Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Key synchronization in a visual cryptographic system

A technology of keys and key sets, applied in transmission systems, digital transmission systems, synchronous sending/receiving encryption equipment, etc. key, etc.

Inactive Publication Date: 2006-02-01
KONINKLIJKE PHILIPS ELECTRONICS NV
View PDF1 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Even when some sort of key order is predetermined, the encrypting and decrypting devices may accidentally change keys at different times, or one of the two devices may not change keys at all, resulting in a loss of key synchronization
This will cause the decryption device to be unable to decrypt the encrypted image

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key synchronization in a visual cryptographic system
  • Key synchronization in a visual cryptographic system
  • Key synchronization in a visual cryptographic system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] figure 1 The system in , given only as a non-limiting example, includes a server 1 , a terminal 2 , a decryptor (or decoder) 3 and a communication network 4 . The server 1 generates and encrypts an image, which is sent to the terminal 2 via the communication network 4 . The communication network 4 may consist of a dedicated network such as a LAN, a telephone network (POTS), the Internet or simply cables or wires. Both the server 1 and the terminal 2 can be dedicated devices, or they can be constituted by a general-purpose computer, at least in the case of the terminal 2 , with a display screen 21 . Decoder 3 is a cryptographic device discussed in more detail below. Both the server 1 and the decoder 3 are equipped with at least one key set consisting of a plurality of cryptographic keys. These keys are used in a suitable cryptographic process, such as DES. The special cryptographic handling used is not important.

[0042] Such as figure 2 As shown in the exemplary e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system for visual cryptography comprises a server (1) for encrypting a series of images using a set of keys, a terminal (2) for displaying the encrypted images, a transmission medium (4) for transmitting the encrypting images from the server to the terminal (2), and a decryption device (3) for decrypting the encrypted image displayed on the terminal. A key identification is produced by the server (1) and displayed by the terminal (2). The decryption device (3) senses the key identification and selects the corresponding key from its key set.

Description

technical field [0001] The present invention relates to key synchronization in cryptosystems. More specifically, the present invention relates to a method and a device for synchronizing a first set of keys in an encryption device and a second set of keys in a decryption device capable of encrypting images , and the decryption device can decrypt the image. Background technique [0002] The use of key sets in cryptosystems is well known, and successive messages are encrypted using different keys in the key set. Using different keys for different messages makes it more difficult for an eavesdropper to decrypt any of these messages. Furthermore, knowing a single key will enable only a single message to be decrypted, while all other messages remain secret. [0003] Of course, the key sets need to be synchronized, that is, to ensure that both the encrypting device and the decrypting device use the same key in the key set to encrypt or decrypt the same message. If this synchron...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G09C5/00H04L9/12H04N1/44G06F1/00G06F21/60H04K1/00
CPCG09C5/00H04L9/12G06F21/60H04L9/14H04L9/3236H04L9/32H04N1/44
Inventor P·T·图尔斯M·E·范迪克
Owner KONINKLIJKE PHILIPS ELECTRONICS NV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products