Apparatus and method for generating data for detecting false alteration of encrypted data during processing
First Claim
Patent Images
1. A method of encryption comprising the steps of:
- encrypting data to be encrypted (301, Bk) to generate encrypted data (305, CBk) (S102, S602); and
attaching data (PF(z+1)) to said encrypted data (S104, S604), said data (PF(z+1)) indicating a result of said encrypting calculated as the step of encrypting effects said encrypting, wherein said data indicating said result of said encrypting is falsification detecting data (308, BDk) for detecting whether said encrypted data is falsified data.
1 Assignment
0 Petitions
Accused Products
Abstract
Data to be encrypted (301) is partially extracted successively. A result of encrypting a previously extracted portion of the data is used to successively calculate that of encrypting the currently extracted portion of the data successively. Successively calculated results of the encryption are used to generate encrypted data (305). In generating the encrypted data, a finally calculated result of the encryption (PF (z+1)) is attached to the generated encrypted data. The finally calculated result is used as falsification detecting data (308) for detecting whether the data to be encrypted is falsified data.
28 Citations
29 Claims
-
1. A method of encryption comprising the steps of:
-
encrypting data to be encrypted (301, Bk) to generate encrypted data (305, CBk) (S102, S602); and
attaching data (PF(z+1)) to said encrypted data (S104, S604), said data (PF(z+1)) indicating a result of said encrypting calculated as the step of encrypting effects said encrypting, wherein said data indicating said result of said encrypting is falsification detecting data (308, BDk) for detecting whether said encrypted data is falsified data. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of detecting whether encrypted data is falsified, comprising the steps of:
-
receiving encrypted data (305) (S201); and
decrypting said encrypted data received at the step of receiving to generate decrypted data (307) (S202), wherein as the step of decrypting effects said decrypting, a result of said decrypting is calculated, and said result of said decrypting is indicated by data (DF(z+1)) representing falsification detecting data (309) for detecting whether said encrypted data is falsified data. - View Dependent Claims (7, 8, 9, 10, 11)
-
-
12. A method of reproducing encrypted data, comprising the steps of:
-
sequentially extracting portions of said encrypted data from prescribed ones of a plurality of blocks dividing said encrypted data (S1301);
using a result of decrypting said data of said portion previously extracted at the step of extracting to sequentially calculate a result of said decrypting said data of said portion currently extracted at the step of extracting, and using said results of said decrypting sequentially calculated to generate decrypted data (S1302, S1303); and
comparing said data indicating said result of said decrypting finally calculated at the step of using, with falsification detecting data previously correlated to said prescribed block for detecting whether said prescribed block is falsified, to determine from a resultant comparison whether to reproduce said decrypted data corresponding to said prescribed block generated at the step of using (S1304). - View Dependent Claims (13, 14, 15, 16)
-
-
17. A method of communicating encrypted data, comprising the steps of:
-
receiving encrypted data by means of communication, said encrypted data being previously divided into a plurality of blocks (S1301, S1306);
sequentially extracting portions of said encrypted data received at the step of receiving, from prescribed ones of said plurality of blocks;
using a result of decrypting said data of said portion previously English Translation of Annexes (Substitute Pages) extracted at the step of extracting to sequentially calculate a result of said decrypting said data of said portion currently extracted at the step of extracting, and using said results of said decrypting sequentially calculated to generate decrypted data (S1302); and
comparing said data indicating said result of said decrypting finally calculated at the step of using, with falsification detecting data previously correlated to said prescribed block for detecting whether said prescribed block is falsified, to detect from a resultant comparison an error introduced in said communication of said encrypted data (S1304).
-
-
18. An encryption apparatus comprising:
-
means for encrypting (806) data to be encrypted (301, Bk) to generate encrypted data (305, CBk);
means for attaching (806) to said encrypted data data (PF(z+1)) indicating a result of said encrypting calculated as said means for encrypting effects said encrypting, wherein said data indicating said result of said encrypting represents falsification detecting data (308, BDk) for detecting whether said encrypted data is falsified data.
-
-
19. An apparatus detecting falsification of encrypted data, comprising:
-
means for receiving (810) encrypted data (305); and
means receiving said encrypted data from said means for receiving, for decrypting (813) said encrypted data to generate decrypted data (307), wherein as said means for decrypting effects said encrypting, a result of said encrypting is calculated, and said result is indicated by data (DF(z+1)) representing falsification detecting data (309) for detecting whether said encrypted data is falsified data.
-
-
20. (Amended) An apparatus of reproducing encrypted data, comprising:
-
means for sequentially extracting portions of encrypted data from prescribed ones of a plurality of blocks dividing said encrypted data;
English Translation of Annexes (Substitute Pages)means using a result of decrypting said data of said portion previously extracted by said means for extracting, for sequentially calculating a result of said decrypting said data of said portion currently extracted by said means for extracting, and generating decrypted data from said results of said decrypting sequentially calculated and means for comparing said data indicating said result of said decrypting finally calculated by said means for sequentially calculating, with falsification detecting data previously correlated to said prescribed block for detecting whether said prescribed block is falsified, to determine from a resultant comparison whether to reproduce said decrypted data corresponding to said prescribed block generated by said means for sequentially calculating.
-
-
21. (Amended) An apparatus of communicating encrypted data, comprising:
-
means for receiving (810) encrypted data by means of communication, said encrypted data being previously divided into a plurality of blocks;
means for sequentially extracting portions of said encrypted data received by said means for receiving, from prescribed ones of said plurality of blocks;
means (813) for using a result of decrypting said data of said portion previously extracted by said means for sequentially extracting, for sequentially calculating a result of said decrypting said data of said portion currently extracted by said means for sequentially extracting, and generating decrypted data from said results of said decrypting sequentially calculated and means for comparing said data indicating said result of said decrypting finally calculated by said means for sequentially calculating, with falsification detecting data previously correlated to said prescribed block for detecting whether said prescribed block is falsified, to detect from a resultant comparison an error introduced in said communication of said encrypted data.
-
-
22. A program for causing a computer to perform a method of encryption, the method including the steps of:
-
encrypting data to be encrypted (301, Bk) to generate encrypted data (305, CBk) (S102, S602); and
attaching data (PF(z+1)) to said encrypted data (S104, S604), said data (PF(z+1)) indicating a result of said encrypting calculated as the step of encrypting effects said encrypting, wherein said data indicating said result of said encrypting is falsification detecting data (308, BDk) for detecting whether said encrypted data is falsified data.
-
-
23. A program for causing a computer to perform a method of detecting falsification of encrypted data, the method including the steps of:
-
receiving encrypted data (305) (S201); and
decrypting said encrypted data received at the step of receiving to generate decrypted data (307) (S202), wherein as the step of decrypting effects said decrypting, a result of said decrypting is calculated, and said result of said decrypting is indicated by data (DF(z+1)) representing falsification detecting data (309) for detecting whether said encrypted data is falsified data.
-
-
24. A program for causing a computer to perform a method of reproducing encrypted data (305), the method including the steps of:
-
sequentially extracting portions of said encrypted data from prescribed ones of a plurality of blocks dividing said encrypted data (S1301);
using a result of decrypting said data of said portion previously extracted at the step of extracting to sequentially calculate a result of said decrypting said data of said portion currently extracted at the step of extracting, and using said results of said decrypting sequentially calculated to generate decrypted data (S1302, S1303); and
comparing said data indicating said result of said decrypting finally calculated at the step of using, with falsification detecting data previously correlated to said prescribed block for detecting whether said prescribed block is falsified, to determine from a resultant comparison whether to reproduce said decrypted data corresponding to said prescribed block generated at the step of using (S1304).
-
-
25. A program for causing a computer to perform a method of communicating encrypted data (305) the method including the steps of:
-
receiving encrypted data by means of communication, said encrypted data being previously divided into a plurality of blocks (S1301, S1306);
sequentially extracting portions of said encrypted data received at the step of receiving, from prescribed ones of said plurality of blocks;
using a result of decrypting said data of said portion previously extracted at the step of extracting to sequentially calculate a result of said decrypting said data of said portion currently extracted at the step of extracting, and using said results of said decrypting sequentially calculated to generate decrypted data (S1302); and
comparing said data indicating said result of said decrypting finally calculated at the step of using, with falsification detecting data previously correlated to said prescribed block for detecting whether said prescribed block is falsified, to detect from a resultant comparison an error introduced in said communication of said encrypted data (S1304).
-
-
26. A machine readable recording medium having a program recorded therein for causing a computer to perform a method of encryption, the method including the steps of:
-
encrypting data to be encrypted (301, Bk) to generate encrypted data (305, CBk) (S102, S602); and
attaching data (PF(z+1)) to said encrypted data (S104, S604), said data (PF(z+1)) indicating a result of said encrypting calculated as the step of encrypting effects said encrypting, wherein said data indicating said result of said encrypting is falsification detecting data (308, BDk) for detecting whether said encrypted data is falsified data.
-
-
27. A machine readable recording medium having a program recorded therein for causing a computer to perform a method of detecting whether encrypted data (305) is falsified, the method including the steps of:
-
receiving encrypted data (305) (S201); and
decrypting said encrypted data received at the step of receiving to generate decrypted data (307) (S202), wherein as the step of decrypting effects said decrypting, a result of said decrypting is calculated, and said result of said decrypting is indicated by data (DF(z+1)) representing falsification detecting data (309) for detecting whether said encrypted data is falsified data.
-
-
28. A machine readable recording medium having a program recorded therein for causing a computer to perform a method of reproducing encrypted data (305), the method including the steps of:
-
sequentially extracting portions of said encrypted data from prescribed ones of a plurality of blocks dividing said encrypted data (S1301);
using a result of decrypting said data of said portion previously extracted at the step of extracting to sequentially calculate a result of said decrypting said data of said portion currently extracted at the step of extracting, and using said results of said decrypting sequentially calculated to generate decrypted data (S1302, S1303); and
comparing said data indicating said result of said decrypting finally calculated at the step of using, with falsification detecting data previously correlated to said prescribed block for detecting whether said prescribed block is falsified, to determine from a resultant comparison whether to reproduce said decrypted data corresponding to said prescribed block generated at the step of using (S1304).
-
-
29. A machine readable recording medium having a program recorded therein for causing a computer to perform a method of communicating encrypted data (305), the method including the steps of:
-
receiving encrypted data by means of communication, said encrypted data being previously divided into a plurality of blocks (S1301, S1306);
sequentially extracting portions of said encrypted data received at the step of receiving, from prescribed ones of said plurality of blocks;
using a result of decrypting said data of said portion previously extracted at the step of extracting to sequentially calculate a result of said decrypting said data of said portion currently extracted at the step of extracting, and using said results of said decrypting sequentially calculated to generate decrypted data (S1302); and
comparing said data indicating said result of said decrypting finally calculated at the step of using, with falsification detecting data previously correlated to said prescribed block for detecting whether said prescribed block is falsified, to detect from a resultant comparison an error introduced in said communication of said encrypted data (S1304).
-
Specification