WO2000001110A1 - Dispositifs generant des codes de chiffrement et de dechiffrement - Google Patents

Dispositifs generant des codes de chiffrement et de dechiffrement Download PDF

Info

Publication number
WO2000001110A1
WO2000001110A1 PCT/GB1999/002052 GB9902052W WO0001110A1 WO 2000001110 A1 WO2000001110 A1 WO 2000001110A1 GB 9902052 W GB9902052 W GB 9902052W WO 0001110 A1 WO0001110 A1 WO 0001110A1
Authority
WO
WIPO (PCT)
Prior art keywords
characters
primitives
session key
results
encrypt
Prior art date
Application number
PCT/GB1999/002052
Other languages
English (en)
Inventor
William Mcmullan Hawthorne
Original Assignee
Chantilley Corporation Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chantilley Corporation Limited filed Critical Chantilley Corporation Limited
Priority to JP2000557580A priority Critical patent/JP2002519940A/ja
Priority to EP99928133A priority patent/EP1099323A1/fr
Publication of WO2000001110A1 publication Critical patent/WO2000001110A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms

Definitions

  • the present invention relates to apparatus arranged to encrypt messages or decrypt messages, particularly to communications apparatus arranged to encrypt messages prior to transmission and decrypt received messages. It is known to provide communications apparatus (for example facsimile machines) with the ability to encrypt messages prior to transmission and decrypt received messages. However, each such apparatus operates with a cypher of a predetermined, fixed cryptographic strength: two apparatus can only communicate with each other if they both use cyphers of the same strength. There are many circumstances in which this limits the ability for communications to be established.
  • an apparatus which is arranged to encrypt or decrypt messages, the apparatus being arranged to generate a session key of a variable selected number of characters and to distribute the characters of said session key in sequence into a predetermined number of groups to form a corresponding predetermined number of primitives, and further arranged to use said primitives, in accordance with a predetermined algorithm, to form a cypher key stream the characters of which are used in sequence to encrypt or decrypt successive characters (or other elements) of a message.
  • the length (i.e. the number of characters) of the session key can be selected: the longer the session key, the greater will be the strength of the cypher.
  • the session key is preferably randomly generated.
  • the characters (typically numerical characters) of the session key are distributed into the predetermined number of groups in a manner forming a corresponding set of multi-digit numbers.
  • the first term allocated to each group may form the first digit of a multi-digit number
  • the second term allocated to that group forms the second digit of the multi-digit number
  • these multi-digit numbers are processed further in order to produce the corresponding set of primitives, used to form the cypher key stream.
  • predetermined values are then added to the respective results of the XOR process, to form a corresponding set of primitives.
  • different values are added to the different results of the XOR process: preferably these different values are different multiples of a basic value. For example, 100 may be added to the first XOR result, 200 to the second, and so on.
  • FIGURE 1 is a schematic block diagram showing part of the electronic system of communications apparatus in accordance with the present invention.
  • FIGURE 2 is a table showing the formation of six different groups of primitives from six session keys of different lengths.
  • a communications apparatus e.g. a facsimile machine
  • means 10 for encrypting a plain message M prior to transmission via a port 12.
  • the microprocessor 10 is provided with a program memory 14 which stores an encryption algorithm and also an algorithm for forming a group of primitives from a session key.
  • the microprocessor is able to generate a session key on a random basis, of selected length.
  • the microprocessor is also arranged to correspondingly decrypt messages received via the port 12.
  • Figure 2 shows six different examples, in which session keys of 56,48,40,32,18 and 12 decimal digits (186,159,133,106,60 and 40 binary bits) are generated.
  • the microprocessor distributes its digits, one- af er-another , into 14 groups, in the same manner as dealing a pack of cards out to the players of a card game.
  • the first 14 digits (44490925319354) form the first digits of respective 4-digit numbers: continuing, the next 14 digits of the session key (89500321347811) form the second digits of the respective 4- digit numbers, the next 14 digits of the session key (67111248217917) form the third digits of the respective 4- digit numbers and the final 14 digits of the session key (36922366044359) form the fourth (and final) digits of the respective 4-digit numbers.
  • the microprocessor 10 combines successive pairs of the 14 numbers in an XOR (exclusive OR) procedure: in each of the examples shown in Figure 2, the second line gives the corresponding results.
  • each number in the first line is combined with the XOR result of the proceeding number, in a process which involves an XOR function or their binary equivalents.
  • the microprocessor 10 adds a multiple of 100 to each of the 14 results formed by the XOR procedure.
  • 100 is added: to the second result, 200 is added; to the third result, 300 is added, and so on up to the seventh result, to which 700 is added.
  • 100 is added: to the ninth result, 200 is added, and so on up to the fourteenth result, to which 700 is added.
  • the final results (last line in each of the 6 examples set out in Figure 2) provide a set of 14 primitives.
  • the 14 primitives thus produced are used by the microprocessor, in accordance with the encryption algorithm, to form a cypher key stream comprising a long stream of digits. Then, in order to encrypt a plain message, the digits of this stream are taken one-after-another, and used in accordance with an encryption algorithm to encrypt respective, successive elements (e.g. characters or groups of characters) of the message to be transmitted. Similarly, in order to decrypt a received message, the digits of the cypher key stream are taken one-after-another and used, in accordance with a decryption algorithm (being the inverse of the encryption algorithm) to decrypt respective, successive elements of the received message.
  • a decryption algorithm being the inverse of the encryption algorithm

Abstract

Dispositif de chiffrement et de déchiffrement de messages conçu pour générer un code de session comportant un nombre variable sélectionné de caractères et pour distribuer ces caractères à la suite en un nombre prédéterminé de groupes afin de constituer un nombre correspondant de primitives. On utilise ces primitives, en fonction d'un algorithme prédéterminé, afin de créer un flot de codes chiffrés dont on met en application les caractères afin de chiffrer ou de déchiffrer des caractères ou des éléments successifs d'un message.
PCT/GB1999/002052 1998-06-30 1999-06-30 Dispositifs generant des codes de chiffrement et de dechiffrement WO2000001110A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
JP2000557580A JP2002519940A (ja) 1998-06-30 1999-06-30 暗号化および暗号解読キー構成のための装置
EP99928133A EP1099323A1 (fr) 1998-06-30 1999-06-30 Dispositifs generant des codes de chiffrement et de dechiffrement

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB9814003.1 1998-06-30
GB9814003A GB2339121B (en) 1998-06-30 1998-06-30 Encryption and decryption key arrangements

Publications (1)

Publication Number Publication Date
WO2000001110A1 true WO2000001110A1 (fr) 2000-01-06

Family

ID=10834577

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB1999/002052 WO2000001110A1 (fr) 1998-06-30 1999-06-30 Dispositifs generant des codes de chiffrement et de dechiffrement

Country Status (4)

Country Link
EP (1) EP1099323A1 (fr)
JP (1) JP2002519940A (fr)
GB (1) GB2339121B (fr)
WO (1) WO2000001110A1 (fr)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1995026087A1 (fr) * 1994-03-23 1995-09-28 Chantilley Corporation Limited Dispositif servant a generer des tables de chiffrement/dechiffrement au moyen d'un code de session
FR2732531A1 (fr) * 1995-03-30 1996-10-04 Sanyo Electric Co Procede de cryptage et/ou de decryptage de donnees de sous-porteuse modulee en frequence
US5594795A (en) * 1994-07-05 1997-01-14 Ericsson Inc. Method and apparatus for key transforms to discriminate between different networks
WO1998019420A1 (fr) * 1996-10-25 1998-05-07 Intel Corporation Circuit et procede assurant une securite d'interconnexion avec un boitier de microcircuit a plusieurs puces
US5768381A (en) * 1993-09-14 1998-06-16 Chantilley Corporation Limited Apparatus for key distribution in an encryption system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5425103A (en) * 1994-03-14 1995-06-13 Shaw; William Y. Variable-key cryptography system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5768381A (en) * 1993-09-14 1998-06-16 Chantilley Corporation Limited Apparatus for key distribution in an encryption system
WO1995026087A1 (fr) * 1994-03-23 1995-09-28 Chantilley Corporation Limited Dispositif servant a generer des tables de chiffrement/dechiffrement au moyen d'un code de session
US5594795A (en) * 1994-07-05 1997-01-14 Ericsson Inc. Method and apparatus for key transforms to discriminate between different networks
FR2732531A1 (fr) * 1995-03-30 1996-10-04 Sanyo Electric Co Procede de cryptage et/ou de decryptage de donnees de sous-porteuse modulee en frequence
WO1998019420A1 (fr) * 1996-10-25 1998-05-07 Intel Corporation Circuit et procede assurant une securite d'interconnexion avec un boitier de microcircuit a plusieurs puces

Also Published As

Publication number Publication date
EP1099323A1 (fr) 2001-05-16
GB9814003D0 (en) 1998-08-26
JP2002519940A (ja) 2002-07-02
GB2339121A (en) 2000-01-12
GB2339121B (en) 2003-03-05

Similar Documents

Publication Publication Date Title
US5222139A (en) Cryptographic method and apparatus
US5351299A (en) Apparatus and method for data encryption with block selection keys and data encryption keys
US7254232B2 (en) Method and system for selecting encryption keys from a plurality of encryption keys
JP2628660B2 (ja) 暗号化/復号方法および装置
AU706247B2 (en) Cryptographic system with concealed work factor
KR19990087103A (ko) 암호키 공유방법
WO1994016509A1 (fr) Procede et appareil pour generer une suite de donnees chiffree
US6640303B1 (en) System and method for encryption using transparent keys
Gautam et al. An enhanced cipher technique using vigenere and modified caesar cipher
US20020159588A1 (en) Cryptography with unconditional security for the internet, commercial intranets, and data storage
CN109344627B (zh) 一种新型香农完美保密方法
Bhat et al. A novel approach to information security using four dimensional (4d) playfair cipher fused with linear feedback shift register
CN1820449B (zh) 通过一种通讯网络进行数据加密传输的方法
US7184546B2 (en) Method based on an algorithm capable of being graphically implemented to be used for the generation of filtering of data sequences and crytographic applications
Kwan The design of the ICE encryption algorithm
WO2001091368A2 (fr) Systeme de cryptage base sur des quasigroupes inverses croises
WO2000001110A1 (fr) Dispositifs generant des codes de chiffrement et de dechiffrement
Chunguang et al. Permutation of image encryption system based on block cipher and stream cipher encryption algorithm
Kresmer et al. CCM-SIV: Single-PRF Nonce-Misuse-Resistant Authenticated Encryption
US20200351079A1 (en) Computer-implemented method of replacing a data string
JPH10303881A (ja) 暗号化復号化装置および方法
CN117725605B (zh) 一种远端自动编制电子档案文件信息保密的方法和系统
Khorsheed A Compartive Study Between (AES) and (DES) Algorithms Based on the (SET) Protocol
Rubin The cryptographic uses of post tag systems
Hattab et al. Developing the Complexity and Security of the Twofish Algorithm Through a New Key Scheduling Design

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): JP US

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
WWE Wipo information: entry into national phase

Ref document number: 1999928133

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 09720636

Country of ref document: US

WWP Wipo information: published in national office

Ref document number: 1999928133

Country of ref document: EP

WWW Wipo information: withdrawn in national office

Ref document number: 1999928133

Country of ref document: EP