WO2000079692A1 - Method for transmitting binary information with security - Google Patents

Method for transmitting binary information with security Download PDF

Info

Publication number
WO2000079692A1
WO2000079692A1 PCT/KR2000/000640 KR0000640W WO0079692A1 WO 2000079692 A1 WO2000079692 A1 WO 2000079692A1 KR 0000640 W KR0000640 W KR 0000640W WO 0079692 A1 WO0079692 A1 WO 0079692A1
Authority
WO
WIPO (PCT)
Prior art keywords
binary information
integer
matrix
forming
producing
Prior art date
Application number
PCT/KR2000/000640
Other languages
French (fr)
Korean (ko)
Inventor
Donggyun Kim
Jaegug Bae
Original Assignee
Donggyun Kim
Jaegug Bae
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Donggyun Kim, Jaegug Bae filed Critical Donggyun Kim
Priority to AU55735/00A priority Critical patent/AU5573500A/en
Publication of WO2000079692A1 publication Critical patent/WO2000079692A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Abstract

The present invention relates to a method for transmitting binary information through electronic transmission media, which comprises a step of producing a public key and a private key as a preparatory stage for encrypting binary information data, a step of encrypting binary information by using the public key, and a deciphering step wherein super-increasing matrix sequences are used in producing the public key and the private key for encryption.

Description

METHOD FOR TRANSMITTING BINARY INFORMATION WITH
SECURITY
BACKGROUND OF THE INVENTION
Field of the Invention
The present invention relates to a method for transmitting binary information through electronic transmission media, and more particularly to a method for encrypting and deciphering binary information in transmission with the use of super- increasing matrix sequence.
Description of the Related Art
In case of transmitting information through electronic transmission media in recent, especially in data transmission between computers, security matter is being gradually amplified. Actually, data transmitted through transmission lines is relatively easily overheard, which means that important information can pass to third party's hands. In order to prevent such risk, it is necessary to encrypt information for transmission not to be easily read by a third party.
For the encryption of information, various types of encryption methods have been proposed. The encryption methods are largely classified into a symmetric-key method and a public key method. The symmetric key method is a method of using a deciphering key identical to an encrypting key, and the public key method is a method of using a deciphering key different from an encrypting key. The symmetric key method has benefits in one-to-one data transmissions, but has some troublesome problems in multi-to-one data transmissions since different encrypting keys have to be used. The public key method requires a public key open to the public and a private key held by a receiver, so the public key method has an advantage in the multi-to-one data transmissions. That is, if anyone encrypts information to be transmitted by means of the public key, a receiver can deciphers the information with a secret key, that is, a private key the receiver has. Such public key encryption method has two important elements, which are the safety and efficiency for transmissions. The safety for transmissions is determined according to how difficult a third party who is not the receiver extracts the private key from the public key, and the efficiency for transmissions is determined according to how easily the public key can be produced.
Lots of studies on the public key transmission system have been carried out since a first introduction from Diffie and hellman in 1976, and continue to devise safer system. The RSA is a public key transmission system devised in 1978 and occupies over 90% of the world market at present. The RSA transmission system employs a mathematical matter in which the prime factorization of integers is difficult as a basic encryption method. However, the RSA transmission system has a drawback in that a lot of time is required in encryption and decryption.
That is, the RSA transmission system delays an information transmission since it takes a long time in generating a cryptographic key, which requires a large capacitor of buffers in order to lower or control an information transmission rate of a transmitter. In case of requiring the buffers, some actions should be taken in order for information not to be lost when a signal indicating that a receiving station is not ready for receiving the information is generated.
In the meantime, as an alternative for overcoming the problem of the RSA transmission system, a public key transmission system of a knapsack type has been developed. The system is called "knapsack" since it hides the properties of a super-increasing integer sequence in the public key. The super- increasing integer sequence refers to a set of integers S=(S1, S2,
..., Sn) composed of positive integers satisfying
Figure imgf000005_0001
. The system is known to have faster encryption and decryption speeds than the RSA transmission system. Hereinafter, the public key transmission system of the knapsack type will be described in detail .
The public key transmission system of the knapsack type includes steps of: producing a private key and a public key as in the other public key transmission systems, encrypting information with the public key; transmitting the encrypted signal; and deciphering the transmitted encrypted signal with the private key.
With the steps ramified, the private key is first produced and then the public key is produced from the produced private key. Information is encrypted by using the produced public key and then transmitted. A receiver uses the private key to decipher the encrypted information. Such step is described as below with an example. First of all, a super-increasing integer sequence B is, for example, 12, 17, 33, 74, 316, arbitrarily produced. After that, a larger number M' , for example 737, than the sum of the respective numbers of the super-increasing integer sequence is arbitrarily selected. After that, A number W, for example 635, is arbitrarily selected which is smaller than the M' and a prime number against the M' and vice versa. After that, the super- increasing integer sequence B is multiplied by the number W and an residue class operation is carried out based on the M' . If the result is put as a public key A, the A can be expressed as follows: A=(W*B) (mod M' ) = {635*(12, 17, 33, 74, 157, 316) } (mod 737) =(250, 477, 319, 559, 200, 196) Through the above step, a private key(B, ' , W) and the public key A can be obtained, but it is not easy to produce the private key(B, M' , W) from the public key A through a reverse step. The description has been made that the facilitation of the reverse operation becomes a barometer of a public key transmission system.
Now, a description is made on the steps for encrypting information E by the public key A with an example of a binary number 101101.
The information E is encrypted by multiplying the information E by the public key A. That is, if the encrypted information is put as P, the P can be expressed as follows: P=A • E =(250, 477, 319, 559, 200, 196) • (1, 0, 1, 1, 0, 1)=1324 So the encryption is accomplished. If transmitting such encrypted signal, the information prior to the encryption is extracted from the transmitted signal in a receiving stage (deciphering) . The step is as follows. That is, the encrypted signal P is multiplied by W"1, wherein the W"1 is a positive integer of satisfying {W*^1} (mod M')=l, and then a residue class is obtained based on the ' . If the obtained value is Q, the Q is expressed as follows: Q=(W-1*P)Jmod M' ) =435 where, if the P is substituted with A • E, Q= (W_1*A • E) , and then if the A is substituted with (W*B) (mod M' ) , Q={W-1 * (W*B) (mod M' ) • E} (mod M' ) .
The W""1 is just a constant, so that the W'1 can be put in the parentheses. A residue class regarding the M' of the W_1*W is a 1, so that the result expression is (B • E) (mod M' ) . If the E is defined as (ex, e2, e3, e4, e5, e6) , the result expression is re-expressed as follows:
435={(12, 17, 33, 74, 157, 316) • (ex, e2, e3 e4, e5, e6) } (mod 737). Here, (12, 17, 33, 74, 157, 316) is the super- increasing integer sequence, so that the E can be easily obtained. That is, the information E=(l, 0, 1, 1, 0, 1) prior to the encryption can be easily extracted from 435 = 12e! + 17e2 + 33e3 + 74e4 + 157e5 + 316e6.
However, the system is severely affected in its safety by attack methods developed by Brickell, Lagarias, and Odlyzko, Schnor, et al. That is, a private key of a receiver is easily found by a third party, so that a problem information data is easily leaked has occurred. Most of such attach methods rely upon a low density attack method based on the Lattice Basis Reduction Algorithm. A small number of the public key transmission systems of the knapsack problem so far, including one based on Chor-Rivest, are known to be safe against such attach methods .
SUMMARY OF THE INVENTION
It is an object of the present invention to provide a public key transmission system of an improved knapsack type for securing higher safety by increasing transmission efficiency by easily producing an public key and hardly extracting a private key from the public key.
The present invention provides a public key method of the knapsack type using a super-increasing matrix sequence instead of a public key of the knapsack type using a super-increasing integer sequence. The use of a super-increasing matrix sequence in the present invention causes public keys and private keys to be extended to matrix sequences having arbitrary dimensions, which provides a reason on making the extraction of a private key from a public key more difficult. Accordingly, a construction of the present invention is the same as the public key transmission system using the conventional super-increasing integer sequence as stated above, except for producing a super- increasing matrix sequence instead of the super-increasing integer sequence. A description on such construction will be described as follows. That is, the present invention is directed to a binary information auxiliary transmission method comprising, if Kx and K2 are positive integers, kxxk2 is an integer larger than 3, and n is an integer larger than 2, steps of: producing a private key including n matrices composed of kλxk2; producing a public key including n matrices composed of kiXk2 from the private key; dividing binary information to be transmitted into n plural bit sequences E = { el t e2, ..., en} , e e {0, 1}; encrypting the plural bit sequences E by using respective public keys; forming transmission data S by incorporating encrypted information; transmitting the transmission data S to a receiving station; and extracting binary information data from the received transmission data S in the receiving station by using the private key, wherein the step for producing the private key is placed prior to the step for extracting the binary information data.
After producing the public keys, an addition of a random number to respective matrices composing of the public keys and/or the execution of an order change function can make the extraction of a private key from the public key difficult. In the above case, binary information data E to be transmitted can be exactly extracted by adding a certain number and/or executing an inverse function of the order change function before deciphering.
BRIEF DESCRIPTION OF THE DRAWINGS
The above object and other advantages of the present invention will become more apparent by describing the preferred embodiment thereof in more detail with reference to the accompanying drawings, in which:
FIG. 1 is a flow chart for showing a process of producing a private key and a public key according to an embodiment of the present invention;
FIG. 2 is a flow chart for showing a encryption process by using the public key of FIG. 1; and
FIG. 3 is a flow chart for showing a deciphering process by using the private key of FIG. 1.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
Hereinafter, the present invention will be described in more detail with reference to the accompanying drawings.
FIG. 1 is a flow chart for showing a process of producing a private key and a public key according to an embodiment of the present invention.
The process, first, produces a private key (cct, W1 W2, M) , wherein cct indicates n KlxKl super-increasing matrix sequences, Wx is a k- k. matrix, W2 is a k2xk2 matrix, which are values corresponding to B, W, and M' , respectively, in a public key transmission system of a knapsack based on a super-increasing integer sequence. First, positive integers k:, k2, llr 12, ... , lu are arbitrarily selected to be kLxk2 > 3, 2 < u < k^^-l, which is
referred to as .
Figure imgf000010_0001
(step 110) .
Next, n super-increasing integer sequences having a length ls with respect to each s(l < s < u) are selected, which is referred to as ds = (dSιl, dSf2, ..., dSrl) , 1 < s <u(step 120). The super-increasing integer sequence means an integer sequence in
∑dSJ < dS +] ,( l < t< ls - l) which dS/- is a positive integer and J After that, a super-increasing matrix sequence having a matrix size of k.xk2 and length n is produced as follows (step 130). If the matrix sequence is referred to as cct = [cct/ /:)] in 1 < t < n, 1 < I < klr 1 < j < k2, respective cctι(lι]) are produced as follows.
© in case of (i,j) = (l,l), cct(1/1) = d1/t in 1 < t < lj and cc td,i) nas a random positive integer satisfying
rι ^<--,(l,l)<"l,l
1 m lx+l < t < n.
© in case that (i,j) satisfies 2 < (i-l)k2+j < u-1, cct u (i,:)
Figure imgf000011_0001
has a random positive integer in
Figure imgf000011_0002
and another random positive integer satisfying
Figure imgf000011_0003
© in case that (i,j) satisfies (i-l)k2+j = u, cctl ) has a
random positive integer in
Figure imgf000011_0004
and
CCt-™ i,
Figure imgf000011_0005
© in case that (i,j) satisfies u+1 < (i-l)k,+j < kχk2-l, cc-uji has a random positive integer in 1 < t < n.
© (i,j) satisfies (i-l)k2+l = kλ x k2, cc.,.,., = 0 in 1 < t < n.
After that, an integer M is selected as follows (step 140) . That is, a positive integer M satisfying
Figure imgf000012_0001
is randomly selected.
Next, n random positive integers rl r r2, ..., rn are selected (step 150) .
After that, rt is added to respective elements of a matrix cct and then a matrix (referred to as ct in Formula 1) selecting a residue class based on the M is produced (step 160) . Formula 1 c-,,.,-, ≡ cctr(lι., + rt(mod M) After that, a permutation function π with respect to {1, 2, ..., n} -is selected to produce bt = cπ (t) (step 170) . Steps 150 and 160 for adding Rt to respective elements or a step 170 for applying the permutation function can be omitted since they are for making the extraction of a private key from public keys difficult. After that, two matrices x and W2 having sizes of kxxkx and k2xk2 respectively are arbitrarily selected to have inverse matrices when performing calculations based on a residue class of M with respect to matrix elements (step 180). Therefore, the private key cct(or bl r b2, ..., bn) , Wlf W2, M, and π are completed. Next, a public key is produced from the private key obtained from the above (step 190).
In the step 190, N matrices, at, (1 < t < n) are produced as follows .
Respective elements exist between 0 and M with at ≡ w^w- (mod M) . Accordingly, the public key at = (alr a2, ..., an) are completed. FIG. 2 is a flow chart for showing an encryption process of information to be transmitted by using the public key of FIG. 1.
The encryption is performed by multiplying the information to be transmitted, which is divided into n bits, by the public key (steps 210 and 220).
Let E be the information containing only 0 and 1 and having a length n.
That is, E = { el f e2, ..., en) , et e {0, 1}
The encryption is carried out by multiplying information E to be transmitted by a public key a. If an encrypted signal is indicated as S, the S may be expressed as Formula 2 as below: Formula 2
Figure imgf000013_0001
FIG. 3 is a flow chart for showing a deciphering process with respect to an encrypted signal. A process for extracting E from the encrypted signal s is as follows. i"1 and W2 _1 of residue class operation inverse matrices with respect to M of : and W2 are calculated and multiplied by s to produce a cyphertext of an intermediate step (steps 310 to 330). Let such result be Sl f then formula 3 is as follows.
Formula 3
Figure imgf000013_0002
where, s- is a matrix satisfying 0 < s1 ) < M, a formula is established. The reason the formula
Figure imgf000014_0001
is established is because W-W l and W2W2 _1 are 1, respectively.
In the meantime, if e'-. = e,"1,,.,, the following formula is effectuated becase of et = e'π (t) and bt = c„ (t, .
Figure imgf000014_0002
Next, a value of (e'x, e'2, ..., e'n) is obtained as follows by using a configuration of an appropriate equation and a mathematical induction. First, a value of (e',, e'2, ..., e'n) becomes a solution of (x., x2, ..., xn) in the equation of
Figure imgf000014_0003
, and a value of x3 can be easily
obtained since (d1 , dlι2, ..., d1;11) is a super-increasing integer sequence.
For example, when a value obtained from the calculation of Si, (i,D _si,(i, 1.2) is "130" and a super-increasing integer sequence is {30, 74, 147}, a solution becomes "0" since "130" is smaller than "147" and a step for comparing "130" with "74" is carried out without any calculation. At this time, the solution is processed as "1" since 130-74 = 56. Lastly, the solution is set to "1" since "56" is larger than "30" when comparing "56" with "30". Accordingly, the desired final solution becomes (1, 1, 0}. This is generally known to those who are skilled in this field.
After that, if a value of (e'ιr e'2, ..., e'3) is obtained as an assumption of a mathematical induction and w = 1, + 12 + ... +lv in v 1, 2, u-i; a value of X is obtained as follows. That is, the value is obtained from the calculation of the value of (xw+1, xw+2, ..., xw+ιv+ι) in an equation
^v,([v/A:2]+l,v+l-[v/*2]-*,) v,(A.,,*2) Xw+j^v+\J of J when w
Sv=S - tct
The use of a super-increasing property of (dv.ι,ι. dv+lj2, ..., dv+1#lv+1) enables a value of (e'w+1, e'w+2, ..., e', to be easily obtained. All the values of (e' lr e' e'n) are obtained through the mathematical induction method.
After that, the original message of E = (e17 e2, ..., en) is obtained as follows through the use of the property of et = e'π(t).
That is, E (ex ~~ (e π (1) i e π (2) e' π ( (nn)
The signal E prior to the encryption is deciphered through the above process.
The public key transmission system based on this method is much better in a speed point of view, compared to the other public key transmission system and shown in Table 1. Table 1
Figure imgf000015_0001
As shown in Table 1, the present invention has a much faster speed in the encryption and decryption, compared to the existing NTRU or RSA system. The matter of prolonging a public key length and a private key length does not cause any problem due to the improvement of the performance of system memories employed at present.
A secure binary information transmission method according to the present invention can overcome the vulnerability with respect to a low density attack method in a public key transmission system of the knapsack type using a super- increasing integer sequence, and also overcome the vulnerability in a speed of an RSA transmission system by rapidly realizing main operations which are additions or comparisons of two numbers in a computer. Accordingly, the present invention prevents, in case that binary information is transmitted through transmission media, third parties from easy reading as well as accelerates a transmission speed, so it is directly applicable to home banking, electronic commerce business, information exchanges on the internet, and the like.
Although the preferred embodiment of the present invention has been described, it will be understood by those skilled in the art that the present invention should not be limited to the described preferred embodiment, but various changes and modifications can be made within the spirit and scope of the present invention as defined by the appended claims.

Claims

1. In a method for safely transmitting binary information constructed with plural bits through electronic transmission media, the method comprising steps of: producing a private key including n matrices constructed with λ x k2, when kx and k2 are positive integers, k. x k2 is an integer larger than 3, and n is an integer larger than 2; producing a public key (matrix sequence at) including the n matrices constituted with the kx x k2 from the private key; dividing the binary information into n plural bit sequences E = {e^ e2, ..., en} in e e {0, 1 } ; encrypting the plural bit sequences E respectively by using the public key; incorporating the encrypted information and forming encrypted transmission data S; transmitting the encrypted transmission data S; and extracting the binary information data from the encrypted transmission data S by using the private key.
2. The method as claimed in claim 1, wherein the step for producing the private key includes steps of: forming u super-increasing integer sequences dl r d2, ..., du expressed as ds = (dS;1, dS/2, ..., ds ls) of a super-increasing integer sequence having a length ls with respect to each S satisfying a relationship of 1 < s < u, after arbitrarily selecting an integer n larger than 2 but less than kx x k2-l, selecting u positive integers ll r 12, ..., lu, and setting the integer n of a total sum of 1- + 12 +, ..., +lu; selecting a random integer M larger than Maxlds )+ J dV
forming a matrix wl having arbitrary kx x kλ elements and a matrix w2 having k, x k2 elements for which an inverse matrix exists when calculations with respect to respective matrix elements are carried out with a residue class of M; forming n matrices cct/(1# ) having kj x k2 by selecting for
CCt, (1, 1)
1) if (i, j) = (1,1), a) dlιt in 1 < t < llt and b) a random positive integer of satisfying
CCt,{\,\) ^1,1 t=l_ +1 in 1. < t < n;
if (i,j) satisfies 2 < (i-l)k2 + 1 < u-1,
(i-\)k2+j-
\<t< a) a random positive integer in .=1
CC{ ,t -N — d (ι-*+;-ι
' U ( -I)*, +j,t- Σ /, b) '-' in
Figure imgf000018_0001
c) a random positive integer satisfying
.
Figure imgf000018_0002
3) if (i,j) satisfies (i-l)k2 + j = u,
Figure imgf000019_0001
a) a random positive integer in , and
Figure imgf000019_0002
4) if (i,j) satisfies u + 1 < (i-l)k2 + j < λ x k2-l, a random positive integer in 1 < t < n, and
5) if (i,j) satisfies (i-l)k2 + j = k, x k2, " 0" ; and calculating a residue class of M as in ctι ι l ) -≡ cct((lι]] (mod
M) , wherein the step for producing the public key is accomplished by producing at satisfying at = w. cct_ ) w2 (mod M) , the step for forming the encrypted transmission data S is accomplished by producing the S satisfying a formula
Figure imgf000019_0003
, and the steps for selecting the M and producing the w. and w2 is carried out after the step for forming the super-increasing matrix sequence cct and before the step for forming the public key.
3. The method as claimed in claim 2, further comprising a step, after selecting n random positive integers rι r r2, ..., rn, for adding rt to respective elements between the step for forming the cc ,.,., and the step for calculating the residue class of M.
4. The method claimed in claim 2 or 3, further comprising a step, in case that there does not exist the step for adding rt to respective elements to the cct or adding rt, for carrying out a permutation function with respect to the matrix of cctι(iιj) composed of n matrices between the step for forming cct/(i#j, and the step for calculating the residue class of M.
5. The method claimed in claim 2 or 3, wherein the step for extracting the binary information data includes steps of: producing inverse matrices w^1 and w2 _1 of the residue class operations with respect to the M of the w. and w2; producing a matrix si according to a following formula by using the inverse matrices: n
Sx = et at =w ' sw2 '
calculating a first comparison value from sλι , n ~sι.0.1,1.2) '' obtaining first binary information of (e17 e2, ..., eu) from the first comparison value and a super-increasing integer sequence {dn, d12, ..., dm}; calculating a vth comparison value from sVι ([v).2] +_., „ + ι-tv/1-2-.
V w= ∑lj ki)_s v, (ki,2) when v has a value of 2 in J ; obtaining vth binary information of (ew+1, ew+2, ..., ew+lv+1) from the vth comparison value and a super-increasing integer sequence (dv+1(1, dv+1;2, ..., dv+1/lv+1) ; and iterating the step for calculating the vth comparison value and the step for obtaining the vth binary information till the v has values from 3 to u.
6. The method as claimed in claim 4, wherein the step for extracting the binary information data includes steps of: forming inverse matrices W,"1 and w2 _1 with the residue class of M of wx and w2; forming a matrix sl according to a following formula by using the inverse matrices:
Figure imgf000021_0001
, wherein ei is a function of
"0" and "1" and bt is a matrix of kλ x k2; calculating a first comparison value from s1( (1#1)-slf (klfl.2) ; obtaining first binary information of (el f e2, ..., en) from the first comparison value and a super-increasing integer sequence {d d12, ..., d12J}; calculating a vth comparison value from sV;([v/k2] + lt v + 1.[v k2] .
2) -s, (ki,2) when the v has a value of 2 and
Figure imgf000021_0002
; obtaining vth binary information of (ew+1, ew+2, ..., ew+iv+ι) from the vth comparison value and a super-increasing integer sequence (dv+1/ 1 , dv+1,2 , ..., dv+lι lv+1 ) ; iterating the step for calculating the vth comparison value and the step for obtaining the vth binary information till the v has values from 3 to u; and applying an inverse function of the permutation function) to the (elf e2, ..., eiu) .
PCT/KR2000/000640 1999-06-17 2000-06-17 Method for transmitting binary information with security WO2000079692A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU55735/00A AU5573500A (en) 1999-06-17 2000-06-17 Method for transmitting binary information with security

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR99/22638 1999-06-17
KR1019990022638A KR20010002708A (en) 1999-06-17 1999-06-17 Binary information transmitting method for pretecting the infomation content

Publications (1)

Publication Number Publication Date
WO2000079692A1 true WO2000079692A1 (en) 2000-12-28

Family

ID=19592953

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2000/000640 WO2000079692A1 (en) 1999-06-17 2000-06-17 Method for transmitting binary information with security

Country Status (4)

Country Link
KR (1) KR20010002708A (en)
CN (1) CN1197293C (en)
AU (1) AU5573500A (en)
WO (1) WO2000079692A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1304829A2 (en) * 2001-10-19 2003-04-23 Matsushita Electric Industrial Co., Ltd. A numerical array output device, a numerical array output method, an encryption device, and a decryption device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5588061A (en) * 1994-07-20 1996-12-24 Bell Atlantic Network Services, Inc. System and method for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem
US5592554A (en) * 1993-06-30 1997-01-07 Siemens Aktiengesellschaft Method for data security in a digital telecommunication system
KR19980035958U (en) * 1996-12-13 1998-09-15 박병재 Rotation angle measuring device
KR19980077685A (en) * 1997-04-22 1998-11-16 구자홍 METHOD AND DEVICE FOR GENERATING KEYS AND ENCRYPTION SYSTEM USING KEYS CREATED THEREFOR
US5872846A (en) * 1996-11-07 1999-02-16 Mci Communications Corporation System and method for providing security in data communication systems

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5592554A (en) * 1993-06-30 1997-01-07 Siemens Aktiengesellschaft Method for data security in a digital telecommunication system
US5588061A (en) * 1994-07-20 1996-12-24 Bell Atlantic Network Services, Inc. System and method for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem
US5872846A (en) * 1996-11-07 1999-02-16 Mci Communications Corporation System and method for providing security in data communication systems
KR19980035958U (en) * 1996-12-13 1998-09-15 박병재 Rotation angle measuring device
KR19980077685A (en) * 1997-04-22 1998-11-16 구자홍 METHOD AND DEVICE FOR GENERATING KEYS AND ENCRYPTION SYSTEM USING KEYS CREATED THEREFOR

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1304829A2 (en) * 2001-10-19 2003-04-23 Matsushita Electric Industrial Co., Ltd. A numerical array output device, a numerical array output method, an encryption device, and a decryption device
EP1304829A3 (en) * 2001-10-19 2004-06-09 Matsushita Electric Industrial Co., Ltd. A numerical array output device, a numerical array output method, an encryption device, and a decryption device
US7233662B2 (en) 2001-10-19 2007-06-19 Matsushita Electric Industrial Co., Ltd. Numerical array output device, a numerical array output method, an encryption device, and a decryption device

Also Published As

Publication number Publication date
AU5573500A (en) 2001-01-09
KR20010002708A (en) 2001-01-15
CN1197293C (en) 2005-04-13
CN1358353A (en) 2002-07-10

Similar Documents

Publication Publication Date Title
US8687800B2 (en) Encryption method for message authentication
EP2197144A1 (en) Methods and devices for a chained encryption mode
US20080080709A1 (en) Method for encrypting information and device for realization of the method
GB2094113A (en) Improvements in or relating to cryptography
US20120314857A1 (en) Block encryption device, block decryption device, block encryption method, block decryption method and program
US8462939B2 (en) RNS-based cryptographic system and method
Jahan et al. Improved RSA cryptosystem based on the study of number theory and public key cryptosystems
Bonde et al. Analysis of encryption algorithms (RSA, SRNN and 2 key pair) for information security
Abusukhon et al. Secure network communication based on text-to-image encryption
CN107896149A (en) 128 symmetric encryption methods based on three group operationes
US20060251248A1 (en) Public key cryptographic methods and systems with preprocessing
US20130058483A1 (en) Public key cryptosystem and technique
US20080019508A1 (en) Public key cryptographic methods and systems with rebalancing
Vohra et al. An efficient chaos-based optimization algorithm approach for cryptography
EP3996321A1 (en) Method for processing encrypted data
EP3923512A1 (en) Method for processing encrypted data
JP4796602B2 (en) Method and apparatus for secure communication between cryptographic systems using RTC
WO2000079692A1 (en) Method for transmitting binary information with security
Özkaynak et al. Cryptanalysis of Bigdeli algorithm using Çokal’s attack
CN102474413B (en) Private key compression
Suresh et al. VLSI implementation of text to image encryption algorithm based on private key encryption
Hameed et al. SMX algorithm: A novel approach to avalanche effect on advanced encryption standard AES
Haithem et al. Intelligent TRIPLE DES with N Round Based on Genetic Algorithm
EP3406050B1 (en) Method for safeguarding the confidentiality of the sender&#39;s identification of messages transmitted through promiscuous channels
Memon et al. Randomized text encryption: A new dimension in cryptography

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 00809061.0

Country of ref document: CN

AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWE Wipo information: entry into national phase

Ref document number: 10018944

Country of ref document: US

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP