DE19735922A1 - Cryptographic method based on synchronous stream ciphering with one time pad - Google Patents

Cryptographic method based on synchronous stream ciphering with one time pad

Info

Publication number
DE19735922A1
DE19735922A1 DE1997135922 DE19735922A DE19735922A1 DE 19735922 A1 DE19735922 A1 DE 19735922A1 DE 1997135922 DE1997135922 DE 1997135922 DE 19735922 A DE19735922 A DE 19735922A DE 19735922 A1 DE19735922 A1 DE 19735922A1
Authority
DE
Germany
Prior art keywords
time pad
pointers
pointer
values
cryptographic method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
DE1997135922
Other languages
German (de)
Inventor
Helge Fomm
Valentin Akdemir
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to DE1997135922 priority Critical patent/DE19735922A1/en
Publication of DE19735922A1 publication Critical patent/DE19735922A1/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The cryptographic method involves callipering a larger number of random values of the one-time pad by several pointers. The values are combined using logic instruction to one random value. The random value is used for ciphering. The distance between the pointers is taken from a secret code. Preferably the user of the encoding program first provides a secret phrase via an secret code line (18) as a secret code. The code is converted by a hash value generator (19) to hash values for the pointer spacers. The hash values are combined in a logic circuit (11). One pointer is set to its start position and the other pointers are set according to the hash values.

Description

Die Erfindung betrifft ein kryptographisches Verfahren, das auf dem bekannten Verfahren der synchronen Stromchiffrierung mittels One-Time-Pad aufbaut und dieses in einem wesentlichen Punkt verbessert.The invention relates to a cryptographic method based on the known methods of synchronous stream encryption using One-time pad builds up and this in one essential point improved.

Bekannt ist, daß die synchrone Stromchiffrierung mit Zufallswerten, die einem One-Time-Pad entnommen werden, das einzig bekannte Verschlüsselungsverfahren ist, bei dem eine Entschlüsselung unmöglich ist.It is known that synchronous stream encryption with random values, which are taken from a one-time pad, the only known one Encryption process is a decryption is impossible.

Das Verfahren weist jedoch die Schwäche auf, daß die gesamte Sicherheit davon abhängt, daß die zum Verschlüsseln verwendete Datenbasis (das One-Time-Pad) geheim gehalten wird.However, the method has the weakness that the whole Security depends on the one used for encryption Database (the one-time pad) is kept secret.

Das Ziel der Erfindung besteht darin, diesen Mangel zu beseitigen. Dazu muß durch die Erfindung die Aufgabe gelöst werden, den Zusammenhang zwischen den Zufallswerten des One-Time-Pads und den Zufallswerten, mit denen tatsächlich verschlüsselt wird, so zu verändern, daß zwischen beiden kein berechenbarer Zusammenhang besteht.The aim of the invention is to remedy this deficiency. For this purpose, the object must be solved by the invention Relationship between the random values of the one-time pad and the random values with which encryption is actually carried out change that there is no predictable relationship between the two consists.

Die Aufgabe wird erfindungsgemäß gelöst, in dem das One-Time-Pad nicht von einem einzigen Zeiger seriell abgetastet wird, sondern von mehreren Zeigern, deren Abstand zueinander von einem Geheimcode, zum Beispiel von einer Gedächtnisphrase, abhängig ist. The object is achieved in which the one-time pad is not scanned serially by a single pointer, but by several pointers, the distance between them from a secret code, for example, depending on a memory phrase.  

Die durch die Zeiger abgetasteten Zufallswerte werden durch logische Verknüpfungen (zum Beispiel durch die Exklusiv-Oder-Funktion) zu einem Wert zusammengefaßt. Jeder so gebildete Zufallswert wird zur Chiffrierung eines Zeichens der zu verschlüsselnden Nachricht verwendet.The random values sampled by the pointers are replaced by logical ones Links (for example through the exclusive-or function) summarized a value. Every random value formed in this way becomes Encrypts a character of the message to be encrypted used.

Darstellung eines AusführungsbeispielesRepresentation of an embodiment

Die Erfindung soll im weiteren an einem Ausführungsbeispiel, anhand der Blockstruktur eines Verschlüsselungsprogrammes, näher erläutert werden. In der dazugehörigen Zeichnung zeigt:The invention is intended to be further illustrated using an exemplary embodiment the block structure of an encryption program, explained in more detail will. In the accompanying drawing:

Fig. 1 Die Blockstruktur des Verschlüsselungsprogrammes. Fig. 1 The block structure of the encryption program.

BezugszeichenlisteReference list

1 512 kByte Zufallszahlen zu je 8 Bit
2 Zeiger 1
3 Zeiger 2
4 Zeiger 3
5 Zeiger 4
6 Zeiger 5
7 Abstand zwischen Zeiger 1 und Zeiger 2
8 Abstand zwischen Zeiger 2 und Zeiger 3
9 Abstand zwischen Zeiger 3 und Zeiger 4
10 Abstand zwischen Zeiger 4 und Zeiger 5
11 Logikeinheit 1
12 Nachricht
13 Chiffrierstrom
14 Nachrichtenstrom
15 Logikeinheit 2
16 Kryptogramm
17 Geheimcode
18 Geheimcodezuführung
19 Hashwertgenerator
20 Hashwerte
1 512 kbyte random numbers of 8 bits each
2 hands 1
3 hands 2
4 hands 3
5 hands 4
6 hands 5
7 Distance between pointer 1 and pointer 2
8 Distance between pointer 2 and pointer 3
9 Distance between pointer 3 and pointer 4
10 Distance between pointer 4 and pointer 5
11 logic unit 1
12 message
13 cipher stream
14 message flow
15 logic unit 2
16 cryptogram
17 secret code
18 Secret code feed
19 hash value generator
20 hashes

Der Anwender des erfindungsgemäßen Verschlüsselungsprogrammes gibt zunächst eine geheime Gedächtnisphrase über die Geheimcodezuführung 18, zum Beispiel der Tastatur, als Geheimcode 17 ein. Dieser wird vom Hashwertgenerator 19 zu den Hashwerten für die Zeigerabstände 7, 8, 9 und 10 umgewandelt. Die gebildeten Hashwerte werden der Logikeinheit 1 11 zugeführt. Zeiger 1 2 wird auf seine Anfangsposition gesetzt und alle weiteren Zeiger gemäß den zuvor ermittelten Hashwerten. Die Werte aus den 512 kByte Zufallszahlen 1, auf die die Zeiger 1 bis 7, 8, 9, 10 zeigen, werden von der Logikeinheit 1 11 mittels XOR-Funktion zum Chiffrierstrom 13 zusammengefaßt. Die Nachricht 12 wird der Reihe nach byteweise abgetastet. Diese Bytes ergeben den Nachrichtenstrom 14. Der Chiffrierstrom 13 und der Nachrichtenstrom 14 werden der Logikeinheit 2 15 zugeführt und von dieser per XOR-Funktion zum Kryptogramm 16 verknüpft.The user of the encryption program according to the invention first enters a secret memory phrase as the secret code 17 via the secret code feed 18 , for example the keyboard. This hash value generator 19 converts the hash values for the pointer spacings 7 , 8 , 9 and 10 . The hash values formed are supplied to the logic unit 11 . Pointer 1 2 is set to its initial position and all other pointers according to the previously determined hash values. The values from the 512 kbyte random numbers 1 , to which the pointers 1 to 7 , 8 , 9 , 10 point, are combined by the logic unit 11 using the XOR function to form the cipher stream 13 . The message 12 is scanned in order byte. These bytes make up the message stream 14 . The cipher stream 13 and the message stream 14 are supplied to the logic unit 2 15 and are linked by the latter to the cryptogram 16 using the XOR function.

Claims (1)

Die Erfindung betrifft ein kryptographisches Verfahren, das auf dem bekannten Verfahren der synchronen Stromchiffrierung mittels One-Time-Pad aufbaut und dieses in einem wesentlichen Punkt verbessert, dadurch gekennzeichnet, daß mehrere Zeiger eine größere Anzahl an Zufallswerten des One- Time-Pads abgreifen und diese über logische Verknüpfungen zu einem Zufallswert zusammengefaßt werden, welcher zur Chiffrierung verwendet wird, wobei der Abstand der Zeiger zueinander von einem Geheimcode abgeleitet wird.The invention relates to a cryptographic method that builds on the known method of synchronous stream encryption using a one-time pad and improves it in an essential point, characterized in that several pointers tap a larger number of random values from the one-time pad and these can be combined via logical links to a random value which is used for encryption, the distance between the pointers being derived from a secret code.
DE1997135922 1997-08-08 1997-08-08 Cryptographic method based on synchronous stream ciphering with one time pad Withdrawn DE19735922A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
DE1997135922 DE19735922A1 (en) 1997-08-08 1997-08-08 Cryptographic method based on synchronous stream ciphering with one time pad

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
DE1997135922 DE19735922A1 (en) 1997-08-08 1997-08-08 Cryptographic method based on synchronous stream ciphering with one time pad

Publications (1)

Publication Number Publication Date
DE19735922A1 true DE19735922A1 (en) 1998-02-26

Family

ID=7839420

Family Applications (1)

Application Number Title Priority Date Filing Date
DE1997135922 Withdrawn DE19735922A1 (en) 1997-08-08 1997-08-08 Cryptographic method based on synchronous stream ciphering with one time pad

Country Status (1)

Country Link
DE (1) DE19735922A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1069508A2 (en) * 1999-07-14 2001-01-17 Bernd Röllgen Cryptographic method modifiable during run time
EP1107505A2 (en) * 1999-11-30 2001-06-13 MD Technology S.A. Polymorphous encryption system
DE10027974A1 (en) * 2000-06-06 2002-01-24 Toralf Heidel End-to-end encryption method for data communication system, involves splitting data into symbols using subscriber key blocks, and converting them to assigned data block values
DE19856237C2 (en) * 1998-12-07 2002-03-07 Ibm Dynamic key generation and confidential synchronization of encryption components
DE10204586A1 (en) * 2002-02-05 2003-08-14 Forschungsgesellschaft Fuer An Automatic data coding and decoding circuit for transmission system has digital code source in form of addressable memory to produce code independent of content of input clear text

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE19856237C2 (en) * 1998-12-07 2002-03-07 Ibm Dynamic key generation and confidential synchronization of encryption components
EP1069508A2 (en) * 1999-07-14 2001-01-17 Bernd Röllgen Cryptographic method modifiable during run time
EP1069508A3 (en) * 1999-07-14 2003-09-24 Bernd Röllgen Cryptographic method modifiable during run time
EP1107505A2 (en) * 1999-11-30 2001-06-13 MD Technology S.A. Polymorphous encryption system
EP1107505A3 (en) * 1999-11-30 2002-07-24 MD Technology S.A. Polymorphous encryption system
DE10027974A1 (en) * 2000-06-06 2002-01-24 Toralf Heidel End-to-end encryption method for data communication system, involves splitting data into symbols using subscriber key blocks, and converting them to assigned data block values
DE10204586A1 (en) * 2002-02-05 2003-08-14 Forschungsgesellschaft Fuer An Automatic data coding and decoding circuit for transmission system has digital code source in form of addressable memory to produce code independent of content of input clear text

Similar Documents

Publication Publication Date Title
DE69929251T2 (en) ENCRYPTION SYSTEM WITH A KEY OF CHANGING LENGTH
DE69728465T2 (en) Non-parallel multi-cycle encryption device
EP2433241B1 (en) Encoding methods
DE19733829C2 (en) Method for encrypting or decrypting a data sequence
DE69938539T2 (en) Cryptographic device with parallel encryption blocks
EP0012974B1 (en) Method for enciphering data blocks of a given length
EP2647157A1 (en) Method and apparatus for performing symmetrical stream encryption of data
EP0189734B1 (en) Method and apparatus for converting a digital data sequence into an enciphered form
DE69826778T2 (en) Devices for encrypting and decrypting a key recovery condition
EP0011050B1 (en) Enciphering and deciphering apparatus
DE19735922A1 (en) Cryptographic method based on synchronous stream ciphering with one time pad
EP1683029B1 (en) Method for storing data in a random access memory and encryption and decryption device
DE3905667C2 (en)
DE105553T1 (en) DEVICE FOR ENCRYPTING DIGITAL SIGNALS WHICH CONTAINS ONE OR MORE DES CIRCUITS.
EP1676394A1 (en) Cryptographic method and device
EP0173647B1 (en) Enciphering/deciphering method
DE19757370C2 (en) Process for the tactile generation of pseudo-random data words
DE10158003B4 (en) Method for generating keys for data encryption and method for data encryption
EP0624839B1 (en) Method and circuitry for producing a pseudo random sequence and its use
EP0406457A1 (en) Data enciphering and deciphering method
DE202009008987U1 (en) Device for encrypting data
WO1997032417A1 (en) Process for generating a check word for a bit sequence for verifying the integrity and authenticity of the bit sequence
DE1622840C1 (en) Arrangement for the encryption of plain texts and for the decryption of corresponding secret texts
WO2015176087A1 (en) Method and device for performing a symmetric stream encyption of data
DE2829293C2 (en) Method for generating random strings of characters

Legal Events

Date Code Title Description
OAV Applicant agreed to the publication of the unexamined application as to paragraph 31 lit. 2 z1
8122 Nonbinding interest in granting licenses declared
8139 Disposal/non-payment of the annual fee