System and method for optimizing error detection to detect unauthorized modification of transmitted data
First Claim
1. A system for optimizing error detection to detect unauthorized modification of transmitted data, the system comprising:
- a first encrypting device including;
a first pseudo-random number generator;
a second pseudo-random number generator;
a first reversible function device operatively coupled to and responsive to the first pseudo-random number generator to re-order the first data stream to form a re-ordered data stream; and
,a first XOR function operatively coupled to and responsive to the second pseudo-random number generator to encrypt the re-ordered data stream to form a second data steam; and
,a first decrypting device operatively coupled to the first encrypting device, the first decrypting device configured to perform a re-ordering step and a decrypting step to the second data stream to form a third data stream substantially identical to the first data stream.
2 Assignments
0 Petitions
Accused Products
Abstract
Disclosed is a system and method for optimizing error detection to detect unauthorized modification of transmitted data. The system includes an encrypting device and a decrypting device operatively coupled to the first encrypting device. The encrypting device is configured to re-order and encrypt a first data stream to form a second data stream, and the decrypting device is configured to re-order and decrypt the second data stream to form a third data stream substantially identical to the first data stream. Each of the encrypting and decrypting devices includes at least one pseudo-random number generator, a reversible function device responsive to a first pseudo-random number generator to cause data stream bits to be re-ordered, and a XOR function responsive to a second or the first pseudo-random number generator to cause either consecutive portions of the data stream bits to be encrypted or decrypted.
-
Citations
34 Claims
-
1. A system for optimizing error detection to detect unauthorized modification of transmitted data, the system comprising:
-
a first encrypting device including; a first pseudo-random number generator; a second pseudo-random number generator; a first reversible function device operatively coupled to and responsive to the first pseudo-random number generator to re-order the first data stream to form a re-ordered data stream; and
,a first XOR function operatively coupled to and responsive to the second pseudo-random number generator to encrypt the re-ordered data stream to form a second data steam; and
,a first decrypting device operatively coupled to the first encrypting device, the first decrypting device configured to perform a re-ordering step and a decrypting step to the second data stream to form a third data stream substantially identical to the first data stream. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for optimizing error detection to detect unauthorized modification of transmitted data, the system comprising:
-
a first encrypting device, including; a first pseudo-random number generator; a first reversible function device operatively coupled to and responsive to the first pseudo-random number generator; a second pseudo-random number generator; a first XOR function operatively coupled to and responsive to the second pseudo-random number generator to encrypt the first data stream to form an encrypted data stream; and the first reversible function device to re-order the encrypted data stream to form the second data steam; and
,a first decrypting device operatively coupled to the first encrypting device, the first decrypting device configured to perform a re-ordering step and a decrypting step to the second data stream to from a third data stream substantially identical to the first data stream. - View Dependent Claims (11, 12, 13)
-
-
14. A system for optimizing error detection to detect unauthorized modification of transmitted data, the system comprising:
-
a first encrypting device including; a first pseudo-random number generator; a first reversible function device operatively coupled to the first pseudo-random number generator and responsive to a first random number stream generated by the first pseudo-random number generator to re-order the first data stream to form a re-ordered data stream; a first XOR function operatively coupled to the first pseudo-random number generator and responsive to a second random number stream generated by the first pseudo-random number generator to encrypt the re-ordered data stream to form the second data steam; and
,a first decrypting device operatively coupled to the first encrypting device, the first decrypting device configured to perform a re-ordering step and a decrypting step to the second data stream to form a third data stream substantially identical to the first data stream. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A method for optimizing error detection to detect modification of data provided by an encrypting device to a decrypting device, the encrypting device including a first microcontroller having a first microprocessor and a first memory operatively coupled to the first microprocessor, the decrypting device including a second microcontroller having a second microprocessor and a second memory operatively coupled to the second microprocessor, the method comprising:
-
causing the encrypting device to; perform a re-ordering step using a first pseudo-random number generator and a first reversible function device operatively coupled to the first pseudo-random number generator and responsive to a first random number stream generated by the first pseudo-random number generator; perform an encrypting step to a first data stream using a first XOR function coupled to the first pseudo-random number generator and responsive to a second random number stream generated by the first pseudo-random number generator of the encrypting device to form a second data stream; and causing the decrypting device to perform a decrypting step and a re-ordering step to the second data stream to form a third data stream substantially identical to the first data stream. - View Dependent Claims (24, 25, 26, 27, 28, 29)
-
-
30. A method for optimizing error detection to detect modification of data provided by an encrypting device to a decrypting device, the encrypting device including a first microcontroller having a first microprocessor and a first memory operatively coupled to the first microprocessor, the decrypting device including a second microcontroller having a second microprocessor and a second memory operatively coupled to the second microprocessor, the method comprising:
-
causing the encrypting device to perform a re-ordering step and perform an encrypting step to a first data stream to form a second data stream;
including,causing a first reversible function device of the encrypting device to re-order the first data stream to form a re-ordered data stream, the first reversible function device coupled to and responsive to a first pseudo-random number generator of the encrypting device; and causing a first XOR function of the encrypting device to encrypt the re-ordered data stream to form the second data stream, the first XOR function coupled to and responsive to a second pseudo-random number generator of the encrypting device; and
,causing the decrypting device to perform a decrypting step and a re-ordering step to the second data stream to form a third data stream substantially identical to the first data stream. - View Dependent Claims (31, 32)
-
-
33. A method for optimizing error detection to detect modification of data provided by an encrypting device to a decrypting device, the encrypting device including a first microcontroller having a first microprocessor and a first memory operatively coupled to the first microprocessor, the decrypting device including a second microcontroller having a second microprocessor and a second memory operatively coupled to the second microprocessor, the method comprising:
-
causing the encrypting device to perform a re-ordering step and perform an encrypting step to a first data stream to form a second data stream, including; causing a first XOR function of the encrypting device to encrypt the first data stream to form an encrypted data stream, the first XOR function coupled to and responsive to a first pseudo-random number generator of the encrypting device; and causing the first reversible function device of the encrypting device to re-order the encrypted data stream to form the second data stream, the first reversible function device coupled to and responsive to a second pseudo-random number generator of the encrypting device; and causing the decrypting device to perform a decrypting step and a re-ordering step to the second data stream to form a third data stream substantially identical to the first data stream. - View Dependent Claims (34)
-
Specification