WO2000013162A1 - Chiffrement au moyen de fichier a pages multiples modifiable par l'utilisateur - Google Patents

Chiffrement au moyen de fichier a pages multiples modifiable par l'utilisateur Download PDF

Info

Publication number
WO2000013162A1
WO2000013162A1 PCT/AU1999/000611 AU9900611W WO0013162A1 WO 2000013162 A1 WO2000013162 A1 WO 2000013162A1 AU 9900611 W AU9900611 W AU 9900611W WO 0013162 A1 WO0013162 A1 WO 0013162A1
Authority
WO
WIPO (PCT)
Prior art keywords
page
file
encryption
encrypt
bakthi
Prior art date
Application number
PCT/AU1999/000611
Other languages
English (en)
Inventor
Peter William Ross
Original Assignee
Peter William Ross
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Peter William Ross filed Critical Peter William Ross
Priority to AU50209/99A priority Critical patent/AU738210B2/en
Priority to US09/529,761 priority patent/US6820198B1/en
Publication of WO2000013162A1 publication Critical patent/WO2000013162A1/fr

Links

Classifications

    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C1/00Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
    • G09C1/04Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system with sign carriers or indicators moved relative to one another to positions determined by a permutation code, or key, so as to indicate the appropriate corresponding clear or ciphered text
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
    • H04L9/0662Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator

Definitions

  • This invention is part of an existing unpublished new Computer Program Bakthi Encrypt V 1.00 independently created by the applicant and inventor Peter William ROSS on his own behalf during July 1997 to August 1998.
  • the technical field of this invention is general purpose Encryption / Decryption Computer Programs.
  • Novel methods applied to a large data file forming part of an Encryption / Decryption Computer Program constitute the invention. These novel methods are :-
  • Pages 10 to 12 contain an Excerpt from BEInstallUninstall.txt , a Text File for the Program users.
  • Pages 12 to 23 contain an Excerpt from a Decrypted BEAK%%!!.hlp . the latter forming the Bakthi Analyst Kit, which explains HOW the Computer Program works by describing its Encryption / Decryption algorithms in great detail, including explanations with relevant source code.
  • Page 1/5 contains illustrations of the Standard Operations Form.
  • Pages 2/5 to 5/5 are illustrations of the Advanced Operations Form.
  • Pages 1/5 to 5/5 the 24 pages that are most relevant to the five Claims ( Pages 25, 26 ) of this Application for a Standard Patent are Pages :- 1 , 2, 3, 5, 6, 7, 8, 9, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24; 2/5, 3/5. 4/5, 5/5
  • the large user-editable file is variously identified as the Bakthi Encrypt Data File, the BED File . the .BED File . and MALA%%!!.BED . All these terms refer to the same entity.
  • the BED File is also described as being in either a Factory Default State or a Custom State. Note also that the large user-editable data file and the Encryption Key are distinct entities.
  • Bakthi Encrypt is a 32 bit Windows application designed to Encrypt, Decrypt, or Destroy local files of any type individually one after the other. It is composed of two forms :-
  • the Advanced Operations Form accessible only by selecting Bakthi Advanced... from the Choices menu of the Standard Operations Form, can be used to create a uniquely customised version of Bakthi Encrypt, in effect creating a private, secret Custom Program.
  • Unbreakable encryption in the practical sense, means cryptanalysts utilising enormous resources, for example, supercomputers with millions of fast parallel processors, and having a full knowledge of the encryption / decryption algorithm, will not be able to discover the plaintext of a practical document from the ciphertext alone, without knowledge of the secret Key. Both the present art and this author consider the well-known Vernam One Time Pad Cipher to be the only theoretically unbreakable cipher.) Basic manipulation of the Standard Operations Form is described below.
  • New F2 Makes the Standard Operations Form ready for new work. Resets the 90 digit Key to all zeroes. Does not change toggle selections, so if the Option Destroy File sub-menu or the Ignore Custom Settings sub-menu had a tick beside it. it retains that tick. Empties any pre-existing file list, but does not clear the copy of that file list left on the Clipboard. When Copy FileName is next clicked, both the empty file list and the full Clipboard change to a sole entry reflecting the currently selected file.
  • Option Destroy File F5 This is a toggle selection. Press F5 to place a tick beside the sub-menu item and change to destroy mode. Press F5 again to remove the tick and change back to encrypt mode. Presence of a tick indicates destroy mode. Absence of a tick, the default, indicates encrypt mode. Affects the file list and Clipboard in the same manner as New F2 .
  • Bakthi Advanced... Shows the Advanced Operations Form, used to create a uniquely customised, private, secret. Custom version of the Bakthi Encrypt Program.
  • Ignore Custom Settings Toggle selection. Select it to place a tick beside it and ignore a Custom .BED File (if any) by using an internal Original Data Source. Select it again to remove the tick and utilise a Custom .BED File (if any). Presence of a tick indicates .BED File custom settings (if any) are being ignored. Absence of a tick, the default, indicates .BED File custom settings (if any) are in effect. With a Factory Default .BED File, tick or no tick the program uses identical data. See Working Principles and Care of .BED File for .BED File information.
  • Exit F8 Closes the entire application and clears the Clipboard if written to.
  • ADVANCED OPERATIONS FORM This form, accessible only by selecting Bakthi Advanced... from the Choices menu of the
  • Standard Operations Form can be used to create a uniquely customised version of Bakthi Encrypt, in effect creating a private, secret Custom Program. Encryption which is almost certainly unbreakable can be achieved by making use of both the forms.
  • This form exists solely to manipulate the Bakthi Encrypt Data File MALA%%!!.BED , henceforth referred to as the .BED File, a 75,735 byte file containing 25.245 three digit numbers arranged in 99 pages of 255 numbers each.
  • Bakthi Encrypt V 1.00 ships with a Factory Default .BED File which is an exact copy of, and additional to, this Original Data Source. If the user has changed the .BED File and wishes to recreate the Factory Default .BED File, Factory 99 plus Save All 99 plus YES will create a new .BED File by copying the internal Original Data Source.
  • a private, secret Custom Program is created by writing a unique Custom .BED File.
  • Hide Hides the current page of 255 numbers behind asterisks.
  • Select Page Enables the Page Selector (Edit Box + associated UpDown arrows) on the upper right side of the application window.
  • a particular page may be selected either by directly editing the page number in the Edit Box or clicking one of the UpDown arrows to increment or decrement the page number one page at a time.
  • Lock Page Disables the Page Selector (Edit Box + associated UpDown arrows), and stores the currently selected page number in volatile memory (RAM).
  • Edit Values Positions the Insertion Point at the first digit of the first number.
  • the program allows only entries in the range 001 to 255 for each of the 255 numbers.
  • Auto Values Optional ease of use feature. Automatically generates a set of 255 almost completely unpredictable numbers for the current page.
  • Store Values First checks the current page of 255 numbers for duplicate values. If there are no duplicate values, stores the current page of 255 numbers in volatile memory (RAM). These numbers are inactive until saved by clicking Save All 99 then choosing Yes in answer to the Destruction of Old Settings Imminent Dialog Box.
  • Auto 99 Optional ease of use feature. Automatically generates 99 sets of 255 almost totally unpredictable numbers for all 99 pages at once and stores them all in volatile memory (RAM). These numbers are inactive until saved by clicking Save All 99 then choosing Yes in answer to the Destruction of Old Settings Imminent Dialog Box. For each page, Click Select Page, use the Page Selector to select the page, click Lock Page, click Edit Values, edit some of the numbers, then click Store Values. It is not mandatory to change some numbers on each page in this manner, but it is wise to do so as it ensures each page of 255 numbers is not entirely computer-generated.
  • VALUE 001-009 010-085 086-123 124-132 133-170 171-246 247-255 COLOR: Aqua Blue Green Lime Green Purple Red
  • MALA%%!.BED file created by copying to the hard disk the 25,245 values (99 pages, each of 255 numbers) just previously stored in volatile memory (RAM). Standard Operations then immediately reads the new MALA%%!.BED file, allowing these 25,245 values, some or all of them new. to take effect without delay. All 25,245 values may be viewed by clicking Show then clicking Select Page then using the Page Selector to view each page in turn. If the answer to the Dialog Box is NO, then the old MALA%%!.BED file is preserved and remains in effect. Clicking Save All 99 then answering NO to the Dialog Box is a handy, if slightly risky, way of setting the enabled / disabled state of every Command Button on the Advanced Operations Form back to its initial default state. CARE OF KEY, .BED
  • the Key is the most important aspect of Bakthi Encrypt V 1.00 security. All 90 digits of the Key are made use of. If a particular Key is used to Encrypt a file it will be impossible to Decrypt that file without access to that particular Key.
  • the Key must be kept SAFE, SECRET, and SECURE.
  • the Bakthi Encrypt V 1.00 application in its default state cannot Encrypt or Decrypt target files unless it finds the MALA%%!.BED file, so it is very important that this file and the executable file BakthiEncrypt.exe be kept in the same directory folder. Even for a Factory Default MALA%%!.BED file this rule applies.
  • Each Custom MALA%%!.BED file should be kept SAFE, SECRET, and SECURE.
  • a Factory Default MALA%%!!.BED should be kept SAFE and SECURE, but need not be kept Secret, being public. Use Factory 99 plus Save All 99 to recreate it.
  • Custom MALA%%!.BED files more frequently than annually is NOT wise.
  • a particular Custom MALA%%!.BED file should be changed after a security breach.
  • the user-defined 90 digit Key is the most important item. All 90 digits are made use of.
  • the Key used to encrypt a file must be kept secret. It must not be lost, because it will be needed to decrypt the file. Portions of the Key are used to generate a long series of unpredictable numbers, each within the range 1 to 99, for each character position in the file. Let kl k2 k3 k4 be the numbers generated for the first four positions in the file.
  • Data Sources Bakthi Encrypt V 1.00 has two data sources : the .BED File, and an internal Original Data Source written into the program itself. The Factory Default .BED file shipped with Bakthi Encrypt is identical to the internal Original Data Source.
  • the .BED File is the Data Source, otherwise the internal Original Data Source is used.
  • .BED File The Advanced Operations Form can create a Custom .BED File.
  • bl b2 b3 b4 be the ANSI codes at list positions tl t2 t3 t4 on pages kl k2 k3 k4 of the .BED File Data Source.
  • the first 4 plaintext characters (those with ANSI codes c l c2 c3 c4 ) become the encrypted characters corresponding to ANSI codes bl b2 b3 b4. Whole process is repeated ten-fold with new kl etc. Final character depends on Key, BED file Data Source, test file position, initial character.
  • Decrypt Reverse of Encrypt. Same kl k2 k3 k4 generated, tl t2 t3 t4 found by searching pages kl k2 k3 k4 for bl b2 b3 b4 .
  • Destroy Overwrites 17-25 times, the exact number of times being unpredictable. Uses a combination of 01010101 , 10101010 . random , 00000000 bit patterns.
  • Bakthi Encrypt V 1.00 is a 32-bit program which requires Windows 95 or Windows 98 or Windows NT V 4.0, or later, operating systems to run.
  • This program Encrypts, Decrypts, or Destroys files.
  • Bakthi Encrypt V 1.00 is able to Encrypt, Decrypt, or Destroy files of any type. It can manipulate video, graphic, sound, compressed, uncompressed, executable, database, spreadsheet, document, text, and all other file types, in any format.
  • An encrypted file of the .txt type can be viewed normally (as gobbledegook), but encrypted files of most other types will not even load in the file viewer or file player until Decrypted.
  • GENERAL SECURITY An encrypted file can be copied, moved, or distributed on networks, intranets, and internets just like a normal file, regardless of its type or format.
  • Ignore Custom Settings (Choices Menu, Standard Form) is a toggle selection.
  • Bakthi Encrypt will use the current .BED file, whether Custom or Factory Default, as its data source.
  • Bakthi Encrypt will use an internal Original Data Source written into the main executable as its data source. It is then possible to Encrypt and Decrypt target files without reading the .BED File. Even if MALA%%!!.BED is deleted it still remains possible to Encrypt and Decrypt target files when Ignore Custom Settings is ticked.
  • Bakthi Encrypt V 1.00 is still very powerful. It uses a 90 DIGIT Key, equating to 10 raised to the power of 90 possible keys. Compare this very strong encryption strength with some others: A 40 BIT Key equates to 10 raised to the power of 12.04 possible keys. A 128 BIT Key equates to 10 raised to the power of 38.53 possible keys.
  • the file BEAK%%!.hlp is distributed in Encrypted form on the Bakthi Encrypt distribution disk. Decryption of this file using Bakthi Encrypt will yield the Bakthi Analyst Kit, which provides information in Help file format.
  • the Bakthi Analyst Kit contains complete and truthful details of the Encryption and Decryption algorithms employed by Bakthi Encrypt V 1.00.
  • the 90 digit Key allowing BEAK%%!.hlp to be Decrypted using Bakthi Encrypt V 1.00 in a Factory Default state may be purchased at a cost 1.5 times the price of Bakthi Encrypt V 1.00 itself. Purchase of the Key also entitles the purchaser to take part in the Bakthi Encrypt Cryptanalyst Competition.
  • the competition uses the file BEHID%%!.txt . distributed in Encrypted form on the Bakthi Encrypt distribution disk. This is a file, originally of ordinary English text, which has been Encrypted using both a secret Key and a secret Custom BED File. To win the competition, a Bakthi Analyst Kit purchaser has to become the first person to do both the following :-
  • Bakthi Encrypt was broken and BEHID%%!.txt uncovered using cryptanalysis.
  • Bakthi Encrypt V 1.00 users who want full and honest details of the program's Encryption and Decryption algorithms can obtain them by purchasing a licence for the Bakthi Analyst Kit V 1.00 at a price 1 V. times the value of the Bakthi Encrypt V 1.00 licence itself. If the full details of Bakthi Encrypt V 1.00's Encryption / Decryption algorithms were published in this Description there would be less incentive for people to purchase a Bakthi Analyst Kit V 1.00 licence. For this reason, some details provided in the complete Bakthi Analyst Kit are not provided in this Excerpt created for Patent Application purposes. Patent Claims do not depend on the omitted details. The omitted details are :- (a) True Block Size.
  • Second Idea To make available to the users of the encryption application a special facility which enables them to safely edit the data file described in the previous paragraph. Each user could then have a different unique custom version of the data file. Each user's version of the encryption application could then be a uniquely customised version of the original, publicly distributed, standard encryption application. In effect, every user could have their own unique, private, secret Custom Encryption Program even though they initially received identical copies of the original standard encryption program.
  • the 90 digit central panel allows the secret encryption / decryption Key to be edited. Note that this central panel looks like, and functions as, a list of ten 9 digit numbers. Although all 90 digits of the Key are made use of, they are not used as a continuous single 90 digit number but are used as ten separate 9 digit numbers.
  • the ten 9 digit numbers are initially stored as strings in a ten element string array.
  • the Pascal-style array declaration is as follows :-
  • keytxt[l ] is the 9 character numeric string at the top of the panel
  • keytxt[10] is the 9 character numeric string at the bottom of the panel.
  • Encryption Algorithm and Decryption Algorithm explain how the keytxt array is made use of.
  • the "Ignore Custom Settings" menu selection on the Choices Menu of the Standard Operations Form is a toggle selection:-
  • TICK placed beside it Program uses the Internal Original Data Source.
  • the BED File has not been edited by a user it will be in a Factory Default state, i.e. the same state it was in when it was shipped as part of the Application. Note that the Factory Default BED File was designed to be. in effective content, identical to, and additional to, the Internal Original Data Source.
  • BED File Status on the Choices Menu of the Standard Operations Form is read-only and simply informs the user of the current status of the BED File i.e. whether it is a Factory Default BED File or a Custom BED File or Not Found.
  • Bakthi Encrypt executable is actually a one-dimensional array of strings declared, initialized, and filled in a manner similar to the following:-
  • iods array[1..99] of string; ⁇ Internal Original Data Source thus name iods ⁇
  • Each string element has a different random ordering of its 255 three digit numbers.
  • the Bakthi Encrypt Data File MALA%%!!.BED is a 75,735 byte file in which every character is a digit. This file should be looked on as effectively containing 25.245 three digit numbers arranged in 99 pages of 255 numbers each. Within each page the numbers all fall within the range 001 to 255, are distinct from each other. and should be randomly ordered.
  • the BED File When it is first shipped, the BED File contains effective content identical to the Internal Original Data Source . While in this state, the BED File is referred to as a Factory Default BED File.
  • Bakthi Encrypt's Advanced Operations Form is to allow the user to safely edit the BED File. After it has been edited by a user, the BED File is referred to as a Custom BED File. Making use of a Custom BED File is, in effect, just like using a private, secret Custom Program.
  • Data Source Manipulation explains how the current data source is utilised.
  • the Advanced Operations Form does not permit the user to create an illegally formatted Custom BED File
  • the BED File might get changed by some other means, e.g. someone might maliciously or unawarely choose to edit the BED File directly, or the file might get corrupted.
  • Bakthi Encrypt when Bakthi Encrypt first loads, it thoroughly investigates the BED File to ensure it conforms to the format expected of a BED File. If the BED file is illegally formatted a message box informs the user of the nature of the format violation and also states that once the message box is closed Bakthi Encrypt will replace the bad BED File with a new Factory Default BED File.
  • Bakthi Encrypt data sources see Data Sources .
  • String manipulation functions and a string to integer conversion function are applied to the data source and then the data source is assigned element by element to the two-dimensional array of integers named "book” (see declaration on the next page).
  • the Encryption Algorithm utilises the book array.
  • LocalF file; ⁇ Pascal untyped file variable ⁇ targetfile: string; name (including full path) of local file to be encrypted ⁇
  • Demix calls Tendemud calls Demud calls Random Number Generator BERandom / var ⁇ all available to Standard Operations Form ⁇
  • Buf array[l ..50000] of Char; ⁇ files decrypted in blocks of 50000 characters ⁇
  • Bufcirc] Chr(orig); store the final decrypted character ⁇ end; END: easy defined in Data Source Manipulation j RANDOM NUMBER GENERATOR
  • Encryption Algorithm Mud and Decryption Algorithm Demud both call the pseudo-random number generator BERandom defined below :-
  • BERandom is a general purpose Random Number Generator. It accepts an
  • Integer range limit as an argument . manipulates a global double precision real variable beseed , and returns a pseudo-random Integer. ⁇
  • file 1 contains "abca” and file 2 contains "defd”.
  • file 1 contains 097 098 099 097 and file 2 contains 100 101 102 100 .
  • Bakthi Encrypt Encryption processes are repeated ten-fold with a different series of double digit numbers being generated from each of the ten 9 digit lines in the 90 digit Key. Now Bakthi Encrypt looks like it is probably unbreakable. Why allow translations be public knowledge? Translations can be private if each user edits "book" (Custom BED File). Bakthi Encrypt now looks truly unbreakable.
  • Decryption uses Key lines in reverse order, from 10 to 1 rather than 1 to 10.
  • Decryption also uses an algorithm which is the reverse of the Encryption algorithm :-
  • File 1 (using easy)
  • File 2 (using easy) luck 134 on page 17 to posn 1 14 luck 141 on page 17 to posn 117 luck 099 on page 12 to posn 1 10 luck 038 on page 12 to posn 113 luck 1 19 on page 08 to posn 107 luck 107 on page 08 to posn 1 10 luck 209 on page 20 to posn 117 luck 21 1 on page 20 to posn 120
  • Fig. 1 ( Page 1/5) shows the Standard Operations Form of Encryption / Decryption Computer Program Bakthi Encrypt V 1.00. In this drawing a particular 90 digit Key appears in the centre panel.
  • Fig. 2 (Page 1/5) is another view of the Standard Operations Form of Fig. 1. In this view a different
  • the Choices Menu is important because it contains sub-menu Bakthi Advanced, the means by which the user navigates to the Advanced Operations Form which is more relevant to this Application for a Standard Patent.
  • .BED File Status a read-only indication of the status of the large user-editable data file, which can be in a Factory Default or Custom state, or Not Found at all.
  • Custom Settings which, if ticked, cause the Customisations the user has applied to the large user-editable data file to create a Custom BED File to be ignored and an internal
  • Original Data Source to be used as the data source instead of the Custom BED File.
  • Fig. 3 (Page 2/5) shows the Advanced Operations Form of the Encryption / Decryption Computer Program Bakthi Encrypt V 1.00.
  • the Advanced Operations Form is showing "page" 99 of the Factory Default BED File in black and white format.
  • Fig. 4 (Page 3/5) is another view of the Advanced Operations Form of Fig. 3 In this drawing the
  • Fig. 5 (Page 4/5) is another view of the Advanced Operations Form of Fig. 3 .
  • the Advanced Operations Form is showing "page” 99 in the process of being edited by the user.
  • the user has edited the value 170 at the top left of the "page” and incorrectly replaced it with 214, which duplicates another number value (the one immediately below it) on the "page".
  • This duplication is an illegal operation, so when the user applies the next step of clicking Store Values, the Program highlights the duplicates in a different colour (yellow) and lists the values missing from the set of number values in a long coloured bar which is added at the bottom of the Advanced Operations Form.
  • the Program also enables Edit Values again so that the user can correct the mistake.
  • the coloured bar at the bottom is long so that many missing number values can be accommodated in the horizontal list if the user accidentally creates a lot of duplicates.
  • the method of this paragraph is directly relevant to this Application for a Standard Patent because it forms part of the subject of Claim (3).
  • Fig. 6 (Page 5/5) is another view of the Advanced Operations Form of Fig. 3
  • the Advanced Operations Form is showing a different "page", "page” 33 instead of "page” 99, of the Factory Default BED File in black and white format.
  • Claim (1) and Claim (3) involve editing. This illustration incidentally shows the Choices Menu of the Advanced Operations Form in an Opened state.
  • the .BED File Status sub-menu is duplicated so that it may be viewed from both forms.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

La présente invention concerne un programme informatique de chiffrement/déchiffrement mettant en oeuvre un volumineux fichier de données modifiable par l'utilisateur. Chaque page de ce fichier de données détermine la transformation d'un caractère qui peut être appliqué. On utilise un nombre aléatoire pour choisir la page particulière qui va déterminer le chiffrement de chaque caractère, créant ainsi une rotation variable des caractères. Le programme présente une interface-utilisateur graphique pour le procédé de modification par l'utilisateur. L'interface-utilisteur graphique affiche les pages de données à partir du volumineux fichier de données utilisant de la couleur pour mettre en évidence les erreurs possibles telles les doubles en présentant une liste des valeurs manquantes de la mémoire morte. La couleur est aussi utilisée pour un ensemble de valeur numériques qui constituent chaque page afin que le caractère aléatoire puisse se voir d'un seul coup d'oeil.
PCT/AU1999/000611 1998-09-01 1999-07-29 Chiffrement au moyen de fichier a pages multiples modifiable par l'utilisateur WO2000013162A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
AU50209/99A AU738210B2 (en) 1998-09-01 1999-07-29 Encryption via user-editable multi-page file
US09/529,761 US6820198B1 (en) 1998-09-01 1999-07-29 Encryption via user-editable multi-page file

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
AUPP5598A AUPP559898A0 (en) 1998-09-01 1998-09-01 Large user-editable data file enabling both a character rotation which is variable and custom encryption/decryption programs
AUPP5598 1998-09-01

Publications (1)

Publication Number Publication Date
WO2000013162A1 true WO2000013162A1 (fr) 2000-03-09

Family

ID=3809822

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/AU1999/000611 WO2000013162A1 (fr) 1998-09-01 1999-07-29 Chiffrement au moyen de fichier a pages multiples modifiable par l'utilisateur

Country Status (2)

Country Link
AU (1) AUPP559898A0 (fr)
WO (1) WO2000013162A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7272231B2 (en) 2003-01-27 2007-09-18 International Business Machines Corporation Encrypting data for access by multiple users
CN115017529A (zh) * 2022-08-05 2022-09-06 深圳市星卡软件技术开发有限公司 一种汽车诊断软件的加密方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0119972A1 (fr) * 1983-03-14 1984-09-26 Telefonaktiebolaget L M Ericsson Appareil de chiffrage et déchiffrage de messages numériques
US4870683A (en) * 1986-03-31 1989-09-26 Atalla Corporation Personal identification encryptor system and method
WO1993001578A1 (fr) * 1991-07-01 1993-01-21 Securicrypto Ab Dispositif de chiffrage
US5623548A (en) * 1994-01-10 1997-04-22 Fujitsu Limited Transformation pattern generating device and encryption function device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0119972A1 (fr) * 1983-03-14 1984-09-26 Telefonaktiebolaget L M Ericsson Appareil de chiffrage et déchiffrage de messages numériques
US4870683A (en) * 1986-03-31 1989-09-26 Atalla Corporation Personal identification encryptor system and method
WO1993001578A1 (fr) * 1991-07-01 1993-01-21 Securicrypto Ab Dispositif de chiffrage
US5623548A (en) * 1994-01-10 1997-04-22 Fujitsu Limited Transformation pattern generating device and encryption function device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7272231B2 (en) 2003-01-27 2007-09-18 International Business Machines Corporation Encrypting data for access by multiple users
CN115017529A (zh) * 2022-08-05 2022-09-06 深圳市星卡软件技术开发有限公司 一种汽车诊断软件的加密方法

Also Published As

Publication number Publication date
AUPP559898A0 (en) 1998-09-24

Similar Documents

Publication Publication Date Title
US6874139B2 (en) Method and system for seamless integration of preprocessing and postprocessing functions with an existing application program
KR100336025B1 (ko) 자체파괴문서 및 이-메일 메시지 시스템
US6757699B2 (en) Method and system for fragmenting and reconstituting data
DE60129682T2 (de) Einmalige pad-verschlüsselung mit zentralschlüsseldienst und schlüsselfähigen zeichen
US6820198B1 (en) Encryption via user-editable multi-page file
DE69531077T2 (de) Verfahren und Vorrichtung mit Benutzereinwirkung der Art Erproben-und-Kaufen, die es ermöglicht, Software zu erproben
US7484107B2 (en) Method for selective encryption within documents
JP4578119B2 (ja) 情報処理装置および情報処理装置におけるセキュリティ確保方法
US7584198B2 (en) Data storage
US6011849A (en) Encryption-based selection system for steganography
US20030191938A1 (en) Computer security system and method
US20060075228A1 (en) Method and apparatus for recognition and real time protection from view of sensitive terms in documents
CN102185695A (zh) 信息管理系统、信息管理方法及装置、加密方法及程序
CN100385434C (zh) 数据安全管理系统
JP2009139722A (ja) カラーを利用した暗号化方法および暗号化装置
EP2037392A1 (fr) Système et procédé de protection du contenu d'un fichier électronique utilisant un ordinateur
AU738210B2 (en) Encryption via user-editable multi-page file
Por et al. StegCure: a comprehensive steganographic tool using enhanced LSB scheme
WO2000013162A1 (fr) Chiffrement au moyen de fichier a pages multiples modifiable par l'utilisateur
WO1999010859A2 (fr) Systeme de cryptage pour protection des donnees
Zimmermann PGP User's Guide, Volume II: Special Topics
EP2037390A1 (fr) Système et procédé de protection de contenu d'un fichier électronique lors de l'envoi et de la réception
CN113079011B (zh) 密钥推送、操作文件的方法、存储介质、以及计算机设备
US11501025B2 (en) Secure data at rest
CN102495991B (zh) 用word文档进行保密通信的方法

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AU US

WWE Wipo information: entry into national phase

Ref document number: 50209/99

Country of ref document: AU

WWE Wipo information: entry into national phase

Ref document number: 09529761

Country of ref document: US

WWG Wipo information: grant in national office

Ref document number: 50209/99

Country of ref document: AU