Cryptography – Particular algorithmic function encoding – Nbs/des algorithm
Patent
1989-09-18
1990-03-27
Cangialosi, Salvatore
Cryptography
Particular algorithmic function encoding
Nbs/des algorithm
380 21, 380 47, H04L 902, H04K 102
Patent
active
RE0331899
ABSTRACT:
In a secure communications system, a key number which is changed periodically, e.g. monthly, and a random number from a random number generator are combined and used as a seed to reset a PN sequence generator, with the output of the generator being used to control encryption of transmission data in a signal processor. The key is also provided to a first encipherer to encipher the random number for transmission with the encrypted data. At the receiver, the key is provided on common to a decipherer for deciphering the random number and a PN sequence generator which is periodically reset by the combination of the key and random number in the same manner as in the transmitter. The PN sequence is then used to decrypt the information. User identification codes are stored in the transmitter and are used to encipher the key, with each employing its ID code to decipher the key. The user ID codes are known only to the system operator, so that not even a particular user can know the key.
REFERENCES:
patent: 3238297 (1966-03-01), Pawley et al.
patent: 3649915 (1972-03-01), Mildonian, Jr.
patent: 3659046 (1972-04-01), Angeleri et al.
patent: 3717206 (1973-02-01), Zopf et al.
patent: 3733431 (1973-05-01), Kirk, Jr. et al.
patent: 3769448 (1973-10-01), Court
patent: 3801732 (1974-04-01), Reeves
patent: 3824332 (1974-07-01), Horowitz
patent: 3826863 (1974-07-01), Johnson
patent: 3852519 (1974-12-01), Court
patent: 3857997 (1974-12-01), Toonder
patent: 3911204 (1975-10-01), Spinelli
patent: 3911216 (1975-10-01), Barket et al.
patent: 3914534 (1975-10-01), Forbes
patent: 3916091 (1978-10-01), Kirk, Jr. et al.
patent: 3919462 (1975-11-01), Hartung et al.
patent: 3934079 (1976-01-01), Barnhart
patent: 3936593 (1976-02-01), Aaronson et al.
patent: 3956615 (1976-05-01), Anderson et al.
patent: 3982062 (1976-09-01), Simons
patent: 3996418 (1976-12-01), Murphy et al.
patent: 3997718 (1976-12-01), Ricketts et al.
patent: 3999005 (1976-12-01), Dickinson
patent: 4024574 (1977-05-01), Nieson
patent: 4025948 (1977-05-01), Loshin
patent: 4034402 (1977-07-01), Brian
patent: 4058830 (1977-11-01), Guinet et al.
patent: 4068264 (1978-02-01), Pires
patent: 4070693 (1978-01-01), Shutterly
patent: 4075660 (1978-02-01), Horowitz
patent: 4081831 (1978-03-01), Tang et al.
patent: 4081832 (1978-03-01), Sherman
patent: 4091413 (1978-05-01), Herman
patent: 4091417 (1978-05-01), Nieson
patent: 4104486 (1978-08-01), Martin et al.
patent: 4109281 (1978-08-01), Kanazashi et al.
patent: 4112464 (1978-09-01), Guif et al.
patent: 4115807 (1978-09-01), Pires
patent: 4118669 (1978-10-01), Fung
patent: 4126762 (1978-11-01), Martin et al.
patent: 4130833 (1978-12-01), Chomet
patent: 4148063 (1979-04-01), Chomet
patent: 4161751 (1979-07-01), Ost
patent: 4163254 (1979-07-01), Block et al.
patent: 4200770 (1980-04-01), Hellman et al.
patent: 4225884 (1980-09-01), Block et al.
patent: 4292650 (1981-09-01), Hendrickson
patent: 4310720 (1982-01-01), Check, Jr.
patent: 4317957 (1982-03-01), Sendrow
patent: 4323921 (1982-04-01), Guillou
patent: 4337483 (1982-06-01), Guillou
patent: 4354201 (1982-10-01), Sechet et al.
patent: 4365110 (1982-12-01), Lee et al.
patent: 4388643 (1983-06-01), Aminetzah
patent: 4398216 (1983-08-01), Field et al.
patent: 4405942 (1983-09-01), Block et al.
patent: 4410911 (1983-10-01), Field et al.
patent: 4484027 (1984-11-01), Lee et al.
patent: 4528589 (1985-07-01), Block et al.
patent: 4531020 (1985-07-01), Wechselberger et al.
patent: 4531021 (1985-07-01), Bluestein et al.
patent: 4600942 (1986-07-01), Field et al.
J. Everton, "Adaptation of the Basic Hierarchy for Encryption Key Management to Serve Applications With Conflicting Requirements," IEEE, 1979, pp. 186-191.
F. Heinrich, "The Network Security Center: A System Level Approach to Computer Security", National Bureau of Standards Special Publication 500-21, vol. 1, Jan. 1978.
S. Kent, "Encryption-Based Protection Protocols for Interactive User-Computer Communication," NTIS Technical Report 162, May 1976.
S. Kent, "Security Requirements and Protocols for a Broadcast Scenario," IEEE Transactions on Communications, vol. COM-29, No. 6, Jun. '81, pp. 778-786.
I. Ingemarson et al, "Encryption and Authentication in On-Board Processing Satellite Communication Systems," IEEE Transactions on Communications, vol. COM-29, No. 11, Nov. 1981, pp. 1684-1687.
M. Sendrow, "A Method of Authentication in EFT Networks Using DES Without Downline Loading of Working Keys," 1980, IEEE, pp. 168-175.
Fang Russell J.
Lee Lin-nan
Cangialosi Salvatore
Communications Satellite Corporation
LandOfFree
Security system for SSTV encryption does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Security system for SSTV encryption, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security system for SSTV encryption will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1640922