Method for encoding/decoding

FIELD: electric communications.

SUBSTANCE: method is performed using microcontrollers with two memory types: data and software. For transfer of each symbol individual main and reserve codes are used, on basis of number of repeats of symbol in transferred message. First transfer of symbol is performed by main code, second transfer of same symbol - by reserve code, and then codes synchronization displacement is activated for a step around circle relatively to symbols until finish of circle. After transfer of displaced reserve code, closing the circle, synchronous replacement of codes variants is performed, and then order of codes replacement is repeated in case of repeat of any symbol in transferred message. Number of required code variants is set by planned volume of information, sent via communication line.

EFFECT: higher efficiency.

1 dwg

 

The invention relates to the field of telecommunication and can be used as a method of encoding-decoding to protect information during transmission over the communication line.

Known methods of encoding-decoding use the same code to transmit the information symbol regardless of the number of its repetitions in the transmitted message. This affects the security of the communication channel and allows decryption of the message transmitted by needresume.

Currently, the protection of information in communication networks mainly provide methods for effective coding, see, for example, Megarobot, Kagosima, Smerobot. “Theoretical foundations of secure protection stationary protected objects”, ed. “Home of the Grail”, Moscow, 2002, page 100...115. The use of effective codes provides practical reliability of information protection at the maximum transfer rate. However, this did not address the issue with the transfer is repeated in the message characters. They will be sent the same codes. This impairs the security of information transmitted in the communication network from unauthorized access.

Known methods of encoding-decoding the closest analogue may be recognized as a way built “Electronic locking device”, see Patent No. 2180386 on application No. 2001100885, is) from 09.01.2001, which is selected as a prototype.

The prototype contains transceivers and microcontrollers with two kinds of memory: data and software. The data memory contains the same for lock and key account codes for each individual release. Program memory contains a record of commands that are run when the vehicle is unlocked or locked. The data memory contains n cells. In each of the cells recorded different code on each opening of the lock. In one of the memory cells of the data is the code for the current release, which subsequent locking randomly goes into another cell. In the program memory contains a sequence of commands that are used when unlocking and locking the lock. These commands for the key and lock are different and run automatically after pressing the key “OPEN” or “CLOSE”.

The prototype works as follows. When working between the key and lock is a two-way communication. For unlocking the key asks for the number of cells in which the recorded code unlock. On request key lock transmits a key to this room. In accordance with the room key gets the unlock code from its memory and transmits it to the castle. Get the code unlocking, the lock is unlocked.

When locking the lock code unlock automatically changes randomly for a new one, which is written in another memory cell of the castle.

The original prototype cannot be used as a coding-decoding device, however, on the basis of a prototype of such a device can be created.

The aim of the invention is the creation of a coding-decoding device, which improves the quality of protection through on-line communication information from interception her needresume by converting the transmitted message in code, without repetitions.

This goal is achieved by the fact that in the encoding-decoding device, the microcontroller has two kinds of memory: data and software. In-memory data written characters, such as letters, numbers, symbols, and the corresponding individual codes for the transmission of symbols over a communications line. In the program memory of the listed commands, which leads to the substitution of symbols for codes in encoding and codes to the symbols in the decoding device. Each character in the data memory is made with a permanent address. The codes used for transmission of any character performed with a variable address. Due to this, any re-transmission symbol in the transmitted message has a new code. There are several options codes. In each embodiment, each symbol has its own primary and redundant code.

Code transmitted symbol defined the program memory based on the number of its surface is of Areni in the transmitted message. The first transmission symbol made the main code. The second transmission of the same symbol backed code. Then in the encoding-decoding device involved simultaneous shift codes on the step in a circle towards the characters. Re the third transmission symbol executed shifted the main code. Fourth retransmission symbol made eect of redundant code. Then used a synchronous shift codes for the next step. This is repeated until the completion of the circle. After the transmission is shifted back code, closing the circle, in the encoding-decoding device is made synchronous change options codes. Then the procedure for change codes when the repetition of any character in the transmitted message is repeated. The number of required option code is set to the planned volume of information transmitted over communication lines, equipped with data a sample of the coding-decoding device.

The drawing shows a structural diagram of the inventive device. In this scheme, the transmitted signal is connected to codereuse device 1. This signal is fed to the input node, the program memory 2. Node 2 has a two-way communication with the node data memory 3. The output signal of encoder 1 are codes that are removed from the output node 2.

The received code signal is connected to a decoding device 4. This is t the signal at the input node program memory 5. Node 5 has two-way communication with the node data memory 6. The output signal of the decoding device 4 are characters that are removed from the output node 5.

The claimed device operates as follows. Depending on the number of repetitions of the same symbol in the transmitted message, the inventive device is either a major source or backup code, or replacement option codes.

Consider these modes of operation.

1. The operation of the device with the main code.

The encoder 1 is running the following commands in the program memory 2:

1. The reception of a symbol.

2. The transmission symbol in the address data memory.

3. Query of the main character code from the data memory.

4. The main character code from the data memory.

5. Transmission main character code to the output of the coding device 1.

The decoding device 4 operates in the following commands in the program memory 5:

1. The receiving core code.

2. Transmission main code in the memory address data.

3. The query symbol from the data memory.

4. Receiving the symbol from the data memory.

5. The transmission symbol at the output of the decoding device 4.

2. The operation of the device with the backup ID.

The encoder 1 is running the following commands in the program memory 2:

1. Repeated reception of the same symbol.

2. The transmission is of mwala in the memory address data.

3. Request backup character code from the data memory.

4. Getting back character code from the data memory.

5. Transfer backup character code to the output of the coding device 1.

6. In-memory data, relative to character, the offset of the individual codes on the step in a circle.

The decoding device 4 operates in the following commands in the program memory 5:

1. Welcome back code.

2. Transfer the backup code in the memory address data.

3. The query symbol from the data memory.

4. Receiving the symbol from the data memory.

5. The transmission symbol at the output of the decoding device 4.

6. In-memory data, relative to character, the offset of the individual codes on the step in a circle.

3. The operation of the device with the replacement option codes.

The encoder 1 is running the following commands in the program memory 2:

1. Repeated reception of the same symbol, which refers to the last step of the circle.

2. The transmission symbol in the address data memory.

3. Request backup character code from the data memory.

4. Getting back character code from the data memory.

5. Transfer backup character code to the output of the coding device 1.

6. In-memory data change options codes.

The decoding device 4 operates in the following commands in the program memory 5:

1. Welcome back code of the last step of the kr who ha

2. Transfer back code of the last step of the circle in the memory address data.

3. The query symbol from the data memory.

4. Receiving the symbol from the data memory.

5. The transmission symbol at the output of the decoding device 4.

6. In-memory data change options codes.

If you need to expand the communications network new subscriber, before be included in the connection requests from any of the subscribers operating in a communication network, the code that is currently being used for transmission of the first character. After receiving it, a new subscriber sets in-memory data source individual codes of all characters on the basis of the code of the first character. These codes coincide with the source at the moment of time at which network subscribers. Then a new subscriber maintains communication in the usual manner.

The line, which included the inventive device provides communication codes without repetition.

This quality is achieved by the fact that each re-transmission of any character in the transmitted message is a new code.

Due to this, no decoding of the message transmitted by padrasto with the interception of a communication session.

The encoding-decoding, protecting information during transmission over the communication line from the intercept are not the addressees performed using microcontrollers, which are two of the IDA memory: data and software, characterized in that the data memory write characters, such as letters, numbers, symbols and corresponding individual codes for the transmission symbols in the communication line, the program memory of the put command, which leads to the substitution of symbols for codes in encoding and codes to the symbols in the decoding device, with each symbol in the data memory perform with a permanent address, and codes used for transmission of any character, performed with a variable address, due to which any re-transmission symbol in the transmitted message has a new code, and involved several variants of code that have each character has its own primary and backup codes, and code transmitted symbol is determined by the command program memory, based on the number of its repetitions in the transmitted message, the first transmission symbol execute the main code, and the second redundant code, then in the encoding-decoding device uses a synchronous shift codes on the step in a circle towards the characters, re third gear symbol carry out is shifted to the main code, the fourth retransmission symbol fulfill shifted back ID, and then uses a synchronous shift codes on the next step, and this is repeated until the completion of the circle, and after sending out backup is ode, closing the circle, in the encoding-decoding device to perform synchronous shift options, codes, and then the procedure for change codes when the repetition of any character in the transmitted message is repeated, the number of required option code is set to the planned volume of information transmitted over communication lines, equipped with data a sample of the coding-decoding device.



 

Same patents:

The invention relates to the field of telecommunications and computing, and more particularly to the field of cryptographic transformation of data

The invention relates to the field of telecommunications, computing and cryptography

The invention relates to the field of telecommunications and computing, and more particularly to the field of cryptographic devices for data encryption

The invention relates to the field of telecommunications and computing, and more particularly to the field of cryptographic methods for data encryption

The invention relates to the field of telecommunications and computing, and more particularly to the field of cryptographic methods for data encryption

The invention relates to the field of telecommunications and computing, and in particular to the field of cryptographic methods and devices for data encryption

The invention relates to a method of generating a key sequence for encryption of transmitted data for secure transmission of information

The invention relates to telecommunications and computing, and more particularly to cryptographic methods for data encryption

The invention relates to the field of telecommunications and computing, and more particularly to the field of cryptographic data encryption

The invention relates to the field of cryptography, namely the formation of the encryption key/decryption, and can be used as a separate element in the construction of symmetric cryptographic systems designed for transmission of encrypted voice, sound, television, and other messages

FIELD: electric communications.

SUBSTANCE: method is performed using microcontrollers with two memory types: data and software. For transfer of each symbol individual main and reserve codes are used, on basis of number of repeats of symbol in transferred message. First transfer of symbol is performed by main code, second transfer of same symbol - by reserve code, and then codes synchronization displacement is activated for a step around circle relatively to symbols until finish of circle. After transfer of displaced reserve code, closing the circle, synchronous replacement of codes variants is performed, and then order of codes replacement is repeated in case of repeat of any symbol in transferred message. Number of required code variants is set by planned volume of information, sent via communication line.

EFFECT: higher efficiency.

1 dwg

FIELD: electric communications and computer engineering, in particular, information safety of telecommunication systems, possible use in cryptographic systems with open distribution of encryption keys.

SUBSTANCE: at information receiver side, open encryption key is generated in form of two multi-bit binary numbers p and α. First multi-bit binary number is selected so that Eiler function φ(p) contains at least one simple multiplier γ in form of ξ-bit binary number. Second multi-bit binary number α is calculated from formula α=βφ(p)/γmod p. Then open encryption key is transferred to information sender, where image of encryption key is formed R=[αWmodp]tmodp, where t≥2 - coefficient, previously given by information sender and information receiver, and W - randomly generated multi-bit binary number. After that image of encryption key is transferred to information receiver, where encryption key is calculated from formula K=RZmodp, where Z=tγ-2modγ. Also proven is that when using the invention, amount of encryption key computation is reduced 4-16 times.

EFFECT: decreased encryption key generation time while preserving required encryption tolerance.

5 cl

FIELD: radio engineering, communication.

SUBSTANCE: method for end-to-end encrypted communication includes: storing a set of keys suitable for end-to-end encrypted communication in a user terminal. One or more keys are associated with a validity indicator which defines a cryptographic group of two or more user terminals in which the corresponding key should be used, and a period during which said key is usable in said cryptographic group; connecting, at the user terminal, to the cryptographic group communication and selecting the key to be used from the stored set of keys based on said cryptographic group and current time in accordance with the associated validity indicator.

EFFECT: high data transmission safety.

20 cl

FIELD: information technology.

SUBSTANCE: method involves using a first set from one or more input encryption parameters for decrypting data in a received protocol data unit, wherein encrypted data were encrypted using a second set from one or more input encryption parameters; comparing the value of at least part of the decrypted data with an expected value; detecting, using a decryption control scheme, an encryption error if the value of at least part of the decrypted data does not match the expected value; and initiating an encryption resynchronisation procedure in response to the determination that there has been an encryption error, in order to resynchronise at least one input encryption parameter from the first set with at least one input encryption parameter from the second set.

EFFECT: solving problems of detecting and correcting encryption errors in a network not designed to support an encryption error correction procedure.

14 cl, 6 dwg

FIELD: radio engineering, communication.

SUBSTANCE: invention relates to authentication methods and specifically to methods and an apparatus for authentication of subscribers in IP telephony networks. The technical result is achieved due to that the disclosed method for authentication through a user device when attempting to access an IP telephony network comprises steps of: obtaining one or more private keys of said user from secure memory associated with said user device; generating an integrity key and a ciphering key; encrypting said integrity key and said ciphering key using a session key; encrypting said session key with a public key of said IP telephony network; and providing said encrypted session key, encrypted integrity key and encrypted ciphering key to said IP telephony network for authentication using a public key infrastructure (PKI) coupled with an authentication and key agreement (AKA) mechanism.

EFFECT: more secure communication.

7 cl, 4 dwg

FIELD: computer engineering.

SUBSTANCE: invention relates to computer engineering and can be used for authorised transmission of data between control software and computer hardware. Method comprises transmitting command words combined into pools, transmitted in limited time intervals. Each pool is analysed, and in case of detecting command words issued by foreign sources, a request for repeated transmission of entire pool is generated. This, on one hand, improves reliability of communication between source and receiver, and on other hand increases probability of so called denial of service attacks. To prevent such attacks, present method allows separation from plurality of command words received by receiver of command from those which are issued by a legal source to reduce probability of request for repeat transmission of pools of command words.

EFFECT: ensuring authenticity of transmission of command words from legal source to a device while ensuring protection from interception and substitution of transmitted command words.

1 cl, 5 dwg

FIELD: electric communications.

SUBSTANCE: method is performed using microcontrollers with two memory types: data and software. For transfer of each symbol individual main and reserve codes are used, on basis of number of repeats of symbol in transferred message. First transfer of symbol is performed by main code, second transfer of same symbol - by reserve code, and then codes synchronization displacement is activated for a step around circle relatively to symbols until finish of circle. After transfer of displaced reserve code, closing the circle, synchronous replacement of codes variants is performed, and then order of codes replacement is repeated in case of repeat of any symbol in transferred message. Number of required code variants is set by planned volume of information, sent via communication line.

EFFECT: higher efficiency.

1 dwg

FIELD: computer science and communications engineering, in particular, methods and devices for cryptographic transformation of data.

SUBSTANCE: method includes generating two binary vectors of numbers a and p, having certain parameters, transferred by means of unprotected communication channel to each user of network, and generation by network users independently from each other of secret keys and generation of open keys by network users by means of transformation of binary vectors of secret key and numbers a and p, to obstruct possible determining of secret keys, and also common secret sub-keys of network users, while for determining secret sub-keys K it is required to know binary checksum vector of transferred message ξ, which changes for each communication session in random fashion. Utilization of checksum for source message during generation of protection key allows to prevent imposing of false information and to determine errors in transferred message, while possibility of determining of secret keys and common secret sub-keys of network users is excluded even when using cryptanalysis method with known open text. Instead of generation of binary checksum vector for transferred message binary hash function vector may be generated for transferred message or a random binary vector, for example, by using random numbers generator in conjunction with timer indications.

EFFECT: increased speed of operation of encoding-decoding key generation process and increased message encoding speed.

1 dwg

FIELD: technological processes.

SUBSTANCE: invention may be used both at software and hardware implementation levels in computing and information systems for cryptographic protection of information in digital form. As keys, sequence of prime numbers (PN) in a row are used, order numbers (indices) of which are vectors of users initialization. For identification individual number of users is used. User with one personal number may enter different systems, where there is a current PN value corresponding to them from prime numbers range, which is licensed for this system. Size of stated sequence forms circle, that is after the last PN goes the first PN. Change of keys is done by shifting the register by correct time signals.

EFFECT: improves reliability of information protection.

2 cl, 1 dwg

FIELD: information technologies.

SUBSTANCE: method includes stages, at which the following is carried out: according to the system parameters, which are previously determined by the third object, the first object sends a packet of access authentication request to the second object, then the second object inspects authenticity, whether the signature of the first object is correct, and if yes, the general main key of the second object is calculated; the second object develops a packet of access authentication response and sends it to the first object, then the first object checks authenticity, whether the signature of the access authentication response and the code of message integrity check are correct; if yes, the general main key of the first object is calculated; the first object sends a packet of access authentication confirmation to the second object, the second object inspects authenticity of integrity of the access authentication confirmation packet, if, having passed the authenticity check, the general main key of the first object is matched with the general main key of the second object, access authentication is achieved.

EFFECT: higher reliability of authentication and reduced load at transfer of service signals.

6 cl, 1 dwg

FIELD: radio engineering, communication.

SUBSTANCE: method for end-to-end encrypted communication includes: storing a set of keys suitable for end-to-end encrypted communication in a user terminal. One or more keys are associated with a validity indicator which defines a cryptographic group of two or more user terminals in which the corresponding key should be used, and a period during which said key is usable in said cryptographic group; connecting, at the user terminal, to the cryptographic group communication and selecting the key to be used from the stored set of keys based on said cryptographic group and current time in accordance with the associated validity indicator.

EFFECT: high data transmission safety.

20 cl

Up!