scispace - formally typeset
Search or ask a question

Showing papers on "Multiple encryption published in 1989"


Patent
Mark G. Spiotta1, Erling Bjerga1
06 Oct 1989
TL;DR: An encryption key required to encrypt and decrypt data according to a predefined algorithm is usually retained in a volatile memory device Detection of loss or corruption of the key is frequently possible only be means of the encryption circuit itself testing the key Automated and repetitive testing of encryption keys by means of a processor or a control circuit periodically requesting the encryption key to test an encryption key minimizes data loss and system down time due to corrupted or lost keys as discussed by the authors.
Abstract: An encryption key, required to encrypt and decrypt data according to a predefined algorithm is usually retained in a volatile memory device Detection of loss of the key or corruption of the key is frequently possible only be means of the encryption circuit itself testing the key Automated and repetitive testing of encryption keys by means of a processor or a control circuit periodically requesting the encryption circuit to test an encryption key minimizes data loss and system down time due to corrupted or lost keys

31 citations


Patent
29 Aug 1989
TL;DR: In this article, a process for encryption and source coding of a sequence of information which preferably relates to moving pictures is described, and encryption can take place by global permutation of blocks and local rotation, reflection and inversion of blocks.
Abstract: The invention relates to a process for encryption and source coding of a sequence of information which preferably relates to moving pictures. According to the invention, encryption processes are proposed which make possible subsequent source coding. The sequence of information is divided into blocks and encryption can take place by global permutation of blocks and/or local rotation, reflection and inversion of blocks. According to another aspect of the invention, encryption can take place by means of an area-filling curve.

15 citations


Patent
11 Aug 1989
TL;DR: A decryption device with an encryption/decryption module can be operated at various clock speeds, and an associated processor can control these clock speeds depending upon the moment-to-moment processing interrelationship between the encryption and the processor as discussed by the authors.
Abstract: A decryption device wherein an encryption/decryption module can be operated at various clock speeds, and wherein an associated processor controls these clock speeds depending upon the moment to moment processing interrelationship between the encryption/decryption module and the processor. In particular, when loading a new key into the encryption module, or when utilizing the encryption module to decrypt an encrypted new key, the processor alters the usual clock rate for the encryption module.

6 citations


Journal ArticleDOI
TL;DR: A simple rotor device is described which can generate two levels of encryption security: periodic encryption to any key length, and random-key encryption.
Abstract: A simple rotor device is described which can generate two levels of encryption security: periodic encryption to any key length, and random-key encryption. The latter depends on what appears to be a useful and widely-available source of at least pseudorandom numbers: the telephone directory.

4 citations


Journal ArticleDOI
TL;DR: The authors propose an encryption scheme based on quadratic residue theory that incorporates the encrypting procedure and error-detecting code into a complete communication system.
Abstract: Owing to their mathematical properties, quadratic residues have been used successfully in designing a number of cryptographic applications, such as oblivious transfer protocol and coin flipping protocol. The authors propose an encryption scheme based on quadratic residue theory. In particular, they incorporate the encrypting procedure and error-detecting code into a complete communication system.

2 citations


Journal ArticleDOI
TL;DR: A new probabilistic encryption algorithm based on the scheme proposed by Jingmin and Kaicheng in 1988, which utilises the public key concept and recursively encrypts two bits at a time and is twice as fast.
Abstract: In this letter we present a new probabilistic encryption algorithm based on the scheme proposed by Jingmin and Kaicheng in 1988. This algorithm utilises the public key concept and recursively encrypts two bits at a time. The message bit expansion is very low and is the same as in their scheme. At the same time, this new scheme is twice as fast.

1 citations