Further, the area key information and stream key information are previously stored in the authentication information storing section 24 and the information is used for the authentication process, and therefore, usage of the third party such as the authentication station (CA center) and the inquiry to the third party can be made unnecessary and the mutual authentication operation can be effected ex