DE19735922A1 - Cryptographic method based on synchronous stream ciphering with one time pad - Google Patents
Cryptographic method based on synchronous stream ciphering with one time padInfo
- Publication number
- DE19735922A1 DE19735922A1 DE1997135922 DE19735922A DE19735922A1 DE 19735922 A1 DE19735922 A1 DE 19735922A1 DE 1997135922 DE1997135922 DE 1997135922 DE 19735922 A DE19735922 A DE 19735922A DE 19735922 A1 DE19735922 A1 DE 19735922A1
- Authority
- DE
- Germany
- Prior art keywords
- time pad
- pointers
- pointer
- values
- cryptographic method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
- H04L9/0656—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
Description
Die Erfindung betrifft ein kryptographisches Verfahren, das auf dem bekannten Verfahren der synchronen Stromchiffrierung mittels One-Time-Pad aufbaut und dieses in einem wesentlichen Punkt verbessert.The invention relates to a cryptographic method based on the known methods of synchronous stream encryption using One-time pad builds up and this in one essential point improved.
Bekannt ist, daß die synchrone Stromchiffrierung mit Zufallswerten, die einem One-Time-Pad entnommen werden, das einzig bekannte Verschlüsselungsverfahren ist, bei dem eine Entschlüsselung unmöglich ist.It is known that synchronous stream encryption with random values, which are taken from a one-time pad, the only known one Encryption process is a decryption is impossible.
Das Verfahren weist jedoch die Schwäche auf, daß die gesamte Sicherheit davon abhängt, daß die zum Verschlüsseln verwendete Datenbasis (das One-Time-Pad) geheim gehalten wird.However, the method has the weakness that the whole Security depends on the one used for encryption Database (the one-time pad) is kept secret.
Das Ziel der Erfindung besteht darin, diesen Mangel zu beseitigen. Dazu muß durch die Erfindung die Aufgabe gelöst werden, den Zusammenhang zwischen den Zufallswerten des One-Time-Pads und den Zufallswerten, mit denen tatsächlich verschlüsselt wird, so zu verändern, daß zwischen beiden kein berechenbarer Zusammenhang besteht.The aim of the invention is to remedy this deficiency. For this purpose, the object must be solved by the invention Relationship between the random values of the one-time pad and the random values with which encryption is actually carried out change that there is no predictable relationship between the two consists.
Die Aufgabe wird erfindungsgemäß gelöst, in dem das One-Time-Pad nicht von einem einzigen Zeiger seriell abgetastet wird, sondern von mehreren Zeigern, deren Abstand zueinander von einem Geheimcode, zum Beispiel von einer Gedächtnisphrase, abhängig ist. The object is achieved in which the one-time pad is not scanned serially by a single pointer, but by several pointers, the distance between them from a secret code, for example, depending on a memory phrase.
Die durch die Zeiger abgetasteten Zufallswerte werden durch logische Verknüpfungen (zum Beispiel durch die Exklusiv-Oder-Funktion) zu einem Wert zusammengefaßt. Jeder so gebildete Zufallswert wird zur Chiffrierung eines Zeichens der zu verschlüsselnden Nachricht verwendet.The random values sampled by the pointers are replaced by logical ones Links (for example through the exclusive-or function) summarized a value. Every random value formed in this way becomes Encrypts a character of the message to be encrypted used.
Die Erfindung soll im weiteren an einem Ausführungsbeispiel, anhand der Blockstruktur eines Verschlüsselungsprogrammes, näher erläutert werden. In der dazugehörigen Zeichnung zeigt:The invention is intended to be further illustrated using an exemplary embodiment the block structure of an encryption program, explained in more detail will. In the accompanying drawing:
Fig. 1 Die Blockstruktur des Verschlüsselungsprogrammes. Fig. 1 The block structure of the encryption program.
BezugszeichenlisteReference list
1 512 kByte Zufallszahlen zu je 8 Bit
2 Zeiger 1
3 Zeiger 2
4 Zeiger 3
5 Zeiger 4
6 Zeiger 5
7 Abstand zwischen Zeiger 1 und Zeiger 2
8 Abstand zwischen Zeiger 2 und Zeiger 3
9 Abstand zwischen Zeiger 3 und Zeiger 4
10 Abstand zwischen Zeiger 4 und Zeiger 5
11 Logikeinheit 1
12 Nachricht
13 Chiffrierstrom
14 Nachrichtenstrom
15 Logikeinheit 2
16 Kryptogramm
17 Geheimcode
18 Geheimcodezuführung
19 Hashwertgenerator
20 Hashwerte 1 512 kbyte random numbers of 8 bits each
2 hands 1
3 hands 2
4 hands 3
5 hands 4
6 hands 5
7 Distance between pointer 1 and pointer 2
8 Distance between pointer 2 and pointer 3
9 Distance between pointer 3 and pointer 4
10 Distance between pointer 4 and pointer 5
11 logic unit 1
12 message
13 cipher stream
14 message flow
15 logic unit 2
16 cryptogram
17 secret code
18 Secret code feed
19 hash value generator
20 hashes
Der Anwender des erfindungsgemäßen Verschlüsselungsprogrammes gibt zunächst eine geheime Gedächtnisphrase über die Geheimcodezuführung 18, zum Beispiel der Tastatur, als Geheimcode 17 ein. Dieser wird vom Hashwertgenerator 19 zu den Hashwerten für die Zeigerabstände 7, 8, 9 und 10 umgewandelt. Die gebildeten Hashwerte werden der Logikeinheit 1 11 zugeführt. Zeiger 1 2 wird auf seine Anfangsposition gesetzt und alle weiteren Zeiger gemäß den zuvor ermittelten Hashwerten. Die Werte aus den 512 kByte Zufallszahlen 1, auf die die Zeiger 1 bis 7, 8, 9, 10 zeigen, werden von der Logikeinheit 1 11 mittels XOR-Funktion zum Chiffrierstrom 13 zusammengefaßt. Die Nachricht 12 wird der Reihe nach byteweise abgetastet. Diese Bytes ergeben den Nachrichtenstrom 14. Der Chiffrierstrom 13 und der Nachrichtenstrom 14 werden der Logikeinheit 2 15 zugeführt und von dieser per XOR-Funktion zum Kryptogramm 16 verknüpft.The user of the encryption program according to the invention first enters a secret memory phrase as the secret code 17 via the secret code feed 18 , for example the keyboard. This hash value generator 19 converts the hash values for the pointer spacings 7 , 8 , 9 and 10 . The hash values formed are supplied to the logic unit 11 . Pointer 1 2 is set to its initial position and all other pointers according to the previously determined hash values. The values from the 512 kbyte random numbers 1 , to which the pointers 1 to 7 , 8 , 9 , 10 point, are combined by the logic unit 11 using the XOR function to form the cipher stream 13 . The message 12 is scanned in order byte. These bytes make up the message stream 14 . The cipher stream 13 and the message stream 14 are supplied to the logic unit 2 15 and are linked by the latter to the cryptogram 16 using the XOR function.
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE1997135922 DE19735922A1 (en) | 1997-08-08 | 1997-08-08 | Cryptographic method based on synchronous stream ciphering with one time pad |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE1997135922 DE19735922A1 (en) | 1997-08-08 | 1997-08-08 | Cryptographic method based on synchronous stream ciphering with one time pad |
Publications (1)
Publication Number | Publication Date |
---|---|
DE19735922A1 true DE19735922A1 (en) | 1998-02-26 |
Family
ID=7839420
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DE1997135922 Withdrawn DE19735922A1 (en) | 1997-08-08 | 1997-08-08 | Cryptographic method based on synchronous stream ciphering with one time pad |
Country Status (1)
Country | Link |
---|---|
DE (1) | DE19735922A1 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1069508A2 (en) * | 1999-07-14 | 2001-01-17 | Bernd Röllgen | Cryptographic method modifiable during run time |
EP1107505A2 (en) * | 1999-11-30 | 2001-06-13 | MD Technology S.A. | Polymorphous encryption system |
DE10027974A1 (en) * | 2000-06-06 | 2002-01-24 | Toralf Heidel | End-to-end encryption method for data communication system, involves splitting data into symbols using subscriber key blocks, and converting them to assigned data block values |
DE19856237C2 (en) * | 1998-12-07 | 2002-03-07 | Ibm | Dynamic key generation and confidential synchronization of encryption components |
DE10204586A1 (en) * | 2002-02-05 | 2003-08-14 | Forschungsgesellschaft Fuer An | Automatic data coding and decoding circuit for transmission system has digital code source in form of addressable memory to produce code independent of content of input clear text |
-
1997
- 1997-08-08 DE DE1997135922 patent/DE19735922A1/en not_active Withdrawn
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE19856237C2 (en) * | 1998-12-07 | 2002-03-07 | Ibm | Dynamic key generation and confidential synchronization of encryption components |
EP1069508A2 (en) * | 1999-07-14 | 2001-01-17 | Bernd Röllgen | Cryptographic method modifiable during run time |
EP1069508A3 (en) * | 1999-07-14 | 2003-09-24 | Bernd Röllgen | Cryptographic method modifiable during run time |
EP1107505A2 (en) * | 1999-11-30 | 2001-06-13 | MD Technology S.A. | Polymorphous encryption system |
EP1107505A3 (en) * | 1999-11-30 | 2002-07-24 | MD Technology S.A. | Polymorphous encryption system |
DE10027974A1 (en) * | 2000-06-06 | 2002-01-24 | Toralf Heidel | End-to-end encryption method for data communication system, involves splitting data into symbols using subscriber key blocks, and converting them to assigned data block values |
DE10204586A1 (en) * | 2002-02-05 | 2003-08-14 | Forschungsgesellschaft Fuer An | Automatic data coding and decoding circuit for transmission system has digital code source in form of addressable memory to produce code independent of content of input clear text |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE69929251T2 (en) | ENCRYPTION SYSTEM WITH A KEY OF CHANGING LENGTH | |
DE69728465T2 (en) | Non-parallel multi-cycle encryption device | |
EP2433241B1 (en) | Encoding methods | |
DE19733829C2 (en) | Method for encrypting or decrypting a data sequence | |
DE69938539T2 (en) | Cryptographic device with parallel encryption blocks | |
EP0012974B1 (en) | Method for enciphering data blocks of a given length | |
EP2647157A1 (en) | Method and apparatus for performing symmetrical stream encryption of data | |
EP0189734B1 (en) | Method and apparatus for converting a digital data sequence into an enciphered form | |
DE69826778T2 (en) | Devices for encrypting and decrypting a key recovery condition | |
EP0011050B1 (en) | Enciphering and deciphering apparatus | |
DE19735922A1 (en) | Cryptographic method based on synchronous stream ciphering with one time pad | |
EP1683029B1 (en) | Method for storing data in a random access memory and encryption and decryption device | |
DE3905667C2 (en) | ||
DE105553T1 (en) | DEVICE FOR ENCRYPTING DIGITAL SIGNALS WHICH CONTAINS ONE OR MORE DES CIRCUITS. | |
EP1676394A1 (en) | Cryptographic method and device | |
EP0173647B1 (en) | Enciphering/deciphering method | |
DE19757370C2 (en) | Process for the tactile generation of pseudo-random data words | |
DE10158003B4 (en) | Method for generating keys for data encryption and method for data encryption | |
EP0624839B1 (en) | Method and circuitry for producing a pseudo random sequence and its use | |
EP0406457A1 (en) | Data enciphering and deciphering method | |
DE202009008987U1 (en) | Device for encrypting data | |
WO1997032417A1 (en) | Process for generating a check word for a bit sequence for verifying the integrity and authenticity of the bit sequence | |
DE1622840C1 (en) | Arrangement for the encryption of plain texts and for the decryption of corresponding secret texts | |
WO2015176087A1 (en) | Method and device for performing a symmetric stream encyption of data | |
DE2829293C2 (en) | Method for generating random strings of characters |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
OAV | Applicant agreed to the publication of the unexamined application as to paragraph 31 lit. 2 z1 | ||
8122 | Nonbinding interest in granting licenses declared | ||
8139 | Disposal/non-payment of the annual fee |