Key generator
First Claim
1. An information processing apparatus for converting message information from a first format into a second format, comprising:
- a first cipher unit having a first cipher key input and a data output for outputting a data stream generated dependent on a first cipher key input via said first cipher key input, a second cipher unit having a plaintext input a second cipher key input and a ciphertext output said second cipher unit via said cipher key input being communicatively coupled to said data output of the first cipher unit for receiving a second cipher key in the shape of said data stream; and
said first cipher unit being arranged to perform, dependent on a predetermined rule, a renewed generation of a data stream for use as said second cipher key.
2 Assignments
0 Petitions
Accused Products
Abstract
An apparatus, method and a computer program product for use as a key generator in conversion of message information from a first format into a second format, a first cipher unit (930) is arranged having a first cipher key input (908) and a data output (910) for outputting a data stream generated dependent on a first cipher key (EKEY) input via said first cipher key (908). A second cipher unit (910) having a plaintext input (901), a second cipher key input (903) and a ciphertext output (902) is via said second cipher key input (903) communicatively coupled to said data output (910) of the first cipher unit (930) for receiving a second cipher key (IKEY) in the shape of said data stream; and said first cipher unit (930) being arranged to perform, dependent on a predetermined rule, a renewed generation of a data stream for use as said second cipher key.
56 Citations
106 Claims
-
1. An information processing apparatus for converting message information from a first format into a second format, comprising:
-
a first cipher unit having a first cipher key input and a data output for outputting a data stream generated dependent on a first cipher key input via said first cipher key input, a second cipher unit having a plaintext input a second cipher key input and a ciphertext output said second cipher unit via said cipher key input being communicatively coupled to said data output of the first cipher unit for receiving a second cipher key in the shape of said data stream; and
said first cipher unit being arranged to perform, dependent on a predetermined rule, a renewed generation of a data stream for use as said second cipher key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. An information processing apparatus for converting message information from a first format into a second format, comprising:
-
a first cipher unit having a first cipher key input and a data output for outputting a data stream generated dependent on a first cipher key input via said first cipher key input said first cipher unit comprising a memory for storage of data, means for updating said memory with input information, an instruction table having a set of operations arranged to modify the state of said memory, processing means arranged to select operations from said instruction table dependent on at least parts of said input information, and to execute said selected operations on the content of said memory wherein at least one of said set of operations is selectable dependent on every possible configuration of at least parts of said input information, and means for extracting output information from said memory, a second cipher unit having a plaintext input a second cipher key input and a ciphertext out said second cipher unit via said second cipher key input being communicatively coupled to said data output of the first cipher unit for receiving a second cipher key in the shape of said data stream; and
said first cipher unit being arranged to perform, dependent on a predetermined rule, a renewed generation of a data stream for use as said second cipher key. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
-
37. A computer implemented information processing method for converting message information from a first format into a second format, comprising the steps of:
-
a first encryption algorithm taking a first cipher key as an input and generating a data stream dependent on said first cipher key;
a second encryption algorithm taking plaintext as an input, taking a second cipher key as an input and generating a ciphertext dependent on said plaintext and on said second cipher key said second encryption algorithm receiving a second cipher key in the shape of said data stream from said first encryption algorithm; and
said first encryption algorithm performing, dependent on a predetermined rule, a renewed generation of a data stream for use as said second cipher key - View Dependent Claims (38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51)
-
-
52. A computer implemented information processing method for converting message information from a first format into a second format, comprising the steps of:
-
a first encryption algorithm including the steps of establishing a set of operations arranged for modifying the state of a memory, storing input information in a first format in said memory, selecting operations from said set of operations dependent on at least parts of said input information, and executing said selected operations on the content of said memory, wherein at least one of said set of operations is selectable dependent on every possible configuration of said input information, and extracting information from said memory in a second format after the execution of at least one operation;
a second encryption algorithm taking plaintext as an input, taking a second cipher key as an input and generating a ciphertext dependent on said plaintext and on said second cipher key said second encryption algorithm receiving a second cipher key in the shape of said data stream from said first encryption algorithm; and
said first encryption algorithm performing, dependent on a predetermined rule, a renewed generation of a data stream for use as said second cipher key. - View Dependent Claims (53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71)
-
-
72. A computer program product, for use in a data processing system, for converting message information from a first format into a second format, comprising program code for directing the data processing system:
-
to perform a first encryption algorithm taking a first cipher key as an input and generating a data stream dependent on said first cipher key;
to perform a second encryption algorithm taking plaintext as an input, taking a second cipher key as an input and generating a ciphertext dependent on said plaintext and on said second cipher key said second encryption algorithm receiving a second cipher key in the shape of said data stream from said first encryption algorithm; and
to perform by means of said first encryption algorithm and, dependent on a predetermined rule, a renewed generation of a data stream for use as said second cipher key. - View Dependent Claims (73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86)
-
-
87. A computer program product for converting message information from a first format into a second format, comprising program code for directing the data processing system:
-
to perform a first encryption algorithm including the steps of establishing a set of operations arranged for modifying the state of a memory, storing input information in a first format in said memory, selecting operations from said set of operations dependent on at least parts of said input information, and executing said selected operations on the content of said memory, wherein at least one of said set of operations is selectable dependent on every possible configuration of said input information, and extracting information from said memory in a second format after the execution of at least one operation;
to perform a second encryption algorithm taking plaintext as an input, taking a second cipher key as an input and generating a ciphertext dependent on said plaintext and on said second cipher key said second encryption algorithm receiving a second cipher key in the shape of said data stream from said first encryption algorithm; and
to perform, by means of said first encryption algorithm and dependent on a predetermined rule, a renewed generation of a data stream for use as said second cipher key. - View Dependent Claims (88, 89, 90, 91, 92, 93, 94, 95, 96, 97, 98, 99, 100, 101, 102, 103, 104, 105, 106)
-
Specification