直後へのランダムビット挿入が制御されて生成された(n+m)次元のバイナリベクトルy(ins)からランダムビットを除いて所定のnビットを選択する場合には、
Figure JPOXMLDOC01-appb-I000021
及び、
Figure JPOXMLDOC01-appb-I000022
 i=2,3,…,nに対して、
Figure JPOXMLDOC01-appb-I000023
である。
 同様に、ベクトルX*によってベクトルyの各ビットの直前へのランダムビット挿入が制御されて生成された(n+m)次元のバイナリベクトルy(ins)からランダムビットを除いて所定のnビットを選択する場合には、
Figure JPOXMLDOC01-appb-I000024
及び、
 i=1,2,…,nに対して、
 
Figure JPOXMLDOC01-appb-I000025
である。
Figure JPOXMLDOC01-appb-I000019
Decimation operator, ie
Figure JPOXMLDOC01-appb-I000020
Then, the random number is excluded from the (n + m) -dimensional binary vector y (ins) generated by controlling the random bit insertion immediately after each bit of the vector y by the vector X * , and the predetermined n bits are obtained. If you choose,
Figure JPOXMLDOC01-appb-I000021
as well as,
Figure JPOXMLDOC01-appb-I000022
For i = 2,3, ..., n,
Figure JPOXMLDOC01-appb-I000023
It is.
Similarly, a random number is excluded from the (n + m) -dimensional binary vector y (ins) generated by controlling the random bit insertion immediately before each bit of the vector y by the vector X * to obtain a predetermined n bits. If you choose,
Figure JPOXMLDOC01-appb-I000024
as well as,
For i = 1,2, ..., n,

Figure JPOXMLDOC01-appb-I000025
It is.

Figure JPOXMLDOC01-appb-I000026
2元消失通信路(BEC)における符号化の演算子であり、
Figure JPOXMLDOC01-appb-I000027
である。
Figure JPOXMLDOC01-appb-I000026
Encoding operator in binary erasure channel (BEC)
Figure JPOXMLDOC01-appb-I000027
It is.

Figure JPOXMLDOC01-appb-I000028
デシメーションの演算子であり、すなわち、ベクトルX**の制御のもとで、(n+m)次元のバイナリベクトル
Figure JPOXMLDOC01-appb-I000029
から、
Figure JPOXMLDOC01-appb-I000030
にしたがって、所定のnビットを選択する。
Figure JPOXMLDOC01-appb-I000028
Decimation operator, i.e. binary vector of (n + m) dimensions under the control of vector X **
Figure JPOXMLDOC01-appb-I000029
From
Figure JPOXMLDOC01-appb-I000030
According to the above, a predetermined n bits are selected.

Figure JPOXMLDOC01-appb-I000031
演算子
Figure JPOXMLDOC01-appb-I000032
によって間引かれたビットの位置を復元するための演算子であって、
Figure JPOXMLDOC01-appb-I000033
とした時に、
 所与のnビットベクトルy(decim)及びベクトルX**に基づいて、(n+m)ビットベクトル
Figure JPOXMLDOC01-appb-I000034
を生成する。間引かれたビットに対応するm個の消失位置におけるバイナリ値は位置を復元するだけでは復元されないが、その不明な値を?と表記して、本演算子で生成された(n+m)ビットベクトルを消失位置も含めて書けば、i=1,2,…,n+mに対して、
Figure JPOXMLDOC01-appb-I000035
となる。
Figure JPOXMLDOC01-appb-I000031
operator
Figure JPOXMLDOC01-appb-I000032
An operator for restoring the position of a bit thinned out by
Figure JPOXMLDOC01-appb-I000033
When
Based on a given n-bit vector y (decim) and vector X ** , an (n + m) bit vector
Figure JPOXMLDOC01-appb-I000034
Is generated. The binary value at the m erasure positions corresponding to the thinned bits is not restored by just restoring the position, but the unknown value? And write the (n + m) bit vector generated by this operator, including the erasure position, for i = 1, 2, ..., n + m,
Figure JPOXMLDOC01-appb-I000035
It becomes.

Figure JPOXMLDOC01-appb-I000036
2元消失通信路 (BEC)におけるビット消失後に復号する演算子である。適切な符号化スキームが選択されたと仮定して、削除されたビットの位置情報を提供する
Figure JPOXMLDOC01-appb-I000037
を用いて、
Figure JPOXMLDOC01-appb-I000038
となる。
Figure JPOXMLDOC01-appb-I000036
It is an operator that decodes after erasing bits in the binary erasure channel (BEC). Provide deleted bit position information, assuming that an appropriate encoding scheme has been selected
Figure JPOXMLDOC01-appb-I000037
Using,
Figure JPOXMLDOC01-appb-I000038
It becomes.

Figure JPOXMLDOC01-appb-I000039
2つのn次元バイナリベクトル、すなわち、
Figure JPOXMLDOC01-appb-I000040

Figure JPOXMLDOC01-appb-I000041
のビット毎の排他的論理和を表す。
Figure JPOXMLDOC01-appb-I000039
Two n-dimensional binary vectors, ie
Figure JPOXMLDOC01-appb-I000040
When
Figure JPOXMLDOC01-appb-I000041
Represents the bitwise exclusive OR.

[C-3]第1デバイスにおける暗号化方式
第1デバイスにおける暗号化において、第2デバイスに送信される暗号文ベクトルはY(ins)であり、

Figure JPOXMLDOC01-appb-I000042
によって生成される。 [C-3] Encryption method in the first device In the encryption in the first device, the ciphertext vector transmitted to the second device is Y (ins) ,
Figure JPOXMLDOC01-appb-I000042
Generated by.

[C-4]第2デバイスにおける復号方式
暗号文ベクトルY(ins)を受信した第2デバイスにおける復号において、解読して得られる平文ベクトルaは、

Figure JPOXMLDOC01-appb-I000043
によって生成される。 [C-4] In the decryption in the second device that has received the decryption scheme ciphertext vector Y (ins) in the second device, the plaintext vector a obtained by decrypting is
Figure JPOXMLDOC01-appb-I000043
Generated by.

[C-5]第2デバイスにおける暗号化方式
第2デバイスにおける暗号化において、第1デバイスに送信される暗号文ベクトルはY(del)であり、

Figure JPOXMLDOC01-appb-I000044
によって生成される。 [C-5] Encryption method in the second device In the encryption in the second device, the ciphertext vector transmitted to the first device is Y (del) ,
Figure JPOXMLDOC01-appb-I000044
Generated by.

[C-6]第1デバイスにおける復号方式
暗号文ベクトルY(del)を受信した第1デバイスにおける復号において、解読して得られる平文ベクトルaは、

Figure JPOXMLDOC01-appb-I000045
によって生成される。 [C-6] In the decryption in the first device that has received the decryption scheme ciphertext vector Y (del) in the first device, the plaintext vector a obtained by decrypting is as follows:
Figure JPOXMLDOC01-appb-I000045
Generated by.

[C-7]鍵系列を用いたランダムビット埋め込み
 与えられたビット列を

Figure JPOXMLDOC01-appb-I000046
とし、
 埋め込みに用いる鍵系列を、
Figure JPOXMLDOC01-appb-I000047
とする。鍵系列において、「1」は、ランダムビットの埋め込みを意味する。
 埋め込みが実行された系列は、
Figure JPOXMLDOC01-appb-I000048
となる。
 ここで、「r」は、同じ確率で1あるいは0の値をとるランダムビットを表す。
 鍵系列を用いたランダムビット埋め込みについて、各ビットの直後にビット埋め込みを行う場合について説明したが、各ビットの直前にビット埋め込みを行う場合も同様に理解される。 [C-7] Random bit embedding using key sequence
Figure JPOXMLDOC01-appb-I000046
age,
The key sequence used for embedding is
Figure JPOXMLDOC01-appb-I000047
And In the key sequence, “1” means embedding of random bits.
The series that has been embedded is
Figure JPOXMLDOC01-appb-I000048
It becomes.
Here, “r” represents a random bit having a value of 1 or 0 with the same probability.
In the case of random bit embedding using a key sequence, the case where bit embedding is performed immediately after each bit has been described. However, the case where bit embedding is performed immediately before each bit is similarly understood.

[C-8]鍵系列を用いたデシメーション(ランダムビット埋め込み後)
 埋め込みが実行された系列を

Figure JPOXMLDOC01-appb-I000049
とする。
 例えば、
Figure JPOXMLDOC01-appb-I000050
である。
 デシメーションに用いる鍵系列を
Figure JPOXMLDOC01-appb-I000051
とする。鍵系列において、「1」は、ランダムビットの埋め込みを意味する。
 デシメーションが実行された系列は、
Figure JPOXMLDOC01-appb-I000052
となり、埋め込まれたランダムビットが削除される。
 各ビット直後のランダムビット埋め込み後の鍵系列を用いたデシメーションについて説明したが、各ビット直前のランダムビット埋め込み後にデシメーションを行う場合も同様に理解される。 [C-8] Decimation using key sequence (after embedding random bits)
The series that was embedded
Figure JPOXMLDOC01-appb-I000049
And
For example,
Figure JPOXMLDOC01-appb-I000050
It is.
The key sequence used for decimation
Figure JPOXMLDOC01-appb-I000051
And In the key sequence, “1” means embedding of random bits.
The series where the decimation was performed is
Figure JPOXMLDOC01-appb-I000052
And the embedded random bits are deleted.
Although the decimation using the key sequence after the random bit embedding immediately after each bit has been described, the case where the decimation is performed after the random bit embedding immediately before each bit is similarly understood.

[C-9]鍵系列を用いたデシメーション
 与えられたビット列を

Figure JPOXMLDOC01-appb-I000053
とし、
 鍵系列を
Figure JPOXMLDOC01-appb-I000054
とする。ここで、「0」はビットの削除を意味する。
 デシメーションが実行されたビット列は、
Figure JPOXMLDOC01-appb-I000055
となる。 [C-9] Decimation using key sequence
Figure JPOXMLDOC01-appb-I000053
age,
Key sequence
Figure JPOXMLDOC01-appb-I000054
And Here, “0” means bit deletion.
The bit sequence that has been decimated is
Figure JPOXMLDOC01-appb-I000055
It becomes.

[C-10]鍵系列を用いたデシメーション(ビット消失)後の復号の前処理
 デシメーション後のビット列を

Figure JPOXMLDOC01-appb-I000056
 デシメーションに用いた鍵系列を
Figure JPOXMLDOC01-appb-I000057
とする。
 デシメーション前の系列は、
Figure JPOXMLDOC01-appb-I000058
となる。
 ここで、「e」は、間引かれたビットの位置を表す。 [C-10] Pre-processing of decryption after decimation (bit erasure) using key sequence
Figure JPOXMLDOC01-appb-I000056
The key sequence used for decimation
Figure JPOXMLDOC01-appb-I000057
And
The series before decimation is
Figure JPOXMLDOC01-appb-I000058
It becomes.
Here, “e” represents the position of the thinned bit.

[D]非対称的な暗号化/復号システムにおける処理量
図5に、図4に示す暗号化/復号システムを整理して示す。第1デバイスにおける暗号化は、鍵系列生成、ランダムビット埋め込みが用いられ(図2上図参照)、第2デバイスにおける暗号化は、鍵系列生成、符号化、デシメーションが用いられる(図3下図参照)。第1デバイスにおける復号(解読)は、鍵系列生成、復号が用いられ(図3上図参照)、第2デバイスにおける復号(解読)は、鍵系列生成、デシメーションが用いられる(図2下図参照)。第1デバイスが送信者、第2デバイスが受信者の場合には、第1デバイスにおいて埋め込みを行う一方、第2デバイスにおいてデシメーションを行い、第2デバイスが送信者、第1デバイスが受信者の場合には、第2デバイスにおいてデシメーション、誤り訂正符号化を行う一方、第1デバイスにおいて誤り訂正復号を行うという非対称的な方式とし、負荷の高い処理を第1デバイス側へ偏らせることによって、第2デバイスの動作コストを低く抑えることを可能とした。
[D] Amount of Processing in Asymmetric Encryption / Decryption System FIG. 5 shows the encryption / decryption system shown in FIG. 4 in an organized manner. Encryption in the first device uses key sequence generation and random bit embedding (see the upper diagram in FIG. 2), and encryption in the second device uses key sequence generation, encoding, and decimation (see the lower diagram in FIG. 3). ). Decryption (decryption) in the first device uses key sequence generation and decryption (see the upper diagram in FIG. 3), and decryption (decryption) in the second device uses key sequence generation and decimation (see the lower diagram in FIG. 2). . When the first device is a sender and the second device is a receiver, the first device performs embedding while the second device performs decimation, the second device is the sender, and the first device is the receiver In the second device, the second device performs the decimation and error correction coding, while the first device performs error correction decoding, and the second device is biased toward the first device by biasing the high-load processing to the second device. The operating cost of the device can be kept low.

 1つの態様では、提案するストリーム暗号に係るデバイス1における処理量は、
 鍵系列生成器における第1鍵系列生成部、第2鍵系列生成部、
 BECにおける復号、
 ランダムビットの生成、
 埋め込みブロック、
からなり、
 提案するストリーム暗号に係るデバイス2における処理量は、
 鍵系列生成器における第1鍵系列生成部、第2鍵系列生成部、
 BECにおける符号化、
 デシメーションブロック、
からなり、
 第1鍵系列生成部としてTrivium(非特許文献3)、第2鍵系列生成部としてGrain v1(非特許文献8)、符号化、復号用の符号としてLDPC符号(非特許文献9)を採用すると、以下の通りとなる。

Figure JPOXMLDOC01-appb-I000059
In one aspect, the processing amount in the device 1 according to the proposed stream cipher is
A first key sequence generation unit, a second key sequence generation unit in the key sequence generator,
Decryption in BEC,
Random bit generation,
Embedded blocks,
Consists of
The processing amount in the device 2 related to the proposed stream cipher is
A first key sequence generation unit, a second key sequence generation unit in the key sequence generator,
Encoding in BEC,
Decimation block,
Consists of
When Trivium (Non-Patent Document 3) is used as the first key sequence generation unit, Grain v1 (Non-Patent Document 8) is used as the second key sequence generation unit, and LDPC code (Non-Patent Document 9) is used as the encoding and decoding code. It becomes as follows.
Figure JPOXMLDOC01-appb-I000059

高性能な計算機だけでなく情報処理能力の低いウェラブルデバイスやセンサーなどのデバイスを含む複雑なネットワークシステムを構築し、ITが新たなサービスと市場を創出する期待が高まっている。本発明は、そのようなシステムのためのセキュリティ技術として利用可能である。 There is a growing expectation that IT will create new services and markets by building complex network systems that include not only high-performance computers but also devices such as wearable devices and sensors with low information processing capabilities. The present invention can be used as a security technique for such a system.

本発明では、計算機資源の乏しいデバイス側の消費電力を大幅に抑えることができるため、応用範囲が格段に広まる。例えば、電力など重要インフラのセキュリティ、人への埋め込みもしくは携帯デバイスを活用したヘルスケアや高齢者向けサービス、様々なセンサーを活用した農業、漁業支援や災害対策システム、計算機を持ち歩かずとも利用可能な外出先での次世代クレジットカード決済など、市場の大きな応用しかもグローバルな市場への応用が期待できる。ウェアラブルデバイスを着用した作業員がロボットやセンサーと協調して働く制御システムなど、一見異なる応用に見えるものの融合もあり得る。それらの基盤技術として利用価値が高い。 In the present invention, since the power consumption on the side of a device having a scarce computer resource can be greatly suppressed, the application range is greatly widened. For example, security of critical infrastructure such as electric power, healthcare embedded in people or using mobile devices, services for elderly people, agriculture using various sensors, fishery support and disaster countermeasure systems, can be used without carrying a computer Applications such as next-generation credit card payments on the go can be expected to have significant market applications as well as global markets. There may be a fusion of what appears to be different applications, such as a control system where workers wearing wearable devices work in concert with robots and sensors. The utility value is high as those basic technologies.

Claims (19)

 第1デバイスと第2デバイス間の通信データの暗号化/復号方法であって、
 前記第1デバイスは、鍵系列生成器と、排他的論理和演算器と、誤り訂正復号器と、エンベッダと、を備え、
 前記第2デバイスは、鍵系列生成器と、排他的論理和演算器と、誤り訂正符号化器と、デシメータと、を備え、
 前記第1デバイスが送信機、前記第2デバイスが受信機の場合には、
 前記第1デバイスにおける暗号化方式は、
 平文と第1鍵系列の排他的論理和演算を実行して第1暗号文を生成するステップと、
 前記第1暗号文に対して第2鍵系列を用いて埋め込みを実行して第2暗号文を生成するステップと、
 を備え、
 前記第2デバイスにおける復号方式は、
 前記第1デバイスから受信した第2暗号文に対して第2鍵系列を用いてデシメーションを実行して第3暗号文を生成するステップと、
 第3暗号文と第1鍵系列の排他的論理和演算を実行して平文を出力するステップと、
を備え、
 前記第2デバイスが送信機、前記第1デバイスが受信機の場合には、
 前記第2デバイスにおける暗号化方式は、
 平文と第3鍵系列の排他的論理和演算を実行して第1´暗号文を生成するステップと、
 第1´暗号文を誤り訂正符号化して第2´暗号文を生成するステップと、
 第2´暗号文に対して第4鍵系列を用いてデシメーションを実行して第3´暗号文を生成するステップと、
 を備え、
 前記第1デバイスにおける復号方式は、
 前記第2デバイスから受信した第3´暗号文を第4鍵系列を用いて誤り訂正復号して第4´暗号文を生成するステップと、
 第4´暗号文と第3鍵系列の排他的論理和演算を実行して平文を出力するステップと、
 を備えている、
 通信データの暗号化/復号方法。
A method for encrypting / decrypting communication data between a first device and a second device, comprising:
The first device includes a key sequence generator, an exclusive OR operator, an error correction decoder, and an embedder.
The second device includes a key sequence generator, an exclusive OR operator, an error correction encoder, and a decimator,
When the first device is a transmitter and the second device is a receiver,
The encryption method in the first device is:
Performing an exclusive OR operation of the plaintext and the first key sequence to generate a first ciphertext;
Generating a second ciphertext by embedding the first ciphertext using a second key sequence;
With
The decoding method in the second device is:
Generating a third ciphertext by performing decimation on the second ciphertext received from the first device using a second key sequence;
Performing an exclusive OR operation of the third ciphertext and the first key sequence to output a plaintext;
With
When the second device is a transmitter and the first device is a receiver,
The encryption method in the second device is:
Performing an exclusive OR operation of the plaintext and the third key sequence to generate a 1 ′ ciphertext;
Generating a second 'ciphertext by error correcting encoding the first'ciphertext;
Performing decimation on the second 'ciphertext using the fourth key sequence to generate a third'ciphertext;
With
The decoding method in the first device is:
Generating a 4 ′ ciphertext by performing error correction decoding on the 3 ′ ciphertext received from the second device using a fourth key sequence;
Performing an exclusive OR operation of the 4 ′ ciphertext and the third key sequence to output plaintext;
With
Communication data encryption / decryption method.
 第1デバイスと第2デバイス間の通信データの暗号化/復号システムであって、
 前記第1デバイスは、鍵系列生成器と、排他的論理和演算器と、誤り訂正復号器と、エンベッダと、を備え、
 前記第2デバイスは、鍵系列生成器と、排他的論理和演算器と、誤り訂正符号化器と、デシメータと、を備え、
 前記第1デバイスが送信機、前記第2デバイスが受信機の場合には、
 前記第1デバイスにおける暗号化手段は、
 第1鍵系列、第2鍵系列を生成する前記鍵系列生成器と、
 入力された平文と第1鍵系列の排他的論理和演算を実行して第1暗号文を生成する前記排他的論理和演算器と、
 前記第1暗号文に対して第2鍵系列を用いて埋め込みを実行して第2暗号文を生成する前記エンベッダと、
 からなり、
 前記第2デバイスにおける復号手段は、
 第1鍵系列、第2鍵系列を生成する前記鍵系列生成器と、
 前記第1デバイスから受信した第2暗号文に対して第2鍵系列を用いてデシメーションを実行して第3暗号文を生成する前記デシメータと、
 第3暗号文と第1鍵系列の排他的論理和演算を実行して平文を出力する前記排他的論理和演算器と、
 からなり、
 前記第2デバイスが送信機、前記第1デバイスが受信機の場合には、
 前記第2デバイスにおける暗号化手段は
 第3鍵系列、第4鍵系列を生成する前記鍵系列生成器と、
 平文と第3鍵系列の排他的論理和演算を実行して第1´暗号文を生成する前記排他的論理和演算器と、
 第1´暗号文を誤り訂正符号化して第2´暗号文を生成する前記誤り訂正符号化器と、
 第2´暗号文に対して第4鍵系列を用いてデシメーションを実行して第3´暗号文を生成する前記デシメータと、
 からなり、
 前記第1デバイスにおける復号手段は、
 第3鍵系列、第4鍵系列を生成する前記鍵系列生成器と、
 前記第2デバイスから受信した第3´暗号文を第4鍵系列を用いて誤り訂正復号して第4´暗号文を生成する誤り訂正復号器と、
 第4´暗号文と第3鍵系列の排他的論理和演算を実行して平文を出力する排他的論理和演算器と、
 からなる、
 通信データの暗号化/復号システム。
An encryption / decryption system for communication data between a first device and a second device,
The first device includes a key sequence generator, an exclusive OR operator, an error correction decoder, and an embedder.
The second device includes a key sequence generator, an exclusive OR operator, an error correction encoder, and a decimator,
When the first device is a transmitter and the second device is a receiver,
The encryption means in the first device is:
The key sequence generator for generating a first key sequence and a second key sequence;
The exclusive OR calculator that performs an exclusive OR operation of the input plaintext and the first key sequence to generate a first ciphertext;
The embedder for generating a second ciphertext by embedding the first ciphertext using a second key sequence;
Consists of
The decoding means in the second device is:
The key sequence generator for generating a first key sequence and a second key sequence;
The decimator for generating a third ciphertext by performing decimation on the second ciphertext received from the first device using a second key sequence;
Executing the exclusive OR operation of the third ciphertext and the first key sequence to output a plaintext;
Consists of
When the second device is a transmitter and the first device is a receiver,
The encryption means in the second device includes a key sequence generator for generating a third key sequence and a fourth key sequence,
The exclusive OR calculator that performs an exclusive OR operation of the plaintext and the third key sequence to generate a 1 'ciphertext;
The error correction encoder for error correcting encoding the first 'ciphertext to generate the second'ciphertext;
The decimator that performs decimation on the second 'ciphertext using the fourth key sequence to generate a third'ciphertext;
Consists of
The decoding means in the first device is:
The key sequence generator for generating a third key sequence and a fourth key sequence;
An error correction decoder for generating a 4 ′ ciphertext by performing error correction decoding on the 3 ′ ciphertext received from the second device using a fourth key sequence;
An exclusive OR calculator that performs an exclusive OR operation of the 4 ′ ciphertext and the third key sequence and outputs a plaintext;
Consist of,
Communication data encryption / decryption system.
 暗号化装置及び復号装置として動作するデバイスであって、
 前記デバイスは、鍵系列生成器と、排他的論理和演算器と、誤り訂正復号器と、エンベッダと、送信手段と、受信手段と、を備え、
 暗号化装置は、
 第1鍵系列、第2鍵系列を生成する前記鍵系列生成器と、
 平文と第1鍵系列の排他的論理和演算を実行して第1暗号文を生成する前記排他的論理和演算器と、
 第1暗号文に対して第2鍵系列を用いて埋め込みを実行して第2暗号文を生成する前記エンベッダと、
 第2暗号文を送信する前記送信手段と、
 からなり、
 復号装置は、
 平文と第3鍵系列の排他的論理和演算により生成された第1´暗号文を誤り訂正符号化して生成された第2´暗号文に対して第4鍵系列を用いてデシメーションを実行して生成された第3´暗号文を受信する前記受信手段と、
 第3鍵系列、第4鍵系列を生成する前記鍵系列生成器と、
 第3´暗号文を第4鍵系列を用いて誤り訂正復号して第4´暗号文を生成する前記誤り訂正復号器と、
 第4´暗号文と第3鍵系列の排他的論理和演算を実行して平文を出力する前記排他的論理和演算器と、
 からなる、デバイス。
A device that operates as an encryption device and a decryption device,
The device includes a key sequence generator, an exclusive OR operator, an error correction decoder, an embedder, a transmission unit, and a reception unit.
The encryption device
The key sequence generator for generating a first key sequence and a second key sequence;
The exclusive OR calculator that performs an exclusive OR operation between the plaintext and the first key sequence to generate a first ciphertext;
The embedder for embedding the first ciphertext using a second key sequence to generate a second ciphertext;
The transmitting means for transmitting the second ciphertext;
Consists of
The decryption device
Decimation is performed using the fourth key sequence on the second 'ciphertext generated by error correction encoding the first' ciphertext generated by the exclusive OR operation of the plaintext and the third key sequence. The receiving means for receiving the generated 3 ′ ciphertext;
The key sequence generator for generating a third key sequence and a fourth key sequence;
The error correction decoder for generating a 4 ′ ciphertext by performing error correction decoding of the 3 ′ ciphertext using a fourth key sequence;
The exclusive OR operator for executing the exclusive OR operation of the 4 ′ ciphertext and the third key sequence and outputting plaintext;
A device consisting of
 暗号化装置及び復号装置として動作するデバイスであって、
 前記デバイスは、鍵系列生成器と、排他的論理和演算器と、誤り訂正符号化器と、デシメータと、送信手段と、受信手段と、を備え、
 前記暗号化装置は、
 第1鍵系列、第2鍵系列を生成する前記鍵系列生成器と、
 平文と第1鍵系列の排他的論理和演算を実行して第1暗号文を生成する前記排他的論理和演算器と、
 第1暗号文を誤り訂正符号化して第2暗号文を生成する前記誤り訂正符号化器と、
 第2暗号文に対して第2鍵系列を用いてデシメーションを実行して第3暗号文を生成する前記デシメータと、
 第3暗号文を送信する前記送信手段と、
 からなり、
 前記復号装置は、
 平文と第3鍵系列の排他的論理和演算により生成された第1´暗号文に対して第4鍵系列を用いて埋め込みを実行して生成された第2´暗号文を受信する前記受信手段と、
 第3鍵系列、第4鍵系列を生成する前記鍵系列生成器と、
 第2´暗号文に対して第4鍵系列を用いてデシメーションを実行して第3´暗号文を生成する前記デシメータと、
 第3´暗号文と第3鍵系列の排他的論理和演算を実行して平文を出力する前記排他的論理和演算器と、
 からなる、デバイス。
A device that operates as an encryption device and a decryption device,
The device includes a key sequence generator, an exclusive OR operator, an error correction encoder, a decimator, transmission means, and reception means,
The encryption device is:
The key sequence generator for generating a first key sequence and a second key sequence;
The exclusive OR calculator that performs an exclusive OR operation between the plaintext and the first key sequence to generate a first ciphertext;
The error correction encoder for error correcting encoding the first ciphertext to generate a second ciphertext;
The decimator for generating a third ciphertext by performing decimation on the second ciphertext using the second key sequence;
The transmitting means for transmitting a third ciphertext;
Consists of
The decoding device
The receiving means for receiving the 2 ′ ciphertext generated by embedding the first ′ ciphertext generated by the exclusive OR operation of the plaintext and the third key sequence using the fourth key sequence. When,
The key sequence generator for generating a third key sequence and a fourth key sequence;
The decimator that performs decimation on the second 'ciphertext using the fourth key sequence to generate a third'ciphertext;
The exclusive OR calculator for executing an exclusive OR operation of a 3 ′ ciphertext and a third key sequence and outputting a plaintext;
A device consisting of
 平文と第1鍵系列の排他的論理和演算を実行して第1暗号文を生成する第1ステップと、
 第1暗号文を誤り訂正符号化して第2暗号文を生成する第2ステップと、
 第2暗号文に対して第2鍵系列を用いてデシメーションを実行して第3暗号文を生成する第3ステップと、
 第3暗号文を第2鍵系列を用いて誤り訂正復号して第4暗号文を生成する第4ステップと、
 第4暗号文と第1鍵系列の排他的論理和演算を実行して平文を出力する第5ステップと、
 からなる、暗号化/復号方法。
A first step of generating a first ciphertext by performing an exclusive OR operation between the plaintext and the first key sequence;
A second step of error correcting encoding the first ciphertext to generate a second ciphertext;
A third step of generating a third ciphertext by performing decimation on the second ciphertext using the second key sequence;
A fourth step of generating a fourth ciphertext by performing error correction decryption on the third ciphertext using the second key sequence;
A fifth step of executing an exclusive OR operation of the fourth ciphertext and the first key sequence to output a plaintext;
An encryption / decryption method comprising:
 暗号化装置と復号装置とからなる暗号化/復号システムにおいて、
 前記暗号化装置は、
 平文と第1鍵系列の排他的論理和演算を実行して第1暗号文を生成する排他的論理和演算器と、
 第1暗号文を誤り訂正符号化して第2暗号文を生成する誤り訂正符号化器と、
 第2暗号文に対して第2鍵系列を用いてデシメーションを実行して第3暗号文を生成するデシメータと、
 からなり、
 前記復号装置は、
 第3暗号文を第2鍵系列を用いて誤り訂正復号して第4暗号文を生成する誤り訂正復号器と、
 第4暗号文と第1鍵系列の排他的論理和演算を実行して平文を出力する排他的論理和演算器と、
 からなる、暗号化/復号システム。
In an encryption / decryption system comprising an encryption device and a decryption device,
The encryption device is:
An exclusive OR calculator that performs an exclusive OR operation between the plaintext and the first key sequence to generate a first ciphertext;
An error correction encoder that performs error correction encoding of the first ciphertext to generate a second ciphertext;
A decimator that performs decimation on the second ciphertext using the second key sequence to generate a third ciphertext;
Consists of
The decoding device
An error correction decoder for generating a fourth ciphertext by performing error correction decoding on the third ciphertext using the second key sequence;
An exclusive OR calculator that executes an exclusive OR operation of the fourth ciphertext and the first key sequence and outputs a plaintext;
An encryption / decryption system consisting of
 平文と第1鍵系列の排他的論理和演算を実行して第1暗号文を生成する第1ステップと、
 第1暗号文に対して第2鍵系列を用いて埋め込みを実行して第2暗号文を生成する第2ステップと、
 第2暗号文に対して第2鍵系列を用いてデシメーションを実行して第3暗号文を生成する第3ステップと、
 第3暗号文と第1鍵系列の排他的論理和演算を実行して平文を出力する第4ステップと、
 からなる、暗号化/復号方法。
A first step of generating a first ciphertext by performing an exclusive OR operation between the plaintext and the first key sequence;
A second step of generating a second ciphertext by embedding the first ciphertext using a second key sequence;
A third step of generating a third ciphertext by performing decimation on the second ciphertext using the second key sequence;
A fourth step of executing an exclusive OR operation of the third ciphertext and the first key sequence to output plaintext;
An encryption / decryption method comprising:
 暗号化装置と復号装置とからなる暗号化/復号システムにおいて、
 前記暗号化装置は、
 平文と第1鍵系列の排他的論理和演算を実行して第1暗号文を生成する排他的論理和演算器と、
 前記第1暗号文に対して第2鍵系列を用いて埋め込みを実行して第2暗号文を生成するエンベッダと、
 からなり、
 前記復号装置は、
 第2暗号文に対して第2鍵系列を用いてデシメーションを実行して第3暗号文を生成するデシメータと、
 第3暗号文と第1鍵系列の排他的論理和演算を実行して平文を出力する排他的論理和演算器と、
 からなる、暗号化/復号システム。
In an encryption / decryption system comprising an encryption device and a decryption device,
The encryption device is:
An exclusive OR calculator that performs an exclusive OR operation between the plaintext and the first key sequence to generate a first ciphertext;
An embedder for embedding the first ciphertext using a second key sequence to generate a second ciphertext;
Consists of
The decoding device
A decimator that performs decimation on the second ciphertext using the second key sequence to generate a third ciphertext;
An exclusive OR calculator that executes an exclusive OR operation of the third ciphertext and the first key sequence and outputs a plaintext;
An encryption / decryption system consisting of
 平文と第1鍵系列の排他的論理和演算を実行して第1暗号文を生成するステップと、
 第1暗号文を誤り訂正符号化して第2暗号文を生成するステップと、
 第2暗号文に対して第2鍵系列を用いてデシメーションを実行して第3暗号文を生成するステップと、
 からなる、暗号化方法。
Performing an exclusive OR operation of the plaintext and the first key sequence to generate a first ciphertext;
Generating a second ciphertext by error-correcting the first ciphertext;
Performing a decimation on the second ciphertext using the second key sequence to generate a third ciphertext;
An encryption method consisting of:
 平文と第1鍵系列の排他的論理和演算を実行して第1暗号文を生成する排他的論理和演算器と、
 第1暗号文を誤り訂正符号化して第2暗号文を生成する誤り訂正符号化器と、
 第2暗号文に対して第2鍵系列を用いてデシメーションを実行して第3暗号文を生成するデシメータと、
 からなる、暗号化装置。
An exclusive OR calculator that performs an exclusive OR operation between the plaintext and the first key sequence to generate a first ciphertext;
An error correction encoder that performs error correction encoding of the first ciphertext to generate a second ciphertext;
A decimator that performs decimation on the second ciphertext using the second key sequence to generate a third ciphertext;
An encryption device comprising:
 平文と第1鍵系列の排他的論理和演算により生成された第1暗号文を誤り訂正符号化して生成された第2暗号文に対して第2鍵系列を用いてデシメーションを実行して生成された第3暗号文の復号方法であって、
 第3暗号文を第2鍵系列を用いて誤り訂正復号して第4暗号文を生成するステップと、
 第4暗号文と第1鍵系列の排他的論理和演算を実行して平文を出力するステップと、
 を備えている、復号方法。
Generated by performing decimation using the second key sequence on the second ciphertext generated by error correction encoding the first ciphertext generated by the exclusive OR operation of the plaintext and the first key sequence A decryption method of the third ciphertext,
Generating a fourth ciphertext by performing error correction decoding on the third ciphertext using the second key sequence;
Performing an exclusive OR operation of the fourth ciphertext and the first key sequence to output a plaintext;
A decryption method.
 平文と第1鍵系列の排他的論理和演算により生成された第1暗号文を誤り訂正符号化して生成された第2暗号文に対して第2鍵系列を用いてデシメーションを実行して生成された第3暗号文の復号装置であって、
 第3暗号文を第2鍵系列を用いて誤り訂正復号して第4暗号文を生成する誤り訂正復号器と、
 第4暗号文と第1鍵系列の排他的論理和演算を実行して平文を出力する排他的論理和演算器と、
 からなる、復号装置。
Generated by performing decimation using the second key sequence on the second ciphertext generated by error correction encoding the first ciphertext generated by the exclusive OR operation of the plaintext and the first key sequence A third ciphertext decryption device,
An error correction decoder for generating a fourth ciphertext by performing error correction decoding on the third ciphertext using the second key sequence;
An exclusive OR calculator that executes an exclusive OR operation of the fourth ciphertext and the first key sequence and outputs a plaintext;
A decoding device comprising:
 平文と第1鍵系列の排他的論理和演算を実行して第1暗号文を生成するステップと、
 第1暗号文に対して第2鍵系列を用いて埋め込みを実行して第2暗号文を生成するステップと、
 からなる暗号化方法。
Performing an exclusive OR operation of the plaintext and the first key sequence to generate a first ciphertext;
Generating a second ciphertext by embedding the first ciphertext using a second key sequence;
An encryption method consisting of:
 平文と第1鍵系列の排他的論理和演算を実行して第1暗号文を生成する排他的論理和演算器と、
 第1暗号文に対して第2鍵系列を用いて埋め込みを実行して第2暗号文を生成するエンベッダと、
 からなる、暗号化装置。
An exclusive OR calculator that performs an exclusive OR operation between the plaintext and the first key sequence to generate a first ciphertext;
An embedder for embedding the first ciphertext using the second key sequence to generate a second ciphertext;
An encryption device comprising:
 平文と第1鍵系列の排他的論理和演算により生成された第1暗号文に対して第2鍵系列を用いて埋め込みを実行して生成された第2暗号文の復号方法であって、
 第2暗号文に対して第2鍵系列を用いてデシメーションを実行して第3暗号文を生成するステップと、
 第3暗号文と第1鍵系列の排他的論理和演算を実行して平文を出力するステップと、
 からなる、復号方法。
A method for decrypting a second ciphertext generated by embedding a first ciphertext generated by an exclusive OR operation between a plaintext and a first key sequence using a second key sequence,
Performing a decimation on the second ciphertext using the second key sequence to generate a third ciphertext;
Performing an exclusive OR operation of the third ciphertext and the first key sequence to output a plaintext;
A decoding method comprising:
 平文と第1鍵系列の排他的論理和演算により生成された第1暗号文に対して第2鍵系列を用いて埋め込みを実行して生成された第2暗号文の復号装置であって、
 第2暗号文に対して第2鍵系列を用いてデシメーションを実行して第3暗号文を生成するデシメータと、
 第3暗号文と第1鍵系列の排他的論理和演算を実行して平文を出力する排他的論理和演算器と、
 からなる、復号装置。
A decryption device for a second ciphertext generated by embedding a first ciphertext generated by an exclusive OR operation between a plaintext and a first key sequence using a second key sequence,
A decimator that performs decimation on the second ciphertext using the second key sequence to generate a third ciphertext;
An exclusive OR calculator that executes an exclusive OR operation of the third ciphertext and the first key sequence and outputs a plaintext;
A decoding device comprising:
 請求項9、13いずれか1項に記載の暗号化方法をコンピュータに実行させるためのコンピュータプログラム。 A computer program for causing a computer to execute the encryption method according to any one of claims 9 and 13.  請求項11、15いずれか1項に記載の復号方法をコンピュータに実行させるためのコンピュータプログラム。 A computer program for causing a computer to execute the decoding method according to any one of claims 11 and 15.  請求項1、5、7いずれか1項に記載の暗号化/復号方法をコンピュータに実行させるためのコンピュータプログラム。 A computer program for causing a computer to execute the encryption / decryption method according to any one of claims 1, 5, and 7.
PCT/JP2016/073907 2015-08-17 2016-08-16 Communication data encryption/decryption method and system Ceased WO2017030117A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2015160720A JP6667174B2 (en) 2015-08-17 2015-08-17 Communication data encryption / decryption method and system
JP2015-160720 2015-08-17

Publications (1)

Publication Number Publication Date
WO2017030117A1 true WO2017030117A1 (en) 2017-02-23

Family

ID=58052076

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2016/073907 Ceased WO2017030117A1 (en) 2015-08-17 2016-08-16 Communication data encryption/decryption method and system

Country Status (2)

Country Link
JP (1) JP6667174B2 (en)
WO (1) WO2017030117A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11196447B2 (en) 2018-11-16 2021-12-07 Siemens Aktiengesellschaft Computer-implemented method for error-correction-encoding and encrypting of a file

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112865960B (en) * 2020-12-31 2022-09-09 广州万协通信息技术有限公司 System, method and device for realizing high-speed key chain pre-calculation based on stream cipher

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030012372A1 (en) * 2001-04-25 2003-01-16 Cheng Siu Lung System and method for joint encryption and error-correcting coding

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030012372A1 (en) * 2001-04-25 2003-01-16 Cheng Siu Lung System and method for joint encryption and error-correcting coding

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
MIODRAG J. MIHALJEVIC ET AL.: "Evaluation of an Approach for Security Enhancement of Certain Lightweight Stream Ciphers", 2015 NEN SYMPOSIUM ON CRYPTOGRAPHY AND INFORMATION SECURITY SCIS, vol. 2E1- 5, 2015, pages 1 - 8, [retrieved on 20150120] *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11196447B2 (en) 2018-11-16 2021-12-07 Siemens Aktiengesellschaft Computer-implemented method for error-correction-encoding and encrypting of a file

Also Published As

Publication number Publication date
JP6667174B2 (en) 2020-03-18
JP2017041679A (en) 2017-02-23

Similar Documents

Publication Publication Date Title
JP6363032B2 (en) Key change direction control system and key change direction control method
CN103597456B (en) Method and apparatus for implementing memory segment access control in a distributed memory environment
CN114244507B (en) Quantum direct communication method, device, equipment and system based on single-path transmission
Khan et al. An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box
KR20150129328A (en) Method and apparatus for secure communication
Panda Data security in wireless sensor networks via AES algorithm
JP2005244988A (en) Security association for apparatuses
CN113711247B (en) A data processing method, device and system for machine learning model
CN111431716B (en) Data transmission method and device, computer equipment and storage medium
CN103988465B (en) Method and apparatus for implementing key stream hierarchy
EP3167569A1 (en) Method and system for providing a secure update of code on a memory-constrained device
WO2018213875A1 (en) Asymmetric cryptography and authentication
KR101836947B1 (en) Method of distributing key for multi-party in quantum communication, method of performing quantum communication using the same and quantum communication system performing the same
CN117714078A (en) Block chain group hidden transmission communication method, system and device and electronic equipment
Abd Elminaam et al. SMCACC: developing an efficient dynamic secure framework for mobile capabilities augmentation using cloud computing
JP6667174B2 (en) Communication data encryption / decryption method and system
US20140153723A1 (en) System for providing physical layer security
CN111277605B (en) Data sharing method and device, computer equipment and storage medium
Harun et al. Hybrid m-ary in braided single stage approach for multiphoton quantum secure direct communication protocol
US9948755B1 (en) Methods and systems of transmitting header information using rateless codes
Shivaramakrishnan et al. Rolling curve ECC for centralized key management system used in ECC-MPICH2
JP6602210B2 (en) Authentication system and method
US20250133066A1 (en) Secure encryption using tokenized data
US20250038953A1 (en) Providing random numbers over an insecure channel using disguised cyphertexts
Singh et al. Security of Data with 3DES & Watermarking Algorithm

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16837106

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16837106

Country of ref document: EP

Kind code of ref document: A1

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载