UA42345A - METHOD OF CRYPTOGRAPHIC DATA TRANSFORMATION FOR COMPUTER INFORMATION PROCESSING SYSTEMS - Google Patents
METHOD OF CRYPTOGRAPHIC DATA TRANSFORMATION FOR COMPUTER INFORMATION PROCESSING SYSTEMSInfo
- Publication number
- UA42345A UA42345A UA2001010441A UA200110441A UA42345A UA 42345 A UA42345 A UA 42345A UA 2001010441 A UA2001010441 A UA 2001010441A UA 200110441 A UA200110441 A UA 200110441A UA 42345 A UA42345 A UA 42345A
- Authority
- UA
- Ukraine
- Prior art keywords
- information processing
- processing systems
- output
- cryptographic data
- data transformation
- Prior art date
Links
Abstract
1. Об'єкт винаходу: Спосіб криптографічного перетворення даних для систем обробки інформації в ЕОМ. 2. Галузь застосування: обчислювальна техніка, а саме до шифрувальних пристроїв і способів з використанням декількох ключів і/або алгоритму. 3. Суть винаходу: на другому етапі псевдо випадкову послідовність, попередньо перетворену в режимі заміни інформації, підсумовують по модулю 2 з послідовністю з необхідним періодом (2257-1), одержуючи на виході попередньо зашифровану інформацію, при цьому Гш на виході рекурентного регістра формують у відповідності із введеним у нього ключем. 5. Технічний результат: підвищення періоду повторення даних на виході, безпечного часу і зменшення імовірності перекриття ключів у просторі і часі, що забезпечує в цілому підвищення реальної криптостійкості.1. Object of the invention: A method of cryptographic data conversion for information processing systems in a computer. 2. Field of application: computer technology, namely to encryption devices and methods using multiple keys and / or algorithm. 3. The essence of the invention: in the second stage, the pseudo-random sequence, pre-converted in the mode of replacing information, is summed in module 2 with the sequence with the desired period (2257-1), receiving the output pre-encrypted information, while GS at the output of the recurrent register is formed in correspondence with the key entered in it. 5. EFFECT: increasing the period of data repetition at the output, secure time and reducing the probability of key overlap in space and time, which provides an overall increase in real cryptocurrency.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
UA2001010441A UA42345A (en) | 2001-01-22 | 2001-01-22 | METHOD OF CRYPTOGRAPHIC DATA TRANSFORMATION FOR COMPUTER INFORMATION PROCESSING SYSTEMS |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
UA2001010441A UA42345A (en) | 2001-01-22 | 2001-01-22 | METHOD OF CRYPTOGRAPHIC DATA TRANSFORMATION FOR COMPUTER INFORMATION PROCESSING SYSTEMS |
Publications (1)
Publication Number | Publication Date |
---|---|
UA42345A true UA42345A (en) | 2001-10-15 |
Family
ID=74223197
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
UA2001010441A UA42345A (en) | 2001-01-22 | 2001-01-22 | METHOD OF CRYPTOGRAPHIC DATA TRANSFORMATION FOR COMPUTER INFORMATION PROCESSING SYSTEMS |
Country Status (1)
Country | Link |
---|---|
UA (1) | UA42345A (en) |
-
2001
- 2001-01-22 UA UA2001010441A patent/UA42345A/en unknown
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Liang et al. | A double PUF-based RFID identity authentication protocol in service-centric internet of things environments | |
EP1248409A3 (en) | Attack-resistant cryptographic method and apparatus | |
Zapateiro De la Hoz et al. | An experimental realization of a chaos-based secure communication using arduino microcontrollers | |
WO2001091366A3 (en) | Cryptographic communications using pseudo-randomly generated cryptography keys | |
JP2006003905A (en) | Method and apparatus for multiplication in galois field for preventing information leakage attack, inverse transformation device, and apparatus for aes byte substitution operation | |
DE60232803D1 (en) | VIRUS DETECTION SYSTEM | |
WO1998045980A3 (en) | Secure deterministic encryption key generator system and method | |
Folifack Signing et al. | Chaotic jerk system with hump structure for text and image encryption using DNA coding | |
US20070050614A1 (en) | Robust hyper-chaotic encryption-decryption system and method for digital secure-communication | |
DE59805323D1 (en) | DEVICE FOR IMPLEMENTING A BLOCK ENCRYPTION METHOD | |
EP1496641A3 (en) | Cryptographic processing apparatus, cryptographic processing method and computer program | |
Gnanajeyaraman et al. | Audio encryption using higher dimensional chaotic map | |
Zaher | Duffing oscillators for secure communication | |
Khalid et al. | Physical protection of lattice-based cryptography: Challenges and solutions | |
Ouladj et al. | Side-channel analysis of embedded systems | |
Bose et al. | Implementing symmetric cryptography using chaos functions | |
Hadjadj et al. | A new hardware architecture of lightweight and efficient real-time video chaos-based encryption algorithm | |
Saleh et al. | Iotes (a machine learning model) design dependent encryption selection for iot devices | |
UA42345A (en) | METHOD OF CRYPTOGRAPHIC DATA TRANSFORMATION FOR COMPUTER INFORMATION PROCESSING SYSTEMS | |
US7146006B1 (en) | Method for improving a random number generator to make it more resistant against attacks by current measuring | |
Zhou et al. | DNA sequence splicing with chaotic maps for image encryption | |
Garg | Genetic algorithm attack on simplified data encryption standard algorithm | |
TWI263431B (en) | Data encryption system and method | |
Singh et al. | Report on Cryptographic Hardware Design using Vedic Mathematics | |
Heinz et al. | Fast First-Order Masked NTTRU |