[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CA2371452A1 - Cryptographic engine using base conversion, logic operations and prng in data arrays to increase dispersion in ciphertext - Google Patents

Cryptographic engine using base conversion, logic operations and prng in data arrays to increase dispersion in ciphertext Download PDF

Info

Publication number
CA2371452A1
CA2371452A1 CA002371452A CA2371452A CA2371452A1 CA 2371452 A1 CA2371452 A1 CA 2371452A1 CA 002371452 A CA002371452 A CA 002371452A CA 2371452 A CA2371452 A CA 2371452A CA 2371452 A1 CA2371452 A1 CA 2371452A1
Authority
CA
Canada
Prior art keywords
array
att
elements
data
byte
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002371452A
Other languages
French (fr)
Inventor
Richard C. Satterfield
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority claimed from PCT/US1999/010967 external-priority patent/WO2000070819A1/en
Publication of CA2371452A1 publication Critical patent/CA2371452A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
    • H04L9/0662Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/04Masking or blinding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The plaintext is partitioned, block-by-block, the block size being a user selectable power of 2 in size (step 1). The data bytes in the input block ar e selected M bytes at a time, where M >= 2, with permuted addressing to for m a single concatenated data byte, CDB. The CDB is modified by rotating (or barr el shifting) a random bit distance (step 7). The CDB may also be modified befor e or after rotation by simple arithmetic/logic operations (step 12). After modification, the CDB is broken up into M bytes and each of the M bytes is placed into the output block with permuted addressing (step 4). The output block, or ciphertext, may again be used as an input block and the process repeated with a new output block. This scheme may be used as an encryption method by itself or in conjunction with other block encryption methods. The latter may be accomplished by using this scheme between successive stages of other encryption methods on blocked data, or between an internal stage of th e other methods. The sources of random number (step 2) used to determine the distance for the random rotation operation can be from: a pseudo-random numb er generator, sampled music CD-ROMs, entries in tables arrays, buffers, or any other digital source.

Description

CRYPTOGRAPHIC ENGINE USING BASE CONVERSION, LOGIC OPERATIONS AND PRNG IN DATA
ARRAYS TO
INCREASE DISPERSION IN CIPHERTEXT
FIELD OF THE INVENTION
The present invention relates to apparatus and methods for encryption and decryption wherein a ciphertext is generated. More particularly, the present invention is related to the use of symmetrix private key incryption. This invention contains changes which improve the security of the resulting ciphertext and well as features which aid in masking the arrays used to encrypt information from statistical analysis of the ciphertext.
BACKGROUND OF THE INVENTION
to Dr. Man Young Rhee, in his book Cryptography and Secure Communications (McGraw-Hill, 1994) states on page 12: "A cryptosystem which can resist any cryptanalytic attack, no matter how much computation is allowed is said to be unconditionally secure. The one time pad is the only unconditionally secure cipher in use. One of the most remarkable ciphers is the one-time pad in which the ciphertext is the bit-by-bit modulo-2 sum of the plaintext and a nonrepeating keystream of the same length. However, the one-time pad is impractical for most applications because of the large size of the nonrepeating key."
US patent 5,113,444 issued May 12, 1992 entitled "RANDOM
2o CHOICE CIPHER SYSTEM AND METHOD" states "First random number strings are a relatively scarce commodity. Second, the receiver must have at hand exactly the same random number sequence the sender used or must be able to reproduce it. The first of these alternatives requires the sharing of an enormous amount of key material. The sharing of an enormous amount of key material is impractical. The second alternative is impossible." The first and second conclusions to these statements are inaccurate. Statistical analysis of the sampling of digital sources (specifically 16 bit sound files) shows that random or arbitrary numbers or bytes are readily available in the digital/computer environment.
This ready availability of random numbers is contrary to the teachings and opinions of those skilled in the art as well as those expert in the art of cryptography.
Another prevailing view of those skilled in the art is that most pseudo-random numbers have an inherent weakness because they are generated by a formula and that it may be possible to reconstruct the formula and then predict the numbers in the series.
US Patent 4,751,733 entitled "SUBSTITUTION PERMUTATION
ENCIPHERING DEVICE" describes in the abstract: "A substitution-permutation enciphering device. This device, adapted for transforming a binary word into another binary word, by succession of substitutions and permutations, under the control of a key ... " This use of a substitution memory as described by US
l0 4,751,733 has a limitation in that this patent discloses and teaches changes only to the bits of a byte.
US Patent 5,001,753 entitled "CRYPTOGRAPHIC SYSTEM AND
PROCESS AND ITS APPLICATION" describes the use of a rotational operator in an accumulator. The rotation operation is used to cause an accumulator bit to 15 be temporarily stored in the carry bit, rather than in a memory location, and the carry bit (regardless of its value) is ultimately rotated back into its original position. The rotate operation is explained in detail by column 3 line 61 through column 4 line 6. Also described is the processing within a microprocessor using an eight bit (1 byte) accumulator. The '753 patent is limitated to the rotate 20 operation in conjunction with an accumulator.
US Patent 5,113,444, entitles "RANDOM CODING CIPHER SYSTEM
AND METHODS," and US Patent NO. 5,307,412, teach the use of a thesaurus and/or synonyms together with arithmetic/logic operations to combine data and masks to accomplish encoding/decoding. These patents are thus limited by the 25 use of the thesaurus and synonyms.
US PATENT 5,412,729 entitled "DEVICE AND METHOD FOR
DATA ENCRYPTION" introduces the concept of using matrix operations to multiplex the bytes in the cleartext so that the a byte in the ciphertext may contain elements of more than one cleartext bytes. The patent teaches about the multiple 3o use of a data element to create a ciphertext element. This is different from the combination of: creating a single working element by concatenating several bytes together (with permutation of sequence during the concatenation), binary rotating the resultant single element, and the breaking up the single element back into multiple bytes to be placed in an output buffer (also with permutation of sequence). Under certain conditions, a matrix presentation may be used to represent the effect of the rotation operation. However, careful examination will show that the matrix representation of the rotation operation does not follow the rules associated with a linear system and thus is quite different from this patent.
This patent method is limited by teaching multiplexing of several different data elements together wherein each data element may be used more than once., while the scheme herein only modifies a single data element at any one time.
US. PATENT 5,077,793 entitled "RESIDUE NUMBER
ENCRYPTION AND DECRYPTION SYSTEM" teaches (column 3 lines 40 to 1o column 4 lines 8): "If the moduli are chosen to be mutually prime, then all integers with the range of zero to the product of the moduli minus one can be uniquely represented. The importance of the residue number system to numerical process is that the operations of addition, subtraction, and multiplication can be performed without the use of carry operations between the moduli. In other words, each digit in the n-tuple can be operated on independently and in parallel."
And shows that for the sum Z of the digits X and Y, the ith digit may be given by:
z~ (x;+y;) mod m; and that "a sixteen bit binary number can be represented in the residue number system using five moduli 5,7,11,13,17." The moduli (m;) are chosen to be relatively prime to each other. In Columns 5 and 6 the description goes on to define Z=(X+Y) mod M (where is the product of all of the moduli, i.e., M=m~ x m2 ... m",) is a generalization of the Vigenere cipher. If Z=(X-Y) mod M
is used to encrypt X using Y then X may be recovered from Z by X=(Y-Z) mod M, which is a generalization of the Beaufort cipher.
Pages 305 and 306 in "Applied Cryptography, Second Edition" by Bruce Schneier, John Wiley & Sons, Inc. 1996 - describe the Madryga encryption method. "The Madryga consists of two nested cycles. The outer cycles repeats eight time (although this could be increased if security warrants) and consists of an application of the inner cycle to the plaintext. The inner cycle transforms plaintext to ciphertext and repeats once for each 8-bit block (byte) of the plaintext.
3o Thus the algorithm passes through the entire plaintext eight successive times. An iteration of the inner cycle operates on a 3-byte window of data, called the working frame [figure reference omitted]. This window advances 1 byte for each iteration. (The data are considered circular when dealing with the last 2 bytes.) The first 2 bytes of the working frame are together rotated a variable number of positions, while the last byte is XORed with some key bits. As the working frame advances, all bytes are successively rotated and XORed with key material.
Successive rotations overlap the results of a previous XOR and rotation, and the data from the XOR is used to influence the rotation. This makes the entire process reversible. Because every byte of data influences the 2 bytes to its left and the 1 byte to its right, after eight passes every byte of the ciphertext is dependent upon 16 bytes to the left and 8 bytes to the right. When encrypting, each iteration of the inner cycle starts the working frame at the next-to-last byte of the plaintext and advances circularly through to the third-to-last byte of the plaintext. First, the entire key is XORed with a random constant and then rotated 1o to the left 3 bits. The low-order 3 bits of the low-order byte of the working frame are saved; they will control the rotation of the other 2 bytes. Then, the low-order byte of the working frame is XORed with the low-order byte of the key. Next, the concatenation of the 2 high-order bytes are rotated to the left the variable number of bits (0 to 7). Finally, the working frame is shifted to the right 1 byte and the whole process repeats." On page 306, "Both the key and the 2 ciphertext bytes are shifted to the right. And the XOR is done before the rotations." The Madryga method may be improved upon by a better randomizing of the order of the bytes prior to concatenation and by not storing the rotate distance information (even though it is encrypted) in the data itself. A weakness of this method is that the order of the bytes prior to concatenation is unmodified and therefore more easily broken.
The terms engine, decoder, and encryptor are used interchangeably herein.
A relative address pointer (rap or RAP) is defined herein as relative address index, pointing to an entry within a table of bytes, an array of bytes or an I/O buffer. When relative addresses are supplied by a counter, that counter is constructed so that it counts modulo the size of the I/O Buffer, Mask Array, or table with which it is associated. When the size of a array or I/O buffer is a power of 2 in length, then an ordinary binary counter may usually be used to supply the 3o relative address pointers.
Address scrambling is defined herein as the modification of a relative address pointer (RAP) so that its value is changed through the uses of any combination of: additive (or subtractive) values, xoring (exclusive or) of mask values or by table lookup values, creating a scrambled relative address pointer (srap or SRAP).
Address Translation Table operations are defined herein as ATT
Operations. This will mean the converting of a relative address pointer (RAP) into a scrambled relative address pointer (SRAP).
ATT Entries, or ATT Block Entries, or ATT Blocks are defined herein as tables of relative address pointers or modified relative index values ZN in size, having values of 0 to 2N-1. Other sized ATT Block Entries may be used for non-power-of 2 XORn and ATT Block Entry Modulo operations. For example, an l0 ATT Block of 1014 entries will use an XORn (based 13) and a Modulo operation of 1014. Each ATT Block contains only 1 unique value in its range. There are no duplicate entry values and thus an ATT Block is completely different from a thesaurus as defined in either US 5,113,444 or US 5,307,412. because no synonyms or duplicate entries are present. The size of the I/O buffers and 15 Masking Arrays should be an integer multiple of the ATT Block Entries to be used with them. Thus if a ATT Block Entry for I/O is 1000, then the I/O
Buffers should be integer multiples of 1000 bytes in size. If the masking arrays are 64K in size, then a ATT Block Entry for them should be a power of 2 in size less than or equal to 64K. A buffer size of 1014 is interesting if 3 byte (24 bit wide) 20 arithmetic/logic operations are chosen.
ATT Column is defined herein as a collection of one or more ATT
Blocks used one at a time so that even though the collection of multiple ATT
Blocks all contain the same entries, though probably in a different order, they are not a table of Synonyms as defined by either US 5,113,444 or US 5,307,412.
25 Also these ATT Blocks are used to modify the value of a relative address pointers and not the data to be encrypted or decrypted as is done by these patents.
Herein, ATTN is the number of ATT Blocks in an ATT Column.
Herein ATTSIZE is the ATT Block size within an ATT Column and ATT BASE
is the number base for the XORn masking operations to be used with the ATT
30 Block size. Herein ATTB is the number of the ATT Block Entry being used (counting from 0 upwards) within an ATT Column. Herein an Address Translation Table consists of one or more ATT columns.
Multiple byte fetches (MF's) are is defined herein as the accessing from a mask array, table or buffer, of two or more bytes to create a single element comprising the logical concatenation of the bytes retrieved. Herein MF will refer to multibyte fetch operations.
Decatenation or decatenate are defined herein as the breaking apart of a single multibyte width entity, previously created by the concatenation of individual bytes, back into individual bytes.
Multiple byte put (MP) is defined herein as the breaking up, or decatenation, of a logical concatenation of bytes into 2 or more individual bytes and their placement into a table or buffer.
A byte is defined herein as being of any width greater than or equal to 2 I o bits.
A barrel shifter is defined herein as a shift register arranged such that any bits shifted off either end of the register are also shifted back in the other end of the shift register at the same time. No information is added, lost or changed in the process. A barrel shifter may also be constructed using a simple latch register 15 and multiple selects for the inputs to the latch creating a barrel shifter which only requires one clock period to perform any size rotate. Rotation can also be performed in a register within most typical CPUs. Usually, there is an instruction native to the CPU which will perform this operation.
Herein the words, rotation, rotational operation, or rotation operation 20 will refer to barrel shifting.
Herein an encoder pass, or PASS, is defined to mean the encoding of a block of cleartext into an intermediate-text or ciphertext block, or the decoding of a block of ciphertext into an intermediate-BCN is defined herein as the binary to base n conversion of a number 25 and the representation of the base n number as a digit shown in binary. A
common example (base 10) is BCD (binary coded decimal) where the values 0 through 9 are represented by 4 binary bits.
It is an object of the present invention to provide a source of random, pseudo-random and arbitrary numbers to be used in the encryption/decryption processes 3o and devices.
It is an object of the present invention to provide a concatenation operation is used to create a single data element from smaller elements, and after modification, the single element is split up into smaller elements again -with each smaller element only used one time.
It is yet another object of the present invention to exclude use of thesauruses and of synonyms.
It is still another object of the present invention to provide encryption/decryption apparatuses and methods wherein information data to be securely transmitted between users are permutated and shifted. The resulting information may then be combined with masking data from random, pseudo-random or arbitrary sources to provide another level of encoding/decoding for further security.
SUMMARY OF THE INVENTION
The foregoing objects are met in an encryption apparatus and method providing an address pointer scrambler, a byte concatenator, a barrel shifter and a decatenator which encrypt and decrypt input data.
The present invention provides an encryption/decryption method wherein binary data may be encrypted through the use of multiple applications of the combination o~ a concatenation of bytes (with permuted sequence) forming a single data item, a rotational shifting of the data item by an arbitrary amount and a separating operation or deconcatenation operation of the data item back into individual bytes (with permuted sequence). This method and apparatuses may also employ arithmetic/logic modification of the data during the process.
Other preferred embodiments will add to the above mentioned apparatus, one or two masking arrays, Ml and M2, of length N, a table of arbitrary bytes (RDT) of random data, additional multibyte wide rotational operations, internal counters and control variables which direct and control the operation of data modification and the modification of relative address pointers.
The sender and receiver must agree ahead of time on: the permutation scheme, or the source of the permutation scheme. And, if used there must be agreement on the sources to be used for the masking bytes and how these sources will be sampled and/or combined to create the masking bytes, tables, variables, counters and pointers to be used to encrypt and decrypt a message.

Encoding or Decoding will consist of one or more passes through a cleartext message with the combination of: multiple byte fetches (MF
concatenation) from an input buffer with address scrambling (permutation of sequence), rotation of the single element (created by concatenation) by an arbitrary amount and multiple byte puts (MP decatenation) to an output buffer with address scrambling.
To the method described in the previous paragraph may be added logical/mathematical data modifications as well as the employment of rotational operations to the values retrieved from the masking arrays. The application of a 1 o rotational operator to the retrieved bytes from the masking arrays increases the effective statistical size of the mask array from N to 8N (assuming 8 bit bytes).
Consequently the effective statistical combinatorial size of the masking arrays is increased to 64N2. The effective combinatorial size increases beyond 64N2 if one considers the effects of other control bits in the ALV variable (see Figure 4A). In 15 addition, the introduction of multiple byte fetches (MF's) with address scrambling from the masking arrays allows the Encoder to operate as if each pass through the data has its own distinct set of masking arrays thereby increasing the security of the ciphertext.
An interesting aspect of the present invention is the address scrambling 20 mechanism and the use of Address Translation Tables entries (ATT Columns and ATT Block Entries) to permute the order of address selection from I/O buffers A
and B and from the two Masking Arrays. This scheme does not require pure random numbers to create the ATT Column Entries. Any digital source may be used, including plain text.
25 Another aspect of the present invention is the ATT mechanism's flexibility to generate different scrambled relative addressing pointer sequences (SRAP values) from the same ATT Block Entry through the use of offsets and masks being applied to the ATT operation.
The scheme may also employ different sized ATT Column entries. For 30 example, a 4 KB input buffer may be sourced (data fetched) with 4 different ATT Column Block Entries and written out using a different single 4 KB ATT
Column Block Entry. The only restrictions are that the ATT Block size cannot exceed the size of the Buffer or table being accessed and the Buffer should be an integer multiple of the ATT Block size.

Herein XORn (XOR+ and XOR-) describes an exclusive-or operation (base n) defined as: let the numbers A and B base n be defined (for m digits) as:
n:-1 m-1 A=~n'a; and B=~n'b;
r=o r=o nt-1 Then C = A xor + B = ~ n' ((r2 + a; + b; ) mod n) Eq. 1 r=o m-I
and C = A xor - B = ~ n' ((n + a; - b; ) mod n) Eq. 2 l=
For base 2, XORn is identical to the standard XOR operation. The conversion of a binary number to j digits (base n) is done by the successive division of the number by n where the remainder of each division becomes the ith digit for i=0 to j-1. The digits of a number (base n) are converted back to binary by: setting sum=0, then for i j-1 to 0 perform sum=(sum * n) + digit;. When done the result is in sum.
Eq. 1 is a type of Vigenere cipher using XOR+ while Eq. 2 is a Variant Beaufort cipher is using XOR- These two ciphers being applied to the digits resulting from the conversion of binary to base n numbers and the subsequent reconversion back into a number in the original number base is defined herein as 2o XORing the numbers base n (XORn).
Arbitrary and random numbers are created by normal digital processes.
Most digitized music which comes on a CD-ROM is 16 bits of Stereo sampled at a 44.1 kilohertz rate. This produces approximately 10.5 million bytes per minute.
Of these about one half may be used as arbitrary data bytes, or about 5 million bytes per minute. Reasonably random data byte are generated by reading in the digital data stream which makes up the music and throwing away the top 8 bits and sampling only the lower eight bits of sound to produce an arbitrary or random number. Fourier analysis on the resultant byte stream shows no particular patterns. It should be kept in mind that silent passages are to be avoided. If 3o taking every byte of music in order is undesirable, then using every nth byte should work quite well for small values of n between 11 and 17. Please note, the error correction inherent with a music CD-ROM is not perfect and the user might want to convert the CD-ROM music format to a WAVE (.WAV) file format and then send the WAVE (.WAV) file to someone by either modem, large capacity removable drive, digital magnetic tape cartridge, or by making a digital CD-ROM
containing the WAVE (.WAV) file.
Another source of digital randomness is the pixel by pixel modification (ex-clusive oring, adding, subtracting) of several pictures from a PHOTO CD-ROM, again looking at the low order bytes. Computer Zipped (.ZIP) files and other compressed file formats can be used.
1 o In other preferred embodiments, the intelligent sampling of digital sources can be used to advantage to lessen the reconstruction of the byte stream used for encryption. In addition, encryption and hashing algorithms may be used to modify the digital sources prior to their use. Moreover, the modification of pseudo-random numbers for tables, arrays and/or masks may also be used to advantage.
In the Encoder, a General Pointer (GP) is used to retrieve an eight bit byte from the RDT. Each time the General Pointer is used, its value is incremented after the retrieval of the byte from the RDT. The General Pointer is incremented Modulo the length of the RDT.
The addition of a pre or post rotate operation to this encoding scheme increases the security of the encrypted material. In a preferred embodiment, 32 bit arithmetic/logic operations is utilized, which means that 4 bytes of data must be fetched from the input buffer at one time and written back out as 4 bytes of data to our output buffer. These 4 bytes may be rotated either left or right by any number from 1 to 31 bits. Normally, a rotate value of zero or a multiple of 8 is not is not used.
If the interface receives a zero rotate value to the Encoder, an error message is returned, but the zero rotate value will be loaded into the designated rotate distance variable (MRV 1, MRV2, RV 1 or RV2). If during the operation of 3o the Encoder, a zero rotate value results from the retrieval (through the General Pointer) of a byte from the RDT (or arithmetic/logic combination of RDT and other table or mask array byte entries), then the value of the General Pointer, or other pointers, is incremented (modulo their respective lengths) and the process of retrieval is repeated until a non-zero result is obtained. For simplicity of explanation, only a General Pointer is shown for this Encoder. In another preferred embodiment, each variable has its own individual source pointer.
These pointers indicate the locations within one or more tables or mask arrays which are to be used and how these retrieved byte values are to be combined to supply a byte to the Encoder for updating a variable, counter or pointer value. In addition, addressing modes, other than incremental, may be used, where individual relative address pointers into table are incremented by values other than +l, or where the next value of a relative address pointer is calculated from one or more entries presently in an array or table of bytes, thus creating a pointer which jumps around.
l0 The expansion from one General Pointer to individual source pointers is not difficult for anyone skilled in the art to implement.
In another preferred embodiment, a selectable number of pointers are assigned to the variables in a manner determined by information sent to the encoder by the user interface. By changing the assignment of pointers to encoder variables and counters, the same cleartext, the same RDT and the same Masking Arrays can produce different ciphertext outputs.
If positional scrambling is not wanted, then setting the respective ATT
Mode bits in EVC2 to 11 (binary 3) or the creation of an ATT Block entry whose entries are in sequential order and the use of ATT Offset and Mask values of 0 2o will cause the SRAP to be the same as that of the input RAP.
Also for simplicity of the diagrams, the individual counters which are associated with each variable have been eliminated. In all preferred embodiments it is to be understood that these counters exist. In summary, each set of 4 byte fetches (1 MF) or puts (1 MP) will be considered 1 counter decrement operation for the Encoder counters associated with the Encoder control variables ALV, RV 1, RV2, MRV 1 and MRV2. Each ATTSIZE of ATT Operations (which equals one complete ATT Block Entry utilization) will be considered 1 counter decrement operation for all ATT variables associated with that ATT Operation.
The discussion for Figure 2C explains the counter operation is more detail.
The implementation of the Data Modifier (DM), in this application, shows arithmetic/logic operations using a base 2 number system. Other preferred embodiments are not limited to base 2. Their implementation require minor changes to the XOR operations in the data path. In another preferred embodiment the complementing of the mask values is replaced by the negation of the mask values. Through the use of another Encoder Control variable, ECV, or a regular Variable (and associated counter), the retrieved masking array values may be modified by any of: complementation, negation, hashing, or conversion to BCN
digits (base n). In addition, the expansion of the ALV to two bytes allows for the negation of the data and the expansion of other A/L options such as the use of an XORn (non-power of 2). Another preferred embodiment using a second ALV
operation and counter (ALV2 and ALV2C) contains bits which indicate whether the MF values (masking arrays and data), the intermediate or ending modified data elements are bit reversed. Other preferred embodiments allow for previously modified data to be used (either directly or through an additional MF
operation) to modify the data presently in the DM unit. These modifications may include, rotation, bit reversal, the swapping of bits within a data or masking elements as well as the application of arithmetic/logic operations.
The RDT replaces the characters in the Password String (as previously defined in US Patent application 08/336,766) and the retrieved bytes now control the sequence of arithmetic/logic and rotational operations as well as provide counter values which control the duration of these operations usage within the Encoder.
Starting offset values for the General Pointer, the Array #1 Pointer, the 2o Array #2 Pointer and any other initial value for a variable, counter, mask or offset may be obtained by any combination of: a Password String, hashing or other mathematical functions and values retrieved through the GP. The default starting value for the GP is assumed to be the beginning of the RDT (RAP=0).
The selection of 32 bit operations is arbitrary, other sizes such as 16 bits, 24 bits, or 64 bits may be implemented if desired, In another preferred embodiment, 2 bytes or 16 bit arithmetic/logic and rotational operations are employed. In the preferred embodiment shown in FIG. 4C, and additional rotate operation is inserted between the first and the second arithmetic/logic operations.
This rotate and the pre and post rotate operations also have the effect of further hiding the values or the mask arrays from detection by statistical processes.
Through the use of individual byte fetches and puts, with permuted addressing (ATT operations), it is unlikely that once the bits of a byte are split by the rotate operation and moved into another byte in a I/O buffer that these bits will be moved back into their originating byte through subsequent I/O operations during another processing pass..The formulas for the dispersion of a byte's bits into other bytes (or segments) as described below were derived from a statistical simulation using the assumption that once bits are moved out from a byte, that they may not be moved back into that byte. This assumption underlies the information presented by FIG. 8.
FIG. 8 shows the minimum, average, and maximum number of 8 bits segments (bytes) which contain the original 8 bit byte as a function of the number of scramble/rotate passes performed. A simulator was built where rotates of only plus or minus 1 to 7 positions are allowed and once bits are moved into another l0 byte, this other byte is treated as being independent form the original byte, The is, the maximum number of bytes containing the original 8 bits is 8 after 7 passes of the rotate function (with address scrambling). This is the result of each rotate breaking 1 bit off with each pass. Obviously, this does not happen that frequently because 7 passes has an average result of 5.6, meaning that the original 8 bits are 1 s now spread throughput 5 to 6 other bytes (see Fig. 8) The number of average segments S containing the original n bit wide byte as a function of the number of P passes is approximated by the formula:
(n - 2)P
SP = n - (n - I)P_, Eq. 3 Initially, the rotate operation has the effect of splitting an n bit data byte into two parts. The size of the smaller part (SP) is given by Eq. 4, while the larger part (LP) is given by Eq. 5.

n integer ~-SP = (n - I) Eq. 4 LP = n - SP Eq. 5 The rotate operation may split a byte only into a maximum of two parts for each PASS, where with US patent '729 the degree of splitting (data multiplexing) is limited only by the size of the matrix and the number of integer entries in the respective matrix employed. Eq.'s 4 and 5 work well for the first rotation pass where n equals the byte width.
A shown in Fig. 8, the number of bytes over which the original 8 bits are dispersed does not increase at the same rate for each additional pass executed.
This is because some random rotates do not necessarily split the buts across a byte boundary as the number of "marked" bits per byte decrease. But what is apparent from Fig. 8 is that this combination of multiple passes or rotation with address scrambling is very effective is dispersing the bits of a byte across many bytes within a buffer. In effect, the encrypted data itself is used as a dispersing medium thus eliminating the need for a separate intersperser mechanism (see US
patents 5,307, 412 and 5,113,444). This data modification also decreases the likelihood that crypto-analysis will yield the contents of the RDT, or any of the masking arrays.
This encoder uses a symmetric private key encryption method, the sender of a message and the receiver must decide ahead of time on what sources will be used and how these sources will be accessed and used to build the ATT
entries and other internal tables, mask arrays, counter, variable and pointers.
In other preferred embodiments, the intelligent sampling of digital sources can be used to advantage to lessen the reconstruction of the byte stream 2o used for encryption,. In addition, encryption ad hashing algorithms may be used to modify the digital sources prior to their use. Moreover, the modification of pseudo-random numbers for table, arrays, and or masks may also be used to advantage.
The utilization of arbitrary rotate operations, in conjunction with an effective address scrambling scheme for accessing the I/O buffer, provides a means where poly-alphabetic crypto-analysis of a ciphertext produced by this encoder is hindered.
Other objects , features and advantages will be apparent from the following detailed description of preferred embodiments thereof taken in conjunction with the accompanying[ drawings.
BRIEF DESCRIPTION OF THE DRAWINGS

IS
Fig. 1 is a block diagram of the encryption engine;
Fig. 2A and 2B are listings of variables, counters, pointers and control bytes which must be saved and restored for each I/O pass;
Fig. 2C illustrates the entries in the encoder Control Variables, as well as the formats for the rotate values and the arithmetic/logic variable;
Fig. 3A and 3B are flow charts of the encryption/decryption sequence;
Fig. 3C is a flowchart detailing the Address Translation Process Operation;
Fig. 3D is a flowchart detailing the Multiple Byte Put (MP) operation;
Fig. 3E is a flowchart detailing the Multiple Byte Fetch (MF) operation;
Fig. 4A is a diagram showing the MF operations being applied to the retrieval of information of mask arrays and their modification by the control bits;
Fig. 4B is a diagram showing the MF and MP operations as they apply to data I/O
operations;
Fig. 4c is a diagram detailing the operation of the Data Modification operations;
IS Fig. 5A is a flowchart showing how ATT Block entries are made;
Fig. 5B is a table showing the structure of Address Translation columns;
Fig. 6 is a diagram showing the operations of a sample Data Modification operation with only a rotate element;
Fig. 7 is a diagram illustrating how multiple encoders may be pipelined together;
and Fig. 8 is a table showing the statistical distribution of the bits as a result of multiple address scrambling/rotate passes.
DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS
Fig. 1 shows a basic block diagram of the encoder/decoder engine. The user interface 1 is used by the controller 6 to communicate information to and from the user. A communications bus 20 is used to transfer information between the user interface and the controller., The controller is in charge of general housekeeping details for t encoder. It also takes commands form the user interface which direct the controller to place data bytes in: the masking arrays 13 and 14, the random data table (RDT) 2, the parameter save tables 3, the address translating tables 4, the data modifier 7, and I/O buffer 15 or 16, or to read back data bytes from the previous I/O buffers.
The binary status bit, BUFSET (see Fig. 2C) of the encoder control variable #1, ECV 1 (see Fig.'s 2A and 2C) determines which of the two I/O
buffers is designated for input and output. If BUFSEL=0, the A I/O Buffer (I/O-A) 156 is the input buffer, while the B I/O buffer (I/O-B) is the output buffer from which information will be retrieved and sent back to the user via line 57 to the controller and then via line 20 to the user interface. If BUFSEL=l, the I/O-A
is the output buffer and the I/O=-B is the input buffer. I /O. address and control lines56 and 57 are used by the controller to load data bytes into and to read data bytes from the I/O-a and I/O-B, respectively.
IS The I/O, address and control lines 32 and 37 are used to send data bytes to Mask Array #1 (MA#1) 13 and Mask Array #2 (MA#2) 14, respectively.
Similarly, line 21 is used to load data bytes into the random data table (RDT).
The RDT is a large table of bytes, some of which are periodically sent to the Data Modifier, 7, via line 26 to supply direction and control information to the Data Modifier (DM). The General Pointer (GP), see Figure 2A, is a RAP into the RDT which designates which byte will be sent to the DM unit. After each access with the GP, the value of the GP is incremented (modulo the length of the RDT). Thus the RDT has assumed and expanded upon the direction and control function previously supplied by the Password String in the parent U.S. patent application 08/336,766.
The pass number (PN) form 1 to 16 is a counter value which is always kept within the controller. It is used to indicate which processing pass is being performed, where the parameters are to stored and other information the DM
might need about a processing pass. The user also determines, by information sent to the controller, how many processing passes per I/O buffer load are to be performed.
Parameters (pointer, variable, counters, etc.) used by each encoding pass within the encoder may be loaded into the Parameter Save Table (PST) by one of two means: either through I/O, address and control line 23 directly from the Controller, or by another I/O, address and control line 27, directly from the Data Modifier 7. In the ;latter case, the Parameters must first be loaded into the DM and then saved from the DM into the PST (with the appropriate PN information being supplied by the Controller so that the information is stored in the correct section of the PST. The PST normally holds up to sixteen different sets of Parameters, though this is an arbitrary number and its value may be changed during implementation. The PST is where the encoder saves the state of the Parameters of the Data Modifier 7, after processing the I/O buffers for one pass and reloads the previously saved Parameters of the Data Modifier for the next processing passes. Thus, the designation of input and output buffers is swapped after each processing pass. Care must be taken so that after the processing pass, BUFSEL
is not complemented so that it correctly points to the output buffer which holds the completed ciphertext.
The Address Translation Tables (ATT) 4 hold one of more ATT
Columns which are used by the four ATT Processors (5A, SB, SC, SD) to compute SRAPs for accessing MA3 !, MA32, I/O-A, and I/O-B. The ATT
Columns are computed outside of the encoder and loaded into the ATT by the user interface 2, line 20, the controller, and I/O address and control line 24.
Once all tables, I/O buffers and masking Arrays have been created, the 2o Controller sets the pass counter P=1 and tells the DM to load its Parameters from the PST via 27 and to process an Input Buffer.
First, the DM via lines 28a to 28d sends the MA31 RAP (Array 31 Pointer, Fig. 2A) to the Ml ATT Processor and gets back the SRAP for the first bit byte to be retrieved form MA31. The SRAP is sent via 36a to MA31 and the Array #1 Pointer value is incremented.. The byte retrieved from MA#1 is sent to MF#1 via 33. After this is repeated three more times, the MF#1 now contains a thirty-two bit wide value (M1 Fig. 4A) which is sent via 34 to the DM unit.
Similarly, the process is initiated for the RAP for MA#2 (Array #2 Pointer, Fig.2A) to be converted into a SRAP by the M2 ATT Processor SB using lines 29a to 29d, and the SRAP is sent via 41 a to MA#2 and the Array #2 Pointer value is incremented. The resulting byte from MA#2 is sent via 38 to MF#2. Again, this process is repeated three times and the resulting 32 bit wide value (M2, Fig.
4A) is sent via 39 to the DM units. Next, the input buffer RAP Input Pointer, Fig. 2A
is sent to the INPUT ATT PROCESSOR via 30a and 30d and the resulting SRAP is sent via 140 to the I/O BUFFER SELECTION LOGIC (BSL) 12, where it is sent via 46a to the input I/O buffer and the Input Pointer value is incremented.
Assuming BUFSEL=0, then the BUFSEL enables the I/O-A Buffer to accept the Input SRAP. The I/O-A sends a byte of Cleartext (or intermediate text on subsequent passes) to MF#3 via 53 to the BSL, then via 41 to MF#3. Again this process is repeated three times until 32 bits of data have been retrieved from the I/O buffer. The 32 bit INPUT DATA byte is sent via 43 to the DM unit. The DM
unit now combines the two 32 bit retrieved mask bytes Ml and M2 (see Fig. 4A
and 4C) with the 32 bit wide INPUT DATA byte (Fig. 4B and 4C) under control of Encoder variables and operations to form a 32 bit wide OUTPUT DATA byte.
The 32 bit wide OUTPUT DATA byte is sent to MP#1 via 51. At the same time, the Output Pointer, Fig. 2A, RAP is sent to the BSL via 141 and then via 47a to the output I/O Buffer (I/O-B) . The Output SRAP goes to the I/O-B via 47A and NOT(BUFSEL) write enables the buffer. The MP#1 deconcatenates the 32 bit wide INPUT DATA input into a sequence of four 8 bit bytes. Each byte is sent from the DM via 49 to the output I/O Buffer where it is written into the buffer.
The MP#1 process is repeated three more times (using a new SRAP each time) until all four bytes have been written out into the I/O buffer. See Fig. 4A, 4B, and 4c. This reading and writing of the four bytes causes all non ATT counters associated with DM functions to be decremented once. If any variable counter is decremented to zero, then, depending on the status flags in ECV 1 and ECV2 (see Fig. 2C), the GP may be used to update the counter with a new value, otherwise the GP may be used to retrieve a new value for the variable. Only upon completion of the processing of an I/O buffer's ATT Block entry is the ATT
counter for that buffer decremented once When all of the bytes in the input buffer have been processed to the output buffer, the DM units saves the values of tits parameters in the PST, via 27.
The pass counter value P is incremented and, if the last Encoder pass has not been reached, then the DM reloads the parameters (for the next pass) from the PST
via 27. using the new P value, complements the value of BUFSEL and processes the new input buffer (previously)When the last Encoder pass has been processed, then the contents of the Output Buffer (ciphertext) is sent via 57 to the Controller and from the Controller via 20 to the User Interface and the user. At this point the process is restarted, P is set =1, BUFSEL=0, and a new input buffer of cleartext is loaded. If a whole buffer of clear text is not available, the remaining entries in the Input Buffer should be filled with random byte values.
Whether the value of ED (see Figure 2C, 60) equals 0 or 1, the flow through the Encoder is the same. In fact the operations may be reversed and the encryption achieved by running the Encoder in decryption mode while decryption would then necessitate running the Encoder in encryption mode.
Figures 2A and 2B provide a listing of the Parameters which the DM
needs to have loaded in order to process a buffer of information correctly.
ECV 1 and ECV2 are Encoder Control Variables whose bits provide control information to the DM (see Figure 2C).
ALV is the Arithmetic/Logic control Variable. It instructs the DM on how the fetched Array values are to be changed and how they are to be combined with the fetched data from the input buffer.
RVl, RV2 are the first and second rotate variables. They tell the Encoder how many bits (left or right) the rotators should change the data. MRV

and MRV2 are rotate values for the retrieved mask arrays values, see Figure 4A
for details. The incorporation of the MRV 1 and MRV2 rotate operations to the values fetched from the two mask arrays increases the effective statistical combinatorial size of the arrays to 64N2. This is before any other functions which 2o would increase the combinatorial size are considered.
The General Pointer (GP) points to an entry in the RDT from where the next byte of random data will be retrieved. After every byte retrieval through the GP, the GP itself is incremented (modulo the length of the RDT). In the simplified form shown in this patent application, only one GP is used for the updating of all variables, counters, masks and offsets. The user needs to decide ahead of time on the size of counters which are to be used in the DM. For example, if only 1 byte counters are used, then the maximum counter size (for variables) would be 256. If two bytes are used the maximum counter size would be 65536, etc. If two bytes are decided upon, then every time a counter needs to be updated, the GP will have to be accessed twice. Pointer values need to be wide enough to contain the complete relative addressing space for their respective table, array or buffer.

Similarly the Input Pointer, Output Pointer, Array # 1 Pointer and Array #2 Pointer are used to provide RAPS to the respective ATT PROCESSORS to obtain SRAPs used to indicate the location from which a byte of information is to be retrieved. With the exception of the Array #2 Pointer, each Pointer is 5 incremented once after each use. It is should be noted that when the Array #1 Pointer's RAP wraps around to 0, the Array #2 Pointer is incremented an additional time. This causes the Masking Array pointers to be incremented is such as way as to maximize their combinatorial usage.
For each of the M1, M2, Input and Output ATT Processors, the 10 following variables, counters, masks and offsets are used: ATT Column Number, ATT Block Number, Offset #l, Mask #1, Offset #2, Mask #2. In addition, Each ATT Column number contains the variables ATTN and ATTSIZE for that column. ATTN is the number of ATT Block Entries contained within the column.
All ATT Blocks within the ATT Column must be of the same size. ATTSIZE is 15 the power of 2 size of the ATT Block Entries for that ATT Column Number.
For example if an ATT Block Entry contains 1024 entries (0 to 1023 is some arbitrary order) then the value for ATTSIZE would be 10 because 2'°=1024. Also, the ATT Block Size must be smaller than or equal to the size of the Buffer, table or arrays with which it will be used. The ATT Process will be more completely 2o described by the discussion associated with Figure 3C.
At the end of the Parameters area is a section (marked optional on Figure 2B) where the initial values for the counters are saved. These initial values may be used if the mode bit associated with that counter is set, see Figure 2C
for more details, to reload the counter after it is decremented to zero.
Figure 2C details the bits in the control bytes EVCI and ECV2 as well as the format for the rotate variables: RV1, RV2, MRVl, MRV2, and the details for the control bits within the ALV variable.
Within ECV 1, BUFSEL determines which of the I/O buffers will be the input buffer and which one will be selected for output. If BUFSEL=0 then I/O-A
3o is the input and I/O-B is the output buffer. If BUFSEL=1, then I/O-B is the input and I/O-A is the output buffer. BUFSEL is normally complemented between Encoder PASS operations. If a Mode Flag bits is set equal to 1 in the ECV1, then the variable associated with the particular Mode Flag will have its counter reload from the counter's initially loaded value. Otherwise, if the Mode Flag bit is set equal to 0, then when the counter associated with that variable decrements to zero the next counter value is retrieved through the GP.
Within ECV2 are four pairs of bits which represent the ATT MODE
bits for the M1, M2, OUTPUT and INPUT ATT variables. The ATT MODE bits determine how the ATT variables will be updated when the ATT Counter (ATTC) associated with an ATT Process decrements to 0.
When the ATT MODE bits = 00, then, when the ATTC decrements to zero, the ATTB only is incremented. If the ATTB was pointing to the last ATT
Block within an ATT Column, then the new ATTB value is 0 and new Offset and Mask values are obtained from the RDT via the GP. The ATTC is reloaded from the saved initial value.
When the ATT MODE bits =O l , then when the ATTC decrements to zero, only the ATTB is incremented. All ATT Offsets and Masks are left unchanged. The ATTC is reloaded from the saved initial value.
When the ATT MODE bits = 10, then when the ATTC decrements to zero, the ATTB is left unchanged and all the ATT Offsets and Mask values are updated through the GP. The ATTC is reloaded from the saved initial value.
When the ATT MODE bits = 11, then the ATT Operation is disabled, thus the SRAP equals the RAP without modification.
In another alternate preferred embodiment, when the ATT MODE bits =
1 l, the operations are the same as when the ATT MODE bits = 00, except the ATTC is updated through the GP.
In another preferred embodiment, the arithmetic/logic bit width is 16 bits (two data fetch/put operations) and the ATT address scrambling operation for the two masking arrays is eliminated.

A summary of the operation of the ATT MODE bits on the ATTC is as follows:
Variable Decrement Mode Action When Associated Counter Name unit Value = 0 ALV, RV1,1 MF or =0 Reload with new value obtained MP from RDT

RV2, Operation via the General Pointer (4 MRV l, byte fetches MRV2 or Puts) =1 Reload with saved initial value M1 ATT 1 ATT Block=00 Increment ATTB only, after last ATT

values completion Block Entry (within the ATT
and Column) has counters (=2ATTSIZE been used, reset ATTB=0 and new Offset I/O or Mask and Mask values are obtained from the M2 ATT Array byte RDT via the General Pointer.
ATTC is values fetch reloaded from saved initial and value counters operations) =Ol Increment ATTB only, all ATT
offsets and INPUT mask are unchanged, ATTC reloaded from ATT values saved initial value and counters Keep ATTB unchanged, update only all =10 ATT offsets and mask values, ATTC

OUTPUT reloaded from saved initial value) ATT values and =11 Bypass of ATT Processor, SRAP=RAP

counters The RV variables for this implementation normally have values of plus or minus 1 to 31, excepting 8, 16 or 24. Depending upon the details of the implementation, the RV can be either a two's complement number with 3 sign bits and 5 bits of distance or a number consisting of three sign bits and a five bit positive number indicating the rotation distance. The detail for the choice of format is left to the implementer of this method. Other preferred embodiments using other byte widths for MF and MP operations will have to have different rotate operation widths and consequently the format of the RV will need to be to altered. This is quite simple for someone skilled in the art to implement.
Please note that the sign bits for the RV variable are XOR'd with the ED bit to change the direction of the rotation when ED changes. Consequently if, for example, ED=0 and RV=5 indicating a right rotate of 5 bits then, when ED=1 the RV =5, would indicate a left rotate of 5 bits. The limitation on the value RV2 may take can be eliminated if desired. It is important that at least RV 1, if not both RV 1 and RV2, have the above value limitations imposed so as to increase the likelihood that the rotate operation will cause the bits in the multibyte wide data byte to be split across byte boundaries.
The bits in the ALV from right to left are as follows: DCF, CFl, CF2, MSF, A/L (3 bits) and RF. The RF, A/L (most significant bit) and the MSF are modified by being XORed with the value of the ED bit (ECV 1 ). See Figures 4A
and 4C for details.
The DCF is the DATA COMPLEMENT FLAG which when set equal l0 to 1 causes the data to be complemented during processing.
The bits CF 1 and CF2 when set equal to 1 cause the retrieved values from the Masking Arrays #1 & #2 (respectively) to be complemented. Figure 4A
show the actions of CF1, CF2 and MSF in detail.
The MSF is the MASK SWAP FLAG, which when set equal to 1 causes the values retrieved from the masking arrays to be swapped. Details of this are shown in Figure 4A.
The A/L bits (3 bits) are used to determine which of 8 arithmetic/Logic combinations of the two masking arrays will be used to modify the data being processed. The table below summarizes the arithmetic/Logic combinations which 2o are used to modify the data. See Figure 4C for details.
Operation Operation 1 involves 2 involves A/L for A/L for 3 bit A/L Operations 3 bit A/L Operations A/L Values #1 #2 A/L Values#1 #2 0,0,0 = XOR ADD 1,0,0 = SUB XOR

0,0,1 = XOR SUB 1,0,1 = ADD XOR

0,1,0 = ADD SUB 1,1,0 = ADD SUB

0,1,1 = ADD ADD 1,1,1 = SUB SUB

An example of how the complementing of the MSF and A/L3 bits by ED works and ignoring any rotation operation is as follows: let MSF=DCF=CFl=CF2=0 and assume that ED=0 (encrypt), DB=5 (concatenated cleartext data byte), Ml=1, M2=2 and assume the three bits of the A/L =0, then Ml XOR the DB is 5 XOR 1 = 4; then the 4 ADD 2 = 6 (the ciphertext). Now, assume that the DB = 6 (concatenated ciphertext data byte) and ED=1 (decrypt), the MSF will now be complemented so that Ml=2, M2=1 and A/L will now = 4 instead of 0. Therefore, DB SUB M 1 which is 6-2=4 and then the 4 XOR M2 would be 4 XOR 1 = 5 which is the original starting value.
Another example is where A/L=2 for encryption (ED=0) and A/L=6 for decryption (ED=1). Let the DATA BYTE=DB=5 again, and the two A/L
operations will be ADD and SUB. Then DB ADD Ml is 5+1=6 then SUB M2 is 6-2=4 (ciphertext). With ED=I causing MSF to equal l, then Ml=2 and M2=1 and A/L=6 which is still ADD then SUB. Consequently, the 4 (ciphertext) ADD
M1 is 4 ADD 2 = 6 then 6 SUB 1 which is 5 (cleartext). The precedence of order matters for XOR and ADD (also SUB) but it is not important when only ADD and SUB are used.
The RF bit is the ROTATE FIRST bit. When set = 1 it causes the data to be rotated before any modification by the M 1 value. If RF=0, then there will be a rotation of the modified data after the last A/L operation. Note that there is a rotate operation between the two A/L data modifications.
In another embodiment, the arithmetic/logic operations are computed using a non binary number system. The table below is an example of how the three bit A/L codes may be implemented for a non power of 2 number base using the XORn operation.
NON POWER

BASE A/L
OPERATIONS

Operation Operation 1 involves 2 involves A/L for A/L for M2 3 bit A/L Operations 3 bit A/L
A/L Values #1 #2 A/L Values Operations #1 #2 0,0,0 = 0 XOR+ ADD I,0,0 = 4 SUB XOR-0,0,1 = 1 XOR+ SUB 1,0,1 = 5 ADD XOR-0,1,0 = 2 XOR- ADD 1,1,0 = 6 SUB XOR+

0,1,1 =3 XOR- SUB 1,1,1 =7 ADD XOR+

Normally with the XORn operation the digits which result from the operation are converted back to a binary representation so that normal rotation operations may be used. By converting the operations back to a binary number, the maximum dispersion of bits is afforded by the rotate operations. In another preferred embodiment, not shown, another variable, ALNB (A/L Number Base) is used in association with the XOR+ and XOR- operations to specify the number base to be used with these operations. This variable may be updated when the 5 ALV variable is updated. And in yet another preferred embodiment, not shown, a separate counter, ALNBC, is utilized for changing the variable ALNB
independently of the updating of the ALV variable. This counter is updated in a manner as described for other counters. Because the operations of ADD and SUB
are the same regardless of the number base used, the advantage of shifting or 10 changing the number base applies mainly to the XOR+ and XOR- operations.
The variable ALNB may be chosen from a digital source or computed using any combination of arithmetic or logic operations, but should have a value greater than or equal to two. One advantage of using a number base that is not a power of 2 is that, with the operations of XOR+ and XOR-, it is more difficult to recover useful 15 cryptanalytic information by xoring (base 2) messages or parts of messages against each other. The utilization of a varying number base helps increase the security of the encrypted information.
Note if arithmetic/logic operations are computed using BCN digits, which are not reconverted back to a normal binary representation, then the rotate 20 operation will have to be modified slightly. The Rotator will now have to shift digits instead of bits and the distance portion of the RV variable will have to be interpreted differently. The table below gives the number of bits each digit will require. In base 2 a digit is a bit.

2 1 bit 3 2 bits 9 to 15 4 bits Another ECV control byte (ECV3) can be used to contain the number 25 base for the Encoder pass. The table below gives the largest value which can be represented with BCN digits within an 8 bit byte using the designated number base.

NUMBER BASE MAX. VALUE FOR 8 BIT BYTE Bits/Digit 2, 4 255 1, 2 With BCN digit calculations, the initial number base selected needs to be able to contain the data to be encoded. For example, an 8 bit byte with a value of 10010 cannot be used with bases 3, 9 or 10. Also, bases can be changed between passes as long as the new base is able to contain the maximum value 5 possible with the old number base.
An advantage of using BCN digits, with data bytes that do not fully utilize the whole 8 bits of the byte, is the increased possibility (with the new number base) that the data bits will be spread out more completely over the 8 bits within the byte instead of just being clumped together. This may be helpful with 1 o some with text files where the characters may be mapped into a narrow range of values, 0 to 6310 or 0-9610. Using base 3, for example, (with data bytes having values within the range of 0 to 6310) the data which is initially in the lower 6 bits of the byte will be converted to the whole 8 bits of the byte.
In another preferred embodiment, not shown, the MF# 1 and MF#2 operations modify the elements retrieved from the masking arrays (before concatenation) by converting them to BCN digits (with truncation). Other variations, not shown, have the number base conversations taking place after the concatenation operations.
In another preferred embodiment, not shown, The order of the 4 bytes (32 bits) resulting from any of the MF operations is reversed. That is the 1 st and 4th bytes are exchanges as well as the 2nd and 3rd bytes. Control for this embodiment is done by creating another encryption control byte, ECV3, and assigning three bits, one to each of the MF operations. In addition, the reversal may also be applied to the MP operation prior the actual decatenation portion of the MP operation. If the MP reversal is desired, a 4th bit is assigned in the byte. This particular reversal is easy to implement in either software or hardware.
In software, many CPU's contain an instruction which accomplishes this reversal very simply. Other byte swapping or shuffling schemes (for the 32 bit or other multibyte configurations) may be employed using the other bits within the ECV3 (or other additional ECV control bytes may be created). Note, with the appropriate offset and mask values, the ATT Process on a RAP can achieve these 1 o byte reversals.
Figures 3A and 3b, ENCODER/DECODER SEQUENCE, represent a flowchart showing the sequence of Encoder operations.
Step l, is an initialization step. In this step, all tables are entered into the Encoder. These tables include the RDT, the ATT, and the two masking arrays MA#1 and MA#2. In addition, the pass number, PN, is set =1 and the total number of processing passes, PASSES, to be performed is passed to the Encoder.
The local variable SV is set to the first PASS number which will be used (either 1 or PASSES) while another local variable D (~1) indicates whether the pass numbers will be counted up or down. Thus in step 4, when encoding, the PASS
2o number is counted up from 1 to PASSES while for decoding, the PASS number is counted down from PASSES to 1.
Steps 2 and 3 are where the Parameters for each processing pass are initialized and stored in the PST.
Step 4 is the first step after the initialization sequence. The Pass Number, PN is set equal to SV (either 1 or PASSES), BUFSEL is set equal to 0, and Il0-A is filled with information to be processed. The local counter K is set equal to 1.
Step 5 is where the Parameters for processing pass PN are loaded from the PST into the DM. This initializes the DM for the pass to be performed.
Step 6 is where the DM processes the Input Buffer into the Output Buffer. The designation of which buffer is for input and which is for output is determined by the value of BUFSEL.

Step 7 (Figure 3B) occurs after the completion of an I/O buffer process.
The Parameters for pass PN are saved in the PST table.
Step 8 updates the pass counter PN by the value in D and the local counter K is incremented.
Step 9, if the K value is less than PASSES indicating addition processing passes are to be performed with the same I/O buffers, then the value of BUFSEL is complemented (Step 10) and the process returns to "2" on Figure 3A
which goes to step 5 above for addition processing. Otherwise, when all processing passes for a buffer have been performed, BUFSEL points to the output buffer and the output buffer (step 11 ) is sent through the Controller to the User Interface and thus to the user.
Step 12, if additional information needs to be processed, the process goes to "3" on Figure 3A which takes the process back to step 4, otherwise the process is done.
Figure 3C, ADDRESS TRANSLATION PROCESSOR OPERATION, is a detailed description of an ATT Process. Step 1 indicates what variables will be needed. The ATT Process requires an ATT Column with at least 1 ATT Block Entry, a RAP, the variables ATTB, OFFSET #1, MASK #1, OFFSET #2 AND
MASK #2. The ATT Column contains ATTN, ATTSIZE and ATTBASE see 2o Figure SB. ATTN is the number of ATT Block entries within the ATT Column while ATTSIZE is the size of the ATT Block Entries. ATTBASE is the number base to be used with the ATT operation.
It is assumed that the I/O Buffer, table or mask array being accessed is an integer multiple in size of ATTSIZE. In step 2, the value UPPER is the RAP
divided by ATTSIZE while LOWER is the RAP mod ATTSIZE. Another way to think about this is that UPPER is the quotient of RAP/ATTSIZE while LOWER is the remainder.
In step 3, the value LOWER is modified by adding OFFSET#1 to it. If we tread the RAP as the output of a counter, then adding an offset is the same as 3o phasing the counter. The result of the addition is XORn'd with MASK#1 and the result of this operation is taken mod ATTSIZE. The XORn introduces a nonlinear aspect to the phased value. The last mod ATTSIZE operation is needed to keep the results of the ADD and XORn with the ATT Block's address space.

In step 4, The resulting LOWER value is used as a RAP into the ATT
Block pointed to by ATTB within the ATT Column. This RAP (LOWER) is used to obtain LOOKUP from the ATT Block Entry.
Step 5, is the first modification of RAP LOOKUP. Here LOOKUP is processed in a manner similar to LOWER in step 3. It is phased by adding OFFSET#2 and then XORn-ing with MASK#2.
Step 6, recombines UPPER and LOOKUP to create a SRAP (scrambled relative address pointer). This is accomplished by multiplying UPPER by ATTSIZE and adding LOOKUP to the result.
Figure 3D, MULTIPLE BYTE PUT, is a description of the MP
operation. For this discussion, assume K is equal to 4. Step 1 shows what variables are needed for the MP operation. A single data item PUTBYTE (K bits wide), a RAP for the OUTPUT buffer and the related ATT Process information are needed to convert the RAP into a SRAP.
In step 2, we set TEMP=PUTBYTE and J=0. J is used as a temporary counter within the MP process.
Step 3, takes the Ouput RAP and other ATT variables and sends them to the OUTPUT ATT Processor. The resulting SRAP will be the address where a byte of data decatenated from PUTBYTE will be written into the Output Buffer 2o designated by BUFSEL. If BUFSEL=0, the output goes to I/O-B, else if BUFSEL=1 then the output buffer is I/O-A. The SRAP is saved for use in step 5.
Step 4, increments OUTPUT POINTER for use during the next iteration within the MP operation. The lower 8 bits (1 byte) of TEMP is transferred to DATABYTE. Next, the value of TEMP is divided by 2g (or 256, for an 8 bit byte) and the integer result of the division is put back in TEMP. This is the same as shifting the contents of TEMP 8 bits to the right. Then J is incremented by 1.
Here J is used as a counter to keep track of how many bytes have been placed in the output buffer.
Step 5, the 8 bit DATABYTE and the OUTPUT SRAP to be used are 3o sent to the output buffer designated by BUFSEL.
Step 6 is used to determine whether there are more bytes to be decatenated and placed into the output buffer. Since J is the local counter, if J is equal to K (because counting started at 0) then the process is done, otherwise the steps 3 through 6 need to be repeated until all of the bytes have been processed.
Figure 3E, MULTIPLE BYTE FETCH, is a description of the MF
operation. For this discussion, assume K is equal to 4. Step 1 shows what variables are needed for the MF operation. A RAP for the source to be accessed and the related ATT Process information needed to convert the RAP into a SRAP.
In step 2, TEMP and J are both set equal to 0. J is used as a temporary counter within the MF process.
Step 3, takes the RAP from the respective Pointer and other ATT
1 o variables and sends them to the appropriate ATT Processor. The resulting SRAP
is the address within the source buffer or array where a byte of data will be retrieved which will be used to create a single concatenated data item.
Step 4, takes the retrieved 8 bit data item, DATABYTE, and multiplies it by 2g' which has the effect of left shifting the data byte by 8J bits prior to its 15 being summed into the temporary variable TEMP. J is incremented so that the next time through the DATABYTE will be shifted 8 more bits to the left before being added into TEMP. The address Pointer associated with the RAP being used is incremented for use during the next iteration within the MF operation.
Step 5 checks to see if the appropriate number of bytes have been 2o fetched. If more fetch operations are needed, then steps 3 and 4 are repeated until the correct number of bytes have been retrieved. When the correct number of bytes have been retrieved, 'TEMP contains the single concatenated data item which is the result of the MF operation and is output of the MF operation.
A special note for step 3, if the MF operation concerns either of the two 25 masking arrays, then the incrementing of their Pointer values follows some special rules. In order to maximize the combinatorial sequences of the entries in the masking arrays, the Pointer for Mask Array #2 will need to incremented an extra time (modulo it's length) whenever the Mask Array #1 Pointer wraps around from the end of the array to its beginning. Since the Mask Array #1 Pointer is also 30 incremented modulo the length of MA# l, if the incrementing of the Array #

Pointer results in a zero value, then the Array #2 should also be incremented an additional time. Please note, this only involves the Mask Array pointers and not the Input Pointer.

Figure 4A, is a detailed diagram showing how masking bytes are retrieved from the masking arrays and modified by control variables from ALV
before being placed in the mask registers M1 and M2.
The control lines 28d and 29d are used to synchronize the M1 ATT
PROCESSOR, SA, and M2 ATT PROCESSOR, 5B, so that when the Ml ATT
PROCESSOR causes the ARRAY #1 POINTER counter, 96, to wrap around to zero, an extra incrementing control pulse, 28e going to OR 100, will be timed with the M2 ATT PROCESSOR's incrementing control pulse, 29c also going to OR
100, in such a manner that the two will not interfere with each other. An to incrementing control pulse leaving OR 100 via 101 causes the ARRAY #2 POINTER, 97, to be incremented.
The step for retrieving a set of bytes from MASK ARRAY #1 will be described next. The counter, 96, containing ARRAY #1 POINTER's RAP is sent to the Ml ATT PROCESSOR via line 28a, the resulting SRAP is sent by 28b to the M1 SRAP register,110. An incrementing control pulse, 28c, causes the ARRAY #1 POINTER counter to be incremented after the RAP is sent to the Ml ATT PROCESSOR. The contents of the M1 SRAP register is sent via 36a to the address inputs for MASK ARRAY #1. Control lines 36b and 35 synchronize the transfer of a mask data byte (addressed by the Ml SRAP) to the MF#l, 8. Once 2o this process has occurred four times, the MF#1 contains a 32 bit wide mask value which is transferred to the ROTATOR ,118, via line 34. Distance and direction information is supplies to ROTATOR 118 by MRV1, 92, via line 108. The Output of the ROTATOR, 118, is sent to XOR, 112, via line 122. The XOR, 112, is constructed in such a manner that each of the 32 input bits is XOR'd with the value of the CF1, 76, status bit from the ALV. The CF1 information is transferred to the XOR via line 102. If CF1=0, then the 32 bit wide result of the XOR
operation, line 114, is unchanged and is identical to the 32 bit value from MF#1 on line 34. However, if CFl=1, the 32 out going bits from the XOR on line 114 are the 1's complement of the data on line 34.
3o The counter, 97, containing ARRAY #2 POINTER'S RAP is sent to the M2 ATT PROCESSOR via line 29a, the resulting SRAP is sent by 29b to the M2 SRAP register ,111. An incrementing control pulse, 29c, causes the ARRAY #2 POINTER counter to be incremented via OR 100 and line 101 to ARRAY #2 POINTER, 97, after the RAP is sent to the M2 ATT PROCESSOR. The contents of the M2 SRAP register is sent via 41 a to the address inputs for MASK ARRAY
#2. Control lines 41 b and 40 synchronize the transfer of a mask data byte (addressed by the M2 SRAP) to the MF#2, 9. Once this process has occurred four times, the MF#2 contains a 32 bit wide mask value which is transferred to ROTATOR, 121, via line 39. Distance and direction information is supplies to ROTATOR 121 by MRV2, 93, via line 109. The Output of the ROTATOR, 121, is sent to XOR, 113, via line 125. The XOR, 113, is constructed in such a manner that each of the 32 input bits is XOR'd with the value of the CF2, 77, status bit from the ALV. The CF2 information is transferred to the XOR via line 103. If to CF2=0, then the 32 bit wide result of the XOR operation, line 115, is unchanged and is identical to the 32 bit value from MF#2 on line 39. However, if CF2=l, the 32 out going bits from the XOR on line 115 are the 1's complement of the data on line 3 9.
The output of the XOR 112, line 114, goes to the select 0 input of MUX
116 and to the select 1 input on MUX 119. The output of the XOR 113, line 115, goes to the select 0 input of MUX 119 and to the select 1 input on MUX 116.
ED, 60, and MSF, 78, both status bits in the ALV are sent to XOR 104 via lines 105 and 106, respectively. The result of this XOR is placed on line 107 which goes to the select input on both MUX 116 and MUX 119. Thus, if the select line 107 is equal to 0, the output of MUX 116, line 117, will be the 32 bit wide data on line 114, and the output of MUX 119, line 120, will be the 32 bit wide data on line 115. However, if the select line 107 is equal to 1, then the output of MUX
116, line 117, will be the 32 bit wide data on line 115 and the output of MUX 119, line 120, will be the 32 bit wide data on line 114.
The 32 bit wide output of MUX 116, line 117, goes to the M1 register 123 where it is held for use by the data modifier (see Figure 4C). The 32 bit wide output of MUX 119, line 120, goes to the M2 register 126 where it is held for use by the data modifier (see Figure 4C).
Figure 4B, is a detailed diagram showing the input and output MF and MP operations. ED, 60, is equal to 0 for encryption and is equal to 1 for decryption. ED, 60, is a bit within ECV 1. ED is sent to two SELECTORS, 136 and 137, by lines 134 and 135 respectively. The counter,94 containing the INPUT
POINTER goes to SELECTOR 136 via line 130, and the counter, 95 containing the OUTPUT POINTER goes to the same SELECTOR, 136, via line 132. When ED=0, the INPUT POINTER RAP goes from the SELECTOR to the INPUT ATT
PROCESSOR, 5C, via 28a while the OUTPUT POINTER RAP goes from the SELECTOR to the OUTPUT ATT PROCESSOR, 5D, via line 29a. If ED=1, the destinations are swapped. That is the SELECTOR sends the INPUT POINTER
RAP via 29a to the OUTPUT ATT PROCESSOR, 5D, and at the same time the SELECTOR sends the OUTPUT POINTER RAP via 28a to the INPUT ATT
PROCESSOR, 5C. This enables decryption. to undo the address scrambling which occurred during encryption.
In a similar fashion, SELECTOR 137 routes the incrementing control 1 o pulses 28c and 29c to the appropriate address counters. When ED=0, the INPUT
ATT PROCESSOR incrementing control pulse, 28c, goes through the SELECTOR, 137, via line 131 to the counter containing the INPUT POINTER, 94. And the OUTPUT ATT PROCESSOR incrementing control pulse, 29c, goes through SELECTOR, 137, via line 133 to the counter containing the OUTPUT
POINTER, 95. When ED=1, the SELECTOR, 137, routes the INPUT ATT
PROCESSOR incrementing control pulse, 28c, via line 133 to the counter for the OUTPUT POINTER, 95. And the SELECTOR, 137, routes the OUTPUT ATT
PROCESSOR incrementing control pulse, 29c, via line 131 to the counter for the INPUT POINTER, 94. Control lines 28d and 29d are used to synchronize the 2o ATT PROCESSORS, 5C and 5D, with the timing of the rest of the MF#3 and MP# 1 operations.
The SRAP from the INPUT ATT PROCESSOR, SC, is sent via 28b to the INPUT SRAP register, 138. The SRAP from the OUTPUT ATT
PROCESSOR, SD, is sent via 29b to the OUTPUT SRAP register, 139. The INPUT SRAP, 138, goes to SELECTOR 142 via line 140, while the OUTPUT
SRAP, 139, goes to the same SELECTOR, 142, via line 141. The action of the SELECTOR, 142, is controlled by BUFSEL, 65, via line 143. When BUFSEL=0, the SELECTOR, 142, sends the INPUT SRAP, 138, to the address inputs of A I/O
BUFFER, 15, via line 46a and also sends the OUTPUT SRAP, 139, to the address 3o inputs of B I/O BUFFER, 16, via 47a. When BUFSEL=l, the SELECTOR, 142, reverses the outputs and sends the INPUT SRAP, 138, to the address inputs of B
I/O BUFFER, 16, via 47a, and then sends the OUTPUT SRAP, 139, to the address inputs of A I/O BUFFER, 15, via 46a.

BUFSEL, 65, and its complement BUFSEL- (the output of the inverter 149, line 146) are used to selectively enable or disable the output of the I/O
Buffers, 15 and 16. BUFSEL=0 and BUFSEL-=1, via 146 and 143, read enables the A I/O Buffer and write enables the B I/O Buffer. BUFSEL=1 and BUFSEL-=0, via 146 and 143, read enables the B I/O Buffer and write enables the A I/O
Buffer. BUFSEL, 65, also goes via line 143, to the select input of MUX 147.
The output of the A I/O Buffer, 15, goes via line 53 to the 0 select input on MUX

while the output of the B I/O BUFFER, 16, goes via 55 to the 1 select input on MUX 147. When BUFSEL=0, MUX 147 selects the 8 bit data from the A I/O
to Buffer (via 53) and sends the data byte from MUX 147 via line 41 to the MF#3 processor, 10. When BUFSEL=1, MUX 147, selects the 8 bit data from the B I/O
Buffer (via 55) and sends the data byte MUX 147, via line 41 to the MF#3 processor, 10.
After the read process has been performed 4 times, the output of MF#3 is a 32 bit wide concatenated data byte which is sent via 43 to the register INPUT
DATA, 148.
Control lines 52 (going to MP# 1, 11 ), 44 (going to MF#3, 10), 46a (going to A I/O BUFFER, 15) and 47b (going to B I/O BUFFER, 16) are used to synchronize the I/O process to prevent any address, data, or timing conflicts.
2o The 32 bit wide modified data byte, OUTPUT DATA, 218, goes via 51 to the MP#1 processor, 11. The output of the MP#1 process, 11, is a 8 bit wide byte which is sent via 49 to the data inputs of both I/O Buffers. Only the buffer whose data input is enabled via BUFSEL will actually take the 8 bit data byte on line 49 and write it into the buffer. As previously described, the write enabled buffer uses OUTPUT SRAP sent to it via SELECTOR 142 as the address where the data byte is to be written.
Figure 4C, is a diagram showing the details of the Data Modification Operation, DM, Figure 1 item 7. ED, 60, the 1 bit status bit from the ECV 1 byte, is sent via 174 to the inverter 175. The output of the inverter, 175, is ED-which is sent via 176 to AND 177. When ED=0, the value on line 176 will be a 1 (logical true) which causes the output of AND 177 to reflect the value of the DCF, 75, input via line 180. If DCF=0 then the output of AND 177 on line 178 is 0 while if DCF=1, then the output of AND 177 on line 178 is also 1. When ED=1, then ED-is 0 and this 0 value going via 176 causes the output (line 178) of AND 177 to always be equal to 0, and the 0 going to the XOR 161 is effectively a no change operation within the XOR. Consequently, only when ED=0 (for encryption), is the value of DCF passed on to the XOR 161. When ED=l, the value of DCF is 5 ignored and the output, 162 of XOR 161, equals the input to the XOR, line 160.
XOR 161 is constructed so that the input on line 178 is XOR'd with each of the 32 input bits supplied on line 160, and thus, the 32 bits supplied as an output on line 162 are either the same as the 32 bits of input on line 160, or they are the 1's complement of the 32 bits on line 160. That is only when DCF (Data to Complement Flag) = 1 and ED=0 is the output of XOR 161 the 1's complement of the XOR's input.
The output of XOR 161 is a 32 bits wide data byte which is the input to a 32 bit wide ROTATE OPERATION, 164. ED (Encrypt/Decrypt Flag), 60, also goes via line 163 to the first ROTATE OPERATION, 164, where it is used to 15 complement the value of the sign (direction) bits of the RV 1, 90, variable sent to the Rotator via line 189. The 32 bit wide output of the ROTATE OPERATION, 164, goes out on line 165.
RF (Rotate First) flag, 82, (from the ALV variable, see Figure 2C) is an input, via line 181 to XOR, 182. The other input to XOR 182 is ED, 60, via line 20 179. The output of XOR 182 goes via line 183 to the enable input of the first ROTATE OPERATION, 164. Therefore, this first rotate operation is enabled only when [ED=0 and RF=1] or [ED=1 and RF=0]. Or, in other words, only when the RF flag is set during Encryption, or the RF FLAG is cleared during Decryption will this first rotate operation be enabled.
25 In the lower right quadrant of Figure 4C is shown how the third ROTATE OPERATION, 204 is enabled. RF, 82, goes via 206 to inverter 207, whose output RF- is 208 which is an input to XOR 209. The other input to XOR
209, is ED, 60, via line 211. The output of the XOR 209, goes via line 210 to the enable input of the third ROTATE OPERATION, 204. The rotate direction and 3o distance for the third Rotate Operation is supplied by variable RV 1, 90, which goes via line 212 to the ROTATE OPERATION, 204. Again ED, 60 via line 211, goes to the third ROTATE OPERATION, 204, where it is used to change the direction of the rotate (as supplied by RV 1) only if ED=1. Otherwise, when ED=0, the rotate direction is unchanged. The third rotate operation is enabled only when [ED=0 and RF=O] or [ED=1 and RF=1].
DCF (Data Complement Flag), 75, goes via line 215 to AND 213. The other input of AND 213 is ED, 60, via line 211. The output of AND 213 goes via line 214 to the XOR 216 where it is used to XOR each of the 32 input bits of the XOR's input (via 205). The effect of this is that only when ED=1 does DCF have any possibility of modifying the input to XOR 216. When ED=0, the output of AND 213 will always be 0 and therefore the output (line 217) of XOR 216 will always be the same as the input (line 205) going to XOR 216.
to The table below shows the effect of ED and RF on the three Rotate Operations within the DATA Modifier, 219.
First Second ROTATE Third ROTATE

ED RF ROTATE OPERATION ( OPERATION (204) 194) OPERATION e= ED O RF-( 164) e= ED O RF

0 0 DISABLED enabled ENABLED

0 1 ENABLED enabled DISABLED

1 0 ENABLED enabled DISABLED

1 1 DISABLED enabled ENABLED

Note that in this preferred embodiment the second Rotate Operation is always enabled and that the first and third Rotate Operations are not enabled or disabled at the same time. Another preferred embodiment eliminates the RF flag (in ALV) and uses a RV3 (variable and counter) for the third Rotate Operation, 204.

The Table below shows the effects of ED and DCF on the data flow out of each of the 32 bit wide XORs used in the Data Modifier, 219.
ED DCF Output of XOR Output of XOR

0 0 same as input same as input 0 1 1's complement same as input 1 0 same as input same as input 1 1 same as input 1's complement Going back to the first ROTATE OPERATION, 164, the 32 bit wide output of this Rotate Operation goes out via line 165 to XOR 166, ADD 167, and SUB 168. Additionally, M1, 123, (see Figure 4A) the 32 bit wide masking value derived from Mask Array #1, goes via line 124 to XOR 166, ADD 167, and SUB
168. The 32 bit wide output of XOR 166, goes via line 170 to select 0 and 1 inputs of MUX 169. The 32 bit wide output of ADD 167 goes via line 171 to the select 2, 3, 5 and 6 inputs of MUX 169. And, the 32 bit wide output of SUB 168 to goes via line 172 to the select 4 and 7 inputs of MUX 169.
For both MUX 169 and MUX 202, the select 0 inputs, s0, are controlled by the ALV bit, A/L Bit 1 (79), via lines 188 and 191 respectively. The select inputs, s1, are controlled by the ALV bit, A/L bit 2 (80), via lines 187 and 190.
The ALV bit, A/L bit 3 (81) goes to XOR 185 via line 184 while ED, 60 also goes to the XOR 18~ via line 179. The output of XOR 185, WAL3, goes via line 186 to the select 2 inputs, s2,, of both MUX 169 and MUX 202. The inputs of the MUX's have been arranged so that when ED complements the A/L Bit 3, it causes a reverse arithmetic/logic operations to be performed (along with ED
complementing the rotate sign bits and the MSF control bit) on the input data, see 2o the discussion on Figure 2C.
The 32 bit wide output of MUX 169, goes via line 173 to the input of the second ROTATE OPERATION, 194, (32 bits wide). This Rotate Operation is always enabled. The rotate value variable RV2, 91, via line 192 specifies the direction and distance of this rotate operation, while ED, 60, via line 193 reverses the rotate direction when ED=1. The 32 bit wide output of the second ROTATE

OPERATION, 194, goes via line 195 to ADD 196, XOR 197 and SUB 198.
Additionally, M2, 126, (see Figure 4A) the 32 bit wide masking value derived from Mask Array #2, goes via line 127 to ADD 196, XOR 197 and SUB 198. The 32 bit wide output of ADD 196 goes via line 199 to the select 0 and 3 inputs of MUX 202. The 32 bit wide output of XOR 197 goes via line 200 to the select 4 and 5 inputs of MUX 202. And the 32 bit wide output of SUB 198 goes via line 201 to the select 1, 2, 6 and 7 inputs of MUX 202.
The 32 bit wide output of MUX 202, goes via 203 to the third ROTATE
OPERATION, 204 (see prior discussion of this rotate operation). The 32 bit wide l0 output of the third ROTATE OPERATION, 204, goes via line 205 to XOR 216 (also previously discussed), then via line 217 to the 32 bit wide OUTPUT DATA
register, 218 (see also Figure 4B).
Figure SA is a flowchart showing how an ATT Block Entry is made. In Step 1, ATTSIZE is the size of the ATT Block to be made. Step 2 sets the local I5 counter J equal to 0 and sets K equal to the size of the block to be built.
Note that RAP entries must be in the range of 0 up to ATTSIZE-1.
Step 3, creates K records where each record contains two fields. The first field will holds an integer which will become the RAP entry, and the second field will contain an 8 bit byte sampled from some digital source. This 8 bit byte 20 may also be a byte stream from a pseudo-random number generator, or even a text file.
Steps 4 & 5 fill all of the first fields with sequential values of J (0 to ATTSIZE-1) while the second fields are filled with sampled (arbitrary) 8 bit bytes. When this process is complete, step 5 no longer goes back to step 4, but 25 instead goes to step 6.
Step 6 sorts all of the K records in ascending order by the contents of the second field. As the sorting takes place, the field 1 entries are shuffled around.
Step 7, the shuffled field 1 entries are transferred to the ATT Block 30 Entry.
Figure SB shows the structure of an ATT Column which makes up the ADDRESS TRANSLATION TABLES. The number of ATT Columns is only limited by the amount of storage available. Each ATT Column has a unique number assigned to it, so that an ATT Processor knows which ATT Column to use. The next entry in the Column is ATTN which specifies how many ATT
Block Entries are in that Column. Following the ATTN is ATTSIZE which specifies the size of the ATT Block entries within the Column. Next is ATTBASE which is the number base to be used for the ATT calculations with the ATT Block Entries for this ATT Column. Each Block entry contains a jumbled sequence of RAPS. The example illustrated by Figure SB shows two ATT
Columns, the first containing three 1024 entry Blocks, while the second contains S
l0 16384 entry Block.
Figure 6 shows a simplified Data Modifier, 232, which could replace the previously described Data Modifier, 219. The Data Modification consists only of just a Rotation Operation, 235. Again ED, 60, via 236 to the Rotator, 235, causes the direction of rotation, indicated by RV l, 90, via 234 to 235, to be switched when ED=1. Thus, the Rotation Operation for Decryption will be in the opposite direction than was used for Encryption.
Figure 7 shows a four stage pipeline Encoder/Decoder. It consists of four individual Encoders, (250a - 254a, 250b - 254b, 250c - 254c, and 250d -254d). A common RAP counter, 257, via 249 is used to supply RAPs for the use of all four Encoders. Initially a Cleartext, 248, is loaded into the input buffer of 250a. When done, the first Encoder contains intermediate-text in the output buffer within 254a. Then when another buffer of Cleartext is loaded via 248 into the input buffer within 250a, the output buffer of 253a is transferred to the input buffer of the second Encoder via 255 to the input buffer of 250b. This process is repeated with successive encoders. When the fourth Encoder's output buffer within 254d is filled, the Ciphertext is transferred via 256 to the user for distribution in some manner. At this point, the only delay in processing four passes of encryption/decryption is only the time needed to process 1 buffer.
Thus, the pipeline structure, with multiple Encoders, is a very fast and effective method to encrypt and decrypt information.
Figure 8 is a tabular representation of the average number of segments (bytes) containing the original 8 bits as a function of the number of passes between 1 and 32. Also shown is that average sorted original bit density per segment (byte). The entries were derived from a software simulator. An illustration of an unsorted density is that the two segments resulting from pass 1 would on average both have an equal probability of containing 4 bits each.
This is 5 because sometimes the larger portion may be on one side of the original byte boundary and sometimes it would be on the other. Therefore, for sorted statistics, the bit densities are arranged in declining order before being averaged into previous distributions. Consequently after 5 passes, the approximate average bit density (in some location of bytes in a buffer) would be 3,2,1,1,1 (with rounding).
10 That is the original eight bits of a byte would now be dispersed within 5 other bytes in the output buffer with one byte containing 3 bits, another byte containing 2 bits, and three other bytes each containing 1 bit of the original byte.
Thus, the data becomes its own dispersing medium.
The size for the biggest segment (X 1 P) of the sorted bit density of 8 15 original bits as a function of the number of passes is approximated by the formula (Equation 4) shown below:
IP03q;19411 ~n(.~~P+0.08838 0.82290 'J7 ~O~9~IP 0.955806 XlP = a \ -0.1 EQ. 6 Another preferred embodiment of this application is with the inclusion of a secure private key protocol to facilitate key exchange information between two parties, see US Patent 5,583,939, "SECURE,SWIFT CRYPTOGRAPHIC
KEY EXCHANGE".
In summary, multiple applications of the combination of the concatenation of multiple bytes from an input buffer (with permutation of sequence), into a single item, the rotation of this item by an arbitrary amount, the decatenation of the item back into individual bytes, and the placement of these bytes into an output buffer (with permutation of sequence), results in an effective encryption/decryption method.
The schemes and strategies to be employed are only limited by the imagination of the sender and the receiver and with thought and planning, true one-time pad encoded messages may be easily created with this invention given the vast amount of digital information to choose from as sources for our sampling scheme. The security of this invention lies not in the security of the logic/mathematic operations utilized, but rather it lies in the obscurity of the keys , Random Data tables and passwords employed. Other variations of the foregoing Examples and uses are possible.
It will now be apparent to those skilled in the art that other embodiments, improvements, details and uses can be made consistent with the letter and spirit of the foregoing disclosure and within the scope of this patent, which is limited only by the following claims, construed in accordance with the 15 patent law, including the doctrine of equivalents.

Claims (27)

WHAT IS CLAIMED IS:
1. Encryption/Decryption apparatus comprising:
a. means for retrieving information to be encoded/decoded, said information defining an array D1 of first elements, b. first means for modifying of the first elements of D1 to form a second array D2 of second elements, wherein the number of second elements is less than the number of first elements, but where at least some of the second elements are larger than the first elements, c. means for rotating at least one of the second elements of D2, and d. second means for modifying the rotated second elements of array D2 back into the of first elements of D1.
2. The apparatus as defined in claim 1 one wherein said first modifying means includes means for permuting and said second means for modifying includes means for permuting back.
3. The apparatus as defined in claim 1 one wherein said first modifying means includes concatenation and said second means for modifying includes decatenation
4. Apparatus as defined in claim 1 further comprising:
third elements, means for combining at least one second element of D2 with said third elements to form an array D3, and means for converting said array D3 back into said array D2.
5. Apparatus as defined in claim 4 wherein said means for combining comprises:
means for arithmetic and logic combining selected from the group consisting of means for adding, subtracting, exclusive-oring or rotating.
6. Apparatus as defined in claim 5 wherein said means for arithmetic and logic combining comprises means for converting into another number base.
7. Apparatus as defined in claim 4 wherein said third elements are selected from the group consisting of passwords, constants, address registers, counters, mask arrays, random number sources, pseudo-random number sources, arbitrary number sources, and the contents of memory locations.
8. Apparatus as defined in claim 4 further comprising:

means for controlling the time duration performed by said means for combining.
9. Apparatus as defined in claims 4 wherein said means for combining comprises a clock and a counter.
10. Apparatus as defined in claim 1 further comprising:
means for indexing into said arrays.
11. Apparatus as defined in claim 10 where said means for indexing comprises a number formed in any number base.
12. Encryption/Decryption apparatus comprising:
a. means for retrieving information to be encoded/decoded said information defining an array D1 of first elements, b. means for modifying the first elements of D1 array forming an array D2, c. means for rotating said array D2, and d. means for reforming D1 from the rotated D2.
13. The encryption/decryption as defined in claim 12, further comprising:
e. third elements.
f. means for combining at least one second element of D2 with said third elements to form an array D3, and g. means for converting said array D3 back into said array D2.
14. Apparatus as defined in Claim 13 wherein said means for combining comprises:
means for arithmetic and logic combining selected from the group consisting of means for adding, subtracting, exclusive-oring or rotating.
15. Apparatus as defined in claim 14 wherein said means for arithmetic and logic combining comprises means for converting into another number base.
16. Apparatus as defined in claim 13 wherein said third elements are selected from the group consisting of passwords, constants, address registers, counters. mask arrays, random number sources, pseudo-random number sources, and arbitrary number sources.
17. Apparatus as defined in claim 13 further comprising:
means for controlling the time duration performed by said means for combining.
18. Apparatus as defined in claim 12 further comprising:
means for indexing into said arrays.
19. Apparatus as defined in claim 12 wherein said means for modifying includes means for permuting.
20. Apparatus as defined in claim 12 wherein said means for modifying includes means for concatenating.
21. A method of Encryption/Decryption comprising the steps of:
retrieving information to be encoded/decoded, said information defining an array D1 of first elements, modifying the first elements of D1 array forming an array D2, rotating said array D2, reforming array D1 from said rotated array D2.
22. The method as defined in claim 21 further comprising the steps of:
retrieving an array of third elements, combining at least one second element of D2 with said third elements to form an array D3, and converting said array D4 back into said array D2.
23. The method as defined in Claim 21 wherein said combining comprises the steps:
arithmetic and logic combining selected from the group consisting of adding, subtracting, exclusive-oring or rotating.
24. The method as defined in Claim 21 wherein said arithmetic and logic combining comprises converting into another number base.
25. The method as defined in Claim 21 wherein said third elements are selected from the group consisting of passwords. constants. address registers, counters, mask arrays, random number sources, pseudo-random number sources, arbitrary number sources, and the contents of memory locations.
26. The method as defined in Claim 21 further comprising the step of:
controlling the time duration performed by said means for combining.
27. The method as defined in claim 21 further comprising the step of indexing into said arrays.
CA002371452A 1999-05-18 1999-05-18 Cryptographic engine using base conversion, logic operations and prng in data arrays to increase dispersion in ciphertext Abandoned CA2371452A1 (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US1999/010967 WO2000070819A1 (en) 1998-02-07 1999-05-18 Cryptographic engine using base conversion, logic operations and prng in data arrays to increase dispersion in ciphertext

Publications (1)

Publication Number Publication Date
CA2371452A1 true CA2371452A1 (en) 2000-11-23

Family

ID=22272781

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002371452A Abandoned CA2371452A1 (en) 1999-05-18 1999-05-18 Cryptographic engine using base conversion, logic operations and prng in data arrays to increase dispersion in ciphertext

Country Status (3)

Country Link
EP (1) EP1179243A4 (en)
JP (1) JP2003500681A (en)
CA (1) CA2371452A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005309148A (en) * 2004-04-22 2005-11-04 Hitachi Ltd Data converter and the data conversion method
KR20070042511A (en) * 2004-06-14 2007-04-23 디 유니버시티 오브 노스 캐롤라이나 앳 그린스보로 Systems and methods for digital content security
CN113542196B (en) * 2020-04-16 2023-03-24 北京威努特技术有限公司 Data message encryption determination method, device, system and storage medium
CN118535487A (en) * 2024-04-24 2024-08-23 原粒(北京)半导体技术有限公司 Data storage and data reading method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
JP2003500681A (en) 2003-01-07
EP1179243A4 (en) 2005-07-20
EP1179243A1 (en) 2002-02-13

Similar Documents

Publication Publication Date Title
US6125182A (en) Cryptographic engine using logic and base conversions
US5717760A (en) Message protection system and method
JP3229148B2 (en) Encryption method and system
US5425103A (en) Variable-key cryptography system
JP3029381B2 (en) Data converter
US5008935A (en) Efficient method for encrypting superblocks of data
EP0839418B1 (en) Cryptographic method and apparatus for non-linearly merging a data block and a key
US5003597A (en) Method and apparatus for data encryption
US5675653A (en) Method and apparatus for digital encryption
EP1927212B1 (en) Homophonic substitution symmetric key encryption
JPH1173101A (en) High speed block ciphering method, and medium usable in computer
US20020114451A1 (en) Variable width block cipher
US6128386A (en) Multiple number base encoder/decoder using a corresponding exclusive or function
US20010033654A1 (en) W-EC1 encryption and decryption method and system
JP3701969B2 (en) Nonlinear dynamic substitution device
JPH11298471A (en) Method and device for enciphering block
US20040120521A1 (en) Method and system for data encryption and decryption
CA2371452A1 (en) Cryptographic engine using base conversion, logic operations and prng in data arrays to increase dispersion in ciphertext
EP0035048A1 (en) Cipher system using a variant key matrix
JPH1152850A (en) Device and method for cipher conversion
KR20000066440A (en) Extended rc4 chipher algorithm using lfsr
CN1109187A (en) File encryption processing method and floppy disk thereof
RU2024209C1 (en) Binary information coding device
WO2002025862A2 (en) Cryptographic encoder/decoder with segmentation and dynamically varying number bases
EP1183819A1 (en) Multiple number base encoder/decoder using corresponding xor

Legal Events

Date Code Title Description
EEER Examination request
FZDE Discontinued