Abstract:
A voice signal encryption/decryption method and a device for real-time encrypted phone conversation using the method are provided. A real-time voice is converted to a digital data, and the amount of data is reduced by performing a time-scale modification (TSM) by a predetermined ratio. The time-scale modification processed digital voice signal are separated into contiguous pre-encryption frames, and each of them is separated shuffling blocks and the time order of the shuffling blocks is mixed, and then post-encryption frames are generated by adding dummy voice signals to each of the pre-encryption frame. The signal is added with a predetermined amount of synchronization data and then transmitted to the other side. These processes are performed according a predetermined encrypt rules using an encryption key the user set. The encrypted voice signal from transmitting side is decrypted in receiving side by applying the encryption rules reversely with the same encryption key.
Abstract:
An encrypted communication system for data communication in an encrypted status. A transmission device and reception device are provided with pseudo-random number sequence generating means for generating the same pseudo-random number sequence based on key information. The transmission device interprets a pseudo-random number sequence based on a preset transposition rule to thereby specify a plurality of exchange positions for a bit-string in a regular text; a ciphered text is prepared by exchanging individual values between these exchange positions. An example of a transposition rule is such that, in a portion of a pseudo-random number sequence where "1" or "0" continues over at least 2 bits, the leading bit and the trailing bit of each continuous portion are specified as a set of exchange positions to exchange bit values to each other.
Abstract:
A computer system includes a processor and a computer readable medium storing a computer program product for encoding a serial bit stream of digital data. The product includes instructions for causing the processor to place a first number of bits from the input stream into bit positions of an encoded output unit in accordance with a first value, the first number of bits aligned to a bit position in the encoded output unit in accordance with a second value and insert bits of arbitrary value into remaining, bit positions of the unit of the encoded output unit. In addition, the computer program product includes instructions for causing a processor to select significant bits from a unit of the encoded bit stream in accordance with the first value and the second value to place the selected bits in a decoded bit stream.
Abstract:
A computer system that interfaces with a blockchain is provided. The computer system receives match data for a match between a first data transaction request that is associated with a first identifier and a second data transaction request that is associated with a second identifier. A first blockchain transaction is generated based on the match data and stored to a blockchain. At least one further blockchain transaction is generates that splits the match into two different transactions – one between the first identifier and an intermediary and the second between the intermediary. These are recorded to the blockchain via the further blockchain transactions.
Abstract:
In a secure cloud for transmitting packets of digital data, the packets may be repeatedly scrambled (i.e., their data segments reordered) and then unscrambled, split and then mixed, and/or encrypted and then decrypted as they pass through media nodes in the cloud. The methods used to scramble, split, mix and encrypt the packets may be varied in accordance with a state such as time, thereby making the task of a hacker virtually impossible inasmuch as he or she may be viewing only a fragment of a packet and the methods used to disguise the data are constantly changing.
Abstract:
An authentication method and schemes using a block cipher to protect data integrity (authenticity) during communication over insecure channels and during data storage on insecure media. The authentication method and schemes of this invention allow, in a further aspect, message and data signing and verification in parallel or pipelined manners, in addition to sequential operation, without requiring twice as many block enciphering operations as the number of input plaintext blocks. The present invention allows, in a yet further aspect, software and hardware implementations used in high-performance systems and networks where multiple processing units are available for block enciphering operations. In a yet further aspect, the authentication method and schemes of this invention allow incremental updates and out-of-order processing of authentication tags. In a yet further aspect, the authentication method and schemes of this invention are suitable for real-time applications where message length remains unknown until the entire message is received, and commencing message authentication cannot be deferred until the end of the message.
Abstract:
The means (10) for scrambling data comprise a data exchange electronic means (14) connected in the data bus to exchange incoming data lines (17) in order to obtain a new arrangement of the lines (71), a memory (12) controlling the exchange means (14) according to an exchange rule contained in the memory and a directing means (15) which, in this case, is comprised of the address bus.
Abstract:
The present invention relates to a method for transmission of a digital signal from a first unit (2), operating according to a transmission mode, to a second unit (3), operating according to a reception mode, through a transmission channel (4), said first unit carrying out the following steps: (a) division of said digital signal in data blocks, each data block comprising n elementary units each having a set time duration; and (b) permutation of elementary unit order of each block on the basis of a permutation instruction, said permutation instruction being selected from a permutation instruction table calculated beforehand, by generation of an address by a pseudo-random address generator (11) by a synchronism seed (12); and said second unit (3) carrying out the following step: (c) permutation of order of said elementary units of each data block received on the basis of a permutation instruction corresponding to the permutation instruction applied to each one of said data blocks during said step (b) from said first unit (2), said permutation instruction being selected from a permutation instruction table calculated beforehand corresponding to the table contained in said first unit (2), following the generation of an address by a pseudo-random address generator (11) by the synchrony seed (12) corresponding to the synchrony seed (12) used by said pseudo-random address generator (11). The present invention also relates for a system (1) for carrying out said method.
Abstract:
A method for securing safety of electronic information, in which an electronic information file (1) is divided into information elements (2), the information elements are combined in a different order to produce one or more information blocks (3), information element division/extraction data is generated to produce an information block and store or transmit it, the information blocks (3) are divided into information elements (4) again based on the division/extraction data when the electronic information is used, the information elements (4) are arranged in the correct order and integrated to restore the original electronic information file (5), thus resulting in diminishing the value of the information not to be used even if the electronic information stored or being transmitted is stolen.