RU94027301A - Method for generation of encoding/decoding keyword - Google Patents
Method for generation of encoding/decoding keywordInfo
- Publication number
- RU94027301A RU94027301A RU94027301/09A RU94027301A RU94027301A RU 94027301 A RU94027301 A RU 94027301A RU 94027301/09 A RU94027301/09 A RU 94027301/09A RU 94027301 A RU94027301 A RU 94027301A RU 94027301 A RU94027301 A RU 94027301A
- Authority
- RU
- Russia
- Prior art keywords
- keyword
- key
- personal
- generation
- confidential
- Prior art date
Links
Landscapes
- Storage Device Security (AREA)
Abstract
FIELD: cryptography. SUBSTANCE: method involves generation of confidential circular code keyword by choose of coefficients of symmetric polynomials f(x,x) by means of random number generator, generation of personal user identification keyword by means of substitution of user identifier in polynomials f(x,x), generation of current session keyword by means of substitution of it to personal keyword of respondent identifier. Device provides possibility of keyword distribution which is reliable to given number of disclosing personal user keywords in order to provide their confidential communications. EFFECT: simplified hardware-software design using single standard microprocessor, increased speed for generation of session keywords, decreased probability of faults when personal keyword is output, simplified storage of personal keywords, increased stability to external mechanical and electromagnetic interference. 1 dwg
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
RU94027301A RU2090006C1 (en) | 1994-07-18 | 1994-07-18 | Encryption-decryption key forming technique |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
RU94027301A RU2090006C1 (en) | 1994-07-18 | 1994-07-18 | Encryption-decryption key forming technique |
Publications (2)
Publication Number | Publication Date |
---|---|
RU94027301A true RU94027301A (en) | 1996-07-20 |
RU2090006C1 RU2090006C1 (en) | 1997-09-10 |
Family
ID=20158711
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
RU94027301A RU2090006C1 (en) | 1994-07-18 | 1994-07-18 | Encryption-decryption key forming technique |
Country Status (1)
Country | Link |
---|---|
RU (1) | RU2090006C1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103647641A (en) * | 2005-06-08 | 2014-03-19 | 皇家飞利浦电子股份有限公司 | Deterministic key pre-distribution for mobile body sensor networks |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
RU2642806C1 (en) * | 2017-03-27 | 2018-01-26 | Франгиз Гильфанетдинович Хисамов | Method for forming key of encryption/decryption |
-
1994
- 1994-07-18 RU RU94027301A patent/RU2090006C1/en active
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103647641A (en) * | 2005-06-08 | 2014-03-19 | 皇家飞利浦电子股份有限公司 | Deterministic key pre-distribution for mobile body sensor networks |
CN103647641B (en) * | 2005-06-08 | 2017-07-11 | 皇家飞利浦电子股份有限公司 | The method of the scalability, elasticity and performance of identification sensor and maximization wireless system |
Also Published As
Publication number | Publication date |
---|---|
RU2090006C1 (en) | 1997-09-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhang et al. | Research on a covert communication model realized by using smart contracts in blockchain environment | |
Saarinen | HILA5: On reliability, reconciliation, and error correction for Ring-LWE encryption | |
Simmons | Symmetric and asymmetric encryption | |
Zhang et al. | Privacy-preserving profile matching for proximity-based mobile social networking | |
CN1244998C (en) | Enciphering method using double keys and its wireless local network system | |
Farash et al. | An enhanced authenticated key agreement for session initiation protocol | |
Frykholm et al. | Error-tolerant password recovery | |
US20100034385A1 (en) | Combinational combiner cryptographic method and apparatus | |
AU3144101A (en) | Consumable authentication protocol and system | |
Chen et al. | Lightweight one‐time password authentication scheme based on radio‐frequency fingerprinting | |
CN113297591B (en) | Webpage resource encryption method, equipment and storage medium | |
Abiodun et al. | Reinforcing the security of instant messaging systems using an enhanced honey encryption scheme: the case of WhatsApp | |
CN114338025A (en) | Ciphertext equivalence testing method in cloud environment | |
Lu et al. | A secure anonymous authentication scheme for wireless communications using smart cards | |
RU94027301A (en) | Method for generation of encoding/decoding keyword | |
Pinto et al. | Multi-recipient encryption, revisited | |
Zhang et al. | A secure and efficient remote user authentication scheme for multi-server environments using ECC | |
Maximov | Some words on cryptanalysis of stream ciphers | |
Fan et al. | Provably secure nested one-time secret mechanisms for fast mutual authentication and key exchange in mobile communications | |
Simmons | Symmetric and asymmetric encryption | |
Lu et al. | Design and formal analysis of an authentication protocol, eWMDP on wearable devices | |
Qi et al. | A privacy‐preserving biometrics based authenticated key agreement scheme using ECC | |
CN116980232B (en) | Data processing method, device, computer equipment and readable storage medium | |
Gupta et al. | Performance study of genus 3 hyperelliptic curve cryptosystem | |
CN113938274B (en) | Data security transmission method for wearable equipment |