Encryption methods and apparatus
First Claim
1. An encryption system, comprising:
- multiple sub-key tables, each sub-key table associated with an identifying number;
multiple cipher engines arranged serially, each cipher engine capable of executing a different encryption operation on an input data stream using a sub-key table and producing an output data stream;
an overhead data inserter for inserting deciphering data into the output data stream of at least one of the multiple cipher engines;
a number generator for generating identifying numbers to choose sub-key tables; and
a checksum engine adapted to produce a checksum value for insertion into the input data stream of the last cipher engine.
0 Assignments
0 Petitions
Accused Products
Abstract
An encryption and decryption system is provided. The system includes multiple sub-key tables, each sub-key table associated with an identifying number and multiple cipher engines arranged serially, each cipher engine capable of executing a different encryption operation on an input data stream using a sub-key table and producing an output data stream. The system also includes a number generator for generating numbers used to select sub-key tables. Data that assist deciphering engines with deciphering text encrypted with the cipher engines is inserted into the output data stream of at least one of the multiple cipher engines. The ciphering portion of the system also includes a checksum engine positioned prior to the last cipher engine and adapted to produce a checksum value for insertion into the input data stream of the last cipher engine.
28 Citations
26 Claims
-
1. An encryption system, comprising:
-
multiple sub-key tables, each sub-key table associated with an identifying number;
multiple cipher engines arranged serially, each cipher engine capable of executing a different encryption operation on an input data stream using a sub-key table and producing an output data stream;
an overhead data inserter for inserting deciphering data into the output data stream of at least one of the multiple cipher engines;
a number generator for generating identifying numbers to choose sub-key tables; and
a checksum engine adapted to produce a checksum value for insertion into the input data stream of the last cipher engine. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method of encrypting data, comprising:
-
providing multiple sub-key tables;
providing multiple cipher engines arranged serially, each cipher engine capable of executing an encryption operation on a data stream using a sub-key table and producing an output data stream;
choosing a sub-key table for encrypting the first line of the data stream with the first cipher engine;
encrypting the first line of the data stream with the first cipher engine;
inserting data into the data stream identifying one of the multiple sub-key tables;
performing a checksum operation on data stream; and
inserting checksum data into the data stream. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A method of decrypting data, comprising:
-
providing an encrypted input data stream encrypted by cipher engines in series;
providing multiple sub-key tables;
providing multiple decipher engines arranged serially, each cipher engine capable of executing a-different encryption operation on an input data stream using a sub-key table and producing an output data stream;
choosing one of the multiple sub-key tables;
inputting the chosen sub-key table into the first decipher engine;
deciphering the encrypted data stream with the first decipher engine;
extracting a checksum value from the output data of the first decipher engine; and
using the checksum value to determine if the correct sub-key table was chosen. - View Dependent Claims (21, 22, 23, 24, 25, 26)
-
Specification