Electronic encryption device and method
First Claim
Patent Images
1. A data encryption and decryption system comprising:
- a. means for selecting a set of parameters from a predetermined parameter space;
b. means for inserting the parameters into chaotic equations of the form;
space="preserve" listing-type="equation">x'"'"'=-σ
x+σ
y
space="preserve" listing-type="equation">y'"'"'=rx-y-xz
space="preserve" listing-type="equation">z'"'"'=-bz+xy where x'"'"', y'"'"' and z'"'"' are numeric results and x, y, z, σ
, r and b are parameters;
c. means for iterating the chaotic equations to derive x'"'"', y'"'"' and z'"'"' iterate streams;
d. means for testing at least one of the iterate streams for chaotic behavior;
e. means for deriving a cipher number from the iterate streams; and
f. means for xoring the cipher number with the data.
0 Assignments
0 Petitions
Accused Products
Abstract
A device and method is provided using a split processor based architecture to provide physical security of information by implementing a required protocol before releasing information. The information is used as a key to a cryptographic algorithm. A chaotic cryptographic algorithm is also provided including a key space employing six parameters of a Lorentzian system of equations.
-
Citations
78 Claims
-
1. A data encryption and decryption system comprising:
-
a. means for selecting a set of parameters from a predetermined parameter space; b. means for inserting the parameters into chaotic equations of the form;
space="preserve" listing-type="equation">x'"'"'=-σ
x+σ
y
space="preserve" listing-type="equation">y'"'"'=rx-y-xz
space="preserve" listing-type="equation">z'"'"'=-bz+xywhere x'"'"', y'"'"' and z'"'"' are numeric results and x, y, z, σ
, r and b are parameters;c. means for iterating the chaotic equations to derive x'"'"', y'"'"' and z'"'"' iterate streams; d. means for testing at least one of the iterate streams for chaotic behavior; e. means for deriving a cipher number from the iterate streams; and f. means for xoring the cipher number with the data. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A data encryption and decryption system comprising:
-
a. storage means containing multiple sets of parameters from a parameter space; b. means for selecting a set the parameters from the storage means; c. means for inserting the selected parameters into chaotic equations of the form;
space="preserve" listing-type="equation">x'"'"'=-σ
x+σ
y
space="preserve" listing-type="equation">y'"'"'=rx-y-xz
space="preserve" listing-type="equation">z'"'"'=-bz+xywhere x'"'"', y'"'"' and z'"'"' are numeric results and x, y, z, σ
, r and b are parameters,d. means for iterating the chaotic equations to derive x'"'"', y'"'"' and z'"'"' iterate streams; e. means for testing at least one of the iterate streams for chaotic behavior; f. means for deriving a cipher number from the iterate streams; g. means for xoring the cipher number with the data; h. means for storing the numeric results.
-
-
9. A data encryption and decryption system comprising:
-
a. means for selecting a set of parameters from a parameter space; b. means for inserting the parameters into chaotic equations of the form;
space="preserve" listing-type="equation">x'"'"'=-σ
x+σ
y
space="preserve" listing-type="equation">y'"'"'=rx-y-xz
space="preserve" listing-type="equation">z'"'"'=-bz+xywhere x'"'"', y'"'"' and z'"'"' are numeric results and x, y, z, s, r and b are parameters, c. means for iterating the chaotic equations to derive x'"'"', y'"'"' and z'"'"' iterate streams; d. means for testing at least one of the iterate streams for chaotic behavior; e. means for deriving a cipher number from the iterate streams; f. means for xoring the cipher number with the data; g. means for iterating the chaotic equations a predetermined number of times; and h. means for appending the predetermined number to encrypted data.
-
-
10. A data encryption system comprising:
-
a. a set of initial conditions; b. a protocol responsive memory programmed to store and allow access to the initial conditions in response to a protocol; c. a processor connected to the protocol responsive memory, the processor programmed to; (1) execute the protocol; (2) receive and store the initial conditions returned by the protocol responsive memory; (3) insert the initial conditions into and iterate a set of chaotic equations to arrive at iterated results; and (4) create encrypted data by combining data with the iterated results. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. The data encryption system comprising:
-
a. a set of initial conditions; b. a protocol responsive memory programmed to store and allow access to the initial conditions in response to a protocol; c. a processor connected to the protocol responsive memory, the processor programmed to; (1) execute the protocol; (2) receive and store the initial conditions returned by the protocol responsive memory; (3) insert the initial conditions into and iterate a set of chaotic equations to arrive at iterated results; (4) create encrypted data by combining data with the iterated results; d. a memory partition for storing a read password; and e. a comparator, connected to the memory partition and to the processor, for executing the protocol. - View Dependent Claims (18)
-
-
19. A data encryption system comprising:
-
a. a set of initial conditions; b. a protocol responsive memory programmed to store and allow access to the initial conditions in response to a protocol; c. a processor connected to the protocol responsive memory, the processor programmed to; (1) execute the protocol; (2) receive and store the initial conditions returned by the protocol responsive memory; (3) insert the initial conditions into and iterate a set of chaotic equations to arrive at iterated results; (4) create encrypted data by combining data with the iterated results; f. the protocol comprising; (1) generation of an address by the processor; (2) transmission of the address by the processor to the protocol responsive memory; and (3) transmission of the initial conditions by the protocol responsive memory to the processor upon receipt of the address by the protocol responsive memory.
-
-
20. A data encryption system comprising:
-
a. a set of initial conditions; b. a protocol responsive memory programmed to store and allow access to the initial conditions in response to a protocol; c. a processor connected to the protocol responsive memory, the processor programmed to; (1) execute the protocol; (2) receive and store the initial conditions returned by the protocol responsive memory; (3) insert the initial conditions into and iterate a set of chaotic equations to arrive at iterated results; (4) create encrypted data by combining data with the iterated results; and d. a memory connected to the processor to store and allow access to the iterated results of the initial conditions.
-
-
21. An encryption system comprising:
-
a. a first memory for holding data to be encrypted; b. a second memory for holding encrypted data; c. a slave processor having a memory for storage of initial conditions and a memory for storage of a password; d. the slave processor programmed to release the initial conditions upon receipt of the password; e. a master processor connected to the first and second memories and the slave processor, programmed to; (1) send the password to the slave processor; (2) store the initial conditions returned by the slave processor; (3) iteratively apply the initial conditions to equations of the following type;
space="preserve" listing-type="equation">x'"'"'=σ
x+σ
y
space="preserve" listing-type="equation">y'"'"'=rx-y-xz
space="preserve" listing-type="equation">z'"'"'=-bz+xywhere x'"'"', y'"'"' and z'"'"' are iterated results of the equations given initial conditions x, y, z, σ
, r, and b;(4) test the iterated results for chaotic behavior; (5) read data from the first memory; (6) combine the data with the iterated results to create encrypted data; and (7) store the encrypted data in the second memory. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31)
-
-
32. A data encryption system comprising:
-
a. a first memory for holding data to be encrypted; b. a second memory for holding encrypted data; c. a third memory for holding a master processor password; d. an input device; e. a slave processor having a memory for storage of a serial number, a read password and a set of initial conditions; f. the slave processor programmed to release the serial number when polled and to release the initial conditions only upon receipt of the read password; g. a master processor connected to the first, second and third memories and the input device and removably connected to the slave processor; h. the master processor programmed to; (1) poll the slave processor and store the serial number returned by the slave processor in temporary memory; (2) access the input device and store identification data input from the input device in temporary memory; (3) access the third memory, retrieve the master processor password and store the master processor password in temporary memory; (4) xor the serial number, the identification number and the master processor password and store the result in temporary memory as the read password; (5) transmit the read password to the slave processor; (6) read the initial conditions returned by the slave processor; (7) apply the initial conditions to a set of chaotic equations; (8) iterate the chaotic equations and store iterated results; (9) test the iterated results for chaotic behavior; (10) read the data to be encrypted from the first memory; (11) xor the data to be encrypted with the iterated results. - View Dependent Claims (33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44)
-
-
45. A method of encrypting data comprising of the steps of:
-
a. inserting a set of parameters into a set of chaotic equations of the form;
space="preserve" listing-type="equation">x'"'"'=-σ
x+σ
y
space="preserve" listing-type="equation">y'"'"'=rx-y-xz
space="preserve" listing-type="equation">z'"'"'=-bz+xywhere x, y, z, σ
, b and r are parameters and x'"'"', y'"'"' and z'"'"' are numeric results;b. varying at least one of the σ
, r and b parameters;c. iterating the chaotic equations to derive an iteratc stream; d. testing at least one iterate stream to determine chaotic behavior; e. using the iterate stream to create a cipher stream; and f. encrypting data by combining the cipher stream with the data. - View Dependent Claims (46, 47, 48, 49, 50)
-
-
51. A method of encrypting data comprising the steps of:
-
a. testing one or more sets of parameters to determine a seed space which exhibits chaotic behavior when applied to a set of chaotic equations of the form;
space="preserve" listing-type="equation">x'"'"'=-σ
x+σ
y
space="preserve" listing-type="equation">y'"'"'=rx-y-xz
space="preserve" listing-type="equation">z'"'"'=-bz+xywhere x, y, z, σ
, b and r are parameters and x'"'"', y'"'"' and z'"'"' are numeric results;b. selecting a set of parameters from the seed space; c. inserting the parameters into the chaotic equations; d. iterating the chaotic equations to derive are x'"'"' iterate stream, a y'"'"' iterate stream and a z'"'"' iterate stream; e. xoring data with the x'"'"' iterate streams, the y'"'"' iterate stream or the z'"'"' iterate stream to create encrypted data. - View Dependent Claims (52, 53, 54, 55)
-
-
56. A decryption system comprising:
-
a. a first memory for holding data to be encrypted; b. a second memory for holding encrypted data; c. a slave processor having a memory for storage of initial conditions and a memory for storage of a password; d. the slave processor programmed to release the initial conditions upon receipt of the password; e. a master processor connected to the first and second memories and the slave processor, programmed to; (1) send the password to the slave processor; (2) store the initial conditions returned by the slave processor; (3) iteratively apply the initial conditions to equations of the following type;
space="preserve" listing-type="equation">x'"'"'=σ
x+σ
y
space="preserve" listing-type="equation">y'"'"'=rx-y-xz
space="preserve" listing-type="equation">z'"'"'=-bz+xywhere x'"'"', y'"'"' and z'"'"' are iterated results of the equations given initial conditions x, y, z, σ
, r, and b;(4) test the iterated results for chaotic behavior; (5) read data from the first memory; (6) combine the data with the iterated results to create encrypted data; and (7) store the encrypted data in the second memory. - View Dependent Claims (57, 58)
-
-
59. A data decryption system comprising:
-
a. a set of initial conditions; b. a protocol responsive memory programmed to store and allow access to the initial conditions in response to a protocol; c. a processor connected to the protocol responsive memory, the processor programmed to; (1) execute the protocol; (2) receive and store the initial conditions returned by the protocol responsive memory; (3) insert the initial conditions into and iterate a set of chaotic equations to arrive at iterated results; and (4) create decrypted data by xoring the data with the iterated results. - View Dependent Claims (60, 61, 62, 63)
-
-
64. A data decryption system comprising:
-
a. a first memory for holding data to be encrypted; b. a second memory for holding encrypted data; c. a third memory for holding a master processor password; d. an input device; e. a slave processor having a memory for storage of a serial number, a read password and a set of initial conditions; f. the slave processor programmed to release the serial number when polled and to release the initial conditions only upon receipt of the read password; g. a master processor connected to the first, second and third memories and the input device and removably connected to the slave processor; h. the master processor programmed to; (1) poll the slave processor and store the serial number returned by the slave processor in temporary memory; (2) access the input device and store identification data input from the input device in temporary memory; (3) access the third memory, retrieve the master processor password and store the master processor password in temporary memory; (4) xor the serial number, the identification number and the master processor password and store the result in temporary memory as the read password; (5) transmit the read password to the slave processor; (6) read the initial conditions returned by the slave processor; (7) apply the initial conditions to a set of chaotic equations; (8) iterate the chaotic equations and store iterated results; (9) test the iterated results for chaotic behavior; (10) read the data to be encrypted from the first memory; (11) xor the data to be encrypted with the iterated results. - View Dependent Claims (65, 66, 67, 68)
-
-
69. A method of decrypting data comprising of the steps of:
-
a. testing a plurality of sets of parameters to determine a group of preferred parameters which exhibit chaotic behavior; b. selecting one set from the group of preferred parameters; c. inserting the set of parameters into chaotic equations of the form;
space="preserve" listing-type="equation">x'"'"'=-σ
x+σ
y
space="preserve" listing-type="equation">y'"'"'=rx-y-xz
space="preserve" listing-type="equation">z'"'"'=-bz+xywhere x, y, z, σ
, r and b are parameters and x'"'"', y'"'"' and z'"'"' are numeric results;d. iterating the chaotic equations to derive a x'"'"' iterate stream, a y'"'"' iterate and a z'"'"' iterate stream; e. creating a cipher stream by choosing a segment of one or more iteratc streams; and f. decrypting data by combining the cipher stream with the data. - View Dependent Claims (70, 71, 72, 73, 74)
-
-
75. A method of encrypting and decrypting data comprising the steps of:
-
a. selecting a set of parameters from a predetermined seed space; b. inserting the parameters into chaotic equations of the form;
space="preserve" listing-type="equation">x'"'"'=-σ
x+σ
y
space="preserve" listing-type="equation">y'"'"'=rx-y-xz
space="preserve" listing-type="equation">z'"'"'=-bz+xywhere x, y, z, σ
, b and r are parameters and x'"'"', y'"'"' and z'"'"' are numeric results;c. iterating the chaotic equations to derive an x'"'"' iterate stream, a y'"'"' iterate stream and a z'"'"' iterate stream; d. testing at least one iterate stream for chaotic behavior; e. choosing at least one iterate stream as a cipher number; f. encrypting data by xoring the cipher number with the unencrypted data; and g. decrypting data by xoring the cipher number with the encrypted data. - View Dependent Claims (76, 77, 78)
-
Specification