CA2437500A1 - Data encryption system - Google Patents

Data encryption system Download PDF

Info

Publication number
CA2437500A1
CA2437500A1 CA002437500A CA2437500A CA2437500A1 CA 2437500 A1 CA2437500 A1 CA 2437500A1 CA 002437500 A CA002437500 A CA 002437500A CA 2437500 A CA2437500 A CA 2437500A CA 2437500 A1 CA2437500 A1 CA 2437500A1
Authority
CA
Canada
Prior art keywords
encryption
plain
character
characters
decryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA002437500A
Other languages
French (fr)
Other versions
CA2437500C (en
Inventor
Kevin M. Henson
Eric Myron Smith
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2437500A1 publication Critical patent/CA2437500A1/en
Application granted granted Critical
Publication of CA2437500C publication Critical patent/CA2437500C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C1/00Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
    • G09C1/02Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system by using a ciphering code in chart form
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/20Manipulating the length of blocks of bits, e.g. padding or block truncation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/24Key scheduling, i.e. generating round keys or sub-keys for block encryption

Abstract

A system (100) and method (400, 500) for data encryption and decryption are disclosed. The encryption system is operable at encryption rates in excess of 10 Mbps and is expandable to over 200Mbps. For encryption, plain characters are received, and a key block (120) includes key characters corresponding to the plain characters is accessed. A current key character corresponding to a current plain character is located. A next key character corresponding to a next plain character is located. An offset between the current key character and the next key character is determined to encrypt the plain characters. Aliases are used to facilitate the encryption and decryption. Vector distances of offsets are utilized for the encryption and decryption, using many variables and many dimensions, such as using coordinates.
CA002437500A 2001-02-02 2001-05-15 Data encryption system Expired - Fee Related CA2437500C (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US26640001P 2001-02-02 2001-02-02
US60/266,400 2001-02-02
PCT/US2001/040737 WO2002063592A2 (en) 2001-02-02 2001-05-15 Data encryption system using key matrix

Publications (2)

Publication Number Publication Date
CA2437500A1 true CA2437500A1 (en) 2002-08-15
CA2437500C CA2437500C (en) 2006-02-21

Family

ID=23014417

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002437500A Expired - Fee Related CA2437500C (en) 2001-02-02 2001-05-15 Data encryption system

Country Status (7)

Country Link
US (5) US20020131590A1 (en)
EP (1) EP1410558B1 (en)
AT (1) ATE300134T1 (en)
AU (1) AU2001259860B2 (en)
CA (1) CA2437500C (en)
DE (1) DE60112130T2 (en)
WO (1) WO2002063592A2 (en)

Families Citing this family (60)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7418098B1 (en) * 2000-11-27 2008-08-26 Protegrity Corporation Data type preserving encryption
US20020131590A1 (en) * 2001-02-02 2002-09-19 Henson Kevin M. Key matrix methodology
US7016493B2 (en) * 2001-03-01 2006-03-21 Asier Technology Corporation Key matrix system
GB2373074B (en) * 2001-03-10 2004-10-13 Ibm A method and apparatus for storage of security keys and certificates
DE60130902T2 (en) * 2001-11-23 2008-07-17 Protegrity Research & Development Method for detecting intrusion into a database system
US20030149876A1 (en) * 2002-02-01 2003-08-07 Secure Choice Llc Method and system for performing perfectly secure key exchange and authenticated messaging
US7826466B2 (en) 2002-06-26 2010-11-02 Atheros Communications, Inc. Communication buffer scheme optimized for VoIP, QoS and data networking over a power line
US8149703B2 (en) 2002-06-26 2012-04-03 Qualcomm Atheros, Inc. Powerline network bridging congestion control
US20040120521A1 (en) * 2002-10-10 2004-06-24 Henson Kevin M. Method and system for data encryption and decryption
US20040148356A1 (en) * 2002-11-04 2004-07-29 Bishop James William System and method for private messaging
US7383586B2 (en) 2003-01-17 2008-06-03 Microsoft Corporation File system operation and digital rights management (DRM)
US8213601B2 (en) * 2003-02-07 2012-07-03 Patrick Zuili Font level encryption method and apparatus
US8666065B2 (en) * 2003-02-07 2014-03-04 Britesmart Llc Real-time data encryption
US8064474B2 (en) * 2003-03-20 2011-11-22 Qualcomm Atheros, Inc. Method and apparatus for selecting a responder to enable reliable multicast
US7281187B2 (en) * 2003-11-20 2007-10-09 Intellon Corporation Using error checking bits to communicated an address or other bits
US7684568B2 (en) * 2003-11-24 2010-03-23 Intellon Corporation Encrypting data in a communication network
US8090857B2 (en) 2003-11-24 2012-01-03 Qualcomm Atheros, Inc. Medium access control layer that encapsulates data from a plurality of received data units into a plurality of independently transmittable blocks
US7660327B2 (en) 2004-02-03 2010-02-09 Atheros Communications, Inc. Temporary priority promotion for network communications in which access to a shared medium depends on a priority level
ATE532142T1 (en) * 2004-03-16 2011-11-15 Microdasys Inc CONTENT MONITORING FOR XML
US7422152B2 (en) 2004-05-13 2008-09-09 Cisco Technology, Inc. Methods and devices for providing scalable RFID networks
CN101019367A (en) * 2004-09-14 2007-08-15 P·普拉拉德·辛加纳马拉 Method and system for computational transformation
US7509431B2 (en) * 2004-11-17 2009-03-24 Cisco Technology, Inc. Performing message and transformation adapter functions in a network element on behalf of an application
US7664879B2 (en) 2004-11-23 2010-02-16 Cisco Technology, Inc. Caching content and state data at a network element
US7987272B2 (en) 2004-12-06 2011-07-26 Cisco Technology, Inc. Performing message payload processing functions in a network element on behalf of an application
US7725934B2 (en) * 2004-12-07 2010-05-25 Cisco Technology, Inc. Network and application attack protection based on application layer message inspection
US7496750B2 (en) 2004-12-07 2009-02-24 Cisco Technology, Inc. Performing security functions on a message payload in a network element
US8082304B2 (en) 2004-12-10 2011-12-20 Cisco Technology, Inc. Guaranteed delivery of application layer messages by a network element
US7606267B2 (en) * 2004-12-10 2009-10-20 Cisco Technology, Inc. Reducing the sizes of application layer messages in a network element
US7551567B2 (en) * 2005-01-05 2009-06-23 Cisco Technology, Inc. Interpreting an application message at a network element using sampling and heuristics
US20060155862A1 (en) * 2005-01-06 2006-07-13 Hari Kathi Data traffic load balancing based on application layer messages
US7698416B2 (en) * 2005-01-25 2010-04-13 Cisco Technology, Inc. Application layer message-based server failover management by a network element
US7725715B2 (en) * 2005-02-24 2010-05-25 Access Business Group International Llc System and method for three-phase data encryption
US7602911B2 (en) * 2005-03-14 2009-10-13 Microsoft Corporation Method and system for enhancing cryptography-based security
US9787471B1 (en) * 2005-06-02 2017-10-10 Robert T. Jenkins and Virginia T. Jenkins Data enciphering or deciphering using a hierarchical assignment system
US7953826B2 (en) 2005-07-14 2011-05-31 Cisco Technology, Inc. Provisioning and redundancy for RFID middleware servers
US8175190B2 (en) 2005-07-27 2012-05-08 Qualcomm Atheros, Inc. Managing spectra of modulated signals in a communication network
US7345585B2 (en) 2005-08-01 2008-03-18 Cisco Technology, Inc. Network based device for providing RFID middleware functionality
US7853018B2 (en) * 2005-11-10 2010-12-14 Atallah Mikhail J Method and apparatus for hiding a private key
US8698603B2 (en) 2005-11-15 2014-04-15 Cisco Technology, Inc. Methods and systems for automatic device provisioning in an RFID network using IP multicast
US8868930B2 (en) 2006-05-31 2014-10-21 International Business Machines Corporation Systems and methods for transformation of logical data objects for storage
EP2033128A4 (en) * 2006-05-31 2012-08-15 Ibm Method and system for transformation of logical data objects for storage
US7792301B2 (en) * 2006-06-29 2010-09-07 Microsoft Corporation Access control and encryption in multi-user systems
US8396221B2 (en) * 2006-12-21 2013-03-12 Oracle International Corporation Secure broadcasting and multicasting
US9059838B2 (en) * 2007-03-30 2015-06-16 Verizon Patent And Licensing Inc. Encryption algorithm with randomized buffer
US20090103726A1 (en) * 2007-10-18 2009-04-23 Nabeel Ahmed Dual-mode variable key length cryptography system
US8225106B2 (en) 2008-04-02 2012-07-17 Protegrity Corporation Differential encryption utilizing trust modes
CN101661546B (en) * 2008-08-28 2012-12-19 深圳富泰宏精密工业有限公司 System and method for file encryption therein in hand-held mobile electronic device
US8364984B2 (en) 2009-03-13 2013-01-29 Microsoft Corporation Portable secure data files
US8819451B2 (en) * 2009-05-28 2014-08-26 Microsoft Corporation Techniques for representing keywords in an encrypted search index to prevent histogram-based attacks
US8958554B2 (en) * 2009-11-30 2015-02-17 Red Hat, Inc. Unicode-compatible stream cipher
US9058497B2 (en) 2010-12-23 2015-06-16 Microsoft Technology Licensing, Llc Cryptographic key management
US20130254553A1 (en) * 2012-03-24 2013-09-26 Paul L. Greene Digital data authentication and security system
US9673983B2 (en) 2012-09-14 2017-06-06 Qualcomm Incorporated Apparatus and method for protecting message data
WO2014135989A2 (en) 2013-03-06 2014-09-12 Assa Abloy Ab Localized pin management with reader verification and no disclosure
EP3104364B1 (en) * 2014-02-03 2019-05-08 A.T Communications Co., Ltd. Sentence recognition device, sentence recognition method, and program
RU2600100C2 (en) * 2014-07-29 2016-10-20 Федеральное государственное бюджетное образовательное учреждение высшего профессионального образования "Амурский государственный университет" Method of coding information
KR101689165B1 (en) * 2015-03-12 2016-12-23 권오헌 Apparatus and method for encrypting data using image
US9692598B2 (en) * 2015-08-07 2017-06-27 Terry L. Davis Multi-use long string authentication keys
US10277561B2 (en) * 2016-07-22 2019-04-30 International Business Machines Corporation Database management system shared ledger support
CN111241606B (en) * 2020-01-21 2021-03-23 北京连山科技股份有限公司 One drags three mobile storage device

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4809327A (en) * 1986-09-02 1989-02-28 Unisys Corporation Encrtption of messages employing unique control words and randomly chosen encryption keys
GB9015799D0 (en) * 1990-07-18 1991-06-12 Plessey Telecomm A data communication system
US5245658A (en) * 1992-01-06 1993-09-14 George Bush Domain-based encryption
US5438622A (en) * 1994-01-21 1995-08-01 Apple Computer, Inc. Method and apparatus for improving the security of an electronic codebook encryption scheme utilizing an offset in the pseudorandom sequence
DE69532434T2 (en) * 1994-10-27 2004-11-11 Mitsubishi Corp. Device for file copyright management system
US5799090A (en) * 1995-09-25 1998-08-25 Angert; Joseph C. pad encryption method and software
US5991403A (en) * 1996-12-23 1999-11-23 Intel Corporation Recoverable cryptographic transformation on YUV data suitable for compressions
US6885747B1 (en) * 1997-02-13 2005-04-26 Tec.Sec, Inc. Cryptographic key split combiner
US6373948B1 (en) * 1997-08-15 2002-04-16 Lucent Technologies Inc. Cryptographic method and apparatus for restricting access to transmitted programming content using program identifiers
US7095852B2 (en) * 1998-02-13 2006-08-22 Tecsec, Inc. Cryptographic key split binder for use with tagged data elements
US6118873A (en) * 1998-04-24 2000-09-12 International Business Machines Corporation System for encrypting broadcast programs in the presence of compromised receiver devices
US6363480B1 (en) * 1999-09-14 2002-03-26 Sun Microsystems, Inc. Ephemeral decryptability
US6891951B2 (en) * 2000-01-21 2005-05-10 Victor Company Of Japan, Ltd. Cryptosystem-related method and apparatus
JP2001211153A (en) * 2000-01-25 2001-08-03 Murata Mach Ltd Secret key generating method
US6922472B2 (en) * 2000-05-05 2005-07-26 Teleputers, Llc Method and system for performing permutations using permutation instructions based on butterfly networks
FR2814009B1 (en) 2000-09-14 2003-01-31 Jean Roland Riviere METHOD AND DEVICE FOR TRANSFORMING CONVOLUTIVE DATA AND VARIABLE OFFSETS, AND SYSTEMS IMPLEMENTING THE SAME
US20020131590A1 (en) * 2001-02-02 2002-09-19 Henson Kevin M. Key matrix methodology
US7016493B2 (en) 2001-03-01 2006-03-21 Asier Technology Corporation Key matrix system

Also Published As

Publication number Publication date
US20020141574A1 (en) 2002-10-03
US20020136403A1 (en) 2002-09-26
DE60112130D1 (en) 2005-08-25
WO2002063592A2 (en) 2002-08-15
DE60112130T2 (en) 2006-06-08
US20020131591A1 (en) 2002-09-19
US20020131590A1 (en) 2002-09-19
US6950518B2 (en) 2005-09-27
US20020141573A1 (en) 2002-10-03
AU2001259860B2 (en) 2007-02-15
US6996234B2 (en) 2006-02-07
EP1410558A2 (en) 2004-04-21
EP1410558B1 (en) 2005-07-20
CA2437500C (en) 2006-02-21
WO2002063592A3 (en) 2003-09-18
US7003108B2 (en) 2006-02-21
US7016497B2 (en) 2006-03-21
ATE300134T1 (en) 2005-08-15

Similar Documents

Publication Publication Date Title
CA2437500A1 (en) Data encryption system
WO2002047401A3 (en) Method of receiving specific information at a mobile terminal
EP0977452A3 (en) Method for updating secret shared data in a wireless communication system
EP1035684A3 (en) Cryptographic communication system
EP1045320A3 (en) Contents sale system
EP2461517A3 (en) Communication apparatus and communication system
SG124293A1 (en) Block cipher apparatus using auxiliary transformation
WO2003034409A3 (en) A method, system and computer program product for secure ticketing in a communications device
WO2002043309A3 (en) Cryptographic data security system and method
WO2004084424A3 (en) Authentication between a cdma network and a gsm network
EP1182825A3 (en) Transferring copyright protected contents using radio link layer authentication/encryption
EP1154373A3 (en) Information code product, manufacturing device and method for manufacturing the same, information code reading device, authentication system, authentication terminal, authentication server, and authentication method
WO2003026207A3 (en) Method and system for secure distribution of digital documents
GB0218188D0 (en) Methods and arrangements applicable to exhibition spaces
EP0856968A3 (en) Encryption key processing system to be incorporated into data recovery system or key setting system for generating encryption key
WO2003075125A3 (en) Location aware data network
EP0994426A3 (en) Method and medium for rendering documents by server
EP1406222A3 (en) Method of authentication and payment, operation method of an authentication and payment system, terminal device, service providing device, authentication and payment device, and control information providing device
EP1233576A3 (en) Method and apparatus for accessing data
EP1073021A3 (en) Information processing apparatus, card and information processing system
EP1150452A3 (en) Authentication system, authentication method, authentication apparatus, and authentication method therefor
EP1017223A3 (en) System for authenticating digital data
EP1187419A3 (en) User authentication system and method
GB2407743A (en) Method and apparatus for augmenting authentication in a cryptographic system
EP1237312A3 (en) Data mapper and method for flexible mapping of control and data information within a sonet payload

Legal Events

Date Code Title Description
EEER Examination request
MKLA Lapsed

Effective date: 20180515