Cryptography – Particular algorithmic function encoding
Patent
1998-02-07
2000-09-26
Hayes, Gail O.
Cryptography
Particular algorithmic function encoding
380 37, 380 42, H04K 100, H04L 928
Patent
active
061251828
ABSTRACT:
Apparatus and method for encrypting and decrypting using permutation, concatenation and decatenation together with rotation and arithmetic and logic combining with elements or digits or characters from random, pseudo-random, or arbitrary sources wherein the plaintext may be partitioned, block-by-block, the block size being a user selectable power of 2 in size. The data bytes in the input block are selected M bytes at a time, where M.gtoreq.2, with permuted addressing to form a single concatenated data byte, CDB. The CDB is modified by rotating (or barrel shifting) a random bit distance. The CDB may also be modified before or after rotation by simple arithmetic/logic operations. After modification, the CDB is broken up into M bytes and each of the M bytes is placed into the output block with permuted addressing. The output block, or ciphertext, may again be used as an input block and the process repeated with a new output block. This scheme may be used as an encryption method by itself or in conjunction other block encryption methods. The latter may be accomplished by using this scheme between successive stages of other encryption methods on blocked data, or between an internal stage of these other methods. The sources of random numbers used to determine the distance for the random rotation operation can be from: a pseudo-random number generator, sampled music CD-ROMs, entries in tables, arrays, buffers, or any other digital source.
REFERENCES:
patent: 4751733 (1988-06-01), Delayaye et al.
patent: 5001753 (1991-03-01), Davio et al.
patent: 5077793 (1991-12-01), Falk et al.
patent: 5113444 (1992-05-01), Vobach
patent: 5307412 (1994-04-01), Vobach
patent: 5412429 (1995-05-01), Liu
Excerpts from the books:
A. Applied Cryptography, Second Edition, by Bruce Schneier, 1996, pp. 13-15, and 304-306.
B. Cryptography: An Introduction to Computer Security, by Jennifer Seberry and Josef Pierprzyk, 1989, pp. 70 and 71; and.
C. Crytography and Secure Communications, by Man Yound Rhee, 1994, pp. 12, and 13.
Neal Koblitz, Number Theory and Cryptography, 2e, pp. 1-2, 65-76, 1994.
Bruce Schneier, Applied Cryptography, 2e, pp. 10-13, 189-211, 242-254, 304-306, 423-428, 1996.
Michael E. Marotta, The Code Book, All About Unbreakable Codes and How to Use Them, pp. 32-36, 1983.
Channel One Communications, Inc.
Hayes Gail O.
Seal James
LandOfFree
Cryptographic engine using logic and base conversions does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Cryptographic engine using logic and base conversions, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cryptographic engine using logic and base conversions will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2106832