AU601370B2 - Ciphering and deciphering device - Google Patents
Ciphering and deciphering deviceInfo
- Publication number
- AU601370B2 AU601370B2 AU59972/86A AU5997286A AU601370B2 AU 601370 B2 AU601370 B2 AU 601370B2 AU 59972/86 A AU59972/86 A AU 59972/86A AU 5997286 A AU5997286 A AU 5997286A AU 601370 B2 AU601370 B2 AU 601370B2
- Authority
- AU
- Australia
- Prior art keywords
- code
- bits
- shift register
- unit
- memory
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Landscapes
- Control Of Vending Devices And Auxiliary Devices For Vending Devices (AREA)
- Auxiliary Devices For And Details Of Packaging Control (AREA)
- Eye Examination Apparatus (AREA)
Description
CIPHERING AND DECIPHERING DEVICE
The present invention relates to a ciphering device for serially transmitted information, compris¬ ing an input for a sequence of bits to be ciphered, an output for the ciphered bit sequence, and a mixing unit connected between the input and the output, said mixing unit being adapted to receive both the bit sequence to be ciphered and a sequence of code bits for ciphering said bit sequence, and, by a mixing operation, to generate the ciphered bit sequence, and a code unit adapted to generate code bits and comprising a shift register into which bits from the ciphered bit sequence are shifted, and a memory con¬ taining code bits and addressed with bits from the shift register. t The invention also relates to a deciphering de¬ vice which is associated with the ciphering device and designed for serially transmitted information, and which comprises an input for a sequence of bits to be deciphered, an output for the deciphered bit sequence, and a mixing unit connected between the input and the output, said mixing unit being adapted to receive both the bit sequence to be deciphered and a sequence of code bits for deciphering said bit sequence, and, by a mixing operation, to generate the deciphered bit sequence, and a code unit adapted to generate code bits and comprising a shift register into which bits from the ciphered bit sequence are shifted, and a memory containing code bits and ad¬ dressed with bits from the shift register. The use of computers, and especially the trans¬ mission of information between computers, has given rise to serious security problems. It is in fact rela¬ tively easy to tap data transmission, implying that sensitive information may come into the wrong hands.
To obviate this risk, the information transmitted is often ciphered.
Data communication normally takes place in bina¬ ry form and in most of the ciphering systems hitherto known, ciphering takes place on the bit level in that the sequence of l's and 0's making up the message is mixed in a ciphering device with a sequence of code bits. When deciphering the message, the ciphered bit sequence is mixed with the same code bit sequence, whereby the message is received in clear.
In hitherto known ciphering devices, the gene¬ ration of code bits however takes a long time, causing delays in the transmission of information. This means that it is necessary either to decrease the rate at which the transmitter transmits the information or to provide buffers in the ciphering unit. In the latter case, measures must be taken to ensure that information is not lost when the receiving unit emits a signal indicating that it is no longer ready to receive infor- mation. Another difficulty resides in synchronizing the generation of code bits. In some devices (see e.g. GB 1,388,035), the information transmission is interrupted at regular intervals for checking whether the code bits in the ciphering and the deciphering device are synchronized. A third problem arises when the ciphering and the deciphering device should be linked to each other after an interruption of the data transmission. Such linking should preferably be effected rapidly and easily without any loss of information and without transmission of information that may give an indication of how the code bits are generated.
The above-mentioned problems entail that known ciphering devices become very expensive since a large number of sophisticated circuits are required for solving the synchronization and link-up problems.
Further, the known devices cannot be used in systems with severe demands on a high transmission rate.
For parallel transmission, the above-mentioned synchronization and link-up problems have however been solved by means of a ciphering device shown in U.S. patent specification 4,431,865, which comprises a logic unit in which parallel-transmitted words to be ciphered are mixed with code words to obtain the ciphered words. The code words are generated by sup¬ plying the output signal from the logic unit, i.e. the ciphered words, to an addressing circuit comprising a parallel-to-series converter, a shift register and a selecting circuit. The selecting circuit selects some or all of the bits in the register for addressing a memory containing code words supplied to the logic unit. The device further comprises a computer which serves to supply code words to the memory and which during that operation can disconnect the register and the selecting circuit. The deciphering apparatus corresponding to this ciphering device is designed in a similar way, with the only exception that coded words are mixed in the logic unit with code words for obtaining the deciphered text.
As mentioned above, this device is however in¬ tended for use in connection with parallel informa¬ tion transmission and cannot be used for serial infor- mation transmission without prior modifications. Fur¬ ther, the device is designed for ciphering information from teletext systems and the like. Thus, it is not deisgned for protecting the transmitted information from unauthorized persons who may be interested in employing the information for commerical and/or illegal use, but instead for making people pay the subscription fee for this type of service. Anyone who manages to decipher the transmitted information will not have access to any secret information but only to information which may possibly be used for private purposes." In view hereof, this device has not been conceived so •as to satisfy the high demands on security which must
be placed on ciphering apparatuses intended for use in transmitting information between computers, and especially such information as should be kept secret for a long time after the transmission has been ef- fected and, thus, should not allow subsequent decipher¬ ing. The problem inherent in this device is in fact that for each word to be coded there is generated only one address to the memory, and that the entire word on this address is used for the coding. If the same information sequence is transmitted repeatedly, there is a risk that the coding takes place in the same way, which substantially facilitates unautho¬ rized deciphering. Further, if the deciphering appara¬ tus is stolen, previously tapped information may very well be deciphered by means of the deciperhing appara¬ tus.
The object of the present invention therefore is to provide a ciphering and deciphering system for ' serial information transmission which meets the very high demands on security placed on s'ystems for cipher¬ ing secret information, both during and after the transmission, which is less expensive than corresponding known systems, which does not notably limit the trans¬ mission rate and in which the synchronization and link-up problems have been overcome.
According to the invention, this object is achiev¬ ed by means of a ciphering device of the type stated in the introduction to this specification, which is characterized by first means for selecting whether a bit in the bit sequence to be ciphered should be mixed with a code bit or not, and by means of a de¬ ciphering device of the type stated in the introduc¬ tion to this specification, which is characterized by first means for selecting whether a bit in the bit sequence to be deciphered should be mixed with a code bit or not.
In a preferred embodiment of the invention, the devices comprise means for selecting which bits in the ciphered bit. sequence should be used as address to the memory. These means, like the means for select- ing whether a bit in the bit sequence should be mixed with a code bit or not, may advantageously be controlled by a programmable unit.
The ciphering and deciphering system described above offers fully satisfactory protection against external tapping or deciphering attempts. In order to ensure that no one who has access to the message both in ciphered form and in clear should be able to map the content in the memory and subsequently use it for deciphering tapped information, the ci- phering and deciphering system in another embodiment comprises a further code unit the input of which is connected to the first code unit and which comprises a shift register and a memory containing code bits and addressed with bits from the shift register, and the output signal of which constitutes the code bit sequence for ciphering the bit sequence. When this additional code unit is used, it becomes impossible for anyone who has access to a message both in ciphered form and in clear, to map the content in the memories of the two code units.
It should however be possible, instead of establish¬ ing the specific contents of the memories, to deter¬ mine a very large memory replacing the other two memo¬ ries. One way of overcoming this problem is to increase the number of bits which are required for the memories to have their specific address. In a further embodiment, the present invention therefore comprises a shift register which is disposed between the two code units and the input of which is connected to the first code unit, and an EXOR gate which on its inputs receives bits from the shift register and the output of which is connected to the shift register of the second code
unit. In this manner, it is possible to increase the number of addresses to the replacement memory which thus becomes so large that it is impossible to map it in a reasonable time. A further problem solved by the present invention is that related to information which should be kept secret for a long time after the transmission. In hitherto known devices, there is in fact a risk that unauthorized persons may tap the transmission of infor- mation and subsequently steel a deciphering device in order to decipher the tapped information. To prevent this, the present invention comprises in a further embodiment a shift register which is disposed between two code units and the input of which is connected to the first code unit, and a read-write memory which is addressed with bits from the shift register and the output of which is connected to the second code unit. The device further comprises a computer which is adapted to generate code bits according to a prede- termined algorithm and to write the generated code bits into the memory at regular intervals. If the algorithm is of the type which generates a code that cannot be traced mathematically backwards in time, it becomes impossible to decipher previously tapped infor- mation by means of the deciphering device. The security requirement for information to be kept secret after the transmission is thus satisfied.
The system according to the present invention has solved the problems inherent in prior art devices. Thus, there is no need of any special circuits for buffering or for handling control, checking and syn¬ chronizing signals, but the system can be composed of a few standard circuits, this making the system considerably cheaper than other corresponding systems. The present invention will now be described in some embodiments with reference to the accompanying drawings. Fig- .l is a block diagram of a ciphering
device according to the present invention. Fig. 2 is block diagram of a deciphering device correspond¬ ing to the ciphering device of Fig. 1. Fig. 3 is a block diagram showing one embodiment of the ciphering device having double code units. Fig. 4 is a block diagram shewing one embodiment of the ciphering device having a shift register and an EXOR gate between the code units. Fig. 5 is a block diagram showing one embodiment of the ciphering device having a shift register and a programmable memory between the two code units. Fig. 6 is a block diagram showing one embodiment of the ciphering device comprising a code handling system between the two code units.
In Fig. 1, there is shown a ciphering device which is intended to be connected in a data link be¬ tween a transmitting and a receiving unit, on the transmitting side. This ciphering device substantially comprises an input 1 for information in clear from the transmitting unit, an output 2 for ciphered in- formation, a mixing unit 3 consisting of an EXOR gate, a code unit 4 for generating the code bits in the code bit sequence, and means 6, 7, 8 controlling certain 'selections in the device, as will be described in more detail hereinbelow. The code unit 4, which has an input connected to the output of the mixing unit 3, consists of a 16-bit shift register 9, a memory 5 which may be a byte-organized ROM or EPROM, and a multiplexer 10. The first thirteen bits of the shift register 9 are connected to the address inputs of the memory 5 and its last three bits are connected to the address inputs of the multiplexer 10. The outputs of the memory 5 are connected to the data inputs of the multiplexer 10. As mentioned above, certain selec¬ tions can be carried out in the ciphering device. The selections relate to whether an incoming data bit should be ciphered or not, and whether a ciphered bit should be loaded into the shift register 9 or
not. The selections are controlled by the control unit 8 which is programmable. Its program follows one word (one word = one byte) through the ciphering and recommences at the beginning of the next word. For each bit in the word, a signal is supplied to one input of the means 7, which may consist of a logic AND gate, for determining whether the bit should be ciphered or not, and another signal is supplied to one input of the means 6, which may also consist of an AND gate, for determining whether the ciphered bit should be loaded into the register or not. The gate 7 receives on its other input a code bit from the multiplexer 10 and has its output connected to the mixing unit 3. The output of the gate 6 is con- nected to an enabling input of the register 9.
The deciphering device shown in Fig. 2 is in¬ tended to be connected in the other end of the data link to which the ciphering device is connected, be¬ fore the receiving unit. On its input 11, the decipher- ing device receives ciphered data from the ciphering device and, on its output 12, supplies deciphered data to the receiving unit. The deciphering device is built up in the same manner as the ciphering device, with the exception that the shift register 19 is con- nected to the input 11. Otherwise, the two devices consist of the same components and contain the same information (in the memories and the control units), and the deciphering device will therefore not be de¬ scribed in more detail here. in the following description, the function of the ciphering system will be described, starting with the generation of code bits. When the ciphering system is in operation, the shift register 9 is loaded with ciphered bits from the output of the mixing unit 3. A memory cell in the memory 5 is addressed with the first thirteen bits in the register. The content of the memory cell is supplied to the data inputs, of
the multiplexer 10 which by means of the last three bits in the register 9 selects which of the eight bits in the addressed memory word should constitute a code bit. This way of generating a code bit also functions before any code bits have been loaded into the shift register 9 from the output of the mixing unit 3 since 0's alone may also form an address to the memory and the multiplexer. Thus, no special initiation routine is required when starting up the ciphering system. When a bit in the bit sequence to be ciphered is presented on the input of the mixing unit 3 , the control unit 8 supplies the gate 7 with a signal which indicates whether the code bit on the output of the multiplexer 10 should be supplied to the input of the mixing unit 3 and mixed with the bit concerned or whether this bit should pass through the mixing unit without being ciphered. This option of ciphering or not ciphering a bit makes the system still more reliable and, moreover, provides the possibility of allowing e.g. start and stop bits to pass through unciphered.
Further, the control unit 8 emits to the gate 6 a signal which indicates whether the bit concerned should be loaded into the register 9 or not, after it has passed through the mixing unit 3. If the bit is loaded into the register, the address to the memory 5 and to the multiplexer 10 is changed, and a new code bit is obtained. In some cases, it may be con- venient not to load bits from the mixing unit 3 into the register 9, for instance in the case of start and stop bits which when passing through unciphered always look the same. Naturally, this option also enhances the security of the system. The deciphering device operates in the same way. Since it is the same program that is in the control unit 18, the same bits will be loaded into the re-
gister 19, the same memory cells will be addressed in the memory 15 whose content must of course be the same as in the memory 5 of the ciphering device, the same cede bits will be generated and the same bits will pass unciphered through the mixing unit 13. Thus, the ciphered bits will be mixed with the same code bits as they were mixed with in the ciphering device, and since the mixing unit consists of an EXOR gate, the original message will be recovered in clear on its output.
If a temporary interruption should occur on the data link, only the data which are output during the interruption will be lost. When the connection is again established, the contents of the registers 9, 19 may be entirely different, but since the same in¬ formation is supplied to the two registers, the devices will soon be synchronized again. The time it takes for the devices to be synςhronized depends on the program in the control unit and the length of the shift register. In this embodiment, it takes three words at most (one word = one byte).
The ciphering system described above is very fast. It is possible to communicate at a rate of up to 2 MBaud duplex. There is minimal delay in the ci- phering device. A data bit will leave the mixing unit in ciphered form after only T/2 where T = the time a data bit is active. This short delay time means that handshaking lines in an RS-232 port need not be processed in the ciphering device, but merely be sent unprocessed straight through it.
Although the ciphering system is of such a simple design, it is completely protected also from those who know exactly how it operates. The result of the ciphering operation depends on the message ciphered, the content in the memory 5 and the program in the control unit 8. In order to decipher messages, it is thus necessary to have access to the content in
the memory and the program in the control unit. If there is even the faintest suspicion that the content in the memory and/or the control unit is known, the memory and/or the program in the control unit may very easily be exchanged. The control unit may also store several programs which are alternatingly connected by means of a push-button set associated with the control unit.
In Fig. 3, there is shown an embodiment of the ciphering device preventing anyone who has access to a message both in clear and in ciphered form from mapping the content in the memory by using the formula "clear EXOR ciphered text = code". In Fig. 3, the components shown in Fig. 1 appear with the same re- ference numerals. These units operate in the same manner as in the device shown in Fig. 1 and, therefore, will not be described here. In addition to these com¬ ponents, the device comprises a second code .unit 4' the input of which is connected to the output of the first code unit 4 and which is designed in the same way as this, namely with a 16-bit shift register 9', a memory 5 ' , which may be a byte-organized ROM or EPROM, and a multiplexer 10'. In this embodiment of the invention, the code bits generated by the code unit 4 are supplied to the shift register S ' , the first thirteen bits of which are used for addressing the memory 5 ' and the last three bits of which serve as input signal to the multiplexer 10' for selecting which bit in the word addressed in the memory 5 ' should constitute a code bit. In this embodiment of the device, the addresses to the memory unit 9 in the first code unit and the code from the memory 5 ' in the second code unit are related in no readable way to each other and, hence, it is not possible by tapping the input signals to and the output signals from the system, to map the content in the memories 5 and 5 ' . The de¬ ciphering device corresponding to this ciphering de-
vice is designed in a corresponding way and will there¬ fore not be described here.
In Fig. 4, the device of Fig. 3 is supplemented with a shift register 40 and an EXOR gate 41. The shift register 40 receives on its input the code bits generated by the code unit 4. The first and the last bit in the shift register 40 are used as input signals to the EXOR gate 41 whose output is connected to the shift register 9 ' in the second code unit 4 ' . By in- coporating these two components in the device, the number of addresses which would have to be mapped to create a replacement memory for the memories 5 and 5' is considerably increased. If the length of the shift register 40 and of the shift registers 9 and 9' is 16 bits, the required number of addresses will be 2.81 x 10 14. When the shift register 40 and the EXOR gate 41 have been incorporated, it will thus be impossible in a reasonable time to create a re¬ placement memory for the other two memories. Further, when the system is correctly used the risk of periodic output data appearing in the cryptogram in connection with periodic input data will be eliminated in clear because of the extension of the registers by means of the shift register 40. The corresponding deciphering device (not shown) has a shift register and an EXOR gate which are connected in the same manner.
In Fig. 5, there is shown a variant of the device illustrated in Fig. 4, in which the EXOR gate 41 has been replaced by a read-write memory 42 which is ad- dressed with the content in the shift register 40 and the output of whi-ch is connected to the shift register 9 ' in the second code unit 4 ' . The content in the memory 42 can be exchanged by programming a new code from a keyboard 43. The purpose of the me- mory 42 is to prevent the transmitted, ciphered in¬ formation from being deciphered afterwards if any¬ one having tapped the transmitted information later
appropriates a deciphering device. In order to decipher a message, it is thus necessary to have access to the code being in the memory 42 during the ciphering operation, and if this code is changed at regular intervals, subsequent deciphering will be impossible. The only thing that need be ensured is that the memory contains a sufficient amount of code so that subsequent deciphering cannot be effected by trying all possible codes which the memory might contain. As in the other embodiments, the deciphering device (not shown) is designed correspondingly.
In Fig. 6, there is shown a variant of the ci¬ phering device of Fig. 5, which overcomes the ^practical problems linked with the handling and transmission to the deciphering device of the codes which are sup¬ plied to the memory 42, and with the work effort re¬ quired for thus supplying the codes at regular inter¬ vals. The variant of the ciphering device illustrated in Fig. 6 comprises, in addition to the shift register 40 and the memory 42, a computer 43 having an input which by a line 51 is connected to the output of the mixing unit 3, address outputs which by an address bus 44 are connected to the memory 42, an in/output which by a data line 45 is connected to the memory 42, and a control signal output for transmitting a read-write signal on a line 46 to the memory 42. The device further comprises a buffer 47 which is connected to the shift register 40 and in which the content in the shift register is temporarily stored and which has tristate outputs connectible to the address bus 44. Finally, the device comprises a clock 48 which is programmable from the computer 43 which may be a one-chip computer having a nonvolatile and a volatile memory. The memory of the computer contains an algorithm which is stored in software and by means of which the computer creates a new code for the memory 42. The code is created during different time periods,
and the length of a current time period is determined by the code created during the preceding time period, the clock 48 being used for establishing when a time period is terminated. When the code generated during a time period is finally created, it is temporarily stored in a buffer, awaiting the transmission to the memory 42. The computer 43 establishes suitable points of time for the transmission by analyzing the signals on the output from the mixing unit 3. When a prede- termined event occurs, for example no signals present on the output, the code temporarily stored in the buffer is transmitted to the memory. The computer then disconnects the outputs of the buffer 47 from the address bus by means of a control signal on a line 50, emits a write signal on the line 46 and ad¬ dresses the memory via the address bus 44 so that the generated code can be transmitted to the memory 42 by the data line 45.
The deciphering device (not shown) corresponding to this embodiment of the ciphering device is designed in a corresponding way with shift register, buffer, computer, memory etc. The computer in the deciphering device generates a new code to its memory by means of the same algorithm as used by the computer 43 of the ciphering device. The computer of the deciphering device further relies on the same criteria as the computer 43 for deciding when the transmission of a new code to the memory should take place. In this manner, the content in the two memories will always be the same.
It should also be pointed out that the code for prevenring deciphering of previously tapped information should be generated in such a manner that it cannot be mathematically traced backwards in time. To those skilled in the art, this type of algorithms is well known and will therefore not be described in more detail here.
As mentioned above, major advantages of this code-generating method are that information can be kept secret also after transmission, that it is not necessary to transmit a code between the devices, and that the code generation is not dependent upon the information on the transmission line between the ciphering device and the deciphering device, but yet takes place synchronously in both devices.
In addition to establishing when a new code is finally created, the clock 48 is used for synchroniz¬ ing purposes. Synchronization is performed in that certain predetermined events, e.g. certain bit patterns or interruptions in the information transmission, are used as time references for the clocks in both devices. When such a predetermined event occurs, the clock is set to a known state. The advantage of this synchronizing procedure is that information common to both devices is used, this making synchronization very accurate. Many modifications and alterations may of course be carried out in the present invention without depart¬ ing from the scope of the accompanying claims, and the above specification should thus only be considered as an example which is in no way limitative of the invention. For example, it is possible to connect more than two code units in series and to provide components according to Figs. 4-6 between each pair of adjoining code units.
Claims (20)
1. A ciphering device for serially transmitted information, comprising an input (1) for a sequence of bits to be ciphered, an output (2) for the ciphered bit sequence, and a mixing unit (3) connected between the input (1) and the output (2), said mixing unit (3) being adapted to receive both the bit sequence to be ciphered and a sequence of code bits for ciphering said bit sequence, and, by a mixing operation, to generate the ciphered bit sequence, and a code unit (4) adapted to generate code bits and comprising a shift register (9) into which bits from the ciphered bit sequence are shifted, and a memory (5) containing code bits and addressed with bits from said shift register (9), c h a r a c t e r i z e d by first means (7) for selecting whether a bit in the bit se¬ quence to be ciphered should be mixed, with a code bit or not.
2. Ciphering device as claimed in claim 1, c a ¬ r a c t e r i z e d by second means (6) for select- ing which bits in the ciphered bit sequence should be shifted into the shift register (9).
3. Ciphering device as claimed in claim 2, c h a ¬ r a c t e r i z e d by a programmable control unit
(8) for controlling said first (7) and said second (6) means.
4. Ciphering device as claimed in any one of the preceding claims, c h a r a c t e r i z e d in
' that the code unit (4) comprises a multiplexer (10) controlled by bits from the shift register (9) for selecting which bit in an addressed memory word should constitute a code bit.
5. Ciphering device as claimed in any one of the preceding claims, c h a r a c t e r i z e d by a further .code unit (4 ' ) the input of which is connected to the first code unit (4) and which com¬ prises a shift register (91 ) and a memory (5' ) con¬ taining code bits and addressed with bits from the shift register (91 ), and the output signal of which constitutes the code bit sequence for ciphering said bit sequence.
6. Ciphering device as claimed in any one of the preceding claims, c h a r a c t e r i z e d by a shift register (40) which is disposed between the two code units (4, 4') and the input of which is connected to the first code unit (4), and an EXOR gate (41) which on its inputs receives bits from the shift register (40) and the output of which is con¬ nected to the shift register (9' ) of said further code unit (4 ' ) .
7. Ciphering device as claimed in claim 5, c h a ¬ r a c t e r i z e d by a shift register (40) which is disposed between the code units (4, 4' ) and the input of which is connecte'd to the first code unit, and a read-write memory (42) which is addressed with bits from the shift register (40) and the output of which is connected to the shift register (9') of said further code unit (41).
8. Ciphering device as claimed in claim 7, c h a - r a c t e r i z e d by a computer (43) adapted to generate code bits according to a predetermined algo¬ rithm and to write the generated code bits into the memory (42 ) .
9. Ciphering device as claimed in claim 8, c h a - r a c t e r i z e d in that the computer (43) has an input connected to the output of the mixing unit (3), and is adapted to analyse the signals on the out¬ put of the mixing unit for establishing suitable points of time for writing the generated code bits into the memory (42 ) .
10. Ciphering device as claimed in claim 9, c h a r a c t e r i z e d by a programmable clock (48) connected to the computer (43) and set in a pre- detemined state when certain predetermined events occur on the output of the mixing unit (3).
11. Deciphering device for serially transmitted information, comprising an input (11) for a sequence of bits to be deciphered, an output (12) for the de¬ ciphered bit sequence, and a mixing unit (13) connected between the input (11) and the output (12), said mix¬ ing unit being adapted to receive both the bit sequence to be deciphered and a sequence of code bits for deci¬ phering said bit sequence, and, by a mixing operation, to generate the deciphered bit sequence, and a code unit (14) adapted to generate code bits and comprising a shift register (19) into which bits from the ciphered bit sequence are shifted, and a memory (15) containing code bits and addressed with bits from said shift register (19), c h a r a c t e r i z e d by first means (17) for selecting whether a bit in the bit sequence to be deciphered should be mixed with a code bit or not.
12. Deciphering device as claimed in claim 11, c h a r a c t e r i z e d by second means (16) for selecting which bits in the ciphered bit sequence should be shifted into the shift register (19).
13. Deciphering device as claimed in claim 12, c h a r a c t e r i z e d by a programmable control unit (18) for controlling said first (17) and said second (16) means.
14. Deciphering device as claimed in any one of the preceding claims, "c h a r a c t e r i z e d by a multiplexer (20) controlled by bits from the shift register (19) for selecting which bit in an addressed memory word should constitute a code bit.
15. Deciphering device as claimed in any one of claims 11-14, c h a r a c t e r i z e d by a further code unit the input of which is connected to the first code unit (14) and which comprises a 19 shift register and a memory containing code bits and addressed with bits from the shift register, and the output signal of which constitutes the code bit sequence for deciphering said bit sequence.
16. Deciphering device as claimed in any one of claims 11-15, c h a r a c t e r i z e d by a shift register which is disposed between the two code units (14) and the input of which is connected to the first code unit (14), and an EXOR gate which on its inputs receives bits from the shift register and the output of which is connected to the shift register of the said further code unit.
17. Deciphering device as claimed in claim 15, c h a r a c t e r i z e d by a shift register which is disposed between the two code units (14) and the input of which is connected to the first code unit (14), and a read-write memory which is addressed with bits from the shift register and the output of which is connected to the shift register of said further code unit.-
18. Deciphering device as claimed in claim 17, c h a r a c t e r i z e d by a computer which is adapted to generate code bits according to a prede¬ termined algorithm and to write the generated code bits into the memory.
19. Deciphering device as claimed in claim 18, c h a r a c t e r i z e d in that the computer has an input connected to the input of the mixing unit (13) and is adapted to analyse the signals on the input of the mixing unit for establishing suitable points of time for writing the generated code bits into the memory.
20. Deciphering device as claimed in claim 19, c h a r a c t e r i z e d by a programmable clock connected to the computer and set to a predetermined state when certain predetermined events occur on the input of the mixing unit (13).
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU59972/86A AU601370B2 (en) | 1986-06-09 | 1986-06-09 | Ciphering and deciphering device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU59972/86A AU601370B2 (en) | 1986-06-09 | 1986-06-09 | Ciphering and deciphering device |
Publications (2)
Publication Number | Publication Date |
---|---|
AU5997286A AU5997286A (en) | 1988-01-11 |
AU601370B2 true AU601370B2 (en) | 1990-09-13 |
Family
ID=3745148
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU59972/86A Ceased AU601370B2 (en) | 1986-06-09 | 1986-06-09 | Ciphering and deciphering device |
Country Status (1)
Country | Link |
---|---|
AU (1) | AU601370B2 (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB1388035A (en) * | 1971-04-19 | 1975-03-19 | Gretag Ag | Method of and apparatus for encoded communications transmission |
US4176247A (en) * | 1973-10-10 | 1979-11-27 | Sperry Rand Corporation | Signal scrambler-unscrambler for binary coded transmission system |
US4431865A (en) * | 1979-10-10 | 1984-02-14 | Telediffusion De France | Digital signal enciphering and deciphering apparatus and system |
-
1986
- 1986-06-09 AU AU59972/86A patent/AU601370B2/en not_active Ceased
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB1388035A (en) * | 1971-04-19 | 1975-03-19 | Gretag Ag | Method of and apparatus for encoded communications transmission |
US4176247A (en) * | 1973-10-10 | 1979-11-27 | Sperry Rand Corporation | Signal scrambler-unscrambler for binary coded transmission system |
US4431865A (en) * | 1979-10-10 | 1984-02-14 | Telediffusion De France | Digital signal enciphering and deciphering apparatus and system |
Also Published As
Publication number | Publication date |
---|---|
AU5997286A (en) | 1988-01-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US4322576A (en) | Message format for secure communication over data links | |
KR100234447B1 (en) | Algorithm independent cryptographic key management | |
EP0438154B1 (en) | Multimedia network system | |
US4206315A (en) | Digital signature system and apparatus | |
EP0309447B1 (en) | Ciphering and deciphering device | |
AU599035B2 (en) | Data transmission system | |
KR950010705B1 (en) | Encryption/decription apparatus and its communication network | |
US5222136A (en) | Encrypted communication system | |
US4944006A (en) | Secure data packet transmission system and method | |
US4771458A (en) | Secure data packet transmission system and method | |
NO143601B (en) | PROCEDURE FOR SETTING CODE TEXT GENERATORS IN CIFTING DEVICES | |
EP0002389A1 (en) | Multiple domain data communication | |
JPS62198237A (en) | Method and apparatus for confidential communication | |
WO1995015629A1 (en) | Apparatus and method for encrypting communications without exchanging an encryption key | |
US4431865A (en) | Digital signal enciphering and deciphering apparatus and system | |
US4133974A (en) | System for locally enciphering prime data | |
US4805216A (en) | Method and apparatus for continuously acknowledged link encrypting | |
EP0840966B1 (en) | Decryption of retransmitted data in an encrypted communication system | |
EP0651532A2 (en) | Method for sequential encryption/decryption of externally stored computer object code | |
KR100284482B1 (en) | Data encryption method | |
WO1987007796A1 (en) | Ciphering and deciphering device | |
AU601370B2 (en) | Ciphering and deciphering device | |
US5428686A (en) | Secure communication system having long-term keying variable | |
CN101449544B (en) | Especially the message reception facility in field, relevant aircraft and method is exchanged in data securityization | |
EP0592595A1 (en) | Ciphering device |