Variable size key cipher and method and device using the same

a key cipher and variable size technology, applied in the field of compression and cryptography, can solve the problems of difficult design of a secure model and key control for the wnc encryption scheme, and the security issues of the wnc schem

Inactive Publication Date: 2002-07-18
AGERE SYST INC
View PDF4 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

445-461, 1992, has shown that there are security issues with the WNC scheme.
As a result, it is difficult to design a secure model and key control for the WNC encryption scheme.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Variable size key cipher and method and device using the same
  • Variable size key cipher and method and device using the same
  • Variable size key cipher and method and device using the same

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0078] The parameters used for testing in this example are as follows:

[0079] L--Low end of the encoding interval: 32 bits, initially 0

[0080] H--High end of the encoding interval: 32 bits, initially 1

[0081] R--Range of the encoding interval: 32 bits, initially 1

[0082] V--Register for decoding bit stream

[0083] 2.sup.t--size of the frequency table 130: 64K for both 0 and 1, t=15

[0084] r--Address pointer register for table: 15 bits

3TABLE 2 Plain text "AAAAAAAAAAAAAAAAAAAAAAAA" Ex-peri-ments Keys Cipher Text (HEX) 1 A B9 50 C8 C9 1B F8 44 10 2 A FA A1 91 91 3C 81 14 80 3 A 83 D3 C3 C7 28 1F 35 4 AbCD8910 56 DF B4 56 894867 9E 82 28 28 28 66 45 21 40 5 AbCD8910 B9 72 D9 5D A0 F1 62 68 99 7D 7D 70 98 EE F8

[0085]

4TABLE 3 Plain text "It is incredible for us" Ex-peri-ments Keys Cipher Text (HEX) 1 Zfg E7 95 CE 8C A3 B7 7E 1D 98 9E 1E 6F 0D 77 32 14 C5 58 24 4b FF 40 69 43 1C 45 29 80 2 Zfg 2B CF 08 FD 5F 54 87 E1 D9 89 E1 E6 F0 D7 73 21 4C 55 82 44 BF F4 06 94 31 C4 52 98 3 123 C4 99 9E F4 97...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An encryption device and method and decryption device and method which implement a bit-based encryption scheme and hardware design. The encryption device includes a random number generator, receiving a main key, determining a working key using at least one random number and outputting a working key, a model, receiving the main key, the working key and plain text to be encoded and generating at least two frequency counts. The encryption device further includes an encoder, which outputs encoded text based on the working key, the plain text and the at least two frequency counts. The encryption device and method and decryption device and method progress encrypted text that is based upon a stream structure with an unlimited key length and may be compressed by 50%. The encoded text is changeable with different environments even for the same plain text and the same key. Operations of the hardware design are based on arithmetic additions and shifts, and not multiplications and divisions. As a result, the hardware design is simple and applicable to cryptography and e-commerce.

Description

[0001] The present invention is directed to encryption and decryption, and more particularly, to a variable size key cipher and method and device for utilizing variable size key cipher to perform encryption and decryption.DESCRIPTION OF THE RELATED ART[0002] Traditionally, compression and cryptography have been considered distinct and separate technologies, which were developed and applied separately. However, they share a common goal of removing redundancy of an output, although they do so in different ways. Recognizing this common goal, Witten, Neal and Cleary (hereafter known as WNC) were the first to apply adaptive arithmetic coding to encryption. In particular, WNC made the following observations:[0003] by re-coding messages, compression protects the messages from casual observers;[0004] removing redundancy denies a cryptanalyst the leverage of exploiting the normal statistical regularities in natural language; and[0005] adaptively taking advantage of the characteristics of the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L9/00
CPCH04L9/06H04L9/0869H04L2209/30
Inventor DUAN, CHENGGANGZHAO, FENGGUANGGUPTA, SUNIL K.
Owner AGERE SYST INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products