Method based on an algorithm capable of being graphically implemented to be used for the generation or filtering of data sequences and crytographic applications
First Claim
1. - method based on an algorithm capable of being graphically implemented to be used for the generation or filtering of data sequences and cryptographic applications comprising the following stages:
- a) Defining a cell array distribution with a computer, referenced to a system of coordinates in a vector bidimensional space, provided that the cells in question are capable of adopting two states. b) definition of a first area within that bidimensional vector space, bordered by a first contour, using part of the said cells to define the successive points of the first contour and including a certain number of those cells in this first area;
c) definition of a second area in that bidimensional space bordered by a second contour using part of the cells to define the subsequent points of the same;
this second area contains the first area;
d) choose a cell as the pole, and plot a set of lines from the pole of that cell, and repeat the process, up to a given number of cells which define the second contour, covering all or part of that contour until the first area has been fully swept, using for each line the cells determined by a plotting device such as a Bressenham algorithm; and
e) perform an operation on the contents of each of the cells used when plotting each of the lines of the set and included in that first contour, thereby transforming their state, such as a Logic Xor, each time the cell in question is found in one of the lines of the set.
0 Assignments
0 Petitions
Accused Products
Abstract
The method is based on symmetrical encryption algorithms of variable length blocks, supported by a Pseudo-noise Sequence Generator based in its turn in one (or two) linear sequence generators (LFSR with a primitive polynomial). The basic versions of these algorithms include the plotting of a set of lines which is defined by a pole and a contour, but ensuring that the points inside the contour became inverted when plotted each time the pixel is found in one of the set of lines. Usually, two contours will be used, one of them shall act as the boundary for the data area and in a modification of the same the set of lines is created by means of unregularized contours.
22 Citations
31 Claims
-
1. - method based on an algorithm capable of being graphically implemented to be used for the generation or filtering of data sequences and cryptographic applications comprising the following stages:
-
a) Defining a cell array distribution with a computer, referenced to a system of coordinates in a vector bidimensional space, provided that the cells in question are capable of adopting two states. b) definition of a first area within that bidimensional vector space, bordered by a first contour, using part of the said cells to define the successive points of the first contour and including a certain number of those cells in this first area;
c) definition of a second area in that bidimensional space bordered by a second contour using part of the cells to define the subsequent points of the same;
this second area contains the first area;
d) choose a cell as the pole, and plot a set of lines from the pole of that cell, and repeat the process, up to a given number of cells which define the second contour, covering all or part of that contour until the first area has been fully swept, using for each line the cells determined by a plotting device such as a Bressenham algorithm; and
e) perform an operation on the contents of each of the cells used when plotting each of the lines of the set and included in that first contour, thereby transforming their state, such as a Logic Xor, each time the cell in question is found in one of the lines of the set. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 30, 31)
-
-
26. - Method based on an algorithm subject to being implemented in a graphic manner for the generation or filtering of data sequences and cryptographic applications, which encompasses the following stages:
-
a) Defining a cell array distribution with a computer referenced to a system of coordinates in a vector space, which is at least three-dimensional, and whose cells are capable of adopting at least two states. b) Defining within that first space, which is at least three-dimensional, a first area, defined by a first encircling surface using part of those cells in order to define the subsequent points of the first encircling surface, and containing this first encircling surface a certain number of those cells. c) Defining within that vector space, which is at least three-dimensional, a second area, bordered by a second encircling surface, using part of those cells to define the subsequent points of that encircling surface, whose second encircling surface includes the first encircling surface. d) choose a cell as a pole and plot a set of lines from the same successively up to a certain number of cells which define the second encircling surface, covering part or all of the same until the first surface has been fully swept, using for each line a number of cells determined by a plotting technique similar to a Bressenham algorithm; and
e) perform on the contents of each of the cells used to plot each of the lines of the set and included within the first encircling surface an operation which transforms their state, such as a Logic Xor, as many times as that cell is found in one of the lines of the set. - View Dependent Claims (29)
-
-
27. - Method based on an algorithm subject to being implemented graphically, for the generation or filtering of data sequences or cryptographic applications, which encompasses the following stages;
-
a) Defining a cell array distribution with a computer referenced to a system of coordinates in a vector space, which is at least three-dimensional, and whose cells are capable of adopting at least two states. b) Defining a first area, within that first space, which is at least three-dimensional, defined by a first encircling surface using part of those cells in order to define the subsequent points of the first encircling surface, and containing this first encircling surface a certain number of those cells. c) Defining a second area within that vector space, which is at least three-dimensional, bordered by a second encircling surface, using part of those cells to define the subsequent points of that encircling surface, whose second encircling surface includes the first encircling surface. d) draw a line by means of any plotting technique, similar to a Bressenham algorithm, comprising a certain number of cells and plot a cluster of planes stemming from that line, the said line being the axis of the cluster, and each plane extending from the line in question to a certain number of cells which define the second encircling surface, covering part or the whole of this second encircling surface until the first surface has been fully swept; and
e) perform on the contents of each of the cells used to plot each of the planes of the set and included within the first encircling surface an operation which transforms their state, such as a Logic Xor, as many times as that cell is found in one of the planes of the set.
-
-
28. - Method based on an algorithm subject to being implemented graphically for the generation or filtering of data sequences and cryptographic applications, comprising the following stages:
-
a) Defining a cell array distribution with a computer referenced to a system of coordinates in a unidimensional vector space, whose cells are capable of adopting at least two states;
b) define in this unidimensional vector space a first segment, bounded by two points;
c) define in this unidimensional space a second segment likewise bounded by two points;
this second segment contains the first one;
we consider that all inside points of the second segment provide the outline of its contour;
d) choose a cell as a pole and plot from the same a set of lines from that pole, successively, linking all or part of the cells which define the second contour, and covering all or part of that contour until the first segment has been fully swept; and
e) perform an operation on the contents of each of the cells used when tracing the lines within of the set, and included in that first segment, in order to modify their state, such as an logic Xor, each time the cell in question is found in one of the lines of the set.
-
Specification