FIELD: computer science and communications engineering, in particular, methods and devices for cryptographic transformation of data.
SUBSTANCE: method includes generating two binary vectors of numbers a and p, having certain parameters, transferred by means of unprotected communication channel to each user of network, and generation by network users independently from each other of secret keys and generation of open keys by network users by means of transformation of binary vectors of secret key and numbers a and p, to obstruct possible determining of secret keys, and also common secret sub-keys of network users, while for determining secret sub-keys K it is required to know binary checksum vector of transferred message ξ, which changes for each communication session in random fashion. Utilization of checksum for source message during generation of protection key allows to prevent imposing of false information and to determine errors in transferred message, while possibility of determining of secret keys and common secret sub-keys of network users is excluded even when using cryptanalysis method with known open text. Instead of generation of binary checksum vector for transferred message binary hash function vector may be generated for transferred message or a random binary vector, for example, by using random numbers generator in conjunction with timer indications.
EFFECT: increased speed of operation of encoding-decoding key generation process and increased message encoding speed.
1 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD FOR GENERATING ENCRYPTION-DECRYPTION KEY | 2001 |
|
RU2230438C2 |
METHOD OF DELIVERING KEY WITH VERIFICATION OF RADIO NETWORK CORRESPONDENT AUTHENTICITY | 2016 |
|
RU2654122C2 |
METHOD FOR STREAM ENCRYPTION OF DATA | 2005 |
|
RU2291578C1 |
METHOD FOR CONFIRMING AUTHENTICITY OF DISCONTINUOUS MESSAGE | 2005 |
|
RU2291579C1 |
METHOD FOR CIPHERING OF DATA BLOCKS | 1997 |
|
RU2106752C1 |
METHOD FOR ENCODING INFORMATION WHICH IS REPRESENTED IN BINARY CODE | 1997 |
|
RU2103829C1 |
DATA STREAM ENCRYPTION METHOD | 2001 |
|
RU2239290C2 |
METHOD FOR ENCRYPTING DATA UNITS | 1997 |
|
RU2111620C1 |
METHOD FOR DATA STREAM ENCRYPTION | 2009 |
|
RU2423799C2 |
METHOD FOR CRYPTOPROTECTION OF TELECOMMUNICATION KNOW-HOW SYSTEMS | 1995 |
|
RU2077113C1 |
Authors
Dates
2006-06-10—Published
2004-04-07—Filed