EP1222771A1 - Methods for encoding, decoding, transferring, storage and control of information, systems for carrying out the methods - Google Patents

Methods for encoding, decoding, transferring, storage and control of information, systems for carrying out the methods

Info

Publication number
EP1222771A1
EP1222771A1 EP99953451A EP99953451A EP1222771A1 EP 1222771 A1 EP1222771 A1 EP 1222771A1 EP 99953451 A EP99953451 A EP 99953451A EP 99953451 A EP99953451 A EP 99953451A EP 1222771 A1 EP1222771 A1 EP 1222771A1
Authority
EP
European Patent Office
Prior art keywords
communication
type
encoded
primary
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP99953451A
Other languages
German (de)
English (en)
French (fr)
Inventor
Valentin Alexandrovich Mischenko
Uladzimir Uladzimirovich Zakharau
Juri V. Vilansky
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Michtchenko Valentin Alexandrovich
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of EP1222771A1 publication Critical patent/EP1222771A1/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution

Definitions

  • the invention relates to means for protection information from unauthorized access, and may be used for encoding, decoding, storing, transferring and receiving communications, and control in computing, communication and other systems.
  • the algorithm in the Data Encryption Standard (DES) [2], p. 33-34 uses the both methods.
  • the algorithm comprises plaintext, a non-encoded text and the key in the form of binary sequences having the length 64, 64 and 56 bits, respectively.
  • the 64-bit blocks of the plaintext are encoded independently by using one key.
  • the algorithm of DES includes 16 cycles, each of which has simple interchanges combined with substitution in four-bit groups. In each pass 48-bit keys are selected in a pseudo-random manner from the full 56-bit key.
  • the disadvantage of the said method is that the prior art decision does not provide a fair degree of resistance, since for decoding the similar confidential codes with the possible number of 2 M key combinations even the total search of keys during a force attack of a system is fulfilled in a quite acceptable time limits due to the modern development of the computer technology.
  • the encoded text will be same what allows to reveal the statistical regularity of the association between the open text and the cryptogram and to decode the cryptogram without using any direct search of keys.
  • the method does not provide possibility for changing keys by using open communication lines.
  • the prior art discloses a crypto system with open keys RSA [2] p. 37-39.
  • This system uses the unilateral function, i.e. discrete exponentiation.
  • the system provides possibility for open propagation of keys.
  • the disadvantages of a system are the insufficient crypto resistance and the low rate of encoding and decoding of information.
  • GOST 34.11 - 94 [3], pp. 3-8 describes hashing, which consists in comparing to an arbitrary data set in the form of a sequence of binary digital symbols of its image of the fixed small length.
  • the 64-bit sub words are encoded by using 256 bit length keys.
  • the disadvantages of these systems are the small key length resulting in possibility of decoding in acceptable time limits, and a low rate of encoding.
  • the prototype object is a method for encoding information comprising the following steps: • preliminary generating of data on regularities coupling values of symbols of the initial communication with the specific symbols of the encoded communication for the total array of symbols of the given kind of communications;
  • the encoded communication may be further transferred to the addressee in the form of information or a controlling command.
  • the communication may also be saved on a carrier inaccessible to stranger persons.
  • the object selected for the prototype corresponds to the device for carrying out the method for encoding communication [PCT/99BY/00005], comprising:
  • the aim of the proposed invention is improvment of the method for encoding and transferring information, expansion of functional characteristics and application spheres thereof. This is carried out by means of qualitative separating to several parts of the information subject to transferring, transferring of some parts either immediately to the addressee, or after additional encoding, and additional encoding of the remaining parts of information by the method for complete randomization in the high-power randomization field, and transferring the same to the address through a communication data processing center.
  • the prior art method for encoding and transferring information comprises the following steps: • preliminary generating data on regularities of the first type coupling the value of symbols of the initial communication with concrete symbols is of the primary transformed communication for all array of symbols of the given kind of the communications;
  • the proposed method further comprises the steps of: • primary transforming of the initial communication is performed by means of regularities of the first type, that are known to the recipient, in such a way that as a result at least two primary transformed communications of different contents are formed;
  • the method provides substantial enhancing of the security of the transmitted information by means of transforming the initial communication in such a way that as a result several parts of the encoded communication are formed, any of the parts having no logical connection with the others.
  • regularities of transforming of the first type function as a key.
  • Secondary transforming of several parts further enhances the degree of security of the transmitted information.
  • Regularities of transforming of the second type also function as a key.
  • An improvement of the method for encoding and transforming information comprises the steps of:
  • the method is characterized in that:
  • At least one encoded communication is transmitted by means of at least one communication channel.
  • Intermixing of primary transformed communications provides further enhancing of the degree of security of the transmitted information.
  • the proposed method further comprises the steps of:
  • the given method provides one more variant of intermixing of parts of the communication in order to enhance the security of the transmitted information. Further improvement of the previous method consists in transferring of all parts of the encoded communication through one and the same communication channel (see Claim 5).
  • the given embodiment loweres hardware expenditures for implementation of the given method, though also reducing the transmission speed and increasing probability of eavesdropping.
  • One more improvement of the invention is the method, chracteriezed in that all parts of the encoded communication and all the primary transformed communications unsubjected to the secondary transforming are transmitted through one and the same communication channel (see Claim 6).
  • the given variant provides further reduction of hardware expenditures, lowering, however, the transmission speed and increasing probability of eavesdropping.
  • a part of the encoded communication is transmited separately through two or more communication channels (see Claim 7).
  • One more improvement of the invention is the method (see Claim 9) comprising the steps of:
  • the given method is a special case of the methods according to claims 1, 3.
  • Primary transforming is encoding by the method disclosed in PCT/BY99/00005, and the secondary transforming is encoding by the method disclosed in PCT/BY99/00004.
  • the degree of security of the transmitted communications provided in this case is arbitrary close to the theoretically stable system of encoding.
  • the length of the communication containing the encoded accessory information is approximately four times larger then the length of the initial communication, and the length of the communication containing the core may be arbitrary small irrespective of the length and the type of the initial communication.
  • the given method is a variant of the previous method providing minimum size of equipment necessary for transferring communication at minimum transmission speed.
  • Still further improvement of the invention is the method (see Claim 11) comprising the steps of:
  • the given method is a variant of the previous method, which provides the greater transmission speed at increasing of size of the equipment necessary for transferring the communication and reduces probability of eavesdropping of the transmitted information.
  • One more improvement of the invention is the method (see Claim 12) comprising the steps of:
  • the given method is a variant of the method providing the larger transmission speed at increased size of equipment necessary for transferring the communication.
  • the improvement (see Claim 16) of the previous method comprises the steps of:
  • Another variant of the invention comprises the step of transferring the encoded accessory information and the encoded core through one communication channel (see Claim 17). Transmission of the accessory information and the encoded core through one communication channel reduces hardware expenditures for creation of communication channels.
  • the new method for an encoding information (see Claim 18) comprises the following steps, that are common with the prior art solutions:
  • the characteristic feature of the method consists in the following:
  • Including into the method of the communication data processing center provides further increase of the degree of security of information and the following new functionalities: creates prerequisites for adding of new clients, provides centralized generalizing and destributing of keys, - expands possibilities for application of the method; ensures control of transferring communications and management. Moreover the communication data processing center can neither read nor consciously change the transmitted communications.
  • the additional function of the communication data processing center i.e. storing of the part of the primary of the transformed communication, solves the problem of an electronic signature in the symmetrical cryptography systems, provides possibility of authorizing of transmission of the communication with the concrete contents from the sender to the recipient.
  • One more invention according to the method for encoding and transferring information comprises the following steps known in the prior art:
  • the distinctive feature of the method consists in the following: • at least part of an encoded communication is transmitted to the recipient through a communication data processing center, and
  • the given variant is a special case for encoding and transferring communications through the communication data processing center.
  • Primary transforming consists in encoding by the method described in PCT/BY99/00005, and the secondary transforming consists in encoding by the method described in PCT/BY99/00004.
  • Applying the collection of these methods to the specified sequence provides the degree of security of the transmitted communications arbitrarily approximated to the theoretically stable system of encoding.
  • the length of the communication containing the encoded accessory information is approximately four times larger of the length of the initial communication, and the length of the communication comprsing the core may arbitrarily small irrespective of the length and the type of the initial communication.
  • the most preferable is the method for encoding and transferring information (see Claim 21) comprising the steps of:
  • the subscriber-sender performs primary transforming of the initial communication by means of regularities of the fist type, that are known to the recipient, as a result of which two parts of the primary transformed communication are formed, and namely the core (C), containing the transformed information and the accessory information (F) containing parameters of transformation;
  • the subscriber-sender transmits the encoded core to the communication data processing center through one of the communication channels;
  • the communication data processing center performs the secondary reverse transforming of the encoded core by means of corresponding regularities of the second type used by the sender, as a result of which the core (C) is recovered;
  • the communication data processing center performs a new secondary transforming of the recovered core by means of corresponding regularities of the second type known to the recipient, as a result of which a new encoded core is formed; • the communication data processing center transmits the new encoded core to the recipient.
  • the given method provides centralized generating and destributing of keys for connecting each subscriber to the communication data processing center and the keys for initialization of connection between the subscribers. Thereby confidentiality of communications between subscribers is guaranteed.
  • the above mentioned method may be further improved by including the communication data processing center that stores the recovered core (see Claim 22).
  • the additional function of the communication data processing center consisting in storing of a part of the primary transformed communication solves the problem of the electronic signature in symmetrical cryptography systems, provides possibility of authorizing of transmission of the communication with the specified contents from the sender to the recipient. Storing of the core by the communication data processing center expands functionalities of the claimed method.
  • the sender forms a key communication containing generated data on regularities of the first type that are individual for each pair sender-recipient;
  • the communication data processing center performs the secondary transforming of the preliminary transformed encoded core with the help of regularities of the second type, that are known to the recipient, as a result of which the encoded core is formed;
  • the sender performs primary transforming of the communication with the help of generated individual regularities of the first type (K 1 , ⁇ ) in such a way, as a result of which are formed a core (C), containing the transformed information and an accessory information (F) containing parameters of transformation;
  • the sender performs secondary transforming of the core (C) with the help of generated individual regularities of the second type, as a result of which an encoded core is formed; • the sender transmitts the accessory information to the recipient through one of the communication channels;
  • the described method further provides generation by the i-subscriber of individual keys for the selected pair sender - recipient, and exchange of the generated keys between the subscribers with use of open communication channels by means of a communication data processing center.
  • the new keys remain inaccessible for eavesdropping, including for the communication data processing center.
  • the method for reciving and decoding information when encoding is carried out with use of secondary transforming for a part of the primary transformed communication, comprises the following steps known from the prior art: • preliminary generation of data on regularities of the first type coupling the values of symbols of the initial communication with the specific symbols of the primary transformed communication for the total array of symbols of the given kind of communications;
  • the given method provides receiving and decoding of information encoded according to the given invention. Further of improvement of the invention by using the respective method for encoding and transferring communications(see Claim 25) consists accordingly in that the encoded communication and the primary transformed communications are received through one and the same communication channel.
  • the given method provides receiving and decoding of information according to Claim 24. In this case minimization of hardware expenditures in respect of reciving communications is provided.
  • the encoded communications and the primary transformed communications unsubjected to the secondary transforming are received through at least two communication channels.
  • the given method provides receiving and decoding of information by using the appropriate method for encoding and transferring, whereat the speed of receiving communications is increased.
  • Method for receiving and decoding information, when at least two or all parts of the primary transformed information are subjected to the secondary transforming comprises the steps of:
  • the method is characterized in that: • at least two encoded communications are received by means of at least one communication channel;
  • the given method provides receiving and decoding of the information encoded in case all parts of the secondary transformed information according to the present invention are subjected to the secondary transforming.
  • Reverse primary transforming is decoding by the method desclosed in PCT/BY99/00005, and reverse secondary transforming is decoding by the method desclosed in PCT/BY99/00004.
  • the given method is a special case of improvement of the above described method. In this case minimization of hardware expenditures in respect of receiving communications is provided.
  • the given method is a special case of improvement of the above described method. In this case the speed of receiving information is increased.
  • the method for reciving and decoding may be characterized in that:
  • the given method is a special case of improvement of the above described method. In this case minimization of hardware expenditures in respect of receiving communications is provided.
  • the accessory information is received through one communication channel (see Claim 33).
  • the encoded core is received through the other communication channel;
  • the given method is a special case of improvement of the above described method. In this case the speed of receiving information is increased.
  • the method for receiving and decoding information encoded with intermixing of the primary transfromed communication comprises the following steps:
  • the given method provides receiving and decoding information encoded with intermixing of the primary transformed communication.
  • the method is characterized in that:
  • the given method provides receiving and decoding of information encoded by the above- stated method according to claim 4.
  • the method for storing confidential information comprises the following steps:
  • One more variant of embodiment of the claimed methods for encoding is the method (see Claim 37) for storing confidential information comprising the following steps:
  • the method is characterized in that: • primary transforming of the initial information is performed with use of regularities of the first type, in such a way as a result of which are formed at least two parts of the transformed information, and namely: a core (C), containing the transformed information and an accessory information (F) containing parameters of transformation;
  • Primary transforming of information is encoding by the method disclosed in PCT/BY99/00005, and secondary transforming of information is encoding by the method described in PCT/BY99/00004.
  • the collection of these methods used for the given sequence provides the degree of security of the transmitted and stored communications arbitrary approximated to the theoretically stable system of encoding.
  • the new method for storaging confidential information (see Claim 38) comprises the following steps:
  • • primary transforming of the initial information is performed with use of regularities of the first type, in such a way, as a result of which at least two parts of the transformed information are formed; • secondary transforming is performed with use of regularities of the second type, as a result of which at least one part of the encoded information is formed.
  • the given method solves the tasks similar to the method according to claim 36.
  • Transmission for storing of all or some parts of the encoded information and/or all or some parts of the transformed information provides additional protection of the stored information.
  • Primary transforming is encoding by the method disclosed in PCT/BY99/00005, and secondary transforming is encoding by the method disclosed in PCT/BY99/00004.
  • the more elaborated method for encoding, transferring and storing information by a subscriber and a keeper comprises the following steps: • preliminary generating by the subscriber of data on regularities of the first type (KMN2) coupling the values of symbols of the initial communication with the specific symbols of the primary transformed communication for the total array of symbols of the given kind of communications; • preliminary generating of data on regularities of the second type coupling the values of symbols of the primary transformed communication with the specific symbols of the secondary transformed communication for the total array of symbols of the given kind of primary transformed communications; • primary transforming of the initial information;
  • the method is characterized in that • primary transforming of the initial information is performed by the subscriber with use of regularities of the first type in such a way, as a result of which at least two parts of the primary transformed information are formed;
  • the given method is a special case of improvment of the method as disclosed in Claim 38.
  • the method for encoding, transferring and storing information by subscribers and keepers comprises the following steps: • preliminary generating by a subscriber of data on regularities of the first type (K, ⁇ ) coupling the values of symbols of the initial communication with the specific symbols of the primary transformed communication for the total array of symbols of the given kind of communications;
  • the method is characterized in that
  • the given method is a special case of the method disclosed in claim 39.
  • the encoded core may be much less then the initial information, what provides a high speed of transmission and requires small size of a remote storage for storing large information volumes.
  • the method is characterized in that • individual data on regularities of the second type (K ⁇ ) coupling the values of symbols of the primary transformed information with the specific symbols of the secondary transformed information for the total array of symbols of the given kind of the primary transformed information for each subscriber are preliminary transmited by the keeper to each subscriber; • primary transforming of the initial information is performed by the subscriber with the help of regularities of the first type that are known to the recpient, in such a way, as a result of which at least two parts of the primary transformed information are formed.
  • K ⁇ regularities of the second type
  • the given method provides further considerable reduction of the memory size for remote storage.
  • the method is characterized in that • data on regularities of the second type (K' MZ4 ) coupling the values of symbols of the primary transformed information with the specific symbols of the secondary transformed information for the total array of symbols of the given kind of the primary transformed information individual for each subscriber are preliminary transmited by the keeper to each subscriber; • primary transforming of the initial information with the help of regularities of the first type, that are known to the recpient, is performed by the subscriber in such a way, as a result of which the core (C) and the accessory information (F) containing transformation parameters are formed;
  • the given method is a special case of the method disclosed in claim 42. It provides minimum size of storage, that is related to properties of encoding and decoding according to the methods disclosed in PCT/BY99/00005 and PCT/BY99/00004.
  • the method for remote authorized control comprising transferring the command to the executive element by means of the communication data processing and control center, as well as the further steps:
  • a criterion of decsion-making for tramsmitting a command to the executive element is selected preliminary by the communication data processing and control center;
  • the communication data processing and control center make a decision on transferring a command to the executive element and transmitts the sad command to the exceutive element;
  • the given method solves the problem of full remote control by an executive element ??? by means of the communication data processing and control center.
  • the criterion of decisionmaking for transferring a command to the executive element, the regularities of transforming information of the first and second type fuctioning as keys, are generated by a communication data processing and control center.
  • the communication data processing and control center transmits the keys to the subscriber.
  • the subscriber forms communications containing control instructions, encodes them by using the received keys and transmits them to the communication data processing and control center.
  • the communication data processing and control center receives the encoded communications and decodes them. In accordance with the results of decoding communications correspondingly with the preliminary generated criterion, the communication data processing and control center makes a decision and transmits the command to the executive element.
  • the executive element receives the command and executes it.
  • the communication data processing and control center and the executive element are located in one place.
  • the method provides a high degree of security of the transmitted controlling commands from eavesdropping and falsification.
  • the communication data processing and control center has a total control of the management system.
  • Method for remote authorized control (see Claim 45) comprising transferring the command to the executive element by means of the communication data processing and control center, as well as the further steps:
  • the method is characterized in that:
  • a decision-making criterion for transferring a command to the executive element is selected preliminary by the communication data processing and control center;
  • the communication data processing and control center makes a decision on transferring the control command to the executive element and transmits the said command to the executive element;
  • the given method provides possibility for a group of subscribers to control the executive element. For example one or several subscribers from the group may initiate a control instruction. In this case there is a possibility for the subscribers of controlling group on arriving at the agreement about the contents, the time of sending a control instruction, etc.
  • the subscribers form communications, perfom primary transfroming with use of regularities of the first type known to the recipient, perform secondary transforming of the core with use of regularities of the second type, send the accessory information to the recipient, send the encoded core to the communication data processing and control center.
  • the communication data processing and control center relays the encoded core to the recipient after re- encoding it with use of regularities of the second type.
  • the recipient receives all parts of the encoded communication and restores the initial communication.
  • the communication data processing and control center has no possibility for control the contents of negotiation between the subscribers. Having arrived at the agreement, the subscribers form communications containing a command for the executive element, transform them with use of individual regularities of transforming and transmit them to the communication data processing and control center.
  • the processing unit restores the command containing initial communications by using known to it regularities of the second type, and forms the command according to the preliminary generated criterion and transmits to it to the executive element.
  • the executive element receives the command and executes it.
  • the first type transforming is desribed in PCT/BY99/00005 and the the second type of transforming is described in PCT/BY99/00004.
  • the method for full remote control provides:
  • a method for remote authorized control comprising transferring the command to the executive element by means of the communication data processing and control center, as well as further steps:
  • the initial communication containing information on the operation that must be done by the executor is formed by at least one subscriber; • primary transforming of the initial communication, by means of regularities of the first type that are known to the respective recipient, is performed by the subscriber-sender for at least one recipient in such a way, as a result of which a least two parts of the primary transformed communication is formed;
  • the communication data processing and control center makes a decision on transferring the control command to the executive element and transmits the said command to the executive element;
  • a method for remote authorized control comprising transferring the command to the executive element by means of the communication data processing and control center, as well as further steps:
  • a method for remote authorized control comprising transferring the command to the executive element by means of the communication data processing and control center, as well as further steps:
  • the method is characterised in that : • individual data on regularities of the first type (K' MZ , coupling the values of symbols of the initial communication with the specific symbols of the transformed communication for the total array of symbols of the given kind of the initial communication are generated preliminary by the communication data processing and control center for each subscriber; • data on generated regularities are preliminary transmitted by the communication data processing and control center to each subscriber;
  • a communication containing a command for the executive element is formed by at least one subscriber
  • Fig 1 shows the system for storing confidential informatiom
  • Fig 2 shows the structure of subscriber device
  • Fig 3 shows the structure of communication data processing center
  • Fig 4 shows the variant of the system for encoding, transferring and storing confidential information
  • Fig 5 shows the structure of subscriber device for encoding, transferring and storing confidential information
  • Fig 6 shows the structure of communication data processing center for encoding, transferring and storing confidential information
  • Fig 7 shows the system for remote control of confidential informatiom
  • Fig 8 shows the structure of subscriber device for remote control of confidential informatiom
  • Fig 9 shows the structure of communication data processing center for remote control of confidential information
  • Fig. 1 One of methods for storing confidential information shall be considered by the example of a system for storing confidential information (see Claim 49) illustrated by Fig. 1.
  • the system comprises one subscriber device 1, a communication data processing center 2 and data transmission environment 3.
  • Fig. 2 shows the subscriber device.
  • Fig. 3 shows the communication data processing center.
  • the system may comprise several subscriber devices.
  • the characteristic feature of a system is that the subscriber device comprises: • an input/output unit 4;
  • the communication data processing and storing center comprises:
  • the output of the generator 6 is connected to the first input of the memory device 7, the first input/output of the receiving/ transferring unit 4 is simplex connected to the first input/output of the calculator 9, the first output of the input/output unit 4 is connected to the input of the memory device 8, the second output of the input/output unit 4 is connected to the second input of the memory device 7, the second input output of the calculator 9 is simplex connected to the first input/output of the calculator 10, the third input output of the calculator 9 is simplex connected to the input/output of the memory device 11, the output of the memory device 7 is connected to input of the calculator 9, the output of the memory device 11 is connected to the third input of the memory device 7, the output of the generator 13 is connected to the input of - the memory device 8, the second input/output of the calculator 10 is simplex connected to the first input output of the receiving/transferring unit 5, the second input output of the receiving/transferring unit 5 is simplex connected to the data transferring environment 3, the output of the receiving/transferring unit 5 is connected to the input of the memory device 11, the
  • the genrator 6 generates at random parameters of transformation regularities of the first type in the form of a sequence of random numbers. Parameters of generated regularities are transmitted from the output of the generator 6 to the input of the memory device 7 for storing.
  • the generator 13 generates at random parameters of transformation regularities of the second type in the form of a sequence of random numbers. Parameters of generated regularities are transmitted from the output of the generator 13 to the input of the memory device 8 for storing.
  • the generator 13 of the communication data processing and storing center synchronously generates parameters of transformation regularities of the second type. Parameters of the generated regularities are transmitted from the output of the generator 13 to the input of the memory device 14 for storing. If the system comprises n subsciber devices 1, then n regularities are generated by the generator 13 of the communication data processing and storing center.
  • the signal containing the information to be stored is transmitted to the subscriber device through the input output unit.
  • a keyboard or another peripheral unit may be used for an inut/output unit.
  • At the signal at the input of the input/output unit is generated a read signal that is transmitted to the input of the memory device 7.
  • Under the said signal is performed reading of the parameters of transforming regularities of the first type that are transmitted from the output of the memeory device 7 to the input of the calcularor 9, to the first input output of which summultaneously is transmitted information from the input output of the input/output unit 1.
  • the calculator 9 fulfils calculations according to the algorithm of primary transforming with the help of regularities of the first type.
  • the accessory information obtained as a result of calculations is transmitted for storing into the memory device 11, and the core is transmitted into the calculator 10.
  • the regularities of the second type are transmitted into the calculator 10 from the storage device 8.
  • the calculator 10 fulfils calculations according to the algorythm of the secondary transforming with the help of regularities of the second type.
  • the resulting encoded information is transmitted into the receiving/transferring unit 5.
  • the receiving/transferring unit 5 forms a communication containing the encoded information and transfers it through the data transmission environment 3 into the communication data processing and storing center 2.
  • the communication containing the encoded information is transmitted to the receiving/transmitting unit 12 of the communication data processing and storing center.
  • the receiving/transmitting unit 12 selects the encoded information from the commmunication and transmits it into the calculator 16.
  • the calculator 16 transmits the reading signal into the memeory device 14, under which the regularities of the second type are read out and transmitted to the calculator 16.
  • the calculator 16 performs calculations according to the algorythm of the reverse secondary transforming with the help of regularities of the second type.
  • the core recovered as a result of calculations is transmitted for storing into the memory device 15.
  • the request for giving the information is transmitted by transit through the calculator 9 to the calculator 10.
  • information on regularities of the second type is transmited from the memory device 8 to the calculator 10.
  • the calculator 10 perfoms calculations according to the algorythm of the secondary transforming.
  • the resulting encoded request is transmitted into the calculator 16 through the receiving/transferring unit 5, the data transmission environment 3 and the receiving/transferring unit 12.
  • the calculator 16 transmits the read signal into the memory device 14, under which the regularities of the second type are read out of the memory device 14 and transferred to the calculator 16.
  • the calculator 16 perfoms calculations according to the algorythm of the secondary transforming with the help of regularities of the second type.
  • the resulting recovered request is transmitted into the memory device 15.
  • the core is transmitted from the memeory device 15 into the calculator 16.
  • the calculator 16 transmitts the read signal into the memory device 14, under which the under which the regularities of the second type are read out of the memory device 14 and transferred to the calculator 16.
  • the calculator 16 perfoms calculations according to the algorythm of the secondary transforming with the help of regularities of the second type.
  • the resulting encoded core is transmitted into the receiving/transferring unit 5 through the receiving/transferring unit 12 and the data transmission environment 3.
  • the encrypted core is transmitted from the receiving/transferring unit 5 into the calculator 10.
  • regularities of the second type are transmitted into the calculator 10 from the memory device 8.
  • the calculator 10 perfoms calculations according to the algorythm of the reverse secondary transforming.
  • the resulting restored core is transmitted into the calculator 9.
  • the respective accessory information is read from the memory device 11 and transmitted into the calculator 9 .
  • the regularities of the second type are transmitted from the memory device 7 into the calculator 9.
  • the calculator 9 perfoms calculations according to the algorythm of the reverse primary transforming.
  • the resulting recovered information is transmitted to thetician recipient through the input/output unit 4.
  • the system comprises at least two subscriber devices 17, a communication data processing center 18 and a data transmission environment 3.
  • Fig 4 shows the general view of the system.
  • Fig. 5 shows the subscriber device 17.
  • a communication data processing center is represented.
  • the characteristic feature of the system is that each of subscriber devices comprises: • an input output unit 19;
  • communication data processing center comprises:
  • the output of generator 6 is connected to the first input of the memory device 22, the first input/output of the input output unit 19 is simplex connected to the first input/output of the memory device for storing initial communication 26, the output generator 13 is connected to the input of the memory device 23, the output of the memory device 22 is connected to the input of the calculator 24, the output of the calculator 24 is connected to the second input of the memory device 22, the first input/outputof the calculator 24 is simplex connected to the second input/output of the memory device for storing initial communication 26, the second input/output of the calculator 24 is simplex connected to the first input/output of the calculator
  • the third input output of the calculator 24 is simplex connected to the first input/output of the receiving/transferring unitt 21
  • the first output of the memory device 8 is connected to the first input of the calculator 10
  • the input of the calculator 25 is connected to the output of the memory device 23
  • the second input/output of the calculator 25 is simplex connected to the first input output of the receiving/transferring unit 20
  • the second input/output of the receiving/transferring unit 20 is simplex connected to the data transferring environment 3
  • the second input/output of the receiving/transferring unit 21 is simplex connected to the data transferring environment 3
  • the first input/output receiving/transferring unit 27 of the communication data processing center is simplex connected to data transferring environment 3
  • the second input/output of the receiving/transferring unit 27 is simplex connected to first input/output of the calculator 28
  • the input calculator 28 is connected to the output of the memory device 14
  • the input of the memory device 14 is connected to the output of the calculator 19
  • the output generator 6 is connected to the second input memory device 14.
  • the principle of operation of the system will be considered for an elementary case in presence of two subscriber devices.
  • the genrator 6 generates at random parameters of transformation regularities of the first type in the form of a sequence of random numbers. Parameters of generated regularities are transmitted from the output of the generator 6 to the input of the memory device 22 for storing.
  • the generator 13 generates by random parameters of transformation regularities of the second type in the form of a sequence of random numbers. Parameters of generated regularities are transmitted from the output of the generator 13 to the input of the memory device 23 for storing.
  • the generator 6 of the communication data processing centers synchronously generates parameters of transformation regularities of the second type for each subscriber device 17. Parameters of generated regularities are transmitted from the output of generator 6 to the input of the memory device 14 for storing.
  • the communication is transmitted to the calculator 24 through the input output unit 19 and the memory device 26.
  • the parameters of transformation regularities of the first type are read out from the memory device 22.
  • the calculator 24 performs calculations according to the algorithm of primary transforming with the help of regularities of the first type.
  • the core and the accessory information containing transformation parameters are formed.
  • the accessory information is transmitted through the receiving/transferring unit 21 and the data transmission environment 3 into the receiving/transferring unit 21 of the recipient subscriber device, and the core is transmitted into the calculator 25.
  • the regularities of the second type are transmitted into the calculator 25 from the storage device 23.
  • the calculator 25 performs calculations according to the algorithm of the secondary transforming with the help of regularities of the second type.
  • the resulting encoded information is transmitted through the receiving/transferring unit 20 and the data transmission environment 3 into the receiving/transferring unit 27 of the communication data processing center 18.
  • the encoded information is tranmitted from the receiving/transferring unit 27 into the calculator 28.
  • the request for reading the regularities of the second type belonging to the respective sender is transmitted by the calculator 28 to the first input of the memory device 14.
  • the memory device 14 transmits the respective regularities of the second type to the input of the calculator 38.
  • the calculator 28 perfoms the reverse secondary transforming of the encoded information, as a result of which the core is recovered.
  • the request for reading the regularities of the second type belonging to the respective receiver are transmitted by the calculator 28 to the first input of the memory device
  • the memory device 14 transmits the respective regularities of the second type to the input of the calculator 38.
  • the calculator 28 perfoms the reverse secondary transforming of the core, as a result of which the core encoded for the recipient is formed.
  • the core encoded for the recipient is transmitted into the calculator 25 through the ' receiving/transferring unit 27, the data transmission environment 3 and the receiving/transferring unit 20 of the subscriber device.
  • the regularities of the second type are transmitted into the calculator 25 from the storage device 23.
  • the calculator 25 performs calculations according to the algorithm of the secondary transforming with the help of regularities of the second type.
  • the resulting recovered core is transmitted into the calculator 25. Simultaneously the accessory information containing transformation parameters is transmitted from the receiving/transferring unit 21 into the calculator 24.
  • the calculator 24 transmitts the read signal to the input of the memory device 22. Under the read signal from the memory device 22 the respective regularities of the first type are transmitted to the input of the calculator 24 .
  • the calculator 24 performs calculations according to the algorithm of the reverse primary transforming with the help of regularities of the first type.
  • the communication restored as the result of calculations is transmitted from the calculator 24 through the memory device 26 ale and the receiving/transferring unit 19 to the output of the subscriber device.
  • Fig. 7 is the general view of the system. In the most elemental case the system contains two subscriber devices 17, a communication data processing and contrrol center 29, a data transmission environment 3 and the final control device 30. Fig.8 shows the subscriber device. The communication data processing and control center is shown at Fig.9. Each of the subscriber devices comprises:
  • the communication data processing center comprises:
  • the output of the generator 6 is connected to the first input of the memory device 22
  • the second input of the memory device 22 is connected to the output of the calculator 24
  • the output of the memory device 22 is connected to the input of the calculator 24
  • the input/output of the input/output unit 19 is simplex connected to the first input output of the memory device
  • the second input/output of the memory device 26 is simplex connected to the first input/output of the commutator 31
  • the second input/output of the commutator 31 is simplex connected to the first input output of the calculator 24, the third input/output of the commutator
  • the second input output of the receiving/transferring unit 21 is simplex connected to the data transferring environment 3
  • the second input/output of the calculator 25 is simplex connected the first input/output of the receiving/transferring unit 20
  • the second input output of the receiving transferring unit 20 is simplex connected to the data transferring environment 3
  • the first input of the calculator 25 is connected to the output of the memory device 23
  • the input of the memory device 23 is connected to the output of the generatorl3
  • the first input/output of the receiving/transferring unit 12 of the communication data processing and control center is simplex connected to the data transferring environment
  • the second input output of the receiving/transferring unit 12 is simplex connected to the first input/output of the calculator 32
  • the second output of the calculator 32 is connected to the input of the memory device 31
  • the output of the generator 13 is connected to the first input of the memory device 14
  • the second input of the memory device 14 is connected to the output of calculator 32
  • the output of the memory device 14 is connected to the input of the calculator 32
  • Preliminary generating of transformation regularities of the first type is carried out as follows.
  • the generator 6 of one subscriber devices synchronously with the generator 6 of the other subscriber device, generates at random parameters of transformation regularities of the first type in the form of a sequence of random numbers.
  • the generated parameters of regularities of the first type are stored in the memory devices 22 of respective subscriber devices.
  • Preliminary generating of transformation regularities of the second type is carried out as follows. Synchronously with the generator 13 of the communication data processing and control center, the generator of 13 of one subscriber device generates at random parameters of - transformation regularities of the second type in the form of a sequence of random numbers. Regularities of the second type generated by the generator 13 of one subscriber device are stored in the respective memory device 23. Synchronously with the generator 13 of the communication data processing and control center, the generator 13 of the other subscriber device generates at random parameters of other transformation regularities of the second type in the form of a sequence of random numbers. Regularities of the second type generated by the generator 13 of the other subscriber device are stored in the respective memory device 23. Regularities of the second type generated by the generator 13 of the communication data processing and control centers are stored in the memory device 14.
  • Encoding and transferring of the control statement is performed by one of the subscriber devices as follows.
  • the communication containing the statement is transmitted to the calculator 24 through the input/output unit 19, the memory device 26 and the commutator 31 of the first subscriber device.
  • parameters of transformation regularities of the first type are transmitted from the memory device 22 into the calculator 24.
  • the calculator 24 performs calculations according to the algorithm of conversion of the first type.
  • the accessory information obtained as a result of calculations is transmitted through the receiving/transferring unit 21 into the data transmission environment 3.
  • the core obtained as a result of calculations is transmitted from the calculator 24 through the commutator 31 into the calculator 25. Simultaneously the transformation parameters of the second type are transmitted into the calculator 25 of the memory device 23.
  • the calculator 25 performs calculations according to the algorithm of transforming of the second type.
  • the encodeded information obtained as a result of calculations is transmitted into the data transmission environment 3 through the receiving / transferring unit 20.
  • Receiving and decoding of the control statement is performed by the other subscriber device as follows.
  • the encodeded information from the data transmission environment 3 is transmitted through the receiving/transferring unit 20 of the second subscriber device into the calculator 25.
  • Simultaneously the parameters of transformation regularities of the second type are transmitted into the calculator 25 from the memory device 23.
  • the calculator 25 fulfils calculations according to the algorithm of transforming of the second type.
  • the core restored as a result of calculations is transmitted from the calculator 25 through the commutator 31 into the calculator 24.
  • the parameters of transformation regularities of the first type are transmitted from the memory device 22 into the calculator 24.
  • the calculator 24 fulfils calculations according to the algorithm of transforming of the first type.
  • the communication restored as a result of calculations is transmitted through the commutator 31, the memory device 26 and the input/output unit 19 to the output of the subscriber device.
  • Encoding and transferring of the control command is performed by the subscriber device as follows.
  • the control command is transmitted through the input/output unit 19, the memory device 26 and the commutator 31 into the calculator 25.
  • the parameters of transformation regularities of the second type are transmitted into the calculator 25 from the memory device 23.
  • the calculator 25 performs calculations according to the algorythm of transforming of the second type.
  • the encoded information formed as a result of calculations is transmitted from the calculator 25 through the receiving/transferring unit 20 into the data transmission environment 3.
  • Receiving and decoding of the control commaand is performed as follows.
  • the encoded information from the data transmission environment 3 is transmitted through the receiving/ transferring unit 12 into the calculator 32.
  • the parameters of transformation regularities of the second type are transmitted from the storage device 14 into the calculator 32.
  • the calculator 32 performs calculations according to the algorithm of transforming of the second type.
  • the control command recovered as a result of calculations is transmitted into the memory device 31.
  • data on regularities coupling the values of symbols of the initial communication with the specific symbols of the encoded communication for the total array of symbols of the given kind of communications are preliminary generated as a key to the communications or information.
  • the operation of generation is performed once for a large number of the communications.
  • the (n) number of cycles of conversion of the initial text is calculated.
  • the random numbers (R ; ) defining the address of the regularity used for transforming of the text at the current step of transforming, are generated.
  • the text is transformed with use of the selected regularity, as a result of which a core ( ) and an accessory information (F,) are formed. A decision is made on going to the next cycle or termination of transforming information.
  • Intermixing of the text formed as a result of transforming may be performed at each step or several steps as an additional measure for protection from cryptoanalysis.
  • the core (Cn) is formed.
  • the length of the said core may be not less then the length of one symbol of the alphabet Bn used at the last step of conversion.
  • the accesory information contains data on margins of each symbol of the transformed text at each step of transforming.
  • the length of the core formed as a - result of such iterative transforming may be much less then the length of the initial text irrespective of kind of this text, but not less then the length of one symbol of the alphabet Bn used for transforming at the last step.
  • the length of the text containing the accessory information is approximately equal to the length of the initial text.
  • the accessory information is transmitted to the recipient.
  • the thus obtained core is subjected to the secondary transforming.
  • This generation is performed once for transforming the plurality of communications.
  • two random numbes X and Z are generated for each symbol of the core.
  • the respective value Y is calculated for the concrete symbol, the value U is further calculated according to the support function U (Z).
  • the value W for this symbol is calculated according to the key function W (Y, U) and the obtained for the symbol value Y and the value U from the support function.
  • the thus obtained encodeded text contains data for generating random numbers X, U and the value W for each symbol of the core.
  • the primary conversion has the following characteristics: • as a result of transforming of the initial text two output texts (a core (Cn) and accessory information (F)) are formed, each of which separately has no sense from the point of view of recovering the initial text; • generally the transformed text may have the length of one symbol of the alphabet of replacement, e.g. if the initial text has the byte representation the transformed text may have a one byte length irrespective of the length and kind of the initial text;
  • the functions of transforming (Yi) may be preset in the tabulared form.
  • the function Yi may be preset in the form of the array of 256 triples — ⁇ (ak, bik, fik) ⁇ where ak — the eight bit code, bik — the bit code, fik — the length in bik bits; at such representation 256! * 128*255 10 5U different functions of conversion (Yi) are present.
  • the secondary conversion has the following characteristics: - each time the encodeded text is random at constant parameters of the randomiser for one and the same initial text; -the power of plurality of encodeded texts for one and same initial text at the L power of plurality of codes, and the number of characters in the n text is evaluated by grandiose number nL.
  • the use of the collection of transformations in the definite sequence provides absolute safety of the protected information, essentially expands functionalities of claimed methods and systems, allowing to realize a centralized control of keys, to control data flow and data devices, and to store confidential information.
  • the claimed methods and system may be realized in the form of:
  • a new technical result consisting in creating an essentially new system of encoding and transferring information is achieved as a result of solving the defined problem.
  • the new system provides:
  • Possible applications of the invention are, for example, to be seen in the field of the public or commertional commumcation systems, banking transactions and services etc..

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Compression, Expansion, Code Conversion, And Decoders (AREA)
  • Telephonic Communication Services (AREA)
  • Information Transfer Between Computers (AREA)
  • Mobile Radio Communication Systems (AREA)
EP99953451A 1999-10-15 1999-10-15 Methods for encoding, decoding, transferring, storage and control of information, systems for carrying out the methods Withdrawn EP1222771A1 (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/BY1999/000008 WO2001030017A1 (en) 1999-10-15 1999-10-15 Methods for encoding, decoding, transferring, storage and control of information, systems for carrying out the methods

Publications (1)

Publication Number Publication Date
EP1222771A1 true EP1222771A1 (en) 2002-07-17

Family

ID=4083773

Family Applications (1)

Application Number Title Priority Date Filing Date
EP99953451A Withdrawn EP1222771A1 (en) 1999-10-15 1999-10-15 Methods for encoding, decoding, transferring, storage and control of information, systems for carrying out the methods

Country Status (5)

Country Link
EP (1) EP1222771A1 (ko)
KR (1) KR100699276B1 (ko)
AU (1) AU1020800A (ko)
EA (1) EA004904B1 (ko)
WO (1) WO2001030017A1 (ko)

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0763297B1 (en) * 1994-05-31 2004-07-28 Litton Systems, Inc. Nonlinear dynamic substitution devices and methods for block substitutions employing coset decompositions and direct geometric generation

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO0130017A1 *

Also Published As

Publication number Publication date
KR20020041821A (ko) 2002-06-03
AU1020800A (en) 2001-04-30
EA200200467A1 (ru) 2003-02-27
KR100699276B1 (ko) 2007-03-27
WO2001030017A1 (en) 2001-04-26
EA004904B1 (ru) 2004-08-26

Similar Documents

Publication Publication Date Title
KR100657062B1 (ko) 정보 암호화 방법 및 이 방법을 실현하는 장치
US5261003A (en) Data communication system and method with data scrambling
AU2008327506B2 (en) Method and system for encryption of data
US7254232B2 (en) Method and system for selecting encryption keys from a plurality of encryption keys
US8180048B2 (en) Method and system for computational transformation
JPH1075240A (ja) データ送信を保護する方法およびデータを暗号化または解読化する装置
JPH0969830A (ja) 暗号通信システム
EP1302022A2 (en) Authentication method and schemes for data integrity protection
JPWO2006019152A1 (ja) メッセージ認証子生成装置、メッセージ認証子検証装置、およびメッセージ認証子生成方法
US6301361B1 (en) Encoding and decoding information using randomization with an alphabet of high dimensionality
Vijayakumar et al. Increased level of security using DNA steganography
Ahmad Cryptanalysis of chaos based secure satellite imagery cryptosystem
CN109547202B (zh) 量子密钥回收的方法、装置及系统
Markovski et al. Secure two-way on-line communication by using quasigroup enciphering with almost public key
CN115119200B (zh) 一种用于5g通信环境的信息传递方法
CN112637442B (zh) 云服务器和本地端进行循环图像加密的方法及装置
Marnas et al. All-or-nothing transforms using quasigroups
WO2001030017A1 (en) Methods for encoding, decoding, transferring, storage and control of information, systems for carrying out the methods
KR100889400B1 (ko) 데이터 전송장치 및 파일장치
Negi et al. Hybrid approach for Data Security using Coverless Image Steganography with AES
Baftiu ANALYSIS AND USE OF CRYPTOGRAPHY TECHNIQUES IN PROGRAMMING LANGUAGE C
US20230299940A1 (en) Single stream one time pad with encryption with expanded entropy
Vandewalle et al. Data security issues, cryptographic protection methods, and the use of cellular neural networks and cellular automata
Sangeetha et al. Email Protection in the Digital Age: Evaluating Symmetric Cryptographic Algorithms
Limbong et al. IMPLEMENTATION OF ELGAMAL AND LEAST SIGNIFICANT BIT (LSB) ALGORITHM FOR ENDING AND HIDDEN MESSAGES IN DIGITAL IMAGES

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20020506

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE

AX Request for extension of the european patent

Free format text: AL;LT;LV;MK;RO;SI

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: MICHTCHENKO, VALENTIN ALEXANDROVICH

17Q First examination report despatched

Effective date: 20061120

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20090113