GB1487089A - Secret signalling systems - Google Patents

Secret signalling systems

Info

Publication number
GB1487089A
GB1487089A GB5356074A GB5356074A GB1487089A GB 1487089 A GB1487089 A GB 1487089A GB 5356074 A GB5356074 A GB 5356074A GB 5356074 A GB5356074 A GB 5356074A GB 1487089 A GB1487089 A GB 1487089A
Authority
GB
United Kingdom
Prior art keywords
key
bits
store
groups
binary
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired
Application number
GB5356074A
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Publication of GB1487089A publication Critical patent/GB1487089A/en
Expired legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
    • H04L9/0662Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry

Abstract

1487089 Secret signalling systems INTERNATIONAL BUSINESS MACHINES CORP 11 Dec 1974 [21 Dec 1973] 53560/74 Heading H4P A secret signalling system operates on binary data in "group substitution" mode, such that to cypher binary input data, the data bits are subdivided into groups, each group containing n bits and defining a word in a particular position in a base list of the different n bit words, and each such group is substituted by a group from the same position in any one of the factorial 2<SP>n</SP> sequences of groups of n bits which are possible, freely determined in response to a first key. The substituted groups are decyphered using a complementary second key related to the first such that the double substitution restores the original data. In one embodiment (Fig. 4), raw input data applied at M is divided by circuits SE into groups of two bits A1, A2 appearing alternately on two output lines. Each such bit may be "1" or "0"; there are four possible binary 2 bit words containing 1 and 0 and 24 (factorial 2<SP>2</SP>) possible sequences of the four possible words (Fig. 1, not shown). The 24 possible sequences are stored in a memory 50 and any particular sequence can be selected by the cyphering key control CC. The bits from a selected sequence are fed to one of logic blocks 51 or 52. These blocks incorporate arrangements of AND and OR gates (Fig. 5, not shown) such that, when the binary data group from the input, A1A2 is applied, binary bits B1B2 are delivered which represents the binary pair corresponding to A1A2 in the particular sequence selected by the key CC. At the receiver an identical system can be used, but a different key will usually be necessary to restore the original data (Fig. 2, not shown, indicates corresponding key sequences). To reduce the amount of storage required possible versions of separate sequences of the first and second bits may be held respectively in separate stores which are addressed in turn by the key CC (Fig. 6, not shown). An appropriate correspondence table will then be needed in CC, but nevertheless the storage needed is much reduced. For sequential operation it is explained that only one such smaller store is needed, being addressed in two passes. The description outlines similar systems for use when the input data is divided into three bit groups (Figs. 9 and 10, not shown) and suggests how to extend the arrangement to N bit groups. The key need not remain the same throughout a message-the groups of bits may be formed into packs of varying length each of which is cyphered using a different key, selected pseudo randomly. A pseudo random generator for selecting the key CC may be of the type wherein bits of arbitrary value held in a store are read out in sequence through logic gates by successively accessing the addresses of the store (Figs. 11-13, not shown). The store used may be part of that used in the cyphering arrangement. For example (Fig. 15) words stored in a part 80b of the store 80 are read out into logic 81, having been accessed by counter 82 operating from clock Cl. The pseudo random words are transferred to system 84 and when gate G is operated in response to a change key command applied to the key control, the pseudo random word is used to determine the key for addressing the cypher store 80a, corresponding to store 50 in Fig. 4. The data at M is cyphered as explained above with reference to Fig. 4 to appear at M<SP>1</SP>, and may be further cyphered by being combined with the pseudo random sequence from the register 83 to provide the doubly cyphered output at M<SP>11</SP>. This system may be enlarged to three or n bit groups (Fig. 16, not shown).
GB5356074A 1973-12-21 1974-12-11 Secret signalling systems Expired GB1487089A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
FR7347137A FR2255828A5 (en) 1973-12-21 1973-12-21

Publications (1)

Publication Number Publication Date
GB1487089A true GB1487089A (en) 1977-09-28

Family

ID=9130002

Family Applications (1)

Application Number Title Priority Date Filing Date
GB5356074A Expired GB1487089A (en) 1973-12-21 1974-12-11 Secret signalling systems

Country Status (4)

Country Link
JP (1) JPS5638954B2 (en)
DE (1) DE2450669A1 (en)
FR (1) FR2255828A5 (en)
GB (1) GB1487089A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2189970A (en) * 1986-05-01 1987-11-04 British Broadcasting Corp Data conversion

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS5824984B2 (en) * 1976-06-02 1983-05-24 三菱電機株式会社 Confidential device
DE19740333C2 (en) * 1997-09-13 1999-09-30 Deutsche Telekom Ag Method for the transmission of encrypted messages
CN107427095B (en) * 2015-03-26 2019-05-31 日本希格玛株式会社 Supporter cloth

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2189970A (en) * 1986-05-01 1987-11-04 British Broadcasting Corp Data conversion
GB2189970B (en) * 1986-05-01 1990-03-28 British Broadcasting Corp Data conversion

Also Published As

Publication number Publication date
DE2450669A1 (en) 1975-07-03
FR2255828A5 (en) 1975-07-18
JPS5638954B2 (en) 1981-09-09
JPS5096193A (en) 1975-07-31

Similar Documents

Publication Publication Date Title
GB1423397A (en) Multi-dimensional access solid state memory
US4047008A (en) Pseudo-random number sequence generator
GB1067981A (en) Data conversion system
GB1390400A (en) Data stores
GB1488043A (en) Data storage system
GB2268297A (en) Content addressable memory.
US3781829A (en) Test pattern generator
GB1397007A (en) Data storage systems
EP0364110B1 (en) Semiconductor memory device having a serial access memory
GB1439163A (en) Verification system
GB1468929A (en) Data processing systems
US4095283A (en) First in-first out memory array containing special bits for replacement addressing
GB1380776A (en) Systems for addressing data stores
US4058673A (en) Arrangement for ciphering and deciphering of information
GB1037389A (en) Improvements relating to data storage apparatus
CA1197626A (en) Least recently used resolver network
JPS60501628A (en) Memory management system
US3781819A (en) Shift unit for variable data widths
KR950014551B1 (en) Seniconductor memory device and method for controlling its output
GB1487089A (en) Secret signalling systems
US5089987A (en) Refresh control circuit
GB2137782A (en) Data transformation circuits
GB1072629A (en) Improvements in or relating to memory systems
GB1188290A (en) Improvements in or relating to Information Retrieval Systems
US4177355A (en) Array device for data scrambling

Legal Events

Date Code Title Description
PS Patent sealed
PCNP Patent ceased through non-payment of renewal fee