WO2018231760A1 - Dispositifs de transmission et de communication de données aléatoires à l'aide de sous-canaux - Google Patents
Dispositifs de transmission et de communication de données aléatoires à l'aide de sous-canaux Download PDFInfo
- Publication number
- WO2018231760A1 WO2018231760A1 PCT/US2018/037006 US2018037006W WO2018231760A1 WO 2018231760 A1 WO2018231760 A1 WO 2018231760A1 US 2018037006 W US2018037006 W US 2018037006W WO 2018231760 A1 WO2018231760 A1 WO 2018231760A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- transmission
- data
- devices
- sub
- channel
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/85—Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Definitions
- the technical field comprises cyber security. More specifically, the present disclosure relates to randomized concealment action involving of communications, and more particularly to devices and an associated system that securitizes signals between devices to ensure that the communications are discoverable by only designated third parties. Methods and devices for protecting of these (primarily digital and normally two-way) communications using applications that may be combined with authorization and validation for receiving, storing, and retrieval of electronic, optical, and/or electro-optical communications in the form of voice, data, or optical transmissions, are also included.
- the present disclosure includes devices and a system that is specifically suited for data transmission applications that require a need for discrete communications, preserving privacy of information, electronic commerce transactions, electronic mail communications and the like.
- plaintext also refers to serial data transferred, for example, from a communication system such as a satellite, telephone or electronic mail system.
- Terms such as 'encryption' and 'enciphering', 'encrypted' and 'ciphered', 'encrypting device' and 'ciphering device', 'decrypting device' and 'decipher device' have an equivalent meaning within cryptology and are herein used to describe devices and methods that include encryption and decryption techniques.
- Randomization of an input block has been previously addressed as in the device described in U. S. Pat. No. 4,850,019 entitled “Data randomization equipment”, invented by Yokosuka Akihiro Shimizu and Yokohama Shoji Miyaguchi, both of Japan, in which two plaintext encrypting devices are presented. In both cases the randomization of data which they refer to is performed according to individual 64 bits data blocks provided as input data. This is described in the patent description where it is stated that "final channel data obtained after function and transform operations are combined by combining means to produce randomized data corresponding to the input data.” Properties and features of the randomization lie in the input data block, in the encryption key, and in the operations and transformations that the device carries out in the 64 bit data block provided as input data.
- both a 64-bit encryption key for the first encrypting device, and a 128-bit encryption key for the second is utilized.
- the encryption device in U. S. Pat. No. 5,214,703 entitled “Device for the conversion of a digital block and use of same", invented by James L. Massey, and Xuejia Lai, both of Switzerland, is another such device that also uses well-known diffusion and confusion techniques, but the cipher text message that results from its application presents no properties to provide objective measures, by the user.
- the degree of confusion and diffusion of values presented in the cipher text message and, as it happened with the abovementioned device, the confusion and diffusion introduced refers to the 64-bit data block provided as input for encryption.
- ciphering devices that operate according to the input data, can be either the encryption key or the plaintext message data.
- Some examples of these include the ciphering device of U.S. Pat. No. 4,157,454 entitled “Method and System for Machine Enciphering and Deciphering", invented by Wolfram Becker, that shows an enciphering algorithm with rotations depending on the used encryption key, as well as the ciphering device in U.S. Pat. No. 5,724,428 entitled “Block encryption algorithm with data- dependent rotations", invented by Ronald L. Rivest, This device makes use of rotations according to the input data and intermediate encryption results in order to determine the quantity of each data rotation being encrypted.
- Forward error correction coding expands data (data strings, data sets, etc.) and places check sums (using American Standard Code for Information Interchange (ASCII) and Extended Binary Coded Decimal Interchange Code (EBCDIC)) into " translation tables" which utilize binary numbers to represent letters or other symbols for encoding and encryption.
- ASCII American Standard Code for Information Interchange
- EBCDIC Extended Binary Coded Decimal Interchange Code
- One object of this technique is to try sharing encrypted data between at least two (2) parties using some type of open standard with either the same language or a binary standard.
- the receiving end for the transmission will then correct for the errors by separating these errors from the original data transmission.
- This separate transmission stream is described herein as a sub-channel.
- the sub-channel transmission By combining the sub-channel with the forward error corrected data, the sub-channel transmission appears as “noise” or a scrambled transmission (similar to the diffusion and confusion described in the background section above).
- This "noisy” data can now itself be encrypted, which prescrambles the data/signal transmission before the transmission enters the encrypter. Essentially, the transmission data is "premixed” before entering an encrypter device.
- the sub-channel is being used to inject the encryption and encrypter, it is possible to employ logic which can parse the data/signal transmissions by stretching time or space as stated above and throttling the rate at which the original desired data and/or the intentional errors are transmitted via the sub-channel.
- receiving the encrypted transmission of the sub-channels requires accepting the cypher text and decrypting this cypher text with the identical (symmetric) keys or public/private (asymmetric) key pairs.
- This type of encryption and decryption including those described in more detail as follows.
- At least one data correction recovery function In order to recover the intentionally introduced forward error, at least one data correction recovery function must be applied. This recovery function corrects the (intentionally erroneous) data and outputs plain text.
- This technique includes one or more splitter functions in that there is a split accomplished between real data and the recovered errors. To further clarify, the recovered errors recovered with this technique should be the entire sub-channel - which is what was originally intentionally injected/infused as corrupted or erroneous data or into the original transmission.
- this random number generator/splitter can either inject/infuse data other than has been already involved in the original transmissions or utilize other data that is completely unrelated to the original data or signals originally sent.
- This random splitter could provide temporal (time related), message authentication codes, user IDs and other data/signals which is related to the original data/signals.
- the technology for increasing computer micro-processing speeds and memory size is quickly making data size and speed of transmission of the data/signals a non-issue.
- the system described provides no partem to the data or the pre-scramble locations. Specifically, without the system of the present disclosure, one can send the same data over and over again through the same cipher key and expect to receive the same cipher text as an output. Without the present system, this technique would provide clues about the original plain text and potentially knowledge regarding the cipher key.
- the cipher text looks completely different for each transmission because the random number combined with repeating data values has changed the randomized data value before it is encrypted. Therefore the cipher text will be completely different for each transmission. Even though the same data is being repeatedly transmitted, the cipher text is randomly different. This leaves no avenue to infer the value of the original plain text or the cipher key. It is also possible that the entire system described herein can by itself be used as a sub-channel (by cascading the system in multiple configurations) for other transmission(s). If so employed, this might be at the expense of reducing "true or increased" randomness of the initially and intentionally introduced interference/noise/corrupted data. Summary
- the present disclosure can be described as one or more devices that encrypt transmission(s) transmitted to and/or decrypt transmission(s) received from the devices comprising; a forward error correction encoder that encodes transmission(s) and provides a known degree of forward error correction to the transmission(s);
- a transmission(s) combiner that combines transmission(s) from the forward error correction encoder with transmission(s) from the sub-channel encoder
- a transmission(s) encrypter that receives combined transmission(s) from the transmission(s) combiner, wherein the transmission(s) encrypter receives one or more encrypter keys (KE) and the combined transmission(s), such that the combined transmission(s) are encrypted by the transmission(s) encrypter and sent to a transmission(s) transmitter and wherein the transmission(s) are in a form of cipher text;
- KE encrypter keys
- a transmission(s) receiver that receives the cypher text and sends the cypher text to a transmission(s) decrypter, such that the cypher text is decrypted.
- Additional embodiments include encrypted transmission(s) that communicate randomized encrypted data via sub-channels (REDS).
- Decrypted cypher text from the transmission(s) decrypter also possesses one or more decrypter keys (KD) for complete decryption of the encrypted transmission(s).
- KD decrypter keys
- the encrypted data is sent to a forward error correction decoder and provides two transmission(s) outputs; a first output that is transmission(s) from the forward error correction decoder that is sent to a transmission(s) receiver and a second output that sends decrypted transmission(s) to a sub-channel transmission(s) decoder.
- the transmissions receiver have received transmission(s) is received that is split into both a transmission(s) source from transmission(s) as well as sub-channel transmission(s) that includes a sub-channel data splitter.
- the sub-channel transmission(s) decoder For the sub-channel transmission(s) decoder, it decodes sub-channel transmission(s), sending one or more received random numbers from a random number generator to a random number receiver and the sub-channel transmission(s) to the sub-channel data splitter.
- the sub-channel transmission(s) are split and sent to two or more transmission(s) receivers which correspond to temporal information, message authentication codes, and user data, including user ID data.
- transmission(s) between the devices include transmission(s) from the transmission(s) source together with sub-channel transmission(s) have become completely de-randomized, decrypted, and recovered.
- the transmission(s) are plaintext data sent to at least one forward error correction encoder that encodes transmission(s) and provides a known degree of forward error correction to the transmission(s). Further, the transmission(s) function to enlarge transmitted data by adding error checking features that include rows, columns, and diagonal checksums within data tables.
- the forward error correction encoder then can provide corrected transmission(s) sent to a transmission(s) combiner.
- the sub-channel encoder can employ a random number generator that provides one or more random numbers for the sub-channel transmission(s) encoder.
- the sub-channel combiner wherein said combiner comprises transmission(s) inputs from temporal information, message authentication codes, and user data including user ID data that is sent to said sub-channel data encoder.
- the sub-channel encoder receives required and/or desired input transmission(s) from sub-channels and the sub-channel encoder encodes sub-channel data and sends it to the transmission(s) combiner.
- the transmission(s) combiner combines the forward error corrected transmission(s) with sub-channel transmission(s), wherein combined transmission(s) is sent to the transmission(s) encrypter.
- the encrypter possesses a data encrypter key, (KE) and combined transmission(s) that are encrypted and sends encrypted transmission(s) to a transmitter.
- KE data encrypter key
- the data encrypter key (KE) is a symmetric, shared, or one portion of an asymmetric key pair.
- the transmission(s) are channeled through the devices so that transmissions from a transmission(s) source is combined with sub-channel transmission(s) that includes randomness so that a more complete randomized and encrypted data output is realized.
- transmission(s) devices can be data and data devices; the transmission(s) devices can be signals and signal devices; and/or the transmission(s) devices can be a combination of signals and transmissions; In each instance it is possible that the transmission(s) be provided with and contain noise and/or some form of illogical randomness.
- the forward error correction encoder can be a forward error correction data encoder and that the transmission(s) combiner is data combiner.
- the decrypter keys are data decrypter keys and are symmetric, shared, or one portion of an asymmetric key pair.
- the present disclosure includes two or more transceiver devices that utilize one or more encrypters and one or more decrypters comprising; one or more communication sources that provides transmission(s); and at least one connector, wherein transmission(s) from the one or more communications sources enter a first transceiver through the connector and travels to a randomized encrypted data sub-channels (REDS) encrypter and wherein the (REDS) encrypter securely sends encrypted transmission(s) to a second transceiver.
- the encrypted transmission(s) enter the second transceiver and are sent to a randomized decrypted data sub-channels (RDDS) decrypter wherein the transmission(s) are decrypted.
- RDDS randomized decrypted data sub-channels
- the transmission(s) utilize one or more REDS encrypters in the second transceiver as well as one or more RDDS decrypters in said first transceiver and conversely one or more RDDS decrypters in said second transceiver as well as one or more REDS encrypters in said first transceiver.
- Both the REDS and the RDDS can operate within an unsecured network.
- the decrypted cypher text from the transmission(s) decrypter also possesses one or more decrypter keys (KD) for complete decryption of the encrypted transmission(s).
- KD decrypter keys
- the encryption and decryption is performed with standard encryption and decryption computerized computations that may or may not involve algorithms.
- the transmission(s) can all be transmitted in packets.
- the packets themselves may possess at least one header portion and/or one footer portion and the header or footer portion(s) are provided with a selected randomized section with sub-channels.
- the transmission(s) can be data contained within a data packet and/or a signal packet that is transferred between these devices.
- the present invention also includes a system with one or more devices that encrypt transmission(s) transmitted to and/or decrypt transmission(s) received from the devices comprising;
- a forward error correction encoder that encodes transmission(s) and provides a known degree of forward error correction to the transmission(s);
- a sub-channel encoder a transmission(s) combiner that combines transmission(s) from the forward error correction encoder with transmission(s) from the sub-channel encoder;
- a transmission(s) encrypter that receives combined transmission(s) from the transmission(s) combiner, wherein the transmission(s) encrypter receives one or more encrypter keys (KE) and the combined transmission(s), such that the combined transmission(s) are encrypted by the transmission(s) encrypter and sent to a transmission(s) transmitter and wherein the transmission(s) are in a form of cipher text;
- KE encrypter keys
- a transmission(s) receiver that receives the cypher text and sends the cypher text to a transmission(s) decrypter, such that the cypher text is decrypted.
- Figure 1 is a flowchart for a device that communicates randomized encrypted data with subchannels (REDS) that transmits randomized encrypted data with data sub-channels.
- REDS randomized encrypted data with subchannels
- Figure 2 is a flowchart describing a device that communicates randomized decrypted data with subchannels (RDDS) that receives randomized encrypted data with data sub-channels.
- Figure 3 is a schematic depicting the combination of two transceiver devices utilizing both encrypters and decrypters which operate according to the randomized encryption and decryption of the present disclosure.
- Figure 4 is a schematic diagram that illustrates devices utilized initially represented in simple block form for Figures 1, 2, and 3. Detailed Description
- Figure 1 is a flowchart (100) describing a device (100A) that communicates randomized encrypted data with subchannels (REDS) that transmits randomized encrypted data with data sub-channels.
- a data source (110) which could be plaintext
- the data is sent to forward error correction encoder (120) which encodes the data and provides a known degree of forward error correction to the data. This function enlarges the transmitted data by adding various error checking features that may include rows, columns, and diagonal checksums.
- the forward error corrected data is sent to the data combiner (160).
- a random number generator (130) provides a random number for a sub-channel data encoder (150).
- Sub- channel data combiner (140) which is comprised of inputs from temporal information (141), message authentication codes (142) and user data - such as user ID data (143), is sent to the sub-channel data encoder (150).
- the sub-channel data encoder (150) has received the required or desired input for the data sub-channels.
- the sub-channel data encoder (150) now encodes the sub-channel data and sends it to the data combiner (160).
- the data combiner (160) combines the forward error corrected data with the sub-channel data. This combined data is sent to the data encrypter (170).
- the data encrypter (170) receives the data encrypter key, KE with the combined data from (160) encrypts the data and sends it to the data transmitter (180).
- Data encrypter key generator (175) produces data encryption key KE that could be a symmetric, shared or one portion of an asymmetric key pair.
- data source (1 10) has been combined with sub-channel data (150) which includes randomness so that a fully randomized and encrypted data output has been realized and transmitted through transmitter (180).
- Figure 2 is a flowchart (200) describing a device (200 A) that communicates randomized decrypted data with subchannels (RDDS) that receives randomized encrypted data with data sub-channels.
- data receiver (210) which could be cyphertext data sent to the data decrypter (220).
- Data decrypter (220) receives the combined data (210) which must be decrypted with the decrypter key (KD) in order to decrypt the data.
- KD decrypter key generator
- Data decrypter (220) which has now decrypted the data, sends the decrypted data to the forward error correction decoder (230).
- the forward error correction decoder (230) provides two data outputs. The first output is the forward error corrected data which is sent to the corrected data receiver (240). As before, the data could be in plain text form.
- the second output from the forward error correction decoder (230) sends the decrypted data to a subchannel data decoder (250).
- the sub-channel data decoder (250) decodes the sub-channel data, sending the received random number to the random number receiver (260) and the subchannel data to the sub-channel data splitter (270).
- Sub-channel data splitter (270) splits the sub-channel data into sub-channel data receivers (271 , 272, and 273) which correspond to temporal information (271), message authentication codes (272) and user data - such as user ID data (273).
- the data received from the data receiver (210) has been split into both the corrected data receiver (240) as well as the sub-channel data receivers (271 ,272, and 273) and the random number receiver (260).
- Figure 3 is a schematic (300) depicting the combination of two transceiver devices utilizing both encrypters and decrypters.
- Communication signals from a first source (310) are sent through connection (320) to the first transceiver (330).
- the first transceiver (330) securely connects encrypted data through connection (340) through an unsecured network (350).
- the second transceiver (370) securely connects encrypted data through another connection (360) through the unsecured network (350).
- Communication signals from a second source (390) are sent through connection (380) to the second transceiver (370).
- the (REDS) Encrypter (332) is controlled by the computer (331) to randomly encrypt and transmit the communication signals to the RDDS Decrypter (373) via an unsecured network (350). Encrypted signals arrive at the second transceiver (370) and are sent to the RDDS Decrypter (373) controlled by computer (371).
- RDDS Decrypter (373) decrypts the signals and sends them to the second communications source (390) through connection (380). This accomplishes sending secured signals from a first communications source (310) to a second communications source (390) by utilizing the random encryption system of the present disclosure.
- the communication signals can be conversely secured by sending them from the second communications source (390) to the first communications source (310) utilizing the REDS (372) in the second transceiver (370) as well as the RDDS Decrypter (333) in the first transceiver (330). This completes the process for securing data in transit.
- Figure 4 is a schematic diagram that illustrates devices utilized initially represented in simple block form for Figures 1,2 and 3. More specifically, Figure 4 further illustrates and demonstrates actual and various devices using exploded view callouts from that depicted in the schematic diagram shown as shown and described in Figures 1-3.
- items 350 primarily represents DASA databases.
- the list of devices associated with callouts 100A, 200A as well as 310, 330, 370, and 390 can also represent DASA database(s) as well as user devices and/or access devices including desktop or stand- alone computer terminals replete with hard drives, laptop computers, cellular or smart telephones, computer tablets such as the iPad® and even printed circuit boards or integrated circuits (ICs).
- the computer readable media described within this application is non-transitory. In most if not all cases, the transmission of data is transmitted via signals that are non- transitory signals.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
L'invention concerne au moins deux dispositifs émetteurs-récepteurs et un système. Le système utilise un ou plusieurs chiffreurs et un ou plusieurs déchiffreurs. Le système comprend : une ou plusieurs sources de communication qui assurent une ou plusieurs transmissions; et au moins un connecteur. Une ou plusieurs transmissions provenant d'une ou plusieurs sources de communication entrent dans un premier émetteur-récepteur par l'intermédiaire du connecteur et circulent jusqu'à un chiffreur de sous-canaux de données aléatoires chiffrées (REDS). Le chiffreur (REDS) envoie de manière sécurisée une ou plusieurs transmissions chiffrées à un second émetteur-récepteur. Lesdites une ou plusieurs transmissions chiffrées entrent dans un second émetteur-récepteur et sont envoyées à un déchiffreur de sous-canaux de données aléatoires déchiffrées (RDDS) qui déchiffre lesdites une ou plusieurs transmissions.
Applications Claiming Priority (10)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201762518281P | 2017-06-12 | 2017-06-12 | |
US201762518371P | 2017-06-12 | 2017-06-12 | |
US201762518337P | 2017-06-12 | 2017-06-12 | |
US62/518,337 | 2017-06-12 | ||
US62/518,371 | 2017-06-12 | ||
US62/518,281 | 2017-06-12 | ||
US201762540266P | 2017-08-02 | 2017-08-02 | |
US201762540307P | 2017-08-02 | 2017-08-02 | |
US62/540,266 | 2017-08-02 | ||
US62/540,307 | 2017-08-02 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018231760A1 true WO2018231760A1 (fr) | 2018-12-20 |
Family
ID=64659453
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2018/037006 WO2018231760A1 (fr) | 2017-06-12 | 2018-06-12 | Dispositifs de transmission et de communication de données aléatoires à l'aide de sous-canaux |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2018231760A1 (fr) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5721778A (en) * | 1994-10-28 | 1998-02-24 | Sony Corporation | Digital signal transmitting method, digital signal receiving apparatus, and recording medium |
WO2012140144A1 (fr) * | 2011-04-12 | 2012-10-18 | Telefonica, S.A. | Procédé et système pour améliorer la synchronisation de caractères chiffrés en flux |
US20140205085A1 (en) * | 2011-12-30 | 2014-07-24 | Scott Janus | Preventing pattern recognition in electronic code book encryption |
-
2018
- 2018-06-12 WO PCT/US2018/037006 patent/WO2018231760A1/fr active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5721778A (en) * | 1994-10-28 | 1998-02-24 | Sony Corporation | Digital signal transmitting method, digital signal receiving apparatus, and recording medium |
WO2012140144A1 (fr) * | 2011-04-12 | 2012-10-18 | Telefonica, S.A. | Procédé et système pour améliorer la synchronisation de caractères chiffrés en flux |
US20140205085A1 (en) * | 2011-12-30 | 2014-07-24 | Scott Janus | Preventing pattern recognition in electronic code book encryption |
Non-Patent Citations (1)
Title |
---|
"Multiple encryption", WIKIPEDIA, THE FREE ENCYCLOPEDIA, 14 May 2017 (2017-05-14), XP055563970, Retrieved from the Internet <URL:https://en.wikipedia.org/w/index.php?title=Multiple_encryption&oldid=780399982Wikipediacontributors> [retrieved on 20180821] * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10673830B2 (en) | Devices for transmitting and communicating randomized data utilizing sub-channels | |
US10187200B1 (en) | System and method for generating a multi-stage key for use in cryptographic operations | |
US8989385B2 (en) | Data encryption method, data verification method and electronic apparatus | |
CA2747891C (fr) | Procede de creation d'une cle de chiffrement/dechiffrement | |
US8688996B2 (en) | Multipad encryption | |
Oad et al. | A review: image encryption techniques and its terminologies | |
Al-Omari | Lightweight Dynamic Crypto Algorithm for Next Internet Generation. | |
Abbasi et al. | Cryptography: Security and integrity of data management | |
Albermany et al. | New random block cipher algorithm | |
Rahim et al. | Security Enhancement with USB Flash Disk as Key using AES Algorithm | |
WO2018231760A1 (fr) | Dispositifs de transmission et de communication de données aléatoires à l'aide de sous-canaux | |
Disina | Robust Caesar Cipher against frequency cryptanalysis using bi-directional shifting | |
Kabilan et al. | Implementation of SERPENT cryptographic algorithm for secured data transmission | |
Pandya et al. | Comparative analysis of encryption techniques | |
Sharma et al. | Authentication in wireless network | |
Hire | Secured wireless data communication | |
Shenets et al. | X-PACE: modified password authenticated connection establishment protocol | |
Das et al. | A Two layer secure image encryption technique | |
Mishra et al. | Comparative Study Of Efficient Data Hiding Techniques | |
Dhavalagi | Design of Secure Image Cipher for Cryptographic Applications | |
Dhavalagi et al. | Cipher Design to Secure Images for Cryptographic Applications. | |
Gupta et al. | A novel approach for product cipher encryption algorithm using circular queues | |
Pathak et al. | Towards the Proposal of Mobile Security Encryption Algorithm:“RHINO256” | |
Вишняков | ANALYSIS OF CRYPTOGRAPHIC SECURITY TOOLS AND METHODS | |
Ahmad et al. | A Survey on Comparison of Various Encryption Algorithms for secured data Communication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18817959 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 18817959 Country of ref document: EP Kind code of ref document: A1 |