Mutual authentication is performed by using first and second
authentication key data between a first data processing device and a
second data processing device. When the mutual authentication is
succeeded, the first data processing device uses encryption key data for
encrypting predetermined data and outputs the data to the second data
processing device. The second data processing device decrypts the
encrypted data by using decryption key data and judges whether the data
is adequate or not for making the data to effective.