System and method for optimizing error detection to detect unauthorized modification of transmitted data
First Claim
1. A system for optimizing error detection to detect unauthorized modification of transmitted data, the system comprising:
- a first encrypting device configured to perform a re-ordering step and an encrypting step to a first data stream to form a second data stream; and
a first decrypting device operatively coupled to the first encrypting device, the first decrypting device configured to perform a re-ordering step and a decrypting step to the second data stream to form a third data stream substantially identical to the first data stream.
2 Assignments
0 Petitions
Accused Products
Abstract
Disclosed is a system and method for optimizing error detection to detect unauthorized modification of transmitted data. The system includes an encrypting device and a decrypting device operatively coupled to the first encrypting device. The encrypting device is configured to re-order and encrypt a first data stream to form a second data stream, and the decrypting device is configured to re-order and decrypt the second data stream to form a third data stream substantially identical to the first data stream. Each of the encrypting and decrypting devices includes at least one pseudo-random number generator, a reversible function device responsive to a first pseudo-random number generator to cause data stream bits to be re-ordered, and a XOR function responsive to a second or the first pseudo-random number generator to cause either consecutive portions of the data stream bits to be encrypted or decrypted.
28 Citations
37 Claims
-
1. A system for optimizing error detection to detect unauthorized modification of transmitted data, the system comprising:
-
a first encrypting device configured to perform a re-ordering step and an encrypting step to a first data stream to form a second data stream; and
a first decrypting device operatively coupled to the first encrypting device, the first decrypting device configured to perform a re-ordering step and a decrypting step to the second data stream to form a third data stream substantially identical to the first data stream. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A method for optimizing error detection to detect modification of data provided by an encrypting device to a decrypting device, the encrypting device including a first microcontroller having a first microprocessor and a first memory operatively coupled to the first microprocessor, the decrypting device including a second microcontroller having a second microprocessor and a second memory operatively coupled to the second microprocessor, the method comprising:
-
causing the encrypting device to perform a re-ordering step and perform an encrypting step to a first data stream to form a second data stream; and
causing the decrypting device to perform a decrypting step and a re-ordering step to the second data stream to form a third data stream substantially identical to the first data stream. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37)
-
Specification