CA2437500A1 - Data encryption system - Google Patents
Data encryption system Download PDFInfo
- Publication number
- CA2437500A1 CA2437500A1 CA002437500A CA2437500A CA2437500A1 CA 2437500 A1 CA2437500 A1 CA 2437500A1 CA 002437500 A CA002437500 A CA 002437500A CA 2437500 A CA2437500 A CA 2437500A CA 2437500 A1 CA2437500 A1 CA 2437500A1
- Authority
- CA
- Canada
- Prior art keywords
- encryption
- plain
- character
- characters
- decryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C1/00—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
- G09C1/02—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system by using a ciphering code in chart form
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/20—Manipulating the length of blocks of bits, e.g. padding or block truncation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/24—Key scheduling, i.e. generating round keys or sub-keys for block encryption
Abstract
A system (100) and method (400, 500) for data encryption and decryption are disclosed. The encryption system is operable at encryption rates in excess of 10 Mbps and is expandable to over 200Mbps. For encryption, plain characters are received, and a key block (120) includes key characters corresponding to the plain characters is accessed. A current key character corresponding to a current plain character is located. A next key character corresponding to a next plain character is located. An offset between the current key character and the next key character is determined to encrypt the plain characters. Aliases are used to facilitate the encryption and decryption. Vector distances of offsets are utilized for the encryption and decryption, using many variables and many dimensions, such as using coordinates.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US26640001P | 2001-02-02 | 2001-02-02 | |
US60/266,400 | 2001-02-02 | ||
PCT/US2001/040737 WO2002063592A2 (en) | 2001-02-02 | 2001-05-15 | Data encryption system using key matrix |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2437500A1 true CA2437500A1 (en) | 2002-08-15 |
CA2437500C CA2437500C (en) | 2006-02-21 |
Family
ID=23014417
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002437500A Expired - Fee Related CA2437500C (en) | 2001-02-02 | 2001-05-15 | Data encryption system |
Country Status (7)
Country | Link |
---|---|
US (5) | US20020131590A1 (en) |
EP (1) | EP1410558B1 (en) |
AT (1) | ATE300134T1 (en) |
AU (1) | AU2001259860B2 (en) |
CA (1) | CA2437500C (en) |
DE (1) | DE60112130T2 (en) |
WO (1) | WO2002063592A2 (en) |
Families Citing this family (60)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7418098B1 (en) * | 2000-11-27 | 2008-08-26 | Protegrity Corporation | Data type preserving encryption |
US20020131590A1 (en) * | 2001-02-02 | 2002-09-19 | Henson Kevin M. | Key matrix methodology |
US7016493B2 (en) * | 2001-03-01 | 2006-03-21 | Asier Technology Corporation | Key matrix system |
GB2373074B (en) * | 2001-03-10 | 2004-10-13 | Ibm | A method and apparatus for storage of security keys and certificates |
DE60130902T2 (en) * | 2001-11-23 | 2008-07-17 | Protegrity Research & Development | Method for detecting intrusion into a database system |
US20030149876A1 (en) * | 2002-02-01 | 2003-08-07 | Secure Choice Llc | Method and system for performing perfectly secure key exchange and authenticated messaging |
US7826466B2 (en) | 2002-06-26 | 2010-11-02 | Atheros Communications, Inc. | Communication buffer scheme optimized for VoIP, QoS and data networking over a power line |
US8149703B2 (en) | 2002-06-26 | 2012-04-03 | Qualcomm Atheros, Inc. | Powerline network bridging congestion control |
US20040120521A1 (en) * | 2002-10-10 | 2004-06-24 | Henson Kevin M. | Method and system for data encryption and decryption |
US20040148356A1 (en) * | 2002-11-04 | 2004-07-29 | Bishop James William | System and method for private messaging |
US7383586B2 (en) | 2003-01-17 | 2008-06-03 | Microsoft Corporation | File system operation and digital rights management (DRM) |
US8213601B2 (en) * | 2003-02-07 | 2012-07-03 | Patrick Zuili | Font level encryption method and apparatus |
US8666065B2 (en) * | 2003-02-07 | 2014-03-04 | Britesmart Llc | Real-time data encryption |
US8064474B2 (en) * | 2003-03-20 | 2011-11-22 | Qualcomm Atheros, Inc. | Method and apparatus for selecting a responder to enable reliable multicast |
US7281187B2 (en) * | 2003-11-20 | 2007-10-09 | Intellon Corporation | Using error checking bits to communicated an address or other bits |
US7684568B2 (en) * | 2003-11-24 | 2010-03-23 | Intellon Corporation | Encrypting data in a communication network |
US8090857B2 (en) | 2003-11-24 | 2012-01-03 | Qualcomm Atheros, Inc. | Medium access control layer that encapsulates data from a plurality of received data units into a plurality of independently transmittable blocks |
US7660327B2 (en) | 2004-02-03 | 2010-02-09 | Atheros Communications, Inc. | Temporary priority promotion for network communications in which access to a shared medium depends on a priority level |
ATE532142T1 (en) * | 2004-03-16 | 2011-11-15 | Microdasys Inc | CONTENT MONITORING FOR XML |
US7422152B2 (en) | 2004-05-13 | 2008-09-09 | Cisco Technology, Inc. | Methods and devices for providing scalable RFID networks |
CN101019367A (en) * | 2004-09-14 | 2007-08-15 | P·普拉拉德·辛加纳马拉 | Method and system for computational transformation |
US7509431B2 (en) * | 2004-11-17 | 2009-03-24 | Cisco Technology, Inc. | Performing message and transformation adapter functions in a network element on behalf of an application |
US7664879B2 (en) | 2004-11-23 | 2010-02-16 | Cisco Technology, Inc. | Caching content and state data at a network element |
US7987272B2 (en) | 2004-12-06 | 2011-07-26 | Cisco Technology, Inc. | Performing message payload processing functions in a network element on behalf of an application |
US7725934B2 (en) * | 2004-12-07 | 2010-05-25 | Cisco Technology, Inc. | Network and application attack protection based on application layer message inspection |
US7496750B2 (en) | 2004-12-07 | 2009-02-24 | Cisco Technology, Inc. | Performing security functions on a message payload in a network element |
US8082304B2 (en) | 2004-12-10 | 2011-12-20 | Cisco Technology, Inc. | Guaranteed delivery of application layer messages by a network element |
US7606267B2 (en) * | 2004-12-10 | 2009-10-20 | Cisco Technology, Inc. | Reducing the sizes of application layer messages in a network element |
US7551567B2 (en) * | 2005-01-05 | 2009-06-23 | Cisco Technology, Inc. | Interpreting an application message at a network element using sampling and heuristics |
US20060155862A1 (en) * | 2005-01-06 | 2006-07-13 | Hari Kathi | Data traffic load balancing based on application layer messages |
US7698416B2 (en) * | 2005-01-25 | 2010-04-13 | Cisco Technology, Inc. | Application layer message-based server failover management by a network element |
US7725715B2 (en) * | 2005-02-24 | 2010-05-25 | Access Business Group International Llc | System and method for three-phase data encryption |
US7602911B2 (en) * | 2005-03-14 | 2009-10-13 | Microsoft Corporation | Method and system for enhancing cryptography-based security |
US9787471B1 (en) * | 2005-06-02 | 2017-10-10 | Robert T. Jenkins and Virginia T. Jenkins | Data enciphering or deciphering using a hierarchical assignment system |
US7953826B2 (en) | 2005-07-14 | 2011-05-31 | Cisco Technology, Inc. | Provisioning and redundancy for RFID middleware servers |
US8175190B2 (en) | 2005-07-27 | 2012-05-08 | Qualcomm Atheros, Inc. | Managing spectra of modulated signals in a communication network |
US7345585B2 (en) | 2005-08-01 | 2008-03-18 | Cisco Technology, Inc. | Network based device for providing RFID middleware functionality |
US7853018B2 (en) * | 2005-11-10 | 2010-12-14 | Atallah Mikhail J | Method and apparatus for hiding a private key |
US8698603B2 (en) | 2005-11-15 | 2014-04-15 | Cisco Technology, Inc. | Methods and systems for automatic device provisioning in an RFID network using IP multicast |
US8868930B2 (en) | 2006-05-31 | 2014-10-21 | International Business Machines Corporation | Systems and methods for transformation of logical data objects for storage |
EP2033128A4 (en) * | 2006-05-31 | 2012-08-15 | Ibm | Method and system for transformation of logical data objects for storage |
US7792301B2 (en) * | 2006-06-29 | 2010-09-07 | Microsoft Corporation | Access control and encryption in multi-user systems |
US8396221B2 (en) * | 2006-12-21 | 2013-03-12 | Oracle International Corporation | Secure broadcasting and multicasting |
US9059838B2 (en) * | 2007-03-30 | 2015-06-16 | Verizon Patent And Licensing Inc. | Encryption algorithm with randomized buffer |
US20090103726A1 (en) * | 2007-10-18 | 2009-04-23 | Nabeel Ahmed | Dual-mode variable key length cryptography system |
US8225106B2 (en) | 2008-04-02 | 2012-07-17 | Protegrity Corporation | Differential encryption utilizing trust modes |
CN101661546B (en) * | 2008-08-28 | 2012-12-19 | 深圳富泰宏精密工业有限公司 | System and method for file encryption therein in hand-held mobile electronic device |
US8364984B2 (en) | 2009-03-13 | 2013-01-29 | Microsoft Corporation | Portable secure data files |
US8819451B2 (en) * | 2009-05-28 | 2014-08-26 | Microsoft Corporation | Techniques for representing keywords in an encrypted search index to prevent histogram-based attacks |
US8958554B2 (en) * | 2009-11-30 | 2015-02-17 | Red Hat, Inc. | Unicode-compatible stream cipher |
US9058497B2 (en) | 2010-12-23 | 2015-06-16 | Microsoft Technology Licensing, Llc | Cryptographic key management |
US20130254553A1 (en) * | 2012-03-24 | 2013-09-26 | Paul L. Greene | Digital data authentication and security system |
US9673983B2 (en) | 2012-09-14 | 2017-06-06 | Qualcomm Incorporated | Apparatus and method for protecting message data |
WO2014135989A2 (en) | 2013-03-06 | 2014-09-12 | Assa Abloy Ab | Localized pin management with reader verification and no disclosure |
EP3104364B1 (en) * | 2014-02-03 | 2019-05-08 | A.T Communications Co., Ltd. | Sentence recognition device, sentence recognition method, and program |
RU2600100C2 (en) * | 2014-07-29 | 2016-10-20 | Федеральное государственное бюджетное образовательное учреждение высшего профессионального образования "Амурский государственный университет" | Method of coding information |
KR101689165B1 (en) * | 2015-03-12 | 2016-12-23 | 권오헌 | Apparatus and method for encrypting data using image |
US9692598B2 (en) * | 2015-08-07 | 2017-06-27 | Terry L. Davis | Multi-use long string authentication keys |
US10277561B2 (en) * | 2016-07-22 | 2019-04-30 | International Business Machines Corporation | Database management system shared ledger support |
CN111241606B (en) * | 2020-01-21 | 2021-03-23 | 北京连山科技股份有限公司 | One drags three mobile storage device |
Family Cites Families (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4809327A (en) * | 1986-09-02 | 1989-02-28 | Unisys Corporation | Encrtption of messages employing unique control words and randomly chosen encryption keys |
GB9015799D0 (en) * | 1990-07-18 | 1991-06-12 | Plessey Telecomm | A data communication system |
US5245658A (en) * | 1992-01-06 | 1993-09-14 | George Bush | Domain-based encryption |
US5438622A (en) * | 1994-01-21 | 1995-08-01 | Apple Computer, Inc. | Method and apparatus for improving the security of an electronic codebook encryption scheme utilizing an offset in the pseudorandom sequence |
DE69532434T2 (en) * | 1994-10-27 | 2004-11-11 | Mitsubishi Corp. | Device for file copyright management system |
US5799090A (en) * | 1995-09-25 | 1998-08-25 | Angert; Joseph C. | pad encryption method and software |
US5991403A (en) * | 1996-12-23 | 1999-11-23 | Intel Corporation | Recoverable cryptographic transformation on YUV data suitable for compressions |
US6885747B1 (en) * | 1997-02-13 | 2005-04-26 | Tec.Sec, Inc. | Cryptographic key split combiner |
US6373948B1 (en) * | 1997-08-15 | 2002-04-16 | Lucent Technologies Inc. | Cryptographic method and apparatus for restricting access to transmitted programming content using program identifiers |
US7095852B2 (en) * | 1998-02-13 | 2006-08-22 | Tecsec, Inc. | Cryptographic key split binder for use with tagged data elements |
US6118873A (en) * | 1998-04-24 | 2000-09-12 | International Business Machines Corporation | System for encrypting broadcast programs in the presence of compromised receiver devices |
US6363480B1 (en) * | 1999-09-14 | 2002-03-26 | Sun Microsystems, Inc. | Ephemeral decryptability |
US6891951B2 (en) * | 2000-01-21 | 2005-05-10 | Victor Company Of Japan, Ltd. | Cryptosystem-related method and apparatus |
JP2001211153A (en) * | 2000-01-25 | 2001-08-03 | Murata Mach Ltd | Secret key generating method |
US6922472B2 (en) * | 2000-05-05 | 2005-07-26 | Teleputers, Llc | Method and system for performing permutations using permutation instructions based on butterfly networks |
FR2814009B1 (en) | 2000-09-14 | 2003-01-31 | Jean Roland Riviere | METHOD AND DEVICE FOR TRANSFORMING CONVOLUTIVE DATA AND VARIABLE OFFSETS, AND SYSTEMS IMPLEMENTING THE SAME |
US20020131590A1 (en) * | 2001-02-02 | 2002-09-19 | Henson Kevin M. | Key matrix methodology |
US7016493B2 (en) | 2001-03-01 | 2006-03-21 | Asier Technology Corporation | Key matrix system |
-
2001
- 2001-03-01 US US09/796,964 patent/US20020131590A1/en not_active Abandoned
- 2001-03-01 US US09/797,066 patent/US7003108B2/en not_active Expired - Fee Related
- 2001-03-01 US US09/797,068 patent/US6996234B2/en not_active Expired - Fee Related
- 2001-03-01 US US09/797,272 patent/US6950518B2/en not_active Expired - Fee Related
- 2001-03-01 US US09/797,107 patent/US7016497B2/en not_active Expired - Fee Related
- 2001-05-15 CA CA002437500A patent/CA2437500C/en not_active Expired - Fee Related
- 2001-05-15 AU AU2001259860A patent/AU2001259860B2/en not_active Ceased
- 2001-05-15 DE DE60112130T patent/DE60112130T2/en not_active Expired - Lifetime
- 2001-05-15 EP EP01933433A patent/EP1410558B1/en not_active Expired - Lifetime
- 2001-05-15 WO PCT/US2001/040737 patent/WO2002063592A2/en active IP Right Grant
- 2001-05-15 AT AT01933433T patent/ATE300134T1/en not_active IP Right Cessation
Also Published As
Publication number | Publication date |
---|---|
US20020141574A1 (en) | 2002-10-03 |
US20020136403A1 (en) | 2002-09-26 |
DE60112130D1 (en) | 2005-08-25 |
WO2002063592A2 (en) | 2002-08-15 |
DE60112130T2 (en) | 2006-06-08 |
US20020131591A1 (en) | 2002-09-19 |
US20020131590A1 (en) | 2002-09-19 |
US6950518B2 (en) | 2005-09-27 |
US20020141573A1 (en) | 2002-10-03 |
AU2001259860B2 (en) | 2007-02-15 |
US6996234B2 (en) | 2006-02-07 |
EP1410558A2 (en) | 2004-04-21 |
EP1410558B1 (en) | 2005-07-20 |
CA2437500C (en) | 2006-02-21 |
WO2002063592A3 (en) | 2003-09-18 |
US7003108B2 (en) | 2006-02-21 |
US7016497B2 (en) | 2006-03-21 |
ATE300134T1 (en) | 2005-08-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2437500A1 (en) | Data encryption system | |
WO2002047401A3 (en) | Method of receiving specific information at a mobile terminal | |
EP0977452A3 (en) | Method for updating secret shared data in a wireless communication system | |
EP1035684A3 (en) | Cryptographic communication system | |
EP1045320A3 (en) | Contents sale system | |
EP2461517A3 (en) | Communication apparatus and communication system | |
SG124293A1 (en) | Block cipher apparatus using auxiliary transformation | |
WO2003034409A3 (en) | A method, system and computer program product for secure ticketing in a communications device | |
WO2002043309A3 (en) | Cryptographic data security system and method | |
WO2004084424A3 (en) | Authentication between a cdma network and a gsm network | |
EP1182825A3 (en) | Transferring copyright protected contents using radio link layer authentication/encryption | |
EP1154373A3 (en) | Information code product, manufacturing device and method for manufacturing the same, information code reading device, authentication system, authentication terminal, authentication server, and authentication method | |
WO2003026207A3 (en) | Method and system for secure distribution of digital documents | |
GB0218188D0 (en) | Methods and arrangements applicable to exhibition spaces | |
EP0856968A3 (en) | Encryption key processing system to be incorporated into data recovery system or key setting system for generating encryption key | |
WO2003075125A3 (en) | Location aware data network | |
EP0994426A3 (en) | Method and medium for rendering documents by server | |
EP1406222A3 (en) | Method of authentication and payment, operation method of an authentication and payment system, terminal device, service providing device, authentication and payment device, and control information providing device | |
EP1233576A3 (en) | Method and apparatus for accessing data | |
EP1073021A3 (en) | Information processing apparatus, card and information processing system | |
EP1150452A3 (en) | Authentication system, authentication method, authentication apparatus, and authentication method therefor | |
EP1017223A3 (en) | System for authenticating digital data | |
EP1187419A3 (en) | User authentication system and method | |
GB2407743A (en) | Method and apparatus for augmenting authentication in a cryptographic system | |
EP1237312A3 (en) | Data mapper and method for flexible mapping of control and data information within a sonet payload |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKLA | Lapsed |
Effective date: 20180515 |