WO2000070818A1 - Multiple number base encoder/decoder using corresponding xor - Google Patents

Multiple number base encoder/decoder using corresponding xor Download PDF

Info

Publication number
WO2000070818A1
WO2000070818A1 PCT/US1999/010929 US9910929W WO0070818A1 WO 2000070818 A1 WO2000070818 A1 WO 2000070818A1 US 9910929 W US9910929 W US 9910929W WO 0070818 A1 WO0070818 A1 WO 0070818A1
Authority
WO
WIPO (PCT)
Prior art keywords
elements
array
encryption
forth
digits
Prior art date
Application number
PCT/US1999/010929
Other languages
French (fr)
Inventor
Richard C. Satterfield
Original Assignee
Satterfield Richard C
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US09/019,915 priority Critical patent/US6128386A/en
Application filed by Satterfield Richard C filed Critical Satterfield Richard C
Priority to CA002371446A priority patent/CA2371446A1/en
Priority to PCT/US1999/010929 priority patent/WO2000070818A1/en
Priority to EP99973856A priority patent/EP1183819A4/en
Priority to JP2000619155A priority patent/JP2003500898A/en
Publication of WO2000070818A1 publication Critical patent/WO2000070818A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/04Masking or blinding
    • H04L2209/046Masking or blinding of operations, operands or results of the operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/34Encoding or coding, e.g. Huffman coding or error correction

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

Plaintext elements and masking array elements are converted into digits in another base (step 2). The resulting digits are combined modulo the new number base and the result is converted back into elements using the original number base resulting in ciphertext elements (step 4). For recovery of the plaintext, the cyphertext elements and masking array elements are converted again into digits in the same number base as used for encryption and a reverse arithmetic combination of these digits is employed, modulo the new number base, and the result of the combination is converted back into elements in the original number base resulting in the original plaintext elements.

Description

MULTIPLE NUMBER BASE ENCODER/DECODER USING CORRESPONDING XOR
FIELD OF THE INVENTION
The present invention relates to apparatus and methods for encryption and decryption wherein a ciphertext is generated. More particularly, the present invention is related to the use of symmetrix private key incryption. Once the sender and receiver have exchanged key information, encryption of a message by the sender and decryption by the receiver is accomplished in a direct manner.
BACKGROUND OF THE INVENTION
In 1917 Vernan created a telegraphic cipher system (U.S. patent No. 1,310,719; issued July 22, 1919) which used the addition of the value of a message character on a paper tape with another character on a looped key tape; the sum of the values was transmitted as the cipher character. It was soon recognized that the security of the method relied on a very long key tapes. Later to eliminate excessively long key tapes, Morehouse (1918) connected two Vernan telegraphic machines together employing two separate looped key tapes so that the output of the first modified the output of the second and this combined output encoded the message tape to create an enciphered message. These two loops had non-equal lengths such that all the permutations of the characters on one would occur with all the characters on the other. Thus, two shorter tapes could mimic the employment of a single much larger tape. Mauborgne showed that the Morehouse system was cryptographically secure only when the key tape (or the permutation of two tapes) was comparable in length to the clear text to be encrypted and was used only one time. Any repetition of any kind of the key either within that message or its use to encrypt other messages would compromise the key tape. It was also shown that a ciphertext made using an encryption key the same size as the message itself but consisting of coherent text could be broken, but not if the key were a collection of random characters.
Dr. Man Young Rhee, in his book Cryptography and Secure Communications (McGraw-Hill. 1994) states on page 12: "A cryptosystem which can resist any cryptanalytic attack, no matter how much computation is allowed is said to be unconditionally secure. The one time pad is the only unconditionally secure cipher in use. One of the most remarkable ciphers is the one-time pad in which the ciphertext is the bit-by-bit modulo-2 sum of the plaintext and a nonrepeating keystream of the same length. However, the one-time pad is impractical for most applications because of the large size of the nonrepeating key."
US patent 5,1 13,444 issued May 12, 1992 entitled '-RANDOM CHOICE CIPHER SYSTEM AND METHOD" states "First random number strings are a relatively scarce commodity. Second, the receiver must have at hand exactly the same random number sequence the sender used or must be able to reproduce it. The first of these alternatives requires the sharing of an enormous amount of key material. The sharing of an enormous amount of key material is impractical. The second alternative is impossible." The first and second conclusions to these statements are inaccurate. Statistical analysis of the sampling of digital sources (specifically 16 bit sound files) shows that random or arbitrary numbers or bytes are readily available in the digital/computer environment. This ready availability of random numbers is contrary to the teachings and opinions of those skilled in the art as well as those expert in the art of cryptography.
US Patent 5,1 13,444, issued May 12, 1992 entitled "RANDOM CHOICE CIPHER SYSTEM AND METHODS," states "First random number strings are a relatively scarce commodity. Second, the receiver must have at hand exactly the same random number sequence the sender used or must be able to reproduce it. The first of these alternatives requires the sharing of an enormous amount of key material. The sharing of an enormous amount of key material is impractical. The second alternative is impossible." The first and second conclusions to these statements are inaccurate. Statistical analysis of the sampling of digital sources (specifically 16 bit sound files) shows that random or arbitrary numbers or bytes are readily available in the digital/computer environment. This ready availability of random numbers is contrary to the teachings and opinions of those skilled in the art as well as those expert in the art of cryptography.
Another prevailing view of those skilled in the art is that most pseudorandom numbers have an inherent weakness because they are generated by a formula and that it may be possible to reconstruct the formula and then predict the numbers in the series.
Another encryption technique is disclosed in US Patent 5,113,444, entitled "RANDOM CODING CIPHER SYSTEM AND METHODS," and US Patent NO. 5,307,412, teach the use of a thesaurus and/or synonyms together with arithmetic/logic operations to combine data and masks to accomplish encoding/decoding. These patents are thus limited by the use of the thesaurus and synonyms.
US. PATENT 5,077,793 entitled "RESIDUE NUMBER ENCRYPTION AND DECRYPTION SYSTEM" teaches (column 3 lines 40 to column 4 lines 8): "If the moduli are chosen to be mutually prime, then all integers with the range of zero to the product of the moduli minus one can be uniquely represented. The importance of the residue number system to numerical process is that the operations of addition, subtraction, and multiplication can be performed without the use of carry operations between the moduli. In other words, each digit in the n-tuple can be operated on independently and in parallel." And shows that for the sum Z of the digits X and Y, the ith digit may be given by: z,=(x,+y1) mod m, and that "a sixteen bit binary number can be represented in the residue number system using five moduli 5,7,1 1,13,17." The moduli (m,) are chosen to be relatively prime to each other. In Columns 5 and 6 the description goes on to define Z=(X+Y) mod M (where is the product of all of the moduli, i.e., M=mι x m2 ... mn,) is a generalization of the Vigenere cipher. If Z=(X- Y) mod M is used to encrypt X using Y then X may be recovered from Z by X=(Y-Z) mod M, which is a generalization of the Beaufort cipher. The method described by this patent requires that multiple and different moduli must be used at the same time to calculate different residues which are transmitted to a receiver to uniquely define the number which was encrypted. The encryption method described herein does not use multiple moduli and is different from this patent. Because different moduli are not used, the encryption/decryption apparatus may be simpler in design.
Pages 13 through 15 in "Applied Cryptography, Second Edition" by Bruce Schneier, John Wiley & Sons, Inc. 1996, provide a critique on the security inherent in the Vigenere encryption method. "The simple-XOR algorithm is really an embarrassment; it's nothing more than a Vigenere polyalphabetic cipher." "There is no real security here. This kind of encryption is trivial to break, even without computers. It will take only a few seconds with a computer. Assume the plaintext is English. Furthermore, assume the key length is any small number of bytes. Here's how to break it: 1. Discover the length of the key by a procedure known as counting coincidences. XOR the ciphertext against itself shifted various number of bytes, and count those bytes that are equal. If the displacement is a multiple of the key length, then something over 6 percent of the bytes will be equal. If it is not, then less than 0.4 percent will be equal (assuming a random key encrypting normal ASCII text; other plaintext will have different numbers). This is called the index of coincidence. The smallest displacement that indicates a multiple of the key length is the length of the key.
2. Shift the ciphertext by that length and XOR it with itself. This removes the key and leaves you with the plaintext XORed with the plaintext shifted the length of the key. Since English has 1.3 bits of real information per byte, there is plenty of redundancy for determining a unique decryption."
The above method for breaking a Vigenere cipher relies on the fact that XOR (base 2) is its own inverse and that the encrypting key (masking bytes) are repeated many times. The XOR is its own inverse because A XOR B XOR B=A. It is an object of the present invention to improve upon the security of the Vigenere and Variant Beaufort cipher methods by applying them not to characters directly but rather to digits representing that character in another number base.
Pages 70 and 71 in "Cryptography: An Introduction to Computer Security" by Jennifer Seberry and Josef Pieprzyk, Prentice Hall, 1989 - "The Vigenere cipher. The key is specified by a sequence of letters: K= k] kd where k] (i=l,...,d) gives the amount of shift in the rth alphabet, that is:/j(a)=a + ki (mod n)." "Variant Beaufort cipher. Here we use:/j(a)=a + ki) (mod n). Since a - k] = a + (n - ki) (mod n) the Variant Beaufort cipher is equivalent to the Vigenere cipher with the key character n - k). The Variant Beaufort cipher is, in fact, the inverse of the Vigenere cipher since if one is used to encipher the other is used to decipher." Historically the Vigenere and Variant Beaufort ciphers have been applied to whole letters or characters. That is, the value (position in the alphabet) of a character has a number either added or subtracted to it (modulo the length of the alphabet) and the resultant number is used to specify a character position in the alphabet and the character in that position is sent as the ciphered character.
Herein BCN refers to the binary to base n conversion of a number and the representation of the base n number as a digit shown in binary. A common example (base 10) is BCD (binary coded decimal) where the values 0 through 9 are represented by 4 binary bits. Herein a byte is defined as two or more bits. In typical usage a byte is considered to be, but is not limited to, eight bits.
Herein, arrays (or masks) are described as being comprised of elements. Such elements are defined as any actual or logical grouping, for example: a bit, a nibble, a byte or word of any length. It is an object of the present invention to provide an encryption/decryption apparatus and method that does not depend upon the use of thesaurus's and/or synonyms and/or other forms of look-up tables.
It is yet another object of the present invention to provide an encryption/decryption scheme wherein the presentation of a character in one number base is transformed into a corresponding representation in another number base.
SUMMARY OF THE INVENTION
The foregoing objects are met in an encryption/decryption apparatus where a message or information expressed as elements or characters is to be encrypted from transmission or sending to another where the message will be decrypted. A mask of elements or characters is defined and utilized in the encryption/decryption. The message elements and mask elements are converted into corresponding elements in another new number base system, where this new number base system is not binar . The converted message and mask elements are combined, element by element, respectively, thus forming a new set of elements, which are defined as a ciphertext. This ciphertext may be sent or transformed into a set of elements in yet another number base that is suitable for transmission.
To decode the ciphertext, mask elements, identical to those used for encryption, are converted into corresponding elements in another number base (the same number base as that of the digits of ciphertext. Then these elements are combined, element by element, respectively using the inverse from that which was used for encryption, thus forming a new set of elements which when converted to a number in the original message number base is the plaintext message.
Herein XORn (XOR+ and XOR-) describes an exclusive-or operation (base n) defined as: let the numbers A and B base n be defined (for m digits) as:
π- 1
A = ∑n'a, and _ = ∑n'b, ι = 0 ι=0
Then, in a preferred embodiment, the elements A and B may be combined according to the following equations. m-\
C = A xor + B = _ /n'{[ n + al + b,)mod«) Eq. 1
m- l and C = A xor - B = ' n'( n + al - b-)mod«) Eq. 2
For base 2, XORn is identical to the standard XOR operation. The conversion of a binary number to j digits (base n) is done by the successive division of the number by n where the remainder of each division becomes the ith digit for i=0 to j-1. The digits of a number (base n) are converted back to binary by: setting sum=0, then for ϊ=j— 1 to 0 perform sum=(sum * n) + digit,. When done the result is in sum. An advantage of the present invention is that an encryption method employing an XOR (base 2) is strengthened by the use of a base greater than 2. This is because A XORn B XORn B does not equal A. Another advantage of the present invention is that each byte to be encrypted and each masking byte (key byte) in a preferred embodiment are converted from binary into a string of digits or elements base n (n>2) and the operations of equation 1 and 2 are applied to these digits in a systematic manner. Only one number base, or moduli, is used at a time.
In a preferred embodiment of the present invention the equation 1 and 2 are used to advantage since there is no repeating key (as a key to usually thought of) because the key is now the sequence of digits resulting from the conversion of binary masking bytes to digits of another number base. The masking byte string is now not limited to a few characters, but can be a very long series of bytes. Though it would still be possible to have a repeating series of digits if the masking bytes followed a repeating sequence, the ready availability of arbitrary masking bytes in the computer environment should lessen this occurrence. These bytes may be derived from any of several digital sources including, but not limited to, the sampling of digital sources, the application of numeric hashing functions, pseudo-random number generation and other numeric operations.
In a preferred embodiment the equation 1 is used for encryption and equation 2 is used for decryption. Since these are inverse ciphers, in another preferred embodiment equation 2 is used instead for encryption and equation 1 is used for decryption. For simplicity, only the first method is shown, but the implementation of the second scheme will be understood by someone skilled in the art.
Arbitrary and random numbers are created by normal digital processes. Most digitized music, which comes on a CD-ROM, is 16 bits of Stereo sampled at a 44.1 kilohertz rate. This produces approximately 10.5 million bytes per minute. Of these about one half may be used as arbitrary data bytes, or about 5 million bytes per minute. Reasonably random data byte are generated by reading in the digital data stream which makes up the music and throwing away the top 8 bits and sampling only the lower eight bits of sound to produce an arbitrary or random number. Fourier analysis on the resultant byte stream shows no particular patterns. It should be kept in mind that silent passages are to be avoided. If taking every byte of music in order is undesirable, then using every «th byte should work quite well for small values of n between 1 1 and 17. Please note, the error correction inherent with a music CD- ROM is not perfect and the user might want to convert the CD-ROM music format to a WAVE (.WAV) file format and then send the WAVE (.WAV) file to someone by either modem, large capacity removable drive, digital magnetic tape cartridge, or by making a digital CD-ROM containing the WAVE (.WAV) file.
Another source of arbitrary or random digital numbers may be found in the pixel by pixel modification (ex-clusive oring, adding, subtracting) of several pictures from a PHOTO CD-ROM, again looking at the low order bytes. Computer Zipped (.ZIP) files and other compressed file formats can be used. The sender and receiver must agree ahead of time on the sources to be used for the masking bytes and how these sources will be sampled and/or combined to create the masking bytes to be used to encrypt and decrypt a message.
In other preferred embodiments, the intelligent sampling of digital sources can be used to advantage to lessen the reconstruction of the byte stream used for encryption. In addition, encryption and hashing algorithms may be used to modify the digital sources prior to their use. Moreover, the modification of pseudo-random numbers for tables, arrays and/or masks may also be used to advantage.
Other objects, features and advantages will be apparent from the following detailed description of preferred embodiments thereof taken in conjunction with the accompanying drawing.
BRIEF DESCRIPTION OF THE DRAWINGS
Fig. 1A is a flow chart outlining an encoder process of a preferred embodiment of the present invention;
Fig. IB is a flow chart outlining a decoder process of a preferred embodiment of the present invention;
Fig. 2 is a block diagram of the encoder/decoder.
DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS
Fig. 1A shows a preferred embodiment of the steps for encoding a binary value. In step 1 , binary information to be encoded (A) is presented to an encoder for step 2. In step 2, the binary information is converted into digits of characters (A') expressed in another number base N. In step 3, the digits or characters (B') are combined in step 4 according to Eq. 1, resulting in digits C expressed in number base N. The C digits are an encrypted form of the original information A. In step 5, these digits C, are converted to a binary number (C) which is a convenient base for sending to a receiver.
Fig. IB shows the steps needed for a receiver of the digits sent as described in Fig. 1A to decode the received encoded digits. In step 6, the encoded binary digits C are received for decoding. In step 7. the C digits are converted into digits in the number base N forming digits C. In step 8, the digits B' are stored . The digits C and B' are combined in step 9 according the Eq. 2 which results in the digits A'. In step 10,the digits of A' are converted back into the original binary A.
In the process illustrated in Figs. 1 A and IB, the order of use of Eq. 1 and Eq. 2 may be reversed, where Eq. 2 is used in step 4 of Fig. 1A, and Eq. 1 is used in step 9 of Fig. IB.
Still referring to Figs. 1A and IB, the binary information A may be exprtessed as 8 bit bytes, but any size byte may be used. A', B' and C are numbers expressed as digits in a nyumber base N. Also, source B' information may be form any random, pseudo-random. Or arbitrary source, as describe herein. Moreover, other logic/arithmetic operations may be used to provide additional security as substantially and step of Figs. 1A and IB.
Fig. 2 shows a basic block diagram of the Encoder/Decoder. The next description will be for processing binary input (N3 = 2) to binary output (N2 = 2) with binary masking bytes (N4 = 2). Nl will be any value greater than 2. M bytes of plaintext are loaded into the INPUT DATA BUFFER, 2, via line 21. In addition, M masking bytes are loaded into the DATA MASK BUFFER, 3, via line 22. The address counters, DATA ADDRESS COUNTER, 1, MASK ADDRSS COUNTER, 14, and the OUTPUT ADDRESS COUNTER, 15, are all initialized to 0. These counters will be clocked M times to process a whole buffer. ED is a 1 bit binary flag used to indicate which equation (#1 or #2) will be utilized by the encoder/decoder. For encoding ED is set =0, while for decoding, ED is set =1. Nl , 7. is the number base to be used for the XOR operation. N2, 10, is the number base to be used for the conversion of the digits (based N 1 ) back into a byte to be put into the output buffer. Normally N2 would be 2 for binary outputs bytes. N3, 13, is the number base for the input data bytes and is normally 2 for binary input bytes. The number of internal digits for the DIGIT CONVERTERS (4 and 5) and the NUMBER
CONVERTER, 9, are supplied by DIGITS (the number of digits), 12, via line 32. The number of digits needed is determined by the number base for the XOR operation and the bit width of the bytes to be processed. The value of DIGITS is calculated as follows: DIGITS≥(In(2(No of B,,s) -l)/(In(Nl)). If the number of bits is 8 (28-l=255) and the number base for the XORn is 15, then 3 digits will be required because In(255)/In(15) is 2.04 which is rounded up to the next integer value of 3.
The DATA ADDRESS COUNTER, 1 is sent via 20 to the INPUT DATA BUFFER, 2. The MASK ADDRESS COUNTER, 14, is sent via 36 to the DATA MASK BUFFER, 3. THE OUTPUT ADDRESS COUNTER, 15, is sent via line 37 to the OUTPUT DATA BUFFER, 1 1. These counters are used to specify which bytes will be selected from the INPUT DATA BUFFER, 2, and DATA MASK BUFFER, 3, and where the resultant byte will be placed in the OUTPUT DATA BUFFER, 1 1. A byte from the INPUT DATA BUFFER, 2, is sent via line 24 to the DIGIT CONVERTER, 5. Similarly, a byte from the DATA MASK BUFFER, 3, is sent via line 23 to the DIGIT CONVERTER, 4. Nl (the number base for the XORn operation), 7, via line 25 is sent to the "base" inputs for DIGIT CONVERTERS 4 and 5 and the "i base" input of the NUMERIC CONVERTER, 9. N3, 13, (the number base for the input data byte) in this case is set equal to 2 (for binary) and is sent via 34 to DIGITS CONVERTER, 5. Similarly, N4, 16, (the number base for the mask byte) in this case is also set equal to 2 (for binary) and is sent via 35 to DIGITS
CONVERTER, 4. The number of DIGITS, 12, is sent via 32 to the "# dig" inputs for the DIGITS CONVERTERS 4 & 5 and the NUMERIC CONVERTER 9.
The binary input data byte is converted into digits base Nl in the DIGITS CONVERTER, 5, and the resulting digits are sent via line 27 to the "A in" input of the MODULO N ADDER/SUBTRACTER, 6. The conversion of a binary number to j digits (base n) is done by the successive division of the number by n where the remainder of each division becomes the ith digit for 1-0 to j- 1. Or this conversion may also be accomplished by table look up using tables calculated ahead of time. Similarly, the binary mask byte is converted in digits base Nl in the DIGITS CONVERTER, 4, and the resulting digits are sent via line 26 to the "B in" input of the MODULO N ADDER/SUBTRACTER, 6. ED, 8, is sent via line 28 to the "e/d" input of the MODULO N ADDER/SUBTRACTER, 6. If ED=0, then for each "j" digit, Cj = (Aj + Bj) Mod Nl . If ED=1 then for each digit, =(N1+Aj - Bj ) Mod Nl . The digits (Cj ) resulting from the operations within the MODULO N ADDER/SUBTRACTER, 6, are sent via line 29 to the input of the NUMBER CONVERTER, 9. Optionally, the output digits of the MODULO N ADDER/SUBTRACTER, 6, can be considered as a series of ciphertext output digits (instead of being converted back to a binary value). These digits may be used by some other process for transmission to a receiver. If ED=1 , the output of the MODULO N ADDER/SUBTRACTER, 6, can be considered as a series of ciphertext output digits (instead of being converted back to a receiver. If ED=1, the output of the MODULO N ADDER/SUBTRACTER, 6, would be digits representing the original plaintext. And for this illustration wold be the binary plaintext only after conversion to binary in the Number converter, 9.
The value of the output number base N2, 10, is sent via line 30 to the "ok base" input for the NUMBER CONVERTER, 9. When N2=2, the digits sent to the NUMBER CONVERTER, 9, are converted back to binary by: setting sum=0, then for j=DIGITS-l to 0 perform sum=(sum * Nl) +Cj where Cj is the result of AjXORn Bj. When done the result in sum. This number base conversion may also be accomplished by table lookup using tables calculated ahead of time. If N2=2 (binary) the resultant binary value in sum is sent via line 31 to the OUTPUT DATA BUFFER, 1 1.
If N2 is not equal to 2, then the binary value of sum is converted to digits based N2 (by the method described above) and these digits are used to form BCN digits in the output byte and the output byte (in BCN format) is then sent via line 31 to the OUTPUT DATTA BUFFER, 1 1. These steps are repeated until all of the bytes in the input buffer have been processed and placed in the output buffer. Then the ciphertext is sent via line 33 to the user. If ED=1, then the output buffer contains plaintext.
The use of number bases (other than binary) for input and output c an alter the operation of the encoder/decoder. The following examples all use number bases greater than 2.
If N2 (the number base for output result) is equal to Nl (the number base for the XORn calculations) then the digits, resulting from the XORn calculation, are placed in the OUTPUT DATA BUFFER, 1 1 , via line 31 , without change. This requires that the size of the OUTPUT DATA BUFFER, 1 1 , must be greater than the INPUT DATA BUFFER in order to hold the digit values in output bytes. Also, the OUTPUT ADDRESS COUNTER, 15, must send more addresses to the OUTPUT DATA BUFFER to handle the extra information being stored. The resulting Ciphertext can be in digit or BCN format depending upon the implementation.
If either the Plaintext, 21, or the Data Masks, 22, are in digit or BCN format and the number base for either of these inputs is the same as the number base for the XORn calculation (N3 or N4 ≠ Nl ), then these digits ( ≠Nl) are passed through the respective DIGIT CONVERTER (4 or 5) without change. This case requires that the respective address counter must be incremented an appropriate number of extra times to cause the required number of digits to be sent to the MODULO N ADDER/SUBTRACTER, 6.
If either the Plaintext, 21, or the Data Masks, 22, are in either a BCN or digit format and N3 or N4 = Nl , then the appropriate input (=N1) is first converted by the respective DIGIT CONVERTER (4 or 5) internally to binary before being converted to base Nl digits.
In some preferred embodiments the conversion of bytes into digits based n is achieved by table lookup instead of by repetitive division of the byte by n. In addition, the conversion of the digits (based n) into binary or another number base is also accomplished by table lookup.
In another preferred embodiment, not shown, the input data and masking data bytes are 16 bites wide, and other counters, tables, variable or arrays are used to modify the e/d input of the MODULO N ADDER/SUBTRACTER causing the method of combining digits to be altered (between equation 1 and 2 forms) while the buffers are being processed. In another preferred embodiment, the data bytes in the input and output buffers are processed as if all of the bits in the buffer constitute one very large byte. Other preferred embodiments use a byte width, which is larger than 16 bits.
It will now be apparent to those skilled in the art that other embodiments, improvements, details and uses can be made consistent with the letter and spirit of the foregoing disclosure and within the scope of this patent, which is limited only by the following claims, construed in accordance with the patent law, including the doctrine of equivalents.

Claims

WHAT IS CLAIMED IS:
1. Encryption/Decryption apparatus comprising: a. means for retrieving information to be encoded/decoded, said information defining an array DI of first elements expressed in a number base M, b. means for retrieving information to be used for the encryption decryption of the elements of DI, said information defining an array D2 of second elements, c. first means for converting the first elements, DI, into an array D3 of third elements, wherein said third elements are said first elements expressed in a number base N that is greater than 2, d. second means for converting the second elements, D2, into an array D4 of forth elements, wherein said forth elements are said second elements expressed in a number base N that is greater than 2, e. means for combining arrays D3 and D4 taken modulo N, thereby forming fifth elements of an array D5, and f. means for converting the elements of D5, base N, into an array of sixth elements, D6, expressed in a number base M wherein the sixth array, D6, is the ciphertext if encoding or the plaintext if decoding.
2. Encryption/Decryption apparatus comprising as defined in claim 1 wherein the means for combining comprises the means for adding, modulo N, the third elements, D3, with the forth elements, D4, forming the elements of the fifth array, D5.
3. Encryption/Decryption apparatus comprising as defined in claim 1 wherein the means for combining comprises the means for adding, modulo N, N to the third elements, D3, and subtracting the forth elements, D4, forming the elements of the fifth array, D5.
4. Encryption/Decryption apparatus comprising as defined in claim 1 wherein the number base used for forming the fifth elements, D5, into the sixth elements, D6, is M' where M' and M are different.
5. Encryption/Decryption apparatus comprising as defined in claim 1 wherein a table lookup is used for forming the sixth elements, D6, from the fifth elements, D5.
6. Encryption/Decryption apparatus comprising as defined in claim 1 wherein the elements of the second array, D2, are converted into the elements of the forth array, D4, by table lookup.
7. Encryption/Decryption apparatus comprising as defined in claim 1 wherein the elements of the first array, DI, are converted into the elements of the third array,
D3, by table lookup.
8. Apparatus as defined in claim 1 further comprising means for retrieving the second elements of D2 from any source of digital numbers that can be reliably retrieved.
9. The means for retrieving information to be the elements of the forth array,
D4, and wherein steps b & d of claim 1 are not used.
10. Apparatus as defined in claim 6 wherein the sources of digital numbers comprises pseudo-random numbers or random numbers or both pseudo-random and random numbers.
11. Encryption apparatus comprising: a. means for retrieving plaintext information to be encoded/decoded, said information defining an array D 1 of first elements expressed in a number base M, b. means for retrieving information to be used for the encryption/decryption of the elements of DI , said information defining an array D2 of second elements, c. first means for converting the first elements, DI, into an array D3 of third elements, wherein said third elements are said first elements expressed in a number base N that is greater than 2, d. second means for converting the second elements, D2, into an array D4 of forth elements, wherein said forth elements are said second elements expressed in a number base N that is greater than 2, e. means for combining arrays D3 and D4 taken modulo N, thereby forming fifth elements of an array D5, which is the cipher text. f. means for converting the elements of D5, base N, into an array of sixth elements, D6, expressed in a number base M wherein the sixth array, D6, is the ciphertext if encoding or the plaintext if decoding.
12. Encryption apparatus comprising as defined in claim 1 1 wherein the elements of the fifth array, D5, form the ciphertext.
13. Encryption apparatus comprising as defined in claim 1 1 wherein the elements of the first array, DI, are converted into the elements of the third array, D3, by table lookup.
14. Encryption apparatus comprising as defined in claim 1 1 wherein the elements of the second array, D2, are converted into the elements of the forth array, D4, by table lookup.
15. Encryption apparatus comprising as defined in claim 1 1 wherein the means for combining comprises the means for adding, modulo N, the third elements, D3, with the forth elements, D4, forming the elements of the fifth array, D5.
16. Encryption apparatus comprising as defined in claim 1 1 wherein the means for combining comprises the means for adding, modulo N, N to the third elements, D3, and subtracting the forth elements, D4, forming the elements of the fifth array, D5.
17. Apparatus as defined in claim 1 1 further comprising means for retrieving the second elements of array D2 from any source of digital numbers that can be reliably retrieved.
18. Apparatus as defined in claim 1 1 wherein the sources of digital numbers comprises pseudo-random numbers or random numbers or both pseudo-random and random numbers.
19. Apparatus as defined in claim 1 1 further comprising means for retrieving the forth elements of array D4 from any source of digital numbers that can be reliably retrieved.
20. Apparatus as defined in claim 19 wherein the sources of digital numbers comprises pseudo-random numbers or random numbers or both pseudo-random and random numbers.
21. Decryption apparatus comprising: a. means for retrieving ciphertext information to be decoded, said information defining an array D3 of third elements expressed in a number base N, b. second means for converting the second elements, D2, into an array D4 of forth elements, wherein said forth elements are said second elements expressed in a number base N that is greater than 2, c. means for combining arrays D3 and D4 taken modulo N, thereby forming fifth elements of an array D5, which is the plaintext based N. d. means for converting the elements of D5, base N, into an array of sixth elements, D6, expressed in a number base M wherein the sixth array, D6, is the original plaintext.
22. Decryption apparatus comprising as defined in claim 21 wherein the elements of the fifth array, D5, comprise the original plaintext message.
23. Decryption apparatus comprising as defined in claim 21 wherein the elements of the second array, D2, are converted into the elements of the forth array, D4, by table lookup.
24. Decryption apparatus comprising as defined in claim 21 wherein the means for combining comprises the means for adding, modulo N, the third elements, D3, with the forth elements, D4, forming the elements of the fifth array, D5.
25. Decryption apparatus comprising as defined in claim 21 wherein the means for combining comprises the means for adding, modulo N, N to the third elements,
D3, and subtracting the forth elements, D4, forming the elements of the fifth array, D5.
26. Apparatus as defined in claim 21 further comprising means for retrieving the second elements of D2 from any source of digital numbers that can be reliably retrieved.
27. Apparatus as defined in claim 26 wherein the sources of digital numbers comprises pseudo-random numbers or random numbers or both pseudo-random and random numbers.
28. Decryption apparatus comprising as defined in claim 21 wherein a table lookup is used for forming the sixth elements, D6, from the fifth elements, D5.
29. Apparatus as defined in claim 21 further comprising means for retrieving the forth elements of array D4 from any source of digital numbers that can be reliably retrieved.
30. Apparatus as defined in claim 29 wherein the sources of digital numbers comprises pseudo-random numbers or random numbers or both pseudo-random and random numbers.
31. Decryption apparatus comprising as defined in claim 21 wherein a table lookup is used for forming the sixth elements, D6, from the fifth elements, D5.
PCT/US1999/010929 1994-11-09 1999-05-18 Multiple number base encoder/decoder using corresponding xor WO2000070818A1 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
US09/019,915 US6128386A (en) 1994-11-09 1998-02-07 Multiple number base encoder/decoder using a corresponding exclusive or function
CA002371446A CA2371446A1 (en) 1999-05-18 1999-05-18 Multiple number base encoder/decoder using corresponding xor
PCT/US1999/010929 WO2000070818A1 (en) 1998-02-07 1999-05-18 Multiple number base encoder/decoder using corresponding xor
EP99973856A EP1183819A4 (en) 1999-05-18 1999-05-18 Multiple number base encoder/decoder using corresponding xor
JP2000619155A JP2003500898A (en) 1999-05-18 1999-05-18 Encoder / decoder using corresponding XOR using a plurality of radixes

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/019,915 US6128386A (en) 1994-11-09 1998-02-07 Multiple number base encoder/decoder using a corresponding exclusive or function
PCT/US1999/010929 WO2000070818A1 (en) 1998-02-07 1999-05-18 Multiple number base encoder/decoder using corresponding xor

Publications (1)

Publication Number Publication Date
WO2000070818A1 true WO2000070818A1 (en) 2000-11-23

Family

ID=26692752

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1999/010929 WO2000070818A1 (en) 1994-11-09 1999-05-18 Multiple number base encoder/decoder using corresponding xor

Country Status (2)

Country Link
US (1) US6128386A (en)
WO (1) WO2000070818A1 (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE19822685A1 (en) * 1998-05-20 2000-01-27 Deutsche Telekom Ag Process for secure transmission of messages
US6424969B1 (en) * 1999-07-20 2002-07-23 Inmentia, Inc. System and method for organizing data
US20020025040A1 (en) * 2000-06-28 2002-02-28 Howard Stein Method and apparatus for generating an encryption key
US20020114451A1 (en) * 2000-07-06 2002-08-22 Richard Satterfield Variable width block cipher
US7043635B1 (en) * 2000-09-15 2006-05-09 Swivel Secure Limited Embedded synchronous random disposable code identification method and system
US20020159588A1 (en) * 2001-04-27 2002-10-31 Kauffman Jason R. Cryptography with unconditional security for the internet, commercial intranets, and data storage
JP4787434B2 (en) * 2001-08-24 2011-10-05 富士通コンポーネント株式会社 ENCRYPTION METHOD, COMMUNICATION SYSTEM, DATA INPUT DEVICE
CA2365481C (en) * 2001-12-18 2006-01-03 Ibm Canada Limited-Ibm Canada Limitee Encryption method using synchronized continuously calculated pseudo-random key
FR2853175B1 (en) * 2003-03-28 2005-06-17 Everbee Networks ENCRYPTION METHOD AND SYSTEM
US8615078B2 (en) * 2009-08-21 2013-12-24 Electronics And Telecommunications Research Institute Method and apparatus for processing F-function in seed encryption system
US9124417B2 (en) * 2010-03-05 2015-09-01 Alcatel Lucent Computation of garbled tables in garbled circuit
CN107634827A (en) * 2017-10-15 2018-01-26 天津飞眼无人机科技有限公司 Unmanned plane secret signalling

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3120606A (en) * 1947-06-26 1964-02-04 Sperry Rand Corp Electronic numerical integrator and computer
US3706941A (en) * 1970-10-28 1972-12-19 Atomic Energy Commission Random number generator
US4519031A (en) * 1982-02-22 1985-05-21 Texas Instruments Incorporated Microcomputer with accumulator saturation upon overflow

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3120606A (en) * 1947-06-26 1964-02-04 Sperry Rand Corp Electronic numerical integrator and computer
US3706941A (en) * 1970-10-28 1972-12-19 Atomic Energy Commission Random number generator
US4519031A (en) * 1982-02-22 1985-05-21 Texas Instruments Incorporated Microcomputer with accumulator saturation upon overflow

Non-Patent Citations (9)

* Cited by examiner, † Cited by third party
Title
BRYANT JOHN: "SR-52 program simplifies universal number conversion", ELECTRONICS, 9 June 1977 (1977-06-09), pages 152 - 153, XP002923436 *
DR. MOHAMED E. EL-HAWARY: "Ones and zeros, understanding boolean algebra, digital circuits and the logic of sets", 1998, IEEE PRESS,, XP002923434 *
KOBLITZ N.: "A course in number theory and cryptography", 1997, SPRINGER VERLAG, XP002923430 *
MAROTTA MICHAEL: "The code book, all about unbreakable codes and how to use them", 1983, LOOMPANICS UNLIMITED, XP002923432 *
MURRY HERSCHELL F.: "A general approach for generating natural random variables", IEEE TRANSACTION ON COMPUTERS, December 1980 (1980-12-01), pages 1210 - 1213, XP002923431 *
SCHNEIER BRUCE: "Applied cryptography", 1996, JOHN WILEY, & SONS, INC, NEW YORK, XP002923433 *
SZABO NICHOLAS ET AL.: "Residue arithmetic and its applications to computer technology", 1967, MCGRAW-HILL, BOOK COMPAGNY, NEW YORK, XP002923435 *
VOSS RICHARD F. ET AL.: "1/f Noise in music: Music from 1/f noise", J. ACOUST. SOC. AM., vol. 63, no. 1, January 1978 (1978-01-01), pages 258 - 263, XP002923437 *
WALLACE C.S.: "Physically random generator", COMPUTER SYSTEM SCIENCE & ENGINEERING, vol. 5, no. 2, April 1990 (1990-04-01), pages 82 - 88, XP002923438 *

Also Published As

Publication number Publication date
US6128386A (en) 2000-10-03

Similar Documents

Publication Publication Date Title
US5751811A (en) 32N +D bit key encryption-decryption system using chaos
US5717760A (en) Message protection system and method
KR100657062B1 (en) Method for encrypting information and device for realization of the method
US5483598A (en) Message encryption using a hash function
AU729638B2 (en) A non-deterministic public key encryption system
US6125182A (en) Cryptographic engine using logic and base conversions
KR100362458B1 (en) Cryptographic processing apparatus, cryptographic processing method, and recording medium recording cryptographic processing program for realizing high-speed crypographic processing without impairing security
US7190791B2 (en) Method of encryption using multi-key process to create a variable-length key
JPH0863097A (en) Method and system for symmetric encoding for encoding of data
KR20110004474A (en) A closed galois field cryptographic system
JPH09230787A (en) Encoding method and device therefor
CA2410418A1 (en) Pseudo-random number generator
US6128386A (en) Multiple number base encoder/decoder using a corresponding exclusive or function
JP2009116348A (en) Method for data decorrelation
WO2006030447A1 (en) A method and system for computational transformation
CA2410421A1 (en) Parallel modulo arithmetic using bitwise logical operations
US20020114451A1 (en) Variable width block cipher
Masoodi et al. Symmetric Algorithms I
Ghazi et al. Robust and Efficient Dynamic Stream Cipher Cryptosystem
CA2410608A1 (en) A method of validating an encrypted message
WO2001093493A2 (en) End of message markers
EP1183819A1 (en) Multiple number base encoder/decoder using corresponding xor
JPH04335730A (en) Random ciphering communication system
EP1179243A1 (en) Cryptographic engine using base conversion, logic operations and prng in data arrays to increase dispersion in ciphertext
AU750408B2 (en) A method of combining a serial keystream output with binary information

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): CA IL JP

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
WWE Wipo information: entry into national phase

Ref document number: 1999973856

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2371446

Country of ref document: CA

Ref country code: CA

Ref document number: 2371446

Kind code of ref document: A

Format of ref document f/p: F

ENP Entry into the national phase

Ref country code: JP

Ref document number: 2000 619155

Kind code of ref document: A

Format of ref document f/p: F

WWP Wipo information: published in national office

Ref document number: 1999973856

Country of ref document: EP

WWW Wipo information: withdrawn in national office

Ref document number: 1999973856

Country of ref document: EP