WO2002063592A3 - Data encryption system using key matrix - Google Patents

Data encryption system using key matrix Download PDF

Info

Publication number
WO2002063592A3
WO2002063592A3 PCT/US2001/040737 US0140737W WO02063592A3 WO 2002063592 A3 WO2002063592 A3 WO 2002063592A3 US 0140737 W US0140737 W US 0140737W WO 02063592 A3 WO02063592 A3 WO 02063592A3
Authority
WO
WIPO (PCT)
Prior art keywords
encryption
plain
character
characters
key
Prior art date
Application number
PCT/US2001/040737
Other languages
French (fr)
Other versions
WO2002063592A2 (en
Inventor
Kevin M Henson
Eric Myron Smith
Original Assignee
Asier Technology Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Asier Technology Corp filed Critical Asier Technology Corp
Priority to CA002437500A priority Critical patent/CA2437500C/en
Priority to AT01933433T priority patent/ATE300134T1/en
Priority to DE60112130T priority patent/DE60112130T2/en
Priority to EP01933433A priority patent/EP1410558B1/en
Priority to AU2001259860A priority patent/AU2001259860B2/en
Publication of WO2002063592A2 publication Critical patent/WO2002063592A2/en
Publication of WO2002063592A3 publication Critical patent/WO2002063592A3/en

Links

Classifications

    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C1/00Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
    • G09C1/02Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system by using a ciphering code in chart form
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/20Manipulating the length of blocks of bits, e.g. padding or block truncation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/24Key scheduling, i.e. generating round keys or sub-keys for block encryption

Abstract

A system (100) and method (400, 500) for data encryption and decryption are disclosed. The encryption system is operable at encryption rates in excess of 10 Mbps and is expandable to over 200Mbps. For encryption, plain characters are received, and a key block (120) includes key characters corresponding to the plain characters is accessed. A current key character corresponding to a current plain character is located. A next key character corresponding to a next plain character is located. An offset between the current key character and the next key character is determined to encrypt the plain characters. Aliases are used to facilitate the encryption and decryption. Vector distances of offsets are utilized for the encryption and decryption, using many variables and many dimensions, such as using coordinates.
PCT/US2001/040737 2001-02-02 2001-05-15 Data encryption system using key matrix WO2002063592A2 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
CA002437500A CA2437500C (en) 2001-02-02 2001-05-15 Data encryption system
AT01933433T ATE300134T1 (en) 2001-02-02 2001-05-15 DEVICE FOR DATA ENCRYPTION USING A KEY MATRIX
DE60112130T DE60112130T2 (en) 2001-02-02 2001-05-15 DEVICE FOR DATA ENCRYPTION USING A KEY MATRIX
EP01933433A EP1410558B1 (en) 2001-02-02 2001-05-15 Data encryption system using key matrix
AU2001259860A AU2001259860B2 (en) 2001-02-02 2001-05-15 Data encryption system using key matrix

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US26640001P 2001-02-02 2001-02-02
US60/266,400 2001-02-02

Publications (2)

Publication Number Publication Date
WO2002063592A2 WO2002063592A2 (en) 2002-08-15
WO2002063592A3 true WO2002063592A3 (en) 2003-09-18

Family

ID=23014417

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2001/040737 WO2002063592A2 (en) 2001-02-02 2001-05-15 Data encryption system using key matrix

Country Status (7)

Country Link
US (5) US7016497B2 (en)
EP (1) EP1410558B1 (en)
AT (1) ATE300134T1 (en)
AU (1) AU2001259860B2 (en)
CA (1) CA2437500C (en)
DE (1) DE60112130T2 (en)
WO (1) WO2002063592A2 (en)

Families Citing this family (60)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7418098B1 (en) * 2000-11-27 2008-08-26 Protegrity Corporation Data type preserving encryption
US7016497B2 (en) * 2001-02-02 2006-03-21 Asier Technology Corporation Data decryption system
US7016493B2 (en) * 2001-03-01 2006-03-21 Asier Technology Corporation Key matrix system
GB2373074B (en) * 2001-03-10 2004-10-13 Ibm A method and apparatus for storage of security keys and certificates
DE60130902T2 (en) * 2001-11-23 2008-07-17 Protegrity Research & Development Method for detecting intrusion into a database system
US20030149876A1 (en) * 2002-02-01 2003-08-07 Secure Choice Llc Method and system for performing perfectly secure key exchange and authenticated messaging
US7826466B2 (en) 2002-06-26 2010-11-02 Atheros Communications, Inc. Communication buffer scheme optimized for VoIP, QoS and data networking over a power line
US8149703B2 (en) 2002-06-26 2012-04-03 Qualcomm Atheros, Inc. Powerline network bridging congestion control
AU2003277413A1 (en) * 2002-10-10 2004-05-04 Asier Technology Corporation Method and system for data encryption and decryption
US20040148356A1 (en) * 2002-11-04 2004-07-29 Bishop James William System and method for private messaging
US7383586B2 (en) * 2003-01-17 2008-06-03 Microsoft Corporation File system operation and digital rights management (DRM)
US8666065B2 (en) * 2003-02-07 2014-03-04 Britesmart Llc Real-time data encryption
US8213601B2 (en) * 2003-02-07 2012-07-03 Patrick Zuili Font level encryption method and apparatus
US8064474B2 (en) * 2003-03-20 2011-11-22 Qualcomm Atheros, Inc. Method and apparatus for selecting a responder to enable reliable multicast
US7281187B2 (en) * 2003-11-20 2007-10-09 Intellon Corporation Using error checking bits to communicated an address or other bits
US8090857B2 (en) 2003-11-24 2012-01-03 Qualcomm Atheros, Inc. Medium access control layer that encapsulates data from a plurality of received data units into a plurality of independently transmittable blocks
US7684568B2 (en) * 2003-11-24 2010-03-23 Intellon Corporation Encrypting data in a communication network
US7660327B2 (en) 2004-02-03 2010-02-09 Atheros Communications, Inc. Temporary priority promotion for network communications in which access to a shared medium depends on a priority level
ATE532142T1 (en) * 2004-03-16 2011-11-15 Microdasys Inc CONTENT MONITORING FOR XML
US7422152B2 (en) 2004-05-13 2008-09-09 Cisco Technology, Inc. Methods and devices for providing scalable RFID networks
CN101019367A (en) * 2004-09-14 2007-08-15 P·普拉拉德·辛加纳马拉 Method and system for computational transformation
US7509431B2 (en) * 2004-11-17 2009-03-24 Cisco Technology, Inc. Performing message and transformation adapter functions in a network element on behalf of an application
US7664879B2 (en) 2004-11-23 2010-02-16 Cisco Technology, Inc. Caching content and state data at a network element
US7987272B2 (en) 2004-12-06 2011-07-26 Cisco Technology, Inc. Performing message payload processing functions in a network element on behalf of an application
US7725934B2 (en) * 2004-12-07 2010-05-25 Cisco Technology, Inc. Network and application attack protection based on application layer message inspection
US7496750B2 (en) 2004-12-07 2009-02-24 Cisco Technology, Inc. Performing security functions on a message payload in a network element
US7606267B2 (en) * 2004-12-10 2009-10-20 Cisco Technology, Inc. Reducing the sizes of application layer messages in a network element
US8082304B2 (en) 2004-12-10 2011-12-20 Cisco Technology, Inc. Guaranteed delivery of application layer messages by a network element
US7551567B2 (en) * 2005-01-05 2009-06-23 Cisco Technology, Inc. Interpreting an application message at a network element using sampling and heuristics
US20060155862A1 (en) * 2005-01-06 2006-07-13 Hari Kathi Data traffic load balancing based on application layer messages
US7698416B2 (en) * 2005-01-25 2010-04-13 Cisco Technology, Inc. Application layer message-based server failover management by a network element
US7725715B2 (en) * 2005-02-24 2010-05-25 Access Business Group International Llc System and method for three-phase data encryption
US7602911B2 (en) * 2005-03-14 2009-10-13 Microsoft Corporation Method and system for enhancing cryptography-based security
US9787471B1 (en) * 2005-06-02 2017-10-10 Robert T. Jenkins and Virginia T. Jenkins Data enciphering or deciphering using a hierarchical assignment system
US7953826B2 (en) 2005-07-14 2011-05-31 Cisco Technology, Inc. Provisioning and redundancy for RFID middleware servers
US8175190B2 (en) 2005-07-27 2012-05-08 Qualcomm Atheros, Inc. Managing spectra of modulated signals in a communication network
US7345585B2 (en) 2005-08-01 2008-03-18 Cisco Technology, Inc. Network based device for providing RFID middleware functionality
US7853018B2 (en) * 2005-11-10 2010-12-14 Atallah Mikhail J Method and apparatus for hiding a private key
US8698603B2 (en) 2005-11-15 2014-04-15 Cisco Technology, Inc. Methods and systems for automatic device provisioning in an RFID network using IP multicast
US8769311B2 (en) 2006-05-31 2014-07-01 International Business Machines Corporation Systems and methods for transformation of logical data objects for storage
US8832043B2 (en) 2006-05-31 2014-09-09 International Business Machines Corporation Method and system for transformation of logical data objects for storage
US7792301B2 (en) * 2006-06-29 2010-09-07 Microsoft Corporation Access control and encryption in multi-user systems
US8396221B2 (en) 2006-12-21 2013-03-12 Oracle International Corporation Secure broadcasting and multicasting
US9059838B2 (en) * 2007-03-30 2015-06-16 Verizon Patent And Licensing Inc. Encryption algorithm with randomized buffer
US20090103726A1 (en) * 2007-10-18 2009-04-23 Nabeel Ahmed Dual-mode variable key length cryptography system
US8225106B2 (en) 2008-04-02 2012-07-17 Protegrity Corporation Differential encryption utilizing trust modes
CN101661546B (en) * 2008-08-28 2012-12-19 深圳富泰宏精密工业有限公司 System and method for file encryption therein in hand-held mobile electronic device
US8364984B2 (en) 2009-03-13 2013-01-29 Microsoft Corporation Portable secure data files
US8819451B2 (en) * 2009-05-28 2014-08-26 Microsoft Corporation Techniques for representing keywords in an encrypted search index to prevent histogram-based attacks
US8958554B2 (en) * 2009-11-30 2015-02-17 Red Hat, Inc. Unicode-compatible stream cipher
US9058497B2 (en) 2010-12-23 2015-06-16 Microsoft Technology Licensing, Llc Cryptographic key management
US20130254553A1 (en) * 2012-03-24 2013-09-26 Paul L. Greene Digital data authentication and security system
US9673983B2 (en) 2012-09-14 2017-06-06 Qualcomm Incorporated Apparatus and method for protecting message data
WO2014135989A2 (en) 2013-03-06 2014-09-12 Assa Abloy Ab Localized pin management with reader verification and no disclosure
WO2015114835A1 (en) * 2014-02-03 2015-08-06 A・Tコミュニケーションズ株式会社 Sentence recognition device, sentence recognition method, and program
RU2600100C2 (en) * 2014-07-29 2016-10-20 Федеральное государственное бюджетное образовательное учреждение высшего профессионального образования "Амурский государственный университет" Method of coding information
KR101689165B1 (en) * 2015-03-12 2016-12-23 권오헌 Apparatus and method for encrypting data using image
US9692598B2 (en) * 2015-08-07 2017-06-27 Terry L. Davis Multi-use long string authentication keys
US10277561B2 (en) * 2016-07-22 2019-04-30 International Business Machines Corporation Database management system shared ledger support
CN111241606B (en) * 2020-01-21 2021-03-23 北京连山科技股份有限公司 One drags three mobile storage device

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5245658A (en) * 1992-01-06 1993-09-14 George Bush Domain-based encryption

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4809327A (en) * 1986-09-02 1989-02-28 Unisys Corporation Encrtption of messages employing unique control words and randomly chosen encryption keys
GB9015799D0 (en) * 1990-07-18 1991-06-12 Plessey Telecomm A data communication system
US5438622A (en) * 1994-01-21 1995-08-01 Apple Computer, Inc. Method and apparatus for improving the security of an electronic codebook encryption scheme utilizing an offset in the pseudorandom sequence
EP0715241B1 (en) * 1994-10-27 2004-01-14 Mitsubishi Corporation Apparatus for data copyright management system
US5799090A (en) * 1995-09-25 1998-08-25 Angert; Joseph C. pad encryption method and software
US5991403A (en) * 1996-12-23 1999-11-23 Intel Corporation Recoverable cryptographic transformation on YUV data suitable for compressions
US6885747B1 (en) * 1997-02-13 2005-04-26 Tec.Sec, Inc. Cryptographic key split combiner
US6373948B1 (en) * 1997-08-15 2002-04-16 Lucent Technologies Inc. Cryptographic method and apparatus for restricting access to transmitted programming content using program identifiers
US7095852B2 (en) * 1998-02-13 2006-08-22 Tecsec, Inc. Cryptographic key split binder for use with tagged data elements
US6118873A (en) * 1998-04-24 2000-09-12 International Business Machines Corporation System for encrypting broadcast programs in the presence of compromised receiver devices
US6363480B1 (en) * 1999-09-14 2002-03-26 Sun Microsystems, Inc. Ephemeral decryptability
US6891951B2 (en) * 2000-01-21 2005-05-10 Victor Company Of Japan, Ltd. Cryptosystem-related method and apparatus
JP2001211153A (en) * 2000-01-25 2001-08-03 Murata Mach Ltd Secret key generating method
US6922472B2 (en) * 2000-05-05 2005-07-26 Teleputers, Llc Method and system for performing permutations using permutation instructions based on butterfly networks
FR2814009B1 (en) 2000-09-14 2003-01-31 Jean Roland Riviere METHOD AND DEVICE FOR TRANSFORMING CONVOLUTIVE DATA AND VARIABLE OFFSETS, AND SYSTEMS IMPLEMENTING THE SAME
US7016497B2 (en) * 2001-02-02 2006-03-21 Asier Technology Corporation Data decryption system
US7016493B2 (en) * 2001-03-01 2006-03-21 Asier Technology Corporation Key matrix system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5245658A (en) * 1992-01-06 1993-09-14 George Bush Domain-based encryption

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
MELLEN G E: "Cryptology, computers, and common sense", AFIPS CONFERENCE PROCEEDINGS VOL.42 1973 NATIONAL COMPUTER COMPOSITION AND EXPOSITION, NEW YORK, NY, USA, 4-8 JUNE 1973, 1973, Montvale, NJ, USA, AFIPS, USA, pages 569 - 579, XP002241382 *

Also Published As

Publication number Publication date
WO2002063592A2 (en) 2002-08-15
EP1410558B1 (en) 2005-07-20
ATE300134T1 (en) 2005-08-15
US20020131591A1 (en) 2002-09-19
US20020131590A1 (en) 2002-09-19
US6950518B2 (en) 2005-09-27
CA2437500C (en) 2006-02-21
US7016497B2 (en) 2006-03-21
DE60112130T2 (en) 2006-06-08
US6996234B2 (en) 2006-02-07
AU2001259860B2 (en) 2007-02-15
US7003108B2 (en) 2006-02-21
EP1410558A2 (en) 2004-04-21
DE60112130D1 (en) 2005-08-25
US20020136403A1 (en) 2002-09-26
US20020141573A1 (en) 2002-10-03
CA2437500A1 (en) 2002-08-15
US20020141574A1 (en) 2002-10-03

Similar Documents

Publication Publication Date Title
WO2002063592A3 (en) Data encryption system using key matrix
EP0998080A3 (en) Method for securing over-the-air communication in a wireless system
GB2397735A (en) An encryption system
SG124291A1 (en) Block cipher apparatus using auxuiliary transformation
ES2241123T3 (en) PROCEDURE AND DEVICE FOR A ROBUST AND VERY FAST CRYPTOGRAPHIC SYSTEM.
TW428409B (en) Method for updating secret shared data in a wireless communication system
WO2002043309A3 (en) Cryptographic data security system and method
NZ500201A (en) Downloading data to an MPEG receiver/decoder
IL157048A0 (en) Method and apparatus for providing authentication in a communication system
WO1999027654A3 (en) Method and system for securely transferring a data set in a data communications system
WO2002035327A3 (en) Transferring electronic content
WO2004034182A3 (en) Efficient encryption and authentication for data processing systems
WO2002101974A8 (en) Secure ephemeral decryptability
EP1182825A3 (en) Transferring copyright protected contents using radio link layer authentication/encryption
MY129580A (en) Method for securing digital information and system therefor
DE69320924D1 (en) Procedure for managing a secret key
WO2001076130A3 (en) Authentication method and schemes for data integrity protection
EP1843343A3 (en) Method and device for controlling distribution and use of digital works
WO2002047401A3 (en) Method of receiving specific information at a mobile terminal
WO2001097480A3 (en) System and method for controlling the access to digital works through a network
CA2253102A1 (en) Method of and system for processing electronic document and recording medium for recording processing program
CA2373787A1 (en) Self authentication ciphertext chaining
GB2400951A (en) A method and apparatus for reconfiguring a server system
EP0996250A3 (en) Efficient block cipher method
GB2383877B (en) Secure remote printing via a communication network

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2001259860

Country of ref document: AU

WWE Wipo information: entry into national phase

Ref document number: 2437500

Country of ref document: CA

WWE Wipo information: entry into national phase

Ref document number: 2001933433

Country of ref document: EP

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWP Wipo information: published in national office

Ref document number: 2001933433

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: JP

WWG Wipo information: grant in national office

Ref document number: 2001933433

Country of ref document: EP

WWG Wipo information: grant in national office

Ref document number: 2001259860

Country of ref document: AU