Electronic encryption device and method
First Claim
Patent Images
1. A data encryption and decryption system comprising:
- a. means for selecting a set of parameters from a predetermined valid parameter space;
b. means for inserting the parameters into chaotic equations of the form;
space="preserve" listing-type="equation">x'"'"'=-σ
x+σ
y
space="preserve" listing-type="equation">y'"'"'=rx-y-xz
space="preserve" listing-type="equation">z'"'"'=-bz+xywhere x'"'"', y'"'"' and z'"'"' are numeric results and x, y, z, σ
, r and b are parameters;
c. means for iterating the chaotic equations to derive x'"'"', y'"'"' and z'"'"' iterate streams;
d. means for deriving a cipher number from the iterate streams; and
e. means for xoring the cipher number with the data.
1 Assignment
0 Petitions
Accused Products
Abstract
A device and method is provided using a split processor based architecture to provide physical security of critical information by implementing a required protocol before releasing critical information. The critical information is used as a key to a cryptographic algorithm. A chaotic cryptographic algorithm is also provided including a defined key space employing six parameters of a Lorenzian system of equations.
-
Citations
73 Claims
-
1. A data encryption and decryption system comprising:
-
a. means for selecting a set of parameters from a predetermined valid parameter space; b. means for inserting the parameters into chaotic equations of the form;
space="preserve" listing-type="equation">x'"'"'=-σ
x+σ
y
space="preserve" listing-type="equation">y'"'"'=rx-y-xz
space="preserve" listing-type="equation">z'"'"'=-bz+xywhere x'"'"', y'"'"' and z'"'"' are numeric results and x, y, z, σ
, r and b are parameters;c. means for iterating the chaotic equations to derive x'"'"', y'"'"' and z'"'"' iterate streams; d. means for deriving a cipher number from the iterate streams; and e. means for xoring the cipher number with the data. - View Dependent Claims (2)
-
-
3. A data encryption and decryption system comprising:
-
a. means for selecting a set of parameters from a predetermined valid parameter space; b. means for inserting the parameters into chaotic equations of the form;
space="preserve" listing-type="equation">x'"'"'=-σ
x+σ
y
space="preserve" listing-type="equation">y'"'"'=rx-y-xz
space="preserve" listing-type="equation">z'"'"'=-bz+xywhere x'"'"', y'"'"' and z'"'"' are numeric results and x, y, z, σ
, r and b are parameters;c. means for iterating the chaotic equations to derive x'"'"', y'"'"' and z'"'"' iterate streams; d. means for deriving a cipher number from the iterate streams; e. means for xoring the cipher number with the data; f. means for iterating the chaotic equations a predetermined number of times; and g. means for appending the predetermined number to encrypted data.
-
-
4. A data encryption and decryption system comprising:
-
a. storage means containing multiple sets of valid parameters from a predetermined valid parameter space; b. means for selecting a set of parameters from the storage means; c. means for inserting the selected parameters into chaotic equations of the form;
space="preserve" listing-type="equation">x'"'"'=-σ
x+σ
y
space="preserve" listing-type="equation">y'"'"'=rx-y-xz
space="preserve" listing-type="equation">z'"'"'=-bz+xywhere x'"'"', y'"'"' and z'"'"' are numeric results and x, y, z, σ
, r and b are parameters;d. means for iterating the chaotic equations to derive x'"'"', y'"'"' and z'"'"' iterate streams; e. means for deriving a cipher number from the iterate streams; f. means for xoring the cipher number with the data; and g. means for storing the numeric results. - View Dependent Claims (5, 6, 7)
-
-
8. A data encryption and decryption system comprising:
-
a. means for selecting a set of parameters from a predetermined valid parameter space; b. means for inserting the parameters into chaotic equations of the form;
space="preserve" listing-type="equation">x'"'"'=-σ
x+σ
y
space="preserve" listing-type="equation">y'"'"'=rx-y-xz
space="preserve" listing-type="equation">z'"'"'=-bz+xywhere x'"'"', y'"'"' and z'"'"' are numeric results and x, y, z, σ
, r and b are parameters;c. means for iterating the chaotic equations to derive x'"'"', y'"'"' and z'"'"' iterate streams; d. means for deriving a cipher number from the iterate streams; e. means for xoring the cipher number with the data; f. means for iterating the chaotic equations a predetermined number of times; g. means for encoding the predetermined number; and h. means for appending the encoded number to encrypted data.
-
-
9. A data encryption system comprising:
-
a. a predetermined set of valid initial conditions; b. a protocol responsive memory programmed to store and allow access to the initial conditions in response to a protocol; c. a processor connected to the protocol responsive memory, the processor programmed to; (1) execute the protocol; (2) receive and store the initial conditions returned by the protocol responsive memory; (3) insert the initial conditions into and iterate a set of chaotic equations to arrive at iterated results; and (4) create encrypted data by combining data with the iterated results. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A data encryption system comprising:
-
a. a predetermined set of valid initial conditions; b. a protocol responsive memory programmed to store and allow access to the initial conditions in response to a protocol; c. a processor connected to the protocol responsive memory, the processor programmed to; (1) execute the protocol; (2) receive and store the initial conditions returned by the protocol responsive memory; (3) insert the initial conditions into and iterate a set of chaotic equations to arrive at iterated results; (4) create encrypted data by combining data with the iterated results; d. a memory partition for storing a read password; and e. a comparator, connected to the memory partition and to the processor, for executing the protocol. - View Dependent Claims (17)
-
-
18. A data encryption system comprising:
-
a. a predetermined set of valid initial conditions; b. a protocol responsive memory programmed to store and allow access to the initial conditions in response to a protocol; c. a processor connected to the protocol responsive memory, the processor programmed to; (1) execute the protocol; (2) receive and store the initial conditions returned by the protocol responsive memory; (3) insert the initial conditions into and iterate a set of chaotic equations to arrive at iterated results; (4) create encrypted data by combining data with the iterated results; d. generation of an address by the processor; e. transmission of the address by the processor to the protocol responsive memory; and f. transmission of the initial conditions by the protocol responsive memory to the processor upon receipt of the address.
-
-
19. A data encryption system comprising:
-
a. a predetermined set of valid initial conditions; b. a protocol responsive memory programmed to store and allow access to the initial conditions in response to a protocol; c. a processor connected to the protocol responsive memory, the processor programmed to; (1) execute the protocol; (2) receive and store the initial conditions returned by the protocol responsive memory; (3) insert the initial conditions into and iterate a set of chaotic equations to arrive at iterated results; (4) create encrypted data by combining data with the iterated results; and d. a memory connected to the processor to store and allow access to the iterated results. - View Dependent Claims (20)
-
-
21. An encryption system comprising:
-
a. a first memory for holding data to be encrypted; b. a second memory for holding encrypted data; c. a slave processor having a memory for storage of initial conditions and a memory for storage of a password; d. the slave processor programmed to release the initial conditions upon receipt of the password; e. a master processor connected to the first and second memories and the slave processor, programmed to; (1) send the password to the slave processor; (2) store the initial conditions returned by the slave processor; (3) iteratively apply the initial conditions to equations of the following type;
space="preserve" listing-type="equation">x'"'"'=-σ
x+σ
y
space="preserve" listing-type="equation">y'"'"'=rx-y-xz
space="preserve" listing-type="equation">z'"'"'=-bz+xywhere x'"'"', y'"'"' and z'"'"' are iterated results of the equations given initial conditions x, y, z, σ
, r, and b;(4) read data from the first memory; (5) combine the data with the iterated results to create encrypted data; and (6) store the encrypted data in the second memory. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28)
-
-
29. A data encryption system comprising:
-
a. a first memory for holding data to be encrypted; b. a second memory for holding encrypted data; c. a third memory for holding a master processor password; d. an input device; e. a slave processor having a memory for storage of a serial number, a read password and a set of initial conditions; f. the slave processor programmed to release the serial number when polled and to release the initial conditions only upon receipt of the read password; g. a master processor connected to the first, second and third memories and the input device and removably connected to the slave processor; h. the master processor programmed to; (1) poll the slave processor and store the serial number returned by the slave processor in temporary memory; (2) access the input device and store identification data input from the input device in temporary memory; (3) access the third memory, retrieve the master processor password and store the master processor password in temporary memory; (4) xor the serial number, the identification number and the master processor password and store the result in temporary memory as the read password; (5) transmit the read password to the slave processor; (6) read the initial conditions returned by the slave processor; (7) apply the initial conditions to a set of chaotic equations; (8) iterate the chaotic equations and store iterated results; (9) read the data to be encrypted from the first memory; (10) xor the data to be encrypted with the iterated results and store the result. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
-
-
43. σ
- =0. 006 to 0.028
r=24 to 40 b=1 to 8 where x, y and z cannot simultaneously be zero. - View Dependent Claims (45, 46, 47, 48, 50, 51, 52, 53, 55, 56, 57, 58, 60, 61, 63, 64, 65, 66, 68, 69, 71, 72, 73)
- =0. 006 to 0.028
-
44. A method of encrypting data comprising of the steps of:
-
a. selecting a set of parameters from a predetermined valid parameter space; b. inserting the parameters into the chaotic equations of the form;
space="preserve" listing-type="equation">x'"'"'=-σ
+σ
y
space="preserve" listing-type="equation">y'"'"'=rx-y-xz
space="preserve" listing-type="equation">z'"'"'=-bz+xywhere x, y, z, σ
, r and b are parameters and x'"'"', y'"'"' and z'"'"' are numeric results;c. iterating the chaotic equations to derive a x'"'"' iterate stream, a y'"'"' iterate stream and a z'"'"' iterate stream; d. creating a cipher stream by choosing a segment of one or more iterate streams; and encrypting data by combining the cipher stream with the data.
-
-
49. A method of encrypting data comprising the steps of:
-
a. selecting a set of parameters from a predetermined seed space; b. inserting the parameters into chaotic equations of the form;
space="preserve" listing-type="equation">x'"'"'=-σ
x+σ
y
space="preserve" listing-type="equation">y'"'"'=rx-y-xz
space="preserve" listing-type="equation">z'"'"'=-bz+xywhere x, y, z, σ
, b and r are parameters and x'"'"', y'"'"' and z'"'"' are numeric results;c. iterating the chaotic equations to derive are x'"'"' iterate stream, a y'"'"' iterate stream and a z'"'"' iterate stream; d. xoring the x'"'"' iterate stream, the y'"'"' iterate stream and the z'"'"' iterate stream to obtain a cipher number; e. xoring the cipher number with the data to create encrypted data.
-
-
54. A data decryption system comprising:
-
a. a predetermined set of valid initial conditions; b. a protocol responsive memory programmed to store and allow access to the initial conditions in response to a protocol; c. a processor connected to the protocol responsive memory, the processor programmed to; (1) execute the protocol; (2) receive and store the initial conditions returned by the protocol responsive memory; (3) insert the initial conditions into and iterate a set of chaotic equations to arrive at iterated results; and (4) create decrypted data by xoring the data with the iterated results.
-
-
59. An encryption system comprising:
-
a. a first memory for holding data to be decrypted; b. a second memory for holding decrypted data; c. a slave processor having a memory for storage of initial conditions and a memory storage of a password; d. the slave processor programmed to release the initial conditions upon receipt of the password; e. a master processor connected to the first and second memories and the slave processor, programmed to; (1) send the password to the slave processor; (2) store the initial conditions returned by the slave processor; (3) iteratively apply the initial conditions to equations of the following type;
space="preserve" listing-type="equation">x'"'"'=-σ
x+σ
y
space="preserve" listing-type="equation">y'"'"'=rx-y-xz
space="preserve" listing-type="equation">z'"'"'=-bz+xywhere x'"'"', y'"'"' and z'"'"' are iterated results of the equations given initial conditions x, y, z, σ
, r, and b;(4) read data from the first memory; (5) combine the data with the iterated results to create decrypted data; and (6) store the decrypted data in the second memory.
-
-
62. A data decryption system comprising:
-
a. a first memory for holding data to be decrypted; b. a second memory for holding decrypted data; c. a third memory for holding a master processor password; d. an input device; e. a slave processor having a memory for storage of a serial number, a read password and a set of initial conditions; f. the slave processor programmed to release the serial number when polled and to release the initial conditions only upon receipt of the read password; g. a master processor connected to the first, second and third memories and the input device and removably connected to the slave processor; h. the master processor programmed to; (1) poll the slave processor and store the serial number returned by the slave processor in temporary memory; (2) access the input device and store identification data input from the input device in temporary memory; (3) access the third memory, retrieve the master processor password and store the master processor password in temporary memory; (4) xor the serial number, the identification number and the master processor password and store the result in temporary memory as the read password; (5) transmit the read password to the slave processor; (6) read the initial conditions returned by the slave processor; (7) apply the initial conditions to a set of chaotic equations; (8) iterate the chaotic equations and store iterated results; (9) read the data to be decrypted from the first memory; (10) xor the data to be decrypted with the iterated results and store the results.
-
-
67. A method of decrypting data comprising of the steps of:
-
a. selecting a set of parameters from a predetermined valid parameter space; b. inserting the parameters into the chaotic equations of the form;
space="preserve" listing-type="equation">x'"'"'=-σ
x+σ
y
space="preserve" listing-type="equation">y'"'"'=rx-y-xz
space="preserve" listing-type="equation">z'"'"'=-bz+xywhere x, y, z, σ
, r and b are parameters and x'"'"', y'"'"' and z'"'"' are numeric results;c. iterating the chaotic equations to derive a x'"'"' iterate stream, a y'"'"' iterate and a z'"'"' iterate stream; d. creating a cipher stream by choosing a segment of one or more iterate streams; and e. decrypting data by combining the cipher stream with the data.
-
-
70. A method of encrypting and decrypting data comprising the steps of:
-
a. selecting a set of parameters from a predetermined seed space; b. inserting the parameters into chaotic equations of the form;
space="preserve" listing-type="equation">x'"'"'=-σ
x+σ
y
space="preserve" listing-type="equation">y'"'"'=rx-y-xz
space="preserve" listing-type="equation">z'"'"'=-bz+xywhere x, y, z, σ
, b and r are parameters and x'"'"', y'"'"' and z'"'"' are numeric results;c. iterating the chaotic equations to derive are x'"'"' iterate stream, a y'"'"' iterate stream and a z'"'"' iterate stream; d. xoring the x'"'"' iterate stream, the y'"'"' iterate stream and the z'"'"' iterate stream to obtain a cipher number; e. encrypting data by xoring the cipher number with the unencrypted data; and f. decrypting data by xoring the cipher number with the encrypted data.
-
Specification