[go: up one dir, main page]

HK83795A - Method and system for enciphering and deciphering data transmitted between a transmitting apparatus and a receiving apparatus - Google Patents

Method and system for enciphering and deciphering data transmitted between a transmitting apparatus and a receiving apparatus Download PDF

Info

Publication number
HK83795A
HK83795A HK83795A HK83795A HK83795A HK 83795 A HK83795 A HK 83795A HK 83795 A HK83795 A HK 83795A HK 83795 A HK83795 A HK 83795A HK 83795 A HK83795 A HK 83795A
Authority
HK
Hong Kong
Prior art keywords
register
algorithm
message
deciphering
ciphering
Prior art date
Application number
HK83795A
Other languages
German (de)
French (fr)
Inventor
Girard Paul
Original Assignee
Cp8 Technologies
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cp8 Technologies filed Critical Cp8 Technologies
Publication of HK83795A publication Critical patent/HK83795A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • G06Q20/4097Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
    • G06Q20/40975Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Signal Processing (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Storage Device Security (AREA)
  • Communication Control (AREA)
  • Radar Systems Or Details Thereof (AREA)
  • Compression, Expansion, Code Conversion, And Decoders (AREA)

Abstract

1. A method of ciphering and deciphering a message transmitted between an emitter device and a receiver device, consisting in ciphering the message (M) by applying to it a reversible ciphering algorithm consisting of an irreversible ciphering algorithm (f) combined with a symmetrization algorithm (s1), and in deciphering the message directly by applying to the ciphered message a reverse deciphering algorithm consisting of the aforesaid irreversible ciphering algorithm combined with a symmetrization algorithm (s2), characterized in that it consists in splitting up the message (M) into two portions (M1, M2), in storing the first portion (M1) of the message in a first register (X1), storing the second portion (M2) of the message in a second register (X2), and performing n times the following successive operations : - storing the contents of the second register (X2) in a garage register (RG) ; - executing upon the contents of the second register (X2) the irreversible algorithm (f) which takes into account an element i of at least one secret code (S) decomposed into p elements ; - storing the result of the execution of the irreversible algorithm (f) in the second register (X2) ; - adding modulo 2 binary digit to binary digit, the contents of the first and second registers (X1, X2) ; - storing the result of this addition in the second register (X2) ; and - storing the contents of the garage register (RG) in the first register (X1) ; and - recommencing the aforesaid n operations p times with i varying from 1 to p, the ciphered or deciphered message consisting of the association in an output register (X3) of the contents of the second register (X2) and of the garage register (RG).

Description

The invention relates to the transmission of information in general and in particular to a process and system for encrypting and decrypting information transmitted between a transmitting and a receiving device.
The invention applies in particular to the transmission of confidential information.
Many applications now use portable media such as cards to access a service delivered by a server.
The provision of this service usually requires a dialogue or exchange of information between the card and the server.
This dialogue usually involves the transmission of at least one message which must be kept confidential to prevent attempts at fraud by the sender and the receiver of the message and by a third party who may intercept the message on the transmission line.
For these reasons, the encryption technique is used so that an encrypted message can only be decrypted by the person to whom it is intended.
The encryption technique consists of processing the message by an algorithm whose degree of complexity depends on the desired degree of security.
However, given that the memory capacity available in a portable object is limited and that an invertible algorithm, for a minimum level of security, takes up relatively little memory space, the encryption and decryption operations are performed in circuits located outside the portable object.
This solution is acceptable only in applications where the messages transmitted contain only so-called passive information, i.e. information which does not enable a protected operation to be carried out. On the contrary, there are applications where the messages transmitted contain so-called active information, i.e. information from which a protected operation can be carried out. In this case, the decrypted message must not be directly accessible from outside for obvious security reasons.
This problem is particularly acute when trying to write certain information (for example, a credit card) into a portable object.
The order of the writing is first decoded by the decoding circuits and then transmitted to the card to carry out the writing operation. Since it is possible to read the order of the writing at the card's input, it is sufficient to re-enter this order in clear form to recode the card at will.
It is therefore desirable to have portable objects that can perform decryption operations directly, without having to use circuits outside the card, i.e. these objects contain the decryption circuits.
Since a non-reversible algorithm takes up less memory space than an inversible algorithm for the same degree of security, the invention provides a process that enables information to be encrypted and decrypted from a non-reversible algorithm by giving this algorithm the inversible property so that it can directly perform decryption operations inside a portable object in accordance with the system proposed by the invention.
Err1:Expecting ',' delimiter: line 1 column 55 (char 54)
The invention therefore provides for a process according to claim 1, a system according to claim 6 and a certain according to claim 12 to encrypt and decrypt a message transmitted between a transmitting device and a receiving device.
As will be explained later, the invention allows for applications not envisaged so far, in particular for ensuring security in networks and for performing televalorisation operations, i.e. allowing the cardholder to re-credit the card remotely.
Further advantages, characteristics and details will be shown in the explanatory description below, with reference to the accompanying drawings given for example only.
Figure 1 shows a schematic representation of a system conforming to the invention.
Figure 2 shows the details of the encryption/decryption circuits included in a portable media such as a card.
As shown in Figure 1, the system consists of an emission part (E) and an input part (R).
The transmission part (E) consists of a terminal (3E) and a first portable object (1) such as a card temporarily or permanently coupled to that terminal. The reception part (R) consists of a terminal (3R) and a second portable object (2) such as a card temporarily coupled to that terminal. The terminals (3E, 3R) are connected to each other by a conventional transmission line (L).
The cards (1, 2) have, for example, a structure which is in accordance with that described in the applicant's French patent No 2 461 301.
The memory set (12) includes, for example, non-volatile memory (12A) and volatile memory (12B). The memory (12A) itself is divided into at least two areas: a secret area (12A1) inaccessible from the outside in writing/reading and an area (12A2) accessible from the outside in reading/writing.
The encryption/decryption circuits (11) access the memory assembly (12) by a bus (b10).
The terminal (3E) shall, for example, comprise at least one card reader (21) and a data input (22) device such as a keyboard and, as an accessory, a display unit (23).
The card (1) is coupled to the terminal (3E) by an interface (V) as described in the applicant's French patent application No 2 483 713.This interface is connected to the encryption/decryption circuits (11) of the card (1) by a link (b11) and to the write/read device (21) of the terminal (3E) by a link (b24).
The terminal (3R) is identical to the terminal (3E) and the card (2), similar to the card (1), is coupled to this terminal (3R) by the above interface (V). The two terminals (3E, 3R) are connected by a telecommunications interface (T) including the transmission path (L). This interface is connected to the devices (21) of the terminals (3E, 3R) by a link (b25).
The contents of the memory set (12) and the details of the encryption/decryption circuits (11) of the cards (1, 2) are described below.
The following information shall be recorded in the secret area (12A1) of the memory of each card (1, 2): - a confidential code (C) - a secret code (S), - at least one identifier (1), and - an algorithm (f).
In the memory areas (12A2) and (12B) (12) of each card (1, 2) permanent information and temporary information specific to the intended applications are recorded respectively.
As shown in Figure 2, the encryption/decryption circuits (11) comprise two types of circuits (11a, 11b).
The first circuits (11a) are conventional processing circuits capable of executing the algorithm (f) recorded in the cards (1, 2).
These first circuits (11a) are connected in input to output by two intermediate registers (RS, RI) whose inputs are connected to the secret memory area (12A1) of the card.
The second circuits (11b) are designed to complete the first circuits (11a) in the case where algorithm (f) is a non-reversible algorithm. - a first register (X1) whose input is connected to the memory area (12B) and the output of a garage register (RG), and whose output is connected to an input of an adding machine (A) modulo 2 binary digit to binary digit,- a second register (X2) whose input is connected to the memory area (12B), to the output of the adding machine (A) and to the output of the first circuits (11a), and whose output is connected to both the second input of the adding machine (A), to the input of the garage register (RG) and to an input of the first additions (11a), and- a third register (X3) or output register whose input is connected to the outputs of the adding machine (A) and the garage register (GR).
The encryption/decryption circuits (11) divided into two parts (11a, 11b) can be advantageously included in the circuits of a microprocessor designed for this purpose. It should be noted that the algorithm (f) is not necessarily recorded in the memory of the card, it can be implanted in the card in the form of a wired logic.
The operation of the encryption/decryption circuits (11) is described below with reference to Figures 1 and 2, assuming the use of a non-reversible algorithm (f).
The operation of encrypting a message is equivalent to applying simultaneously to that message a non-reversible algorithm (f) and a symmetry algorithm (s1), the set of these two algorithms ultimately returning to applying an inversible algorithm on the message.
The operation of decrypting this message is to apply simultaneously to the encrypted message the same non-reversible algorithm (f) and a symmetry algorithm (s2), the combination of these two algorithms returning to apply an inverse algorithm on the encrypted message.
If the algorithms (s1 and s2) are identical, the algorithm (F-1) is an inverse decryption algorithm identical to the encryption algorithm (F). Otherwise, the algorithm (F-') is an inverse decryption algorithm different from the encryption algorithm (F).
Either a message (M) to be transmitted from terminal (3E) to terminal (3R). - be pre-recorded in the memory area (12B) of the card (1), or - be entered on the terminal keyboard (22) of the terminal (3E), or - be originating from a device (not shown) or a central unit (not shown).
Regardless of its origin, the message (M) is in all cases stored in the memory area (12B) of the card (1).
This message (M) is divided into two parts (M1, M2), the part (M1) of the message is stored in the register (X1) and the part (M2) of the message is stored in the register (X2).
It is important to note that the algorithm (f) takes into account the secret code (S) broken down into p Si elements. In the example, the algorithm (f) also takes into account the identifier (I) broken down into q Ij elements and which personalizes the cardholder (2) for a particular application.
The message (M) is encrypted by performing the following operations n times (n being a positive integer): - the contents of the register (X2) are stored in the garage register (RG) which will then contain the part (M2) of the message (M), - the processing circuits (11a) run the algorithm (f) on the contents of the register (X2), i.e. on the part (M2) of the message (M) to give a result: which is stored in the register (X2) (with i greater than or equal to 1 and less than or equal to p, and j greater than or equal to 1 and less than or equal to q), - the additor (A) of the processing circuits (11 b) adds modulo 2 binary digit to binary digit the contents of the registers (X1, X2) to give a result R2: The data in the register (X2) is stored in the register (X1) and the contents of the garage register (RG) are stored in the register (X1) which will then contain the part (M2) of the message (M). - the contents of the register (X2) are stored in the garage register (RG) which will then contain the result R2 mentioned above: - the processing circuits (11a) run algorithm (f) on the register content (X2), i.e. on the result R2 to give a result R3: which is then stored in the register (X2),- the additor (A) adds modulo 2 binary digit to binary digit the contents of the registers (X1) and (X2) to give a result R4: which is then stored in the register (X2).The above operations that have just been performed for an i and a given are performed (p.q) times with i varying from [1 to p] and j from [1 to q). Once these operations are completed, the encrypted message (M') is obtained in the output register (X3) by putting the contents of the additor (A) and the register (RG) end to end such as: in the example described where n=2.
This encrypted message (M') produced at the transmitting (E) side is sent to the receiving (R) side by the transmission (L) side. The encrypted message (M') once received by the terminal (3R) is stored in the memory area (12B) of the card (2) which is coupled to that terminal (3R).
The decryption circuits (11) of the card (2) will run algorithm (f) to decrypt the message (M). The decryption operation is to apply to the message (M') the same operations as those performed when encrypting the message (M) with one possible variant depending on whether one wishes to obtain a reverse decryption algorithm that is generally identical or not to the encryption algorithm.
The encrypted message (M') is therefore divided into two parts (M'1, M'2):
The part (M'2) of the message (M') is stored in the register (X2) and the part (M'1) of the message (M') is stored in the register (X1).
As for the encryption operation given for purely indicative purposes, the following operations will be performed twice (n=2), which gives: - the contents of the register (X2) are stored in the garage register (RG), - the decryption circuits (11a) run the algorithm (f) on the contents of the register (X2) to give a result (R'1): which is stored in the register (X2) (with i greater than or equal to 1 and less than or equal to p, and j greater than or equal to 1 and less than or equal to q)― the additor (A) adds modulo 2 binary digit to binary digit the contents of the registers (X1, X2) to give a result R'2: which is stored in the register (X2).- the contents of the garage register (RG) are stored in the register (X1) which then contains the part (M'2) of the message (M),- the contents of the register (X2) are stored in the garage register (RG) which then contains the result R'2 above which is equal to the part (M2) of the message,- the decryption circuits (11a) run algorithm (f) again on the contents of the register (X2) to give a result (R'3): which is stored in the register (X2), and- the additor (A) adds modulo 2 binary digit to binary digit the contents of the registers (X1 and X2) to give a result R'4:
As with encryption, the above operations performed for a given i and j are performed (p.q) times with i varying from [1 to p] and j varying from [1 to q].
The invention provides two solutions, namely: - combine the contents of the additor (A) and the garage register (RG) so as to find in the output register (X3) the original message M=(M1, M2), or- combine the contents of the additor (A) and the garage register (RG) in the output register (X3) to obtain a different decrypted message from the original message, e.g. M'=(M2, M1).
If the output register (X3) contains the message (M1, M2) i.e. the original message (M), then the decryption algorithm is identical to the encryption algorithm (s1 equals s2).
If the output register contains a different decrypted message from the original message, for example M'=(M2, M1 the decryption algorithm is not identical to the encryption algorithm (s1 different from s2).
This asymmetry obtained, for example at the end of processing, by a simple reversal of the contents of the additor (A) and the garage register (RG) has been given for purely indicative purposes. More generally and always within the framework of the invention, this asymmetry can be achieved at any stage of the decryption.
The operation of the system as described above was envisaged with the use of a non-reversible algorithm (f) as the starting assumption.
In the case where the chosen algorithm (f) is an inversible algorithm, the above operation differs only in the level of the encryption and decryption operations which are no longer performed by the processing circuits (11a) alone, since it is no longer necessary to call on the processing circuits (11b) responsible for executing the symmetry algorithms (s1, s2) which are used only when the algorithm (f) is a non-reversible algorithm.
In particular, the encryption operation may be limited to applying the algorithm (f) to the entire message (M) to give an encrypted message (M') such that:
This message (M') is directly decrypted by the decryption circuits (11a) of the card (2) by applying to this message the inverse algorithm (f-') as follows:
The interest of the invention will be highlighted in the two applications described below.
A first application is a network in which several people can all communicate with each other via portable objects such as cards. This enablement is achieved by giving these people cards that all contain the same secret code S, the same identifier and the same encryption/decryption algorithm (f). In this case, the decryption algorithm is identical to the encryption algorithm.
A second application is the example of a banking application and in particular an operation which allows the cardholder, once his credit has been exhausted, to re-credit his card remotely in a secure way for the banker.
In the system shown in Figure (1), the terminal (3E) is located in the banker's house, while the terminal (3R) is installed either in a public place or at the cardholder's home (2) by being combined with a telephone exchange, for example.
The operation of crediting the card (2) for X francs was broken down into a series of basic steps:
- first stage:
The cardholder (2), hereinafter referred to as the applicant, calls the banker to notify him of the requested transaction.
- second stage:
If so, the applicant shall connect his card (2) to the terminal (3R) and type his personal identification code (C) into the terminal (3R) keyboard (22) in the usual way. The card (2) or terminal (3R) shall verify that this code (C) corresponds to the code (C) pre-recorded in the memory area (12A1) of the card (2). If there is no coincidence, the requested operation shall not be carried out.
- the third stage:
otherwise, the banker enters a message (M) on the keyboard (22) of his terminal (3E), which translates into an order to recredit the card (2) for an amount of X francs, i.e. gives an order to write the X data to a specific address in the memory area (12A2) of the card (2).
- the fourth stage:
the message (M) is transmitted to the card (1) of the banker to undergo an encryption operation as described above to obtain an encrypted message (M').
- the fifth stage:
the encrypted message (M') is transmitted to the terminal (3R), via the transmission route (L) e.g. a telephone line, and then to the card (2) of the applicant.
- sixth stage:
the encrypted message (M') undergoes a decryption operation as described above with the variant where the decryption algorithm is not identical to the encryption algorithm.
This decrypted message is a writing order which can be understood by the card (2), unless the applicant's card (2) does not contain the same parameters (S, 1) as the banker's card (1). It is essential that the decrypted message is decrypted inside the card (2) and not outside it to prevent the applicant from being able to read the decrypted message, otherwise it would be possible for him to recredit his card himself without receiving a prior order from the banker.
In this application, it is important that the encryption and decryption algorithms are not identical, to prevent the applicant from imitating the banker's card with another card.
Finally, an additional precaution must be taken as the applicant may be able to read the encrypted message, which will then be tempted to re-enter the encrypted message into his card in order to re-credit it without receiving the prior order from the banker.

Claims (12)

1. A method of ciphering and deciphering a message transmitted between an emitter device and a receiver device, consisting in ciphering the message (M) by applying to it a reversible ciphering algorithm consisting of an irreversible ciphering algorithm (f) combined with a symmetrization algorithm (s1), and in deciphering the message directly by applying to the ciphered message a reverse deciphering algorithm consisting of the aforesaid irreversible ciphering algorithm combined with a symmetrization algorithm (s2), characterized in that it consists in splitting up the message (M) into two portions (M1, M2), in storing the first portion (M1) of the message in a first register (X1), storing the second portion (M2) of the message in a second register (X2), and performing n times the following successive operations:
- storing the contents of the second register (X2) in a garage register (RG);
- executing upon the contents of the second register (X2) the irreversible algorithm (f) which takes into account an element i of at least one secret code (S) decomposed into p elements;
- storing the result of the execution of the irreversible algorithm (f) in the second register (X2);
- adding modulo 2 binary digit to binary digit, the contents of the first and second registers (X1, X2);
- storing the result of this addition in the second register (X2); and
- storing the contents of the garage register (RG) in the first register (X1); and
- recommencing the aforesaid n operations p times with i varying from 1 to p, the ciphered or deciphered message consisting of the association in an output register (X3) of the contents of the second register (X2) and of the garage register (RG).
2. A method as in Claim 1, characterized in that it consists in applying two identical symmetrization algorithms (s1, s2) in order that the deciphering algorithm shall be a reverse algorithm identical with the ciphering algorithm (f).
3. A method as in Claim 1, characterized in that it consists in applying two different symmetrization algorithms (s1, s2) in order that the deciphering algorithm shall be a reverse algorithm different from the ciphering algorithm (f).
4. A method as in one of the Claims 1 to 3, characterized in that it consists in directly deciphering the message (M) inside a portable object (1) such as a card connected to the emitter device.
5. A method as in one of the Claims 1 to 4, characterized in that it consists in directly ciphering the message (M) inside a portable object (1) such as a card connected to the emitter device.
6. A system for putting into effect the method as in Claims 1 to 5 for ciphering and deciphering a message transmitted between an emitter device (E) and a receiver device (R); the emitter device (E) comprising at least ciphering circuits (11) for executing a ciphering algorithm (F) and the receiver device (R) comprising at least deciphering circuits (11) for executing a deciphering algorithm (F-'), characterized in that the processing circuits for the ciphering and for the deciphering comprise a first register (X1), a second register (X2), a garage register (RG) and an output register (X3), a modulo 2 binary digit to binary digit adder (A), a memory for recording an irreversible algorithm (f) and at least one symmetrization algorithm (s) as well as a secret code (S), and in that the input to the register (X2) is connected to means enabling the irreversible algorithm (f) to be effected as well as to the output from the adder (A), the output from the register (X2) is connected both to one input to the means of effecting the irreversible algorithm (f), to one input to the adder (A) and to the input to the garage register (RG), the output from the register (X1) is connected to the other input to the adder (A), and the outputs from the adder (A) and garage register (RG) are connected to the input to the output register (X3).
7. A system as in Claim 6, characterized in that the deciphering circuits (11) are included in a portable object (2) such as a card connected to the receiver device (R).
8. A system as in Claim 7, characterized in that the deciphering circuits (11) comprise first circuits (11a) for processing an irreversible algorithm (f) applied to the ciphered message, combined with second circuits (11b) for processing a symmetrization algorithm (s2) for deciphering the message.
9. A system as in one of the Claims 6 to 8, characterized in that the aforesaid algorithms (f, s2) for the deciphering are recorded in one memory of the card (2) connected to the receiver device (R).
10. A system as in one of the Claims 6 to 9, characterized in that the first and second circuits (11 a, 11 b) for the ciphering and for the deciphering are integrated into one microprocessor.
11. A system as in one of the Claims 6 to 10, characterized in that the ciphering circuits (11) of the emitter device (E) are included in a portable object (1) such as a card connected to the emitter device (E).
12. A card for putting into effect the method as in Claim 1 to 5 in the system as in Claims 6 to 11, characterized in that it comprises processing circuits which comprise both for the ciphering and for the deciphering at least one first register (X1), one second register (X2), one garage register (RG) and one output register (X3), one modulo 2 binary digit to binary digit adder (A), one memory for recording an irreversible algorithm (f) and at least one symmetrization algorithm (s) as well as a secret code (S), and in that the input to the register (X2) is connected to means enabling the irreversible algorithm (f) to be effected as well as to the output from the adder (A), the output from the register (X2) is connected both to one input to the means of effecting the irreversible algorithm (f), to one input to the adder (A) and to the input to the garage register (RG), the output from the register (X1) is connected to the other input to the adder (A), and the outputs from the adder (A) and from the garage register are connected to the input to the output register (X3).
HK83795A 1984-06-19 1995-05-25 Method and system for enciphering and deciphering data transmitted between a transmitting apparatus and a receiving apparatus HK83795A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
FR8409546A FR2566155B1 (en) 1984-06-19 1984-06-19 METHOD AND SYSTEM FOR ENCRYPTING AND DECIPHERING INFORMATION TRANSMITTED BETWEEN A TRANSMITTING DEVICE AND A RECEIVING DEVICE

Publications (1)

Publication Number Publication Date
HK83795A true HK83795A (en) 1995-06-01

Family

ID=9305164

Family Applications (1)

Application Number Title Priority Date Filing Date
HK83795A HK83795A (en) 1984-06-19 1995-05-25 Method and system for enciphering and deciphering data transmitted between a transmitting apparatus and a receiving apparatus

Country Status (7)

Country Link
EP (1) EP0172047B1 (en)
JP (1) JPS6113724A (en)
AT (1) ATE55501T1 (en)
CA (1) CA1243738A (en)
DE (1) DE3579073D1 (en)
FR (1) FR2566155B1 (en)
HK (1) HK83795A (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU612961B3 (en) * 1991-01-17 1991-06-11 Edward Pyle Dawson Discrete cosine transform analog speech scrambling system
FR2678459B1 (en) * 1991-06-26 1997-05-16 Patrick Remery METHOD FOR AUTHENTICATING A SUBSCRIBED CALLING PERSON FOR TELEPHONE PRICING.
FR2728981A1 (en) 1994-12-28 1996-07-05 Gemplus Card Int METHOD FOR IMPLEMENTING A PRIVATE KEY COMMUNICATION PROTOCOL BETWEEN TWO PROCESSING DEVICES
JPH1020778A (en) * 1996-07-08 1998-01-23 Harumi Takeda Encryption device and decryption device, and IC card
DE10008111A1 (en) 2000-02-22 2001-08-23 Krauss Maffei Kunststofftech Device for vacuum pressing DVD substrates

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4310720A (en) * 1978-03-31 1982-01-12 Pitney Bowes Inc. Computer accessing system
FR2530053B1 (en) * 1982-07-08 1986-04-25 Bull Sa METHOD FOR CERTIFYING THE SOURCE OF AT LEAST ONE INFORMATION RECORDED IN A MEMORY OF A FIRST ELECTRONIC DEVICE AND TRANSMITTED TO A SECOND ELECTRONIC DEVICE, AND SYSTEM FOR IMPLEMENTING SUCH A METHOD
JPS6062252A (en) * 1983-09-16 1985-04-10 Toshiba Corp Card incorporating enciphering circuit

Also Published As

Publication number Publication date
JPH046143B2 (en) 1992-02-04
FR2566155A1 (en) 1985-12-20
DE3579073D1 (en) 1990-09-13
EP0172047B1 (en) 1990-08-08
FR2566155B1 (en) 1988-01-29
EP0172047A1 (en) 1986-02-19
JPS6113724A (en) 1986-01-22
ATE55501T1 (en) 1990-08-15
CA1243738A (en) 1988-10-25

Similar Documents

Publication Publication Date Title
US4969188A (en) Process and apparatus for the protection of secret elements in a network of encrypting devices with open key management
US4326098A (en) High security system for electronic signature verification
US4438824A (en) Apparatus and method for cryptographic identity verification
US4500750A (en) Cryptographic application for interbank verification
US5311595A (en) Method of transferring data, between computer systems using electronic cards
US4731842A (en) Security module for an electronic funds transfer system
EP0687087B1 (en) Secure data transmission method
US7147157B2 (en) Secure remote-control unit
JPS619052A (en) Communication network system
JPH0242261B2 (en)
JPH0218512B2 (en)
USRE36310E (en) Method of transferring data, between computer systems using electronic cards
CN108038392A (en) A kind of smart card encryption method
JP2606827B2 (en) Encryption device using IC card
HK83795A (en) Method and system for enciphering and deciphering data transmitted between a transmitting apparatus and a receiving apparatus
EP0872081B1 (en) Method and device for data communication
JPH0231290A (en) IC card device
JPS61205041A (en) Communication network system
JP3549657B2 (en) Private key retention management method
EP0140388B1 (en) Pocket terminal, method and system for secured banking transactions
JPS60203036A (en) secret communication method
JPS62166489A (en) Ic card system
JPH11145949A (en) Personal information safety operating method
JP2002099856A (en) Card information handling system on network
WO1997024857A9 (en) Security for calling card validation

Legal Events

Date Code Title Description
AS Change of ownership

Owner name: BULL CP8

Free format text: FORMER OWNER(S): BULL S.A

AS Change of ownership

Owner name: CP8 TECHNOLOGIES

Free format text: FORMER OWNER(S): BULL CP8

PF Patent in force
PE Patent expired

Effective date: 20050618