Method of and system for encrypting messages, generating encryption keys and producing secure session keys
First Claim
Patent Images
1. A method of encrypting a data message, comprising the steps of:
- (a) providing a first particular data message;
(b) selecting a first position pattern changing input;
(c) providing a first position pattern of specific characters, which first pattern serves as an encryption key for said data message, said specific characters in said first pattern being movable from said first pattern to a second one of other possible position patterns within a first group of possible second patterns;
(d) using said first position pattern, generating a plurality of first arbitrary patterns of characters, said first arbitrary patterns being different from any one of the patterns in said first group of possible second patterns;
(e) establishing a second position pattern changing input based at least in part on (i) said first pattern changing input, (ii) said first arbitrary patterns of characters, and (iii) said first message;
(f) generating a first encrypted data message corresponding to said first particular data message also based at least in part on (i) said first pattern changing input, (ii) said arbitrary patterns of characters, and (iii) said first message; and
(g) placing said specific characters into a second one of the position patterns of said first group of possible second position patterns, said second position pattern being based, at least in part, on (i) said second position pattern changing input, said specific characters in said second position pattern being movable from said second pattern to a third one of other possible position patterns within a second group of possible third patterns.
0 Assignments
0 Petitions
Accused Products
Abstract
A technique for encrypting and decrypting a data message is described herein and includes a stream cipher, a block cipher, and IV generation embodiment and a key generation embodiment which use a process of Summary Reduction. This overall technique uses a secret key to generate ciphertext from plaintext and in doing so, the technique isolates the nature of the secret key values from the nature of the cipher text created.
-
Citations
40 Claims
-
1. A method of encrypting a data message, comprising the steps of:
-
(a) providing a first particular data message;
(b) selecting a first position pattern changing input;
(c) providing a first position pattern of specific characters, which first pattern serves as an encryption key for said data message, said specific characters in said first pattern being movable from said first pattern to a second one of other possible position patterns within a first group of possible second patterns;
(d) using said first position pattern, generating a plurality of first arbitrary patterns of characters, said first arbitrary patterns being different from any one of the patterns in said first group of possible second patterns;
(e) establishing a second position pattern changing input based at least in part on (i) said first pattern changing input, (ii) said first arbitrary patterns of characters, and (iii) said first message;
(f) generating a first encrypted data message corresponding to said first particular data message also based at least in part on (i) said first pattern changing input, (ii) said arbitrary patterns of characters, and (iii) said first message; and
(g) placing said specific characters into a second one of the position patterns of said first group of possible second position patterns, said second position pattern being based, at least in part, on (i) said second position pattern changing input, said specific characters in said second position pattern being movable from said second pattern to a third one of other possible position patterns within a second group of possible third patterns. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. In an overall method of encrypting segments of a data message in which there is provided (i) a first position pattern of specific characters serving as an encryption key, (ii) a second position pattern of specific characters resulting from the scrambling of the characters of the first pattern, (iii) a third position pattern of specific characters resulting from the scrambling of the characters of the second pattern and (iv) a first scrambling key for determining how said second pattern results from said first pattern, a method of generating a second scrambling key for determining how said third pattern results from said second pattern, said method comprising the steps of:
-
(a) using said first position pattern, generating arbitrary patterns of characters in a way which insures that said arbitrary patterns of characters cannot be the same as said second position pattern; and
(b) combining said first pattern changing input, said first arbitrary patterns of characters, and a particular segment of said message in a way which produces said second scrambling key. - View Dependent Claims (21)
-
-
22. In an overall method of encrypting segments of a data message in which a first position pattern of specific characters serving as an encryption key is provided, a method of providing said first position pattern of specific characters, comprising the steps of:
-
(a) providing a pass phrase;
(b) establishing a beginning pattern of specific characters, which beginning pattern is to be made known to the encryptor and decryptor, said last-mentioned specific characters in said beginning pattern being movable from said beginning pattern to a second one of other possible position patterns within a first group of possible second patterns;
(c) using said beginning position pattern, generating first arbitrary patterns of characters, said first arbitrary patterns being different from any one of the patterns in said last-mentioned first group of possible second patterns;
(d) using said pass word and said arbitrary patterns of characters, placing said specific characters from said beginning pattern into a second one of the position patterns of said last-mentioned first group of possible second position patterns, said specific characters in said second position pattern being movable from said second pattern to a third one of other possible position patterns within a second group of possible third patterns; and
(e) using the last-mentioned second position patterns, repeating steps (c) and (d) one or more times, as desired, to establish subsequent, successive position patterns until said first pattern serving as said encryption key is provided.
-
-
23. A system for encrypting a data message, comprising:
-
(a) means for providing a first particular data message;
(b) means for selecting a first position pattern changing input;
(c) means for providing a first position pattern of specific characters, which first pattern serves as an encryption key for said data message, said specific characters in said first pattern being movable from said first pattern to a second one of other possible position patterns within a first group of possible second patterns;
(d) means using said first position pattern for generating first arbitrary patterns of characters, said first arbitrary patterns being different from any one of the patterns in said first group of possible second patterns;
(e) means for establishing a second position pattern changing input based at least in part on (i) said first pattern changing input, (ii) said first arbitrary patterns of characters, and (iii) said first message;
(f) means for generating a first encrypted data message corresponding to said first particular data message also based at least in part on (i) said first pattern changing input, (ii) said first arbitrary patterns of characters, and (iii) said first message; and
(g) means for placing said specific characters into a second one of the position patterns of said first group of possible second position patterns, said second position pattern being based, at least in part, on (i) said second position pattern changing input, said specific characters in said second position pattern being movable from said second pattern to a third one of other possible position patterns within a second group of possible third patterns.
-
-
24. In an overall system for encrypting segments of a data message in which there is provided (i) a first position pattern of specific characters serving as an encryption key, (ii) a second position pattern of specific characters resulting from the scrambling of the characters of the first pattern, (iii) a third position pattern of specific characters resulting from the scrambling of the characters of the second pattern and (iv) a first scrambling key for determining how said second pattern results from said first pattern, an arrangement for generating a second scrambling key for determining how said third pattern results from said second pattern, said method comprising:
-
(a) using said first position pattern for generating arbitrary patterns of characters in a way which insures that said arbitrary patterns of characters cannot be the same as said second position pattern; and
(b) combining said first pattern changing input, said first arbitrary patterns of characters, and a particular segment of said message in a way which produces said second scrambling key.
-
-
25. In an overall system for encrypting segments of a data message in which a first position pattern of specific characters serving as an encryption key is provided, a method of providing said first position pattern of specific characters, comprising:
-
(a) providing a pass phrase;
(b establishing a beginning pattern of specific characters, which beginning pattern is to be made known to the encryptor and decryptor, said last-mentioned specific characters in said beginning pattern being movable from said beginning pattern to a second one of other possible position patterns within a first group of possible second patterns;
(c) using said beginning position pattern for generating first arbitrary patterns of characters, said first arbitrary patterns being different from any one of the patterns in said last-mentioned first group of possible second patterns (d) using said pass word and said arbitrary patterns of characters for placing said specific characters from said beginning pattern into a second one of the position patterns of said last-mentioned first group of possible second position patterns, said specific characters in said second position pattern being movable from said second pattern to a third one of other possible position patterns within a second group of possible third patterns; and
(e) using the last-mentioned second position patterns for repeating steps (c) and (d) one or more times, as desired, to establish subsequent, successive position patterns until said first pattern serving as said encryption key is provided.
-
-
26. A system for encrypting a data message, comprising:
-
(a) an arrangement which provides a first particular data message;
(b) an arrangement which selects a first position pattern changing input;
(c) an arrangement which provides a first position pattern of specific characters, which first pattern serves as an encryption key for said data message, said specific characters in said first pattern being movable from said first pattern to a second one of other possible position patterns within a first group of possible second patterns;
(d) an arrangement which uses said first position pattern to generate first arbitrary patterns of characters, said first arbitrary patterns being different from any one of the patterns in said first group of possible second patterns;
(e) an arrangement which establishes a second position pattern changing input based at least in part on (i) said first pattern changing input, (ii) said first arbitrary patterns of characters, and (iii) said first message;
(f) an arrangement which generates a first encrypted data message corresponding to said first particular data message also based at least in part on (i) said first pattern changing input, (ii) said first arbitrary patterns of characters, and (iii) said first message; and
(g) an arrangement which places said specific characters into a second one of the position patterns of said first group of possible second position patterns, said second position pattern being based, at least in part, on (i) said second position pattern changing input, said specific characters in said second position pattern being movable from said second pattern to a third one of other possible position patterns within a second group of possible third patterns.
-
-
27. In an overall system for encrypting segments of a data message in which there is provided (i) a first position pattern of specific characters serving as an encryption function, (ii) a second position pattern of specific characters resulting from the scrambling of the characters of the first pattern, (iii) a third position pattern of specific characters resulting from the scrambling of the characters of the second pattern and (iv) a first scrambling function for determining how said second pattern results from said first pattern, an arrangement for generating a second scrambling function for determining how said third pattern results from said second pattern, said arrangement comprising:
-
(a) an arrangement which uses said first position pattern to generate arbitrary patterns of characters in a way which insures that said arbitrary patterns of characters cannot be the same as said second position pattern; and
(b) an arrangement which combines said first pattern changing input, said first arbitrary patterns of characters, and a particular segment of said message in a way which produces said second scrambling function.
-
-
28. In an overall system for encrypting segments of a data message in which a first position pattern of specific characters serving as an encryption key is provided, a method of providing said first position pattern of specific characters, comprising:
-
(a) an arrangement which provides a pass phrase;
(b) an arrangement which establishes a beginning pattern of specific characters, which beginning pattern is to be made known to the encryptor and decryptor, said last-mentioned specific characters in said beginning pattern being movable from said beginning pattern to a second one of other possible position patterns within a first group of possible second patterns;
(c) an arrangement which uses said beginning position pattern to generate first arbitrary patterns of characters, said first arbitrary patterns being different from any one of the patterns in said last-mentioned first group of possible second patterns (d) an arrangement which uses said pass word and said arbitrary patterns of characters to place said specific characters from said beginning pattern into a second one of the position patterns of said last-mentioned first group of possible second position patterns, said specific characters in said second position pattern being movable from said second pattern to a third one of other possible position patterns within a second group of possible third patterns; and
(e) an arrangement which uses the last-mentioned second position patterns to repeat steps (c) and (d) one or more times, as desired, to establish subsequent, successive position patterns until said first pattern serving as said encryption key is provided.
-
-
29. A method of encrypting a data message, comprising the steps of:
-
(a) providing a first particular data message;
(b) selecting a first position pattern changing input;
(c) providing a first position pattern of specific numerically related characters, which first pattern serves as an encryption key for said data message, said specific characters in said first pattern being movable from said first pattern to a second one of other possible position patterns within a first group of possible second patterns;
(d) using said first position pattern, generating a plurality of first summary reduction patterns of numerically related characters;
(e) establishing a second position pattern changing input based at least in part on (i) said first pattern changing input, (ii) said summary reduction patterns of characters, and (iii) said first message, wherein this step of establishing a second position pattern changing input includes the steps of (i) obtaining the sum of all the numerically related character values making up each of said plurality of summary reduction patterns;
(ii) producing a scoring table based on said sums;
(iii) combining said first pattern changing input and said scoring table in a way which produces a score equivalent numerical value; and
(iv) combining said score equivalent numerical value with said first message in a way which produces said second position pattern changing input;
(f) generating a first encrypted data message corresponding to said first particular data message also based at least in part on (i) said first pattern changing input, (ii) said summary reduction patterns of characters, and (iii) said first message; and
(g) placing said specific characters into a second one of the position patterns of said first group of possible second position patterns, said second position pattern being based, at least in part, on (i) said second position pattern changing input, said specific characters in said second position pattern being movable from said second pattern to a third one of other possible position patterns within a second group of possible third patterns.
-
-
30. A method of encrypting a data message, comprising the steps of:
-
(a) providing a first particular data message;
(b) selecting a first position pattern changing input;
(c) providing a first position pattern of specific numerically related characters, which first pattern serves as an encryption key for said data message, said specific characters in said first pattern being movable from said first pattern to a second one of other possible position patterns within a first group of possible second patterns;
(d) using said first position pattern, generating a plurality of first summary reduction patterns of numerically related characters;
(e) establishing a second position pattern changing input based at least in part on (i) said first pattern changing input, (ii) said summary reduction patterns of characters, and (iii) said first message, wherein this step of establishing a second position pattern changing input includes the steps of (i) numerically processing the summary reduction patterns in a way which produces a resultant scoring table;
(ii) combining said first pattern changing input and said scoring table in a way which produces a score equivalent numerical value; and
(iv) combining said score equivalent numerical value with said first message in a way which produces said second position pattern changing input;
(f) generating a first encrypted data message corresponding to said first particular data message also based at least in part on (i) said first pattern changing input, (ii) said summary reduction patterns of characters, and (iii) said first message; and
(g) placing said specific characters into a second one of the position patterns of said first group of possible second position patterns, said second position pattern being based, at least in part, on (i) said second position pattern changing input, said specific characters in said second position pattern being movable from said second pattern to a third one of other possible position patterns within a second group of possible third patterns. - View Dependent Claims (31, 32)
-
-
33. In an overall method of encrypting segments of a data message in which there is provided (i) a first position pattern of specific numerically related characters serving as an encryption key, (ii) a second position pattern of specific numerically related characters resulting from the scrambling of the characters of the first pattern, (iii) a third position pattern of specific numerically related characters resulting from the scrambling of the characters of the second pattern and (iv) a first scrambling key for determining how said second pattern results from said first pattern, a method of generating a second scrambling key for determining how said third pattern results from said second pattern, said method comprising the steps of:
-
(a) using said first position pattern, generating a plurality of summary reduction patterns of numerically related characters; and
(b) combining said first pattern changing input, said summary reduction patterns of characters, and a particular segment of said message in a way which produces said second scrambling key, wherein this latter step (b) includes the steps of (i) numerically processing the summary reduction patterns in a way which produces a resultant scoring table;
(ii) combining said first pattern changing input and said scoring table in a way which produces a score equivalent numerical value; and
(iv) combining said score equivalent numerical value with said first message in a way which produces said second position pattern changing input. - View Dependent Claims (35, 36, 38, 39)
-
-
34. In an overall method of encrypting segments of a data message in which there is provided (i) a first position pattern of specific numerically related characters serving as an encryption key, (ii) a second position pattern of specific numerically related characters resulting from the scrambling of the characters of the first pattern, (iii) a third position pattern of specific numerically related characters resulting from the scrambling of the characters of the second pattern and (iv) a first scrambling key for determining how said second pattern results from said first pattern, a method of generating a second scrambling key for determining how said third pattern results from said second pattern, said method comprising the steps of:
-
(a) using said first position pattern, generating a plurality of summary reduction patterns of numerically related characters; and
(b) combining said first pattern changing input, said summary reduction patterns of characters, and a particular segment of said message in a way which produces said second scrambling key, wherein this step of establishing a second position pattern changing input includes the steps of (i) numerically processing the summary reduction patterns in a way which produces a resultant scoring table;
(ii) combining said first pattern changing input and said scoring table in a way which produces a score equivalent numerical value; and
(iv) combining said score equivalent numerical value with said first message in a way which produces said second position pattern changing input.
-
-
37. In an overall method of encrypting segments of a data message in which there is provided a first position pattern of specific numerically related characters serving as an encryption key, the improvement comprising the use of a summary reduction process as part of said overall method, said process including the steps of:
-
(a) using said first position pattern, generating a plurality of summary reduction patterns of numerically related characters; and
(b) numerically processing the summary reduction patterns in a way which produces a resultant scoring table; and
(c) and using the scoring table in the overall method.
-
-
40. In a summary reduction scheme for use in an encryption process, a method of magnitude and location transposition, comprising the steps of:
-
(a) providing a plurality of first values within a first pattern of locations designated by their own sequential location numbers;
(b) providing a second pattern of locations designated by their own sequential location numbers;
(c) placing second values within the second pattern of locations, each second value (1) being placed in a location within the second pattern, which latter location is determined by the magnitude of a specific one of said first values and (2) having a magnitude defined by the location number of said specific one of said first values.
-
Specification