FIELD: cryptographic data protection in radio and local computer networks.
SUBSTANCE: data protection method in radio and local computer networks with limitations on access to network clients, is characterized by encryption of text portion of packet with keys, individual for each pair of clients by means of two-parameter encrypting transformation vi=F(ui,ξi) and decrypting transformation ui=F-1(vi,ξi) on basis of random replacement table Tk having length of 2l symbols, where l - length of alphabet element, ui - combination, transformed during encryption, vi - encryption result, ξi - transformation parameter, for encryption of next information combination ui, transferred from client with number t to client with number g, source value ui is found in table Tk, difference of values of addresses of clients Δ=g-t is calculated by module 2l, value Δ is masked by randomly filled masking table Tm, for which purpose from table Tm at address Δ result of masking ΔM is read, value ΔM is used as transformation parameter ξi of symbol ui subjected to encryption, while encrypting transformation of symbol is performed using table Tk and additional addresses table Ta, in which in row with address ui address of combination ui in table Tk is stored, address of combination ui is determined, address of transformation result is calculated as sum by module 2l of address of combination ui and value ΔM and transformation result vi is read by calculated address from table Tk, decrypting transformation of symbol is performed using table Tk and additional addresses table Ta, in which in a row with address vi an address of combination vi in table Tk is stored, address of combination vi is determined, address of transformation result ui is determined as difference by module 2l of combinationaddress vi and value ΔM and transformation result ui is read by calculated address from table Tk.
EFFECT: encryption of information by keys, individual for each pair of clients, with fast realization of cryptographic transformation.
5 cl
Title | Year | Author | Number |
---|---|---|---|
METHOD OF DATA CONVERSION | 2003 |
|
RU2254685C2 |
METHOD FOR BLOCK ENCRYPTION OF INFORMATION | 2004 |
|
RU2266622C1 |
INFORMATION PROTECTION METHOD | 2017 |
|
RU2648598C1 |
METHOD FOR CONVERTING LOW-ENTROPY MESSAGES | 2016 |
|
RU2630429C1 |
METHOD OF DIGITAL INFORMATION IN THE FORM OF ULTRA-COMPRESSED NANO BAR CODE ENCODING AND DECODING (OPTIONS) | 2013 |
|
RU2656734C2 |
RANDOM NUMBERS GENERATION METHOD | 2003 |
|
RU2246129C2 |
METHOD FOR COMPLEX PROTECTION OF INFORMATION | 2005 |
|
RU2292122C1 |
METHOD OF TRANSMISSION AND COMPLEX PROTECTION OF INFORMATION | 2007 |
|
RU2367007C2 |
METHOD FOR CRYPTOGRAPHIC TRANSFORMATION OF INFORMATION AND APPARATUS FOR REALISING SAID METHOD | 2012 |
|
RU2503135C1 |
INTERFACE WITH DYNAMIC INFORMATION ENCRYPTION USED TO PROTECT THE TRANSMITTED DATA FROM UNAUTHORISED ACCESS IN COMMUNICATION SYSTEMS | 2021 |
|
RU2783917C1 |
Authors
Dates
2005-12-20—Published
2004-03-29—Filed