×

Cryptographic communication process and apparatus

  • US 6,075,865 A
  • Filed: 07/01/1998
  • Issued: 06/13/2000
  • Est. Priority Date: 07/01/1998
  • Status: Expired due to Term
First Claim
Patent Images

1. A communication system, comprising:

  • a) an origination space;

    b) a communications channel; and

    c) a destination space associated with the origination space via the communications channel;

    d) wherein the origination space includes;

    1) an encryption engine for generating an output symbol Ot based on an input symbol It ; and

    2) means for receiving an encrypt key, an encrypt text/key relation, and the input symbol;

    e) wherein the destination space includes;

    1) a decryption engine for generating a decrypted symbol I'"'"'t based on the output symbol received from the origination space via the communications channel; and

    2) means for receiving a decrypt key and a decrypt text/key relation;

    f) wherein the encrypt text/key relation controls the encryption engine such that Ot

    N (t)+π

    N

    N-1 (t)+π

    N-1

    N-2 (t)+ . . . +π

    2

    1 (t)+π

    1 [It

    0 (t)]] . . . ]], mod W, where α

    N, α

    N-1, . . . , α

    1, α

    0 are N+1 additive transformations defined by the encrypt key where π

    N, π

    N-1, . . . , π

    2, π

    0 are N permutations defined by the encrypt key, and where W represents the number of possibilities for each permutation defined by the encrypt key;

    g) wherein the decrypt text/key relation controls the decryption engine such that I'"'"'t

    1-1

    2-1

    3-1 . . . [π

    N-1-1

    N-1 [Ot

    '"'"'N (t)]-α

    '"'"'N-1 (t)]- . . . -α

    '"'"'3 (t)]-α

    '"'"'2 (t)]-α

    '"'"'1 (t)]-α

    '"'"'0 (t), mod W, where π

    i-1 is defined by the decrypt key as the inverse of the permutation π

    i, where α

    '"'"'N, α

    '"'"'N-1, . . . , α

    '"'"'1, α

    '"'"'0 are N+1 additive transformations defined by the decrypt key, and where W represents the number of possibilities for each inverse permutation defined by the decrypt key; and

    h) wherein I'"'"'t corresponds to It.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×