Message protection system and method
First Claim
1. Encryption and decryption apparatus comprising:
- means for retrieving information to be encoded, said information defining an array D of elements,a first mask array of elements M1 and an independent second mask array of elements M2, wherein said elements M1 and M2 are arranged for logically combining with the array D elements,a password array of P elements, wherein the P elements are arranged to provide a guide to and information for directing and controlling said encryption,an encoder that encodes the array of elements D in accordance with said password information,where the encoder includes means for performing a first operation on the elements D, taking one element at a time, and the elements M1, forming an intermediate array of elements R, and where the encoder performs a second operation on the elements R, taking one element at a time, using the elements, whose results form an encoded message, where said first and second operations are determined and directed from said password information,means for accessing the encoded message, anda decoder that recreates the original message from the encoded message in accordance with said password information,where the decoder performs the logical inverse of the encoder no recreate the original message.
1 Assignment
0 Petitions
Accused Products
Abstract
An encryption/decryption apparatus that provides at least two masks, each of which is used in logic/mathematic operation with information to be encrypted to preserve confidentiality. The operations include exclusive oring, addition, subtraction. The source of the masks can be any commonly found data, for example, the code of a music CD. In such a manner the sender may tell the receiver in private that the masks are from a particular track on a particular CD, sampled in a particular fashion, using a particular password. The product of the number of elements in each mask need not be greater or equal to the number of elements in the data file being encrypted. Repetition may make the decoding easier for an eavesdropper, but the use of a password character array to control the use and sequencing of each set of encoding mask operations greatly helps in maintaining the confidentiality of the data. The present invention includes use as a one-time-pad and can be implemented on personal computers.
-
Citations
54 Claims
-
1. Encryption and decryption apparatus comprising:
-
means for retrieving information to be encoded, said information defining an array D of elements, a first mask array of elements M1 and an independent second mask array of elements M2, wherein said elements M1 and M2 are arranged for logically combining with the array D elements, a password array of P elements, wherein the P elements are arranged to provide a guide to and information for directing and controlling said encryption, an encoder that encodes the array of elements D in accordance with said password information, where the encoder includes means for performing a first operation on the elements D, taking one element at a time, and the elements M1, forming an intermediate array of elements R, and where the encoder performs a second operation on the elements R, taking one element at a time, using the elements, whose results form an encoded message, where said first and second operations are determined and directed from said password information, means for accessing the encoded message, and a decoder that recreates the original message from the encoded message in accordance with said password information, where the decoder performs the logical inverse of the encoder no recreate the original message. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 46, 50, 51, 52)
-
-
28. A method for encrypting and decrypting messages comprising the steps of:
-
retrieving an array D of elements to be encoded, defining a mask array of elements M, wherein said elements M are arranged for logically combining with the array D elements, creating a password array of P elements, wherein the P elements are arranged to provide a guide to and information for encryption, encoding the array of elements D in accordance with said password information, where the encoding includes performing an operation of the elements D, taking one element at a time, and the elements M, forming an encoded message, said operation as directed by said password information, accessing the encoded message, and decoding the accessed encoded message to recreates the original message in accordance with said password information, where the decoding performs the logical inverse of the encoding. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 45, 48, 53, 54)
-
-
44. An encryption method comprising the steps of:
-
accessing a binary file in a bit stream fashion, N bits at a time, converting these N bits to a series of digits in a number base, converting these digits into printable letters, transmitting these printable letters, and performing the inverse of the preceding steps in reverse order to recover the message.
-
-
47. Apparatus as defined in 46 having a wider bit width than the data to be processed for encoding and decoding, said wider width allowing for operations from one byte to modify the result of operations in other bytes.
-
49. The method as defined in 48 having a wider bit width than the data to be processed for encoding and decoding, said wider width allowing for operations from one byte to modify the result of operations in other bytes.
Specification