JPS62214744A - Packet transmission system - Google Patents
Packet transmission systemInfo
- Publication number
- JPS62214744A JPS62214744A JP61056812A JP5681286A JPS62214744A JP S62214744 A JPS62214744 A JP S62214744A JP 61056812 A JP61056812 A JP 61056812A JP 5681286 A JP5681286 A JP 5681286A JP S62214744 A JPS62214744 A JP S62214744A
- Authority
- JP
- Japan
- Prior art keywords
- data
- packet
- order
- logical channel
- sent
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 26
- 238000000034 method Methods 0.000 claims description 13
- 238000010586 diagram Methods 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000011159 matrix material Substances 0.000 description 1
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
【発明の詳細な説明】
〔産業上の利用分野〕
本発明はパケット伝送方式に係り、特に伝送内容の秘密
を守るため、伝送路上でデータが第3者に漏れ、これが
容易に解析されることを防ぐのに好適なパケット伝送方
式に関する。[Detailed Description of the Invention] [Industrial Application Field] The present invention relates to a packet transmission method, and in particular, in order to protect the confidentiality of transmitted contents, data is leaked to a third party on a transmission path and can be easily analyzed. The present invention relates to a packet transmission method suitable for preventing.
パケット伝送方式の一つに、送信側と受信側において複
数の論理チャネルを使用し、データをパケット分割して
伝送する方式がある(CCITT。One of the packet transmission methods is a method in which data is divided into packets and transmitted by using multiple logical channels on the sending and receiving sides (CCITT).
X、25勧告)。X, 25 Recommendation).
第5図に従来のこの種パケット伝送方式を示す。FIG. 5 shows a conventional packet transmission system of this type.
1.4.7は送信しようとするデータX、Y、Zであり
、これをそれぞれパケット分割し、2,5゜8の論理チ
ャネルA、B、Cを経由して各々のパケットデータを受
信側へ送信する6受信側では、各論理チャネルごとに受
信したパケットデータをシーケンス番号順に整列させ、
3,6.9の受信データX、Y、Zを得る。1.4.7 is the data X, Y, and Z to be transmitted, each of which is divided into packets and sent to the receiving side via logical channels A, B, and C of 2.5°8. 6 On the receiving side, the packet data received for each logical channel is arranged in order of sequence number,
3. Obtain the received data X, Y, Z of 6.9.
なお、秘密データ伝送に関連する公知文献としては、例
えば特開昭60−54544号公報が挙げられる。Note that, as a known document related to secret data transmission, for example, Japanese Patent Application Laid-Open No. 60-54544 can be cited.
従来技術においては、受信側において論理チャネル番号
とパケットシーケンス番号により、パケットデータの識
別を行うため、データを受信した側では容易にパケット
の解読ができ、データが第3者へ漏洩するという問題が
あった。In the conventional technology, since packet data is identified on the receiving side using the logical channel number and packet sequence number, the receiving side can easily decode the packet, which poses the problem of data leaking to a third party. there were.
本発明の目的は、伝送しようとするデータの形式を加工
することなく、データを構成するパケットをそれぞれ異
った仮想的通信路を通して伝送することにより、伝送し
ようとするデータが伝送路上から漏れ容易に解読される
ことを防ぐためのパケット伝送方式を提供することにあ
る。An object of the present invention is to transmit the packets constituting the data through different virtual communication paths without modifying the format of the data to be transmitted, thereby making it easier for the data to be transmitted to leak from the transmission path. The objective is to provide a packet transmission method that prevents the packet from being decoded.
本発明は、伝送しようとするデータを、同一の論理チャ
ネルを通さずに、データを構成する複数のパケットをあ
らかじめ定めた規則により、いくつかの異った論理チャ
ネルを使用して分割伝送する。あらかじめ定めた規則と
は伝送しようとする一定順序のパケットをどの順序でど
の仮想的通信路に送出するかを決めた通信路ごとの順序
規則を言う。パケットを送信する側では、伝送しようと
するデータを構成する一連のパケットを上記規則に従っ
て仮想的通信路に順次送出する。パケットを受信する側
では、同様に上記規則に従い、各仮想的通信路より受信
したパケットを整列させ元のデータ列を復元する。The present invention divides and transmits data to be transmitted using several different logical channels according to a predetermined rule, without passing through the same logical channel. The predetermined rules refer to order rules for each communication channel that determine in which order packets to be transmitted in a certain order are to be sent to which virtual communication channel. On the packet transmitting side, a series of packets constituting the data to be transmitted are sequentially transmitted to the virtual communication channel according to the above rules. On the packet receiving side, similarly according to the above rules, the packets received from each virtual communication path are arranged to restore the original data string.
本発明は、データの漏洩を防止することを目的とし、伝
送しようとするパケット列の順序及び伝送路に関してス
クランプリングしようとするものである。従来のパケッ
ト伝送では、各パケットごとに持つ論理チャネル番号及
びシーケンス番号を用いて、送信側と受信側のデータ側
の順序制御を行っているため、受信側では受信したパケ
ットデータ列から得られる情報のみで容易に元のデータ
列を復元させることが容易である。The present invention aims to prevent data leakage by scrambling the order and transmission path of packet sequences to be transmitted. In conventional packet transmission, the order of data on the sending and receiving sides is controlled using the logical channel number and sequence number that each packet has, so the receiving side uses information obtained from the received packet data sequence. It is easy to restore the original data string by simply using
本発明においては、送信側と受信側にあらかじめ定義し
た論理チャネルとシーケンス番号から成る送信及び受信
パケットの順序を変換するための順序規則を持ち、この
順序情報と各パケットに持つ論理チャネル番号とパケッ
トシーケンス番号を用いて1元のデータ列を復元させる
。従って順序規則を持たないものが受信しても解読はで
きない。In the present invention, the sending side and the receiving side have an ordering rule for converting the order of sending and receiving packets consisting of predefined logical channels and sequence numbers, and this ordering information, the logical channel number that each packet has, and the packet The sequence number is used to restore the 1-element data string. Therefore, even if it is received by someone who does not have an ordering rule, it will not be possible to decipher it.
以下、本発明の一実施例について図面により説明する。 An embodiment of the present invention will be described below with reference to the drawings.
第1図に本発明のパケット伝送方式を示す。1゜4.7
の送信しようとするデータx、y、zをそれぞれパケッ
ト分割し、10の送信側順序規則制御部を用いて、それ
ぞれのパケットを2.5.8の各論理チャネルA、B、
Cに振り分ける。この際、送出する順序も制御部10の
順序規則に従って変化させる。従って、各論理チャネル
2,5゜8上には9図示の如く、送出しようとする元の
データ1,4.7を構成するパケットデータとはまった
く異った順序で、パケットデータが伝送されることにな
る。受信側では、2,5.8の各論理チャネルより受信
したパケットデータを、11の受信側順序規則制御部に
より整列し直し、3,6゜7の受信データx、y、zを
得る。FIG. 1 shows the packet transmission system of the present invention. 1°4.7
The data x, y, and z to be transmitted are divided into packets, and each packet is assigned to each logical channel A, B, and
Assign to C. At this time, the sending order is also changed according to the order rule of the control unit 10. Therefore, as shown in Figure 9, on each logical channel 2,5°8, packet data is transmitted in a completely different order from the packet data composing the original data 1,4,7 to be sent. It turns out. On the receiving side, the packet data received from each logical channel 2, 5.8 is rearranged by the receiving side order rule control unit 11 to obtain 3,6°7 received data x, y, z.
本発明における各論理チャネル上のパケットデータの順
序は、第5図に示す従来のパケット伝送方式の論理チャ
ネル2,5.8と異なり、第1図の2.5.8に示す様
に1つの論理チャネル内の、データを順に整列させても
受信側では正しい情報を得ることができない。従って、
受信側では、送信側と同じ順序規則を参照して、各論理
チャネルから受信したデータを再度整列させる必要があ
る。The order of packet data on each logical channel in the present invention is different from the logical channels 2 and 5.8 of the conventional packet transmission method shown in FIG. Even if the data within the logical channel is arranged in order, the receiving side cannot obtain correct information. Therefore,
On the receiving side, the data received from each logical channel must be reordered with reference to the same ordering rules as on the sending side.
第2図に順序規則の1例を示す。この順序規則例は、1
2に示すテーブル形式とした場合、A。FIG. 2 shows an example of the ordering rule. An example of this ordering rule is 1
If the table format shown in 2 is used, A.
B、Cの論理チャネル番号と1から8のシーケンス番号
との組み合せによって構成されるA1からC8までの2
4種類の番号と、これに対応する送信データx、y、z
を分割したXlから28のパケットデータを対応させた
マトリックスとなる。2 from A1 to C8 formed by the combination of logical channel numbers B and C and sequence numbers 1 to 8
4 types of numbers and corresponding transmission data x, y, z
This is a matrix in which 28 packet data are made to correspond to each other from Xl, which is divided into X1.
第3図に送信側の処理例を示す。1,4.7の送信デー
タx、y、zより、2の論理チャネルA経出で送信する
データを選択する場合、第3図のテーブル12に示した
順序規則を用いて、論理チャネルAに対して、X□、Y
、、Z、、Y、、Y、。FIG. 3 shows an example of processing on the transmitting side. When selecting the data to be transmitted through the logical channel A in 2 from the transmission data x, y, and z in 1 and 4.7, use the order rules shown in Table 12 in Figure 3 to select the data to be transmitted on the logical channel A. On the other hand, X□, Y
,,Z,,Y,,Y,.
Z6の順序でパケットを送出する。 5と8の論理チャ
ネルB、C経出で送信するデータも同様である。Packets are sent in the order of Z6. The same applies to the data transmitted through logical channels B and C of 5 and 8.
第4図に受信側の処理例を示す。例えば、2に示す論理
チャネルAより受信したデータ、Xl。FIG. 4 shows an example of processing on the receiving side. For example, data received from logical channel A shown in 2, Xl.
Y2. Z2. YG、 Y7. Z、は、第3図ノテ
ーブル12で示した論理チャネルAの順序規則に従い、
3.6.9に示される受信データx、y、zのそれぞれ
の位置に整列される。他の論理チャネルについても同様
の処理を行い、受信データx、y。Y2. Z2. YG, Y7. Z, follows the ordering rule of logical channel A shown in Table 12 of FIG.
The received data is aligned at the respective positions of x, y, and z shown in 3.6.9. Similar processing is performed for other logical channels to obtain received data x, y.
Zを復元させる。Restore Z.
なお、順序規則は、テーブル形式で定義する方式のほか
に、計算式で定義する方式が考えられる。Note that, in addition to the method of defining the order rule in a table format, a method of defining the order rule using a calculation formula can be considered.
本発明によれば、あらかじめ定められた順序規則を知っ
ている場合のみ、パケットデータの正しい送受信が行え
る。従って、順序規則を知らされていない第三者は正し
い受信を行うことが出来ず、データの機密を守る上で効
果がある。また、本発明においては、複数の論理チャネ
ルを使用するため、各論理チャネルを物理的に別々の回
線に分割して配置することが出来、この時には物理的に
別々の回線を同時に接続して受信する必要があるため、
データの漏洩防止にさらに効果がある。According to the present invention, correct transmission and reception of packet data can be performed only when a predetermined order rule is known. Therefore, a third party who is not informed of the ordering rules will not be able to receive the data correctly, which is effective in protecting the confidentiality of data. In addition, in the present invention, since multiple logical channels are used, each logical channel can be physically divided into separate lines and arranged, and in this case, the physically separate lines can be connected at the same time to receive data. Because it is necessary to
It is even more effective in preventing data leaks.
第1図は本発明のパケット伝送方式を説明する図、第2
図は本発明で用いる順序規則の一例を示す図、第3図は
本発明による送信側の処理例を示す図、第4図は本発明
による受信側の処理例を示す図、第5図は従来のパケッ
ト伝送方式を説明する図である。
1.4.7・・・送信データ。
3.6.9・・・受信データ、
2.5.8・・・論理チャネル、
10・・・送信側順序規則制御部、
11・・・受信側順序規則制御部。
乙−′・、1
代理人弁理士 小 川 勝 男・5.−賜1凶
第2図
第3図
第4図
第5図Figure 1 is a diagram explaining the packet transmission method of the present invention, Figure 2 is a diagram explaining the packet transmission method of the present invention.
3 is a diagram showing an example of the ordering rule used in the present invention, FIG. 3 is a diagram showing an example of processing on the transmitting side according to the present invention, FIG. 4 is a diagram showing an example of processing on the receiving side according to the present invention, and FIG. FIG. 2 is a diagram illustrating a conventional packet transmission method. 1.4.7...Transmission data. 3.6.9... Received data, 2.5.8... Logical channel, 10... Sending side order rule control unit, 11... Receiving side order rule control unit. Otsu-'・, 1 Representative Patent Attorney Masao Ogawa 5. -Gift 1 Figure 2 Figure 3 Figure 4 Figure 5
Claims (1)
用しデータをパケット分割して伝送するパケット伝送方
式において、送信側と受信側にパケットの送信及び受信
の順序を予め定めた定義に従って制御する順序規則制御
手段を持ち、この順序規則制御手段により、送信側では
受信する各パケットの論理チャネル及び送出順序を決定
し、受信側では各論理チャネルから受信したパケットの
データ列の復元を行うことを特徴としたパケット伝送方
式。(1) In a packet transmission method in which data is divided into packets and transmitted using multiple logical channels on the sending and receiving sides, the order of sending and receiving packets on the sending and receiving sides is controlled according to predetermined definitions. It has an order rule control means, and by this order rule control means, the transmitting side determines the logical channel and transmission order of each packet to be received, and the receiving side restores the data string of the packet received from each logical channel. Characteristic packet transmission method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP61056812A JPS62214744A (en) | 1986-03-17 | 1986-03-17 | Packet transmission system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP61056812A JPS62214744A (en) | 1986-03-17 | 1986-03-17 | Packet transmission system |
Publications (1)
Publication Number | Publication Date |
---|---|
JPS62214744A true JPS62214744A (en) | 1987-09-21 |
Family
ID=13037786
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP61056812A Pending JPS62214744A (en) | 1986-03-17 | 1986-03-17 | Packet transmission system |
Country Status (1)
Country | Link |
---|---|
JP (1) | JPS62214744A (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0978975A2 (en) * | 1998-07-08 | 2000-02-09 | International Business Machines Corporation | Data communications apparatus, method and computer program product implementing data communications protocol with efficient packing of datagrams |
JP2001265713A (en) * | 1999-12-15 | 2001-09-28 | St Microelectronics Sa | Safe transfer method for data |
JP2002529779A (en) * | 1998-10-30 | 2002-09-10 | サイエンス アプリケーションズ インターナショナル コーポレイション | Agile network protocol for secure communication with guaranteed system availability |
JP2005277477A (en) * | 2004-03-22 | 2005-10-06 | Tamura Seisakusho Co Ltd | Encryption system in communication link and its communication terminal |
JP2007329940A (en) * | 2007-07-05 | 2007-12-20 | Dainippon Printing Co Ltd | Encryption processing system |
WO2008149434A1 (en) * | 2007-06-06 | 2008-12-11 | Fujitsu Limited | Relay device and terminal |
US7921211B2 (en) | 1998-10-30 | 2011-04-05 | Virnetx, Inc. | Agile network protocol for secure communications using secure domain names |
JP2014093776A (en) * | 2012-10-31 | 2014-05-19 | Boeing Co | Time-locked network and nodes for exchanging confidential data packets |
US8943201B2 (en) | 1998-10-30 | 2015-01-27 | Virnetx, Inc. | Method for establishing encrypted channel |
WO2017056398A1 (en) * | 2015-09-30 | 2017-04-06 | パナソニックIpマネジメント株式会社 | Communication system, transmitter, receiver, communication method, transmission method, and reception method |
US9860283B2 (en) | 1998-10-30 | 2018-01-02 | Virnetx, Inc. | Agile network protocol for secure video communications with assured system availability |
WO2018150523A1 (en) * | 2017-02-16 | 2018-08-23 | 富士通フロンテック株式会社 | Paper sheet handling apparatus, and communication method for paper sheet handling apparatus |
US10511573B2 (en) | 1998-10-30 | 2019-12-17 | Virnetx, Inc. | Agile network protocol for secure communications using secure domain names |
-
1986
- 1986-03-17 JP JP61056812A patent/JPS62214744A/en active Pending
Cited By (40)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0978975A3 (en) * | 1998-07-08 | 2003-02-05 | International Business Machines Corporation | Data communications apparatus, method and computer program product implementing data communications protocol with efficient packing of datagrams |
EP0978975A2 (en) * | 1998-07-08 | 2000-02-09 | International Business Machines Corporation | Data communications apparatus, method and computer program product implementing data communications protocol with efficient packing of datagrams |
US9037713B2 (en) | 1998-10-30 | 2015-05-19 | Virnetx, Inc. | Agile network protocol for secure communications using secure domain names |
US9027115B2 (en) | 1998-10-30 | 2015-05-05 | Virnetx, Inc. | System and method for using a registered name to connect network devices with a link that uses encryption |
US10511573B2 (en) | 1998-10-30 | 2019-12-17 | Virnetx, Inc. | Agile network protocol for secure communications using secure domain names |
US9967240B2 (en) | 1998-10-30 | 2018-05-08 | Virnetx, Inc. | Agile network protocol for secure communications using secure domain names |
US9860283B2 (en) | 1998-10-30 | 2018-01-02 | Virnetx, Inc. | Agile network protocol for secure video communications with assured system availability |
JP2010063126A (en) * | 1998-10-30 | 2010-03-18 | Science Applications Internatl Corp | Agile network protocol for secure communication with assured system availability |
US9819649B2 (en) | 1998-10-30 | 2017-11-14 | Virnetx, Inc. | System and method employing an agile network protocol for secure communications using secure domain names |
US9038163B2 (en) | 1998-10-30 | 2015-05-19 | Virnetx, Inc. | Systems and methods for connecting network devices over communication network |
US9479426B2 (en) | 1998-10-30 | 2016-10-25 | Virnetz, Inc. | Agile network protocol for secure communications with assured system availability |
JP2011223574A (en) * | 1998-10-30 | 2011-11-04 | Barnet X Inc | Agile network protocol for secure communications with assured system availability |
US9413766B2 (en) | 1998-10-30 | 2016-08-09 | Virnetx, Inc. | Method for establishing connection between devices |
US8843643B2 (en) | 1998-10-30 | 2014-09-23 | Virnetx, Inc. | System and method employing an agile network protocol for secure communications using secure domain names |
US8850009B2 (en) | 1998-10-30 | 2014-09-30 | Virnetx, Inc. | System and method employing an agile network protocol for secure communications using secure domain names |
US8868705B2 (en) | 1998-10-30 | 2014-10-21 | Virnetx, Inc. | Agile network protocol for secure communications using secure domain names |
US8874771B2 (en) | 1998-10-30 | 2014-10-28 | Virnetx, Inc. | Agile network protocol for secure communications with assured system availability |
US8904516B2 (en) | 1998-10-30 | 2014-12-02 | Virnetx, Inc. | System and method employing an agile network protocol for secure communications using secure domain names |
US8943201B2 (en) | 1998-10-30 | 2015-01-27 | Virnetx, Inc. | Method for establishing encrypted channel |
US10187387B2 (en) | 1998-10-30 | 2019-01-22 | Virnetx, Inc. | Method for establishing connection between devices |
US7921211B2 (en) | 1998-10-30 | 2011-04-05 | Virnetx, Inc. | Agile network protocol for secure communications using secure domain names |
JP2002529779A (en) * | 1998-10-30 | 2002-09-10 | サイエンス アプリケーションズ インターナショナル コーポレイション | Agile network protocol for secure communication with guaranteed system availability |
US9386000B2 (en) | 1998-10-30 | 2016-07-05 | Virnetx, Inc. | System and method for establishing a communication link |
US9077694B2 (en) | 1998-10-30 | 2015-07-07 | Virnetx, Inc. | Agile network protocol for secure communications using secure domain names |
US9094399B2 (en) | 1998-10-30 | 2015-07-28 | Virnetx, Inc. | Method for establishing secure communication link between computers of virtual private network |
US9100375B2 (en) | 1998-10-30 | 2015-08-04 | Virnetx, Inc. | System and method employing an agile network protocol for secure communications using secure domain names |
US9374346B2 (en) | 1998-10-30 | 2016-06-21 | Virnetx, Inc. | Agile network protocol for secure communications using secure domain names |
US9077695B2 (en) | 1998-10-30 | 2015-07-07 | Virnetx, Inc. | System and method for establishing an encrypted communication link based on IP address lookup requests |
JP2001265713A (en) * | 1999-12-15 | 2001-09-28 | St Microelectronics Sa | Safe transfer method for data |
JP4628002B2 (en) * | 2004-03-22 | 2011-02-09 | 株式会社タムラ製作所 | Encryption system in communication link and communication terminal device thereof |
JP2005277477A (en) * | 2004-03-22 | 2005-10-06 | Tamura Seisakusho Co Ltd | Encryption system in communication link and its communication terminal |
WO2008149434A1 (en) * | 2007-06-06 | 2008-12-11 | Fujitsu Limited | Relay device and terminal |
JP4656665B2 (en) * | 2007-07-05 | 2011-03-23 | 大日本印刷株式会社 | Encryption processing system |
JP2007329940A (en) * | 2007-07-05 | 2007-12-20 | Dainippon Printing Co Ltd | Encryption processing system |
JP2014093776A (en) * | 2012-10-31 | 2014-05-19 | Boeing Co | Time-locked network and nodes for exchanging confidential data packets |
US10708174B2 (en) | 2015-09-30 | 2020-07-07 | Panasonic Intellectual Proerty Management Co., Ltd. | Communication system, transmitter, receiver, communication method, transmission method, and reception method |
WO2017056398A1 (en) * | 2015-09-30 | 2017-04-06 | パナソニックIpマネジメント株式会社 | Communication system, transmitter, receiver, communication method, transmission method, and reception method |
JPWO2018150523A1 (en) * | 2017-02-16 | 2019-11-07 | 富士通フロンテック株式会社 | Paper sheet handling device and communication method in paper sheet handling device |
WO2018150523A1 (en) * | 2017-02-16 | 2018-08-23 | 富士通フロンテック株式会社 | Paper sheet handling apparatus, and communication method for paper sheet handling apparatus |
US11004295B2 (en) | 2017-02-16 | 2021-05-11 | Fujitsu Frontech Limited | Paper sheet handling apparatus and communication method of paper sheet handling apparatus |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Coppersmith et al. | A proposed mode for triple-DES encryption | |
US5003593A (en) | Teleconferencing method for a secure key management system | |
JPS62214744A (en) | Packet transmission system | |
US4078152A (en) | Block-cipher cryptographic system with chaining | |
US6021203A (en) | Coercion resistant one-time-pad cryptosystem that facilitates transmission of messages having different levels of security | |
JPH01122227A (en) | Transmission equipment | |
US7254232B2 (en) | Method and system for selecting encryption keys from a plurality of encryption keys | |
CN1321506C (en) | Apparatus and method for performing KASUMI ciphering | |
CN108696411A (en) | Device for being used in CAN system | |
US5355412A (en) | Identifying secret data messages in a one-direction multipoint network | |
RU2121231C1 (en) | Method which provides two-point connection in secure communication systems | |
US7203318B2 (en) | Secure transmission system for a digital trunked radio system | |
WO1981001933A1 (en) | Message format for secure communication over data links | |
JPH09120260A (en) | Method for encryption or decoding | |
JPS60248043A (en) | Communication system | |
EP1994672B1 (en) | Method and apparatus for synchronous stream cipher encryption with reserved codes | |
EP0105553B1 (en) | Device for enciphering digital signals comprising one or more des circuits | |
JPH01307341A (en) | Mobile body data ciphered communication system | |
US2984700A (en) | Method and apparatus for cryptography | |
JPH01229539A (en) | Key sharing system | |
JPH01101043A (en) | Transmission information protecting system for videotex system | |
JPH05102960A (en) | Cipher communication system | |
JPH0479462A (en) | Telephone conference method for safety key management system | |
JP2001203685A (en) | Data transmission system and data switch system by encryption using random number table | |
JPS5944145A (en) | Cipher communication system |