WO1999036942A1 - Procede de conversion cryptographique de blocs de donnees binaires - Google Patents
Procede de conversion cryptographique de blocs de donnees binaires Download PDFInfo
- Publication number
- WO1999036942A1 WO1999036942A1 PCT/RU1998/000182 RU9800182W WO9936942A1 WO 1999036942 A1 WO1999036942 A1 WO 1999036942A1 RU 9800182 W RU9800182 W RU 9800182W WO 9936942 A1 WO9936942 A1 WO 9936942A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- sub
- block
- value
- bits
- unit
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0625—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/24—Key scheduling, i.e. generating round keys or sub-keys for block encryption
Definitions
- -Secret key is a binary information known only to a foreign user
- the code may be implemented as a software for it or as a separate device;
- -binary vector - this is a certain sequence of zero and single bits, for example 101101011;
- the binary 0 structure of the binary vector may be interpreted as a binary number, if you take into account the the binary can have a numerical value, which is a single-valued binary;
- 5-analysis - a method of calculating a network key for receiving an unauthorized access to an uninterrupted information or processing a process;
- the method of incorporation includes the formation of a network key in the form of a combination of 0 keys, the separation of the input unit, and the In order to complete the operations, they are carried out by performing on them local and two-place operations.
- This method ensures a high speed of encryption and implementation in the form of a program for electronic devices or in the form of electronic devices.
- the method has a disadvantage, and it is not by name that it does not provide a high speed of two-way data sharing.
- FIG. 1 The general scheme of the process is provided according to the claimed method. 0 ⁇ a ⁇ ig. 2 FACILITY OF DELIVERED CONSTRUCTION UNITS CONSISTENTLY.
- the unit has been supplied with the installed partitions with 32-bit input.
- V is a binary vector, which is formatted depending on the input data; the ® symbol means the operation of a single summation, I mean two; the sign is the operation of the summation of the module ⁇ , where ⁇ is the length of the data unit in bits.
- Bold, good lines mean a bus for transmitting ⁇ -bi-tones, thin staple lines - a transmitter for a single bit, and a carrier for a good transmitter.
- bits of keys or bits of the double vectors are used.
- the use of key drivers in the quality of the control signals ensures the protection of the compressed components of the server for the protection of the part of the server.
- ⁇ ig. 1 shows a single round of transformations. ⁇ Dependent on the implementation of the unit, the corrected partitions and the required speed of the process can be charged.
- 15 unit V signals are supplied, which are formed depending on the values of the converting steps at the inter- nal steps.
- one day and the same four ⁇ -bit keys ⁇ 4 , ⁇ 3 , ⁇ 2 and ⁇ ⁇ may be used to perform the encryption process.
- the length of the network key is 128 bits.
- P ⁇ i is ⁇ lz ⁇ vanii se ⁇ e ⁇ n ⁇ g ⁇ ⁇ lyucha b ⁇ lsheg ⁇ ⁇ azme ⁇ a in ⁇ azhd ⁇ m ⁇ aunde m ⁇ gu ⁇ is ⁇ lz ⁇ va ⁇ sya che ⁇ y ⁇ e nezavisimy ⁇ ⁇ d ⁇ lyucha ⁇ 4g, I ⁇ g - ⁇ at 4d and ⁇ _ 2 _ 3 4d.
- ⁇ a ⁇ ime ⁇ , ⁇ i including ⁇ aund ⁇ v g 3 5 ⁇ e ⁇ v ⁇ m ⁇ aunde is ⁇ lzuyu ⁇ sya ⁇ d ⁇ lyuchi ⁇ 4, ⁇ 3, ⁇ 2 and ⁇ ⁇ , v ⁇ v ⁇ m ⁇ aunde - ⁇ d ⁇ lyuchi ⁇ 8, ⁇ 7, ⁇ 6 and ⁇ 5 in ⁇ aunde ⁇ e ⁇ em - ⁇ d ⁇ lyuchi ⁇ 12 , ⁇ , ⁇ 10 and ⁇ 9 .
- This example is for using a method for encrypting data.
- the secret key is presented in the form of a couple of other keys ⁇ 4g , ⁇ ⁇ - .. ⁇ , ⁇ 4g _ 2 and ⁇ 4g _ 3 .
- a single encryption round 5 is described by the following investigation procedure: ⁇ / ⁇ 8 / 00182
- ⁇ ig. 3 shows the structure of the unit to be controlled with 32-bit input for data and 79-bit input.
- the external inputs of the unit are designated as partitions 5 11, 12, ..., 132, the external outputs are indicated ⁇ , ⁇ 2, ..., 32 ⁇ ⁇ 99/36942 ⁇ / ⁇ 8 / 00182
- the elementary switches 3 are connected in such a way that they form a matrix consisting of 31 lines. In the first line 31 elements of the 3 switches are connected, the second in the line - 30, in the third - 29 and ⁇ . e. In each next line, the number of circuit breakers is reduced by 1. Consequently ⁇ steering ⁇ the lowest 31st line is connected to 1 elementary switch.
- the line with a number ⁇ ⁇ 3 has 33-3 inputs, three-way output and 32-type input.
- the last (most direct) output of the 0th power supply is the external output of the control unit, the 32-connected 3-way output is connected to the mains (+).
- a single control signal is given, which is connected to the external output of the control unit, which complies with this circuit. If a single control signal is sent to the leftmost elementary switch, then with the external output of the control unit being switched (block ⁇ ), the leftmost input is switched.
- the first circuit is connected to one of the external inputs 11, 12, ..., 132 of the block yogurtsammlungttle ⁇ configelle with an external output, and the remaining 31 external inputs - with inputs of the second circuit.
- the short circuit is connected to one of the remaining 31 external inputs with an external output ⁇ 2, and the remaining 30 external inputs - with inputs of a third circuit, etc.
- the unit is designed to provide a unique distribution of input bits for each value of the binary for the 79-bit version.
- the following version is for use with a 79-bit input in the form of a proprietary converter shown in FIG. 1.
- 32 bits are used, for example, a fault unit and 47 bits of a secret key.
- ⁇ is used for example, for example, 32 bits of the key ⁇ 4g _ ⁇ and 15 bits of the key ⁇ 4g _ 2 may be used .
- each modi fi cation of this operating system includes 2 32 different operating systems of the transmitters, which have been selected so that the value is chosen.
- ⁇ ig. 4 explains the operation of the element of the switch, where and is the amplifying signal, and b are the input signals of the data, c and illerterrorism are the output signals of the data.
- P ⁇ myshlennaya ⁇ imenim ⁇ s ⁇ 0 claimed s ⁇ s ⁇ b m ⁇ zhe ⁇ by ⁇ ⁇ ealiz ⁇ van, na ⁇ ime ⁇ in s ⁇ etsializi ⁇ vanny ⁇ ⁇ i ⁇ g ⁇ a ⁇ iches ⁇ i ⁇ mi ⁇ tsess ⁇ a ⁇ , ⁇ bes ⁇ echivayuschi ⁇ s ⁇ s ⁇ shi ⁇ vaniya ⁇ yad ⁇ a Gbi ⁇ 1 / s, for d ⁇ s- ⁇ a ⁇ chnuyu shi ⁇ vaniya in massh ⁇ abe ⁇ ealn ⁇ g ⁇ v ⁇ emeni dan- ny ⁇ , ⁇ e ⁇ edavaemy ⁇ ⁇ s ⁇ s ⁇ nym ⁇ v ⁇ l ⁇ nnym ⁇ analam 5 bond.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Radar Systems Or Details Thereof (AREA)
- Design And Manufacture Of Integrated Circuits (AREA)
- Compression, Expansion, Code Conversion, And Decoders (AREA)
- Near-Field Transmission Systems (AREA)
Description
Claims
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE69837449T DE69837449D1 (de) | 1998-01-19 | 1998-06-19 | Verfahren zur kryptographischen umwandlung von binären datenblöcken |
EP98935436A EP1087425B1 (en) | 1998-01-19 | 1998-06-19 | Method for the cryptographic conversion of binary data blocks |
SK1038-2000A SK286323B6 (en) | 1998-01-19 | 1998-06-19 | Method for the cryptographic conversion of binary data blocks |
UA2000084934A UA49102C2 (ru) | 1998-01-19 | 1998-06-19 | Способ криптографического преобразования блоков двоичных данных |
JP2000540561A JP2002510058A (ja) | 1998-01-19 | 1998-06-19 | 2進データ・ブロックの暗号変換のための方法 |
SI9820084A SI20349A (sl) | 1998-01-19 | 1998-06-19 | Postopek kriptografske pretvorbe binarnih podatkovnih blokov |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
RU98100685A RU2141729C1 (ru) | 1998-01-19 | 1998-01-19 | Способ криптографического преобразования блоков двоичных данных |
RU98100685 | 1998-01-19 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1999036942A1 true WO1999036942A1 (fr) | 1999-07-22 |
Family
ID=20201205
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/RU1998/000182 WO1999036942A1 (fr) | 1998-01-19 | 1998-06-19 | Procede de conversion cryptographique de blocs de donnees binaires |
Country Status (15)
Country | Link |
---|---|
US (1) | US20050169471A1 (ru) |
EP (1) | EP1087425B1 (ru) |
JP (1) | JP2002510058A (ru) |
KR (1) | KR100411684B1 (ru) |
CN (1) | CN100393026C (ru) |
AT (1) | ATE358369T1 (ru) |
CZ (1) | CZ296186B6 (ru) |
DE (1) | DE69837449D1 (ru) |
ES (1) | ES2287978T3 (ru) |
PL (1) | PL342036A1 (ru) |
RU (1) | RU2141729C1 (ru) |
SI (1) | SI20349A (ru) |
SK (1) | SK286323B6 (ru) |
UA (1) | UA49102C2 (ru) |
WO (1) | WO1999036942A1 (ru) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100403820B1 (ko) * | 2001-07-03 | 2003-10-30 | 삼성에스디에스 주식회사 | 암호화 처리장치 그 방법 |
US7577250B2 (en) | 2004-08-12 | 2009-08-18 | Cmla, Llc | Key derivation functions to enhance security |
US8077861B2 (en) | 2004-08-12 | 2011-12-13 | Cmla, Llc | Permutation data transform to enhance security |
KR100446336B1 (ko) * | 2003-05-20 | 2004-09-01 | 엔에이치엔(주) | 데이터 암호화 방법 및 장치 |
JP4820821B2 (ja) * | 2004-08-12 | 2011-11-24 | シー エム エル エー, リミテッド ライアビリティ カンパニー | セキュリティ強化のための転置データ変換 |
US20070061835A1 (en) * | 2005-08-05 | 2007-03-15 | Realnetworks, Inc. | System and method for registering users and devices |
CN104091129B (zh) * | 2014-06-26 | 2016-12-14 | 腾讯科技(深圳)有限公司 | 一种数据处理方法及装置 |
RU2734829C1 (ru) * | 2020-03-03 | 2020-10-23 | Российская Федерация, от имени которой выступает Государственная корпорация по атомной энергии "Росатом" (Госкорпорация "Росатом") | Способ криптографического преобразования данных |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0202989A1 (fr) * | 1985-05-15 | 1986-11-26 | Thomson-Csf | Dispositif de chiffrement par substitutions-permutations |
WO1988001119A1 (en) * | 1986-08-08 | 1988-02-11 | British Broadcasting Corporation | Data encipherment |
US5001754A (en) * | 1990-02-01 | 1991-03-19 | The Trustees Of Princeton University | Encryption system and method |
EP0676876A1 (en) * | 1994-04-05 | 1995-10-11 | International Business Machines Corporation | Encryption method and system |
RU2097931C1 (ru) * | 1995-01-12 | 1997-11-27 | Борис Владимирович Березин | Способ шифрования двоичной информации и устройство для его осуществления |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5696823A (en) * | 1995-03-31 | 1997-12-09 | Lucent Technologies Inc. | High-bandwidth encryption system with low-bandwidth cryptographic modules |
KR970005596A (ko) * | 1995-07-13 | 1997-02-19 | 전중호 | 합성수지 필름의 고주파융착방법 |
SE506619C2 (sv) * | 1995-09-27 | 1998-01-19 | Ericsson Telefon Ab L M | Metod för kryptering av information |
KR980007156A (ko) * | 1997-12-09 | 1998-03-30 | 임종인 | 비밀키 블록 암호화 및 복호화 방법 |
KR101937887B1 (ko) * | 2016-12-09 | 2019-01-14 | 한국생산기술연구원 | 아이소소바이드 유도체 화합물을 포함하는 치과용 충전재 조성물 |
-
1998
- 1998-01-19 RU RU98100685A patent/RU2141729C1/ru not_active IP Right Cessation
- 1998-06-19 PL PL98342036A patent/PL342036A1/xx not_active Application Discontinuation
- 1998-06-19 JP JP2000540561A patent/JP2002510058A/ja active Pending
- 1998-06-19 WO PCT/RU1998/000182 patent/WO1999036942A1/ru active IP Right Grant
- 1998-06-19 EP EP98935436A patent/EP1087425B1/en not_active Expired - Lifetime
- 1998-06-19 KR KR10-2000-7007667A patent/KR100411684B1/ko not_active IP Right Cessation
- 1998-06-19 CZ CZ20002653A patent/CZ296186B6/cs not_active IP Right Cessation
- 1998-06-19 AT AT98935436T patent/ATE358369T1/de not_active IP Right Cessation
- 1998-06-19 SI SI9820084A patent/SI20349A/sl not_active IP Right Cessation
- 1998-06-19 SK SK1038-2000A patent/SK286323B6/sk not_active IP Right Cessation
- 1998-06-19 DE DE69837449T patent/DE69837449D1/de not_active Expired - Lifetime
- 1998-06-19 CN CNB988131781A patent/CN100393026C/zh not_active Expired - Fee Related
- 1998-06-19 UA UA2000084934A patent/UA49102C2/ru unknown
- 1998-06-19 ES ES98935436T patent/ES2287978T3/es not_active Expired - Lifetime
-
2004
- 2004-12-03 US US11/002,972 patent/US20050169471A1/en not_active Abandoned
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0202989A1 (fr) * | 1985-05-15 | 1986-11-26 | Thomson-Csf | Dispositif de chiffrement par substitutions-permutations |
WO1988001119A1 (en) * | 1986-08-08 | 1988-02-11 | British Broadcasting Corporation | Data encipherment |
US5001754A (en) * | 1990-02-01 | 1991-03-19 | The Trustees Of Princeton University | Encryption system and method |
EP0676876A1 (en) * | 1994-04-05 | 1995-10-11 | International Business Machines Corporation | Encryption method and system |
US5548648A (en) * | 1994-04-05 | 1996-08-20 | International Business Machines Corporation | Encryption method and system |
RU2097931C1 (ru) * | 1995-01-12 | 1997-11-27 | Борис Владимирович Березин | Способ шифрования двоичной информации и устройство для его осуществления |
Also Published As
Publication number | Publication date |
---|---|
CN100393026C (zh) | 2008-06-04 |
SK286323B6 (en) | 2008-07-07 |
KR20010034058A (ko) | 2001-04-25 |
CZ296186B6 (cs) | 2006-01-11 |
ATE358369T1 (de) | 2007-04-15 |
DE69837449D1 (de) | 2007-05-10 |
EP1087425A4 (en) | 2004-08-25 |
KR100411684B1 (ko) | 2003-12-18 |
PL342036A1 (en) | 2001-05-21 |
SK10382000A3 (sk) | 2001-09-11 |
RU2141729C1 (ru) | 1999-11-20 |
SI20349A (sl) | 2001-02-28 |
ES2287978T3 (es) | 2007-12-16 |
EP1087425B1 (en) | 2007-03-28 |
JP2002510058A (ja) | 2002-04-02 |
CZ20002653A3 (cs) | 2001-03-14 |
US20050169471A1 (en) | 2005-08-04 |
EP1087425A1 (en) | 2001-03-28 |
CN1286855A (zh) | 2001-03-07 |
UA49102C2 (ru) | 2002-09-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2449662C (en) | Block encryption device using auxiliary conversion | |
CA2218148C (en) | Generating unique and unpredictable values | |
RU2383934C2 (ru) | Устройство криптографической обработки, способ криптографической обработки | |
EP2772001B1 (en) | Dynamic encryption method | |
JP2009116348A (ja) | データの非相関化方法 | |
EP1975779B1 (en) | Encryption device using a pseudorandom number generator | |
WO1998044678A1 (fr) | Dispositif de chiffrage d'information presentee en code binaire | |
Matsui et al. | Cryptanalysis of a Reduced Version of the Block Cipher E 2 | |
WO1999036942A1 (fr) | Procede de conversion cryptographique de blocs de donnees binaires | |
WO1999044330A1 (fr) | Procede de cryptage en bloc de donnees discretes | |
JPH0527291B2 (ru) | ||
Rais et al. | Efficient hardware realization of advanced encryption standard algorithm using Virtex-5 FPGA | |
US20030174835A1 (en) | Data encryption device, data decryption device, and data encryption/decryption device | |
JPH10164028A (ja) | データ通信方法 | |
KR20190037980A (ko) | 퍼베이시브 컴퓨팅을 위한 효과적인 초경량 블록 암호 시스템 | |
CA2141997C (en) | Public-key cryptographic apparatus handling ciphertext by public-key | |
Mihaljevic et al. | On wireless communications privacy and security evaluation of encryption techniques | |
Franklin et al. | Joint encryption and message-efficient secure computation | |
JP2864813B2 (ja) | 暗号化装置及び復号化装置 | |
Han et al. | Unbalanced biclique cryptanalysis of a full round Midori | |
US20050074118A1 (en) | Secure communication | |
JPS60164787A (ja) | 転置暗号方式 | |
KR20010032479A (ko) | 디지털 데이터의 엘-비트 입력 블록들을 엘-비트 출력비트들로 암호 변환하는 방법 | |
JP2734047B2 (ja) | データスクランブル装置 | |
RU2106753C1 (ru) | Способ криптографического преобразования блоков данных |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 98813178.1 Country of ref document: CN |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): CN CZ JP KR PL SI SK UA US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 10382000 Country of ref document: SK |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020007007667 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 09582206 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: PV2000-2653 Country of ref document: CZ |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1998935436 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: PV2000-2653 Country of ref document: CZ |
|
WWP | Wipo information: published in national office |
Ref document number: 1998935436 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 1020007007667 Country of ref document: KR |
|
WWG | Wipo information: grant in national office |
Ref document number: 1020007007667 Country of ref document: KR |
|
WWG | Wipo information: grant in national office |
Ref document number: PV2000-2653 Country of ref document: CZ |
|
WWG | Wipo information: grant in national office |
Ref document number: 1998935436 Country of ref document: EP |