IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0108312
(1998-07-01)
|
발명자
/ 주소 |
- Scheidt Edward M.
- Wack C. Jay
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 |
피인용 횟수 :
20 인용 특허 :
3 |
초록
▼
A communication system, which includes an origination space, a communications channel, and a destination space associated with the origination space via the communications channel. The origination space includes an encryption engine for generating an output symbol O.sub.t based on an input symbol I.
A communication system, which includes an origination space, a communications channel, and a destination space associated with the origination space via the communications channel. The origination space includes an encryption engine for generating an output symbol O.sub.t based on an input symbol I.sub.t and means for receiving an encrypt key, an encrypt text/key relation, and the input symbol. The destination space includes a decryption engine for generating a decrypted symbol I'.sub.t based on the output symbol received from the origination space via the communications channel and means for receiving a decrypt key and a decrypt text/key relation. The encrypt text/key relation controls the encryption engine such that O.sub.t =.alpha..sub.N (t)+.pi..sub.N [.alpha..sub.N-1 (t)+.pi..sub.N-1 [.alpha..sub.N-2 (t)+ . . . +.pi..sub.2 [.alpha..sub.1 (t)+.pi..sub.1 [I.sub.t +.alpha..sub.0 (t)]] . . . ]], mod W, where .alpha..sub.N, .alpha..sub.N-1, . . . , .alpha..sub.1, .alpha..sub.0 are N+1 additive transformations defined by the encrypt key, where .pi..sub.N, .pi..sub.N-1, . . . , .pi..sub.2, .pi..sub.0 are N permutations defined by the encrypt key, and where W represents the number of possibilities for each permutation defined by the encrypt key. The decrypt text/key relation controls the decryption engine such that I'.sub.t =.pi..sub.1.sup.-1 [.pi..sub.2.sup.-1 [.pi..sub.3.sup.-1 . . . [.pi..sub.N-1.sup.-1 [.pi..sub.N.sup.-1 [O.sub.t -.alpha.'.sub.N (t)]-.alpha.'.sub.N-1 (t)]- . . . -.alpha.'.sub.3 (t)]-.alpha.'.sub.2 (t)]-.alpha.'.sub.1 (t)]-.alpha.'.sub.0 (t), mod W, where .pi..sub.i.sup.-1 is defined by the decrypt key as the inverse of the permutation .pi..sub.i, where .alpha.'.sub.N, .alpha.'.sub.N-1, . . . , .alpha.'.sub.1, .alpha.'.sub.0 are N+1 additive transformations defined by the decrypt key, and where W represents the number of possibilities for each inverse permutation defined by the decrypt key.
대표청구항
▼
[ What is claimed is:] [1.] A communication system, comprising:a) an origination space;b) a communications channel; andc) a destination space associated with the origination space via the communications channel;d) wherein the origination space includes:1) an encryption engine for generating an outpu
[ What is claimed is:] [1.] A communication system, comprising:a) an origination space;b) a communications channel; andc) a destination space associated with the origination space via the communications channel;d) wherein the origination space includes:1) an encryption engine for generating an output symbol O.sub.t based on an input symbol I.sub.t ; and2) means for receiving an encrypt key, an encrypt text/key relation, and the input symbol;e) wherein the destination space includes:1) a decryption engine for generating a decrypted symbol I'.sub.t based on the output symbol received from the origination space via the communications channel; and2) means for receiving a decrypt key and a decrypt text/key relation;f) wherein the encrypt text/key relation controls the encryption engine such that O.sub.t =.alpha..sub.N (t)+.pi..sub.N [.alpha..sub.N-1 (t)+.pi..sub.N-1 [.alpha..sub.N-2 (t)+ . . . +.pi..sub.2 [.alpha..sub.1 (t)+.pi..sub.1 [I.sub.t +.alpha..sub.0 (t)]] . . . ]], mod W, where .alpha..sub.N, .alpha..sub.N-1, . . . , .alpha..sub.1, .alpha..sub.0 are N+1 additive transformations defined by the encrypt key where .pi..sub.N, .pi..sub.N-1, . . . , .pi..sub.2, .pi..sub.0 are N permutations defined by the encrypt key, and where W represents the number of possibilities for each permutation defined by the encrypt key;g) wherein the decrypt text/key relation controls the decryption engine such that I'.sub.t =.pi..sub.1.sup.-1 [.pi..sub.2.sup.-1 [.pi..sub.3.sup.-1 . . . [.pi..sub.N-1.sup.-1 [.pi..sub.N.sup.-1 [O.sub.t -.alpha.'.sub.N (t)]-.alpha.'.sub.N-1 (t)]- . . . -.alpha.'.sub.3 (t)]-.alpha.'.sub.2 (t)]-.alpha.'.sub.1 (t)]-.alpha.'.sub.0 (t), mod W, where .pi..sub.i.sup.-1 is defined by the decrypt key as the inverse of the permutation .pi..sub.i, where .alpha.'.sub.N, .alpha.'.sub.N-1, . . . , .alpha.'.sub.1, .alpha.'.sub.0 are N+1 additive transformations defined by the decrypt key, and where W represents the number of possibilities for each inverse permutation defined by the decrypt key; andh) wherein I'.sub.t corresponds to I.sub.t.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.