METHOD FOR TRANSMITTING AND RECEIVING A MESSAGE INCLUDING AN ENCRYPTED IDENTIFIER OF THE TRANSMITTER DEVICE
20230052597 · 2023-02-16
Inventors
Cpc classification
H04L9/0866
ELECTRICITY
H04L2209/805
ELECTRICITY
H04L63/0435
ELECTRICITY
H04L9/0894
ELECTRICITY
International classification
H04L9/08
ELECTRICITY
Abstract
In a digital communication system, using a symmetric key encryption protocol, the identifier of a transmitter included in a message transmitted to a receiver is encrypted. The identifier is divided into P parts, P being an integer number at least equal to two. The parts are ordered and associated, respectively, with ranks varying between one and P. For at least one part of rank greater than or equal to two, an encryption key is determined on the basis of the values of the parts of preceding rank and is encrypted with the encryption key thus determined. An encrypted identifier is then determined from the one or more encrypted parts thus obtained. The message to be transmitted is then formed from the encrypted identifier thus determined, and then transmitted to the receiver.
Claims
1-22. (canceled)
23. A transmission method for transmitting a message, by a transmitter of a communication system, to a receiver of the communication system, the transmission method comprising: a division of an identifier of the transmitter into P parts, P being an integer number at least equal to two, the P parts being ordered and associated, respectively, with ranks varying between one and P, the P parts comprising a part of rank one and P−1 parts, each of the P−1 parts being of rank two or higher, up to rank P, each of the P parts having a value; for at least one part of rank which is greater than or equal to two, a determination of an encryption key depending on the values of the parts of preceding rank and an encryption of said at least one part with the encryption key thus determined, the encryption being performed according to a symmetric key encryption protocol, the encryption providing an encrypted part; a determination of an encrypted identifier based on the encrypted part thus obtained; a formation of the message to be transmitted based on the encrypted identifier; and a transmission of the message.
24. The transmission method of claim 23, wherein the encryption is performed on all parts of rank greater than or equal to two, thereby obtaining P−1 encryption keys and P−1 encrypted parts of rank two to P.
25. The transmission method of claim 24, wherein the determination of the encrypted identifier comprises an encryption of the part of rank one with an identical encryption key for a plurality of transmitters of the communication system, thus obtaining an encrypted part of rank one; and a concatenation of the encrypted part of rank one to P.
26. The transmission method of claim 24, wherein the determination of the encrypted identifier comprises a concatenation of the part of rank one with the encrypted part of rank two to P, the part of rank one being unencrypted.
27. The transmission method of claim 23, wherein each of the P parts comprises a single bit of a bit field corresponding to the identifier of the transmitter.
28. The transmission method of claim 23, wherein the encryption is performed on at least two parts, thus obtaining at least two encryption keys, and the encryption keys are all different from each other.
29. A computer-readable storage medium comprising a set of program code instructions executable by a processor to implement the transmission method of claim 23.
30. A transmitter of a communication system to transmit a message to a receiver of the communication system, the transmitter comprising a processor configured to: divide an identifier of the transmitter into P parts, P being an integer number at least equal to two, the P parts being ordered and associated respectively with ranks varying between one and P, and the P parts comprising a part of rank one and P−1 parts, each of the P−1 parts being of rank two or higher, up to rank P, each of the P parts having a value; for at least one part of rank which is greater than or equal to two, determine an encryption key depending on the values of the parts of preceding rank, and encrypt said at least one part with the encryption key thus determined, the encryption being performed according to a symmetric key encryption protocol, the encryption providing an encrypted part; determine an encrypted identifier based on the encrypted part thus obtained; form a message to be transmitted based on the encrypted identifier; and transmit the message to the receiver.
31. The transmitter of claim 30, wherein the processor is configured to encrypt all parts of rank greater than or equal to two, thereby obtaining P−1 encryption keys and P−1 encrypted parts of rank two to P.
32. The transmitter of claim 31, wherein the processor determines the encrypted identifier by encrypting the part of rank one with an identical encryption key of a plurality of transmitters of the communication system, thereby obtaining an encrypted part of rank one; and wherein the processor concatenates the encrypted part of rank one to P.
33. The transmitter of claim 31, wherein the processor determines the encrypted identifier by concatenating the part of rank one with the encrypted parts of rank two to P, the part of rank one being unencrypted.
34. The transmitter of claim 30, wherein each of the P parts comprises a single bit of a bit field corresponding to the identifier of the transmitter.
35. The transmitter of claim 30, wherein the processor is configured to encrypt at least two parts, thereby obtaining at least two encryption keys, and the encryption keys are all different from each other.
36. A reception method for receiving, by a receiver of a communication system, a message transmitted by a transmitter of the communication system in accordance with the transmission method of claim 23, the reception method comprising: an extraction of the encrypted identifier of the message received; a division of the encrypted identifier into the P parts, at least one part of rank two or higher being the encrypted part; for the encrypted part, a determination of the encryption key depending on the values of unencrypted or previously decrypted parts of preceding rank, and a decryption of the encrypted part with the encrypted key thus determined, the decryption being performed according to the symmetric key encryption protocol used by the transmission method for transmitting the message, the decryption providing a decrypted part; and a determination of the identifier of the transmitter based on the decrypted part thus obtained.
37. The reception method of claim 36, wherein the decryption is performed on all parts of rank greater than or equal to two, thereby obtaining the P−1 encryption keys and P−1 decrypted parts of rank two to P.
38. The reception method of claim 37, wherein the part of rank one of the identifier of the transmitter being encrypted by the transmission method with an identical encryption key for a plurality of transmitters of the communication system to provide an encrypted part of rank one; and wherein the determination of the identifier of the transmitter comprises: a decryption of the encrypted part of rank one with said identical encryption key, thereby obtaining a decrypted part of rank one; and a concatenation of the decrypted part of rank one to P.
39. The reception method of claim 37, wherein the part of rank one of the identifier of the transmitter being transmitted unencrypted; and wherein the determination of the identifier of the transmitter comprises a concatenation of the unencrypted part of rank one with the decrypted part of rank two to P.
40. A computer-readable storage medium comprising a set of program code instructions executable one or more processors to implement the reception method of claim 36.
41. A receiver of a communication system to receive a message transmitted by a transmitter of the communication system in accordance with the transmission method of claim 23, the receiver comprises a processor configured to: extract the encrypted identifier of the message received; divide the encrypted identifier into P parts, at least one part of rank two or higher being the encrypted part; for the encrypted part, determine the encryption key depending on the values of unencrypted or previously decrypted parts of preceding rank, and decrypt the encrypted part with the encryption key thus determined, the decryption being performed according to the symmetric key encryption protocol used by the method for transmitting the message, the decryption providing a decrypted part; and determine the identifier of the transmitter based on the decrypted part thus obtained.
42. The receiver of claim 41, wherein the processor is configured to decrypt all parts of rank greater than or equal to two, thus obtaining the P−1 encryption keys and P−1 decrypted parts of rank two to P.
43. The receiver of claim 42, wherein the part of rank one of the identifier of the transmitter being encrypted by the transmission method with an identical encryption key for a plurality of transmitters of the communication system; and wherein the processor is configured to determine the identifier of the transmitter by: decrypting the encrypted part of rank one with said identical encryption key, thereby obtaining a decrypted part of rank one; and concatenating the decrypted part of rank one to P.
44. The receiver of claim 42, wherein the part of rank one of the identifier of the transmitter being transmitted unencrypted; and wherein the processor concatenates the unencrypted part of rank one with the decrypted part of rank two to P, to determine the identifier of the transmitter.
Description
BRIEF DESCRIPTION OF THE FIGURES
[0067] The invention will be better understood on reading the following description, given by way of non-limiting example, and made with reference to
[0068]
[0069]
[0070]
[0071]
[0072]
[0073]
[0074]
[0075]
[0076]
[0077]
[0078] In these figures, identical references from one figure to another designate identical or similar elements. For reasons of clarity, the represented elements are not necessarily to the same scale, unless otherwise stated.
DETAILED DESCRIPTION OF AN EMBODIMENT OF THE INVENTION
[0079] As previously indicated, the present invention aims at encrypting the identifier of a transmitter device of a communication system with a symmetric key encryption protocol using different encryption keys for different transmitter devices of the system.
[0080]
[0081]
[0082] As already previously mentioned, it is undesirable to use the same encryption key for all transmitter devices in the system, because this amounts to making the key public and it would not make sense in terms of security. It is also not possible to simply associate an encryption key with each transmitter device 10, because the receiver device 20 would not know which key to use in order to decrypt the encrypted identifier 31 contained in a message that it would have received from a transmitter device 10.
[0083]
[0084] As illustrated in
[0085] The transmission method 100 then includes, for at least one part of rank which is greater than or equal to two, a determination (102) of an encryption key according to the values of the parts of preceding rank.
[0086] The transmission method 100 then includes an encryption (103) of said part with the encryption key thus determined. The encryption is performed according to a symmetric key encryption protocol 40.
[0087] The transmission method 100 then includes a determination 104 of the encrypted identifier 31 from the encrypted part(s) thus obtained.
[0088] Finally, the transmission method 100 includes a formation 105 of the message to be transmitted from the encrypted identifier, as well as a transmission 106 of the message to the receiver device 20 using the communication module 13.
[0089] With such arrangements, the receiver device will be able to discover, as the identifier is decrypted, which encryption keys to use in order to completely decrypt the identifier. Indeed, it is sufficient for the receiver device 20 to know how to decrypt the part (encrypted or not) of rank one in order to then be able to successively determine the encryption keys which must be used to decrypt the encrypted parts of rank which is greater than or equal to two.
[0090] In the rest of the description, it is considered by way of non-limiting example that all parts of rank greater than or equal to two are encrypted. However, nothing prevents that, in variants, only some of the parts of rank two to P are encrypted.
[0091] In the considered example, and as illustrated in
[0092] In the example illustrated in
[0093] In particular implementations, each part 32 includes a single bit. The identifier 30 is then divided into N parts 32 (there is then P=N). Such arrangements allow maximising the number P of used parts 32 and therefore reinforcing the security of the encryption.
[0094] In the example illustrated in
[0095]
[0096] In the example considered and illustrated in
[0097] An encryption key 41-3 is determined from the value 0b1 of the first part 32 of the identifier 30. This encryption key 41-3 is used to encrypt, with the encryption protocol 40, the second part 32 of the identifier 30 (that is to say the part of rank two).
[0098] An encryption key 41-6 is determined from the respective values (0b1 and 0b0) of the first two parts 32 of the identifier 30. This encryption key 41-6 is used to encrypt, with the encryption protocol 40, the third part 32 of the identifier 30 (that is to say the part of rank three).
[0099] An encryption key 41-13 is determined from the respective values (0b1, 0b0 and 0b1) of the first three parts 32 of the identifier 30. This encryption key 41-13 is used to encrypt, with the encryption protocol 40, the fourth part 32 of the identifier 30 (that is to say the part of rank four).
[0100] It should be noted that, in the drawings, the reference numeral 41 generally relates to an encryption key used by a symmetric key encryption protocol 40. A reference 41-j represents a particular encryption key of index j.
[0101] An encrypted identifier 31 is then obtained by concatenating the encrypted parts 33 which are successively obtained.
[0102] It should be noted that there is no requirement that an encrypted part 33 has the same size as the corresponding unencrypted part. Also, the encrypted parts 33 do not necessarily all have the same size. There is also no requirement that the same encryption protocol 40 is used for the encryption of the different parts 32 of the identifier 30.
[0103] Also, and as has been described with reference to
[0104] In particular embodiments of the transmission method 100 according to the invention, rather than encrypting the first part of the identifier with an identical encryption key for all transmitter devices 10, it is possible not to encrypt the first part of the identifier (only the parts of rank 2 to P are encrypted). Such arrangements allow a receiver device 20 not to have to decrypt the first part of an encrypted identifier 31 received in a message. A part of rank which is greater than or equal to two can then be decrypted using an encryption key determined depending on the values of the previous decrypted parts (or not encrypted if it is the part of rank one).
[0105] In general, considering that the identifier of a transmitter device is divided into P parts, each part can take M.sub.k distinct values (for example, if the part of index k includes N.sub.k bits, then M.sub.k=2.sup.Nk) and that D is the number of different values that can be taken by an identifier (D=2.sup.N with N=Σ.sub.k=1.sup.k=P N.sub.k), then the encryption key associated with the part of rank two is shared between D/M.sub.1 transmitter devices, the encryption key associated with the part of rank three is shared between D/(M.sub.1×M.sub.2) transmitter devices, . . . , the encryption key associated with the part of rank k is shared between D/(M.sub.1×M2× . . . ×M.sub.(k−1)) transmitter devices, . . . , the encryption key associated with the part of rank P is shared between D/(M.sub.1×M2× . . . ×M.sub.(k−1)× . . . ×M.sub.(P−1)) transmitter devices.
[0106]
[0107] As illustrated in
[0108] The reception method 200 then includes a division 202 of the encrypted identifier 31 into the P parts.
[0109] The reception method 200 then includes, for at least one encrypted part 33 of rank greater than or equal to two, a determination 203 of an encryption key 41 depending on the values of the unencrypted or decrypted parts of preceding rank.
[0110] The reception method 200 then includes a decryption 204 of said encrypted part 33. The decryption is performed according to the symmetric key encryption protocol 40 which was used by the transmission method 100 for transmitting the message.
[0111] Finally, the reception method 200 includes a determination 205 of the identifier 30 of the transmitter device 10 from the decrypted part(s) thus obtained.
[0112]
[0113] The encryption key 41-1 allows decrypting the part of rank one of the identifier 30 (in the considered example, this encryption key 41-1 is known a priori to the receiver device 20 and allows decrypting the part of rank one of an identifier regardless of the transmitter device 10 having sent the message 15).
[0114] The encryption keys 41-2 and 41-3 allows decrypting the part of rank two of the identifier. They are determined depending on the value of the part of rank one of the identifier.
[0115] The encryption keys 41-4 to 41-7 allows decrypting the part of rank three of the identifier. They are determined depending on the values of the parts of rank one and two of the identifier.
[0116] The encryption keys 41-8 to 41-15 allows decrypting the part of rank four of the identifier. They are determined depending on the values of the parts of rank one to three of the identifier.
[0117] In particular implementations, the encryption keys 41-1 to 41-15 determined depending on the values of the parts 32 of an identifier 30 are all different from each other. Such arrangements allow reinforcing the security of the encryption of the identifier. In general, if an identifier is encoded on N bits, where all parts of an identifier are encrypted, and where each part corresponds to a bit of the identifier, then the same encryption key 41 which allows decrypting a part of rank of index k is shared by 2.sup.N−k+1 transmitter devices. The number of encryption keys which must be stored by a transmitter device 10 to encrypt the identifier 30 thereof is equal to N (as many encryption keys as parts into which the identifier is divided). The number of encryption keys that must be stored by a receiver device 20 in order to be able to decrypt an identifier included in a message 15 transmitted by any transmitter device 10 is equal to Σ.sub.j=0.sup.N−1 2.sup.j=(2.sup.N−1). With an identifier encoded on thirty-two bits (N=32), more than four billion (2.sup.32=4,294,967,296) transmitter devices can have a different identifier; a transmitter device must store at most thirty-two encryption keys (i.e. a memory occupation of five hundred and twelve bytes (512 B) for encryption keys of 128 bits in length); and a receiver device must store at most 2.sup.32−1=4,294,967,295 encryption keys (which represents a memory occupancy of sixty-four gibibytes (64 GiB) for encryption keys of 128 bits in length). It is also interesting to note that only two different transmitter devices can have the same set of encryption keys.
[0118]
[0119] The encrypted part 33 of rank one is decrypted according to the encryption protocol 40 from the encryption key 41-1 which is common to all transmitter devices 10 and which is known a priori by the receiver device 20. Possibly, other parameters such as for example the useful data or a sequence number contained in the message can be used to decrypt the message. The receiver device 20 can then determine, from the value 0b1 of the first decrypted part 32, the encryption key 41-3 which must be used to decrypt the part of rank two. In the considered example, the value of the decrypted part of rank two is 0b0. The receiver device 20 can then determine, from the value 0b10 taken by the first two decrypted parts, the encryption key 41-6 which must be used to decrypt the part of rank three. In the considered example, the value of the decrypted part of rank three is 0b1. The receiver device 20 can then determine, from the value 0b101 taken by the first three decrypted parts, the encryption key 41-13 which must be used to decrypt the part of rank four. In the considered example, the value of the decrypted part of rank four is 0b1.
[0120] The identifier 30 of the transmitter device 10 which transmitted the message 15 is then obtained by concatenating the decrypted parts which are successively obtained. The value of identifier 30 is 0b1011.
[0121] The above description clearly illustrates that, through its different features and their advantages, the present invention achieves the set objectives. In particular, the invention allows encrypting, with a very satisfactory level of security, the identifier of a transmitter device with a symmetric key encryption protocol. A transmitter device which receives a message containing an encrypted identifier is capable of decrypting the identifier.
[0122] It should be noted that the implementations and embodiments considered above have been described by way of non-limiting examples, and that other variants are therefore possible.
[0123] In particular, and as previously mentioned, is not necessary for all parts of an identifier to be encrypted. The size of a part, encrypted or not, can vary according to the implementations. Different symmetric key encryption protocols can be used, and the choice of a particular encryption protocol is only one variation of the invention.
[0124] The invention has been described by considering the communication systems for connected objects of the IoT or M2M type. However, nothing excludes, following other examples, considering other communication systems.