TWI287767B - Encryption device and method, decryption device and method, integrity authentication code generation device and method, integrity authentication code auxiliary device, integrity recognition device, and wireless communication device - Google Patents
Encryption device and method, decryption device and method, integrity authentication code generation device and method, integrity authentication code auxiliary device, integrity recognition device, and wireless communication device Download PDFInfo
- Publication number
- TWI287767B TWI287767B TW90108273A TW90108273A TWI287767B TW I287767 B TWI287767 B TW I287767B TW 90108273 A TW90108273 A TW 90108273A TW 90108273 A TW90108273 A TW 90108273A TW I287767 B TWI287767 B TW I287767B
- Authority
- TW
- Taiwan
- Prior art keywords
- data
- integrity
- unit
- random number
- wireless communication
- Prior art date
Links
- 238000004891 communication Methods 0.000 title claims description 149
- 238000000034 method Methods 0.000 title description 38
- 239000000872 buffer Substances 0.000 claims abstract description 56
- 238000012545 processing Methods 0.000 claims description 250
- 238000012790 confirmation Methods 0.000 claims description 15
- 238000013500 data storage Methods 0.000 claims description 13
- 239000000463 material Substances 0.000 claims description 13
- 238000012937 correction Methods 0.000 claims description 7
- 238000004364 calculation method Methods 0.000 claims description 6
- 238000004519 manufacturing process Methods 0.000 claims description 3
- 238000006424 Flood reaction Methods 0.000 claims 1
- 241000239226 Scorpiones Species 0.000 claims 1
- 239000012141 concentrate Substances 0.000 claims 1
- 230000010365 information processing Effects 0.000 claims 1
- 210000003127 knee Anatomy 0.000 claims 1
- 238000010422 painting Methods 0.000 claims 1
- 239000002689 soil Substances 0.000 claims 1
- 238000004441 surface measurement Methods 0.000 claims 1
- 208000011580 syndromic disease Diseases 0.000 claims 1
- 238000013519 translation Methods 0.000 claims 1
- 230000006870 function Effects 0.000 abstract description 43
- 238000007792 addition Methods 0.000 description 26
- 238000010586 diagram Methods 0.000 description 24
- 230000008569 process Effects 0.000 description 19
- 230000005540 biological transmission Effects 0.000 description 17
- 230000007717 exclusion Effects 0.000 description 12
- 238000010276 construction Methods 0.000 description 7
- 239000012780 transparent material Substances 0.000 description 7
- 238000012795 verification Methods 0.000 description 7
- 238000006243 chemical reaction Methods 0.000 description 6
- 238000012546 transfer Methods 0.000 description 6
- PCHJSUWPFVWCPO-UHFFFAOYSA-N gold Chemical compound [Au] PCHJSUWPFVWCPO-UHFFFAOYSA-N 0.000 description 5
- 239000010931 gold Substances 0.000 description 5
- 229910052737 gold Inorganic materials 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 238000013478 data encryption standard Methods 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 238000010295 mobile communication Methods 0.000 description 3
- 230000001360 synchronised effect Effects 0.000 description 3
- 238000012360 testing method Methods 0.000 description 3
- 230000003321 amplification Effects 0.000 description 2
- 238000003199 nucleic acid amplification method Methods 0.000 description 2
- 208000000044 Amnesia Diseases 0.000 description 1
- 208000031091 Amnestic disease Diseases 0.000 description 1
- 241000209507 Camellia Species 0.000 description 1
- 230000006986 amnesia Effects 0.000 description 1
- 238000000429 assembly Methods 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 235000018597 common camellia Nutrition 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000007274 generation of a signal involved in cell-cell signaling Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 238000007639 printing Methods 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000001568 sexual effect Effects 0.000 description 1
- 230000005236 sound signal Effects 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
- 238000004148 unit process Methods 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
Description
^87767^87767
發明領域: 本發明係關於行動電話機等的:加密裝置及解碼裝置 及元整性認證子產生裝置及完整性認證子附加裝置及完整 陵確認裝置及無線通信裝置,特別是有關資料的隱藏處理 及完整性保護處理。 習知技術: 圖24表示一習知之行動電話機5〇〇。FIELD OF THE INVENTION The present invention relates to a mobile phone or the like: an encryption device and a decoding device, a meta-authentication sub-generation device, an integrity authentication sub-addition device, a complete homing device, and a wireless communication device, in particular, a data hiding process and Integrity protection processing. Conventional Technology: Fig. 24 shows a conventional mobile telephone 5〇〇.
習知之行動電話機5 00具備終端IF (介面)部5 10、無 線通信控制部520及無線通信部530。終端IF部5 10為和行 動電話機500之使用者之間的介面。無線通信控制部“ο可 以整個行動電話機5〇〇的通信控制和通訊協定為基礎,進 行資料轉換和資料處理。無線通信部530則可調變解調資 料,進行無線通信。在以〇SI(Open Systems Interconnection)來定義的7個通信層中,無線通信部53〇 為支援最下層亦即實體層(第一層)的部分。無線通信部 530上設有隱藏處理部540。隱藏處理部540可針對由無線 通#部530所處理之實體層的資料進行加密處理或進行解 碼處理。藉由設置隱藏處理部54 0,可為可能在透過天線 傳送接收時被盜聽的資料加密,所以基於無法解碼的限 制,使得盜聽者無法得到想要的情報。 習知之行動電話機500的隱藏處理部540設置於無線通 信部530的内部。因此,作為隱藏處理部540之隱藏對象的 資料為實體層(第一層)的資料。在實體層中,並不限定The conventional mobile phone 500 includes a terminal IF (interface) unit 5 10, a wireless communication control unit 520, and a wireless communication unit 530. The terminal IF unit 5 10 is an interface with a user of the mobile phone 500. The wireless communication control unit " can perform data conversion and data processing based on the communication control and communication protocol of the entire mobile phone 5". The wireless communication unit 530 can adjust the demodulated data to perform wireless communication. Among the seven communication layers defined by Open Systems Interconnection, the wireless communication unit 53 is a part that supports the lowermost layer, that is, the physical layer (first layer). The wireless communication unit 530 is provided with a hidden processing unit 540. The hidden processing unit 540 Encryption processing or decoding processing may be performed on the data of the physical layer processed by the wireless communication unit 530. By setting the concealment processing unit 54 0, it is possible to encrypt data that may be stolen while transmitting and receiving through the antenna, so based on The restriction that cannot be decoded makes the listener unable to obtain the desired information. The hidden processing unit 540 of the conventional mobile phone 500 is provided inside the wireless communication unit 530. Therefore, the data hidden as the hidden processing unit 540 is the physical layer. (first layer) of information. In the physical layer, not limited
2112-3909-1^^1(1 第4頁 1287767 五、發明說明(2) 該資料是使用者資料還是控制資料◊在藉由 =傳送的資料中,含有制者資料及㈣資^電各話機次 祕:必須根據資料類別進行隱藏處理或根據該種貝 性來保護資料的完整性。如同習知構造,隱 枓的重要 :置於通信層1,由於在通信層!中無法區;資J::5:, 斤以無法根據資料的種類進行隱藏處理及完整性的:護。 此外,習知之隱藏處理在輸入資料時同步 隨、 ^在輸人資料時同步進行資料和隨機數列的互^ = 此外,習知之完整性保護處理會在每份資料上產生完 整性認證子’在每份資料上檢查資料的完整性。 本發明之目的在透過適宜本發明之實施型態來高速進 行隱藏處理及完整性保護處理。 又’本發明之目的在透過適宜本發明之實施型態,在 OSI的7個通信層内、通信層2 (data link iayer,數據通 信層)以上的上位通信層中進行隱藏處理及完整性保護處 理〇 又,本發明之目的在透過適宜本發明之實施型態,使 得隱藏處理和完整性保護處理不會加重中央處理裝置和匯 流排的負荷。 發明概述: 本發明之加密裝置包括加密器,產生隨機數列;隨機 數列記憶部,記憶由上述加密器所產生之隨機數列;及運2112-3909-1^^1(1 Page 4 1287767 V. Description of the invention (2) Whether the information is user data or control data, in the data transmitted by =, contains the manufacturer's information and (4) The second secret of the phone: it must be hidden according to the type of data or the integrity of the data according to the kind of shelling. As with the conventional structure, the importance of concealing: placed in the communication layer 1, due to the inability of the communication layer! J::5:, Jin can't hide the processing and integrity according to the type of data: In addition, the hidden processing of the knowledge is synchronized with the input data, and the data and random series are synchronized when the data is input. ^ = In addition, the conventional integrity protection process will generate an integrity certificate on each piece of data to check the integrity of the data on each piece of data. The object of the present invention is to hide at high speed by means of an embodiment suitable for the present invention. Processing and integrity protection processing. The purpose of the present invention is to provide an upper communication layer in the communication layer 2 (data link iayer) or more in the seven communication layers of the OSI through an embodiment of the present invention. The concealing process and the integrity protection process are performed. Further, the object of the present invention is to make the hidden processing and integrity protection process not burden the central processing unit and the bus bar through the embodiment of the present invention. The encryption device of the invention comprises an encryptor for generating a random number sequence; a random number column memory portion for memorizing the random number sequence generated by the above encryptor;
2112-3909-I^.ptd 第5頁 1287767 發明說明(6) 五 的資料輪出至無鐺“ _ 入從無線通作姑、制部;及無線通信部,其負責輸 料。S Μ :制邛所輸出的資料並在調變之後傳送該資 料被輸入吁ρ彳2 .上述隱藏處理部包括•·加密器,其在資 隨機^列則ϋ ί ί加密資料的隨機*列並輸出⑼產生之 隨機數列;運算部,其用來輸入資料,運算 並^密資:和圮憶於上述隨機數列記憶部之隨機數列, 入次^發明之無線通信裝置包括··終端介面部,其負責輸 之ΐΠί通信控制部,其負責輸入終端介面部所輸人 .7 ”、{根據通訊協定處理資料並輸出;完整性俘罐 根楗其負責從無線通信控制部輸人控制信號和資料: 資料是否受到霞改,然後將處理過的ίΞί 出的資料並在調變之後傳 徵在於·上述完整性保護處理部叶,、特 無線通信控制部集中輸入並暫存 制;二:丄:從 個-貝料使用,制信號產生完整性認證子u ^複數 完整性認證子。 /、中輸出複數個 本發明之無線通信裝置包括:無線通信 收並解調資料;無線通信控制部,其 其負責接 所解調之資料並根據通訊協定處理資料二線通信部 寸丹將其輸出;隱藏2112-3909-I^.ptd Page 5 1287767 Description of the invention (6) The information of the five rounds to the innocent " _ into the wireless communication department, the Ministry of Communications; and the wireless communication department, which is responsible for the delivery. S Μ: The data outputted by the system is transmitted and transmitted after the modulation is input. The above-mentioned hidden processing unit includes an encryptor, which is in a random* column of the encrypted data and outputs (9) a random number sequence generated; an operation unit for inputting data, calculating and controlling the secret number: and a random number sequence of the memory of the random number column, and the wireless communication device of the invention includes a terminal face, which is responsible for The communication control department is responsible for inputting the input of the terminal to the face. 7", {processing data according to the communication protocol and outputting; the integrity of the capture tank is responsible for inputting control signals and data from the wireless communication control unit: Whether it is subject to Xia, and then the processed data is transmitted after the modulation, the above-mentioned integrity protection processing unit leaves, the special wireless communication control unit centralized input and temporary storage system; two: 丄: from - Beaker use, Signal generation integrity authentication sub-u ^ complex integrity authentication sub. /, outputting a plurality of wireless communication devices of the present invention, comprising: wireless communication collection and demodulation data; a wireless communication control unit, which is responsible for receiving the demodulated data and processing the data according to the communication protocol Output
LIIH 2112-3909-PF.ptd $ 9頁 1287767 五、發明說明(7) 其負責從無線通信控制部輸入控制信號和資料, 根據輸入之控制信號針斜所齡> ^ Μ η 藏處理,之資料進行加密資料之隱 终:介面: 資料輪出至無線通信控制部;及 資料,其# β 於貝*入並輸出無線通信控制部處理過的 ί:、ί 2 上述隱藏處理部包括:加密器,盆: 列;隨機數列記憶部,其在貝料加密的隨機數 Ϊ:::機數列;運,,其= = = = 普通文字,隐於上述隨機數列記憶部之隨機數列,並輸出 明之無線通信以具備錢通信部/其負眚接此 解調之資料並根據通訊協定處理= ; = 通=所 料,根據輸入之控制信號進行完= : = 號和資 資料是否受到窥改,然後將處理 抖輸出至無線通信控制部;及级 甘*主貝 輸出無線通信控制部處理過的資料,其;徵在二貝輸入並 整性保護處理部包括:完整性::子;=在=土述完 部所記憶之複數個資料使用控制信號:生資料 子並集中輸出複數個完整性認證子。 〜整性認證 本發明之加密方法的特徵在於:在輸入並义 γ產生隨機數列,將所產生之 I = 2開LIIH 2112-3909-PF.ptd $9 page 1287767 V. Description of invention (7) It is responsible for inputting control signals and data from the wireless communication control unit, according to the input control signal, the age of the needle is > ^ Μ η The data is encrypted at the end of the interface: the interface is rotated out to the wireless communication control unit; and the data is #β in the input and outputted by the wireless communication control unit. ί:, ί 2 The above hidden processing unit includes: encryption , basin: column; random number column memory, its random number encrypted in the material Ϊ::: machine sequence; transport,, its = = = = normal text, hidden in the random number column of the random number memory, and output Mingzhi's wireless communication is equipped with the money communication department / its negative connection to the demodulation data and processed according to the communication protocol = ; = pass = expected, according to the input control signal to complete = : = and the information is sneaked, And then outputting the processing jitter to the wireless communication control unit; and processing the data processed by the wireless communication control unit, and the data is processed in the second input and the integrity protection processing unit includes: integrity:: sub; =The story of the story Recall that a plurality of data use control signals: raw data and collectively output a plurality of integrity authenticators. Authenticity authentication The encryption method of the present invention is characterized in that a random number sequence is generated at the input γ, and the generated I = 2 is opened.
在開始產生隨機數列後,輸入普通文字,運J 2112-3909-PF.ptd 第10頁 1287767 五、發明說明(8) 所輸入之普通文字和事先却愔於 ,尤°己隱於隨機數列記憶部之隨機數 列,並輸出密碼文字。 4 π π 本發明之解碼方法的特徵在於·Α ^ ^ ^ ^ ^ ^ 吁伋在於·在輸入密碼文字前開 ".^ 所產生之隨機數列事先記憶於隨機數 列=憶郤丄在開始產生隨機數列後’輸入密碼文字,運算 ΐ輸ί ί!碼文字和事先記憶於隨機數列記憶部之隨機數 列,並輸出普通文字。 rY>t =之完整性認證子產生方法的特徵在於:輸入χ 資料和Χ個控制信號資料並將之記憶於資料記 粗上述資料記憶部所記憶之X㈣資料和X個控制信 铨:二二產杜生針對Χ個資料的Χ個完整性認證子,然後集中 輸出X個完整性認證子。 圖式簡單說明·· 圖1為移動體通信系統的構造圖。 圖2為無線控制台(RNC)12〇的構造圖。 圓3為實施型態一之無線終端(MS)1〇〇的構造圖。 圖4為實施型態一之隱藏暨完整性保護處理部40的構 造圖。 圖5為實施型態一之隱藏暨完整性保護處理部40的構 造圖。 圖6為實施型態一之隱藏暨完整性保護處理部40的構 造圖。 圖7為實施型態一之隱藏暨完整性保護處理部4 0的構After starting to generate a random number sequence, enter the normal text, J 2112-3909-PF.ptd Page 10 1287767 V. Invention Description (8) The input of the ordinary text and beforehand, but especially hidden in the random number of memory The random number of the part, and output the password text. 4 π π The decoding method of the present invention is characterized by ·· ^ ^ ^ ^ ^ ^ 汲 汲 在 在 在 在 在 在 在 在 在 在 在 在 在 在 在 在 在 在 在 在 在 在 在 在 在 在 在 在 在 随机 随机 随机 随机 随机 随机 随机 随机 随机 随机 随机 随机 随机After the sequence, enter the password text, calculate the ί ί! code text and the random number sequence stored in the memory of the random number column in advance, and output the normal text. rY>t=The integrity authentication sub-generation method is characterized in that: input data and one control signal data are memorized and stored in the data record. The X (four) data and the X control signals memorized by the data storage unit are: 22 Produce Dusheng for the integrity of the data, and then output X integrity certificates. BRIEF DESCRIPTION OF THE DRAWINGS Fig. 1 is a configuration diagram of a mobile communication system. 2 is a configuration diagram of a wireless console (RNC) 12A. Circle 3 is a configuration diagram of a wireless terminal (MS) 1〇〇 of the implementation type 1. Fig. 4 is a view showing the construction of the hidden and integrity protection processing unit 40 of the first embodiment. Fig. 5 is a view showing the construction of the hidden and integrity protection processing unit 40 of the first embodiment. Fig. 6 is a view showing the construction of the hidden and integrity protection processing unit 40 of the first embodiment. FIG. 7 is a configuration of the hidden and integrity protection processing unit 40 of the first embodiment.
2112-3909-ff.ptd 第11頁 1287767 五、發明說明(9) 造圖。 圓8為實施型態一之隱藏暨完整性保護處理部4 〇的構 造圖。 圖9為實施型態二之無線終端(MS)IOO的構造圖。 圖1 0為實施型態二之隱藏暨完整性保護處理部4 〇的構 造圖。 圖11為實施型態二之隱藏暨完整性保護處理部40的構 造圖。 圖12顯示加密方式和解碼方式的範例。 圖13為實施型態二之隱藏暨完整性保護處理部4〇的構 造圖。 · 圖 14 為顯示於 ARIB STD - T63 33. 1 02,3G Security; Security Architecture, Section 6· 3·的圖。 圖 15 為顯示於 ARIB STD - T63 33. 1 02,3G Security;2112-3909-ff.ptd Page 11 1287767 V. Description of invention (9) Drawing. Circle 8 is a configuration diagram of the hidden and integrity protection processing unit 4 of the implementation type 1. FIG. 9 is a structural diagram of a wireless terminal (MS) 100 of the second embodiment. Fig. 10 is a structural diagram of the hidden and integrity protection processing unit 4 of the second embodiment. Fig. 11 is a view showing the construction of the hidden and integrity protection processing unit 40 of the second embodiment. Figure 12 shows an example of an encryption method and a decoding method. Fig. 13 is a view showing the construction of the hidden and integrity protection processing unit 4 of the second embodiment. · Figure 14 is a diagram shown in ARIB STD - T63 33. 1 02, 3G Security; Security Architecture, Section 6·3·. Figure 15 shows the ARIB STD - T63 33. 1 02, 3G Security;
Security Architecture, Figure 16b·的圖 。 圖 16 為顯示於ARIB STD-T63 33. 1 02,3G Security;Security Architecture, Figure 16b·. Figure 16 shows the ARIB STD-T63 33. 1 02, 3G Security;
Security Architecture, Figure 16·的圖。 圖17為使用於加密暨解碼部421中之加密模紐^戎 解碼模組71 )的構造圖。 、° / 圖18顯不隱藏暨完整性保護處理部4〇的安裝形式。 圖1 9顯示以軟體實現隱藏暨完整性保護處理部4 〇的情暑 況0 圖20顯示運作於無線通信控制部20中之應用程式4〇叫 出加密程式47的運作機制。Security Architecture, Figure 16·. Fig. 17 is a view showing the configuration of the encryption module 解码 decoding module 71 used in the encryption and decoding unit 421. , ° / Figure 18 shows the installation form of the cum integrity protection processing unit 4〇. Fig. 19 shows the case where the hidden and integrity protection processing unit 4 is implemented in software. Fig. 20 shows the operation mechanism of the application program 4 operating in the wireless communication control unit 20 to call the encryption program 47.
2112-3909 ptd 第12頁 12877672112-3909 ptd Page 12 1287767
圓21顯示RLC非透明模式時之資料92, 例0 圖22顯 例〇 示以聲音資料作為透明資_ 料95, 93的具體範 96的具體範 圖23顯示以非限定數位資料作為 體範例。 0 透明資料95, 96的具 圖24顯示習知之行動電話機5〇〇。 圓25顯示實施型態三之隱藏處理的加密方式及解碼方 圖2 6顯示實施型態二之完整性保護處理部的完整性 認方式。 圖2 7為實施型態二之無線通信控制部2 〇和隱藏暨完整 性保護處理部40的構造圖。 u ~ 70 圖28為實施型態二之隱藏處理部420的構造圖。 圖29為實施型態三之隱藏處理部420的構造圖。 圖30為實施型態三之隱藏處理部460的構造圖。 圖31為實施型態三之完整性保護處理部43〇的構造 圖。 圖32為實施型態三之完整性保護處理部430的構造 圖。 圖33為實施型態三之加密部422具有複數個緩衝器的 構造圖。 的 圖34為實施型態三之加密部422具有複數個緩衝器 構造圖。The circle 21 displays the data 92 in the RLC non-transparent mode, and the example 0 of Fig. 22 shows the specific example of the specific specification of the sound data as the transparent material 95, 93. Fig. 23 shows an example of the non-limiting digital data. 0 Transparent data 95, 96 Figure 24 shows a conventional mobile phone 5 〇〇. The circle 25 shows the encryption method and the decoding method of the hidden processing of the implementation type 3. Fig. 26 shows the integrity recognition method of the integrity protection processing unit of the implementation type 2. Fig. 27 is a structural diagram of the wireless communication control unit 2 and the hidden and integrity protection processing unit 40 of the second embodiment. u ~ 70 FIG. 28 is a configuration diagram of the hidden processing unit 420 of the second embodiment. FIG. 29 is a configuration diagram of the hidden processing unit 420 of the third embodiment. FIG. 30 is a configuration diagram of the hidden processing unit 460 of the third embodiment. Fig. 31 is a structural diagram of the integrity protection processing unit 43A of the third embodiment. Fig. 32 is a configuration diagram of the integrity protection processing unit 430 of the third embodiment. Fig. 33 is a structural diagram showing the encryption unit 422 of the third embodiment having a plurality of buffers. Fig. 34 is a diagram showing a configuration of a plurality of buffers in the encryption unit 422 of the third embodiment.
2112-3909-PF.ptd 第13頁 1287767 五、發明說明(π) 之加密部422具有複數個緩衝 器的 圖35為實施型態 構造圖。 符號說明: 1 0 0〜無線終端; 1 2 0〜無線控制台; 12 卜BTS IF 部; 1 23〜對MS信號控制部; 120〜無線控制台; ’ 124〜CN IF 部; 126〜對CN信號控制部; 1 3 0〜核心網路; 40〜隱藏暨完整性保 12〜資料格式轉換部4處 14〜聲音編碼暨解碼邱· 1〜照相機; , 34〜天線; 11 0〜無線基地台; 1 3 0〜核心網路; 1 2 2〜移交控制部; 1 2 8〜控制部; 1 2 9〜開關; 125〜RNC IF 部; 12 7〜對RNC信號控制部· 20〜無線通信控制部;’ 部;1 0〜終端IF部; ’ 1 3〜終端IF控制部; 11〜各模組IF部; 2〜錄影機;2112-3909-PF.ptd Page 13 1287767 V. The encryption unit 422 of the invention (π) has a plurality of buffers. FIG. 35 is an embodiment configuration diagram. Symbol Description: 1 0 0~Wireless Terminal; 1 2 0~Wireless Console; 12 Bu BTS IF Department; 1 23~MS Signal Control Department; 120~Wireless Console; '124~CN IF Department; 126~CN Signal control department; 1 3 0 ~ core network; 40 ~ hidden cum integrity protection 12 ~ data format conversion department 4 at 14 ~ sound encoding and decoding Qiu 1 ~ camera;, 34 ~ antenna; 11 0 ~ wireless base station ; 1 3 0~ core network; 1 2 2~ handover control unit; 1 2 8~ control unit; 1 2 9~ switch; 125~RNC IF unit; 12 7~ RNC signal control unit · 20~ wireless communication control Department; 'part; 1 0~ terminal IF part; '1 3~ terminal IF control part; 11~ each module IF part; 2~ video recorder;
332〜下轉換器; 320〜基頻調變解調部 3 2 1〜基頻調變部; 〜通信線路編 315〜錯誤訂正解 31 2〜錯誤訂正編332~down converter; 320~base frequency modulation demodulation unit 3 2 1~base frequency modulation unit; ~communication line editing 315~error correction solution 31 2~error correction
330〜無線部; 331〜上轉換器; 322〜基頻解調部; 31 4〜實體格式轉換部; 3 0〜無線通信部; 包含交錯); 包含反交錯); 第14頁330~wireless unit; 331~upper converter; 322~baseband demodulation section; 31 4~ entity format conversion section; 3 0~wireless communication section; including interleaving); including deinterlace);
1287767 五、發明說明(12) 31 1〜偵錯編碼部; 41 1〜模組; 421〜加密暨解焉部· 性確部; 422〜加密部; 4 3 3〜完整性確認部; 4 6 2〜加密部; 481、482〜資料多重部 4 7 2〜加密部; 4 卜CPU ; 5 5〜記憶體; 43-IT C0NT.; 4 7〜加密程式; 520〜無線通信控制部; 540〜隱藏處理部; 54卜天線。 316〜债錯部; 41 0〜IF部; 40〜隱藏暨完整性保護處理部; 431〜完整性認證子附加暨完整 420〜隱藏處理部; 4 2 3〜解碼部; 430〜完整性保護處理部; 4 3 2〜完整性認證子附加部; 460〜隱藏處理部; 4 6 3〜解碼部; 470〜隱藏處理部; 4 7 3〜解碼部; 45〜RAM ; 42〜ROM ; 4 6〜應用程式; 51 0〜終端I F部; 5 3 0〜無線通信部; 500〜行動電話機; 最佳實施型態之詳細敘述: _ (實施型態一) 圖1為本實施型態之移動體通信系統的整體構造圖。 無線終端(M S ) 1 0 0為本發明之無線通信裝置之一例。 無線終端(MS)100可以是行動電話機。無線終端以1287767 V. Invention Description (12) 31 1~Debugging Coding Unit; 41 1~Module; 421~Encryption and Decryption Department·Sexuality Department; 422~Encryption Department; 4 3 3~Integrity Confirmation Department; 4 6 2 to encryption unit; 481, 482 to data multiple unit 4 7 2 to encryption unit; 4 CPU; 5 5~ memory; 43-IT C0NT.; 4 7~ encryption program; 520~ wireless communication control unit; Hidden processing unit; 54 antenna. 316~debt part; 41 0~IF part; 40~hidden cum integrity protection processing unit; 431~integrity authentication sub-addition complete 420~hidden processing unit; 4 2 3~decoding unit; 430~integrity protection processing 4 3 2~integrity authentication sub-addition; 460~hidden processing unit; 4 6 3~decoding unit; 470~hiding processing unit; 4 7 3~decoding unit; 45~RAM; 42~ROM; 4 6~ Application; 51 0~ terminal IF section; 5 3 0~ wireless communication section; 500~ mobile telephone; Detailed description of the best implementation type: _ (Implementation type 1) Figure 1 is a mobile communication of the embodiment The overall structure of the system. The wireless terminal (M S ) 100 is an example of the wireless communication device of the present invention. The wireless terminal (MS) 100 can be a mobile phone. Wireless terminal
1287767 五、發明說明(13) - 無線的方式和無線基地台(BTS)連接。無線基地台 (BTS)llO和無線控制台(RNC)12〇連接。無線控制台 (RNC)120和其他無線控制台(RNC)12〇連接。此外,無線控 制台(RNC)120連接於核心網路(CN)13〇之上,透過核心網 路(CN)130和其他無線控制台(RNC)12〇相連接。無線基地 台(BTS)llO和無線控制台(RNC)12〇的其中一方或兩方都稱 為無線台。 圖2為和圖1相同之移動體通信系統的構造圖,其特別 顯示了無線控制台(RNC)120的内部構造。 BTS IF部121連接無線基地台(BTS)110。移交控制部 122在無線基地台(BTS)l 10間控制無線終端(MS) 1〇〇移動時 的移交動作。 對MS彳s號控制部1 2 3進行其和無線終端(MS ) 1 〇 〇之間的 無線通信控制及資料的隱藏處理/完整性保護處理。以下 所述之無線終端(MS) 100之隱藏處理及完整性保護處理係 針對對MS信號控制部1 23的隱藏處理及完整性保護處理而 進行。亦即,在無線終端(MS) 1〇〇中被加密的資料會在對 MS仏號控制部1 2 3中被解碼。反之,於對MS信號控制部1 23 加密的資料會在無線終端(MS) 1〇〇中被解碼。此外,為了 在無線終端(MS) 100中保護資料之完整性所附加的認證子 在對MS彳s號控制部1 23中受到债測。反之,為了在對μ信 號控制部1 2 3保護資料之完整性所附加的認證子會在無線 終端(MS)100中受到偵測。在此無線終端(]^)1〇()和對以信 號控制部1 2 3所作的資料隱藏處理和資料完整性保護處理1287767 V. INSTRUCTIONS (13) - Wireless connection to a wireless base station (BTS). The wireless base station (BTS) 110 and the wireless console (RNC) 12 are connected. The Wireless Console (RNC) 120 is connected to other Radio Consoles (RNCs). In addition, a Radio Control Station (RNC) 120 is connected to the Core Network (CN) 13A and is connected to the other Radio Console (RNC) through the Core Network (CN) 130. One or both of the wireless base station (BTS) 110 and the wireless console (RNC) 12 are referred to as wireless stations. Fig. 2 is a configuration diagram of the same mobile communication system as Fig. 1, which particularly shows the internal configuration of the wireless console (RNC) 120. The BTS IF unit 121 is connected to a radio base station (BTS) 110. The handover control unit 122 controls the handover operation when the radio terminal (MS) 1 moves, between the radio base stations (BTS) 10. The MS 彳s number control unit 1 2 3 performs wireless communication control and data hiding processing/integrity protection processing with the wireless terminal (MS) 1 〇 。. The concealment processing and integrity protection processing of the radio terminal (MS) 100 described below is performed for the conceal processing and integrity protection processing of the MS signal control unit 123. That is, the data encrypted in the wireless terminal (MS) 1 is decoded in the MS nickname control unit 123. On the contrary, the data encrypted in the MS signal control unit 1 23 is decoded in the wireless terminal (MS) 1〇〇. Further, the authenticator attached to protect the integrity of the data in the wireless terminal (MS) 100 is subjected to the debt test in the MS ss number control unit 23. On the contrary, the authenticator added to protect the integrity of the data to the μ signal control unit 1 2 3 is detected in the wireless terminal (MS) 100. Here, the wireless terminal ()^)1〇() and the data hiding processing and data integrity protection processing by the signal control unit 1 2 3
2112-3909-PF.ptd 第16頁 1287767 五、發明說明(14) 係於0S I七個通訊層中的第二層亦即通訊層2 (數據通訊 層,date li.nk)中進行。CN IF部124取得和核心網路 (CN)130之間的介面。 RNC IF部125取得和其他無線控制台(rnch 2〇之間的 介面。對CN信號控制部丨26進行和核心網路((^)丨3〇之間的 控制。對RNC信號控制部丨27進行和其他無線控制台 (RNC)120之間的控制。控制部128控制整個無線控制台 (RNC)l 20。開關1 29根據控制部1 28的控制,於無線基地台 (BTS)l 10、無線控制台(rNc)12〇、核心網路(cn)130之間 切換控制信號和封包資料。亦即,開關丨29切換的資料不2112-3909-PF.ptd Page 16 1287767 V. Description of the invention (14) is carried out in the second layer of the seven communication layers of OSI, namely the communication layer 2 (data communication layer, date li.nk). The CN IF unit 124 obtains an interface with the core network (CN) 130. The RNC IF unit 125 acquires an interface with another wireless console (rnch 2〇. Controls the CN signal control unit 和26 and the core network ((^)丨3〇. The RNC signal control unit 丨27 Control is performed with other wireless consoles (RNCs) 120. The control unit 128 controls the entire wireless console (RNC) 120. The switches 1 29 are controlled by the control unit 128 at the radio base station (BTS) 10. The control signal and the packet data are switched between the wireless console (rNc) 12〇 and the core network (cn) 130. That is, the data switched by the switch 丨29 is not
僅只有封包資料,它切換了包含聲音等在内之所有的資 料’亦切換控制信號。 圖3為無線終端(jjs)i〇〇的構造圖。 無線終端(^^)1〇〇具有終端11?部1〇、無線通信控制部 20、無線通信部30和隱藏暨完整性保護處理部4〇。終端u 部 10 和照相機 1、錄影機 2、B/T(Blue T〇〇th)3、lcd、4、 KEY 5 ^LED 6 ^ USIM(Universal Subscriber Identity M〇dule)7 、RECEIVER 8 、MIC M〇HSJ(Head set jack)〇相 ”;:;照相機1到HSJ 0等器材係負責處理和使用者 (人接對象之機器的介面,輸入或輸出使用者 ()或作為連接對象之機器可辨識的資訊。 終端IF部於其内部具有各模組”部丨丨、資 部12、終端IF控制部13和聲音編碼暨解碼部"。各以組π 部η取得和照相機1到,〇等器材之間的各個介面。、資料Only the packet data, it switches all the information including the sound, etc.' also switches the control signal. 3 is a structural diagram of a wireless terminal (jjs). The wireless terminal (?) 1 has a terminal 11, a wireless communication control unit 20, a wireless communication unit 30, and a hidden and integrity protection processing unit. Terminal u 10 and camera 1, video recorder 2, B/T (Blue T〇〇th) 3, lcd, 4, KEY 5 ^ LED 6 ^ USIM (Universal Subscriber Identity M〇dule) 7, RECEIVER 8, MIC M 〇HSJ (Head set jack)〇;:; Camera 1 to HSJ 0 and other equipment are responsible for processing and user (the interface of the machine to which the object is connected, the input or output user () or the machine to be connected is identifiable The terminal IF unit has a module "portion", a department 12, a terminal IF control unit 13, and a voice encoding and decoding unit in the internal IF unit. Each of the groups π is obtained by taking the camera π, 〇, etc. Various interfaces between equipment.
1287767 五、發明說明(15) 格式轉換部12在照相機1到HSJ 〇等器材所處理的各種資料 格式和無線終端(MS)IOO内部所處理的各種資料格式之間 進行轉換。終端IF控制部1 3控制終端I f部1 〇的運作。聲音 編碼暨解碼部14對從MIC 9輸入的聲音電子信號作聲音的 編碼。此外,聲音編碼暨解碼部1 4將編碼過的聲音信號解 碼’對RECEIVER 8輸出聲音電子信號。 無線通信控制部20進行無線終端(MS)1〇〇的整體押 制。無線通信控制部20上具備了CPU、R〇M、RAM、固^等 =組成的硬體電路或軟體模組。無線通信控制部在終端 1 = 1〇考口無線通信部3〇之間處理資#,根據規⑮或通訊協 規則進行資料的轉換處冑,特別是進行通訊層2 以上的處理,例如進行資料的封包化 理:根據資料的類別判斷出該資料為應 作隱;^處理的資料摄县虛好· 1 ^ t ^ t ^ ^ 11 ^ S ^ .4 « 資料為應該作隱藏處理的資料# / 無法判斷出該 的資料。 ^理的資㈣是應該作完整性保護處理 無線通仏部30具備通信線路編碼1287767 V. Description of the Invention (15) The format conversion unit 12 converts between various data formats processed by the cameras 1 to HSJ and the like and various data formats processed inside the wireless terminal (MS) 100. The terminal IF control unit 13 controls the operation of the terminal I f unit 1 . The sound encoding and decoding unit 14 encodes the sound electronic signal input from the MIC 9 as a sound. Further, the audio coding and decoding unit 14 decodes the encoded audio signal and outputs a sound electronic signal to the RECEIVER 8. The wireless communication control unit 20 performs overall charging of the wireless terminal (MS) 1〇〇. The wireless communication control unit 20 is provided with a hardware circuit or a software module including a CPU, R〇M, RAM, and the like. The wireless communication control unit processes the resource # between the terminal 1 = 1 and the test port wireless communication unit 3, and performs data conversion according to the regulation 15 or the communication protocol, in particular, processing of the communication layer 2 or higher, for example, data processing. The rationalization of the packet: according to the type of the data, the data is judged to be hidden; ^ The data processed by the county is good. 1 ^ t ^ t ^ ^ 11 ^ S ^ .4 « The data is the data that should be hidden. # / Unable to determine the information. (4) should be used for integrity protection processing. The wireless communication unit 30 is provided with communication line coding.
::;2ν//Λ33: ; I :;;;r r2 r:. r" ^7 ^ - 外,部又包括Λ碼體 2112-3909-PF.ptd 第18頁 1287767 五、發明說明(16) ' 及解調。基頻調變解調部320具有基頻調變部321和基頻解 調部322。無線部330將基頻波段的信號轉換成傳送&段或 將傳送波段的信號轉換成基頻波段。無線部33〇具有上轉/ 換器331和下轉換器332。 ' 隱藏暨完整性保護處理部4 0連接於無線通信控制部2 〇 上隱藏暨元整性保護處理部4 0從無線通信控制部2 〇接收 資料,進行隱藏處理。此外,進行資料的完整性保護處 理。隱藏暨完整性保護處理部4 〇從無線通信控制部2 〇輸入 用來作隱藏及完整性保護處理的控制信號9丨。此外,隱藏 暨完整性保護處理部4〇從無線通信控制部2〇輸入通訊層2 =上之任意通訊層中作為隱藏處理對象的資料及/或作曰為 元整性保護處理對象的資料92。隱藏暨完整性保護處理部 巧1據所輸入之控制信號91對資料92進行隱藏處理及/或 =^性保護處理,將資料輸出於無線通信控制部2〇。控制 ^號91中含有金鑰、初值、隱藏處理、完整性保護處理 等可選擇的參數。 圖^為隱藏暨完整性保護處理部4 〇的構造圖。 4 隱藏暨完整性保護處理部4〇具有IF部41〇和一個模組 +模組411藉由同一電路或同一運算法進行隱藏處理和 ^ ’生保護處理。至於要進行隱藏處理還是進行完整性 濩處理,由控制信號91來決定。 卞 所押,此,所謂隱藏處理,係指加密或解碼資料。此外, 對ί ^整性保護處理’係指為了福測資料是否受到竄改而 /附加認證子的處理或藉由複製並比較認證子來判定 2112-3909-PF.ptd 第19頁 1287767 五、發明說明(17) 資料是否受到竄改。 由於隱藏處理和完整性保護處理可使用同一電路、同 一運算法或類似電路、類似運算法來進行,如圖4所示, 可藉由一個模組41 1來進行隱藏處理和完整性保護處理。 在圖4所不之情況下,可減少硬體資源及軟體資源的消 耗。以下所謂的模組可以是僅以硬體實現的模組、僅以軟 體實現的模組或結合硬體與軟體來實現的模組中之其中一 ^ ° 、、 , 在此’說明有關應用於行動電話機之隱藏處理和完整 性保護處理的具體範例。 圖 14 為顯示於 arib STD — T63 33· 1〇2, % Security;::;2ν//Λ33: ; I :;;;r r2 r:. r" ^7 ^ - Outside, part including weight body 2112-3909-PF.ptd Page 18 1287767 V. Invention description (16 ) ' and demodulation. The fundamental frequency modulation and demodulation unit 320 has a fundamental frequency modulation unit 321 and a fundamental frequency demodulation unit 322. The radio section 330 converts the signal of the fundamental band into a transmission & or converts the signal of the transmission band into a fundamental band. The wireless unit 33A has an up/down converter 331 and a down converter 332. The concealment and integrity protection processing unit 40 is connected to the radio communication control unit 2, and the concealment and integrity protection processing unit 40 receives the data from the radio communication control unit 2, and performs concealment processing. In addition, data integrity protection is performed. The hidden and integrity protection processing unit 4 inputs a control signal 9 for the concealment and integrity protection processing from the wireless communication control unit 2. Further, the hidden and integrity protection processing unit 4 inputs, from the wireless communication control unit 2, the data to be hidden processing in any of the communication layers on the communication layer 2 = and/or the data 92 as the object of the meta-protection processing. . The hidden and integrity protection processing unit 1 conceals the data 92 and/or the protection processing according to the input control signal 91, and outputs the data to the wireless communication control unit 2〇. Control ^91 contains optional parameters such as key, initial value, hidden processing, and integrity protection processing. FIG. 2 is a structural diagram of the hidden and integrity protection processing unit 4 。. The hidden and integrity protection processing unit 4 has an IF unit 41 and a module + module 411 for performing conceal processing and ^'s protection processing by the same circuit or the same algorithm. Whether the hidden processing or the integrity processing is performed is determined by the control signal 91.卞 Behind, this, the so-called hidden processing, refers to encrypting or decoding data. In addition, the treatment of ί ^ integrity protection refers to the processing of the falsification of the data or the addition of the Authenticator or by copying and comparing the Authenticator 2112-3909-PF.ptd Page 19 1287767 V. Invention Description (17) Whether the information has been tampered with. Since the hidden processing and the integrity protection processing can be performed using the same circuit, the same operation or the like, and the like, as shown in Fig. 4, the hidden processing and the integrity protection processing can be performed by one module 41 1 . In the case of Figure 4, the consumption of hardware resources and software resources can be reduced. The following modules may be implemented by a hardware-only module, a software-only module, or a combination of a hardware and a software. Specific examples of hidden processing and integrity protection processing for mobile phones. Figure 14 is shown in arib STD — T63 33· 1〇2, % Security;
Security Architecture, Section 6· 3·的圖。 圖 15 為顯示於 ARIB STD-T63 33. 1 02,3G Security; Security Architecture, Figure 16b.的圖。 圖 16 為顯示於ARIB STD-T63 33. 1 02,3G Security; Security Architecture, Figure 16·的圖。 圖14顯示在無線電路上的加密方法。在圖丨4中,符號 的意義如下: CK: cipher key (加密金鑰)。 F8 IK F9 資料隱藏用函數。 integrity key (訊息認證金鑰)。 資料完整性用函數。 行動電話業者使用fl〜f5這些函數來實行認證處理。 在此處理中所產生之稱為CK和IK的加密金鑰為128位元,Security Architecture, Section 6·3·. Figure 15 is a diagram shown in ARIB STD-T63 33. 1 02, 3G Security; Security Architecture, Figure 16b. Figure 16 is a diagram shown in ARIB STD-T63 33. 1 02, 3G Security; Security Architecture, Figure 16·. Figure 14 shows the encryption method on the radio. In Figure 4, the meaning of the symbol is as follows: CK: cipher key. F8 IK F9 data hiding function. Integrity key (message authentication key). Data integrity function. Mobile phone operators use the functions fl~f5 to perform authentication processing. The encryption key called CK and IK generated in this process is 128 bits.
第20頁 I麵 2112-3909-PF.ptd 1287767Page 20 I face 2112-3909-PF.ptd 1287767
其被傳給資料隱藏用函數在欢姓 ΒΙΐς® - + k a U )和貝枓完整性用函數(f9)。 圖15顯不在無線電路上的加密 的意義如下: Θ加答方法。在圖15中,符號 f8:資料隱藏用函數。 CK: cipher key (加密金錄)。 MESSAGE:使用者、資料及信號資訊等傳送者欲傳 給接收者的加密前文字。It is passed to the data hiding function using the function 欢® - + k a U ) and the Bellow integrity function (f9). Figure 15 shows the meaning of encryption on the radio as follows: ΘPlus method. In Fig. 15, the symbol f8: a data hiding function. CK: cipher key. MESSAGE: The pre-encrypted text that the sender, user, data, and signal information wants to pass to the recipient.
COUNT-C:顯示總收發次數的數值資料。每收發一 士 便加1。 A BEARER:用來識別邏輯頻道的位元。 DIRECTION··用來區別加密文字之傳送方向的位元。 LENGTH: MESSAGE或加密文字的位元長度。 如圖15所示,根據以資料隱藏用函數f8所作成之隨機 數列進行資料的加密和解碼。 % 圖1 6顯示訊息認證子產生方法。在圖1 6中,符號的主 義如下: U μ f 9 :資料完整性用函數。 IK: integrity key (訊息認證金輪)。 C0UNT-I :顯示總收發次數的數值資料。每收發一次 便加1。 MESSAGE ··使用者、資料及信號資訊等傳送者欲傳送 給接收者的加密前文字° DIRECTION··用來區別加密文字之傳送方向的位元。 FRESH:使用者每次所產生的隨機數。COUNT-C: Displays the value of the total number of times of sending and receiving. Add 1 for every one sent and received. A BEARER: The bit used to identify the logical channel. DIRECTION··The bit used to distinguish the direction in which the encrypted text is transmitted. LENGTH: The bit length of MESSAGE or encrypted text. As shown in Fig. 15, the data is encrypted and decoded based on the random number sequence created by the data hiding function f8. % Figure 16 shows the message authentication sub-generation method. In Figure 16. The meaning of the symbol is as follows: U μ f 9 : Function for data integrity. IK: integrity key (message certification gold wheel). C0UNT-I : Displays the numerical data of the total number of times of transmission and reception. Add 1 for each send and receive. MESSAGE · User, data and signal information, etc. The pre-encrypted text to be transmitted to the recipient. DIRECTION······················· FRESH: The random number generated by the user each time.
1287767 五、發明說明(19) MAC-I: message authentication code for integrity (傳送者所計算之訊息認證子)。 XMAC-I: expected message authentication code for integrity (接收者所計算之訊息認證子)。 如圖1 6所示’藉由在接收者這一方比較兩個訊息認證 子,可確認資料的完整性。 接著說明該運作。 若要在無線網路内進行終端和網路之間的加密通信, 需要所謂認證(authentication)的處理,亦即,在交換資1287767 V. INSTRUCTIONS (19) MAC-I: message authentication code for integrity (message authentication message calculated by the transmitter). XMAC-I: expected message authentication code for integrity (receiver's calculated message authentication sub). As shown in Figure 16. The integrity of the data can be confirmed by comparing the two message authenticators on the receiver side. Next, the operation will be explained. In order to perform encrypted communication between the terminal and the network in the wireless network, a so-called authentication process is required, that is, in exchange
料前兩者之間其中一方確認對方的正當性或雙方確認對方 作為通信對象的正當性。 如圖14所示,藉由一連串的認證處理,終端和網路雙 方白使用稱為函數fl〜f5的五個函數。該函數在進行切證 的同時於終端和網路兩方產生各種128位元: = (decipher key)和訊息認證金鑰(IK=integrity key)。 這兩把金錄可維持相互認證之終端和網路為同一物, 使用於後述之f8和f9兩個函數中。這兩把金鑰次 不-樣’且在其之間沒有規則性。心,在通信完“被One of the two parties confirms the legitimacy of the other party or both parties confirm the legitimacy of the other party as the communication partner. As shown in Fig. 14, by a series of authentication processes, the terminal and the network use five functions called functions fl~f5. This function generates various 128-bit elements on both the terminal and the network while performing the proof: = (decipher key) and message authentication key (IK=integrity key). These two gold records can maintain the mutual authentication of the terminal and the network as the same thing, and are used in the two functions f8 and f9 described later. These two keys are not in the same way and there is no regularity between them. Heart, after communication is "being
此外,雖在此涊證中所需要處理的機制(通訊協定) 被標準化,使用於認證處理之fl〜f5等函數未事 化,變成需要操作者自己來決定。 π# + 在認證處理結束後,藉由用來作阵歲步 个F丨愚减處理之資料隱藏 (data confidentiality)技術和用來作穿軟 “ β凡整性保護處理之In addition, although the mechanism (communication protocol) to be handled in this certificate is standardized, functions such as fl~f5 used for authentication processing are not processed, and it is necessary for the operator to decide. π# + After the end of the authentication process, the data confidentiality technique used to make the F丨 丨 减 丨 丨 丨 β β β β β
2112-3909-PF.ptd 1287767 五、發明說明(20) 資料完整性(data integrity)技術,得以保護資料的安 〇 第一個資料隱藏技術為可在無線網路上加密包含聲音 之使用者資料或信號資訊並防止竊聽的技術。為了實現二 種資料隱藏處理,使用一種稱為資料隱藏用函數(以不稱 f 8 )的函數。 在隱藏或交換圖1 5所示之資料的情況下,傳送者使用 於認證之際所產生的加密金鑰(CK)。再者,在丨8中,除了 ck以外,藉由輸入加密/解碼資料的位元長度、 上/下連結(DIRECTION)、計數器(C0UNT 一 c)、邏 別子(BEARER)來產生隨機數列。 頭道識 在此的上 傳送至基地台 計數器係指顯 一次會加上一 送之加密文字 指用來識別進 取得所產 互斥邏輯和, CK以外之 但,只有CK在 東西,所以不 就算CK以 於無法產生用2112-3909-PF.ptd 1287767 V. Invention Description (20) Data integrity technology to protect data security The first data hiding technology is to encrypt user data containing sounds on a wireless network or Signal information and techniques to prevent eavesdropping. In order to implement the two data hiding processes, a function called a data hiding function (not called f 8 ) is used. In the case of hiding or exchanging the data shown in Fig. 15, the sender uses the encryption key (CK) generated at the time of authentication. Furthermore, in 丨8, in addition to ck, a random number sequence is generated by inputting the bit length of the encrypted/decoded data, the DIRECTION, the counter (C0UNT-c), and the logic (BEARER). The header is transmitted to the base station counter. It means that the encrypted text is added once and used to identify the mutually exclusive logic and the CK is used. However, only CK is in the file, so it is not even CK is not able to produce
/卜逅結 … ·Λ 一…w八卞攸終端;^ 和P或從基地台被傳送至終端的位元。外 示總收發次數的資料。在計數器上, 特定的值。計數器係用來防禦後來送:: 。此外,所謂邏輯頻道的識別ΐ, 灯加欲之邏輯頻道的位元。 生之隨機數列和加密後之資 產生加密文字,傳送號資訊纟 參數不經過加密而從傳送者/ 卜逅结 ... ·Λ a...w gossip terminal; ^ and P or bits transmitted from the base station to the terminal. Display the total number of times of sending and receiving. On the counter, a specific value. The counter is used to defend against later delivery:: . In addition, the so-called logical channel identification, the light plus the bit of the logical channel. The random number sequence and the encrypted resource generate the encrypted text, the transmission number information 纟 the parameter is not encrypted and the sender
認證處理的過程中產生和接收去接收者 需要傳送。 吹者一側相同 外之參數傳遞給第三者,告 來解讀加密文字的隨機數;,二:密時, J 所U可保護The process of authentication processing is generated and received, and the receiver needs to transmit. The parameters of the same side of the blower are passed to the third party, and the random number of the encrypted text is interpreted. Second, the secret time is J.
第23頁 1287767Page 23 1287767
有sfL息的安全性。 在接收者一側, 來產生隨機數列,提 和,解碼原來的訊息 使用傳送過來的參數和事先擁有的CK 取傳送過來之加密文字和互斥邏輯 此為OFB(〇utput feedback)模式的變形,亦即定義於 ISO/IEC1 0116之區塊密碼的使用模式的一種。即使在加密 文字中混入傳送線路上所產生之干擾信號,〇FB模式也不 會在解碼時將這些干擾信號擴大,所以多被採用於盎 音通信的場合中。 _ ” +Have the security of sfL interest. On the receiver side, a random sequence is generated, summed, and the original message is decoded using the transmitted parameters and the previously held CK to transfer the encrypted text and the exclusive logic, which is a variant of the OFB (〇utput feedback) mode. That is, one of the usage patterns of block ciphers defined in ISO/IEC 1 0116. Even if the interfering signals generated on the transmission line are mixed in the encrypted characters, the 〇FB mode does not expand these interference signals at the time of decoding, so it is often used in the case of audible communication. _ ” +
第一個負料完整性技術係藉由在無線電路上之信號資 訊上附加資訊認證子(完整性認證子)來偵測信號資訊有 無受到竄改的技術。亦稱為訊息認證技術。為了實現該資 料的7G整性,使用資料完整性用函數(以下稱U )。在此 f 9的核心部分中,亦使用了和F 8相同之密碼驗算法。 首先,在認證之際使用訊息認證金鑰產生函數f4以產 生訊息認證金鑰(IK),傳至f9。如圖16所示,在f9中,除 了訊息認證金鑰之外,在輸入資料(MESSAGE)、上/下連結 (DIRECTION)、計數器(COlJNT 一 C)、使用者每次產生之隨機 數(FRESH)時,還產生了訊息認證子(MAC-I *XMAC—丨)。The first negative material integrity technique detects the presence or absence of tampering with signal information by attaching a message authenticator (integrity authenticator) to the signal on the radio. Also known as message authentication technology. In order to achieve 7G uniformity of the data, a data integrity function (hereinafter referred to as U) is used. In the core part of f 9 , the same cryptographic algorithm as F 8 is also used. First, the message authentication key generation function f4 is used at the time of authentication to generate a message authentication key (IK), which is transmitted to f9. As shown in FIG. 16, in f9, in addition to the message authentication key, the input data (MESSAGE), the up/down link (DIRECTION), the counter (COlJNT-C), and the random number generated by the user each time (FRESH) At the same time, a message authentication sub-agent (MAC-I * XMAC - 丨) is also generated.
這些參數亦被載入未被加密之資料格式區域,從傳送 者傳送至接收者。就算這些參數傳遞給第三者,當訊息認 證金鑰為機密時,安全性的保護情況和隱藏資料時相同。 傳送者在資料上附加此訊息認證子(MAC—丨),將之傳 送給接收者。同樣地,接收者使用f 9來計算訊息認證子These parameters are also loaded into the unencrypted data format area and transmitted from the sender to the recipient. Even if these parameters are passed to a third party, when the message authentication key is confidential, the security protection is the same as when hiding the data. The sender attaches this message authenticator (MAC_丨) to the data and transmits it to the recipient. Similarly, the receiver uses f 9 to calculate the message authenticator.
12877671287767
當它們相同時,可確認When they are the same, you can confirm
(XMAC - I)。比較MAC-I 和 xmac 〜I 未受到竄改。 此外,有關偵測出竄改的情況,下列為一處理範例·· ο)向對方要求重新傳送資訊,確認再次接收之訊息 認證子是否為正確。 (2 )右連續好幾回偵測出有竄改發生,採取切斷連線 等因應手段。 根據3 G p p規格(有關細節請參照 http://www· 3gpp. 〇rg/About —3GPP/3gpp· htm ),加密暨 解碼模組如圖15所示,其具有的功能為加密所輪入之普通 文字(欲加密之文字)為加密文字(加密後之文字)並將 其輸出以及將加密文字解碼為普通文字並將其輸出。根據 3Gpp 規格’上述COUNT/BEARER/DIRECTION/CK/LENGTH 正好 符合圖3中控制信號91的具體範例。 此外,作為圖3之資料92,93的具體範例,如圖21所 示’可為「MACSDU」或「RLCPDU(datapart)」。在此,所 謂「RLCPDU(datapart)」,是指刪除RLCPDU之上位10ct或 20ct ( 1位元組或2位元組)之後的部分(圖21中「DATA FOR CIPHERING」的部分)。「MACSDU」或 「RLCPDU (da tap art)」為圖15 中MESS AGE 的一例。此外, MACSDU 為Media Access Control Service Data Unit 〇 RLCPDU 為Radio Link Control Protocol Data Unit 。訊 息流中的各訊息從RLCPDU刪除RLC Header之後,安裝於通 訊層3。(XMAC - I). Comparing MAC-I and xmac ~I has not been tampered with. In addition, regarding the detection of tampering, the following is a processing example. ο) Asking the other party to retransmit the information and confirm the message received again. The authenticator is correct. (2) The right side has been detected several times in succession, and the tampering has been detected. According to the 3 G pp specification (refer to http://www.3gpp. 〇rg/About — 3GPP/3gpp· htm for details), the encryption and decoding module is shown in Figure 15, which has the function of encryption. The plain text (the text to be encrypted) is the encrypted text (encrypted text) and outputs it and decodes the encrypted text into plain text and outputs it. According to the 3Gpp specification, the above COUNT/BEARER/DIRECTION/CK/LENGTH exactly corresponds to the specific example of the control signal 91 in FIG. Further, as a specific example of the data 92, 93 of Fig. 3, as shown in Fig. 21, "may be "MACSDU" or "RLCPDU (datapart)". Here, the term "RLCPDU (datapart)" refers to a portion after deleting the upper 10ct or 20ct (1 byte or 2 bytes) of the RLCPDU (the portion of "DATA FOR CIPHERING" in Fig. 21). "MACSDU" or "RLCPDU (da tap art)" is an example of MESS AGE in Figure 15. In addition, the MACSDU is a Media Access Control Service Data Unit 〇 RLCPDU is a Radio Link Control Protocol Data Unit. Each message in the message stream is deleted from the RLC header and then installed in the communication layer 3.
2112-3909-PF.ptd 第25頁 1287767 五、發明說明(23)" ' 一 一 在RLCPDU中存在有^以或“以的隱藏對象外部分,但 整個RLCPDU被輸入至隱藏暨完整性保護處理部4〇 ,在隱藏 暨完整性保護處理部40不進行10ct或2〇(^隱藏處理❶其理 由為,從進行隱藏處理的整個資料單位(RLCpDU)消除1〇ct 或20ct的隱藏對象外部分,於是藉由在無線通信控制部2〇 中執行10ct或20ct的平移處理來降低發生於無線通信控制 部20的負荷。 圖5顯示隱藏暨完整性保護處理部4 〇的其他範例。2112-3909-PF.ptd Page 25 1287767 V. Invention Description (23) " 'One-to-one in the RLC PDU exists with or outside the hidden object, but the entire RLCPDU is input to the hidden cum integrity protection The processing unit 4 does not perform 10 ct or 2 〇 in the hidden cum integrity protection processing unit 40 (the hidden processing is performed, except that the entire data unit (RLCpDU) that performs the concealing processing is eliminated from the hidden object of 1 〇 ct or 20 ct. In part, the load occurring in the wireless communication control unit 20 is reduced by performing a shift processing of 10 ct or 20 ct in the wireless communication control unit 2A. Fig. 5 shows another example of the hidden cum integrity protection processing unit 〇.
圓5的特徵為’隱藏處理部42〇和完整性保護處理部 430為分開的裝置。在隱藏處理部42〇内部設有加密暨解碼 部4 21。完整性保護處理部4 3 〇内部則設有完整性認證子附 加暨完整性確認部431。加密暨解碼部421顯示使用同一個 模組作加密和解碼的情況。完整性認證子附加暨完整性確 認部4 3 1顯示使用同一個模組附加完整性認證子和確認完 整性的情況。在圖5所示的情況下,此係加密和解碼使用 同一個函數以及完整性認證子和完整確認處理使用同一個 函數的構造。相較於圖6所示之情況,在圖5所示的情況 下’可減少硬體資源和軟體資源的消耗。 圖6顯示隱藏暨完整性保護處理部4〇的其他構造。The feature of the circle 5 is that the 'hidden processing unit 42' and the integrity protection processing unit 430 are separate devices. An encryption/decoding unit 421 is provided inside the concealment processing unit 42. The integrity protection processing unit 4 3 is provided with an integrity authentication sub-addition and integrity verification unit 431. The encryption and decoding unit 421 displays the case where the same module is used for encryption and decoding. The integrity authentication sub-addition and integrity verification unit 4 3 1 shows the case where the same module is used to attach the integrity authenticator and confirm the integrity. In the case shown in Figure 5, this encryption and decoding uses the same function and the integrity of the authenticator and the complete validation process using the same function construct. Compared with the case shown in Fig. 6, in the case shown in Fig. 5, the consumption of hardware resources and software resources can be reduced. Fig. 6 shows another configuration of the hidden cum integrity protection processing unit.
圖6的特徵為,在隱藏處理部42 〇中分別設置加密部 4 2 2和解碼部4 2 3。此外,在完整性保護處理部4 3 0中分別 設置完整性認證子附加部432和完整性確認部433。在圖6 所示之情況下,此係加密和解碼使用同一或不同函數以及 完整性認證子和完整確認處理使用同一或不同函數的構Fig. 6 is characterized in that an encryption unit 42 2 and a decoding unit 4 2 3 are provided in the concealment processing unit 42 分别. Further, the integrity authentication sub-addition unit 432 and the integrity confirming unit 433 are provided in the integrity protection processing unit 430, respectively. In the case shown in Figure 6, this system uses the same or different functions and the integrity authentication sub- and complete acknowledgment processing using the same or different functions.
2112-3909-PF.ptd 第26頁 12877672112-3909-PF.ptd Page 26 1287767
造。在圖6的情況下’可分別執行加密、解碼、完整性试 證子附加和完整性確認’可同時並行對收發的資料作隱^藏 處理或元整性保瘦處理’所以可使處理高速化。 圖7顯示在隱藏處理部420中設置複數個加密部422和 複數個解碼部423的情況《此外,也顯示完整性保護處理 部430中設有複數個完整性認證子附加部432和複數*個完整 性確認部433的情況《當無線終端(ms)1〇〇運作時,也有需 要同時處理複數個頻道的情況。例如,在同時傳送聲音和 傳真兩種資料的情況下,至少需要同時處理兩個頻道:資 料。在此種情況下,可在加密部1加密聲音資料,在加密 部2加密傳真資料。此外,解碼的情況亦同,可同時解碼| 複數個頻道的資料》加密部422、解碼部423、完整性認證 子附加部432、完整性確認部433的個數(在圖7中為 不需要全都一樣,可在無線終端(MS)1〇〇中根據需同時處 理的頻道數來決定各部位的個數。或者,可不根據頻道的 個數,而是在某一頻道有大量資料需高速處理的情況下使 用兩個加密部來處理分配於該單一頻道之大量資料。換言 之,加密部422、解碼部423、完整性認證子附加部432、/ 完整性確認部433各部位的個數可根據需同時處理 數及/或資料量來決定。 此外,加密部422的最大個數和解碼部423的最大個數_ 亦可不同。 此外,完整性認證子附加部432的最大個數和完整性 確認部4 3 3的最大個數亦可不同。Made. In the case of FIG. 6, 'encryption, decoding, integrity test sub-addition, and integrity check can be performed separately, and the data to be transmitted and received can be simultaneously subjected to hidden processing or meta-consistency thinning processing. Chemical. FIG. 7 shows a case where a plurality of encryption sections 422 and a plurality of decoding sections 423 are provided in the concealment processing section 420. Further, the integrity protection processing section 430 is also provided with a plurality of integrity authentication sub-addition sections 432 and a plurality of * In the case of the integrity check unit 433, "When the wireless terminal (ms) operates, there is a case where it is necessary to simultaneously process a plurality of channels. For example, in the case of simultaneous transmission of both voice and fax data, at least two channels need to be processed simultaneously: information. In this case, the audio material can be encrypted in the encryption unit 1, and the fax data can be encrypted in the encryption unit 2. Further, in the case of decoding, the number of the data of the plurality of channels, the encryption unit 422, the decoding unit 423, the integrity authentication sub-addition unit 432, and the integrity confirmation unit 433 can be simultaneously decoded (in FIG. All in the same way, the number of each part can be determined in the wireless terminal (MS) 1〇〇 according to the number of channels to be processed simultaneously. Alternatively, instead of the number of channels, there is a large amount of data on a certain channel to be processed at a high speed. In the case of using a plurality of encryption units to process a large amount of data allocated to the single channel. In other words, the number of parts of the encryption unit 422, the decoding unit 423, the integrity authentication sub-addition unit 432, and the integrity verification unit 433 may be based on Further, it is necessary to simultaneously process the number and/or the amount of data. Further, the maximum number of the encryption unit 422 and the maximum number of the decoding unit 423 may be different. Further, the maximum number and integrity of the integrity authentication sub-addition unit 432. The maximum number of the confirmation units 4 3 3 may be different.
1287767 五、發明說明(25) 圏8顯示於隱藏處理部4 20設有複數個加密暨解碼部 421的情況。此外,亦顯示完整性處理部430上設有複數個 完整性認證子附加暨完整性確認部4 31的情況。 圓8係將圖5所示之加密暨解碼部421和完整性認證子 附加暨完整性確認部431複數化的情況。圖8顯示在加密和 解碼為同一函數的情況下,針對複數個頻道設置複數個加 密暨解碼部4 21。同樣,亦顯示在完整性認證子附加和完 整性確認為同一函數的情況下,針對複數個頻道設置複數 個完整性認證子附加暨完整性確認部431。相較於圓7的情 況,圖8的情況可降低對硬體資源和軟體資源的消耗。1287767 V. Description of the Invention (25) The 圏8 is shown in the case where the plurality of encryption/decoding units 421 are provided in the concealment processing unit 420. Further, it is also shown that the integrity processing unit 430 is provided with a plurality of integrity authentication sub-addition and integrity checking units 41. The circle 8 is a case where the encryption/decoding unit 421 and the integrity authentication sub-addition and integrity verification unit 431 shown in Fig. 5 are pluralized. Fig. 8 shows a case where a plurality of encryption and decoding sections 421 are provided for a plurality of channels in the case where the encryption and decoding are the same function. Similarly, in the case where the integrity authentication sub-attachment and integrity confirmation are the same function, a plurality of integrity authentication sub-addition and integrity verification sections 431 are set for a plurality of channels. Compared with the case of the circle 7, the case of Fig. 8 can reduce the consumption of hardware resources and software resources.
圖4到圖8顯示隱藏暨完整性保護處理部4 〇同時具備隱 藏處理部420和完整性保護處理部430的情況,但隱藏暨完 整性保護處理部40亦可只具備隱藏處理部42〇和完整性保 護處理部430中的其中一個。當隱藏暨完整性保護處理部 4〇只具備隱藏處理部420和完整性保護處理部43〇中的|中 :個時’另-個裝置所負責的處理可由無:通信 進行。 (實施型態二) 圖9為顯示無線終端(MS)1〇〇之其他範例的構造 圖9和圖3的相異點為,於終端11?部1〇和隱藏暨— 二?處理部40之間進行資料的輸入輸出;,:; 和隱藏暨完整性保護處理部4 $出。在圖9中,非透明資料97為 進订貝科的輸入 料。此外,透明資,96為聲音f料、4非= 定非數^資資料4 to 8 show the case where the hidden and integrity protection processing unit 4 has both the hidden processing unit 420 and the integrity protection processing unit 430, but the hidden and integrity protection processing unit 40 may only have the hidden processing unit 42 and One of the integrity protection processing sections 430. When the hidden and integrity protection processing unit 4 has only one of the hidden processing unit 420 and the integrity protection processing unit 43, the processing for the other device can be performed by no: communication. (Embodiment 2) FIG. 9 is a diagram showing the construction of another example of the wireless terminal (MS). The difference between FIG. 9 and FIG. 3 is that the terminal 11 is hidden and the cum is hidden. The processing unit 40 performs input/output of data; ,:; and the hidden cum integrity protection processing unit 4 is output. In Fig. 9, the non-transparent material 97 is an input for ordering Becco. In addition, transparent capital, 96 is the sound f material, 4 non = fixed non-quantity information
2112.3909-ff.ptd 第28頁 1287767 五、發明說明(26) 1 j明資料。所謂透明資料’係、於州収義之某通訊 *變的資料。另一方面,所謂二 =程 或某通訊層之子® φ你銓人$丨丨认, 叶係於某通訊層 理如到輸出的過程中需要作某歧處 =格式轉換處理等的資料。例如,在通訊層2的-處2112.3909-ff.ptd Page 28 1287767 V. Description of invention (26) 1 j Ming information. The so-called "transparent information" is a communication in the state of the United States. On the other hand, the so-called two = Cheng or a communication layer of the child ® φ you 铨 丨丨 , , , 叶 叶 叶 叶 叶 叶 叶 叶 叶 某 某 某 某 某 某 某 某 某 某 某 某 某 某 某 某 某 某 某 某 某 某 某For example, at the communication layer 2
Dat 3 1夂C〇ntr〇1)的子層中,當SDU(Service Umt)和 PDU(Protoc〇i Data UnU)為不同時, 料為非透明資料,在通訊層2的^(:(“(11&'In the sublayer of Dat 3 1夂C〇ntr〇1), when the SDU (Service Umt) and the PDU (Protoc〇i Data UnU) are different, the material is non-transparent data, and the communication layer 2 is ^(:(" (11&'
Control)的子層中,當SDU和pDU為 =在圖9所示之情況下,在其與無線通信部= 為間透:In the sublayer of Control, when the SDU and pDU are = in the case shown in Figure 9, in the case of the wireless communication part = is transparent:
H 資料未受到任何處理,傳送至終端IF 二:個?子為聲音資#,其被當成透明資 資料必項作此&面,從無線通信部30輸出之通訊層1的 資枓必須作某些處理,這種資料的一個例子 其被當成非透明資料來處理。 ; 數位==Λ=95,96雖然之前以聲音資料和非限定 i L 所有透明資料可被分割為通訊層1和 通訊層2之間所定義的單位(Transp〇rt Bi〇ck),以H data is not processed, transmitted to terminal IF two: one? The sub-voice is #, which is regarded as the transparent information, and the information of the communication layer 1 output from the wireless communication unit 30 must be processed. An example of such data is regarded as non-transparent data. To handle. ; digit ==Λ=95,96 Although all transparent data previously separated by voice data and unqualified i L can be divided into units defined between communication layer 1 and communication layer 2 (Transp〇rt Bi〇ck),
Transport Block分割之資料由於為透明資料,所以如前 所述,、和MACPDU (及MACSDU)等價,於是以Transp〇rt B1 ock分割之資料分別使用同一種隱藏單位。 工展::也?曰資料等為使用者資料,使用者資料於RLC 子層:亦為透明資料’力以此傳輸型態被當成序列介面, 當作為ARIB 規定的MT(Mobile Terminal:)_TA(Teriminal 2112-3909-PF.ptd 第29頁Since the data of the Transport Block partition is transparent, it is equivalent to MACPDU (and MACSDU) as described above, so the data divided by Transp〇rt B1 ock uses the same hidden unit. Exhibition:: Also?曰The data is the user data, the user data is in the RLC sub-layer: also the transparent data 'force is used as the serial interface in this transmission type, when it is the ARTB-defined MT (Mobile Terminal:)_TA (Teriminal 2112-3909- PF.ptd第29页
圖22,圖23)時,成為可直接針對μτ-τλ I/F的序列格式進行隱藏處理的傳輸型錤。 此夕太卜,圖9的非透明資料97雖然之“封包資料和用 來仏號資料為具體例,戶;t有非透明資料可被分割為通訊層 1和通訊層2之間所定義的單位(Transp〇rt B1〇ck)。 圖9所示之隱藏暨完整性保護處理部4 〇除了選擇性地 在其與無線通信控制部20之間針對非透明資料進行隱藏處In Fig. 22 and Fig. 23), it becomes a transmission type which can directly perform a concealing process for the sequence format of μτ-τλ I/F. On the eve of this, the non-transparent data 97 of FIG. 9 is used as a specific example, and the non-transparent data can be divided into communication layer 1 and communication layer 2 as defined. Unit (Transp〇rt B1〇ck) The hidden and integrity protection processing unit 4 shown in Fig. 9 selectively hides the non-transparent data between it and the wireless communication control unit 20
理和完整性保護處理,還針對輸入輸出於終端丨F部丨〇和無 線通信部30之間的透明資料作必要的隱藏處理。隱藏暨完 整性保護處理部40不針對透明資料進行完整性保護處理。 倘若在透明資料中有使用者不願作隱藏處理的資料,無線 通信控制部20可不將此使用者不願作該隱藏處理之透明資 料輸入隱藏暨完整性保護處理部4 〇並將之輸入無線通信控 制部20。或者,亦可將該使用者不願作隱藏處理之透明資 料輸入隱藏暨完整性保護處理部4 〇中,使用來自無線通信 控制部2 0的信號來避免對該透明資料作隱藏處理。 圖10為隱藏暨完整性保護處理部4〇的構造圖。The integrity and integrity protection processing also performs necessary concealment processing on the transparent data input and output between the terminal unit F and the wireless communication unit 30. The hidden and integrity protection processing unit 40 does not perform integrity protection processing on transparent data. If there is data in the transparent data that the user does not want to hide, the wireless communication control unit 20 may not input the transparent data that the user does not want to perform the hidden processing into the hidden and integrity protection processing unit 4 and input it into the wireless device. Communication control unit 20. Alternatively, the user may enter the hidden and integrity protection processing unit 4 with the transparent information that the user does not wish to perform the concealing process, and use the signal from the wireless communication control unit 20 to avoid hiding the transparent data. Fig. 10 is a structural diagram of the hidden cum integrity protection processing unit 4A.
圖10和圖5的相異點為,其多設置了隱藏處理部46 0。 在隱藏處理部460上設有加密部462和解碼部463。加密部 462輸入來自終端IF部10的透明資料95,加密此輸入之資 料’變成透明資料96 ’再輸出至無線通信部3〇。另一方 面,解碼部4 6 3從無線通信部3 0輸入透明資料9 6,解碼之 後變為透明資料95,然後輸出於終端IF部1 0。隱藏處理部 460的這些處理係根據來自IF部410的控制信號99來進行。The difference between FIG. 10 and FIG. 5 is that the hidden processing unit 460 is provided in many cases. The encryption processing unit 460 is provided with an encryption unit 462 and a decoding unit 463. The encryption unit 462 inputs the transparent material 95 from the terminal IF unit 10, encrypts the input information 'becomes transparent data 96' and outputs it to the wireless communication unit 3A. On the other hand, the decoding unit 461 inputs the transparent material 906 from the wireless communication unit 30, and then becomes the transparent material 95 after being decoded, and then outputs it to the terminal IF unit 10. These processes of the concealment processing unit 460 are performed based on the control signal 99 from the IF unit 410.
2112.3909-H7.ptd 第30頁 1287767 五、發明說明(28) 〜 控制信號99係從控制信號91產生的控制信號。接著,隱藏 ^理部460根據來自無線通信控制部2〇的控制信號進行隱 藏處理。在圖10中,資料92使用透過匯流排的平行介面來 作輪入輸出。另一方面,透明資料95和96透過序列介面針 對隱藏處理部460作輸入輸出。如此,圖1〇顯示隱藏暨完 整性保護處理部40具備平行介面和序列介面兩個系統之輸 出入介面的情況。 鲁 圖11顯示於圖7所示之隱藏暨完整性保護處理部4 〇之 構造中附加隱藏處理部460的情況。圓丨丨所示之隱藏處理 部460的構造,如圖12所示,為產生鍵值流和取得互斥邏 輯和之情況下的有效構造。 圖11係透明資料95,96透過序列介面輸入輸出隱藏處 理部460的情況,此外,圖1丨亦顯示了透過此序列介面輸 入輸出的序列資料中複數個頻道的資料被多重化的情況。 例如,在頻道2的資料繼頻道丨的資料被當成序列資料來輸 入的情況下’從對應於頻道1之加密部1產生鍵值流,輸出 於資料多重部481 ’從對應於頻道頻2之加密部2產生鍵值 流,輸出於資料多重部481,在資料多重部481 ,這些輸入 鍵值流的資料95在與資料系列相同的格式下成為多重。藉 由互斥邏輯和電路來運算此多重key steam和所輸入資料 95之資料系列的互斥邏輯和。隱藏處理部46〇的這些運作 係根據控制信號99,亦即,無線通信控制部22所傳送過來 的控制信號9 1來進行。根據圖丨丨的構造,序列資料的延遲 可僅藉由互斥邏輯和電路48 3的運算來進行高速處理。2112.3909-H7.ptd Page 30 1287767 V. INSTRUCTION DESCRIPTION (28) ~ Control signal 99 is a control signal generated from control signal 91. Next, the concealment unit 460 performs concealment processing based on the control signal from the radio communication control unit 2A. In Figure 10, the data 92 uses a parallel interface through the busbar for wheeling in and out. On the other hand, the transparent data 95 and 96 are input and output to the conceal processing unit 460 through the serial interface. Thus, Fig. 1A shows a case where the concealment and integrity protection processing unit 40 has an input interface of two systems of a parallel interface and a serial interface. Lutu 11 shows a case where the hidden processing unit 460 is added to the structure of the hidden and integrity protection processing unit 4 shown in Fig. 7. The configuration of the conceal processing unit 460 shown by the circle is as shown in Fig. 12, and is an effective configuration in the case of generating a key value stream and acquiring mutually exclusive logic. Fig. 11 shows the case where the transparent data 95, 96 is input/output through the sequence interface to the hidden processing unit 460. Further, Fig. 1A shows the case where the data of the plurality of channels in the sequence data input and output through the serial interface is multiplexed. For example, in the case where the data of the channel 2 is input as the sequence data as the data of the channel ', the key value stream is generated from the encryption unit 1 corresponding to the channel 1, and the output to the data multiplex unit 481' corresponds to the channel frequency 2 The encryption unit 2 generates a key value stream, which is output to the data multiplication unit 481. In the data multiplication unit 481, the data 95 of the input key value stream is multiplexed in the same format as the data series. The mutually exclusive logical sum of the data series of the multiple key steam and the input data 95 is operated by the mutually exclusive logic and circuit. These operations of the concealment processing unit 46 are performed based on the control signal 99, that is, the control signal 91 transmitted from the radio communication control unit 22. According to the construction of the frame, the delay of the sequence data can be processed at high speed by only the operation of the exclusive logic AND circuit 48 3 .
2112-3909-ΙΨ.ρΙ(1 第31頁 12877672112-3909-ΙΨ.ρΙ(1 Page 31 1287767
五、發明說明(29) 圖13顯示將圖10之隱藏處理部420和隱藏處理部46〇矣 合成一個隱藏處理部4 7 0的情況。 、且 隱藏處理部470處理從平行介面輸出輸入之資料^和 從序列介面輸出輸入之資料95, 96兩方面的資料。隱 理部47 0由於將隱藏處理部420和隱藏處理部46〇組合“為一處 個,所以可減少硬體資源的消耗。在隱藏處理部4/〇 $ : 透明資料和非透明資料的切換處理動作係根據控制信號 99 ’亦即’輸出自無線通信控制部20的控制信號91 行。 (實施型態三 圖25顯 方式。圖25 示實施型態三 的左側顯示傳 方的解碼裝置 圖1 5之間的相 ),該隨機數 生的隨機數列 用函數f 8所產 的情報一到齊 隨機數列輸出 (普通文字) (普通文字) 顯示接收一 圖2 5和 部(緩衝器 函數f 8所產 由資料隱藏 生隨機數列 機數列,將 憶部在訊息 在輸入訊息 列。 之隱藏處理 送一方的加 〇 異點為,其 列記憶部可 。隨機數列 生之隨機數 ,資料隱藏 於隨機數列 到達之前會 的同時會輸 部的加密方式及解碼 进裝置。圖2 5的右側 具備一隨機數列記憶 暫存藉由資料隱藏用 記憶部可事先記憶藉 列。亦即,當用來產 用函數f8開始產生隨 記憶部。隨機數列記 暫時保存隨機數列, 出所記憶之隨機數 另一方面,在解碼的情況下,當用來產生隨機數列的 情報一到齊,資料隱藏用函數f8開始產生隨機數列,將隨5. Description of the Invention (29) Fig. 13 shows a case where the conceal processing unit 420 and the concealment processing unit 46 of Fig. 10 are combined into one concealment processing unit 407. The hidden processing unit 470 processes the data input from the parallel interface and the data 95 and 96 which are input and output from the serial interface. Since the concealing unit 47 0 combines the concealment processing unit 420 and the concealment processing unit 46 “ as one place, the consumption of hardware resources can be reduced. In the concealment processing unit 4 / 〇 $ : switching between transparent data and non-transparent data The processing operation is based on the control signal 99', that is, the control signal 91 output from the wireless communication control unit 20. (Embodiment 3: 25). FIG. 25 shows the decoding device of the left side of the embodiment 3 The phase between 1 and 5), the random number of the random number sequence is output by the function f 8 and the output of the random number is output (normal text) (plain text) display receiving a picture 2 5 and the part (buffer function f 8 is produced by data hiding random number trainer sequence, the memory is in the input message column. The hidden processing is sent to one of the different points, the column memory can be. Random number of random numbers, data hidden in The random number sequence will be encrypted and decoded into the device at the same time. The right side of Figure 2 5 has a random number of memory. The memory can be memorized in advance by the data hiding memory unit. That is, when the production function f8 is used to start generating the memory unit, the random number column temporarily stores the random number sequence, and the stored random number is on the other hand, in the case of decoding, when the information used to generate the random number sequence is aligned , data hiding with the function f8 began to generate random numbers, will follow
12877671287767
機數列 (普通 文字的 如 隱藏用 數列的 此 隱藏用 的動作 隱藏用 將所產 輸出於隨機 文字)到達 同時會輸出 此,圖25左 函數f 8產生 動作係以非 外,圖25右 函數f 8產生 係以非同步 函數f 8在輸 生之隨機數 數列記 之前會 所記憶 側所示 隨機數 同步的 側所示 隨機數 的方式 入密碼 列儲存 憶部。 暫時保 之隨機 之加密 列的動 方式進 之解碼 列的動 進行。 文字前 於隨機 隨機數 存隨機 數列。 裝置的 作和運 行。 裝置的 作和運 亦即, 開始產 數列記 數列,在輸入密胡 特徵為,藉由資申 算密碼文字和隨賴 特徵為,藉由資乘 算訊息和隨機數歹、, 其特徵在於:資制 生隨機數列並事失 憶部。The machine number column (such as the hidden action sequence of the hidden text in the ordinary text will be outputted to the random text) and will be output at the same time. The left function f 8 of Fig. 25 generates the action system, and the right function f of Fig. 25 The 8 generation system stores the memory portion in the password column by the non-synchronous function f 8 before the random number sequence of the input is recorded, and the random number shown on the side of the random number synchronization shown on the memory side is recorded. The motion of the random encrypted column is temporarily guaranteed to proceed to the decoding column. The text precedes the random random number to store a random number sequence. The operation and operation of the device. The operation and operation of the device, that is, the production of the series of records, in the input of the Mihu feature, by the capital calculation of the cipher text and the reliance feature, by the multiplication of the information and the random number ,, characterized by: The capital system produces random numbers and the Department of Amnesia.
圖25之加密裝置和解碼裝置係進行〇FB(〇utput feedback)模式的加密和解碼,〇1^係定義於IS〇/IEC1〇U6 之區塊也、碼的使用模式的一種。亦可使用該模式的變形模 式。或者,也可使用在沒有普通文字或密碼文字之情況下 可產生隨機數列的模式。但是,圖25的加密裝置和解碼裝 置在沒有普通文字和密碼文字之前產生隨機數列,所以無 法使用輸入密碼文字以產生隨機數列的模式。 此外,所謂普通文字係指用來加密的資料,不必限定The encryption device and the decoding device of Fig. 25 perform encryption and decoding in the 〇FB (〇 utput feedback) mode, and are defined as one of the blocks of IS〇/IEC1〇U6 and the use mode of the code. The deformation mode of this mode can also be used. Alternatively, you can use a pattern that produces random numbers without plain text or password text. However, the encryption device and the decoding device of Fig. 25 generate a random number sequence before the plain text and the ciphertext are not present, so that it is impossible to use the mode in which the ciphertext is input to generate a random number sequence. In addition, the so-called ordinary text refers to the material used for encryption, without limitation
於一般人用來讀寫的文字。例如,字元資料(text data)、文字資料皆為普通文字。此外,聲音資料、影像 資料、編碼資料、壓縮資料等若是用來加密的資料,就可 稱為普通文字。 此外’所謂密瑪文子係指加密後的資料。字元資料For the text that ordinary people use to read and write. For example, text data and text data are ordinary text. In addition, sound data, video data, coded data, compressed data, etc., if used for encryption, can be called ordinary text. In addition, the so-called Mi Ma Wenzi refers to the encrypted data. Character data
1287767 五、發明說明(31) ' --- (^eXt 、文子資料、聲音資料、影像資料、編碼資 料、壓縮資p等都是加密前的普通文字的資料形式。 圖26顯不實施型態三之完整性保護處理部的完 護處理方式。 μ 圖26和圖16的相異點》,在資料完整性用函數f9的前 段:設有資料記憶冑(緩衝器)。資料記憶部係用來輸入 並記憶X ( X ^ 2 )個資料和χ個控制信號資料。資料完整性 用函數f 9輸入記憶於資料記憶部的X個資料和χ個控制信號 資料,產生針對X個資料的乂個完整性認證子,集中輸出X 個完整性認證子。1287767 V. Description of invention (31) ' --- (^eXt, text data, sound data, video data, coded data, compression p, etc. are all data forms of ordinary text before encryption. Figure 26 shows no implementation type The integrity processing method of the integrity protection processing unit of the third. μ The difference between Fig. 26 and Fig. 16 is preceded by the data integrity function f9: data memory buffer (buffer) is provided. To input and memorize X ( X ^ 2 ) data and one control signal data. Data integrity uses function f 9 to input X data and one control signal data stored in the data memory to generate X data. One integrity authentication sub-input, output X integrity authentication sub-categories.
在訊息認證金鑰(I κ )可共用於X個資料的情況下,如 圖26所示’訊息認證金鑰(IK)可不記憶於資料記憶部中而 直接輸入於資料完整性用函數丨9。當訊息認證金鑰(ΙΚ)對 於各個資料皆不同時,可連帶將其他控制信號資料記憶於 資料記憶部。 以下將配合圖示說明圖25所示之隱藏處理部和完整性 保護處理部的具體例。 圖27顯示實施型態三之無線通信控制部2〇和隱藏暨完 整性保護處理部4 0。In the case where the message authentication key (I κ ) can be used in total for X pieces of data, as shown in FIG. 26, the 'message authentication key (IK) can be directly input to the data integrity function 丨9 without being memorized in the data memory unit. . When the message authentication key (ΙΚ) is different for each data, other control signal data can be stored in the data memory unit. Specific examples of the conceal processing unit and the integrity protection processing unit shown in Fig. 25 will be described below with reference to the drawings. Fig. 27 shows a wireless communication control unit 2 and a hidden and integrity protection processing unit 40 of the third embodiment.
其他部分的構造和實施型態二所示之無線終端1 0 0相 同’所以以下以圖2 7為中心來說明其和實施型態二的相異 無線通信控制部20的内部設有CPU29。此外,隱藏暨 完整性保護處理部40的内部設置了具有平行介面的隱藏處The configuration of the other portions is the same as that of the wireless terminal 100 shown in the second embodiment. Therefore, the CPU 29 is provided inside the different wireless communication control unit 20, which is described below with reference to Fig. 27. Further, the inside of the hidden cum integrity protection processing section 40 is provided with a hidden place having a parallel interface.
1287767 五、發明說明(32) 理部420和具有序列介面的隱藏處理部46〇和完整性保護處 理部430。隱藏處理部420上設有加密部422和解碼部423。 隱藏處理部460上設有加密部462和解瑪部463 ^完整性保 護處理部430上設有完整性認證子附加部432和完整性確認 部433。無線通信控制部20和隱藏暨完整性保護處理部4〇 透過匯流排90相連接。匯流排90連接無線通信控制部2〇内 部的CPU29、隱藏暨完整性保護處理部4〇内部的隱藏處理 部4 2 0、隱藏處理部4 6 0和完整性保護處理部4 3 〇,以傳送 控制彳§號91、資料92及其他資料。CPU29藉由讀取並執行 儲存於唯讀記憶體等記錄媒體之程式來掌管整個無線通信 控制部2 0的處理。匯流排9 0為一般的匯流排,設置於無 通信控制部2 0和隱藏暨完整性保護處理部4 〇的内部或外 部’和其他處理部(未顯示於圖面)相連接。 圖28為隱藏處理部420之加密部422和解碼部423的 細圖。 加密部422由加密器610、緩衝器62〇和互斥邏輯和 算部630所構成。解碼部423由解碼器611、緩衝器621和 斥邏輯和運算部631所構成。加密器61〇相當於圖託中傳 一方的資料隱藏用函數f8。緩衝器62〇相當於圖25中傳送 一方的隨機數列記憶部。在此,緩衝器62〇使用先進先 記憶體。互斥邏輯和運算部6 30同時進行64位元平行資 的互斥邏輯和運算。解碼器611相當於圖25中接收一方 資料隱藏用函數f8。緩衝器621相當於圖託中接收一方 隨機數列記憶部。互斥邏輯和運算部631同時進行64位 12877671287767 V. Description of the Invention (32) The 420 and the hidden processing unit 46 and the integrity protection processing unit 430 having a sequence interface. The encryption processing unit 420 is provided with an encryption unit 422 and a decoding unit 423. The concealment processing unit 460 is provided with an encryption unit 462 and a de-emphasis unit 463. The integrity protection processing unit 430 is provided with an integrity authentication sub-addition unit 432 and an integrity confirmation unit 433. The wireless communication control unit 20 and the hidden and integrity protection processing unit 4 are connected via the bus bar 90. The bus bar 90 is connected to the internal CPU 29 of the wireless communication control unit 2, the hidden processing unit 4200, the hidden processing unit 406, and the integrity protection processing unit 4 3〇 in the hidden cum integrity protection processing unit 4 to transmit Control 彳§91, data92 and other information. The CPU 29 controls the processing of the entire wireless communication control unit 20 by reading and executing a program stored in a recording medium such as a read-only memory. The bus bar 90 is a general bus bar, and is disposed in the internal or external portion of the non-communication control unit 20 and the hidden and integrity-protection processing unit 4, and is connected to other processing units (not shown). Fig. 28 is a detailed diagram of the encryption unit 422 and the decoding unit 423 of the concealment processing unit 420. The encryption unit 422 is composed of an encryptor 610, a buffer 62, and a mutually exclusive logical sum calculating unit 630. The decoding unit 423 is composed of a decoder 611, a buffer 621, and a repulsive logical sum operation unit 631. The encryptor 61 is equivalent to the data hiding function f8 of the one in the map. The buffer 62 is equivalent to the random number column memory of the transmitting side in Fig. 25. Here, the buffer 62 uses advanced memory. The mutually exclusive logical sum operation unit 630 simultaneously performs a mutual exclusion logical sum operation of 64 bits of parallel resources. The decoder 611 corresponds to the data hiding function f8 of the receiving side in Fig. 25. The buffer 621 corresponds to the receiving random number column memory unit in the map. Mutually exclusive logic sum operation unit 631 simultaneously performs 64 bits 1287767
平行資料的互斥邏輯和運算。Mutually exclusive logic and operations of parallel data.
隱藏處理部420經由匯流排90從Cpu29輸入控制信號 91。此時,普通文字950尚未輸入。CPU29可事先知道控制 信號91,在普通文字95〇之前從cpu2〇將控制信號91傳送至 隱藏處理部420。控制信號91至少含有加密金錄(ck),再 者’在此例中’除CK外,還含有加密解碼對象資料的位元 長度(LENGTH,圖28顯示位元長度= 256位元的情況)、上 /下連結(DIRECTION)、計數器(COUNT - C)、邏輯頻道識別 子(BEARER)。加密金鑰(CK)、加密解碼對象資料的位元長 度(LENGTH,圖28顯示位元長度=256位元的情況)、上/ 下連結(DIRECTION)、計數器(C0UNT 一 c)、邏輯頻道識別子 (BEARER)被當成控制信號60 0或控制信號6〇1輸入至加密部 422或解碼部423。在加密器61〇中,當控制信號6〇〇被輸入 時’開始產生隨機數列,將隨機數列輸出於緩衝器6 21 中。在此,加密器610以64位元產生隨機數列。在此情況 下’從加密器610輸出以64位元為單位之隨機數列,暫存 於緩衝器620中。如前所述,當加密對象資料的位元長度 (LENGTH)為256位元時’加密器βίο產生四個64位元的隨機 數列,配合加密對象資料的長度(2 56位元)產生足夠長 的隨機數列(64位元X 4 )。The concealment processing unit 420 inputs the control signal 91 from the CPU 29 via the bus bar 90. At this time, ordinary text 950 has not been input. The CPU 29 can know the control signal 91 in advance, and transmits the control signal 91 from the cpu2 to the hidden processing unit 420 before the normal character 95. The control signal 91 contains at least an encrypted gold record (ck), and in addition to CK in this example, it also contains the bit length of the encrypted decoding target data (LENGTH, and FIG. 28 shows the case where the bit length = 256 bits) , DIRECTION, counter (COUNT - C), logical channel identifier (BEARER). Encryption key (CK), bit length of encrypted decoding target data (LENGTH, Figure 28 shows bit length = 256 bits), up/down link (DIRECTION), counter (C0UNT-c), logical channel identifier (BEARER) is input to the encryption unit 422 or the decoding unit 423 as the control signal 60 0 or the control signal 6〇1. In the encryptor 61, when the control signal 6 is input, 'starting to generate a random number sequence, and outputting the random number sequence in the buffer 61. Here, the encryptor 610 generates a random number sequence in 64 bits. In this case, a random number sequence of 64 bits is output from the encryptor 610 and temporarily stored in the buffer 620. As described above, when the bit length (LENGTH) of the encrypted object data is 256 bits, the 'encryptor βίο generates four 64-bit random numbers, which are sufficiently long with the length of the encrypted object data (2 56 bits). Random number column (64 bit X 4 ).
圖28顯示緩衝器620中儲存有四個64位元長度之隨機 數列的情況。 接下來,CPU29經由匯流排9〇以64位元為單位將256位 元長度的普通文字950傳送至加密部422。當互斥邏輯和運Fig. 28 shows a case where four random numbers of 64-bit lengths are stored in the buffer 620. Next, the CPU 29 transmits the plain text 950 of 256-bit length to the encryption unit 422 via the bus bar 9 in units of 64 bits. Mutually exclusive logic
2112-3909-PF.ptd 第 36 頁 12877672112-3909-PF.ptd Page 36 1287767
算部630以64位το為單位輸入普通文字95〇時,緩衝器62〇 依序輸出64位元的隨機數列65〇。互斥邏輯和運算部63〇以 64 =元為=位同時進行普通文字95〇和隨機數列65〇的互斥 邏輯和運算,產生以64位元為單位之密碼文字96〇。密碼 文字96 0被傳回CPU29。 —解碼部423的運作除了輸入至互斥邏輯和運算部631的 為密碼文字且輸出的為普通文字以外,其餘運作和加密部 4 2 2相同,所以在此省略說明。 ^ 此外’互斥邏輯和運算部630輸入普通文字950亦可不 是在緩衝器6 20產生四個(2 56位元)隨機數列之後,亦可 在緩衝器620儲存了一個以上的64位元隨機數列的情況下 由互斥邏輯和運算部63〇開始運算互斥邏輯和。在此情況 下,當加密器610產生隨機數列時,互斥邏輯和運算部63〇 以並列的方式同步進行互斥邏輯和運算。加密器61〇在互 斥邏輯和運算部63 0中進行普通文字950之互斥邏輯和運算 的期間,輸入下一個控制信號60〇,產生針對下一個將輸 入之普通文字950的隨機數列,使緩衝器620事先纪愔τ 份普通文字的隨機數列。 爭无”己隐下一 ^ 如此,加密部422從CPU29輸入普通文字95的不久之 刖’事先在緩衝器6 2 0儲存隨機數列,所以不需要等待在 互斥邏輯和運算部630中運算的時間,進而可高速進行加 密。基於同樣的理由,在解碼部423中亦可高速進行解 碼0 此外’緩衝器6 2 0, 6 21的大小雖然可在加密器6丨〇、When the arithmetic unit 630 inputs the normal character 95〇 in units of 64 bits το, the buffer 62 依 sequentially outputs a 64-bit random number sequence 65 〇. The mutually exclusive logical sum operation unit 63 performs a mutually exclusive logical AND operation of the ordinary character 95〇 and the random number column 65〇 with 64 = element == bit, and generates a ciphertext 96〇 in units of 64 bits. The password text 96 0 is passed back to the CPU 29. The operation of the decoding unit 423 is the same as the operation of the encryption unit 422 except that it is a ciphertext input to the multiplexed logic and calculation unit 631 and is output as a normal character, and thus the description thereof will be omitted. In addition, the 'mutual exclusion logic sum operation unit 630 may input the normal character 950 instead of storing four (2 56-bit) random number columns in the buffer 66, or may store more than one 64-bit random number in the buffer 620. In the case of a sequence, the exclusive exclusion logic sum operation unit 63 starts the operation of the exclusive logic sum. In this case, when the encryptor 610 generates a random number sequence, the mutually exclusive logical sum operation unit 63 同步 synchronizes the mutual exclusion logical sum operation in a parallel manner. The encryptor 61 inputs the next control signal 60A during the mutual exclusion logic sum operation of the normal character 950 in the mutually exclusive logical sum operation unit 63 0, and generates a random number sequence for the next ordinary character 950 to be input. The buffer 620 is preceded by a random number sequence of ordinary characters. In this case, the encryption unit 422 stores the random number sequence in the buffer 620 immediately after the normal character 95 is input from the CPU 29, so that it is not necessary to wait for the operation in the mutually exclusive logical sum operation unit 630. The time can be further encrypted at a high speed. For the same reason, decoding can be performed at a high speed in the decoding unit 423. Further, the size of the buffers 6 2 0 and 6 21 can be in the encryptor 6
2112-3909-PF.ptd 第37頁 1287767 五、發明說明(35) 解碼器611將輸出之隨機數列的單位大小以上,但最好為 此系統所指定加密/解碼對象資料的位元長度(LENGTH)之 最大值以上。例如,加密器610、解碼器611將輸出之隨機 數列的單位大小為6 4位元,加密/解碼對象資料之位元長 度(LENGTH)的最大值為5114位元,則緩衝器620,621的大 小宜在5120(64x 80)以上。 此外’互斥邏輯和運算部631在範例中雖然進行64位 元的互斥邏輯和運算,其亦可進行32位元、128位元等其 他位元大小的平行資料處理。 此外,剛剛雖說明了加密器61〇、解碼器61 1將輸出之 隨機數列的單位大小為6 4位元的情況,其亦可輸出3 2位 元、1 2 8位元等其他位元單位大小的隨機數列。 此外,加密器610、解碼器611將輸出之隨機數列的單 位大小、緩衝器6 2 0,6 2 1的讀寫大小和互斥邏輯和運算部 631的平行資料位元大小可以不同。 圖29顯示無線通信控制部2〇和隱藏處理部4 20的其他 範例。 圖29和圖28的相異點為,互斥邏輯和運算部63 0和互 斥邏輯和運算部631不設置於隱藏處理部420而設置於無線 通信控制部2 0。 CPU29經由匯流排90從緩衝器“ο (盡可能集中)讀取 針對普通文字950的隨機數列,將之提供給互斥邏輯和運 算部630。在互斥邏輯和運算部63〇中,進行普通文字950 和隨機數列6 50的互斥邏輯和運算,產生密碼文字9 60。2112-3909-PF.ptd Page 37 1287767 V. Description of the Invention (35) The decoder 611 will output a random number of units above the unit size, but it is preferable to specify the bit length of the encryption/decoding target data for this system (LENGTH). ) the maximum value or more. For example, the encryptor 610 and the decoder 611 will output a random number column having a unit size of 64 bits, and the maximum length of the bit length (LENGTH) of the encryption/decoding target data is 5114 bits, and the buffers 620, 621 The size should be above 5120 (64x 80). Further, in the example, the mutually exclusive logical sum operation unit 631 performs 64-bit mutually exclusive logical AND operations, and can perform parallel data processing of other bit sizes such as 32-bit and 128-bit. Further, although the case where the unit size of the random number sequence to be outputted by the encryptor 61 and the decoder 61 1 is 64 bits has been described, it is also possible to output other bit units such as 3 2 bits and 1 2 8 bits. A random number of sizes. Further, the encryptor 610 and the decoder 611 may differentiate the unit size of the output random number sequence, the read/write size of the buffer 6 2 0, 6 2 1 , and the parallel data bit size of the mutually exclusive logical sum operation unit 631. Fig. 29 shows another example of the wireless communication control unit 2 and the hidden processing unit 420. The difference between Fig. 29 and Fig. 28 is that the mutual exclusion logic sum calculation unit 63 0 and the exclusive logic sum calculation unit 631 are provided in the radio communication control unit 20 without being provided in the concealment processing unit 420. The CPU 29 reads the random number sequence for the normal character 950 from the buffer "o (as concentrated as possible) via the bus bar 90, and supplies it to the mutually exclusive logical sum operation unit 630. In the mutually exclusive logical sum operation unit 63, ordinary The mutually exclusive logical sum operation of the text 950 and the random number column 6 50 produces a cipher text 9 60.
2112-3909-PF.ptd 第 頁 1287767 發明說明(36) 同樣,在互斥邏輯和運算部631中,cpu29經由匯流排 90從緩衝器621讀取隨機數列651,進行其和密碼文字96〇 的互斥邏輯和運算,輸出普通文字95〇。 在圖29的情況下,CPU29僅從緩衝器62〇讀取隨機數 列,普通文字95 0和密碼文字96〇不需要往返於匯流排9〇 中’於是流過匯流排9 0的資料量可以為圖2 8之構造的1 / 2 以下。此外,可減少因為使用匯流排9 〇的等待時間,又可 減少匯流排9 0的卡位競爭。2112-3909-PF.ptd Page 1287767 (36) Similarly, in the mutually exclusive logical sum operation unit 631, the cpu 29 reads the random number sequence 651 from the buffer 621 via the bus bar 90, and performs the ciphertext 96 其. Mutually exclusive logic and operation, output ordinary text 95〇. In the case of FIG. 29, the CPU 29 reads only the random number sequence from the buffer 62, and the normal character 95 0 and the password word 96 〇 do not need to travel to and from the bus bar 9 ' 'The amount of data flowing through the bus bar 90 can be Figure 2 shows the structure below 1 / 2 below. In addition, the waiting time of the busbar 9 can be reduced, and the card content competition of the busbar 90 can be reduced.
々此外’在圖28和圓29的任何一種情況下,互斥邏輯和 運算部630和互斥邏輯和運算部631可透過硬體來實現,透 過軟體來實現,或透過硬體和軟體的組合來實現。 圖30為一詳圖’顯示具有序列介面之隱藏處理部46〇 的\加密部462和解碼部463。 » 圖30和圖28的相異點為,具備互斥邏輯和運算部 632 ,其進行1位元序列資料之互斥邏輯和運算,來取代平 行運算資料的互斥邏輯和運算部63〇。此外,其具備互斥 邏輯和運算部633,其進行1位元序列資料之互斥邏輯和運 算’來取代平行運算資料的互斥邏輯和運算部6 31。在互 斥邏輯和運算部632中,透明資料95被輸入,以序列方式 一個位70 —個位元地進行和隨機數列65〇的互斥邏輯和運 算,輸出加密後之透明資料96。另一方面,在互斥邏輯和 運算部633中,透明資料96被輸入,以序列方式一個位元 一個位7G地進行和隨機數列651的互斥邏輯和運算,輸出 解碼後之透明資料9 5。Further, in either case of FIG. 28 and the circle 29, the mutually exclusive logical sum operation unit 630 and the mutually exclusive logical sum operation unit 631 can be realized by hardware, by software, or by a combination of hardware and software. to realise. Fig. 30 is a detail view showing an encryption unit 462 and a decoding unit 463 having a hidden interface unit 46 of the sequence interface. The difference between Fig. 30 and Fig. 28 is that a mutual exclusion logic sum operation unit 632 is provided which performs a mutually exclusive logical AND operation of the 1-bit sequence data instead of the exclusive logic and arithmetic unit 63 of the parallel arithmetic data. Further, it has a mutually exclusive logical sum operation unit 633 which performs mutual exclusion logic and operation of 1-bit sequence data to replace the mutually exclusive logical sum operation unit 631 of the parallel operation data. In the mutually exclusive logical sum operation unit 632, the transparent material 95 is input, and a mutually exclusive logical AND operation of a bit 70-bits and a random number sequence 65〇 is performed in a sequence manner, and the encrypted transparent data 96 is output. On the other hand, in the mutually exclusive logical sum operation unit 633, the transparent material 96 is input, and a mutually exclusive logical sum operation of one bit by one bit and a random number column 651 is performed in a sequence manner, and the decoded transparent data is output. .
1287767 五、發明說明(37) 在圖30所示之情況下,由於事先在緩衝器620和緩衝 器621產生隨機數列,所以在互斥邏輯和運算部632和互斥 邏輯和運算部633中不會產生等待時間,可高速進行互斥 邏輯和運算。 此外,在圖3 0的情況下,互斥邏輯和運算部6 3 2和互 斥邏輯和運算部633可透過硬體來實現,透過軟體來實 現,或透過硬體和軟體的組合來實現。 此外’互斥邏輯和運算部632和互斥邏輯和運算部633 亦可設於隱藏處理部460的外部。 圖31顯示完整性保護處理部430、完整性認證子附加 部423和完整性確認部433的細節。 在完整性認證子附加部432中,具備緩衝器wo、完整 性認證子產生器6 7 0和完整性認證子附加器6 8 〇。在完整性 確認部4 3 3中,具備緩衝器6 61、完整性認證子產生器6 7 j 和完整性確認器681。緩衝器660和緩衝器661為先進先出 §己憶體。緩衝器6 6 0和緩衝器6 6 1相當於圖2 6的資料記憶 部。完整性認證子產生器6 7 〇和完整性認證子產生器6 7 j相 當於圓26的資料完整性用函數f9。完整性認證子附加器 680在資料上附加完整性認證子。完整性確認器681對由傳 送一方所處理之完整性認證子和在接收一方所產生之完整 性認證子作比較,當其一致時,才確認資料的完整性。 在圖31中,CPU29針對完整性認證子附加部432集 送欲保,完整性之四個資料92。此外,cpU29集中傳送四 個控制信號91,此四個控制信號91對應於該四個欲保護完1287767 V. Inventive Description (37) In the case shown in FIG. 30, since the random number sequence is generated in the buffer 620 and the buffer 621 in advance, the mutual exclusion logic sum operation unit 632 and the exclusive circuit sum operation unit 633 do not Waiting time is generated, and mutual exclusion logic and operations can be performed at high speed. Further, in the case of Fig. 30, the mutually exclusive logical sum calculating unit 633 and the mutually exclusive logical sum calculating unit 633 can be realized by hardware, realized by software, or by a combination of hardware and software. Further, the exclusive exclusion logical sum calculation unit 632 and the exclusive exclusion logical sum operation unit 633 may be provided outside the concealment processing unit 460. Fig. 31 shows details of the integrity protection processing section 430, the integrity authentication sub-addition section 423, and the integrity confirming section 433. The integrity authentication sub-addition unit 432 is provided with a buffer wo, a integrity authentication sub-generator 60 7 and an integrity authentication sub-adder 6 8 。. The integrity confirmation unit 433 includes a buffer 61, an integrity authentication sub-generator 6 7 j and an integrity validator 681. Buffer 660 and buffer 661 are FIFOs. The buffer 660 and the buffer 616 are equivalent to the data memory of Fig. 26. The integrity authentication sub-generator 6 7 and the integrity authentication sub-generator 6 7 j are equivalent to the data integrity function of the circle 26 using the function f9. The integrity authentication sub-adder 680 appends an integrity authenticator to the data. The integrity validator 681 compares the integrity authenticator processed by the transmitting party with the integrity authenticator generated at the receiving party, and confirms the integrity of the data when they are identical. In Fig. 31, the CPU 29 collects four pieces of data 92 for the integrity and sub-addition for the integrity authentication sub-addition unit 432. In addition, cpU29 centrally transmits four control signals 91, which correspond to the four to be protected.
1287767 五、發明說明(38) 整性之資料92。控制信號91至少含有訊息認證金鑰(Ικ), 再者’其進一步具有上/下連結(DIRECT ION)、計數器 (COUNT-C)、使用者每次所產生之隨機數(FRESH)。cpu29 將上/下連結(direction)、計數器(C0UNT-C)、使用者每 次所產生之隨機數(FRESH)當成控制信號91,將四個資 ,送至緩衝器66 0。此外,在訊息認證金鑰(ΙΚ)方面,亦 可將^別對應於四個資料的四個訊息認證金鑰(ΙΚ)傳送至 ! : : 6 6 0 ’在訊息認證金鑰(j κ )對四個資料為共通的固 =息認證金鑰(ΙΚ)可不被記憶於緩衝器66〇内而 置接輸入完整性認證子產生器67〇中。 號來信ΐ9·!:透過匯流排90的控制信號線當成控制信 Ϊ。:=。隹二和四個資料-起被傳送,或另外傳 二ί PU29集中傳送四個資料或四個控制;Γ“ 由,傳送指令來傳送四個資料或四個控制二,係九 作分散處理而作統一二個:二或「「對複數個物件不 減:CPU29或各處理器的負擔仃個广令」’可 不作分散處理而作統—處 —卜以對複數個物件 入,可減少匯流排90或各傳4:路了 J來傳送或輸出輸 送次數。 (未顯示於圖面).的傳 緩衝器6 60使資μ t “ ^ 料。完整性認證子產生H =號相對應’記憶該對應資 生15 670輸入對應資料,根據控制信 2112-3909-1^^1(1 第41頁 1287767 五、發明說明(39) 號產生資料的完整性認證子。完整性認證子產生器67〇使 用既定之運算法分別從四個對應資料產生四個完整性認證 子’集中輸出於完整性認證子附加器680。完整性認證子 產生器670在此產生四個32位元長度之完整性認證子。完 整性認證子附加器6 8 0分別於各資料上附加四個完整性認 證子,根據一個傳送指令傳送至CPU29。 在完整性認證子附加部4 3 2輸入四個2 5 6位元長度之資 料的情況下,完整性認證子附加部432會將(256 + 32 ) X 4位 元之資料傳回CPU29。 另一方面,四個附加完整性認證子之資料集中輸入於 完整性確認部4 3 3中。此外,四個控制信號91亦被集中輸 入。如前所述,訊息認證金鑰(IK)可被記憶於緩衝器661 中,亦可直接輸入至完整性認證子產生器6 71中。 緩衝器6 61使這四個資料對應,記憶該對應資料。完 整性認證子產生器671讀取四個記憶於緩衝器66 1之對應資 料使用和傳送一方之完整性認證子產生器67〇相同的運算 法來產生四個完整性認證子。完整性確認器681分別比較 附加於四個資料上且被輸入的四個完整性認證子和完整性 認證子產生器6 7 1所產生之四個完整性認證子,當其一致 時,可確認其完整性並將正常的回應傳回。 在完整性碟認部4 3 3輸入四個2 5 6位元長度之資料和四 個32位元長度之完整性認證子((256 + 32)位元x 4)的情 況下’元整性確遇1§681將1位元X 4的回應傳送至CPU29。 一般習知,各資料會從CPU29到完整性保護處理部43〇1287767 V. INSTRUCTIONS (38) Information on integrity 92. The control signal 91 contains at least a message authentication key (Ικ), and further has a DIRECT ION, a counter (COUNT-C), and a random number (FRESH) generated by the user each time. The cpu 29 treats the upper/lower link (direction), the counter (C0UNT-C), and the random number (FRESH) generated by the user as the control signal 91, and sends the four resources to the buffer 66 0 . In addition, in the case of the message authentication key (ΙΚ), the four message authentication keys (ΙΚ) corresponding to the four materials can also be transmitted to ! : : 6 6 0 'in the message authentication key (j κ ) The common authentication key (ΙΚ) for the four data may be placed in the input integrity authentication sub-generator 67 without being memorized in the buffer 66. Letter No. 9:!: The control signal line through the busbar 90 serves as a control signal. :=.隹 two and four data - from the transmission, or another transmission ί PU29 centralized transmission of four data or four controls; Γ "by transmitting instructions to transmit four data or four control two, nine for distributed processing To make two uniforms: two or ""For a number of objects without deduction: CPU29 or the burden of each processor is a large order"" can be done without decentralized processing - in order to enter a plurality of objects, can be reduced Bus 90 or each transmission 4: J to transmit or output the number of transmissions. (not shown in the drawing). The transmission buffer 6 60 enables the resource to be generated. The integrity authentication sub-generation H = number corresponds to the memory corresponding to the corresponding student 15 670 input corresponding data, according to the control letter 2112-3909- 1^^1(1 Page 41 1287767 V. Inventive Note (39) The integrity of the generated data is verified. The integrity verification sub-generator 67 uses the established algorithm to generate four integrity from four corresponding data. The authenticator 'is centrally output to the integrity authentication sub-adder 680. The integrity authentication sub-generator 670 generates four 32-bit length integrity authenticators. The integrity authentication sub-adder 6 8 0 is on each data. Four integrity authentication sub-assemblies are transmitted to the CPU 29 according to a transfer instruction. In the case where the integrity authentication sub-addition unit 43 2 inputs four pieces of data of 256-bit length, the integrity authentication sub-addition unit 432 will The data of (256 + 32) X 4 bits is transmitted back to the CPU 29. On the other hand, the data of the four additional integrity authenticators are collectively input into the integrity confirmation unit 43 3 . In addition, the four control signals 91 are also concentrated. Input. As mentioned above, the message The authentication key (IK) can be stored in the buffer 661 or directly input into the integrity authentication sub-generator 61. The buffer 6 61 associates the four data and memorizes the corresponding data. The generator 671 reads the four algorithms of the corresponding data stored in the buffer 66 1 and the integrity authentication sub-generator 67 of the transmitting side to generate four integrity authenticators. The integrity validator 681 compares the additions respectively. The four integrity authenticators and the four integrity authenticators generated by the integrity authentication sub-generators 671 on the four data, when they are consistent, can confirm their integrity and will respond normally. In the case of the integrity disc recognition section 4 3 3 input four 256-bit length data and four 32-bit length integrity authenticators ((256 + 32) bits x 4) The integer integrity 1 § 681 transmits the response of the 1-bit X 4 to the CPU 29. Generally, the data is from the CPU 29 to the integrity protection processing unit 43.
2112-3909-PF.ptd 第42頁 12877672112-3909-PF.ptd Page 42 1287767
進行資料的傳送,相對地,如圖31所示,由於四個資料被 集中起來一次傳送,提高了匯流排90的使用效率。亦即, 可減少匯流排90的等待時間。此外,可減少匯流排9〇 位競爭。 下 圖31雖顯示了四個資料被集中起來一起傳送的情況, 該個數事實上不限於四個。此外,緩衝器的資料儲存個 亦不限於四個。 此外,資料的位元長度不限於2 56位元。例如可為51 2 位元或5114位元。此外,緩衝器66〇,661的大小可為資料The data is transmitted. In contrast, as shown in Fig. 31, since the four materials are collectively transferred one at a time, the use efficiency of the bus bar 90 is improved. That is, the waiting time of the bus bar 90 can be reduced. In addition, it can reduce the 9-bit competition of the bus. Figure 31 below shows the case where four materials are collected together, and the number is not limited to four. In addition, the data storage of the buffer is not limited to four. In addition, the bit length of the data is not limited to 2 56 bits. For example, it can be 51 2 bits or 5114 bits. In addition, the size of the buffer 66 〇, 661 can be data
位元長度和控制信號位元長度之和的兩倍以上。亦即,可 記憶兩個以上的對應資料。例如,當此系統所指定之資料 位元長度的最大值為5114位元時,緩衝器660, 661的大小 最好分別為(5 1 1 4位元+控制信號的位元長度)χ 2。 圖3 2顯示無線通信控制部2 〇和完整性保護處理部4 3 〇 的其他範例。圖32所示之完整性保護處理部43〇具有完整 性認證子產生部434,435。 ’、More than twice the sum of the bit length and the length of the control signal bit. That is, more than two corresponding materials can be memorized. For example, when the maximum length of the data bit length specified by the system is 5114 bits, the sizes of the buffers 660, 661 are preferably (5 1 1 4 bits + bit length of the control signal) χ 2. Fig. 3 2 shows another example of the wireless communication control unit 2 and the integrity protection processing unit 43 3 . The integrity protection processing unit 43A shown in Fig. 32 has integrity authentication sub-generation sections 434, 435. ’,
圖3 2和圖3 3的相異點為,完整性認證子附加器6 8 〇和 完整性確認器681不設於完整性保護處理部43〇内,而產生 器670對設於無線通信控制部2〇内。在圖32的情況下,藉 由來自CPU29的一次傳送指令,完整性認證子產生器67〇針 對完整性認證子附加器6 71傳送四個完整性認證子。另一 方面,完整性認證子產生器671藉由來自CPU29的一次傳送 指令將四個完整性認證子傳送至完整性確認器⑼1。 在圖3 2的情況下,從完整性認證子產生器6 7 〇到完整The difference between FIG. 3 and FIG. 3 is that the integrity authentication sub-adder 6 8 and the integrity validator 681 are not provided in the integrity protection processing unit 43, and the generator 670 is disposed in the wireless communication control. Department 2 inside. In the case of Fig. 32, the integrity authentication sub-generator 67 transmits four integrity authenticators to the integrity authentication sub-adder 61 by a single transfer instruction from the CPU 29. On the other hand, the integrity authentication sub-generator 671 transmits four integrity authenticators to the integrity validator (9) 1 by a single transfer instruction from the CPU 29. In the case of Figure 32, from the integrity authentication sub-generator 6 7 to the complete
2112-3909-PF.ptd 第43頁 1287767 五、發明說明(41) 性認證子附加器680的匯流排90資料傳送量為32位元χ 4。 此外,完整性認證子產生器671的匯流排9〇資料 為32位元χ 4。 從圖32之完整性保護處理部43〇到無線通信控制部2〇 的資料傳送量如圖31所示,不需要從完整性認證子產生器 670傳回至完整性認證子附加器68〇,所以 回資料傳送量,已有大幅的削減。 圓之傳 此外’圖32所示之完整性保護處理部43〇的完整性認 證產生部434和完整性認證子產生部435為相同構造,所"以 可合而為一。 此外,圖31和圖32雖顯示匯流排9〇的資料傳送處理、 緩衝器660, 661的輸出入處理、完整性認證子產生器67〇, 6 71的認證子產生處理、完整性認證子附加器6 8 〇的認證子 附加處理、完整性確認器6 8 1的確認處理為複數個資料的 「集中處理」,從CPU29和匯流排90的使用效率來看,最 好匯流排90的資料傳送處理或資料接收處理中至少其中一 邊進行「藉由一個指令」的處理或「對複數個物件不作分 散處理而作統一處理」。 此外’在圖31和圖3 2中的其中一個情況下,完整性確 認子產生器6 70、完整性確認子產生器671、完整性確認子 附加器680和完整性確認子附加器681可透過硬體來實現, 透過軟體來實現,或透過硬體和軟體的組合來實現。 圖33顯示加密部422的其他構造。 圖3 3顯示設置有複數個緩衝器且使用開關g ψ切換的情2112-3909-PF.ptd Page 43 1287767 V. INSTRUCTIONS (41) The bus 90 transmission amount of the sex authentication sub-adder 680 is 32 bits χ 4. Further, the bus 9 data of the integrity authentication sub-generator 671 is 32 bits χ 4. The data transfer amount from the integrity protection processing unit 43 to the wireless communication control unit 2 of FIG. 32 is not required to be transmitted from the integrity authentication sub-generator 670 to the integrity authentication sub-appendator 68 as shown in FIG. Therefore, the amount of data transferred has been greatly reduced. Further, the integrity verification generating unit 434 and the integrity authentication sub-generating unit 435 of the integrity protection processing unit 43 shown in Fig. 32 have the same configuration, and the combination is one. Further, Fig. 31 and Fig. 32 show the data transfer processing of the bus bar 9〇, the input/output processing of the buffers 660, 661, the authentication sub-generating unit 67〇, the authentication sub-generation processing of the 61, 71, and the integrity authentication sub-addition. The authentication processing of the authentication sub-addition processing and the integrity validator 861 is a "central processing" of a plurality of data. From the viewpoint of the use efficiency of the CPU 29 and the bus 90, it is preferable that the data transmission of the bus 90 is performed. At least one of the processing or the data receiving processing performs the processing by "one instruction" or "the unified processing is performed without dispersing the plurality of objects". Further, in one of the cases of FIG. 31 and FIG. 32, the integrity confirmation sub-generator 66, the integrity confirmation sub-generator 671, the integrity confirmation sub-adder 680, and the integrity confirmation sub-adder 681 are permeable. Hardware implementation, through software, or through a combination of hardware and software. FIG. 33 shows another configuration of the encryption unit 422. Figure 3 3 shows the setting of multiple buffers and switching with the switch g ψ
2112-3909-PF.ptd 第44頁 1287767 五、發明說明(42) -- 況。開關SW可藉由邏輯頻道識別子來切換。亦即,當邏輯 頻道為η個時,藉由設置0個緩衝器,可在每個邏輯頻道上 事先準備隨機數列。 圖34顯示設置^個緩衝器並設置η個互斥邏輯和運墓 路的情況。 圖35顯示設置„個緩衝器並設置複數個加密器 況。 如此,藉由準備複數個緩衝器在每個邏輯頻道上可 高速進行各個頻道的隱藏處理。 此外’雖未顯示於圓面’解碼部亦如圖33、圖34和 35所示,亦可在各個頻道上設置複數個緩衝器。此 圏33、圖34和圖35所示,亦可進-步在完整性認證 ,4。32和完整性確認部433中的每個頻道上設置複數個緩2112-3909-PF.ptd Page 44 1287767 V. Description of invention (42) -- Condition. The switch SW can be switched by a logical channel identifier. That is, when the logical channel is n, by setting 0 buffers, a random sequence can be prepared in advance on each logical channel. Figure 34 shows the case where ^ buffers are set and n mutually exclusive logics and tombs are set. Figure 35 shows the setting of „buffers and setting a plurality of ciphers. Thus, by preparing a plurality of buffers, each channel can be hidden at high speed on each logical channel. Further, 'not shown in the circle' decoding As shown in Fig. 33, Fig. 34 and Fig. 35, a plurality of buffers can also be arranged on each channel. As shown in Fig. 33, Fig. 34 and Fig. 35, it is also possible to further improve the integrity, 4.32 And a plurality of buffers are set on each channel in the integrity confirmation unit 433
Si?。 實施型態三之構造不限於圖27所例如,亦 4、圓5、圖6、圖7、圖8、圓10、圖U等所示之構 U圖4所示’藉由一個模組來進行隱藏處理和完整:】 處理。此外,亦可藉由一個模組來進行加密和解整 此外’亦可藉由一個模組來進行完整性認證子 ^。 性確認。此外,各模組可設置成複數個。 完整 f外,當緩衝器 620, 621, 66〇, 661 從 cpu29 作 存二下’可藉由記憶體位址來存取或藉由輸出入位址來 此外,於實施型態三所說明之加密裝置 、解碼裝置Si?. The configuration of the implementation type 3 is not limited to the one shown in FIG. 27, for example, the circle 5, the figure 6, the figure 7, the figure 8, the circle 10, the figure U, etc. Hidden processing and complete:] Processing. In addition, encryption and de-encryption can be performed by a module. In addition, integrity authentication can be performed by a module. Sexual confirmation. In addition, each module can be set in plural. In addition to the complete f, when the buffers 620, 621, 66〇, 661 are stored from the cpu29 'can be accessed by the memory address or by the input and output address, in addition, the encryption described in the implementation mode 3 Device, decoding device
2112-3909-PF.ptd 第45頁 !287767 一 " "" 1 五、發明說明(43) -- ,整性認證子附加部(裝置)、完整性確認部(裝置)、 完整性認證子產生部(裝置)不限使用於無線通信裝置, 亦可使用於有線通信裝置、電腦等其他電器設備上。 前述之隱藏暨完整性保護處理部4〇可由硬體來構成。 例如可藉由FPGA或定製LSI來實現。此外,隱藏暨完整性 2護處理部4 0亦由軟體來構成。在以軟體程式實現隱藏暨 a整性保護處理部40的情況下,可藉由無線通信控制部2〇 中的CPU來執行軟體程式。 此外’隱藏暨完整性保護處理部4〇可藉由結合軟體和 硬體來實現,例如可藉由DSP(Digital Signal2112-3909-PF.ptd Page 45! 287767 A """ 1 V. Invention Description (43) -- , Authenticity Certification Sub-Addition (Device), Integrity Confirmation (Device), Integrity The authentication sub-generation unit (device) is not limited to use in a wireless communication device, and may be used in other electrical devices such as a wired communication device and a computer. The aforementioned hidden and integrity protection processing unit 4 can be configured by hardware. For example, it can be implemented by an FPGA or a custom LSI. Further, the hidden cum integrity processing unit 40 is also composed of software. When the hidden and integrity protection processing unit 40 is implemented in a software program, the software program can be executed by the CPU in the wireless communication control unit 2A. In addition, the 'hidden and integrity protection processing unit 4' can be implemented by combining software and hardware, for example, by DSP (Digital Signal)
Processor)和透過DSP來執行之微程式及固件程式來會 現。 以下使用圖1 7至圖2 0說明具體例。 圖17為使用於加密暨解碼部420中之加密模組51 (或 解碼板組71 )的構造圖。 加密模組51具有金鑰排程部511和資料隨機部512。金 錄排程部511輸入一個金餘κ,產生了η個放大金鑰 ExtiH〜ExtKn。資料隨機部512藉由函數F和X0R電路產生隨 機數。函數F輸入放大金鑰並進行非線性資料轉換。 在加密模組5 1中,可使用各種區塊密碼運算法,例 如: (1) DES(Data Encryption Standard) 〇 (2) 國際公開編號W097/9705 (美國專利申請案號 08/83640 )所揭示之區塊密碼運算法jo STY。Processor) and microprograms and firmware programs executed by the DSP. Specific examples will be described below using FIGS. 17 to 200. Fig. 17 is a view showing the configuration of the encryption module 51 (or the decoder board group 71) used in the encryption and decoding unit 420. The encryption module 51 has a key scheduling unit 511 and a data randomizing unit 512. The gold record scheduling unit 511 inputs a gold remainder κ, and produces n amplification keys ExtiH to ExtKn. The data random portion 512 generates a random number by the function F and the X0R circuit. The function F inputs the amplification key and performs nonlinear data conversion. In the cryptographic module 51, various block cryptographic algorithms can be used, for example: (1) DES (Data Encryption Standard) 〇 (2) International Publication No. W097/9705 (U.S. Patent Application Serial No. 08/83640) The block cryptographic algorithm jo STY.
2112-3909-H^ptd 第 46 頁 刚述之隱藏暨完整性保護處理部4〇可藉由加密程式ο 來實現。加密程式47被儲存於R0M(Read 〇nly MemQiey)42 (記錄媒體之一例)中。加密程式4 7亦可儲存於 1287767 發明說明(44) (3) 以上述區塊密碼運算法MISTY為基礎之64位元區塊 密碼’被決定作為新生代行動電話專用國際標準密碼 (IMT2000)之區塊密瑪驗算法kasuMI。 (4) 日本專利申請案號2〇〇〇_646 14 (申請日期2〇〇〇年3 月9日)中所記載之區塊密碼運算法Came ^ ia等。 此外’在解碼模組中,亦可使用DES、MISTY、kasumi 或Camellia等之區塊密碼運算法。 圖18顯示前述之隱藏暨完整性保護處理部的安裝形 式0 圖1 8顯示於FPGA或I C或LSI中實現前述之隱藏暨完整 性保護處理部4 0的情況。亦即,前述之隱藏暨完整性保護 處理部40可由硬體來實現。此外,雖未圖示,亦可藉由印 刷電路板來實現。 圖1 9顯示由硬體來實現前述隱藏暨完整性保護處理部 40的情況。 MMUandom Access Memory)或軟碟或硬碟等其他的記錄 媒體中。此外,加密程式47亦可從伺服電腦下載。加密程 式47以子程式的形式來運作。藉由子程式,加密程式”從 儲存於RAM45的應用程式46中被呼叫並被執行。或者,加 密程式47亦可藉由卡位控制部43所處理的卡位來啟動。弋 憶體55亦可為RAM45的一部份。應用程式46、加密程式〇2112-3909-H^ptd Page 46 The hidden and integrity protection processing unit 4 described below can be implemented by the encryption program ο. The encryption program 47 is stored in the ROM (Read 〇nly MemQiey) 42 (an example of a recording medium). The encryption program 4 7 can also be stored in 1287767. The invention description (44) (3) The 64-bit block password based on the above block cryptographic algorithm MISTY is determined as the international standard code for the new generation mobile phone (IMT2000). Block MM algorithm kasuMI. (4) The block cipher algorithm Came ^ ia and the like described in Japanese Patent Application No. 2〇〇〇_646 14 (application date: March 9, 2000). In addition, block cryptographic algorithms such as DES, MISTY, Kasumi or Camellia can also be used in the decoding module. Fig. 18 shows the mounting form of the aforementioned hidden and integrity protection processing unit. Fig. 18 shows the case where the aforementioned concealment and integrity protection processing unit 40 is realized in an FPGA or an I C or an LSI. That is, the aforementioned hidden and integrity protection processing section 40 can be implemented by hardware. Further, although not shown, it can also be realized by printing a circuit board. Fig. 19 shows the case where the aforementioned concealment and integrity protection processing section 40 is realized by hardware. MMUandom Access Memory) or other recording media such as floppy or hard disk. In addition, the encryption program 47 can also be downloaded from a servo computer. Encryption 47 operates as a subroutine. By means of the subroutine, the encryption program is called and executed from the application 46 stored in the RAM 45. Alternatively, the encryption program 47 can also be activated by the card bit processed by the card slot control unit 43. Is part of RAM 45. Application 46, encryption program
VV
2112-3909-1^^1(1 第47頁 1287767 五、發明說明(45) 為藉由CPU41來執行的程式。 圖20顯示透過無線通信控制部2〇所運作之應用程式46 呼叫出加密程式47的機制。 應用程式46將金餘K、初值IV、普通文字μ和密碼文字 c當作參數來呼叫加密程式47。加密程式47輸入金鑰κ、初 值IV和普通文字Μ ,然後傳回密碼文字c。當加密程式47和 解碼程式47為同一個時,金鑰κ、初值IV、密碼文字c和普 通文字Μ被當作參數來呼叫加密程式ο。 此外,雖未圓示,亦可藉由數位信號處理器以及使用 該數位信號處理器來讀取並執行的程式來實現加密程式 4 7。亦即,亦可結合硬體和軟體來實現加密程式4 7。 圖18圖、圖20主要在說明加密的情況,亦可以同 樣的方式來解碼。 % 躺办匕8及圖1 9所示之加密型態及解碼型態可根據機器種 來女裝。例如,可安裝於個人電腦、傳真裝置、行動 話、錄放影冑、數位相機、電視攝影機等所有電化設備 ^。特別是可發揮此實施型態中的特徵如 :解碼來自複數個頻道的資料。或者,可有效地 數個使用者的資料以隨機的型態到達並加冑,或者,可有 = 使用者的資料以隨機的型態產生並以即 少於欲加密解叙亦即…來加密解碼的裝置數 ϊϊ:,有效。例如,在必須支援許多用戶電腦的 肩收發眾多行動電話機傳來之資料的基地 2112-3909-PF.ptd 第48頁 1287767 、發明說明(46) 口 電路控制器等上面,前述之加密方式和解碼方式非常 有效。 、,此外,前述之範例顯示以平行介面連接的情況,其中 該平行介面經過無線通信控制部2 0和隱藏暨完整性保護處 理^40 ’不過亦可使用序列介面。此外,雖然顯示了終端 IF 4 1 0和隱藏暨完整性保護處理部4〇及無線通信部3〇和隱 ,暨完整性保護處理部4 〇以序列介面連接的情況,為了進 行更馬速的處理,也可以不使用序列介面而使用平行介 面0 此外’圖9、圖1〇顯示隱藏處理部46〇設置於隱藏暨完 整^保遵處理部40内部的情況,但隱藏處理部46〇從隱藏 暨το整性保護處理部4〇獨立至外部,隱藏處理部46〇亦可 •又於終端IF部1 〇和無線通信部3 〇之間。 產業上之可利用性: 先保1在前述之實施型態、’由於使用緩衝器來事 貝料’所以可高速進行隱藏處理和完整性保 -數ΪΤ ’用來作隱藏處理和完整性保護處理的資料傳送 -人數減少,所以可減輕CPU和匯流排的負擔。 i —软ΐ外,藉由上述實施型態,可根據頻°道數和資料量在 處理部的内部設置複數個隱藏處理部和J數個 兀整性保護處理部,進行平行同步的高速處理。2112-3909-1^^1 (1 page 47 1287767 V. Description of the invention (45) is a program executed by the CPU 41. Fig. 20 shows an application program 46 that is operated by the wireless communication control unit 2 to call out the encryption program. The mechanism of the program 46 applies the Jin Yu K, the initial value IV, the normal text μ, and the password text c as parameters to call the encryption program 47. The encryption program 47 inputs the key κ, the initial value IV, and the normal text Μ, and then transmits The password cipher text c. When the encryption program 47 and the decoding program 47 are the same, the key κ, the initial value IV, the cipher text c, and the normal text Μ are used as parameters to call the encryption program ο. Further, although not shown, The encryption program 47 can also be implemented by a digital signal processor and a program that is read and executed using the digital signal processor. That is, the encryption program 47 can also be implemented by combining hardware and software. Fig. 20 mainly illustrates the case of encryption, and can also be decoded in the same manner. The embossed type and the decoded type shown in Fig. 8 and Fig. 19 can be worn according to the type of machine. For example, it can be installed on an individual. Computer, fax device, action, recording and playback All the electrochemical devices such as video cameras, digital cameras, and television cameras. In particular, features such as decoding data from a plurality of channels can be utilized, or data of several users can be effectively used in a random type. The state arrives and is crowned, or, there may be = the user's data is generated in a random pattern and is less than the number of devices that are to be encrypted and decoded, that is, ... to encrypt and decode: valid. For example, many must be supported The base of the user's computer receives and transmits information from a variety of mobile telephones. 2112-3909-PF.ptd Page 48 1287767, invention description (46) Port circuit controller, etc. The above encryption method and decoding method are very effective. Furthermore, the foregoing examples show the case of connecting in parallel interfaces, wherein the parallel interface passes through the wireless communication control unit 20 and the hidden and integrity protection process 40' but a sequence interface can also be used. Further, although the terminal IF 4 1 is shown 0 and the hidden and integrity protection processing unit 4 and the wireless communication unit 3 and the hidden integrity protection processing unit 4 are connected by a serial interface, in order to For the processing of the horse speed, the parallel interface 0 may be used without using the sequence interface. In addition, FIG. 9 and FIG. 1 show that the hidden processing unit 46 is disposed inside the hidden and complete processing unit 40, but the hidden processing is performed. The unit 46〇 is independent from the hidden and το integrity protection processing unit 4, and the hidden processing unit 46 can be connected between the terminal IF unit 1 and the wireless communication unit 3 。. Industrial availability: In the foregoing implementation mode, 'the use of buffers to handle the billet', the high-speed conceal processing and integrity guarantees - the data transmission used for the concealment processing and the integrity protection processing - the number of people is reduced, Therefore, the burden on the CPU and the bus bar can be alleviated. In addition to the above-described embodiment, a plurality of hidden processing units and J number of uniformity protection processing units can be provided in the processing unit according to the number of channels and the amount of data, and high-speed parallel synchronization can be performed. .
2112-3909-PF.ptd 第49頁2112-3909-PF.ptd第49页
Claims (1)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW90108273A TWI287767B (en) | 2001-04-06 | 2001-04-06 | Encryption device and method, decryption device and method, integrity authentication code generation device and method, integrity authentication code auxiliary device, integrity recognition device, and wireless communication device |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW90108273A TWI287767B (en) | 2001-04-06 | 2001-04-06 | Encryption device and method, decryption device and method, integrity authentication code generation device and method, integrity authentication code auxiliary device, integrity recognition device, and wireless communication device |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| TWI287767B true TWI287767B (en) | 2007-10-01 |
Family
ID=39201766
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW90108273A TWI287767B (en) | 2001-04-06 | 2001-04-06 | Encryption device and method, decryption device and method, integrity authentication code generation device and method, integrity authentication code auxiliary device, integrity recognition device, and wireless communication device |
Country Status (1)
| Country | Link |
|---|---|
| TW (1) | TWI287767B (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TWI486809B (en) * | 2009-06-30 | 2015-06-01 | Axis Ab | Method for restricting access to media data generated by a camera |
-
2001
- 2001-04-06 TW TW90108273A patent/TWI287767B/en not_active IP Right Cessation
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TWI486809B (en) * | 2009-06-30 | 2015-06-01 | Axis Ab | Method for restricting access to media data generated by a camera |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP4464046B2 (en) | ENCRYPTION DEVICE, DECRYPTION DEVICE, AND RADIO COMMUNICATION DEVICE | |
| TW498638B (en) | Wireless communication device and wireless communication method | |
| CN104333455A (en) | Secrete communication system and method for smart phone | |
| JPH05227152A (en) | Method and device for establishing privacy communication link | |
| CN101951601A (en) | Method and system for encrypting voice calls in mobile communication network, terminal and network side | |
| KR20140087036A (en) | dynamic encryption method | |
| WO2010116845A1 (en) | Key information management method, content transmission method, key information management apparatus, license management apparatus, content transmission system, and terminal apparatus | |
| JP2002341761A (en) | Method and device for security of communication information in cdma radio communication system | |
| JP4615128B2 (en) | Voice and data encryption method using encryption key split combiner | |
| TWI287767B (en) | Encryption device and method, decryption device and method, integrity authentication code generation device and method, integrity authentication code auxiliary device, integrity recognition device, and wireless communication device | |
| CN106533686A (en) | Encryption communication method and system, communication unit and client | |
| CN1707993A (en) | Universal microphone for secure radio communication | |
| CN1688171A (en) | Apparatus and method for implementing data safety transmission of mobile communication apparatus | |
| El Bakry et al. | Implementation of a hybrid encryption scheme for sms/multimedia messages on android | |
| AU2005201858B2 (en) | Authentication apparatus | |
| KR20060103289A (en) | Integrity authenticator device | |
| KR100607464B1 (en) | Data encryption method in wireless communication environment | |
| Nori | Improving Security Using Cryptography Based on Smartphone User Locations | |
| Lewis | Mobile phone security specializing in GSM, UMTS, and LTE networks | |
| JP2001203688A (en) | Voice communication terminal | |
| TWI387294B (en) | Wireless data security transmission system with zigbee chips | |
| JPWO2001049058A1 (en) | Wireless communication device and wireless communication method | |
| MXPA01008590A (en) | Radio communication device and radio communication method | |
| JP2004205694A (en) | Encryption system and method | |
| Adida et al. | 6.115 KryptoPhone Project Proposal |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| MM4A | Annulment or lapse of patent due to non-payment of fees |