Abstract:
A synchronous data-stream generator, suitable for use as a synchronous stream cipher providing copy right protection for audio/video data, generates a stream of output data items in synchronisation with a clock trigger. The data-stream generator comprises at least two parallel arranged subgenerators, Mi, i >/= 1, such as linear feedback shift registers. The output of the subgenerators Mi is combined forming the output data items of the data-stream generator. A control subgenerator C is used for generating a stream of control data items. Control means (150) comprises for at least one subgenerator Mi an associated number selector Si for, in dependence on the control data item of the control subgenerator C, selecting a number ni,j from a group Hi of different integer numbers. At least two numbers of the group Hi are larger than zero. The control means (150) causes the associated subgenerator Mi to provide at the output the selected ni,j-th data item successive to a last generated data item (effectively skipping ni,j-1 data items).
Abstract:
An automatic encoding/decoding system with which useless arithmetic processings can be eliminated from an arbitrary position and efficient decoding can be performed. When plain text data are encoded, pseudorandom numbers which are used for encoding the next plain text data are generated by a first pseudorandom number generating means in accordance with encoded data encoded immediately before. The next plain text data are encoded into coded data by an encoding means by using the pseudorandom numbers. When coded data are decoded, pseudorandom numbers for decoding are generated by a second pseudorandom number generating means in accordance with the first coded data of continuous coded data, and the next coded data of the continuous code data are decoded into plain text data by a decoding means by using the pseudorandom numbers generated by the second pseudorandom number generating means. Thus, useless arithmetic processings can be eliminated from an arbitrary position and efficient decoding can be performed.
Abstract:
A method, and associated apparatus, for generating a pseudo-random number sequence. Determinations are made of compatible configurations of windmill generators (100) for a selected windmill polynomial. Implementation of a windmill generator (100) is made through use of word-oriented memory elements (104). Words stored in the memory elements (104) are selectively outputted to form portions of a pseudo-random number sequence.
Abstract:
A system for enhancing an existing data encryption system by preprocessing (2) or postprocessing (8) the data stream as it enters or leaves the encryption system (5 and 7). This external processing makes the encrypted data stream much more difficult to analyze by introducing data content dependencies into the modified, encrypted data stream.
Abstract:
The present invention relates to a system comprising a method and a transmitter receiver arrangement for use in transmitting and receiving a message including a code which prevents unintentional use of said message. For the object of obtaining better security against unauthorized registration of said message, it is according to the invention suggested that to the message there is added a time information which in the transmitter is generated by a clock, and which in the receiver is checked by a synchronous clock. Only when the time information in the received message corresponds to the clock of the receiver the message is accepted. The timing information can be encrypted using a pseudo random code, which is transmitted together with the message.
Abstract:
A method and apparatus for generating a message authentication code (mac) or integrity check value (icv) for a digital message to be transmitted by way of a telecommunications medium. Modular arithmetic to a prime modulus is utilised to combine message data and pseudo-random cipher data so as to produce a mac or icv which has a cryptographic strength comparable to that of the source of cipher data. The method for generating the mac can be performed iteratively, this being suitable for use with stream cipher encryption methods.
Abstract:
A synchronization method and corresponding apparatus for transmitting or storing encrypted data breaks the data into blocks and appends to each block an error detection code which is calculated from the encrypted data block plus a unique sequence number. The sequence number is generated by a local counter and may be the number of bits, bauds, or characters transmitted and received since a previous resynchronization. The error correcting code is transmitted or stored with the encrypted data block, but although the sequence number is appended to the data block for error code calculation purposes, it is not actually transmitted or stored with the encrypted data and error correcting code. When the encrypted data is retrieved or received, the receiving apparatus appends to the received data blocks a sequence number derived from a local counter which is synchronized to the counter at the transmitting or storing apparatus and a new error detecting code is calculated for comparison to the error detecting code received or retrieved with the encrypted data. A mismatch between the error detecting codes indicates a transmission or synchronization error for that block. In either case the data block can be retransmitted.
Abstract:
A novel time-element scrambling system and the component parts thereof for communication over a non-secure communication link (40, 80) such as a telephone line. The scrambling and unscrambling operations are specified by a scrambling code which is exchanged by the two apparatuses (10, 10) at each end of the communication link (40, 80) in an encrypted form (using a public-key code) when the communication link (40, 80) is first established. Thereafter, each apparatus (10) uses the scrambling code to scramble its communications with the other apparatus (10). The generation of these two codes and their exchange by the two apparatuses (10, 10) is transparent to the users. The manner in which the codes are generated guarantees that the next code that will be generated may not be predicted by examining the apparatus (10) in question at any time substantially in advance of the time at which the communication link (40, 80) is established or afterward.
Abstract:
Systems and methods for data aggregation based on one-time pad based sharing is/are described, including receiving a first plurality of key shares and a second plurality of key shares, wherein each of the first plurality of key shares and each of the second plurality of key shares comprises a share of a secure key based on a secret sharing scheme, and transmitting one of the first plurality of key shares for an apparatus in a transmission state, and transmitting one of the second plurality of key shares for the apparatus not in the transmission state.
Abstract:
A method for transmitting and receiving pulse oximetry data comprising: transmitting pulse oximeter sensor data to a pulse oximeter monitor; encrypting the transmitted pulse oximeter data by the pulse oximeter monitor; transmitting the encrypted data to a cloud-based medical service; sending back the encrypted data from the cloud-based medical service to the pulse oximeter monitor, where the data is decrypted and displayed; 5 generating a random number by the pulse oximeter monitor via a random number generator that is triggered by a random number on the sensor, creating a unique ID for a device pulse oximeter monitor for a device; and sending the unique ID over the cloud for each event.