WO1998044678A1 - Dispositif de chiffrage d'information presentee en code binaire - Google Patents
Dispositif de chiffrage d'information presentee en code binaire Download PDFInfo
- Publication number
- WO1998044678A1 WO1998044678A1 PCT/RU1997/000419 RU9700419W WO9844678A1 WO 1998044678 A1 WO1998044678 A1 WO 1998044678A1 RU 9700419 W RU9700419 W RU 9700419W WO 9844678 A1 WO9844678 A1 WO 9844678A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- binary
- random
- block
- information
- data
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
Definitions
- -Secret key is a binary information known only to a foreign user
- the code may be implemented as a software for it or as a separate device;
- -shifting is a process of processing digital information by the operation of a secret key that is transmitting source information to a computer that is inoperative
- This method of blocking ensures a high speed of encryption and implementation in the form of a program for E.
- This method includes the formation of a network key for the length of the partition of the input, which is available in the form of a binary code, taking into account the length of the 64-bit
- each data block is divided into two 32-bit units I and ⁇ , which are used for processing 16. ⁇ din ⁇ ound
- Processing is subject to the execution of partitions, partitions and summations on the module 2, which are performed on the part.
- Each round ends with partitions of ⁇ and I. This method of blocking the information has a high speed of disruption.
- the main task was to develop the task.
- the properties of the encryption algorithm are more sophisticated, due to which the stability is improved for basic analysis of the basic raw materials.
- the new one is also the case that binary vectors are generated by random law.
- the new one is also the case that the binary vectors are generated by the pseudo-random law.
- the new one is also the case that the binary vectors are connected to the corresponding parts of the binary information key, depending on the private key. 5 This ensures an increase in the speed of encryption due to the introduction of an additional non-deletion of data in the processing unit.
- FIG. 1 A method of extending the source process has been provided to us in accordance with the claimed method.
- An input data block 20 has been presented on a routine basis by combining the participation of the binary information and binary.
- Loss of binary information inside the unit is combined with randomly generated binary vector ⁇ , ⁇ ⁇ ⁇ -> ⁇ ⁇ -> ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇ ⁇
- a foreign user knows the key of encryption, by using the algorithm of decryption it is possible to resume the operation of the factory and the building. By separating and discarding the binary vector, it does not contain any
- Binary generations may, at random, be performed, for example, by varying the physical process or by changing the signal
- the random number generator may be used, the input is randomly selected
- Example 1 This example explains the method of encoding information provided by the binary, divided into sections with 32 bits.
- a block you will use a block that implements the 64-bit encryption process using the process block.
- Example 1 is described as follows.
- Algorithm 1 32-bit block type
- This example explains the method of encrypting the information, 10 provided by the binary, divided into sections with 12 bits.
- the encryption function is designated as ⁇ ( ⁇ ), ⁇ . i.e., if you expand the block, it is converted to 15 ⁇ * - ⁇ ( ⁇ ), where "* -" means the transfer of assignment.
- Example 2 is described by the following algorithm.
- EXAMPLE 2 is explained in FIG. 3-5.
- block 1 provides binary information for 12-bit sections, block 2 is for genera- tive investigations.
- Figure 4 shows the structure of the data blocks. The scheme of the conversion is explained in FIG. 5, where the block denotes the encryption procedure in accordance with the method of operation. Example 3.
- the "SAL" code converts 1024-byte data blocks to the available data as a result of 32-bit data arrays.
- Group 3 512-byte probabilistic keycode.
- sew block ⁇ : C ⁇ ( ⁇ ), where ⁇ means the encryption function defined by
- the method of converting blocks of digital data from technology is implemented and implemented to solve the posed problem.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Communication Control (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Optical Recording Or Reproduction (AREA)
- Computer And Data Communications (AREA)
- Reverberation, Karaoke And Other Acoustics (AREA)
Description
Claims
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/194,748 US6463150B1 (en) | 1997-04-02 | 1997-12-12 | Encryption device for information in binary code |
EP97954002A EP0907269B1 (en) | 1997-04-02 | 1997-12-24 | Encryption device for information in binary code |
UA98127023A UA41481C2 (ru) | 1997-04-02 | 1997-12-24 | Способ шифрования информации, представленной бинарным кодом |
JP10541517A JP2000511755A (ja) | 1997-04-02 | 1997-12-24 | バイナリーコード情報を暗号化する方法 |
PL97332675A PL188578B1 (pl) | 1997-04-02 | 1997-12-24 | Sposób szyfrowania informacji zakodowanych binarnie |
AT97954002T ATE268080T1 (de) | 1997-04-02 | 1997-12-24 | Verschlüsselungsvorrichtung für binärkodierte nachrichten |
DE69729297T DE69729297T2 (de) | 1997-04-02 | 1997-12-24 | Verschlüsselungsvorrichtung für binärkodierte nachrichten |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
RU97104754A RU2103829C1 (ru) | 1997-04-02 | 1997-04-02 | Способ шифрования информации, представленной двоичным кодом |
RU97104754 | 1997-04-02 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1998044678A1 true WO1998044678A1 (fr) | 1998-10-08 |
Family
ID=20191234
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/RU1997/000419 WO1998044678A1 (fr) | 1997-04-02 | 1997-12-24 | Dispositif de chiffrage d'information presentee en code binaire |
Country Status (10)
Country | Link |
---|---|
US (1) | US6463150B1 (ru) |
EP (1) | EP0907269B1 (ru) |
JP (1) | JP2000511755A (ru) |
CN (1) | CN1241352C (ru) |
AT (1) | ATE268080T1 (ru) |
DE (1) | DE69729297T2 (ru) |
PL (1) | PL188578B1 (ru) |
RU (1) | RU2103829C1 (ru) |
UA (1) | UA41481C2 (ru) |
WO (1) | WO1998044678A1 (ru) |
Families Citing this family (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2345229B (en) * | 1998-12-23 | 2003-12-03 | Motorola Ltd | Method for encrypting data |
GB2374260B (en) * | 2001-10-12 | 2003-08-13 | F Secure Oyj | Data encryption |
JP2003162986A (ja) * | 2001-11-27 | 2003-06-06 | Sanyo Electric Co Ltd | Id発生装置及びid確認装置 |
US7346160B2 (en) * | 2003-04-23 | 2008-03-18 | Michaelsen David L | Randomization-based encryption apparatus and method |
JP2005012663A (ja) * | 2003-06-20 | 2005-01-13 | Sanyo Electric Co Ltd | 認証システム及びid発生装置 |
US20050044388A1 (en) * | 2003-08-19 | 2005-02-24 | Brant Gary E. | Reprise encryption system for digital data |
JP2005073053A (ja) * | 2003-08-26 | 2005-03-17 | Sanyo Electric Co Ltd | Id確認装置、id発生装置及び認証システム |
JP2005072355A (ja) * | 2003-08-26 | 2005-03-17 | Sanyo Electric Co Ltd | 半導体装置及びid発生装置 |
US7643633B2 (en) * | 2005-05-06 | 2010-01-05 | Research In Motion Limited | Adding randomness internally to a wireless mobile communication device |
DE602005025891D1 (de) * | 2005-11-08 | 2011-02-24 | Irdeto Access Bv | Verfahren zur Ver- und Entwürfelung von Daten |
CN101072099B (zh) * | 2007-06-22 | 2010-06-16 | 苏盛辉 | 一种基于非均匀超递增序列的公钥加密方法 |
RU2459275C1 (ru) * | 2011-08-02 | 2012-08-20 | Николай Андреевич Молдовян | Способ блочного шифрования сообщения м, представленного в двоичном виде |
RU2581772C2 (ru) * | 2014-09-15 | 2016-04-20 | Федеральное государственное казенное военное образовательное учреждение высшего профессионального образования "Военная академия Ракетных войск стратегического назначения имени Петра Великого" Министерства обороны Российской Федерациии | Способ шифрования информации, представленной двоичным кодом |
RU2623894C1 (ru) * | 2016-10-17 | 2017-06-29 | Российская Федерация, от имени которой выступает Государственная корпорация по атомной энергии "Росатом" | Способ преобразования данных с равновероятностной инициализацией |
EP3618344B8 (en) * | 2017-06-27 | 2022-05-25 | Mitsubishi Electric Corporation | Code generation apparatus, code generation method and code generation program |
CN109218013A (zh) * | 2018-10-10 | 2019-01-15 | 青岛科技大学 | 掩盖明文符号边界的二进制数据通信加密法 |
CN115189878B (zh) * | 2022-09-08 | 2022-12-23 | 蓝象智联(杭州)科技有限公司 | 一种基于秘密分享的共享数据排序方法及电子设备 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2410921A1 (fr) * | 1977-11-30 | 1979-06-29 | Telecommunications Sa | Systeme de brouillage et de debrouillage de signaux numeriques |
US5168521A (en) * | 1989-07-25 | 1992-12-01 | U.S. Philips Corp. | Method of executing an irregular permutation of data protected by encryption |
US5479513A (en) * | 1994-11-18 | 1995-12-26 | Martin Marietta Energy Systems, Inc. | Fast and secure encryption-decryption method based on chaotic dynamics |
RU2072635C1 (ru) * | 1993-04-01 | 1997-01-27 | Михаил Калистович Жемчугов | Устройство кодирования цифровой информации |
RU2077113C1 (ru) * | 1995-04-19 | 1997-04-10 | Военная академия связи | Способ криптозащиты системы телекоммуникационных технологий |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
NL126876C (ru) * | 1964-07-31 | |||
CH559483A5 (ru) * | 1973-06-12 | 1975-02-28 | Patelhold Patentverwertung | |
DE2658065A1 (de) * | 1976-12-22 | 1978-07-06 | Ibm Deutschland | Maschinelles chiffrieren und dechiffrieren |
US5003596A (en) | 1989-08-17 | 1991-03-26 | Cryptech, Inc. | Method of cryptographically transforming electronic digital data from one form to another |
US5142578A (en) * | 1991-08-22 | 1992-08-25 | International Business Machines Corporation | Hybrid public key algorithm/data encryption algorithm key distribution method based on control vectors |
GB2288519A (en) * | 1994-04-05 | 1995-10-18 | Ibm | Data encryption |
US5778074A (en) * | 1995-06-29 | 1998-07-07 | Teledyne Industries, Inc. | Methods for generating variable S-boxes from arbitrary keys of arbitrary length including methods which allow rapid key changes |
WO1997044935A1 (en) * | 1996-05-20 | 1997-11-27 | Philips Electronics N.V. | Cryptographic method and apparatus for non-linearly merging a data block and a key |
-
1997
- 1997-04-02 RU RU97104754A patent/RU2103829C1/ru active
- 1997-12-12 US US09/194,748 patent/US6463150B1/en not_active Expired - Fee Related
- 1997-12-24 WO PCT/RU1997/000419 patent/WO1998044678A1/ru active IP Right Grant
- 1997-12-24 JP JP10541517A patent/JP2000511755A/ja not_active Ceased
- 1997-12-24 PL PL97332675A patent/PL188578B1/pl not_active IP Right Cessation
- 1997-12-24 DE DE69729297T patent/DE69729297T2/de not_active Expired - Fee Related
- 1997-12-24 CN CNB971965285A patent/CN1241352C/zh not_active Expired - Fee Related
- 1997-12-24 EP EP97954002A patent/EP0907269B1/en not_active Expired - Lifetime
- 1997-12-24 UA UA98127023A patent/UA41481C2/ru unknown
- 1997-12-24 AT AT97954002T patent/ATE268080T1/de not_active IP Right Cessation
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2410921A1 (fr) * | 1977-11-30 | 1979-06-29 | Telecommunications Sa | Systeme de brouillage et de debrouillage de signaux numeriques |
US5168521A (en) * | 1989-07-25 | 1992-12-01 | U.S. Philips Corp. | Method of executing an irregular permutation of data protected by encryption |
RU2072635C1 (ru) * | 1993-04-01 | 1997-01-27 | Михаил Калистович Жемчугов | Устройство кодирования цифровой информации |
US5479513A (en) * | 1994-11-18 | 1995-12-26 | Martin Marietta Energy Systems, Inc. | Fast and secure encryption-decryption method based on chaotic dynamics |
RU2077113C1 (ru) * | 1995-04-19 | 1997-04-10 | Военная академия связи | Способ криптозащиты системы телекоммуникационных технологий |
Also Published As
Publication number | Publication date |
---|---|
EP0907269B1 (en) | 2004-05-26 |
US6463150B1 (en) | 2002-10-08 |
PL188578B1 (pl) | 2005-02-28 |
UA41481C2 (ru) | 2001-09-17 |
CN1241352C (zh) | 2006-02-08 |
PL332675A1 (en) | 1999-09-27 |
EP0907269A1 (en) | 1999-04-07 |
ATE268080T1 (de) | 2004-06-15 |
DE69729297T2 (de) | 2005-06-09 |
JP2000511755A (ja) | 2000-09-05 |
RU2103829C1 (ru) | 1998-01-27 |
EP0907269A4 (en) | 2000-11-02 |
CN1244321A (zh) | 2000-02-09 |
DE69729297D1 (de) | 2004-07-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Simmons | Symmetric and asymmetric encryption | |
WO1998044678A1 (fr) | Dispositif de chiffrage d'information presentee en code binaire | |
Pujari et al. | A hybridized model for image encryption through genetic algorithm and DNA sequence | |
US6078667A (en) | Generating unique and unpredictable values | |
US6314187B1 (en) | Method for encryption or decryption using finite group operations | |
GB2204975A (en) | Authenticator | |
KR970076418A (ko) | 기기간 통신의 안전성을 확보하는 암호화 장치 및 통신 시스템 | |
WO1998031122A1 (en) | A method and apparatus for generating secure hash functions | |
Kayarkar et al. | A survey on various data hiding techniques and their comparative analysis | |
RU2459276C1 (ru) | Способ шифрования сообщения м, представленного в виде многоразрядного двоичного числа | |
CN109218013A (zh) | 掩盖明文符号边界的二进制数据通信加密法 | |
WO1999044330A1 (fr) | Procede de cryptage en bloc de donnees discretes | |
RU2141729C1 (ru) | Способ криптографического преобразования блоков двоичных данных | |
CN114745105B (zh) | 一种融合量子漫步和改进aes的图像加密方法 | |
Nissar et al. | Implementation of security enhancement in AES by inducting dynamicity in AES s-box | |
Fujii et al. | Combinatorial bounds and design of broadcast authentication | |
Young et al. | Backdoor attacks on black-box ciphers exploiting low-entropy plaintexts | |
Simmons | Symmetric and asymmetric encryption | |
CN117544418B (zh) | 一种基于报文加解密实现不同终端互信的方法和系统 | |
RU2119260C1 (ru) | Способ шифрования двоичной информации | |
RU2027311C1 (ru) | Способ передачи и приема с обеспечением подлинности сообщения | |
Narayan et al. | Cryptography Protection of Digital Signals using Fibonacci-Pell Transformation via Golden Matrix | |
Simmons | 10. Symmetric and | |
RU2141728C1 (ru) | Способ шифрования информации, представленной в двоичном виде | |
Yang | LFSR-based Cryptographic Checksums for Secure Broadcasting |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 97196528.5 Country of ref document: CN |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): CN JP KR PL UA US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1019980709834 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1997954002 Country of ref document: EP |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWP | Wipo information: published in national office |
Ref document number: 1997954002 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 09194748 Country of ref document: US |
|
WWP | Wipo information: published in national office |
Ref document number: 1019980709834 Country of ref document: KR |
|
WWR | Wipo information: refused in national office |
Ref document number: 1019980709834 Country of ref document: KR |
|
WWG | Wipo information: grant in national office |
Ref document number: 1997954002 Country of ref document: EP |