Method of and system for encrypting messages
First Claim
Patent Images
1. A method of encrypting a data message, comprising the steps of:
- (a) providing a first particular data message;
(b) selecting a first position pattern changing input;
(c) providing a first position pattern of specific characters, which first pattern serves as an encryption key for said data message, said specific characters in said first pattern being movable from said first pattern to a second one of other possible position patterns within a first group of possible second patterns;
(d) using said first position pattern, generating one or more first arbitrary patterns of characters, said one or more first arbitrary patterns being different from any one of the patterns in said first group of possible second patterns;
(e) establishing a second position pattern changing input based at least in part on (i) said first pattern changing input, (ii) said one or more first arbitrary patterns of characters, and (iii) said first message;
(f) generating a first encrypted data message corresponding to said first particular data message also based at least in part on (i) said first pattern changing input, (ii) said one or more first arbitrary patterns of characters, and (iii) said first message; and
(g) placing said specific characters into a second one of the position patterns of said first group of possible second position patterns, said second position pattern being based, at least in part, on (i) said second position pattern changing input, said specific characters in said second position pattern being movable from said second pattern to a third one of other possible position patterns within a second group of possible third patterns.
0 Assignments
0 Petitions
Accused Products
Abstract
A technique for encrypting and decrypting a data message is described herein and includes a stream cipher, a block cipher and a key generation embodiment which use a process of Summary Reduction. This overall technique uses a secret key to generate ciphertext from plaintext and in doing so, the technique isolates the nature of the secret key values from the nature of the cipher text created.
43 Citations
39 Claims
-
1. A method of encrypting a data message, comprising the steps of:
-
(a) providing a first particular data message;
(b) selecting a first position pattern changing input;
(c) providing a first position pattern of specific characters, which first pattern serves as an encryption key for said data message, said specific characters in said first pattern being movable from said first pattern to a second one of other possible position patterns within a first group of possible second patterns;
(d) using said first position pattern, generating one or more first arbitrary patterns of characters, said one or more first arbitrary patterns being different from any one of the patterns in said first group of possible second patterns;
(e) establishing a second position pattern changing input based at least in part on (i) said first pattern changing input, (ii) said one or more first arbitrary patterns of characters, and (iii) said first message;
(f) generating a first encrypted data message corresponding to said first particular data message also based at least in part on (i) said first pattern changing input, (ii) said one or more first arbitrary patterns of characters, and (iii) said first message; and
(g) placing said specific characters into a second one of the position patterns of said first group of possible second position patterns, said second position pattern being based, at least in part, on (i) said second position pattern changing input, said specific characters in said second position pattern being movable from said second pattern to a third one of other possible position patterns within a second group of possible third patterns. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 38, 39)
(h) providing a second particular data message;
(i) using said second position pattern, generating one or more second arbitrary patterns of characters, said one or more second arbitrary patterns being different from any one of the patterns in said second group of possible third patterns;
(j) establishing a third position pattern changing input based at least in part on (i) said second pattern changing input, (ii) said one or more second arbitrary patterns of characters, and (iii) said second message;
(k) generating a second encrypted data message corresponding to said second particular data message based at least in part on (i) said second pattern changing input, (ii) said one or more second arbitrary patterns of characters, and (iii) said second message; and
(l) placing said specific characters into a third one of the position patterns of said second group of possible third position patterns, said third position pattern being based, at least in part, on (i) said third position pattern changing input, said specific characters in said third position pattern being movable from said third pattern to a fourth one of other possible position patterns within a third group of possible fourth patterns.
-
-
3. A method according to claim 2 wherein the step (d) of generating said one or more first arbitrary patterns includes the step of
(i) moving the specific characters of said first pattern in one or more different ways which cannot produce any one of the possible position patterns within said first group of possible second patterns but rather produces one or more different position patterns of said characters, which one or more different patterns serve as said one or more first arbitrary patterns. -
4. A method according to claim 3 wherein said pattern changing inputs and said characters are numerical values, wherein a plurality of said first arbitrary patterns are generated and wherein said step (e) of establishing said second position pattern changing input includes the steps of:
-
(i) obtaining the Sum of all the numerical character values making up each of said plurality of first arbitrary patterns;
(ii) producing a scoring table based on said Sums (iii) combining said first pattern changing input and said scoring table in a way which produces a score equivalent numerical value; and
(iv) combining said score equivalent numerical value with said first message in a way which produces said second position pattern changing input.
-
-
5. A method according to claim 4 wherein said step (e) (iv) of combining said score equivalent numerical value with said first message in a way which produces said second position pattern changing input includes the steps of providing an input table containing said score equivalent numerical value and an exit table containing said second position pattern changing input.
-
6. A method according to claim 5 wherein said first encrypted data message is generated using said exit table.
-
7. A method according to claim 6 wherein the step (i) of generating said one or more second arbitrary patterns includes the step of:
(i) moving the specific characters of said second pattern in one or more different ways which cannot produce any one of the possible position patterns within said second group of possible third patterns but rather produces one or more different position patterns of said characters, which one or more different patterns serve as said one or more second arbitrary patterns.
-
8. A method according to claim 7 wherein a plurality of said second arbitrary patterns are generated and wherein said step (j) of establishing said third position pattern changing input includes the steps of:
-
(i) obtaining the Sum of all the numerical character values making up each of said plurality of second arbitrary patterns;
(ii) producing a scoring table based on said last-mentioned Sums;
(iii) combining said second pattern changing input and said last-mentioned scoring table in a way which produces a score equivalent numerical value; and
(iv) combining said last-mentioned score equivalent numerical value with said second message in a way which produces said third position pattern changing input.
-
-
9. A method according to claim 8 wherein said step (j) (iv) of combining said last-mentioned score equivalent numerical value with said second message in a way which produces said third position pattern changing input includes the steps of providing an input table containing said last mentioned score equivalent numerical value and an exit table containing said third position pattern changing input.
-
10. A method according to claim 9 wherein said second encrypted data message is generated using said last-mentioned exit table.
-
11. A method according to claim 2 wherein each of said groups of different position patterns is derivable from said specific characters, which characters correspond to and move in a way corresponding to like characters located within given cell positions on a number of different sides of a multi-sided member, the corresponding like characters being movable in specific different ways from their respective present cell positions to new cell positions.
-
12. A method according to claim 11 wherein said first position pattern of said specific characters corresponds to the corresponding like characters on a side of said multi-side member when said corresponding like characters are in said present cell positions on said side.
-
13. A method according to claim 12 wherein said second position pattern changing input places, said specific characters into said second one of the position patterns of said first group in a way which corresponds to causing said corresponding like characters to move from their first cell positions to specific second cell positions based on said second position pattern changing input and, thereafter, using a specific different side of said member other than said one side to correspond to said second position pattern and wherein said third position pattern changing input places said specific characters into said third one of the position patterns of said second group in a way which corresponds to causing said corresponding characters to move from their second cell positions to specific third cell positions and, thereafter, using a specific different side of said member other than said first mentioned different side to correspond to said third position pattern.
-
14. A method according to claim 13 wherein said multi-sided member is a four sided tetrahedron having an equal number of cells on each side thereof.
-
15. A method according to claim 14 wherein said characters move from cell to cell on said tetrahedron along three different groups of slide lines, each group of which extends at an angle of 60°
- with the other groups and each line of which extends along all four sides of said tetrahedron.
-
16. A method according to claim 1 wherein said messages are such that the method is carried out in a stream cipher manner.
-
17. A method according to claim 1 wherein said messages are such that the method is carried out in a block cipher manner.
-
18. A method according to claim 3 wherein said pattern changing inputs and said characters are numerical values, wherein a plurality of said first arbitrary patterns are generated and wherein said step (e) of establishing said second position pattern changing input includes the steps of:
-
(i) obtaining the Sum of all the numerical character values making up each of said plurality of first arbitrary patterns;
(ii) producing a scoring table based on said last-mentioned Sums;
(iii) from said last-mentioned scoring table, generating a table of values, similar in form and bank divisions to the first position pattern of characters and further modify these values by reducing them to a bank by bank relative magnitude ranking;
(iv) generating a bank by bank ranking table corresponding to and based on the numerical character values of said first position pattern;
(v) combining said ranking of score table values table and said first position pattern ranked table to produce a multi-bit binary mask (vi) providing an exit table;
(iv) combining said multi-bit mask and said first message in a way which produces a first encrypted message;
(v) using said exit table, combining said score equivalent value, indicated first position pattern values and indicated first plain message values in a way which produces said second position pattern changing input.
-
-
19. A method according to claim 1 wherein said step (c) of providing said first position pattern of specific characters includes the steps of:
-
(i) providing a pass phrase;
(ii) establishing a beginning pattern of specific characters, which beginning pattern is to be made known to the encryptor and decrypt or, said last-mentioned specific characters in said beginning pattern being movable from said beginning pattern to a second one of other possible position patterns within a first group of possible second patterns (iii) using said beginning position pattern, generating one or more first arbitrary patterns of characters, said one or more first arbitrary patterns being different from any one of the patterns in said last-mentioned first group of possible second patterns (iv) using said pass word and said one or more arbitrary patterns of characters, placing said specific characters from said beginning pattern into a second one of the position patterns of said last-mentioned first group of possible second position patterns, said specific characters in said second position pattern being movable from said second pattern to a third one of other possible position patterns within a second group of possible third patterns; and
(v) using the last-mentioned second position patterns, repeating steps (iii) and (iv) one or more times, as desired, to establish subsequent, successive position patterns until said first pattern serving as said encryption key is provided.
-
-
38. The improvement according to claim 9 wherein said numerical processing step includes the step of obtaining the sum of all the numerically related character values making up each of said plurality of summary reduction patterns.
-
39. The improvement according to claim 9 wherein said numerical processing step includes the step of obtaining the average of all the numerically related character values making up each of said plurality of summary reduction patterns.
-
20. In an overall method of encrypting segments of a data message in which there is provided (i) a first position pattern of specific characters serving as an encryption key, (ii) a second position pattern of specific characters resulting from the scrambling of the characters of the first pattern, (iii) a third position pattern of specific characters resulting from the scrambling of the characters of the second pattern and (iv) a first scrambling key for determining how said second pattern results from said first pattern, a method of generating a second scrambling key for determining how said third pattern results from said second pattern, said method comprising the steps of:
-
(a) using said first position pattern, generating one or more arbitrary patterns of characters in a way which insures that said one or more arbitrary patterns of characters cannot be the same as said second position pattern; and
(b) combining said first pattern changing input, said one or more first arbitrary patterns of characters, and a particular segment of said message in a way which produces said second scrambling key. - View Dependent Claims (21)
(i) moving the specific characters of said first pattern in one or more different ways which cannot produce said second position pattern.
-
-
22. In an overall method of encrypting segments of a data message in which a first position pattern of specific characters serving as an encryption key is provided, a method of providing said first position pattern of specific characters, comprising the steps of:
-
(a) providing a pass phrase;
(b) establishing a beginning pattern of specific characters, which beginning pattern is to be made known to the encryptor and decryptor, said last-mentioned specific characters in said beginning pattern being movable from said beginning pattern to a second one of other possible position patterns within a first group of possible second patterns;
(c) using said beginning position pattern, generating one or more first arbitrary patterns of characters, said one or more first arbitrary patterns being different from any one of the patterns in said last-mentioned first group of possible second patterns;
(d) using said pass word and said one or more arbitrary patterns of characters, placing said specific characters from said beginning pattern into a second one of the position patterns of said last-mentioned first group of possible second position patterns, said specific characters in said second position pattern being movable from said second pattern to a third one of other possible position patterns within a second group of possible third patterns; and
(e) using the last-mentioned second position patterns, repeating steps (c) and (d) one or more times, as desired, to establish subsequent, successive position patterns until said first pattern serving as said encryption key is provided.
-
-
23. A system for encrypting a data message, comprising:
-
(a) means for providing a first particular data message;
(b) means for selecting a first position pattern changing input;
(c) means for providing a first position pattern of specific characters, which first pattern serves as an encryption key for said data message, said specific characters in said first pattern being movable from said first pattern to a second one of other possible position patterns within a first group of possible second patterns;
(d) means using said first position pattern for generating one or more first arbitrary patterns of characters, said one or more first arbitrary patterns being different from any one of the patterns in said first group of possible second patterns;
(e) means for establishing a second position pattern changing input based at least in part on (i) said first pattern changing input, (ii) said one or more first arbitrary patterns of characters, and (iii) said first message;
(f) means for generating a first encrypted data message corresponding to said first particular data message also based at least in part on (i) said first pattern changing input, (ii) said one or more first arbitrary patterns of characters, and (iii) said first message; and
(g) means for placing said specific characters into a second one of the position patterns of said first group of possible second position patterns, said second position pattern being based, at least in part, on (i) said second position pattern changing input, said specific characters in said second position pattern being movable from said second pattern to a third one of other possible position patterns within a second group of possible third patterns.
-
-
24. In an overall system for encrypting segments of a data message in which there is provided (i) a first position pattern of specific characters serving as an encryption key, (ii) a second position pattern of specific characters resulting from the scrambling of the characters of the first pattern, (iii) a third position pattern of specific characters resulting from the scrambling of the characters of the second pattern and (iv) a first scrambling key for determining how said second pattern results from said first pattern, an arrangement for generating a second scrambling key for determining how said third pattern results from said second pattern, said method comprising:
-
(a) means using said first position pattern for generating one or more arbitrary patterns of characters in a way which insures that said one or more arbitrary patterns of characters cannot be the same as said second position pattern; and
(b) means for combining said first pattern changing input, said one or more first arbitrary patterns of characters, and a particular segment of said message in a way which produces said second scrambling key.
-
-
25. In an overall system for encrypting segments of a data message in which a first position pattern of specific characters serving as an encryption key is provided, a method of providing said first position pattern of specific characters, comprising:
-
(a) means for providing a pass phrase;
(b) means for establishing a beginning pattern of specific characters, which beginning pattern is to be made known to the encryptor and decryptor, said last-mentioned specific characters in said beginning pattern being movable from said beginning pattern to a second one of other possible position patterns within a first group of possible second patterns;
(c) means using said beginning position pattern for generating one or more first arbitrary patterns of characters, said one or more first arbitrary patterns being different from any one of the patterns in said last-mentioned first group of possible second patterns (d) means using said pass word and said one or more arbitrary patterns of characters for placing said specific characters from said beginning pattern into a second one of the position patterns of said last-mentioned first group of possible second position patterns, said specific characters in said second position pattern being movable from said second pattern to a third one of other possible position patterns within a second group of possible third patterns; and
(e) means using the last-mentioned second position patterns for repeating steps (c) and (d) one or more times, as desired, to establish subsequent, successive position patterns until said first pattern serving as said encryption key is provided.
-
-
26. A system for encrypting a data message, comprising:
-
(a) an arrangement which provides a first particular data message;
(b) an arrangement which selects a first position pattern changing input;
(c) an arrangement which provides a first position pattern of specific characters, which first pattern serves as an encryption key for said data message, said specific characters in said first pattern being movable from said first pattern to a second one of other possible position patterns within a first group of possible second patterns;
(d) an arrangement which uses said first position pattern to generate one or more first arbitrary patterns of characters, said one or more first arbitrary patterns being different from any one of the patterns in said first group of possible second patterns;
(e) an arrangement which establishes a second position pattern changing input based at least in part on (i) said first pattern changing input, (ii) said one or more first arbitrary patterns of characters, and (iii) said first message;
(f) an arrangement which generates a first encrypted data message corresponding to said first particular data message also based at least in part on (i) said first pattern changing input, (ii) said one or more first arbitrary patterns of characters, and (iii) said first message; and
(g) an arrangement which places said specific characters into a second one of the position patterns of said first group of possible second position patterns, said second position pattern being based, at least in part, on (i) said second position pattern changing input, said specific characters in said second position pattern being movable from said second pattern to a third one of other possible position patterns within a second group of possible third patterns.
-
-
27. In an overall system for encrypting segments of a data message in which there is provided (i) a first position pattern of specific characters serving as an encryption function, (ii) a second position pattern of specific characters resulting from the scrambling of the characters of the first pattern, (iii) a third position pattern of specific characters resulting from the scrambling of the characters of the second pattern and (iv) a first scrambling function for determining how said second pattern results from said first pattern, an arrangement for generating a second scrambling function for determining how said third pattern results from said second pattern, said arrangement comprising:
-
(a) an arrangement which uses said first position pattern to generate one or more arbitrary patterns of characters in a way which insures that said one or more arbitrary patterns of characters cannot be the same as said second position pattern; and
(b) an arrangement which combines said first pattern changing input, said one or more first arbitrary patterns of characters, and a particular segment of said message in a way which produces said second scrambling function.
-
-
28. In an overall system for encrypting segments of a data message in which a first position pattern of specific characters serving as an encryption key is provided, a method of providing said first position pattern of specific characters, comprising:
-
(a) an arrangement which provides a pass phrase;
(b) an arrangement which establishes a beginning pattern of specific characters, which beginning pattern is to be made known to the encryptor and decryptor, said last-mentioned specific characters in said beginning pattern being movable from said beginning pattern to a second one of other possible position patterns within a first group of possible second patterns;
(c) an arrangement which uses said beginning position pattern to generate one or more first arbitrary patterns of characters, said one or more first arbitrary patterns being different from any one of the patterns in said last-mentioned first group of possible second patterns (d) an arrangement which uses said pass word and said one or more arbitrary patterns of characters to place said specific characters from said beginning pattern into a second one of the position patterns of said last-mentioned first group of possible second position patterns, said specific characters in said second position pattern being movable from said second pattern to a third one of other possible position patterns within a second group of possible third patterns; and
(e) an arrangement which uses the last-mentioned second position patterns to repeat steps (c) and (d) one or more times, as desired, to establish subsequent, successive position patterns until said first pattern serving as said encryption key is provided.
-
-
29. A method of encrypting a data message, comprising the steps of:
-
(a) providing a first particular data message;
(b) selecting a first position pattern changing input;
(c) providing a first position pattern of specific numerically related characters, which first pattern serves as an encryption key for said data message, said specific characters in said first pattern being movable from said first pattern to a second one of other possible position patterns within a first group of possible second patterns;
(d) using said first position pattern, generating a plurality of first summary reduction patterns of numerically related characters;
(e) establishing a second position pattern changing input based at least in part on (i) said first pattern changing input, (ii) said summary reduction patterns of characters, and (iii) said first message, wherein this step of establishing a second position pattern changing input includes the steps of (i) obtaining the sum of all the numerically related character values making up each of said plurality of summary reduction patterns;
(ii) producing a scoring table based on said sums;
(iii) combining said first pattern changing input and said scoring table in a way which produces a score equivalent numerical value; and
(iv) combining said score equivalent numerical value with said first message in a way which produces said second position pattern changing input;
(f) generating a first encrypted data message corresponding to said first particular data message also based at least in part on (i) said first pattern changing input, (ii) said summary reduction patterns of characters, and (iii) said first message; and
(g) placing said specific characters into a second one of the position patterns of said first group of possible second position patterns, said second position pattern being based, at least in part, on (i) said second position pattern changing input, said specific characters in said second position pattern being movable from said second pattern to a third one of other possible position patterns within a second group of possible third patterns.
-
-
30. A method of encrypting a data message, comprising the steps of:
-
(a) providing a first particular data message;
(b) selecting a first position pattern changing input;
(c) providing a first position pattern of specific numerically related characters, which first pattern serves as an encryption key for said data message, said specific characters in said first pattern being movable from said first pattern to a second one of other possible position patterns within a first group of possible second patterns;
(d) using said first position pattern, generating a plurality of first summary reduction patterns of numerically related characters;
(e) establishing a second position pattern changing input based at least in part on (i) said first pattern changing input, (ii) said summary reduction patterns of characters, and (iii) said first message, wherein this step of establishing a second position pattern changing input includes the steps of (i) numerically processing the summary reduction patterns in a way which produces a resultant scoring table;
(ii) combining said first pattern changing input and said scoring table in a way which produces a score equivalent numerical value; and
(iv) combining said score equivalent numerical value with said first message in a way which produces said second position pattern changing input;
(f) generating a first encrypted data message corresponding to said first particular data message also based at least in part on (i) said first pattern changing input, (ii) said summary reduction patterns of characters, and (iii) said first message; and
(g) placing said specific characters into a second one of the position patterns of said first group of possible second position patterns, said second position pattern being based, at least in part, on (i) said second position pattern changing input, said specific characters in said second position pattern being movable from said second pattern to a third one of other possible position patterns within a second group of possible third patterns. - View Dependent Claims (31, 32)
-
-
33. In an overall method of encrypting segments of a data message in which there is provided (i) a first position pattern of specific numerically related characters serving as an encryption key, (ii) a second position pattern of specific numerically related characters resulting from the scrambling of the characters of the first pattern, (iii) a third position pattern of specific numerically related characters resulting from the scrambling of the characters of the second pattern and (iv) a first scrambling key for determining how said second pattern results from said first pattern, a method of generating a second scrambling key for determining how said third pattern results from said second pattern, said method comprising the steps of:
-
(a) using said first position pattern, generating a plurality of summary reduction patterns of numerically related characters; and
(b) combining said first pattern changing input, said summary reduction patterns of characters, and a particular segment of said message in a way which produces said second scrambling key, wherein this latter step (b) includes the steps of (i) numerically processing the summary reduction patterns in a way which produces a resultant scoring table;
(ii) combining said first pattern changing input and said scoring table in a way which produces a score equivalent numerical value; and
(iv) combining said score equivalent numerical value with said first message in a way which produces said second position pattern changing input.
-
-
34. In an overall method of encrypting segments of a data message in which there is provided (i) a first position pattern of specific numerically related characters serving as an encryption key, (ii) a second position pattern of specific numerically related characters resulting from the scrambling of the characters of the first pattern, (iii) a third position pattern of specific numerically related characters resulting from the scrambling of the characters of the second pattern and (iv) a first scrambling key for determining how said second pattern results from said first pattern, a method of generating a second scrambling key for determining how said third pattern results from said second pattern, said method comprising the steps of:
-
(a) using said first position pattern, generating a plurality of summary reduction patterns of numerically related characters; and
(b) combining said first pattern changing input, said summary reduction patterns of characters, and a particular segment of said message in a way which produces said second scrambling key, wherein this step of establishing a second position pattern changing input includes the steps of (i) numerically processing the summary reduction patterns in a way which produces a resultant scoring table;
(ii) combining said first pattern changing input and said scoring table in a way which produces a score equivalent numerical value; and
(iv) combining said score equivalent numerical value with said first message in a way which produces said second position pattern changing input. - View Dependent Claims (35, 36)
-
-
37. In an overall method of encrypting segments of a data message in which there is provided a first position pattern of specific numerically related characters serving as an encryption key, the improvement comprising the use of a summary reduction process as part of said overall method, said process including the steps of:
-
(a) using said first position pattern, generating a plurality of summary reduction patterns of numerically related characters; and
(b) numerically processing the summary reduction patterns in a way which produces a resultant scoring table; and
(c) and using the scoring table in the overall method.
-
Specification