Method and system for securely storing and transmitting data by applying a one-time pad

A codebook, secure technology, used in transmission systems, digital transmission systems, and key distribution, which can solve the problems of random key streams, fake administrators, and no security advantages.

Inactive Publication Date: 2005-03-09
CISCO TECH INC
View PDF0 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] 4) Pretend to be an administrator, so that the attacker can perform storage operations and complete control on the storage device, and the attacker can also use the network
The size of the keystream can be reduced and repeated, resulting in enough keystream to encrypt the text, but this makes the ciphertext vulnerable to certain statistical and dictionary att

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for securely storing and transmitting data by applying a one-time pad
  • Method and system for securely storing and transmitting data by applying a one-time pad
  • Method and system for securely storing and transmitting data by applying a one-time pad

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The present invention describes a method for securely storing and transmitting data by applying a one-time pad. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to avoid unnecessarily obscuring the present invention.

[0043] figure 1 is a block diagram of an example of a data networking environment in which an embodiment may be used. Generally speaking, figure 1 A sending host 100, a network 110, and a receiving host 120 are shown. Each of the hosts 100, 120 may include a network infrastructure node, such as a router, switch, gateway, or other processing element; alternatively, the hosts 100, 120 may be end-station devices,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An approach for securely transmitting and storing data is described. A sending host generates a random sequence of characters as a keystream as a one-time pad. The keystream is bitwise combined with plaintext using an exclusive-OR operation to create ciphertext. The keystream and ciphertext are routed over physically separate communication paths to a receiving host, which decrypts by applying the keystream to the ciphertext using exclusive-OR, The separately routed paths may be established using MPLS labeling or strict route options.

Description

technical field [0001] The present invention relates generally to secure communication techniques. More particularly, the present invention relates to a method and system for storing and transmitting data by using a one-time pad. Background technique [0002] As people rely more and more on computer-based communication technologies, the security of data transfer and storage becomes increasingly important. These transactions typically involve the transfer of confidential corporate or personal data between clients or between a server and a client over a computer network system. [0003] In a typical network system, such as a Metropolitan Area Network (MAN) or a Wide Area Network (Wide Area Network, WAN), multiple users access and communicate through a shared communication network. Many computer applications require the transfer of confidential or sensitive data over these shared networks, and unless such applications are carefully protected, these applications must treat the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/18H04L12/56H04L29/06
CPCH04L45/50H04L9/065H04L2209/56H04L63/18H04L2209/60H04L9/08H04L9/0656H04L63/0428
Inventor 保罗·格莱希奥夫
Owner CISCO TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products