SYSTEMS/METHODS OF ENCRYPTION
First Claim
Patent Images
1. A method of providing encryption;
- the method comprising;
providing a block of N input bits that are to be encrypted to a processor;
wherein N≧
1; and
providing encryption by the processor by mapping the block of N input bits into a block of M output bits, wherein M>
N;
wherein at least one bit of the block of M output bits is pseudo-randomly generated by a state machine responsive to a key that is provided at an input of the state machine; and
wherein said providing encryption by the processor comprises providing bit expansion via said mapping of the block of N input bits into the block of M output bits, wherein M>
N.
2 Assignments
0 Petitions
Accused Products
Abstract
Encryption is provided via an algorithm that maps a block of N input bits onto a block of M output bits, wherein M≧N. Encryption also may be provided in accordance with bit/bandwidth expansion, wherein M>N. At least one bit of the block of M output bits may be pseudo-randomly generated in accordance with a key and a statistical distribution. The statistical distribution may be any desired/preferred statistical distribution (including Gaussian or truncated Gaussian) and the key may be of any desired length that is deemed appropriate to satisfy un-breakability.
-
Citations
71 Claims
-
1. A method of providing encryption;
- the method comprising;
providing a block of N input bits that are to be encrypted to a processor;
wherein N≧
1; andproviding encryption by the processor by mapping the block of N input bits into a block of M output bits, wherein M>
N;wherein at least one bit of the block of M output bits is pseudo-randomly generated by a state machine responsive to a key that is provided at an input of the state machine; and wherein said providing encryption by the processor comprises providing bit expansion via said mapping of the block of N input bits into the block of M output bits, wherein M>
N. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35)
- the method comprising;
-
36. A system of providing encryption;
- the system comprising;
a processor that is configured to encrypt a block of N input bits by mapping the block of N input bits into a block of M output bits, wherein N≧
1 and M>
N;wherein at least one bit of the block of M output bits is pseudo-randomly generated by a state machine responsive to a key that is provided at an input of the state machine; and wherein the processor is configured to provide encryption by providing bit expansion via said mapping of the block of N input bits into the block of M output bits, wherein M>
N. - View Dependent Claims (37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71)
- the system comprising;
Specification