FIELD: safe data transmission.
SUBSTANCE: method includes: performing a number of operations affecting the message conversion, resulting in higher uncertainty (Conditional entropy) of the HE(M) message; when an intruder (cracker) performs a full brute force attack on a third encrypted text, said operation, including both XOR encryption and subsequent conversion with fixed-period encryption, receives combined first and second encrypted texts as input data and creates third encrypted text as output data, using third and fourth keys obtained from second entropy pool; performing an operation for increasing the Key Conditional entropy after each encryption cycle, in which it is said that operation results in increase of key conditional entropy HE(K) after performance of full brute force attack on third coded text.
EFFECT: technical result is providing a security system which is robust to full busting with any possible encryption, despite using a key of finite length.
10 cl, 7 dwg
Title | Year | Author | Number |
---|---|---|---|
EFFICIENT ENCRYPTION AND AUTHENTICATION FOR DATA PROCESSING SYSTEMS | 2003 |
|
RU2340108C2 |
EFFICIENT CODING AND IDENTIFICATION FOR DATA PROCESSING SYSTEMS | 2003 |
|
RU2336646C2 |
METHOD FOR GENERATING ENCRYPTION-DECRYPTION KEY | 2001 |
|
RU2230438C2 |
METHOD OF HIDDEN TRANSFER OF CODED INFORMATION ALONG MULTIPLE COMMUNICATION CHANNELS | 2011 |
|
RU2462825C1 |
METHOD FOR GENERATION OF ENCODING-DECODING KEY | 2004 |
|
RU2277759C2 |
METHOD FOR DATA STREAM ENCRYPTION | 2009 |
|
RU2423799C2 |
METHODS AND APPARATUS FOR SELECTIVE DATA ENCRYPTION | 2009 |
|
RU2505931C2 |
DATA ENCRYPTION METHOD AND DEVICE | 2021 |
|
RU2763394C1 |
METHOD FOR STREAM ENCRYPTION OF DATA | 2005 |
|
RU2291578C1 |
BLOCK CIPHER METHOD USING KRONECKER PRODUCT OF INVOLUTIVE MATRICES | 2022 |
|
RU2793408C1 |
Authors
Dates
2020-12-04—Published
2016-12-27—Filed