Modular computerized encryption scheme
First Claim
1. A modular computerized encryption scheme can be formed from the performance of a sequential series of computerized modules. Each module is a computerized encryption in its own right, said to be modular in that the output of one encryption can be fed into the input of another. The sequential performance of multiple modules, and permutations of modules, substantially increase the complexity and security of the overall encryption, leading to an encryption greater than the sum of its parts. This modularity constitutes claim one.
0 Assignments
0 Petitions
Accused Products
Abstract
This paper introduces a design of a series of six modular computerized ciphers which can be performed sequentially and in a number of rounds, to form an encryption scheme greater than the sum of its parts.
-
Citations
2 Claims
-
1. A modular computerized encryption scheme can be formed from the performance of a sequential series of computerized modules. Each module is a computerized encryption in its own right, said to be modular in that the output of one encryption can be fed into the input of another. The sequential performance of multiple modules, and permutations of modules, substantially increase the complexity and security of the overall encryption, leading to an encryption greater than the sum of its parts. This modularity constitutes claim one.
-
2. Each module has key operating parameters which are externalized to the computer program, and may be easily changed. Once these parameters are changed, the module may be used repeatedly, with completely different results each time, in effect a new module is created by altering data files external to the computer program. This permutability constitutes claim two.
Specification