CA2336291A1 - Cryptographic communication process and apparatus - Google Patents
Cryptographic communication process and apparatus Download PDFInfo
- Publication number
- CA2336291A1 CA2336291A1 CA002336291A CA2336291A CA2336291A1 CA 2336291 A1 CA2336291 A1 CA 2336291A1 CA 002336291 A CA002336291 A CA 002336291A CA 2336291 A CA2336291 A CA 2336291A CA 2336291 A1 CA2336291 A1 CA 2336291A1
- Authority
- CA
- Canada
- Prior art keywords
- alpha
- key
- decrypt
- encrypt
- text
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0637—Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
Abstract
A communication system, which includes an origination space, a communications channel, and a destination space associated with the origination space via the communications channel. The origination space includes an encryption engine for generating an output symbol O t based on an input symbol It and means for receiving an encrypt key, an encrypt text/key relation, and the input symbol. The destination space includes a decryption engine for generating a decrypted symbol l't based on the output symbol received from the origination space via the communications channel and means for receiving a decrypt key and a decrypt text/key relation. The encrypt text/key relation controls the encryption engine such that O t=
.alpha.N(t) +
.pi.N[.alpha.N-1(t) + .pi.N-1[.alpha.N-2(t) + . . . + .pi.2[.alpha.1(t) +
.pi.1[l t + .alpha.0(t)]] . . .]], mod W, where .alpha.N, .alpha.N-1, . . . , .alpha.1, .alpha.0 are N+1 additive transformations defined by the encrypt key, where .pi.N, .pi.N-1, . . . , .pi.2, .pi.0 are N permutations defined by the encrypt key, and where W represents the number of possibilities for each permutation defined by the encrypt key. The decrypt text/key relation controls the decryption engine such that l't =.pi.1 -1[.pi.2 -1[.pi.3 -1 . . . [.pi.N-1 -1[.pi.N -1[O
t-.alpha.'N(t)]-.alpha.'N-1(t)]- ...-.alpha.'3(t)]-.alpha.'2(t)]-.alpha.'1(t)]-.alpha.'0(t), mod W, where .pi.i-1 is defined by the decrypt key as the inverse of the permutation .pi.1, where .alpha.'N, .alpha.'N-1, . . . , .alpha.'1, .alpha.'0 are N+1 additive transformations defined by the decrypt key, and where W represents the number of possibilities for each inverse permutation defined by the decrypt key.
.alpha.N(t) +
.pi.N[.alpha.N-1(t) + .pi.N-1[.alpha.N-2(t) + . . . + .pi.2[.alpha.1(t) +
.pi.1[l t + .alpha.0(t)]] . . .]], mod W, where .alpha.N, .alpha.N-1, . . . , .alpha.1, .alpha.0 are N+1 additive transformations defined by the encrypt key, where .pi.N, .pi.N-1, . . . , .pi.2, .pi.0 are N permutations defined by the encrypt key, and where W represents the number of possibilities for each permutation defined by the encrypt key. The decrypt text/key relation controls the decryption engine such that l't =.pi.1 -1[.pi.2 -1[.pi.3 -1 . . . [.pi.N-1 -1[.pi.N -1[O
t-.alpha.'N(t)]-.alpha.'N-1(t)]- ...-.alpha.'3(t)]-.alpha.'2(t)]-.alpha.'1(t)]-.alpha.'0(t), mod W, where .pi.i-1 is defined by the decrypt key as the inverse of the permutation .pi.1, where .alpha.'N, .alpha.'N-1, . . . , .alpha.'1, .alpha.'0 are N+1 additive transformations defined by the decrypt key, and where W represents the number of possibilities for each inverse permutation defined by the decrypt key.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/108,312 US6075865A (en) | 1998-07-01 | 1998-07-01 | Cryptographic communication process and apparatus |
US09/108,312 | 1998-07-01 | ||
PCT/US1998/013626 WO2000002340A2 (en) | 1998-07-01 | 1998-07-02 | Cryptographic communication process and apparatus |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2336291A1 true CA2336291A1 (en) | 2000-01-13 |
CA2336291C CA2336291C (en) | 2007-03-27 |
Family
ID=22321489
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002336291A Expired - Lifetime CA2336291C (en) | 1998-07-01 | 1998-07-02 | Cryptographic communication process and apparatus |
Country Status (22)
Country | Link |
---|---|
US (2) | US6075865A (en) |
EP (1) | EP1260052B1 (en) |
JP (1) | JP4053730B2 (en) |
KR (1) | KR100355620B1 (en) |
CN (1) | CN1636343A (en) |
AP (1) | AP2001002031A0 (en) |
AT (1) | ATE307436T1 (en) |
AU (1) | AU748259B2 (en) |
BR (1) | BR9815922A (en) |
CA (1) | CA2336291C (en) |
CZ (1) | CZ299773B6 (en) |
DE (1) | DE69831982T2 (en) |
EA (1) | EA003231B1 (en) |
HU (1) | HUP0204260A2 (en) |
IL (1) | IL140637A (en) |
MX (1) | MXPA01000220A (en) |
NO (1) | NO20006673D0 (en) |
NZ (1) | NZ509290A (en) |
OA (1) | OA11628A (en) |
PL (1) | PL347367A1 (en) |
WO (1) | WO2000002340A2 (en) |
ZA (1) | ZA200100561B (en) |
Families Citing this family (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10361802B1 (en) | 1999-02-01 | 2019-07-23 | Blanding Hovenweep, Llc | Adaptive pattern recognition based control system and method |
ATE429748T1 (en) * | 1998-01-02 | 2009-05-15 | Cryptography Res Inc | LEAK RESISTANT CRYPTOGRAPHIC METHOD AND APPARATUS |
US7587044B2 (en) | 1998-01-02 | 2009-09-08 | Cryptography Research, Inc. | Differential power analysis method and apparatus |
WO2003065169A2 (en) | 2002-01-30 | 2003-08-07 | Tecsec, Inc. | Access system utilizing multiple factor identification and authentication |
CA2333095C (en) | 1998-06-03 | 2005-05-10 | Cryptography Research, Inc. | Improved des and other cryptographic processes with leak minimization for smartcards and other cryptosystems |
ATE360866T1 (en) | 1998-07-02 | 2007-05-15 | Cryptography Res Inc | LEAK-RESISTANT UPDATING OF AN INDEXED CRYPTOGRAPHIC KEY |
US7292693B1 (en) * | 1998-08-13 | 2007-11-06 | Teledyne Technologies Incorporated | Deterministically generating block substitution tables which meet a given standard of nonlinearity |
US6578061B1 (en) * | 1999-01-19 | 2003-06-10 | Nippon Telegraph And Telephone Corporation | Method and apparatus for data permutation/division and recording medium with data permutation/division program recorded thereon |
US6735174B1 (en) * | 2000-03-29 | 2004-05-11 | Intel Corporation | Method and systems for flow control of transmissions over channel-based switched fabric connections |
US7280663B1 (en) * | 2000-05-22 | 2007-10-09 | University Of Southern California | Encryption system based on crossed inverse quasigroups |
WO2002003605A1 (en) * | 2000-07-04 | 2002-01-10 | Koninklijke Philips Electronics N.V. | Substitution-box for symmetric-key ciphers |
US7181017B1 (en) | 2001-03-23 | 2007-02-20 | David Felsher | System and method for secure three-party communications |
US20070195960A1 (en) * | 2002-04-12 | 2007-08-23 | General Dynamics Advanced Information Systems | Apparatus and method for encrypting data |
FR2831365B1 (en) * | 2002-05-06 | 2004-02-13 | Sagem | METHOD FOR CONTROLLING ACCESS TO A NETWORK |
US20040022390A1 (en) * | 2002-08-02 | 2004-02-05 | Mcdonald Jeremy D. | System and method for data protection and secure sharing of information over a computer network |
KR100456599B1 (en) * | 2002-11-12 | 2004-11-09 | 삼성전자주식회사 | Cryptographic apparatus with parallel des structure |
US9818136B1 (en) | 2003-02-05 | 2017-11-14 | Steven M. Hoffberg | System and method for determining contingent relevance |
US20070101140A1 (en) * | 2003-07-31 | 2007-05-03 | Thomas Licensing, Inc. | Generation and validation of diffie-hellman digital signatures |
US7366299B2 (en) * | 2003-09-26 | 2008-04-29 | International Business Machines Corporation | Method for encrypting and decrypting data using derivative equations and factors |
US7526643B2 (en) * | 2004-01-08 | 2009-04-28 | Encryption Solutions, Inc. | System for transmitting encrypted data |
US8031865B2 (en) * | 2004-01-08 | 2011-10-04 | Encryption Solutions, Inc. | Multiple level security system and method for encrypting data within documents |
US7752453B2 (en) | 2004-01-08 | 2010-07-06 | Encryption Solutions, Inc. | Method of encrypting and transmitting data and system for transmitting encrypted data |
WO2006020426A2 (en) | 2004-07-29 | 2006-02-23 | Infoassure, Inc. | Cryptographic key construct |
US20060282681A1 (en) * | 2005-05-27 | 2006-12-14 | Scheidt Edward M | Cryptographic configuration control |
US8874477B2 (en) | 2005-10-04 | 2014-10-28 | Steven Mark Hoffberg | Multifactorial optimization system and method |
CN101931623B (en) * | 2010-07-06 | 2013-06-12 | 华南理工大学 | Safety communication method suitable for remote control with limited capability at controlled end |
US10212144B2 (en) | 2013-03-15 | 2019-02-19 | Assa Abloy Ab | Digital credential with embedded authentication instructions |
US9547767B2 (en) * | 2013-11-13 | 2017-01-17 | Via Technologies, Inc. | Event-based apparatus and method for securing bios in a trusted computing system during execution |
DE102014016548A1 (en) * | 2014-11-10 | 2016-05-12 | Giesecke & Devrient Gmbh | Method for testing and hardening software applications |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4316055A (en) * | 1976-12-30 | 1982-02-16 | International Business Machines Corporation | Stream/block cipher crytographic system |
US5375169A (en) * | 1993-05-28 | 1994-12-20 | Tecsec, Incorporated | Cryptographic key management method and apparatus |
US5454039A (en) * | 1993-12-06 | 1995-09-26 | International Business Machines Corporation | Software-efficient pseudorandom function and the use thereof for encryption |
-
1998
- 1998-07-01 US US09/108,312 patent/US6075865A/en not_active Expired - Lifetime
- 1998-07-02 CZ CZ20004935A patent/CZ299773B6/en not_active IP Right Cessation
- 1998-07-02 NZ NZ509290A patent/NZ509290A/en unknown
- 1998-07-02 PL PL98347367A patent/PL347367A1/en not_active IP Right Cessation
- 1998-07-02 WO PCT/US1998/013626 patent/WO2000002340A2/en active IP Right Grant
- 1998-07-02 EA EA200100093A patent/EA003231B1/en not_active IP Right Cessation
- 1998-07-02 DE DE69831982T patent/DE69831982T2/en not_active Expired - Fee Related
- 1998-07-02 IL IL14063798A patent/IL140637A/en not_active IP Right Cessation
- 1998-07-02 HU HU0204260A patent/HUP0204260A2/en unknown
- 1998-07-02 JP JP2000558628A patent/JP4053730B2/en not_active Expired - Fee Related
- 1998-07-02 CA CA002336291A patent/CA2336291C/en not_active Expired - Lifetime
- 1998-07-02 OA OA1200000362A patent/OA11628A/en unknown
- 1998-07-02 AT AT98933010T patent/ATE307436T1/en not_active IP Right Cessation
- 1998-07-02 EP EP98933010A patent/EP1260052B1/en not_active Expired - Lifetime
- 1998-07-02 AP APAP/P/2001/002031A patent/AP2001002031A0/en unknown
- 1998-07-02 KR KR1020017000028A patent/KR100355620B1/en not_active IP Right Cessation
- 1998-07-02 MX MXPA01000220A patent/MXPA01000220A/en unknown
- 1998-07-02 CN CNA988141965A patent/CN1636343A/en active Pending
- 1998-07-02 AU AU82775/98A patent/AU748259B2/en not_active Ceased
- 1998-07-02 BR BR9815922-4A patent/BR9815922A/en not_active IP Right Cessation
-
2000
- 2000-02-17 US US09/506,016 patent/US6266417B1/en not_active Expired - Fee Related
- 2000-12-28 NO NO20006673A patent/NO20006673D0/en not_active Application Discontinuation
-
2001
- 2001-01-19 ZA ZA200100561A patent/ZA200100561B/en unknown
Also Published As
Publication number | Publication date |
---|---|
KR20010074633A (en) | 2001-08-04 |
AP2001002031A0 (en) | 2001-03-31 |
IL140637A (en) | 2005-08-31 |
AU748259B2 (en) | 2002-05-30 |
EP1260052B1 (en) | 2005-10-19 |
EP1260052A2 (en) | 2002-11-27 |
PL347367A1 (en) | 2002-04-08 |
OA11628A (en) | 2004-09-10 |
EA003231B1 (en) | 2003-02-27 |
ZA200100561B (en) | 2002-03-27 |
AU8277598A (en) | 2000-01-24 |
IL140637A0 (en) | 2002-02-10 |
US6075865A (en) | 2000-06-13 |
EA200100093A1 (en) | 2001-12-24 |
CN1636343A (en) | 2005-07-06 |
DE69831982D1 (en) | 2005-11-24 |
EP1260052A4 (en) | 2004-04-14 |
US6266417B1 (en) | 2001-07-24 |
BR9815922A (en) | 2001-02-20 |
NZ509290A (en) | 2003-07-25 |
NO20006673D0 (en) | 2000-12-28 |
WO2000002340A3 (en) | 2002-09-12 |
MXPA01000220A (en) | 2002-04-24 |
JP2003516552A (en) | 2003-05-13 |
ATE307436T1 (en) | 2005-11-15 |
CA2336291C (en) | 2007-03-27 |
KR100355620B1 (en) | 2002-10-11 |
CZ299773B6 (en) | 2008-11-19 |
WO2000002340A2 (en) | 2000-01-13 |
DE69831982T2 (en) | 2006-04-27 |
CZ20004935A3 (en) | 2001-08-15 |
JP4053730B2 (en) | 2008-02-27 |
HUP0204260A2 (en) | 2003-04-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2336291A1 (en) | Cryptographic communication process and apparatus | |
AU683325B2 (en) | System and apparatus for blockwise encryption/decryption of data | |
US8259934B2 (en) | Methods and devices for a chained encryption mode | |
US6347143B1 (en) | Cryptographic device with encryption blocks connected parallel | |
EP0725511A3 (en) | Method for data encryption/decryption using cipher block chaining (CBC) and message authetication codes (MAC) | |
ATE403992T1 (en) | CRYPTOGRAPHIC APPARATUS AND METHOD | |
US7110539B1 (en) | Method and apparatus for encrypting and decrypting data | |
WO2001045317A3 (en) | Methods and apparatus for selective encryption and decryption of point to multi-point messages | |
EP0792042A3 (en) | Method of effecting communications using common cryptokey | |
CA2474856A1 (en) | Method and apparatus for generating a stream cipher | |
CA2213096A1 (en) | Key management system for mixed-trust environments | |
WO2001056221B1 (en) | Block encryption method and schemes for data confidentiality and integrity protection | |
HK1011806A1 (en) | A method and network for communicating between a group of entities a text encrypted using an encryption key intrinsic to the group of entities in a network having a plurality of entities and a center | |
MY146325A (en) | Access control method for an encrypted programme. | |
KR101126024B1 (en) | System and Method for Three-Phase Data Encryption | |
GB2132857A (en) | Voice encryption and decryption system | |
CA2226831A1 (en) | Decryption of retransmitted data in an encrypted communication system | |
GB0028369D0 (en) | A communication system | |
JP2000209195A (en) | Cipher communication system | |
KR20060011999A (en) | Des algorithm-based encryption method | |
CN1237752C (en) | Methods and apparatus for enhanced security expansion of secret key into lookup table for improved security for wireless telephone messages | |
CA2258750A1 (en) | Methods and apparatus for enhanced security expansion of a secret key into a lookup table for improved security for wireless telephone messages | |
JPS6032449A (en) | Ciphered digital broadcast equipment | |
Massey | On probabilistic encipherment | |
US20040071290A1 (en) | Encryption apparatus and method in a wireless communications system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKEX | Expiry |
Effective date: 20180703 |