Security system for SSTV encryption

Cryptography – Particular algorithmic function encoding – Nbs/des algorithm

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 21, 380 47, H04L 902, H04K 102

Patent

active

RE0331899

ABSTRACT:
In a secure communications system, a key number which is changed periodically, e.g. monthly, and a random number from a random number generator are combined and used as a seed to reset a PN sequence generator, with the output of the generator being used to control encryption of transmission data in a signal processor. The key is also provided to a first encipherer to encipher the random number for transmission with the encrypted data. At the receiver, the key is provided on common to a decipherer for deciphering the random number and a PN sequence generator which is periodically reset by the combination of the key and random number in the same manner as in the transmitter. The PN sequence is then used to decrypt the information. User identification codes are stored in the transmitter and are used to encipher the key, with each employing its ID code to decipher the key. The user ID codes are known only to the system operator, so that not even a particular user can know the key.

REFERENCES:
patent: 3238297 (1966-03-01), Pawley et al.
patent: 3649915 (1972-03-01), Mildonian, Jr.
patent: 3659046 (1972-04-01), Angeleri et al.
patent: 3717206 (1973-02-01), Zopf et al.
patent: 3733431 (1973-05-01), Kirk, Jr. et al.
patent: 3769448 (1973-10-01), Court
patent: 3801732 (1974-04-01), Reeves
patent: 3824332 (1974-07-01), Horowitz
patent: 3826863 (1974-07-01), Johnson
patent: 3852519 (1974-12-01), Court
patent: 3857997 (1974-12-01), Toonder
patent: 3911204 (1975-10-01), Spinelli
patent: 3911216 (1975-10-01), Barket et al.
patent: 3914534 (1975-10-01), Forbes
patent: 3916091 (1978-10-01), Kirk, Jr. et al.
patent: 3919462 (1975-11-01), Hartung et al.
patent: 3934079 (1976-01-01), Barnhart
patent: 3936593 (1976-02-01), Aaronson et al.
patent: 3956615 (1976-05-01), Anderson et al.
patent: 3982062 (1976-09-01), Simons
patent: 3996418 (1976-12-01), Murphy et al.
patent: 3997718 (1976-12-01), Ricketts et al.
patent: 3999005 (1976-12-01), Dickinson
patent: 4024574 (1977-05-01), Nieson
patent: 4025948 (1977-05-01), Loshin
patent: 4034402 (1977-07-01), Brian
patent: 4058830 (1977-11-01), Guinet et al.
patent: 4068264 (1978-02-01), Pires
patent: 4070693 (1978-01-01), Shutterly
patent: 4075660 (1978-02-01), Horowitz
patent: 4081831 (1978-03-01), Tang et al.
patent: 4081832 (1978-03-01), Sherman
patent: 4091413 (1978-05-01), Herman
patent: 4091417 (1978-05-01), Nieson
patent: 4104486 (1978-08-01), Martin et al.
patent: 4109281 (1978-08-01), Kanazashi et al.
patent: 4112464 (1978-09-01), Guif et al.
patent: 4115807 (1978-09-01), Pires
patent: 4118669 (1978-10-01), Fung
patent: 4126762 (1978-11-01), Martin et al.
patent: 4130833 (1978-12-01), Chomet
patent: 4148063 (1979-04-01), Chomet
patent: 4161751 (1979-07-01), Ost
patent: 4163254 (1979-07-01), Block et al.
patent: 4200770 (1980-04-01), Hellman et al.
patent: 4225884 (1980-09-01), Block et al.
patent: 4292650 (1981-09-01), Hendrickson
patent: 4310720 (1982-01-01), Check, Jr.
patent: 4317957 (1982-03-01), Sendrow
patent: 4323921 (1982-04-01), Guillou
patent: 4337483 (1982-06-01), Guillou
patent: 4354201 (1982-10-01), Sechet et al.
patent: 4365110 (1982-12-01), Lee et al.
patent: 4388643 (1983-06-01), Aminetzah
patent: 4398216 (1983-08-01), Field et al.
patent: 4405942 (1983-09-01), Block et al.
patent: 4410911 (1983-10-01), Field et al.
patent: 4484027 (1984-11-01), Lee et al.
patent: 4528589 (1985-07-01), Block et al.
patent: 4531020 (1985-07-01), Wechselberger et al.
patent: 4531021 (1985-07-01), Bluestein et al.
patent: 4600942 (1986-07-01), Field et al.
J. Everton, "Adaptation of the Basic Hierarchy for Encryption Key Management to Serve Applications With Conflicting Requirements," IEEE, 1979, pp. 186-191.
F. Heinrich, "The Network Security Center: A System Level Approach to Computer Security", National Bureau of Standards Special Publication 500-21, vol. 1, Jan. 1978.
S. Kent, "Encryption-Based Protection Protocols for Interactive User-Computer Communication," NTIS Technical Report 162, May 1976.
S. Kent, "Security Requirements and Protocols for a Broadcast Scenario," IEEE Transactions on Communications, vol. COM-29, No. 6, Jun. '81, pp. 778-786.
I. Ingemarson et al, "Encryption and Authentication in On-Board Processing Satellite Communication Systems," IEEE Transactions on Communications, vol. COM-29, No. 11, Nov. 1981, pp. 1684-1687.
M. Sendrow, "A Method of Authentication in EFT Networks Using DES Without Downline Loading of Working Keys," 1980, IEEE, pp. 168-175.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Security system for SSTV encryption does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Security system for SSTV encryption, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security system for SSTV encryption will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1640922

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.