ES2019572T3 - Procedimiento para cifrar una serie consistente en al menos un simbolo. - Google Patents
Procedimiento para cifrar una serie consistente en al menos un simbolo.Info
- Publication number
- ES2019572T3 ES2019572T3 ES90201136T ES90201136T ES2019572T3 ES 2019572 T3 ES2019572 T3 ES 2019572T3 ES 90201136 T ES90201136 T ES 90201136T ES 90201136 T ES90201136 T ES 90201136T ES 2019572 T3 ES2019572 T3 ES 2019572T3
- Authority
- ES
- Spain
- Prior art keywords
- series
- bits
- register
- contents
- good statistical
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
- 238000006467 substitution reaction Methods 0.000 abstract 5
- 230000008901 benefit Effects 0.000 abstract 2
- 230000009022 nonlinear effect Effects 0.000 abstract 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Compression, Expansion, Code Conversion, And Decoders (AREA)
- Mobile Radio Communication Systems (AREA)
- Facsimile Transmission Control (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Optical Communication System (AREA)
- Peptides Or Proteins (AREA)
- Electrically Operated Instructional Devices (AREA)
- Emergency Protection Circuit Devices (AREA)
- Measuring Volume Flow (AREA)
- Measurement And Recording Of Electrical Phenomena And Electrical Characteristics Of The Living Body (AREA)
Abstract
EL INVENTO ESTA RELACIONADO CON UN ALGORITMO DE CIFRADO EN BASE A UNA CLAVE SECRETA, EN EL QUE SE HACE USO DE UNA FUNCION DE SUSTITUCION, S(N,K) CONOCIDA COMO CAJA S, CON LA QUE SE PUEDE SUSTITUIR UNA SERIE DE N SIMBOLOS (POR EJEMPLO BITS) POR UNA SERIE DE SIMBOLOS K. EN BASE A LA CLAVE SECRETA, SE GENERA SIEMPRE UNA CAJA S ARBITRARIA PARA EVITAR EL USO DE CAJAS S PREDETERMINADAS. ESTA GENERACION PUEDE TENER LUGAR GENERALMENTE DE FORMA QUE EL RESULTADO DE LA SUSTITUCION CASI CON CERTEZA NO TIENE LINEALIDAD, SINO QUE TIENE ADEMAS BUENAS PROPIEDADES ESTADISTICAS. ESTAS PROPIEDADES SE OBTENDRAN BIEN SEA DINAMICAMENTE (FIGURA 1), SI LOS BITS DE UN RESULTADO DE SUSTITUCION TEMPORAL (CONTENIDO DEL REGISTRO 3) SE COMBINAN ADEMAS, POR MEDIO DE UN ADICIONADOR DE MODULO-2 5, CON LOS BITS DE UNA SERIE CON UNA BUENA DISTRIBUCION ESTADISTICA (CONTENIDO DEL REGISTRO 4) PARA EL RESULTADO DE SUSTITUCION ADECUADO (CONTENIDO DEL REGISTRO 6), O ESTADISTICAMENTE (FIGURA 2), SI UNA SERIE DE N BITS (CONTENIDO DEL REGISTRO 2) QUE SE VA A SUSTITUIR SE COMBINA CON LOS BITS K DE UNA SERIE CON UNA BUENA DISTRIBUCION ESTADISTICA (CONTENIDO DEL REGISTRO 4) PARA UNA SERIE DE N+K BITS, QUE SE SUSTITUYE SECUENCIALMENTE POR MEDIO DE UNA FUNCION DE SUSTITUCION S{N+K,K} DE LA CAJA S 1''. LAS VENTAJAS DE ELLO SON QUE SE PUEDE DISTRIBUIR UNA PRESELECCION DE CAJAS S CON BUENAS PROPIEDADES ESTADISTICAS Y NO LINEALES, Y QUE LAS CAJAS S SIEMPRE CAMBIAN Y, COMO CONSECUENCIA DE ELLO, NO SON CONOCIDAS, LO QUE BENEFICIARA LA POTENCIA DEL ALGORITMO DE CIFRADO.
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| NL8901323A NL8901323A (nl) | 1989-05-26 | 1989-05-26 | Werkwijze voor het vercijferen van een reeks telkens uit tenminste een symbool bestaande boodschappen. |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| ES2019572A4 ES2019572A4 (es) | 1991-07-01 |
| ES2019572T3 true ES2019572T3 (es) | 1994-05-01 |
Family
ID=19854718
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| ES90201136T Expired - Lifetime ES2019572T3 (es) | 1989-05-26 | 1990-05-21 | Procedimiento para cifrar una serie consistente en al menos un simbolo. |
Country Status (9)
| Country | Link |
|---|---|
| EP (1) | EP0399587B1 (es) |
| AT (1) | ATE101950T1 (es) |
| DE (2) | DE399587T1 (es) |
| DK (1) | DK0399587T3 (es) |
| ES (1) | ES2019572T3 (es) |
| FI (1) | FI108324B (es) |
| GR (1) | GR900300193T1 (es) |
| NL (1) | NL8901323A (es) |
| NO (1) | NO303610B1 (es) |
Families Citing this family (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7587044B2 (en) | 1998-01-02 | 2009-09-08 | Cryptography Research, Inc. | Differential power analysis method and apparatus |
| US6278783B1 (en) | 1998-06-03 | 2001-08-21 | Cryptography Research, Inc. | Des and other cryptographic, processes with leak minimization for smartcards and other cryptosystems |
| EP1933496A3 (en) * | 1998-06-03 | 2012-06-13 | Cryptography Research Inc. | Improved DES and other cryptographic processes with leak minimization for smartcards and other cryptosystems |
| NL1011719C2 (nl) | 1999-04-01 | 2000-10-03 | Koninkl Kpn Nv | Werkwijze voor het met toepassing van een functie en een sleutel vercijferen van een reeks symbolen. |
| GB2450131B (en) * | 2007-06-13 | 2009-05-06 | Ingenia Holdings | Fuzzy Keys |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4301327A (en) * | 1979-06-05 | 1981-11-17 | Lee Lin Nan | Reduction of message redundancy by multiple substitution: a message preprocessing scheme for secure communications |
| NL8203737A (nl) * | 1982-09-27 | 1984-04-16 | Nederlanden Staat | Inrichting voor vercijfering van digitale signalen met een of meer des-schakelingen. |
| US4760599A (en) * | 1985-11-07 | 1988-07-26 | Nec Corporation | Data encryptor |
-
1989
- 1989-05-26 NL NL8901323A patent/NL8901323A/nl not_active Application Discontinuation
-
1990
- 1990-05-21 EP EP90201136A patent/EP0399587B1/en not_active Expired - Lifetime
- 1990-05-21 DE DE199090201136T patent/DE399587T1/de active Pending
- 1990-05-21 DE DE69006774T patent/DE69006774T2/de not_active Expired - Fee Related
- 1990-05-21 AT AT90201136T patent/ATE101950T1/de not_active IP Right Cessation
- 1990-05-21 ES ES90201136T patent/ES2019572T3/es not_active Expired - Lifetime
- 1990-05-21 DK DK90201136.0T patent/DK0399587T3/da active
- 1990-05-24 FI FI902591A patent/FI108324B/fi active IP Right Grant
- 1990-05-25 NO NO902337A patent/NO303610B1/no unknown
-
1991
- 1991-10-10 GR GR90300193T patent/GR900300193T1/el unknown
Also Published As
| Publication number | Publication date |
|---|---|
| NO303610B1 (no) | 1998-08-03 |
| EP0399587A1 (en) | 1990-11-28 |
| DE69006774T2 (de) | 1994-08-11 |
| DE69006774D1 (de) | 1994-03-31 |
| FI902591A0 (fi) | 1990-05-24 |
| ES2019572A4 (es) | 1991-07-01 |
| GR900300193T1 (en) | 1991-10-10 |
| DE399587T1 (de) | 1991-02-28 |
| NO902337D0 (no) | 1990-05-25 |
| FI108324B (fi) | 2001-12-31 |
| NL8901323A (nl) | 1990-12-17 |
| EP0399587B1 (en) | 1994-02-23 |
| NO902337L (no) | 1990-11-27 |
| ATE101950T1 (de) | 1994-03-15 |
| DK0399587T3 (da) | 1994-06-27 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US5365588A (en) | High speed encryption system and method | |
| JP4608319B2 (ja) | 複数鍵を用いたストリーム暗号の生成方法 | |
| WO2000051244A8 (en) | A fuzzy commitment scheme | |
| CA2056886A1 (en) | Method for secure communication | |
| KR950704733A (ko) | 선택 가능한 탭이 있는 피드백 레지스터를 갖는 암호화 방법 및 장치(method and apparatus for encrypion having a feedback register with selectable taps) | |
| KR970008912A (ko) | 이중 피드포워드 해시기능을 갖춘 암호화장치 | |
| JPH0675525A (ja) | 暗号通信装置 | |
| US6760440B1 (en) | One's complement cryptographic combiner | |
| ES2019572T3 (es) | Procedimiento para cifrar una serie consistente en al menos un simbolo. | |
| Selvakumar et al. | Fundamental circuits and cut-sets used in cryptography | |
| Balogun et al. | Multiple Caesar cypher encryption algorithm | |
| JPH04335730A (ja) | 暗号送信装置、暗号受信装置、暗号通信システム | |
| Kumar et al. | MSEA: modified symmetric encryption algorithm | |
| AU1770501A (en) | Methods and apparatus for keystream generation | |
| Hassan et al. | Network security by block ciphers | |
| JPH0591101A (ja) | 暗号化装置及び復号化装置 | |
| Abubakar et al. | An Improved Hybrid Encryption Scheme Based on the Sequence of Reduced Residue Systems | |
| Christensen | Caesar Ciphers [D] | |
| RU2701128C1 (ru) | Способ шифрования двоичной информации | |
| Filiol et al. | A new, fast block cipher design: COS ciphers | |
| Kallick | A Modified Simple Substitution Cipher With Unbounded Unicity Distance | |
| Iswo et al. | Combination of AES Algorithm with Blowfish Algorithm for File Attachment at E-Mail Sending | |
| Vennila et al. | An Extension to Traditional Qwerty Cryptographic Method | |
| KR980007156A (ko) | 비밀키 블록 암호화 및 복호화 방법 | |
| Bhattacharryya et al. | A new block ciphering scheme |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| FG2A | Definitive protection |
Ref document number: 399587 Country of ref document: ES |