RussianPatents.com

Method for stream-wise encoding of discontinuous information

Method for stream-wise encoding of discontinuous information
IPC classes for russian patent Method for stream-wise encoding of discontinuous information (RU 2251816):

H04L9/18 - Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems
Another patents in same IPC classes:
Method for stream encoding of digital information Method for stream encoding of digital information / 2246179
Proposed method includes generation of protection key in the form of n-bit binary vector, its supply for initial filling of shift register producing maximal-length pseudorandom character sequence, conversion of data stream into encoded message, and its transfer over communication line; in the process total character of encoded text is shaped and its value is conveyed at moment when search sequence character assumed value equal to unity.
Method for stream encoding of digital information Method for stream encoding of digital information / 2246179
Proposed method includes generation of protection key in the form of n-bit binary vector, its supply for initial filling of shift register producing maximal-length pseudorandom character sequence, conversion of data stream into encoded message, and its transfer over communication line; in the process total character of encoded text is shaped and its value is conveyed at moment when search sequence character assumed value equal to unity.
Method for stream-wise encoding of discontinuous information Method for stream-wise encoding of discontinuous information / 2251816
Method includes generating a protection key in form of a binary vector n-bit long, sending it for primary filling of displacement register, generating pseudo-random series of maximal length, generating pseudo-random series of symbols, transforming data stream to encrypted message and transmitting the latter along communication line, while pseudo-random series is generated as pseudo-random series of symbols of finite field Fp with characteristic p=2k+1 in form of binary vectors k-nit long by getting information from k different bytes of displacement register with check connection, numbers of which are determined on basis of protection key, and number k is selected equal to one of members of geometric row, which has denominator and first member equal to two, and also a pseudo-random series of symbols is formed for finite field of odd values of symbols due to skipping clock pulses of displacement register with check connection for which pseudo-random series symbols take even values and serially transforming in finite field Fp symbols of source text by involution thereof, appropriate for pseudo-random series symbols.
Method and device for encoding transmissions in communication system Method and device for encoding transmissions in communication system / 2273102
Method and device for encryption of transmission traffic at separate levels of protocol include assignment of separate transmission traffic types to separate encryption elements, to make it possible to realize different encryption levels depending on services requirements. Encryption elements utilization input signals of alternating value, named crypto-synchronizations, together with semi-variable encryption keys for protection from protection bypassing attempts by means of information copying by foreign mobile stations. Also provided is method for synchronization of values of crypto-synchronization of encryption algorithm in mobile and base stations.
Method for generating cryptographic-algorithm sync pulses in communication systems incorporating provision for simulation protection and privacy of messages transferred Method for generating cryptographic-algorithm sync pulses in communication systems incorporating provision for simulation protection and privacy of messages transferred / 2287222
Proposed method designed to provide privacy and/or protection of data bursts transferred in communication system involves generation of cryptographic-algorithm sync pulse by means of special conversion. In the process sync pulse is generated for multiple-access communication systems from unique values assigned to each communication resource within which data bursts being protected are transferred thereby ensuring uniqueness of sync pulses for various messages and their strict ordering in communication resource space. Assignment of unique values to communication resource includes type of multiple access used in communication system. For instance, time interval number and frequency band number are used as unique value assigned to communication resource for communication systems built around time-frequency division of communication channel.
Method for cryptographic transformation of digital data Method for cryptographic transformation of digital data / 2309549
In accordance to the invention, a block of digital data is split onto N ≥ 2 n-bit sub-blocks of digital data, then each sub-block of digital data is subjected to controlled operational substitution, which is realized in S serially executed cycles. Each cycle includes simultaneous execution of Z elementary controlled substitutions and following execution of fixed permutation. Controlled operational substitution is executed using previously generated control vector based on digital data sub-block or digital data sub-block and a secret key. Examples of method realization are provided for one-sided cryptographic transformation and for encoding.
Information protection method Information protection method / 2325766
Said utility invention relates to information storage and transmission protection and may be used at both software and hardware implementation levels in communication systems, computer and information systems for cryptographic protection of text, voice, audio, and video information in the digital form, as well as for the protection of goods against falsification. It is achieved due to the discovery of prime number laws, according to which a sequence containing only prime numbers running is a strictly theoretical unidirectional function of four variables, which made it possible to create a linear algorithm of generation of only prime numbers running, and allowed to transfer the gamma generation at the finite machines into a non-periodic operating mode.
Stream cipher structure with cyclic buffer movement Stream cipher structure with cyclic buffer movement / 2390949
Said amplification directly increases efficiency of encoding/decoding data using stream ciphers. Output generator values are combined into pairs. The pairs of output values must be sufficiently spaced apart to be considered independent. The method enables successive storage of several results provided by output of the stream cipher in the first, second and third memory units. The pair formation function combines separate values from the first and third memory units, separated from each other by at least a threshold value, into pairs. After attaining the threshold value, contents of the first, second and third memory units undergo successive cyclic movement.
Scrambler, scramble processing method and data medium Scrambler, scramble processing method and data medium / 2404518
Multiplication value decision unit (12) decides a multiplication value which is a positive value or a negative value corresponding to a bit value of each bit contained in a binary bit string constituting a scramble pattern generated in a pattern generation unit (11). A multiplication processing unit (13) multiplies symbol data representing each symbol value in the symbol data string formed by the multi-value symbol containing a predetermined pair of a positive value and a negative value having an identical absolute value, in the value area, by the multiplication value decided by the multiplication value decision unit (12). At that moment, the multiplication processing unit (13) successively executes multiplication between the symbol data for one symbol and the multiplication value decided in accordance with the bit value of the one bit contained in the scramble pattern until the number of symbols expressed by the symbol data string is reached.
Generation method of common secret key of two remote subscribers of telecommunication system Generation method of common secret key of two remote subscribers of telecommunication system / 2412548
Open key Y1 of the first subscriber is shaped by generating its private secret key in the form of two X1 and W1 elements of G group, by generating additional private secret key of the first subscriber in the form of many-digit binary number s1, by generating V1 element of G group by the formula
Information protection method Information protection method / 2423800
Symmetric information encryption is applied and automatic distribution of encryption/decryption keys is organised between communicating parties, wherein the generator of random number sequences which form unpredictably varying encryption/decryption keys used is numeric equivalents of measurement results of a random natural process. Said random process is produced in the same way only at locations of the communication devices of the said communicating parties, and can therefore not be accessed without authorisation, which prevents intruders from accessing secret encryption/decryption keys.

FIELD: computer science, communications.

SUBSTANCE: method includes generating a protection key in form of a binary vector n-bit long, sending it for primary filling of displacement register, generating pseudo-random series of maximal length, generating pseudo-random series of symbols, transforming data stream to encrypted message and transmitting the latter along communication line, while pseudo-random series is generated as pseudo-random series of symbols of finite field Fp with characteristic p=2k+1 in form of binary vectors k-nit long by getting information from k different bytes of displacement register with check connection, numbers of which are determined on basis of protection key, and number k is selected equal to one of members of geometric row, which has denominator and first member equal to two, and also a pseudo-random series of symbols is formed for finite field of odd values of symbols due to skipping clock pulses of displacement register with check connection for which pseudo-random series symbols take even values and serially transforming in finite field Fp symbols of source text by involution thereof, appropriate for pseudo-random series symbols.

EFFECT: higher resistance to attacks on basis of known and sorted out texts.

4 cl, 2 dwg

 

The invention relates to the field of telecommunications and computing, and more particularly to methods and devices for the cryptographic transformation of data.

Known methods of flow encode discrete data (see, for example, the Russian encryption standard the standard of the USSR GOST 28147-89 [1], the British algorithm B-Grypt, which is a Supplement to the U.S. standard DES [2] p.50, 126, and the method described in [3], p.50-51).

In the known methods of encoding digital data is performed by generating a security key, generating a pseudo-random sequence of binary symbols and converting the data stream, comprising the operations of addition modulo two characters of the data stream with symbols of pseudo-random sequence.

Known methods analogous to stream encoding discrete information ensure the integrity of transmitted information.

The closest to the technical nature of the claimed method is a method presented in [2], str-127 and in [3], p.50-51.

Prototype method includes forming a security key as a binary vector of length n-bits, feed it to the initial filling of the shift register with feedback, having n bits, the formation with the use of the shift register pseudo-random sequence of maximal length, terzidou 2 n-1 binary symbols, the data flow transformation by adding modulo two characters of the source text with symbols of pseudo-random sequence and transmitting the encoded message over the connection to another network user.

However, the prototype method has drawbacks. Despite the fact that the code is based on the addition of a stream of pseudo-random bits with bits of the original text in module 2 is, in General, theoretically unrecognizable (see [2], str the coding system is not persistent and may be disclosed. If the structure of the shift register having n-bits is known, to find the initial state of the shift register, it is necessary to know n symbols known plaintext, which are summed modulo 2 with the corresponding n-symbols of the encoded text. Received n symbols of pseudo-random sequences are used to indicate the state of the shift register at some point in time. Simulating the operation of the shift register in the reverse direction, it is possible to determine its original state, and therefore the keys used by network users for encoding information.

If the structure of the shift register having n-bits is unknown, it is enough 2· n characters known plaintext and corresponding 2· n symbols of the encoded text, the button relatively quickly (within a few seconds the computer) to determine the state of the shift register and used to compute the keys (see, for example, [4], p.92).

And this leads to decrease in resistance code to attacks based on known and selected source that does not provide confidentiality of information and leads to the need to change the security key. Security keys can be used only once and at the next session should be determined anew.

The invention is aimed at improving the life code to attacks based on known and selected source.

This is achieved by the known method of encoding digital data, which consists in forming a security key as a binary vector of length n bits, feed it to the initial filling of the shift register with feedback, having n bits, the formation with the use of the shift register pseudo-random sequences of maximum length, containing 2n-1 binary symbols, the data flow transformation of the source text in the encoded message and send it through the communication line, according to the invention a pseudo-random sequence is formed as a pseudo-random sequence of characters of a finite field Fpwith characteristic p=2k+1 in the form of binary vectors of length k bits by removing information from k different bits of the shift register, and the number k is chosen equal to one of the members of the geometric p is agressie, which the denominator and the first member is equal to two, while miss those cycles of operation of the shift register, for which the symbols of pseudo-random sequences take even values that divide the data stream source blocks of characters of the source text in the form of binary vectors of length k bits, and in turn transform in a finite field Fpthe characters of the source text by raising them to the level corresponding to the symbols of pseudo-random sequence.

In the combination of features of the proposed method under a binary vector refers to the signal as a sequence of zeros and a single bit corresponding to the representation of a number in binary.

Listed set of essential features eliminates the possibility of defining security keys by using the method of cryptanalysis with known plaintext and increases the stability of the code to attacks based on known and selected source. In this case, the generated pseudo-random sequence of characters in the form of binary vectors of length k bits are pseudorandom sequence of symbols {0,1,2,... ,p-1} of a finite field Fphas the same period N=2n-1, as a pseudo-random sequence of binary numbers and provide statistical uniformity of the used symbols.</>

By skipping stages of the shift register, for which the symbols of pseudo-random sequences take even values will be generated pseudo-random sequence of symbols x of odd numbers 1,3,5,7,... ,p-2, which is used for character encoding of the source text α by constructing them in a degree corresponding to the symbols of pseudo-random sequence X. If this encoded message is to represent a sequence of characters β determined by the formula

β ≡ αx(modp).

Since the number p=2k+1 is Prime, then the Euler function ϕ (p)=(p-1) and in accordance with the Euler-Fermat will have the following identity

α1+mϕ (b)1+m(p-1)α (modp).

Since x· x-1=1+m(p-1)≡ 1(mod(p-1)),

where m is an arbitrary positive integer,

x-1the symbol opposite to the symbol x in the ring of residue class modulo

p-1,

then the relation is valid : In this case, calculated at the receiving side the values of the symbols x-1in the ring of residue class modulo p-1 allow to implement the inverse transform for decoding the source text

Since a pseudo-random sequence x contains only odd the e symbols 1,3,5,... ,R-2, they are elements of the multiplicative group of the ring of classes of deduction modulo p-1 and will have the opposite values of x-1that can be defined by the formula

where ϕ (p-1) is the Euler function for the number of R-1. Since p-1=2kϕ (p-1)=2k-1. In this case, x-1can be calculated by the formula

where q=2(k-1)-1. Thus to calculate the x-1can be used in the algorithm fast erection of integers modulo presented in [4] on page 39.

As cryptographic transformations are operations of the erection of the characters in the degree in a finite field Fpa pseudo-random sequence of characters is formed on the principle of compression generator with an uneven movement of the shift register, it eliminates the opening state of the shift register in the presence of arbitrarily original characters and symbols of the encoded text. This is because to determine the symbols of pseudo-random sequences for known characters of the original and the encoded text requires the computation of discrete logarithm in a finite field Fpthat can only be achieved as a result of total enumeration of characters this field, and to determine the state of the shift register is calculated by the symbols of pseudo-random sequences, you must know the symbols of pseudo-random sequence to skip stages of the shift register, the beginning and are in the process of a sequential movement of the shift register is changed in a pseudo-random law. This provides resistance code to attacks based on known and selected source, as the opening state of the shift register in this case can only be achieved through a total enumeration of the entire set of possible States of the shift register. Because the U.S. standard DES involves the use of a shift register with 128bit encryption (key length 128 bits), the cardinality of the set of possible States of the shift register will be 1038. If the opening state of the shift register will be implemented using a computer having a clock frequency of 100 GHz, the number of operations performed by the computer during the year will be 3· 1020and time of opening is 1017years.

In accordance with the Russian standard GOST 28147-89 to the shift register, has 256 bits (256-bit key length), the time of opening state of the shift register will be 1057years.

The possibility of technical realization of the inventive method is explained as follows. The formation of the security key can be done by entering password from the keyboard or from the magnetic media in a pseudo-random number generator, which in turn yields a security key required size.

p> The formation of pseudo-random sequences of maximum length, containing 2n-1 character, can be done by using a linear shift register having n bits, the feedback of which is determined by referring to the selected primitive polynomial of degree n. Finding primitive polynomials of degree n is given in [4] on p.106-110.

The formation of a pseudo-random sequence of characters of a finite field Fpin the form of binary vectors of length k bits can be done by removing information from k different bits of the shift register numbers that can be defined by the value of the entered security key K. for Example, by defining a generating element

if l0<2, l0=2,

and the numbers of discharge of the shift register according to the formula

l1=l0,

The value of q is chosen from primes and to the shift register, has 256 bits, q=257, for a shift register having 128 bits, q=127. In this case, due to the exponentiation of the parent number of l0we will move from one field item Fqto another. In this case, as shown in [4], p.9, if l0- an element of order k, then allwill be different.

A pseudo-random sequence of characters is the end product of the La F pyou can also type "compression generator" by removing information from k bits of the shift register and skip those stages of the shift register, for which the symbols of pseudo-random sequences take even values.

Since p must be a Prime number equal to p=2k+1, as k choose one of the members of a geometric progression 2, 4, 8, 16, 32, 64,... , with the denominator equal to two.

The generated pseudo-random sequence of a finite field Fpuse in cryptographic transformation when converting the data stream in the encoded message:

αxβ(mod p)

Can be used three variants of the formation of pseudo-random sequences of characters of a finite field as binary vectors.

1. Change the number of digits k, c which information is collected for a pseudo-random sequence of characters of a finite field Fpp=2k+1 in accordance with the change of the initial filling of the shift register.

2. Change the number of bits of the shift register from which information is collected for a pseudo-random sequence of characters of a finite field, in accordance with the change of the initial filling of the shift register.

3. Change the order of reading data for random effects the successive characters of a finite field in accordance with the change of the initial filling of the shift register.

The formation of a pseudo-random sequence of characters of a finite field according to claim 1, 2 and 3 increases the stability of the code to attacks based on known and selected source code in the formation of a security key or a binary vector of pseudo-random sequences of small length.

The conversion of the data stream in the encoded message can be done by splitting the original data into blocks as symbols α binary vectors of length k bits, the computation in a finite field Fp(p=2k+1) values of the characters β encoded text in accordance with the selected function encoding, αx≡ β (mod p), converting the received number β in the binary vector, and transmit it over the wire. This can be used to fast a number raised to a degree in a finite field Fppresented in [4] on page 39.

The proposed method can be implemented using the device. Figure 1 shows the block diagram of the device, where

unit 1 - forming device protection key and the original signal;

unit 2 - the shift register;

block 3 - shaper pseudo-random sequence;

unit 4 - the encoder;

block 5 - transmitting device.

For the shift register in figure 2 blocks 6-11 - bits 1-6 of the shift register and the block 12 is modulo two.

D is I the simplicity of the description of the operation of the device will use small numbers. We assume that the shift register is 6 bits (the key length is 6 bits), and the entire alphabet of the source text contains 16 characters, then to send a single character can be used a binary vector of length 4 bits, and as the characteristic of a finite field Fpcan be selected number p=17.

To define the structure of the shift register is chosen primitive polynomial of the sixth degree, for example

λ65+1

For the selected primitive polynomial, the structural diagram of the shift register with feedback presented in figure 2.

Formed in the block 1 figure 1 using a random number generator security key length of 6 bits

< λ6thatλ5thatλ4thatλ3thatλ2thatλ1>

where λ1=0, λ2=0, λ3=0, λ4=1, λ5=1, λ6=1;

enters the shift register and is used for initial filling of bits of the shift register. Binary characters 5 and 6 of the discharge of the shift register receives at each stage to the input of the adder 12 modulo two, and from the output of the modulo two characters ε proceed to input the first digit of the shift register (block 6, figure 2). The status bits for each measure in the process of the shift register are determined by the expression

λii-1 λ1

If the characters will be shot with a sixth category λ6the shift register (block 11, figure 2), the binary pseudo-random sequence, the maximum period will be

{1110000010000110001010011110100011

100100101101110110011010101111}.

Note that the period of this sequence is any non-zero set of six digits 0 and 1 occurs only once.

If the binary number will be removed from 1, 2, 3 and 4 digits of the shift register (blocks 6, 7, 8, 9, 2) and at each stage of the shift register with a set of <λ1thatλ2thatλ3thatλ4> will associate a binary vector (number) y=λ1+2λ2+22λ

3
+23λ
4
the sequence of binary numbers in the process of the register can be viewed as a sequence of numbers (characters) {0, 1, 2,... , 15} as

y={8,0,0,1,2,4,8,0,1,3,6,12,8,1,2,5,10,4,9,3,7,15,14,13,

10,4,8,1,3,7,14,12,9,2,4,9,2,5,11,6,13,11,7,14,13,11,6,12,9,

3,6,13,10,5,10,5,11,7,15,15,15,14,12,... }.

Analysis of the generated sequences have shows that in the interval corresponding to the period equal to 63 cycles of operation of the shift register, each of the C symbols {1, 2,... , 15} occurs exactly four times. The character corresponding to the zero occurs exactly three times in the sequence have no hidden periodicity and provides statistical uniformity of the characters used.

Because in the process of the shift register do not use the cycles in which the characters do take even values, it generates a pseudorandom sequence of numbers (characters) 1, 3, 5, 7, 9,... , 15 in the form:

x=1,1,3,1,5,9,3,7,15,13,1,3,7,9,9,5,11,13,11,7,13,11,9,3,3,13,5,5,11,7,15

Formed in the block 1 1 security key 111000 served in block 2 of figure 1. In block 3 form a pseudo-random sequence of odd characters.

The generated pseudo-random sequence of characters of a finite field x in the form of binary vectors served in the encoder 4 figure 1 where convert the incoming data flow λ encoding the message β in accordance with the selected cryptographic transform in a finite field F17for example

α =7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,

x=1,1,3,1,5,9,3,7,15,13,1,3,7,9,9,5,11,13,11,7,13,

β =7,7,3,7,11,10,3,12,5,6,7,3,12,10,10,11,14,6,14,12,6.

For the obtained values β form a binary vector and pass through the device 5 figure 1 on the receiving end of the radio link.

On the receiving end of the radio link shall decoding the received sequence of symbols β in compliance and with the installed cryptographic transformation α ≡ βx-1(modl7) in the finite field F17. Since p=17, k=4, x-1is carried out according to the formula x-1x7(mod16). Then for the considered example, the values of the respective symbols by decoding the message will be:

β =7,7,3,7,11,10,3,12,5,6,7,3,12,10,10,11,14,6,14,12,6,

x=1,1,3,1,5,9,3,7,15,13,1,3,7,9,9,5,11,13,11,7,13,

x-1=1,1,11,1,13,9,11,7,15,5,1,11,7,9,9,13,3,5,3,7,5,

α =7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7.

Implementation of the proposed method is straightforward, since all the blocks and units included in the device that implements the method, well-known and widely described in the technical literature.

Sources of information

1. Russian encryption standard the standard of the USSR GOST 28147-89. The information processing system. The cryptographic protection. The cryptographic transformation.

2. Smarty. Protection mechanisms in computer networks. M., 1993

3. Vienicai. Elements of cryptography. Fundamentals of theory of information security. M.: Higher school, 1999

4. ViewPath. Adaptive protection of information in computer networks. - M.: Radio and communication, 2002

1. The method of flow encoding digital data, namely, that form the security key as a binary vector of length n bits, served for the initial filling of the shift register with feedback having n digits, is formed using Regis is RA shift pseudo-random sequence of maximal length, contains 2n-1 binary symbols, perform data flow transformation of the original text into a coded message by splitting a data flow of the source text into blocks as symbols of the binary vectors of length k bits and transmit it over the communication line, characterized in that to form a pseudo-random sequence as a pseudo-random sequence of characters of a finite field Fpwith characteristic p=2k+1 in the form of binary vectors of length k bits by removing information from k different bits of the shift register with feedback, the number of which is determined by the value of the security key, and the number k is chosen equal to one of the members of a geometrical progression, in which the denominator and the first member is equal to two, thus forming a pseudo-random sequence of characters of a finite field of odd values character by skipping stages of the shift register with feedback, for which the symbols of pseudo-random sequence taking odd values, and in turn transform in a finite field Fpthe characters of the source text by raising them to the level corresponding to the symbols of pseudo-random sequence.

2. The method according to claim 1, characterized in that each communication session change number of digits k that information is collected for the formation of binary, etc) the ditch pseudo-random sequence in accordance with the change of the initial filling of the shift register with feedback.

3. The method according to any one of claims 1 to 2, characterized in that each communication session change number of bits of the shift register from which information is collected for the formation of binary vectors of pseudo-random sequence in accordance with the change of the initial filling of the shift register with feedback.

4. The method according to any one of claims 1 to 3, characterized in that each communication session, change the order of reading data from the selected bits of the shift register for the formation of binary vectors of pseudo-random sequence in accordance with the change of the initial filling of the shift register with feedback.

 

© 2013-2014 Russian business network RussianPatents.com - Special Russian commercial information project for world wide. Foreign filing in English.