首页> 外国专利> reproduction of sikringskode by use of distributed kodedannelsesdata

reproduction of sikringskode by use of distributed kodedannelsesdata

机译:使用分布式kodedannelsesdata复制sikringskode

摘要

A key security system provides for the reproduction of secure keys by using distributed key generation data and a distributed encrypted prekey. The system encrypts program key generation data (17) with a program key prekey (18) in accordance with a first encryption algorithm to produce the program key (20); processes the program key (20) to produce a keystream (25); and processes an information signal (26) with the keystream to produce a scrambled information signal (27). The program key prekey (18) is encrypted with a category key (22) in accordance with a second encryption algorithm to produce an encrypted program key prekey (23). The scrambled information signal (27) the program key generation data (17) and the encrypted program key prekey (23) are distributed to descramblers. The descrambler within the key security system decrypts the distributed encrypted program key prekey (23) with the category key (22) in accordance with the second encryption algorithm to reproduce the program key prekey (18); encrypts the distributed program key generation data (17) with the reproduced program key prekey (18) in accordance with the first encryption algorithm to reproduce the program key (20); processes the reproduced program key (20) to reproduce the keystream (25); and processes the distributed scrambled information signal (27) with the reproduced keystream (25) to descramble the distributed scrambled information signal. The key generation data includes authorization data that must be processed by the authorization processor (35) in the descrambler in order to enable the descrambler. The use of authorization data as key generation data protects the authorization data from spoofing attacks. When more data must be protected than a single operation of the encryption algorithm can support, then additional data blocks are protected by chaining the system, wherein the output from one stage forms part of the input to the next. The key generation data for the program key includes a sequence number securely associated with the category key to thereby "timelock" program key reproduction to the use of a current category key and thus prevent an attack based upon the use of an obsolete category key.
机译:密钥安全系统通过使用分布式密钥生成数据和分布式加密预密钥来提供安全密钥的再现。系统根据第一加密算法用程序密钥预密钥(18)对程序密钥产生数据(17)进行加密,以产生程序密钥(20);处理程序密钥(20)以产生密钥流(25);并利用密钥流处理信息信号(26)以产生加扰的信息信号(27)。根据第二加密算法,用类别密钥(22)对程序密钥预密钥(18)进行加密,以产生加密的程序密钥预密钥(23)。加密的信息信号(27),程序密钥生成数据(17)和加密的程序密钥预密钥(23)被分配给解扰器。密钥安全系统中的解扰器根据第二加密算法用类别密钥(22)解密所分发的加密程序密钥预密钥(23),以再现程序密钥预密钥(18);根据第一加密算法用再现的程序密钥预密钥(18)对分发的程序密钥生成数据(17)进行加密,以再现程序密钥(20);处理再现的程序密钥(20)以再现密钥流(25);并利用再现的密钥流(25)处理分布式加扰信息信号(27),以对分布式加扰信息信号进行解扰。密钥生成数据包括授权数据,授权数据必须由解密器中的授权处理器(35)处理以便启用解密器。使用授权数据作为密钥生成数据可以保护授权数据免受欺骗攻击。当必须保护的数据量超过加密算法的单个操作所能支持的量时,则通过链接系统来保护其他数据块,其中,来自一个阶段的输出构成了输入到下一阶段的一部分。程序密钥的密钥生成数据包括与类别密钥安全地关联的序列号,从而将程序密钥再现“时间锁定”到当前类别密钥的使用,从而防止基于过期类别密钥的使用。

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号