RussianPatents.com

Method for stream encoding of digital information

Method for stream encoding of digital information
IPC classes for russian patent Method for stream encoding of digital information (RU 2246179):

H04L9/18 - Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems
Another patents in same IPC classes:
Method for stream encoding of digital information Method for stream encoding of digital information / 2246179
Proposed method includes generation of protection key in the form of n-bit binary vector, its supply for initial filling of shift register producing maximal-length pseudorandom character sequence, conversion of data stream into encoded message, and its transfer over communication line; in the process total character of encoded text is shaped and its value is conveyed at moment when search sequence character assumed value equal to unity.
Method for stream-wise encoding of discontinuous information Method for stream-wise encoding of discontinuous information / 2251816
Method includes generating a protection key in form of a binary vector n-bit long, sending it for primary filling of displacement register, generating pseudo-random series of maximal length, generating pseudo-random series of symbols, transforming data stream to encrypted message and transmitting the latter along communication line, while pseudo-random series is generated as pseudo-random series of symbols of finite field Fp with characteristic p=2k+1 in form of binary vectors k-nit long by getting information from k different bytes of displacement register with check connection, numbers of which are determined on basis of protection key, and number k is selected equal to one of members of geometric row, which has denominator and first member equal to two, and also a pseudo-random series of symbols is formed for finite field of odd values of symbols due to skipping clock pulses of displacement register with check connection for which pseudo-random series symbols take even values and serially transforming in finite field Fp symbols of source text by involution thereof, appropriate for pseudo-random series symbols.
Method and device for encoding transmissions in communication system Method and device for encoding transmissions in communication system / 2273102
Method and device for encryption of transmission traffic at separate levels of protocol include assignment of separate transmission traffic types to separate encryption elements, to make it possible to realize different encryption levels depending on services requirements. Encryption elements utilization input signals of alternating value, named crypto-synchronizations, together with semi-variable encryption keys for protection from protection bypassing attempts by means of information copying by foreign mobile stations. Also provided is method for synchronization of values of crypto-synchronization of encryption algorithm in mobile and base stations.
Method for generating cryptographic-algorithm sync pulses in communication systems incorporating provision for simulation protection and privacy of messages transferred Method for generating cryptographic-algorithm sync pulses in communication systems incorporating provision for simulation protection and privacy of messages transferred / 2287222
Proposed method designed to provide privacy and/or protection of data bursts transferred in communication system involves generation of cryptographic-algorithm sync pulse by means of special conversion. In the process sync pulse is generated for multiple-access communication systems from unique values assigned to each communication resource within which data bursts being protected are transferred thereby ensuring uniqueness of sync pulses for various messages and their strict ordering in communication resource space. Assignment of unique values to communication resource includes type of multiple access used in communication system. For instance, time interval number and frequency band number are used as unique value assigned to communication resource for communication systems built around time-frequency division of communication channel.
Method for cryptographic transformation of digital data Method for cryptographic transformation of digital data / 2309549
In accordance to the invention, a block of digital data is split onto N ≥ 2 n-bit sub-blocks of digital data, then each sub-block of digital data is subjected to controlled operational substitution, which is realized in S serially executed cycles. Each cycle includes simultaneous execution of Z elementary controlled substitutions and following execution of fixed permutation. Controlled operational substitution is executed using previously generated control vector based on digital data sub-block or digital data sub-block and a secret key. Examples of method realization are provided for one-sided cryptographic transformation and for encoding.
Information protection method Information protection method / 2325766
Said utility invention relates to information storage and transmission protection and may be used at both software and hardware implementation levels in communication systems, computer and information systems for cryptographic protection of text, voice, audio, and video information in the digital form, as well as for the protection of goods against falsification. It is achieved due to the discovery of prime number laws, according to which a sequence containing only prime numbers running is a strictly theoretical unidirectional function of four variables, which made it possible to create a linear algorithm of generation of only prime numbers running, and allowed to transfer the gamma generation at the finite machines into a non-periodic operating mode.
Stream cipher structure with cyclic buffer movement Stream cipher structure with cyclic buffer movement / 2390949
Said amplification directly increases efficiency of encoding/decoding data using stream ciphers. Output generator values are combined into pairs. The pairs of output values must be sufficiently spaced apart to be considered independent. The method enables successive storage of several results provided by output of the stream cipher in the first, second and third memory units. The pair formation function combines separate values from the first and third memory units, separated from each other by at least a threshold value, into pairs. After attaining the threshold value, contents of the first, second and third memory units undergo successive cyclic movement.
Scrambler, scramble processing method and data medium Scrambler, scramble processing method and data medium / 2404518
Multiplication value decision unit (12) decides a multiplication value which is a positive value or a negative value corresponding to a bit value of each bit contained in a binary bit string constituting a scramble pattern generated in a pattern generation unit (11). A multiplication processing unit (13) multiplies symbol data representing each symbol value in the symbol data string formed by the multi-value symbol containing a predetermined pair of a positive value and a negative value having an identical absolute value, in the value area, by the multiplication value decided by the multiplication value decision unit (12). At that moment, the multiplication processing unit (13) successively executes multiplication between the symbol data for one symbol and the multiplication value decided in accordance with the bit value of the one bit contained in the scramble pattern until the number of symbols expressed by the symbol data string is reached.
Generation method of common secret key of two remote subscribers of telecommunication system Generation method of common secret key of two remote subscribers of telecommunication system / 2412548
Open key Y1 of the first subscriber is shaped by generating its private secret key in the form of two X1 and W1 elements of G group, by generating additional private secret key of the first subscriber in the form of many-digit binary number s1, by generating V1 element of G group by the formula
Information protection method Information protection method / 2423800
Symmetric information encryption is applied and automatic distribution of encryption/decryption keys is organised between communicating parties, wherein the generator of random number sequences which form unpredictably varying encryption/decryption keys used is numeric equivalents of measurement results of a random natural process. Said random process is produced in the same way only at locations of the communication devices of the said communicating parties, and can therefore not be accessed without authorisation, which prevents intruders from accessing secret encryption/decryption keys.

FIELD: electrical communications and computer engineering; cryptographic data conversion.

SUBSTANCE: proposed method includes generation of protection key in the form of n-bit binary vector, its supply for initial filling of shift register producing maximal-length pseudorandom character sequence, conversion of data stream into encoded message, and its transfer over communication line; in the process total character of encoded text is shaped and its value is conveyed at moment when search sequence character assumed value equal to unity.

EFFECT: reduced redundancy in message transferred and enhanced message transfer speed.

1 cl, 2 dwg

 

The invention relates to the field of telecommunications and computing, and more specifically to methods and devices for the cryptographic transformation of data.

Known methods of flow encode discrete data (see, for example. Russian encryption standard, the standard of the USSR GOST 28147-89 [1], the British algorithm B-Grypt, which is in addition to the U.S. standard DES [2] p.50, 126, [3] pages 50-51, and the method described in patent 2002104639/09, IPC 7 H 04 L 9/00 [4], Pat. No. 2205516.

In the known methods of encoding digital data is performed by generating a security key, generating a pseudo-random sequence of binary symbols and converting the data stream in the encoded message using symbols of pseudo-random sequence.

Known methods analogous to stream encoding discrete information ensure its integrity. The methods described in [1-3], are vulnerable to attacks based on known or selected source, the method described in [4], provides the immunity of the transmitted information with the active intrusion.

The closest to the technical nature of the claimed method is a method presented in [4].

Prototype method includes forming a security key as a binary vector of length n bits, feed it to DL the initial filling of the shift register with feedback, having n bits and generating a pseudorandom sequence of maximal length, containing 2n-1 binary symbols, the formation of a pseudo-random sequence of characters of a finite field Fpwith characteristic p=257 in the form of binary vectors of length 8 bits by removing information from eight different bits of the shift register, the formation in the form of binary vectors of characters out of sequence due to the exponentiation of a generating element in a finite field Fpdividing the data stream into blocks of characters of the source text in the form of binary vectors of length 8 bits, the formation of a summary character of the source text in the form of a binary vector by addition in a finite field Fpcharacter of the original text with all the previous characters of the source text and the alternate transformation binary vectors-characters of the source text is multiplied by the characters out of sequence and addition in the finite field Fpthe obtained result with the symbols of the pseudo-random sequence, adding to the converted binary vector of the source text redundant bits for checking the encoding of a symbol on parity, the replacement of the generating element out of sequence when in its composition symbol “1” to the total symbol of the outcome of the CSO text, the encoding of new generating element, a data flow transformation of the source text in the encoded message and the transmission of coded messages and generating new item on line.

However, the prototype method has a drawback. To correct the distorted when receiving a character much redundancy is introduced by adding to the converted binary vector of the source text redundant bits for checking the encoding of a symbol on parity. The number of symbols in the transmitted message is increased by 13%.

The invention is aimed at reducing the redundancy in the transmitted message and increase the speed of transmission of the message.

This is achieved by the known method of encoding digital data, which consists in forming a security key as a binary vector of length n bits, applying it to the initial filling of the shift register with feedback having n bits and generating a pseudorandom sequence of maximal length, containing 2n-1 binary symbols, the formation of a pseudo-random sequence of characters of a finite field Fpwith characteristic p=257 in the form of binary vectors of length 8 bits by removing information from eight different bits of the shift register, the formation in the form of binary vectors of symbols re irawma sequence due to the exponentiation of a generating element in a finite field F p, splitting the data stream into blocks of characters of the source text in the form of binary vectors of length 8 bits, the total character of the source text in the form of a binary vector by addition in a finite field Fpcharacter of the original text with all the previous characters of the source text and the alternate converting binary vectors of characters multiplied by the characters out of sequence and addition in the finite field Fpthe obtained result with the symbols of the pseudo-random sequence, the replacement of the generating element out of sequence when in its composition symbol “1” on the overall character of the source text; the encoding of new generating element, the data flow transformation of the source text in the encoded message and the transmission of coded messages and generating new item line, according to the invention form the total symbol of the encoded text as a binary vector by addition in a finite field Fpanother symbol of the encoded text with all the previous characters of the encoded text and the transfer of the total symbol of the coded text line after replacement and transfer of the generating element out of sequence.

In the combination of features claimed which the procedure under binary vector refers to the signal as a sequence of zero and unit bits corresponding to the representation of a number in binary.

Listed set of essential features reduces the redundancy in the transmitted message and increases the speed of transmission of the message due to the fact that precluded the addition of redundant bits to verify the encoded message on parity. To determine the character, in which there was a single error, and to correct this error is transmitted via the communication line, the total symbol encoded text at the moment of changing the generating element out of sequence, when her character takes a value of “1”. Because a change of the generating elements through a sequence of a finite field F257the average is over 256 characters, one total symbol encoded text will be transferred to a binary vector of length 8 bits on average over 256 characters. While the redundancy of the transmitted message will be 0.4%.

If one error occurs in the interval corresponding to the change of the generating elements out of sequence, the error will be detected and corrected. To do this:

- calculate the discrepancy Δ α total characters transferred to the source text Cα and calculatedat the receiving side

- calculate the discrepancy Δ β total characters transmitted encoded text Cβ and calculatedPA receiving side

- compute the character sort sequence used to encode the distorted when receiving

x≡ Δ β · Δ α-1(mod p),

where Δ α-1(Δ α )p-2(md)is the inverse element with respect to the symbol Δ α Fp:

- correct the distorted character of the source text by the formula

α ≡ α +Δ α (mod p).

The possibility of technical realization of the inventive method is explained as follows. The formation of a security key allows you to enter the password from the keyboard or from the magnetic media in a pseudo-random number generator, which in turn yields a security key required size.

The formation of pseudo-random sequences of maximum length, containing 2n-1 character, can be done by using a linear shift register having n bits, the feedback of which is determined by referring to the selected primitive polynomial of degree n. Finding primitive polynomials of degree n is given in [5| p.106-110.

The formation of a pseudo-random sequence is of ingelow finite field F 257in the form of binary vectors of length 8 bits can be done by removing information from eight different bits of the shift register numbers that can be defined but the value of the entered security key K. for Example, by defining a generating element

l0=K(mod q), if l0&λτ;2, the l0=2,

and the numbers of discharge of the shift register but the formula

The value of q is chosen from primes and to the shift register,has 256 bits, q=257, for a shift register having 128 bits, q=127. In this case, due to the exponentiation of the parent number of l0we will move from one field item Fqto another. As shown in [5] 9 if l0- an element of order k, then all elements of l0l

2
0
l
3
0
,... ,l
k-1
0
will be different.

The formation of symbols x enumerating sequences as binary vectors at each stage of the shift register can be defined as generated by the s elements of the field F pby multiplying the previous character of this sequence by the generating element of xn:

x≡ x· xn(mod p)

If the calculation process at some the first stage of the shift register, it turns out that x=1, then in this case you will have a generating element of xnfield Fp. At the same time as a new generating element xnaccepted element formed at this stage of the shift register, the total character of the source text With the target zero Fp, xn=If&λτ; 2, xn=2. The generated sequence of a finite field Fpuse in cryptographic transformation when converting the data stream in the encoded message:

α · x+y=β (mod p)

Because enumerating sequence of a finite field elements are formed by raising to the power generating element xnwith order k, then all elements of xnx

2
n
x
3
n
,... ,x
k
n
there are various on the Internet is rule k stages of the shift register. Because generating elements xncan be of different order in the finite field Fpchanges generating elements will be implemented by a pseudo-random law. This provides statistical uniformity of characters encoded text on the interval R-1 cycles of operation of the shift register, which excludes the application of statistical methods in cryptanalysis, to determine the state of the shift register.

Converting the data stream and the encoded message is carried out by splitting the original data into blocks as symbols α -binary vectors of length 8 bits, is calculated in a finite field Fp, [p=257)values of the characters β encoded text in accordance with the selected function encoding α · x+y≡ β (mod p), convert the number β binary vector and pass them on line.

The proposed method can be implemented using the device. Figure 1 shows the block diagram of the device, where

unit 1 - forming device protection key and the original signal;

unit 2 - the shift register;

block 3 - shaper out of sequence;

unit 4 - the encoder;

block 5 - transmitting device.

For the shift register in figure 2 blocks 6-11 - bits 1-6 of the shift register and the block 12 is modulo two.

Laprotomy describe the operation of the device will use small numbers. We assume that the shift register is 6 bits (the key length is 6 bits), and the entire alphabet of the source text contains 16 characters, then to send a single character can be used a binary vector of length 4 bits, and as the characteristic of a finite field Fpcan be selected number p=17.

To define the structure of the shift register is chosen primitive polynomial of the sixth degree, for example

λ65+1

For the selected primitive polynomial structural diagram of the shift register with feedback presented in figure 2.

Formed in the block 1 figure 1 using a random number generator security key length of 6 bits

&λτ; λ6that λ5that λ4that λ3that λ2that λ1&γτ;.

where λ1=0, λ2=0, λ3=0, λ4=1, λ5=1, λ6=1;

enters the shift register and is used for initial filling of bits of the shift register. Binary characters 5 and 6 of the discharge of the shift register receives at each stage to the input of the adder 12 modulo two, and from the output of the modulo two characters ε proceed to input the first digit of the shift register (block 6, figure 2). When this status bits for each measure in the process of the shift register are determined by the expression

If the characters will be shot with a sixth category λ6the shift register (block 11, figure 2), the binary pseudo-random sequence, the maximum period will be

{1110000010000110001010011110100011

100100101101110110011010101111}.

Note that the period of this sequence is any non-zero set of six digits 0 and 1 occurs only once.

If the binary number will be removed from 1, 2, 3 and 4 digits of the shift register (blocks 6, 7, 8, 9, 2) and at each stage of the shift register with a set of &λτ; λ1that λ2that λ3that λ4&γτ;we shall compare the binary vector (number) y=λ1+2λ2+22λ

3
+23λ
4
the sequence of binary numbers in the process of the register can be viewed as a sequence of numbers (characters) {0, 1, 2,... , 15} as

y={8, 0, 0, 1, 2, 4, 8, 0, 1, 3, 6, 12, 8, 1, 2, 5, 10, 4, 9, 3, 7, 15, 14, 13, 10, 4, 8, 1, 3, 7, 14, 12, 9, 2, 4, 9, 2, 5, 11, 6, 13, 11, 7, 14, 13, 11, 6, 12, 9, 3, 6, 13, 10, 5, 10, 5, 11, 7, 15, 15, 15, 14, 12... }.

Analysis of the generated sequences have shows that in the interval corresponding to the period equal to 63 that is the work of the shift register, each of the symbols {1, 2,... , 15} occurs exactly four times. The symbol for zero, occurs exactly three times in the sequence have no hidden periodicity and provides statistical uniformity of the characters used.

Formed in the block 1 1 security key 111000 together with the signal of the source text entered in block 3 of figure 1. In this unit form a generating element of xnby bringing the number that corresponds to the security key in a nite set of fields F17

xn=23+24+25(mod l7)=5,

and calculate for each stage of the shift register elements of a finite field F17

x=x xn(mod 17),

who are the characters out of sequence:

x 5, 8, 6, 13, 14, 2, 10, 16, 12, 9, 11, 4, 3, 15, 7, 1, 10, 15, 14, 4, 6.

and also calculate the total characters of the source text

Withα =α-1α (mod 17)

α =7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7,

Cα =7, 14, 4, 11, 1, 8, 15, 5, 12, 2, 9, 16, 6, 13, 3, 10, 0, 7, 14, 4, 11.

If the character sort sequence takes the value "1", then change the generating element of xnin accordance with the value of the total character of the source text. For the above example, the new generating element is equal to "10". This item code in the device of figures 1 and 4 transmit using devices 5 figure 1 on the receiving to the end of the radio link encoded symbol 12.

The generated sequence of characters of a finite field x and y as binary vectors received in the encoder 4 figure 1 where convert the incoming data flow α encoding the message β in accordance with the selected cryptographic transform in a finite field F17for example

α =7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7,

x=5, 8, 6, 13, 14, 2, 10, 16, 12, 9, 11, 4, 3, 15, 7, 1, 10, 15, 14, 4, 6,

y=8, 0, 0, 1, 2, 4, 8, 0, 1, 3, 6, 12, 8, 1, 2, 5, 10, 4, 9, 3, 7,

β =9, 5, 8, 7, 15, 1, 10, 10, 0, 15, 15, 6, 12, 4, 0, 12, 12, 7, 5, 14, 5.

For the obtained values β will generate the total symbol of the encoded text Withβ =β-1+β (mod 17)

Withβ =9, 14, 5, 12, 10, 11, 4, 14, 14, 12, 10, 16, 11, 15, 15, 10, 5, 12, 0, 14, 2.

If the character sort sequence takes the value "1",then the total symbol of the encoded text (in our case, the symbol 10) in the form of a binary vector is passed through the communication line after the transfer of the parent element.

For the obtained values β form a binary vector and pass through the device 5 figure 1 on the receiving end of the radio link.

On the receiving end of the radio link shall decoding the received sequence of symbols β in accordance with the established cryptographic transformation α ≡ (β +y* )· x-1(mod 17) in the finite field F17for example:

β =9, 5, 8, 7, 15, 1, 10, 10, 0, 15, 15, 6, 12, 4,0, 12, 15, 10, 12, 7, 5, 14, 5,

y* =9, 0, 0, 16, 15, 13, 9, 0, 16, 14, 11, 5, 9, 16, 15, 12, 7, 13, 8, 14, 10,

x-1=7, 15, 3, 4, 11, 9, 12, 16, 10, 2, 14, 13, 6, 8, 5, 1,, 12, 8, 11, 13, 3,

α =7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7,, 7, 7, 7, 7, 7.

If you receive a message, an error has occurred, for example, when receiving a tenth of symbol instead of symbol 15 adopted the symbol 10, the decoding of the message this symbol will correspond to the symbol 14 (instead of the symbol 7). This error is corrected as follows:

- calculate the total character of the original text

Withα * =7, 14, 4, 11, 1, 8, 15, 5, 12, 9, 16, 6, 13, 3, 10, 0.

- calculate the discrepancy Δ α total characters transferred the original text Withα and calculatedα * at the receiving side

Δ α ≡α -Cα * (mod p)=10-0≡ 10(mod 17);

- calculate the total symbol of the encoded text

Withβ * =9, 14, 5, 12, 10, 11, 4, 14, 14, 7, 5, 11, 6, 10, 10, 5,

- calculate the discrepancy Δ β total characters transmitted encoded text Withβ and calculatedβ * at the receiving side

Δ β ≡β -Cβ * (mod p)=10-5≡ 5(mod 17);

- compute the character sort sequence used to encode the distorted when receiving

x≡ Δ β · Δ α-1(mod p)=5· 12=60≡ 9(mod 17),

where Δ α-1(Δ α )p-2(mod p) is the inverse element is the compared to the symbol Δ α Fp:

- correct the distorted character of the source text by the formula

α ≡ α +Δ α (mod p)=14+10=24=7(mod 17).

Implementation of the proposed method is straightforward, since all the blocks and units included in the device implementing the method, are well known and widely described in the technical literature.

Sources of information

1. Russian encryption standard the standard of the USSR GOST 28147-89 processing System information. The cryptographic protection. The cryptographic transformation.

2. Smarty. Protection mechanisms in computer networks, M., 1993

3. Vienicai. Elements of cryptography. Fundamentals of theory of protection inrormation. - M.: Higher school, 1999

4. Way line coding discrete information. Patent for invention No. 2002104639/09, IPC 7 H 04 L 9/00.

5. ViewPath. Adaptive protection of information in computer networks. - M.: Radio and communication, 2002

The method of flow encoding digital data, namely, that form the security key as a binary vector of length n bits, served for the initial filling of the shift register with feedback having n bits and generating a pseudorandom sequence of maximal length, containing 2n-1 binary symbols, to form a pseudo-random sequence of characters of a finite field Fpthe characteristic p=257 in the form of binary vectors of length 8 bits by removing information from eight different bits of the shift register, numbers that determine the value of the security key, create characters out of sequence in the form of binary vectors at each stage of the shift register with feedback by multiplying the previous character of this sequence by the generating symbol of a finite field Fp, break the data stream into blocks of characters of the source text in the form of binary vectors of length 8 bits, form the total character of the source text in the form of a binary vector by addition in a finite field Fpcharacter of the original text with all the previous characters of the source text and in turn encode the characters of the source text is multiplied by the characters out of sequence and addition in the finite field Fpthe obtained result with the symbols of the pseudo-random sequence, when in enumerating the sequence of symbol "1" change generating symbol, and as a new generating character take the total character of the source text, formed at this stage of the shift register with feedback, encode new generating symbol and transmit the encoded characters of the source text and coded new generating symbol on the communication line, wherein forming the total symbol of the encoded text as a binary vector by adding in the final paragraph is Le F panother symbol of the encoded text with all the previous characters encoded text and send the total symbol of the coded text line after the transmission of the encoded new generating character sort sequence.

 

© 2013-2014 Russian business network RussianPatents.com - Special Russian commercial information project for world wide. Foreign filing in English.