CA2123199A1 - Cryptographic apparatus and method for a data communication network - Google Patents

Cryptographic apparatus and method for a data communication network

Info

Publication number
CA2123199A1
CA2123199A1 CA002123199A CA2123199A CA2123199A1 CA 2123199 A1 CA2123199 A1 CA 2123199A1 CA 002123199 A CA002123199 A CA 002123199A CA 2123199 A CA2123199 A CA 2123199A CA 2123199 A1 CA2123199 A1 CA 2123199A1
Authority
CA
Canada
Prior art keywords
key
data
packet
bit
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002123199A
Other languages
French (fr)
Inventor
Ernest Stewart Lee
Philip Martin Thompson
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2123199A1 publication Critical patent/CA2123199A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information

Abstract

A data transmission network (12) has a plurality of computers (14) interconnected by a transmission channel (12). The computer communicates with the channel through a security device (16) which encrypts and decrypts data. The device uses a key packet distributed over the network from which a new key is derived by using the encryption process within the device. The encryption process makes use of a data sequence or "secret" peculiar to each domain so that the key generated in the domain is also peculiar to that domain. The key is changed as the encryption proceeds and upon completion of the data transmission. Each device periodically generates a new key for distribution over the network.

Description

WO 93/09627 PCT/CA92/O~K

CRYPTOGRAPHIC APPARATUS AND METHOD FOR
~ A ~a$~ ~OMMUNICAT~Q~ ~WORK

The present invention relates to a method and apparatus for encrypting and transmitting data.
It is well-known to transfer data ~etween computers or other hosts over data communication channels. Such hosts are arranged in networks and allow transfer of data between a specific pair of hosts or to all hosts in the network according to established protocols.
It is often desirable to ~ransmit sensiti~e data on such A n~twork and therefore the network must be made secure, for example by limiting access to the hosts.
Alternatively,~data ~ay be encrypted prior to tr~nsfer so that~even if;access~to the network is obtain~d, any data intercepted is~nct meaningful.
Various techniques are known for encrypting data, many o f which~require a~correlation be~ween an encrypting oper~tion per~ormed on the data ~8 it is generat-d~a~d~ d~crypting~operation performed by the recipient. ~o~d ie~e~this~correlation, it i~ u~ual to provlde k~y-~th~t~ar- used in ~;;mathomAt~c~l oper tion performed on the~data.~Some techn~iques, su h as public : ~ 25 key system~, utiliz- different keys at the s~nder and rec~pi~nt but then~requir~ multipl- ~tDns~r3 to achieve a~cure tran~mi-sion~. Such a~technaque, however, reduces the over-ll;~data transf-r capacity of a network and ~would not be;co~patible with exi~stlng communication protocols.
~ ~ :

:: :
:
:

`9UE~S~ITUT~ SHE~T
2 12 PCT/CA42/0~6 Other techniques utilize an identical but secret key at each host in the security domain. This permits data to be transferred with a single transmission. However, to provide the neaessary degree of security, it is preferable to change the key periodically so that a prolonged observation of the encrypted data sufficient to yield the key is not possible. ~ ~
The provision of a new key to each of the hosts , ;~ 10 in a domain must be acoomp1ished in a secure manner;
otherwise, the encrypted data~becomes vulnerable. It has been proposed to dlstribute keys manually, i.e. utilize secure couriérs~to~provide a new key to users of the network but~this~is;time-consuming, expensive and ~15 prouides too;~long a period~between updates.
An~alternative technique is to generate a key from a central~unit and~;transmit~it over the network.
Th1s~, however,~requ1res the transmission to ~e secure and requires~the c~entral~ unit~to~be operational at all times.
A failure~;oP~the~central~ unit~disables the generation of new~keys and may~render~the domain vulnerable.
It~is~therefore~an~object of the present invention to provide~a method and apparatus for encrypting~data~that is~oompatible with existing 25~ communication protocols and~may be utilized within a network environment.

~:

WO93/~K27 2 1 2 3 1 9 9 rcT~cA92/o~u6 It is a further o~ject to provide a method and apparatus for generating keys on a periodic basis for use in the network.
In general terms, the present invention provides a security device at each host in a security domain Which Uses a key in combination with a specific mathematical function to provide an encrypting bit stream as data is received. ;The bit stream is then used in an enorypting funation to enCrypt and~decrypt data as it is :
receiYed~ AS the encryption proceeds, the key is modified by the mathematicàl function to generate the encrypting bit~stream.~
In the~preferred~embodiment, the mathematical function includes~a~register containing a secure, secret ;15 ~bit sequenoe.~ ~The key is used~to~generate an address for the~register and~extrac~t~the~Gontents of the register for use in the mathematical function.
To transmit new keys, each device may generate a~data~packet~that~is~used in~part as the key and in part 20~- as-the~data in~an~encryption~process. The resulting ; en~rypted~data~ls then used~as~a~new~key. Because the new~key~has~ been~enerated~using~a "secret" peculiar to the security domain, the ~key will also be peculiar to hat domain. ~In~this~way,~keys~may~be transmitted 2~5~ without encrypti~on but~;still provide distinct unpredictable keys~in~a~particu1ar domain.

~ : :

,, : : : ~

"
:: : :

W093/ ~ 27 212 3 1 9 9 PCT/CA92/~LUh An embodiment of the invention will now be described by way of example only with reference to the accompany ~rawings, in which Figure 1 is a schematic representation of a network having a plurality of security domains;
Figure 2 is a representation of a security device used in the network of Figure 1;
: Eigure 3 is a sahematic representation of the operation of the devi:ce shown in Figure 2 to encrypt data;
Figure 4 is a schematic representation of the format of a packet distributed on the network of Figure Figurei5 is a schematic representation of the : : ~
operation of~the~device~shown:in F~igure 2 using the packet of Figure 4;~
Figure:6~is a~schematic representation, similar to Figure 3,~:~of~an~al~ternative embodiment; and Figure~7~is~a~ representation of the operation ~of the embodiment of rlg~ure,6~similar to Figure 5.

GENERAL~NETWORK ARRANGEMENT
: Referringito~Figure 1, a local area network 10 in Figure:l~comprises~a data channel 12 to permit the 25 ~ transfer of~packets~of data between a plurality of host ; computers 14,~ such~as~a computer or computer terminal.
Individual hosts~will be identlfied with alphabetic : suffixes, i.e l4a,~14b, etc. Each of the hosts 14 :

, W093/~27 2 1 ~ 3 1 ~ 9 PCT/CA92/~6 requiring a cryptographic facility is connected to the data channel 12 through a security device 16 which is operable to encrypt data transmitted by a host 14 or decrypt data received by the host 14. Those hosts not S requiring encryption, such as, for example, 14g are connected directly to the channel 12.
Data is transmitted in the channel in frames consisting of a preamble of a particular sequence of bits followed by a~data packet. The packet consists of destination address (typically 48 bits), a source , address, the pa~cket length and the information to be transmitted. The information will be followed by a cyclic redundancy;check~(CRC) of the data transmitted on the channel 12~. The format of the packet is described lS more fully below~with reference to KEY DISTRIBUTION.
The~-first bit of the destination address will indicate~whether the packet is to~be broadcast on the network or is to~be~locally dlrected to a particular ~host. ~The~exchange of data~between the host 14 and the Zo ~ security device~l6~and between the device 16 and the channeL l2;is~regulated~by~a conventional communications interface lS~ operating~on;an~established~protocol as is well known in the art and will not be described further.
Eaoh;:of thc~devices 16 performs a similar ~cryptographio~operati~on~on the data. However, to divide the network~lO into~a plura~lity of distinct security ~;~; domains l8a,18b~ ndicated by chain~dot lines, the encryption keys used in the devices 16 of each domain 18 : ~ :

W093/09627 2 1 2 3 1 9 9 PCT/C~92/0~W6 are different. Thus~ encrypted data may be sent between hosts 14 of the same domain and will be received by hosts of different domains. However, these o~her hosts will not decrypt the data correctly. -Each of the devices 16 operates in a similar manner and therefore its operation in encrypting and decrypting data will be described in detail first.
Thereafter, the interaction of the devices within the network will be described.

THE ENCRYPTION PROCESS
Referring to Figure 2, each of the devices ~6 includes an encryption module 20 having a key register 22 which stores a 128 bit encryption key. At any given time, the key is identical in each operable device 16 in the same security domain 18. As will be explained, the key will be~changed periodically within the domain and will also change~ as the encryption proceeds. Because the key is changed~perlodically, a 32 bit key sequence number is associated~with each~key and stored in a register 25.
The encrypt~ion module 20 operates under the control of~the~interfaces l5 to~intercept data flowing between the host 14~and data channel 12 to perform an encryption process so~as to encrypt and decrypt the data :
as it passes through the device 16. The device 16 also includes a key~generator~module 33 that is used to change periodically the key in the register 22 in a manner to be described below.

W093/~27 2 1 ~ 3 1 9 9 PCT/CA92/~

As best æeen in Figure 3, the key stored in register 22 is used by each of a pair of parallel processing paths in each device 16 indicated as "B" and "L". However, only one path will be described in detail, as the processing is identical in both.
The bits of register 22 are initially transferred into an active register 23 where they are subdivided into discrete groups to provide 16 8-bit addresses, Ao to A15. Each address A contains an 8-bit word formed from 8 successive bits of the key in register 22.
A l~x~256 bit register 24 is associated with each of the addresses A which together provide a primary memory 25. Each register 24 uses a respective one of the 8-bit words from the active re~ister 23 as its read address. The~256~bit sequence~ in each register ~4 in the primary memory~25~is~maintained secret prior to and after installation.~ In general, the sequence in a register 24 is~d~ifferent~to~any~other bit sequence in the other registers 24 of~the~same prlmary~memory 25. In ; particular,~the~bit sequence ln the register 24 in path B
associated with~addres~s~ An ~wi~ in general, be different to the corresponding register 24 in path L. However, the , :: ~ , bit sequence in~corresponding;registers 24 in different 25~devices 16 in~the~same domain l8 will be the same. Thus, the bit sequenoe~ln~register 24~in path~B associated with address A0 in devlce~16a will be identical to the bit ::
:
:
~ , ;

W093/09627 212 319 9 PCT/CA92/0~#K
~. ~

~equence in register 24 in path B associated with address Ao in devices ~6c,16d.
Each register 24 outputs a single bit contained .
at the address corresponding to the bit sequence in the associated address A so that a total of 16 bits are outputted by registers 24 of primary memory 25. The 16 bits are grouped into two 8-bit words and each is used as the address for a respective 1 x 256 bit register 26 which together form a secondary memory 29. The bit sequence in each of the registers 26 in the same device is in general different and secret. However, it is identical to the corresponding register 26 in the secondary memory 29 in all other devices 16 of the same domain 18.
lS Each of the registers 26 outputs a single bit indicated as P,Q corresponding to the address designated by t~e 8-bit word. A palr of PQ bits is similarly generated from the:parallel processing path L and each ~pair of bits is applied to:a switch 27 which selects one ~: 20 of the pair of P,Q bits. If the d~estination address : : indicates that the~packet is to be broadcast, the output of path B is selected, and conversely a local destination address ensures that path L is selected. The bits selected by switch~;27 are applied to an exclusive OR
function 28 which generates a single ou~put bit identified as FEK and used to encrypt incoming data.
The FEK bit is applied as one input to an exclusive OR (XOR) function 30. A bit of the data stream W093/ ~ 27 2 1 2 3 1 9 9 PcT/cAg2/n~K
g received at the device 16 from associated host 14 to be encrypted is applied to the other input of XOR function 30 so that the output is encrypted data that is the product of the exclusive OR function of the FEK bit and the data. The encrypted bit is then transmitted from the device 16 to the channel. 12.
The selected P and Q bits are also applied to a 2 x 4 truth table 32. Table 32 produces a different 4-bit output for each combination of P and Q. Thus, if P
and Q are both 0, the 4-bit output may be 1010, whereas if P is 1 and Q~is 0, the output may be 0110. It is preferred that output combinations having two l's and two O's are used.~ :
:;: . The output:of table:32 is replicated 4 times and distributed~through a~128-bit sequence that is stored in an adder 34.~ Adder; 34~ is used:to increment the active register 23 so~that~each~8-bit cel;l of the register 23 : will~be~incremented~;by one~bit of the output of table 32.
; Thus, ~if the~output~:of~truth table 32 is OllO, the bits 20~ ~in address A~ ~ 4 7 8 11 ~5~:~wi~1l not~be~changed but the bits in address~Al2s691013~4~will be~incremented by 1. In the event~that;~an,addrèss~ A, that~has:~àll l's is incremented, its value will-reset to all O's with no overflow.
Provided output~combinations with an equal distribution 2~5~ of l's and 0's~are~used ln:Tab~e 32, the bit sequence in half of the addresses~:~A in the key will change and produce a~new~key~in~thè active register 23.

:

W093/~27 2 1 2 3 1 9 9 PCT/CA92/0~6 The generation of a new FEK bit then proceeds using the new key in acti~e register 23, and is XOR'd with the next bit of data. The entire packet is encrypted with successive FEK bits in this way, starting S at the second bit of the destination address and proceeding until the last bit of the CRC, which is the last bit o~ the packet. The first bit of the destination address is not encrypted. It is used to indicate whether the B path ("l"j or the L path t"Q") was used to generate the FEK bits.
Finally, the encrypted packet has appended to it a CRC field so that the encrypted packet will seem normal to any computers, such as 14g of Figure 1, that does not connect to the network 12 through a security device 16. This extra CRC has no other purpose. It is ignored by the security devices 16 that receive the frame containing the;packet.
The encrypted~frame is composed of a preamble ~followed by the encrypted packet and the appended CRC.
This encrypted frame is transmitted on the channel 12 in the normal way that unencrypted frames are transmitted.
The same process is used to decrypt the data as it is received by a security device 16 in the same domain on the channel 12. If a meaningful decryption can be 2~ made, the key in register 22 will correspond to the key first used to encrypt a bit of the packet. The FEK bit initially generated by the key will therefore correspond to the FEK bit initially used to encrypt the data. By W093/o9627 212 31 9 9 PCT/CA92/0~6 XOR'ing the incoming encrypted data bit with the same FEK
bit, the original data is obtained. Since the XOR
functicn is reversible by a second encryption with the same key, the original bit stream results after the decryption provided the contents of the secret registers Z4,26 are the same in the decrypting device as they were in the encrypting device.
An attempt to decrypt the data packet ~ith a device 16 ~rom another domain will not succeed as the bit sequences in the registers 24 and 26 will differ. Thus, the same key will produce a different sequence of FEKs and will not correctly decrypt the data. This will be apparent from a comparison of the CRC included in the encrypted data ~and that obtained after decryption.
lS After the encryption and decryption has been successfully completed for a packet, each 4-word span of the key stored in register 22 in each of the devices 16 is incremented by the key sequence number stored in register 25. The~newly generated key is then transferred to the active register 23 upon receipt of the next packet. . ~ ~
Thus~many packets may be encrypted from the same initial key with the key changing bit by bit within ~a packet and also changing on a packet-to-packet basis.

OPERATION WITHIN A NETWORK
The destination address of a data packet will indica~e whether the data is to be broadcast to each host ;' W093/0~627 PCT/CA92/~UK
21~31~ 12 14 within a domain or to a specific host, i.e. local transfer, within the domain.
Where the data is to be broadcast, each host 14 within the domain will receive the data decrypted by its associated device 16 and, upon completion ~f the packet, will update the key in register 22. Devices 16 associated with hosts outside the domain will also receive the data packet but an attempt to decrypt the data will result in an incorrect CRC because the secret in their broadcast path B is different.
There is an important difference in the operation of the security device 16 when it is decrypting a packet using the L path rather than the B path. In this case, the decrypted destination address that is generated bit-by-bit is compared bitwise with the network address of the associated computer 14 to which the frame containing the decrypted packet is being sent. As this bitwise comparison is taking place, the first 47 bits of the destination address of the associated computer replace~the actual destination bits of the packet and are forwarded to the computer in their place.
If the~result of the bitwise comparison shows that the decrypted destination address is exactly that of the associated computer 14, the 4Bth and last bit of its Z5 own destination address is sent to the computer, and the decrypted packet is~ sent ~it-by-bit to the computer up to but not including the CRC that was added during encryption.

W093/~627 2 1 2 3 19 9 PCT/CA92/0 ~ 6 If the result of the bitwise comparison shows that any bit of the decrypted destination address in the incoming packet differed from the corresponding bit in the network address of the computer, the 48th and last bit of the destination address that is sent to the computer is the complement of the 48th bit of the last bit of its network address, and a standard pattern of bits, one pattern bit for each incoming packet bit, is forwarded to the computer 14 instead of the decrypted packet. The standard pattern is followed by an appropriate and correct CRC at the point where the CRC
appears in the packet before encryption. The standard ~pattern is preferably chosen to make this CRC easier to compute. Once the transmission is complete, the key register 22 in all devices that have seen a complete packet with a correct CRC 16 are updated as previously described. In this way, the key in the register 22 remains the same for each device 16 in a domain even though the~ data~paoket~ lS only decrypted by one device in ; ~ 20; the doma in .

, If~ for some reason the transmission is interrupted, no change is made to the key in register 22.
As noted above, each encrypted packet includes a CRC of the~data ~as transmitted. This permits hosts 25~ without a device 16, such as host 14g, to process the packet through its interface and also permits the distribution of unencrypted packets throughout the network as may be de~sirable but only among those W093/~27 PCT/CA92/O~K
212'~19~ 14 computers not attached to the network through a security de~ice 16.

KEY DISTRIBUTION ,.
S To utilize the above encryption process, it is necessary to generate an identical key in each device 16 in the same domain 18. It is also preferable that the ,key in each domain is different. The encryption process descrlbed above is ~utilized in the periodic generation of a~new key within a domain as shown ~ in Figures 2 and 4.
The~key~generation module 3~3 in~ each device 16 ~ is used to generate periodioally a key distribution ;~ ~ packet that~is~transmitted over the data channel 12 and processed~by~the~devioes~16 in~the same domain to 5 ~ generate~a new key~in~a~anner to~be~described below a~s~suming that-~one~of~the deviaes l6 has control of the channel~12 in~a~collision-free manner. ~;
The~key distribution packet~must be compatible with normal~data~packets~ and~there~fore has a similar 20~ f~rmat. ~However~ indioators~within~the;packet are u3ed to identify~it~to~other~devices'~l6:~as a key distribution pack:et and~ensure~t~at~1t~l~5 processed~by~the module 33 to generate;the new~key.~
Thè~fo~rmat~of~a;data~ packet produced by the key Z5~ generator modùle~33~;is~shown~in Figure 4. Each packet has~ a ~minimum~ bit~length (in;this~example, 512 bits) and is~arranged~in~notional~blocks~of~bits. The packet will of course~be preceded~by a preamble as is usuaI.

: ~: : :

W093/~27 2 1 2 3 1 9 9 PCT/CA92/O~K

The first two blocks of the packet, whether used for normal data transfer or key distribution, are each 48 bits and are respectively the destination address block 35 and the source address block 36. When normal data is to be transmitted, each address block 35,36 will be a 48 bit code indicative of the destination and source computer respectively. The first bit of destination address block 35 indicates whether or not the packet is to be processed by the broadcast path B, indicated with a , "l", or by the local path L, indicated with a "0". The second bit of the~addresses~35,36 is ~sed to indicate whether or not the frame identification is under local control (1) or is a;worldwide~unique code (0). With a normal data~packet,;worldwide~unique codes will be indicated and~followed~;by~a 46-bit host computer address.
Where ~he~dat~packet~is directed to a specific address,~the~destination address block 35 would commence with OO or Ol~and ~is~fol~lowed by~a~46 bit address for the rec~ipient~host~computer~l4.~ However, if the data packet 20 ~ is to`~be~broadcast o~er the network, the destination address~block~35~would~be~constituted by a l followed by 7~bits,~typically~al1 'I'~
A source~address block 36 follows the destination address~b~lock~ 35;~and is used to indicate the 25~ origin of the~dat~a~packet.~ The source address will always~begin~with~an~"00" or~"01" and will be followed by a;46~bit identifier code~ unlquely identifying the source computer. ~ ~

: ~

: :

; W093/~27 ~ ~ ~ PCT/CA92/O~UK
212~199 1~
To distribute a new key i~ a security domain, a key distribution packet (KDP) is generated by module 33.
Module 33 has special address contents for both destination address and source address stored in.an address register 51 in the module 33 and is recognized as a key distribution packet by these contents. The destination address of a KDP could be 48 "1" bits, indicating a broadcast packet but it is preferred to use a special destination address peculiar to a KDP. The source address 36 of a KDP is a specific bit pattern, beginning with "00" and followed by a 46-bit identifier code reserved for this purpose. The 48 bits of the destination address and 46 bits for the source address can be chosen during device manufacture. They will, however, be worldwide unique to a particular network;
: that is, all the devices 16 attached to the network and intended to change their keys synchronously will be identified with the same code. Typically, this will be limited~to single:~domain.
:~ 20 The worldwide uniqueness of the identifier : ~ codes is assured:because these bit combinations are regulated by an international organization such as the IEEE. In the present case, the identifier code used as : the destination and source address will be indicative of : 25 a message originatlng at a security device 16 and therefore is a prime indication that the packet is a key distribution packet. Therefore, by using the 48-bit destination and source addresses, it is possible to WO93/~K27 2 12 3 19 9 PCT/CA92/O~WK

distinguish a key distribution packet from a normal data packet.
The packet lèngth is indicated by a 16-bit packet length block 37 which, with normal data packets, S precedes the information to be transmitted. When the packet is a key distribution packet, however, the packet length block 37 is followed by a 32-bit key sequence number block 38 derived from the key sequence register 25 :~ in encryption module 20 of the device 16 generating the ~KDP. The data: in key sequence number register 25 is . incremented by;l:for insertion in block 38 so that as the keys are updated in a domain'~l8, the key sequence number used in that~doma;in~changes in a contro~led manner. Each host computer~in~the~same domain~should be operating with 1:5 the same key~sequénce number.~;
The~key~sequence number block 38 is followed by a~:~96 bit:data~block;4:0~and a 128-bit data block 42 :::separated by~a~:flxed~;length~paddlng block 45. The data ':in blocks 40,~42,~45 is generated::pseudo-randomly by a :20 ~random:number:~:genera:tor~53 in~the~key generator module 33 in:~the~security~device~1;6~ that~originated the KDP.
The~next~;data block 4~3 is 128 bits long, also obtained from the:random number generator 53 in the security device;~16~that~originated the KDP. It is 25 ~ followed by a fixed~;length padding block 45 and a data field ¢alled:;the CRC;~frame:integrity block 44 derived by the transmittlng~security device 16 during transmission of the KDP.~
~: :

:
:~ : ::: : :

W093/~27 2 1 2 ~ 1 9 9 PCT~CA92/0~#6 As the key distribution packet is transmitted, the CRC frame integrity block 44 has to be generated and this is done by utilizing the encryption.module 20 in the generating security device. As shown in Figure 4.,. the key sequence number 38 and the data block 40, totalling 128 bits, are loaded into the key register 23. The normal FEK encryption mechanism 20 is used, with the B
path selected by switch 27, to encrypt the incoming 128 bit data block 42 and to place the 128 bit result into a holding register 50 in module 33. The contents of :
register 50 are then:transferred to:register 23, and this new key is used to encrypt data block 43. A cyclic redundancy ¢hec~ (CRC) of these encrypted bits is performed as the~encryption proceeds and is used as the :1:5 transmitted frame integrity block 44.
Data bloc~s 40,:42, 43 and 44 are separated by the fixed:length~fields~45 to allow time for processing in the:originating~and~:receiving~s;ecurity devices 16.
Thè~packet is completed by a padding block 46 20 ~to satisfy~the~minimum length~requirements of the : protocol and a~32:::bit~CRC block~48 that is generated from the~bits~of~-the~packet~as transmitted to check for error-, ~ free transmission.~ ~

25:~ KEY GENERATION
:: :: ~: : ~: : :
The~key~generator~module 33 is activated totransmit a key distr;ibution packet:under the control of a timer 62 and~attempts to gain access to the line 12.

:
.
.

~ W093/09627 2 12 3 1 9 9 PCT/CA92/O~K

Assuming that access is obtained, the key distribution packet is generated and transmitted over link 12 to be received at other security devices 16 on the channel 12.
It is identified by each of the security devices 16 as a XDP because of the bit combination of the broadcast destination address 35 and the source address block 36.
The key sequence number in block 38 is compared with that in register 25 in the receiving security device 16 and if the new key sequence number is greater than the existing one, the production~of a new key proceeds. ~f the key sequence number is~not greater than the existing one, the KDP will be ignored. Throughout *he generation of the key, the device 16~wi11 maintain a data stream to the :: :
associated host 14 to;~prevent generation of new packets from the computer~interfering with the key generation.
A similar process is followed to that used to generate~the CRC frame~integrity block 44 to generate a new key. At each of the receiving devices 16 having the :
correct~oorrelation~of ~ key seguence numbers, the new key ~sequence~number~block 38 and~data block 40 are loaded into~;the registêr~23~and~used as the active key to encrrpt the data~block~4;2.; The~resulting encrypted data ~, ~ is stored in the register S0 as the potential new key which~should correspond~;with~the contents of the register 25~50 in the generating~device 16. To check for the integrity of the~transmission and encryption, the contents of reglster 50 are transferred to the active : :
~ register 23 and;used~as the key to encrypt the data block W093/~627 21 2 3 19 9 PCT/CA92/OoUK

43. As the encryption proceeds, a CRC is performed on the 128 bîts of the block 43 and the result compared with the frame int~grity block 44. If these are identical, the transmitting and receiving security devices must have the same B path memories 24,26 contents, and assuming physical security is adequate, the receiving device 16 is in the same domain as the generating device 16 and the contents of register 50 are transferred to the register 22. The key sequence number in register 25 is also replaced by the new key sequence number and each device in the same domain is operating with a new but identical key. Thereafter, normal data may be transferred within the domain.
: : It will be noted that although the key generator data~packet~is broadcast throughout the network 10, a secure key is generated in each security domain by :
virtue of the~unique secure bit sequences used to generate the FEK bit. If a packet appears to be a KDP

: but its key sequence number is not greater than the sequence number of the key it is using, or if a packet . : ~
appéars:to be a~KDP~but the integrity block 44 does not satisfy the comparison described, or if the packet appears to be a KDP but the overall packet CRC does not ~ : work out as it::should, then some flaw has been detected ~ 25 in the packet. In all cases, invalid key sequence number, invalld integrity block 44, or invalid packet CRC, the packet is ignored and no change is made to the key register 22 or key sequence number 25.

W093/ ~ 27 2 1 2 3 1 9 9 PCT/CA92/0k~K
,~, PERIODIC GENERATION OF KEY DISTRIBUTION PACKET
AN~ INITIALIZATION
The above process assumes that a key distribution packet is ~eceived periodically and it is a particular benefit of the present system that each of the security devices 16 has the capability of generating a key distribution packet. It is, however, possible to provide a central control to generate such packets if preferred.
Because each of the devices 16 has the capability of~generating a new key, the timer 62 in key generation module has a variable countdown period to ensure that one device 16 does not monopolize generation ::
of the key distribution packets. Af~ter a particular device has gained access~to the channel 12 and ~ ~, ~ transmitted a ~new;~key~, timer 62~of that device 16 is .
reset to an initial~;period ~60-j~) seconds where ~ is an arbitrary~time;,;~;e.g~ loo~s, and j is an integer that ~initially is~zero~
~ ~ 20 ~ Each~time`a~new~key distribution~packet is ; ~ received by the~device 16 and processed by the key géneration module, a~sign~ ;also applied to the timer 62 to increase~ithe value of j by 1, i.e. decrease the interval set by-the timer 62. Thus, as other devices 16 generate key~diseribution packets, the interval set by timer 62 will progrèssively decrease and ensure that eventually its~associated~ device 16 will gain access. Of course, once~aocess~ls obtained, a reset signal resets timer 62 to the initial maximum countdown period. If a : ~

; , :
:

W093/ ~ 27 PCT/CA92/O~W~

collision is detected during transmission of the key generation packet, the timer 62 is reset to its previous value. This preserves the status of the device 16 in the key generation process and also avoids progressively decreasing intervals between unsuccessful attempts. This would tend to cram a network being utilized near its maximum capacity.
Because hosts 14 can be connected or disconnected ~rom the network at any time, it has to be recognized that after connection or reconnection, an initialization period is required before the device 16 will operate with the same key as other devices in the ;~ same domain. To mitlgate the possibility of a newly-connected host 14 from gaining~access and generating a key, the timer 62 is conditioned to calculate an `
increasing time-out~interval. At initialization, timer 62 sets~the timeout counter at ~(60~j~) seconds where ~ is - a function of~;the serial number of the unit 16 in which the module 33 is`~l~ocated~. This~will always be greater than the interval set~;by;~the counter 62 of a previously conn-cted~host 1~4~and;tberefore a~new key will be received~before~the~timer~of~the~new device counts down.
; ~ When receiving the~new key distribution packet, the discrepancy betwe-n~key~serial~ numbers is ignored and, provided the CRC~;frame~integrlty blocks 44 are the same, indicating a common domain, `the transmitted key serial number is adopted and entered in the register 2~.

:
: ~

W~93/~K27 21~ 319 9 PCT/CA92/0~U~

GENERAL.OPE~ATION
In operation, therefore, a host 14 that wishes to transmit data over the channel 12 will monitor network usage through the interfaces 15.
According to its normal protocol, it will choose a time to transmit the frame containing the packet so as to minimize interference with other such frames.
As the frame is received in the security device 16, it is encrypted by the encryption unit 20 and transmitted on the network 12. Tbe first bit of the destination address is not encrypted so that when it is received, it can be identified as a broadcast packet, encrypted through the B
path of the unit 20 or a local packet, encrypted through the L path of the FEK unit.
The received data is decrypted by the decryption unit 20 and its destination address 35 :
examined to determine if it is intended for the associated host 14. If it is, the:decrypted data passes through the communications interface lS to the host 14.
If the destination address indlcates that the message is not intended ~for the associated host 14, the packet is ignored but the~intérf~ace unit 15 maintains a data stream to the host to prevent the host requesting access to the link 12 and lnit;lating;a collision.
~ Data rece~ived by devices 16 or unprotected : hosts 14 outside the security domain of the originating host 14 will not be able to decrypt the data as the keys , ~; and the conténts of registers 24,26 will differ.

:::

WOg3/09627 212 3 19 9 PCT/CA92/0}#K

When one of the timers 62 finishes its countdown, a signal requesting access to the channel 12 is sent to the interface 15. If the data channel 12 is .
busy, the access is refused and the timer is reset to its previous value. If the data channel 12 is available, the generation of a key generation packet is initiated and transmitted over the channel 12. Devices 16 in the same domain will recognize it as a key generation packet and proceed to generate a new key as detailed above. Once I0 transmission has been completed,~ the timer 62 is reset to the maximum period and the timers 62 in each of the other devices are rest~to a~reduced interval.
It~will be seen, therefore, that the network 10 is self-sustaining in~that new~keys may be periodically generated by any of the security devices 16. The generation of diffe~rent~keys in each security domain enables a key;generator~packet~to be broadcast throughout the~network from~any~of~the~devlces without compromising the security. ~Thé~integrity~of the domain is maintained 20~ by~ensuring~that~the~devices 16~are tamperproof and do not require~modif~ication~of-~the~hosts 14 or data channel 12.~The~ encryption~algorithm~ensures progressively ; varying encryption keysithat are periodically changed and therefore, in~practical~terms,~;entirely secure.

, ~ , ALTERNATIVE CONFIGURATIONS
As desc~ribed a~ove,~ the~secrets in registers 24 a~nd 26 in broadcast~path~and~local path of domain are , :

.~ W093/ ~ 27 212 319 ~9 PCTtCA92/0~6 different to those of other domains. This means that the keys are generated on a domain-by-domain basis. In certain instances, it may be desirable to have a common key throughout a network but still retain separate-domains. The present arrangement has the flexibility toaccomodate this by providing common registers in the broadcast path of aIl domains but retaining differences between domains in the local path. The key distribution packet will then be recognized and processable by all devices 16 in the network to generate a common key provided its CRC block 44 is derived from an encryption in the B path. Even though a common key is used, secure transmission can; still occur within the domain by using the local path.
~
_COND EMBODIMENT
A further embodiment of the security device 16 is shown in Figures 6 and~7, with Figure 6 schematically illustrating its~operation durlng encryption and ~decryption, and~Figure~7~ illustrating the generation of and dist~ibution~;of~new~keys. Components having a similar function~to those described in the embodiments of Figures 1 through S will be identified with like , ~
reference numeFals~with~a suffix "a" added for clarity.

25 ~
FEK BIT GENERATION
Referring~therefore to Figure 6, an active register 23a is formed ~from three linear recurring ~;` :

W093/ ~ 27 2 1 2 3 1 9 9 PCT/CA92/O~K

~equence registers (LRS) each of which contains a portion of the key. The LRS register is a commercially available register having the facility for internal feedback connections between cells of the register and may be arranged to ensure that no repetition of the sequence within the register occurs within 232 bits. Such registers are readily available.
A first register 70 is identified as the key distribution frame (KDF) register and contains the key distribution frame sequence number that is transmitted ... ~
with a key distribution~frame as will be described in further detail below. The second register 72 is identified as a successful frame count register (SFC) and its contents are initlally derived from the transmission of a key distribution frame.~ The contents of the SFC
register 72 are~incremented after a frame has been transmitted and~ for the~ purposes of the protocol, it is assumed that the transmission of 512 bits indicates that a frame has been~transmitted successfully. The count in 20~ the~5FT registe}~72~is~incremented after each frame.
The~third register 74 is identified as the FEK
bit~count register~(FBC)~ and~its contents are also generated during distribution of a key distribution frame. The contents~of~the~FBC~registe~ 74 are incremented by l after each generation of a FEK bit so that during transmission of a frame, the contents of the FBC register 74 ~are continuously changing. A backup ; ~ register 76 stores the initial value of the FBC register W093/ ~ ~7 2 12 3 1 9 9 PCTJCAg2/O~K
~ 7 74 and reloads it after the transmission of each frame.
This is necessary as the contents of the FBC register will be incremented even if the transmission of the frame .
is terminated due to a collision with another frame and so the contents of the register 74 in one security device would differ from that in other security devices in the same domain. Accordingly, by reloading the initial value of the FBC register at the start of each frame, all devices in the domain will have the same contents for the active register 23.
The contents of the active register 23 are used to derive an address for each of the co~umns in a primary memory 25a. Each column 24a of memory 25a corresponds to a register 24 shown in Figure 3 and provides a single bit output for each~ address. The~address for each column 24a is derived from a~96~bit~address register 78 which ~;~; receives the bits~`of each of the registers 70,72,74. The bits of the registers 70 through 74 are interleaved in the primary memory~address 78 such that two bits from the register 70 a;re~fol~lowed~;~by two bits from the register 72 which~in turn is~followed~by~two bits from the register 74. Six such bits~are~ then~grouped to pro~ide a six-bit address for a respeotive register 24a. Each of the columns 24a has~a~d~istribution of l's and O's which is 2~5 ~ approximately equal;~and~each of the columns 24a has a combination that;is~secret and preferably different from any other column in the primary memory 25a. As before, ~however, each of the~columns 24a in one of the devices 16 W093~27 PCT/CA92/~K
2 1 ~l3 1 99 28 will ha~e a corresponding register 24a in another of the devices 16 in the same domain and sharing the same secret.
The output from the primary memory 25a is a 16-bit address which is used to address a 1 x 216 secondary memory 29a. The contents of the secondary ~emory 29a are also secret but identiaal with other devices in the same domain and have a substantlally equal distribution of l's and 0's within the memory. The output from the secondary memory 29a is a single FEK bit which is exclusive ORID at the XOR function 30a with incoming data. Encrypted data is then transmitted as the outgoing bit stream.
Upan successful transmission of 512 bits, a lS frame detector 80 assumes that a successful frame transmission has occurred and, upon detection of the start of the next f~rame, will increment the contents of the SFC register 72 by 1. The detection of a start frame delimiting pattern in the preamble of a frame will also reload the contents of the FBC register 74 so that the initial address in the primary memory address 78 will differ from frame to frame. The contents of the KDF
sequence number register 70 remain constant until such time as a new key is distributed over the network. It will be seen, however, that the FEK bit is generated from a dynamic key to generate the addresses for two memories, the contents of which are secret.

W093/09627 2 1 2 3 1 9 9 PCT/CA92tO~

KEY GENERATION
The generation of the key is again accomplished by any of the security devices 16 as will be described with reference to Figure 7. The format of the frame distribution packet is generally similar to that ~hown in Figure 4 and includes a preamble followed by a start frame delimiter sequence followed by a destination address 35a. The destination address 3Sa indicates that the frame is to be broadaast within the domain and is followed by a source address 36a. The source address 36a i5 derived from a register equivalent to the address register 51 in Figure 2 and identifies to the recipients of the frame ~hat the frame:is a key distribution pack~t~
The recognition of the source address 36a causes the contents of the registers 70,72,74 to be temporarily :~ stored in parallel:registers 70a,~72a,74a so that if the frame is not correctly received, the previous contents of the active reglster 23a can be restored.
:
The recognitlon:of the source address 36a a~so ;20~ initializes the~LRS 70~,72,74;so that they contain a full count of l':s.~A~pad~37a~is provided between the source ;~ address and the~KDF sequence number 38a to allow for the initialization of the registers. The KDF sequence number is the content.s~:of the~KDF register 70 incremen~ed by l : 25 and is initially compared with the:existing contents of : the register 70 to ensure that it is a valid key sequence ~ ::
:~ number. Assumlng that it is, the new key distribution ~ sequence number 38a is~loaded into the KDF register 70.

W093/~27 PCT/CA92/0~UK
2123199 ~``

The KDF sequence number 38a is a 64-bit sequence which is loaded into the register to initialize a ne~ sequence of bits in the register. This sequence will be identical for each device 16 in the same domain. The contents of the registers 72 and 74 are still all l's.
A pad is provided after the KDF and is then followed by a data field 40a. The data field 40a is a random sequence of 64 bits generated by the random number generator 53 in Figure 2. This sequence of bits is fed 0 through the XOR 30a and encrypted by a sequence of FEK
bits produced using the contents of the registers 70,72,74 to generate the addresses for memories 25a and 29a.
The first 32 bits of encrypted data are fed into the SFC register 72 to generate a new SFC. At the same time, the generation of a FEK bit from the secondary memory 82 also increments the FBC register 74 so that its contents are changlng as the~first 32 bits are fed through the XOR~gate 30a. :~
20 ~ . ~ The:next~32:bits~are also encrypted and are : exclusive: OR'D with the~FEK bit count to increment the : FBC register 74.:
: After the random data 40a has been processed, the frame distribution packet includes a pad 45a followed by a~data field~42a made up~of 512 bits generated by the : random~number generator 53. The purpose of the second data field ~2a is to check the integri*y of the frame : distribu~ion packet by means of the integrity CRC 44a W093/ ~ 27 21 2 31 !) 9 PCT/CA92/~

appended to the packet. This check is done, and indeed the ICRC 44a is generated using an ICRC generator 84 which is a 32-bit LRS register similar to that used for the registers 70,72,74. Each of the bits of the random field 42a is encrypted with the FEK bit by the XOR gate 30a and fed to the ICRC generator 84. This is initially set at a full count - that is, all l's - and is incremented by the value of the encrypted bit. -At the end of the data field 42a, the contents of the ICRC
generator 84 should match those of the ICRC field 44a.
The contents are compared, and if the patterns are identical, it is assumed that the frame distribution packet has been transmitted satisfactorily. The value of the FBC register 74~is~then stored in the FBC register 76 and the contents of the;registers 70,72,74 operate as the new key. ~
If for some~reason~the ICRCs do not match, the values in the regi~sters 70,72~,74 are deleted and the previous values temporarily~stored in registers 70a,72a,74a are~replaced until a new frame distribution packet is recognized.~
It will~of~course be understood that the generation of~a frame~distribution packet is essentially the same with;the~destination data 35a, source data 36a, ::
~ 25 key sequence number~38~a and the random data provided by the frame distribution module 33. Again, therefore, the encryption module 20a is utilized to generate a new key :: :
:

W093/~627 212 319 9 PCT/CA92/~M~K

both for transmission and for reception in each register in the same domain.
If the frame distribution packet is received in another do~ain, the primary memory and secondary memory 25a,29a will have different secrets and therefore will not generate a new key in which the ICRCs are matched.
This is because the ICRC is generated using the encryption keys that are peculiar to a particular domain.

':

: :
:

:

Claims

We claim:
1. A data communication system comprising a plurality of hosts interconnected by a communications channel to allow data transfer therebetween, at least some of the hosts having a cryptographic security device associated therewith to organize said hosts into a common security domain, said device having an encryption function operable to encrypt data transmitted through the channel to other hosts in said domain and decrypt data received through the channel from other hosts in the domain, a packet generating function to generate and distribute on said channel a key distribution packet, and a key generation function to receive said key distribution packet and generate therefrom an encryption key for said encryption function that is common to each host in said domain.

2. A data communication system according to claim 1 wherein said key distribution packet includes an identifier to distinguish said key distribution packet from other data packets and each of said devices includes means responsive to said identifier to direct said key generator data packet to said key generating function.

3. A data communication system according to claim 1 wherein said packet generating function in each device operates periodically to request access to said channel.

4. A data communication system according to claim 3 wherein said packet generating function includes a timer to determine the interval between requests for access to said channel.

5. A data communication system according to claim 4 wherein said timer is adjustable and intervals between requests progressively decrease until access to said channel is obtained.

6. A data communication system according to claim 5 wherein said interval is decreased upon receipt of a key distribution packet from another device and generation of a new key therefrom.

7. A data communication system according to claim 1 wherein said key distribution packet includes first and second portions, said first portion being utilized by said key generation function as a key in said encryption function to encrypt said second portion and thereby provide a new key for said encryption unit.

8. A data communication system according to claim 7 wherein said key distribution packet includes a check function obtained by encryption of a portion of said key distribution packet by said new key.

9. A data communication system according to claim 8 wherein said key generator packet includes a third portion to be encrypted by said new key to generate said check function.

10. A data communication system according to claim 9 wherein said first, second and third portions are generated by a pseudo random number generator within said packet generating function.

11. A data communication system according to claim 1 wherein each of said encryption functions has a key serial number associated therewith and indicative of the key utilized by said encryption function, said key distribution packet including an indicator derived from said key serial number and providing a means to associate devices utilizing a common key.

12. A data communication system according to claim 11 wherein said indicator is included in one of said portions.

13. A data communication system according to claim 6 wherein said timer is reset to a predetermined maximum upon a device associated therewith transmitting a key distribution packet to other hosts in said domain.

14. A data communication system according to claim 13 wherein said timer is set to a period exceeding said maximum upon connection of said device to said system.

15. A method of distributing an encryption key in a data communication network having a plurality of host interconnected by a data communication channel and each host having an encryption function associated therewith comprising the steps of transmitting on said network a key distribution packet, utilizing a first portion of said packet as a key in said encryption function, encrypting a second portion of said packet by said encryption function with said first portion utilized as said key and using the encrypted data as a new key.

16. A method according to claim 15 including the step of comparing a check function derived from said new key with a check function contained in said key distribution packet to confirm an identity of encryption function between a device generating said key distribution packet and a device receiving said key distribution packet.

17. A method according to claim 16 including the step of utilizing said first and second portions of said key distribution packet as a key and data respectively in said generating device to provide a new key, utilizing a third portion of said packet as data to be encrypted by said new key, deriving from the encrypted data a check function and including said check function in said key distribution packet for comparison with a check function similarly derived at said receiving device.

18. A method of encrypting data for transmission on a communication channel comprising the steps of establishing a key having a plurality of bits, grouping selected ones of said bits to provide an address for accessing a register containing data, outputting the data contained at that address, utilizing the data in a predetermined manner to provide a bit to encrypt a corresponding bit of the data to be encrypted, and modifying the key in a manner derived from the generation of the encryption bit to provide a different bit sequence at said key to generate a different address for said register when generating the next encryption bit.

20. A method according to claim 18 wherein the output from said register is utilized as at least one bit of an address for a further register, the output from the further register being utilized to generate said encryption bit.

21. A method according to claim 18 wherein a plurality of discrete groups are formed from said key and a register is associated with each group.

22. A method according to claim 21 wherein outputs of said registers associated with said groups are organized to provide an address for each of a set of further registers, each which provides an output from which the encryption bit is utilized.

23. A method according to claim 22 wherein said set of further registers includes a pair of registers each of which provides a single bit output.

24. A method according to claim 23 wherein said bits are combined to produce said encryption bit.

25. A method according to claim 24 wherein said bits are combined by an exclusive OR function.

26. A method according to claim 22 wherein said outputs are utilized to determine the modification of said key.

27. A method according to claim 22 wherein the outputs determine which of said bits of said key are to be changed.
CA002123199A 1991-11-08 1992-11-09 Cryptographic apparatus and method for a data communication network Abandoned CA2123199A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US78927591A 1991-11-08 1991-11-08
US789,275 1991-11-08

Publications (1)

Publication Number Publication Date
CA2123199A1 true CA2123199A1 (en) 1993-05-13

Family

ID=25147142

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002123199A Abandoned CA2123199A1 (en) 1991-11-08 1992-11-09 Cryptographic apparatus and method for a data communication network

Country Status (3)

Country Link
AU (1) AU2912692A (en)
CA (1) CA2123199A1 (en)
WO (1) WO1993009627A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5617424A (en) * 1993-09-08 1997-04-01 Hitachi, Ltd. Method of communication between network computers by dividing packet data into parts for transfer to respective regions
US5936955A (en) * 1993-09-08 1999-08-10 Hitachi, Ltd. Network for mutually connecting computers and communicating method using such network

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
NL9301841A (en) * 1993-10-25 1995-05-16 Nederland Ptt Device for processing data packets.
FR2717021B1 (en) * 1994-03-04 1996-04-26 Sagem Method for securing the transmission of digital data between subscribers of a packet transmission network.
FR2717972B1 (en) * 1994-03-28 1996-05-10 Sagem Method for transmitting digital data between subscribers of a packet transmission network.
AU759581B2 (en) * 1997-12-19 2003-04-17 British Telecommunications Public Limited Company Data communications
EP1382056A4 (en) * 2001-04-07 2007-06-20 Telehublink Corp Methods and systems for securing information communicated between communication devices
DE102006008032A1 (en) * 2006-02-21 2007-08-30 Siemens Ag Cryptographic protection method for connection, involves evaluating common key by two communication partners, where another key derived from former key is evaluated by communication partners and data is exchanged between two partners

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5617424A (en) * 1993-09-08 1997-04-01 Hitachi, Ltd. Method of communication between network computers by dividing packet data into parts for transfer to respective regions
US5936955A (en) * 1993-09-08 1999-08-10 Hitachi, Ltd. Network for mutually connecting computers and communicating method using such network

Also Published As

Publication number Publication date
WO1993009627A1 (en) 1993-05-13
AU2912692A (en) 1993-06-07

Similar Documents

Publication Publication Date Title
AU624507B2 (en) A method for utilizing an encrypted key as a key indentifier in a data packet in a computer network
AU629641B2 (en) Teleconferencing method for a secure key management system
US4322576A (en) Message format for secure communication over data links
Jakobsson et al. Security weaknesses in Bluetooth
US7209560B1 (en) Data communications
US4888801A (en) Hierarchical key management system
US6499108B1 (en) Secure electronic mail system
JP2879814B2 (en) Communication method
US4172213A (en) Byte stream selective encryption/decryption device
US6330671B1 (en) Method and system for secure distribution of cryptographic keys on multicast networks
US4881263A (en) Apparatus and method for secure transmission of data over an unsecure transmission channel
US4924513A (en) Apparatus and method for secure transmission of data over an unsecure transmission channel
US4638356A (en) Apparatus and method for restricting access to a communication network
JP3502200B2 (en) Cryptographic communication system
US5297208A (en) Secure file transfer system and method
JPH05227152A (en) Method and device for establishing privacy communication link
Zorn Microsoft vendor-specific RADIUS attributes
WO2000049764A1 (en) Data authentication system employing encrypted integrity blocks
JP2000156720A (en) Self-transmission of wideband data message
JPH06232861A (en) Apparatus and method for cipher key management
KR20040033159A (en) Method for cryptographing wireless data and apparatus thereof
US5199072A (en) Method and apparatus for restricting access within a wireless local area network
KR100563611B1 (en) Secure packet radio network
WO2018186543A1 (en) Data encryption method and system using device authentication key
CA2123199A1 (en) Cryptographic apparatus and method for a data communication network

Legal Events

Date Code Title Description
FZDE Discontinued