Class / Patent application number | Description | Number of patent applications / Date published |
380268000 | Pseudo-random sequence scrambling | 52 |
20080199011 | Transponder System for Transmitting Key-Encrypted Information and Associated Keys - A transponder ( | 08-21-2008 |
20080247547 | Data transmitting apparatus and data receiving apparatus - A data communication apparatus which improves security against eavesdropping is provided for secret communication using Y-00 protocol. In a data transmitting apparatus | 10-09-2008 |
20080304667 | Method and Apparatus For Cellular Automata Based Generation of Pseudorandom Sequences With Controllable Period - A compact apparatus for generation of desired pseudorandom sequences with controllable period. The apparatus includes two-dimensional cellular automata for generating a first sequence, 2-by-L cellular automata for generating a second sequence, adders for performing bit-to-bit mod2 sum of the first sequences and the second sequences, and a buffer for buffering the resultant sequences from the adders. | 12-11-2008 |
20090016528 | DEVICE, SYSTEM, AND METHOD OF OBFUSCATING DATA PROCESSED WITHIN AN INTEGRATED CIRCUIT - Device, system, and method of power trace obfuscation. In some embodiments an integrated circuit may include a signal modifier to introduce a pseudo-randomly selected modification to a state-transition pattern of at least one signal, which is related to internal processing of data within the integrated circuit. Other embodiments are described and claimed. | 01-15-2009 |
20090034728 | Multiplexed multilane hybrid scrambled transmission coding - In one embodiment, a hybrid backplane coding scheme transmits data using lengthy sequences of scrambled data, separated by 8b/10b control character sequences that prepare the receiver for the next scrambled sequence and permit realignment if necessary. Several lanes are coded separately in this manner, and then multiplexed on a common channel. Alignment sequences in the control character sequences, as well as scrambler seeds, are set to avoid synchronization of patterns generated among all lanes, which would tend to confuse a receiving serdes and/or phase-locked loop that recovers timing from the multiplexed scrambled signals. | 02-05-2009 |
20090060190 | EFFICIENT AND LOW POWER ENCRYPTING AND DECRYPTING OF DATA - The present invention relates to the field of computer data encrypting and decrypting, especially for mobile equipments like PDA, mobile phones, smart cards and the like, which need a good trade-off between computing speed, power consumption and security strength. Embodiments of the invention provide encrypting/decrypting methods implementing simple data operation. Such methods are based on generating a pseudo-random sequence through a function of the Collatz (or Syracuse) family from a starting number used as a secret key. | 03-05-2009 |
20090060191 | INTERFACE CIRCUIT, INFORMATION PROCESSING DEVICE, AND INFORMATION PROCESSING SYSTEM - A scrambling circuit | 03-05-2009 |
20090086972 | SUPPRESSING POWER SUPPLY NOISE USING DATA SCRAMBLING IN DOUBLE DATA RATE MEMORY SYSTEMS - Embodiments of the invention are generally directed to systems, methods, and apparatuses for suppressing power supply noise using data scrambling in double data rate memory systems. In some embodiments, an integrated circuit includes a transmit data path to transmit data to one or more memory devices. The transmit data path may include scrambling logic to generate, in parallel, N pseudo random outputs that are uncorrelated with each other. The output data and the pseudo random outputs are input to XOR logic. The transmit data path transmits the output the of XOR logic which has a substantially white frequency spectrum. Other embodiments are described and claimed. | 04-02-2009 |
20090110197 | CRYPTOGRAPHIC SYSTEM CONFIGURED FOR EXTENDING A REPETITION PERIOD OF A RANDOM SEQUENCE - A cryptographic system (CS) is provided. The CS ( | 04-30-2009 |
20090136034 | SCRAMBLING SEQUENCE GENERATION IN A COMMUNICATION SYSTEM - Techniques for performing scrambling and descrambling in a communication system are described. In an aspect, different scrambling sequences for different channels and signals may be generated based on different cyclic shifts of a base scrambling sequence, which may be a maximal-length sequence. A scrambling sequence for a given channel may be generated by (i) determining a sequence selector value based on a channel type value and at least one parameter value for the channel and (ii) cyclically shifting the base scrambling sequence based on the sequence selector value. In another aspect, a reference signal sent on variable system bandwidth may be generated with two scrambling sequences, which may be different cyclic shifts of a base scrambling sequence. Scrambling/descrambling for positive and negative frequencies for the reference signal may be performed with the first and second scrambling sequences, respectively. | 05-28-2009 |
20090154700 | Generation of a pseudorandom data sequence - A method of generating a pseudorandom data sequence, wherein said pseudorandom data sequence is generated by a procedure for searching for a search pattern in an initial data sequence of N bits, said search procedure comprising the following steps: (a) detecting in said initial data sequence a particular search pattern of r bits that is one of a set of search patterns; (b) determining an output pattern of k bits by an operation that depends on the progress of the preceding step; and repeating the preceding steps (a) and (b) successively to form the pseudorandom data sequence from a succession of output patterns. | 06-18-2009 |
20090161870 | METHOD FOR KEYLESS PROTECTION OF DATA USING A LOCAL ARRAY OF DISKS - A method secures data in a network. The data includes a data message that has a first bit length. A random number is generated and transformed to create a first pseudo random number. The first pseudo random number is mixed with the data message to create an encrypted message. The encrypted message is transformed into a second pseudo random number. The second pseudo random number is mixed with the random number to produce a key. The encrypted message is placed side-by-side with the key to produce an output message. The output message is dispersed into a plurality of fragments. The plurality of fragments is stored in a plurality of data storage devices | 06-25-2009 |
20090220083 | Stream cipher using multiplication over a finite field of even characteristic - A first bit sequence is generated using a first pseudorandom bit source. A second bit sequence is generated using a second pseudorandom bit source. A third bit sequence is generated by multiplying the first bit sequence with the second bit sequence over a finite field of even characteristic, modulo a fixed primitive polynomial. A message is received. The third bit sequence is comingled with the message to conceal contents of the message. | 09-03-2009 |
20090245516 | Method and system for high entropy encryption using an unpredictable seed based on user regisration time - A method of encryption of data for transmission in a secured manner over a communication channel. The encoding key is continually changed in response to each packet of data encoded, depending on a Seed Key and time stamping of data packets or a pseudo random sequence generated using synchronized clocks. | 10-01-2009 |
20090252326 | PSEUDO-RANDOM BIT SEQUENCE (PRBS) SYNCHRONIZATION FOR INTERCONNECTS WITH DUAL-TAP SCRAMBLING DEVICES - A system for synchronizing interconnects in a link system according to various embodiments can include a computer configured to receive input data at a transmit side, the transmit side including at least one pseudo-random bit sequence scrambler; scramble the input data at the transmit side via the pseudo-random bit scrambler with dual tap sequences resulting in scrambled data; transmit the scrambled data with the dual tap sequences along all lanes of a plurality of lanes to a receive side via a bus interconnecting the plurality of lanes, the receive side including at least one pseudo-random bit sequence descrambler, and the receive side directly connected to the transmit side via the bus; synchronize the at least one pseudo-random bit sequence scrambler to the at least one pseudo-random bit sequence descrambler; and de-scramble the transmitted scrambled data at the receive side resulting in the input data. | 10-08-2009 |
20090268910 | Apparatus and method for initialization of a scrambling sequence for a downlink reference signal in a wireless network - A method for generating a variable reference signal is provided. The method comprises initializing a scrambling sequence generator at the start of a 10 millisecond (ms) radio frame. The variable reference signal is generated for the radio frame based on different antenna ports, sequence length per antenna port and an initialization seed constructed with a specified equation. Additionally, the variable reference signal is initialized at the start of a 1 ms radio subframe based on a constructed initialization seed. | 10-29-2009 |
20090323955 | DATA TRANSMITTING APPARATUS AND DATA RECEIVING APPARATUS - In secret communication using a Y-00 protocol, provided is a data communication apparatus which realizes reduction in a random number generation speed by using a plurality of random number generators, and which also ensures security. The data communication apparatus includes: a plurality of random number generation sections | 12-31-2009 |
20090323956 | ENCRYPTION DEVICE, PROGRAM, AND METHOD - Disclosed is an encryption device for generating a pseudo-random number based on a secret key and generates an encrypted text by applying the pseudo-random number sequence to a plain text, uses, an internal state in accordance with a state based on a permutation of a sequence of a finite number of numeric values, as an internal state used for generation of the pseudo-random number sequence, executes a predetermined leftward or rightward rotate shift, depending on a number smaller than an internal state number, based on the result of linear or non-linear, or combination of linear and non-linear using one or more numeric values of the internal state and sets at least one temporary variable used for generation of the pseudo-random number sequence to be a temporary variable having as a value a result of the execution of the predetermined leftward or rightward rotate shift, and generates the pseudo-random number by a predetermined prescribed operation on one or a plurality of numeric values of the internal state and the temporary variable. | 12-31-2009 |
20100034385 | COMBINATIONAL COMBINER CRYPTOGRAPHIC METHOD AND APPARATUS - Another feature provides an efficient encryption method that safeguards the security of encrypted symbols. Each plaintext symbol is encrypted by using a separate pseudorandomly selected translation table. Rather than pre-storing every possible permutation of symbols as translation tables, the translation tables may be efficiently generated on-the-fly based on a pseudorandom number arid a symbol shuffling algorithm. A receiving device may similarly generate reverse translation tables on-the-fly to decrypt received encrypted symbols. | 02-11-2010 |
20100054471 | HARDWARE BASED MULTI-DIMENSIONAL ENCRYPTION - A system including a first module and a second module. The first module includes a linear feedback shift register (LFSR) and a permutator circuit. The LFSR outputs a pseudo-random sequence of digital values based on a stored key value. The permutator circuit operates on successive groups of input bits using the pseudo-random sequence. For each of said successive groups, the permutator circuit: (a) selects a bit permutation based on a respective one of the digital values in the pseudo-random sequence, (b) permutes the bits of the group using the selected bit permutation to obtain a resultant group of bits, and (c) transmits the resultant group onto an output bus. The second module also includes an LFSR and a permutator circuit that operate to invert the permutations applied by the first module. In a two-dimensional embodiment, the first module and second module may include additional circuitry for scrambling bits between groups. | 03-04-2010 |
20100119071 | APPARATUS AND METHOD FOR SUBCARRIER SCRAMBLING - A subcarrier scrambling method for use in a transmitter with multiple subcarriers, the transmitter being configured to allocate pilot symbols and data symbols for each of a plurality of resource units (RUs). The method includes: applying, for each of the plurality of RUs, a first intra RU sequence to the pilot symbols, to thereby generate a plurality of scrambled pilot symbols; applying, for each of the plurality of RUs, a second intra RU sequence to the data symbols, to thereby generate a plurality of scrambled data symbols; and combining the plurality of scrambled pilot symbols and the plurality of scrambled data symbols to form the plurality of RUs. | 05-13-2010 |
20100124331 | SPECTRUM AUTHORIZATION AND RELATED COMMUNICATIONS METHODS AND APPARATUS - Various embodiments relate to wireless communications, and more particularly, to methods and apparatus for authorizing use of spectrum, e.g., through the issuance of spectrum access keys, and/or preventing or discouraging the unauthorized use of licensed spectrum. Peer to peer wireless communications between authorized users of licensed spectrum may involve scrambling/descrambling of information communicated between authorized devices. In some embodiments air interface timing and/or other information received from a second device, e.g., a beacon or GPS transmitter, is incorporated into a computation of a pseudo-random bit sequence which is also computed based on a spectrum access key communicated to authorized spectrum users. In some embodiments authorized peer to peer devices scramble communicated information based on the generated pseudo random bit sequence thereby preventing or discouraging communication with devices which are not authorized to use the spectrum and lack a spectrum access key used to generate the pseudo random bit sequence. | 05-20-2010 |
20100128877 | Systems and Methods for Providing Opportunistic Security for Physical Communication Channels - Systems and methods of providing opportunistic security for physical communication channels are disclosed. One disclosed method is for opportunistic secure communication on a main channel between a sender device and a receiver device when an eavesdropper device is listening on an eavesdropper channel. This example method includes transmitting, in a first time period in which signal quality on the main channel is better than signal quality on the eavesdropper channel, symbols that are randomly selected from a set of symbols. The method also includes transmitting, in a second time period in which signal quality on the main channel is not better than signal quality on the eavesdropper channel, coding information associated with the randomly selected symbols. The method also includes reconciling the randomly selected symbols using the coding information. | 05-27-2010 |
20100135493 | METHOD AND APPARATUS FOR GENERATING PSEUDO RANDOM SEQUENCE IN BROADBAND WIRELESS COMMUNICATION SYSTEM - Provided are a method and an apparatus for generating pseudo random sequence to generate pseudo random sequences which have larger sizes and are different from each other in a wireless communication system; a method for generating pseudo random sequence in a wireless communication system, comprising generating a first output sequence, generating a second output sequence, and generating a third output sequence; and an apparatus to generate pseudo random sequence in a wireless communication system, comprising a first linear feedback shift register (LFSR), a second LSFR, and a third LFSR, a first initial value mapper, a second initial value mapper, a third initial value mapper, and an N delay operator. | 06-03-2010 |
20100266124 | DATA COMMUNICATION APPARATUS - A data communication apparatus wherein the stealthiness has been enhanced by significantly increasing the time required for a wiretapper to decrypt an encrypted text. The data communication apparatus is constituted by connecting a data transmitting apparatus and a data receiving apparatus via a transmission path. The data transmitting apparatus receives a first predetermined initial value (key information) and information data, generates a multi-valued signal the level of which varies substantially like a random number, and converts the multi-valued signal to a modulated signal of a predetermined modulation format for transmission. The data receiving apparatus demodulates the modulated signal to output the multi-valued signal, and then reproduces the information data from the multi-valued signal and a second predetermined initial value (key information) that is received. | 10-21-2010 |
20100303234 | DATA COMMUNICATION APPARATUS - A data communication apparatus wherein the stealthiness has been enhanced by significantly increasing the time required for a wiretapper to decrypt an encrypted text. The data communication apparatus is constituted by connecting a data transmitting apparatus and a data receiving apparatus via a transmission path. The data transmitting apparatus receives a first predetermined initial value (key information) and information data, generates a multi-valued signal the level of which varies substantially like a random number, and converts the multi-valued signal to a modulated signal of a predetermined modulation format for transmission. The data receiving apparatus demodulates the modulated signal to output the multi-valued signal, and then reproduces the information data from the multi-valued signal and a second predetermined initial value (key information) that is received. | 12-02-2010 |
20110002463 | PERMISSION-BASED MULTIPLE ACCESS COMMUNICATIONS SYSTEMS | 01-06-2011 |
20110081019 | COMPRESSED DATA SCRAMBLED DISTRIBUTION DEVICE AND PLAYBACK DEVICE THEREOF - The present invention provides a scrambled compressed data distribution device that can perform a high-resistance scrambled compressed data distribution by selectively using a plurality of types of scramble information and a playback device thereof. | 04-07-2011 |
20110116630 | Traceable Method and System for Broadcasting Digital Data - A method and system for a user to obtain a derived value K | 05-19-2011 |
20110142238 | DATA PROCESSING APPARATUS, COMMUNICATIONS DEVICE, AND DATA PROCESSING METHOD - A data processing apparatus includes a scrambling processing unit and a sending unit. The scrambling processing unit is configured to generate a Pseudo-Random Binary Sequence (PRBS), perform a modulo-2 addition on the pseudo-random sequence and data frame data to scramble the data frame data including first load data, use one section of a part of the pseudo-random sequence on which the modulo-2 addition is performed with the data frame data as an identification sequence, and carry status information corresponding to the identification sequence in frame header information. The sending unit is configured to send the frame header information carrying the status information and the scrambled first load data. Through the scrambling process, continuous run-lengths of “1” and “0” in the data frame data are quite short, while basically the same probability of occurrence is maintained, which is favorable to transmission of the data frame data, thereby alleviating error code problems. | 06-16-2011 |
20110176679 | SUPPRESSING POWER SUPPLY NOISE USING DATA SCRAMBLING IN DOUBLE DATA RATE MEMORY SYSTEMS - Embodiments of the invention are generally directed to systems, methods, and apparatuses for suppressing power supply noise using data scrambling in double data rate memory systems. In some embodiments, an integrated circuit includes a transmit data path to transmit data to one or more memory devices. The transmit data path may include scrambling logic to generate, in parallel, N pseudo random outputs that are uncorrelated with each other. The output data and the pseudo random outputs are input to XOR logic. The transmit data path transmits the output the of XOR logic which has a substantially white frequency spectrum. Other embodiments are described and claimed. | 07-21-2011 |
20110182429 | OBFUSCATION OF SEQUENCED ENCODED DATA SLICES - A method begins by a processing module receiving data to produce received data segments. The method continues with the processing module, in order of receiving the data segments, encrypting a data segment to produce an encrypted data segment, dispersed storage error encoding the encrypted data segment to produce a set of encoded data slices, buffering at least a number of encoded data slices of the set of encoded data slices to produce first buffered encoded data slices, and buffering remaining encoded data slices of the set of encoded data slices to produce second buffered encoded data slices. The method continues with the processing module outputting the first buffered encoded data slices and, at most, some of the second buffered encoded data slices in accordance with a pseudo random output sequencing order when a number of first buffered encoded data slices compares favorably to an outputting threshold. | 07-28-2011 |
20110286596 | SYSTEM AND METHODS FOR ENCRYPTION WITH AUTHENTICATION INTEGRITY - A data integrity system including a transmitter, having a TX pseudorandom function generator, a TX switching function having a transmitting option and a TX combiner operative to receive, from a Host, an initialization data entity including at least one word, [TA1], in an initialization phase, to receive, during normal operation, two data entities of interest each including at least one data word of interest [TA2] and [TA3] respectively; to receive a first data entity including at least one word [TC1] comprising a randomized data entry, from the TX pseudorandom function generator, to generate a first XOR sum of the initialization data entity's word [TA1] and the at least one randomized data entity [TC1], in at least one iteration of an initialization phase; and, during normal operation, to generate and to output a second XOR sum [TA2⊕TC2=TB2] and a third XOR sum [TA3⊕TC3=TB3], wherein TB2 and TB3 are randomized data entities, wherein the words TA1, TA2 and TA3 are operative to initialize the data integrity system including enabling the data integrity system to encrypt the TA2 word and to generate an identifying hash value output using the TA3 word. | 11-24-2011 |
20120002812 | DATA AND CONTROL ENCRYPTION - Secure communication of data between devices includes encrypting unencrypted data at a first device by reordering unencrypted bits provided in parallel on a device bus, including data and control bits, from an unencrypted order to form encrypted data including a plurality of encrypted bits in parallel in an encrypted order defined by a key. The encrypted data may be transmitted to another device where the encrypted data is decrypted by using the key to order the encrypted bits to restore the unencrypted order thereby to reform the unencrypted data. | 01-05-2012 |
20120008782 | DATA PROCESSING APPARATUS AND DATA PROCESSING METHOD - A data processing apparatus includes an address bus, a scramble unit, and a data bus. The address bus outputs address data to be given to a memory apparatus. The scramble unit scrambles write-in data into a storage position in the memory apparatus identified by the address data to obtain confidential data. The data bus outputs the confidential data. The scramble unit includes a first scrambler, a first converter and a second scrambler. The first scrambler XORs first mask data corresponding to the address data and the write-in data for each bit and makes it first scrambled data. The first converter performs one-to-one substitution conversion of the first scrambled data. The second scrambler XORs second mask data corresponding to the address data and data after the conversion of the first scrambled data by the first converter and outputs obtained second scrambled data as the confidential data. | 01-12-2012 |
20120057703 | TECHNIQUES FOR TRANSMITTING CONTROL CHANNEL INFORMATION - Techniques for protecting information elements transmitted to mobile stations from intruders. The technique can involve applying a randomized mask over an information element and then providing a scrambled cyclic redundancy check (CRC) value. A seed for the randomized mask can be different from a seed for the scrambled CRC value. | 03-08-2012 |
20120237032 | TWO-STAGE BLOCK SYNCHRONIZATION AND SCRAMBLING - A two-stage block synchronization and scrambling module includes a synchronization PRNG module, a scramble PRNG module, a summing module, and a storage module. The synchronization PRNG module is clocked once per N+1 bit PCS frame (N arbitrary) to produce a synchronization bit and a pseudo-random starting state for the scramble PRNG. The scramble PRNG module is clocked N times per PCS frame to produce a cipher stream starting with a pseudo-random state from the synchronization | 09-20-2012 |
20120281831 | Method and System for Enhancing Crytographic Capabilities of a Wireless Device Using Broadcasted Random Noise - A secret stream of bits begins by receiving a public random stream contained in a wireless communication signal at a transmit/receive unit. The public random stream is sampled and specific bits are extracted according to a shared common secret. These extracted bits are used to create a longer secret stream. The shared common secret may be generated using JRNSO techniques, or provided to the transmit/receive units prior to the communication session. Alternatively, one of the transmit/receive unit is assumed to be more powerful than any potential eavesdropper. In this situation, the powerful transmit/receive unit may broadcast and store a public random stream. The weaker transmit/receive unit selects select random bits of the broadcast for creating a key. The weaker transmit/receive unit sends the powerful transmit/receive unit the selected bit numbers, and powerful transmit/receive unit uses the random numbers to produce the key created by the weaker transmit/receive unit. | 11-08-2012 |
20130022201 | Encrypted memory - A memory device is operable to perform channel encryption wherein for communication between devices, each includes cryptographic logic and performs cryptographic operations. In an illustrative embodiment, the memory device can comprise memory operable to store data communicated via a communication channel from a processor, and logic operable to perform channel encryption operations on the communication channel that communicates information between the processor and the memory. | 01-24-2013 |
20130101120 | METHOD FOR SECURE DATA EXCHANGE BETWEEN TWO DEVICES - This invention concerns a safe data exchange method between two devices locally connected to one another. In a preferred embodiment, the first device is a security module containing a first encrypting key, said private key of a pair of asymmetric encrypting keys. The second device is a receiver comprising at least one second encrypting key, said public key of said pair of asymmetric encrypting keys. Furthermore each of the devices comprises a symmetrical key. The first device generates a first random number, which is encrypted by said private key, then transmitted to the second device, in which it is decrypted by means of the public key. The second device generates a second random number, which is encrypted by said public key, then transmitted to the first device, in which it is decrypted by means of the private key. A session key, used for safe data exchange, is generated by a combination of the symmetric key and the random numbers generated and received by each of the devices. | 04-25-2013 |
20130163759 | QUANTUM KEY DISTRIBUTION METHOD AND APPARATUS - A QKD transmission method comprises generating a transmission list for a plurality of data bits, the list comprising a randomized timing schedule defining respective times for transmission of the data bits, providing a clock signal and using the clock signal to initiate the transmission of the data bits at a predetermined time in order to provide a QKD signal, and an apparatus therefor. | 06-27-2013 |
20130170642 | ELLIPTIC CURVE RANDOM NUMBER GENERATION - An elliptic curve random number generator avoids escrow keys by choosing a point Q on the elliptic curve as verifiably random. An arbitrary string is chosen and a hash of that string computed. The hash is then converted to a field element of the desired field, the field element regarded as the x-coordinate of a point Q on the elliptic curve and the x-coordinate is tested for validity on the desired elliptic curve. If valid, the x-coordinate is decompressed to the point Q, wherein the choice of which is the two points is also derived from the hash value. Intentional use of escrow keys can provide for back up functionality. The relationship between P and Q is used as an escrow key and stored by for a security domain. The administrator logs the output of the generator to reconstruct the random number with the escrow key. | 07-04-2013 |
20130230172 | Novel binary and n-state Linear Feedback Shift Registers (LFSRs) - N-state with n equal or greater than 2 modified Linear Feedback Shift Registers (mLFSRs) having a non-reversible n-state switching function have been disclosed. An mLFSR can also contain a device that implements an n-state logic function of which one input is provided with a signal external to the mLFSR. The mLFSR can be in Fibonacci or in Galois configurations. N-state scramblers and corresponding descramblers applying an mLFSR are provided. N-state coding boxes apply non-reversible switching functions connected to n-state scrambling or descrambling functions. Sequence generators and detectors are also disclosed. | 09-05-2013 |
20130329887 | APPARATUS AND METHOD FOR PROVIDING SECURITY SERVICE - An apparatus and method for providing a security service are provided. The apparatus for providing a security service includes a first block cipher and a second block cipher. The second block cipher is independent of the first block cipher, and is configured to be used as a random number generator when the first block cipher is used to perform encryption/decryption, and to be used to perform encryption/decryption when the first block cipher is used as a random number generator. | 12-12-2013 |
20140023193 | SYSTEM AND METHOD FOR SECURE POWER SYSTEMS INFRASTRUCTURE COMMUNICATIONS - Communication apparatus and associated method for sending messages while concealing the messages among chaff data. In sending outgoing communications to and from a remote device, a stream of chaffing data is generated. A message to be communicated is inserted into the stream of chaffing data such that the beginning and ending boundaries of the first message are concealed by the chaffing data. A matching pair of deterministic number generators, one at the sending end and one at the remote device, are initialized using a common initialization value to cause generation of a common sequence of numbers with the remote device. The stream of chaffing data, or data associated with the first message, or both, are encoded with the common sequence of numbers. | 01-23-2014 |
20140093077 | ZERO KNOWLEDGE PROOFS FOR ARBITRARY PREDICATES OVER DATA - A first computing device transfers first and second commitments to a second computing device. The first commitment is for private data and a first random number and the second commitment is for second and third random numbers. The method includes producing a result by evaluating a predicate and a first support function of a garbled circuit. The result includes a first part and a second part, referred to as the predicate result. The method includes transferring the result to the second computing device; receiving a second challenge from the second computing device; and producing a second response from a second support function using the second challenge. The method includes transferring the second response to the second computing device. The predicate result over the private data is true if a result of a check function is equal to a third commitment of the first part and the second response. | 04-03-2014 |
20140133654 | METHOD AND SYSTEM FOR ENHANCING CRYPTOGRAPHIC CAPABILITIES OF A WIRELESS DEVICE USING BROADCASTED RANDOM NOISE - A secret stream of bits begins by receiving a public random stream contained in a wireless communication signal at a transmit/receive unit. The public random stream is sampled and specific bits are extracted according to a shared common secret. These extracted bits are used to create a longer secret stream. The shared common secret may be generated using JRNSO techniques, or provided to the transmit/receive units prior to the communication session. Alternatively, one of the transmit/receive unit is assumed to be more powerful than any potential eavesdropper. In this situation, the powerful transmit/receive unit may broadcast and store a public random stream. The weaker transmit/receive unit selects select random bits of the broadcast for creating a key. The weaker transmit/receive unit sends the powerful transmit/receive unit the selected bit numbers, and powerful transmit/receive unit uses the random numbers to produce the key created by the weaker transmit/receive unit. | 05-15-2014 |
20140362990 | LINK AGGREGATOR WITH UNIVERSAL PACKET SCRAMBLER APPARATUS AND METHOD - Apparatus and methods are presented for using configurable additive data scrambling or descrambling circuitry for multichannel link aggregators in which a scrambler or descrambler polynomial is specified by binary data in a programmable register, and the polynomial data is used to compute a polynomial matrix. A scrambler or descrambler pattern is computed according to the polynomial matrix, and input data is bitwise exclusive-ORed with the computed scrambler or descrambler pattern to generate scrambled or descrambled output data. The scrambling or descrambling circuitry can be reconfigured for different polynomials by reprogramming the register, with the scrambler or descrambler automatically computing an updated polynomial matrix. | 12-11-2014 |
20150312037 | DATA SCRAMBLING INITIALIZATION - Systems and methods for improved synchronization between a transmit device and a receive device in a communication system. In one embodiment, an apparatus for transmitting bits of data over a link includes a scrambler to scramble data and circuitry configured to insert the scrambled data into frames and to transmit the frames in data blocks over the link. The apparatus also includes an initialization module configured to generate an unscrambled pseudo-random sequence. The circuitry is further configured to periodically insert the unscrambled pseudo-random sequence into a frame, to initialize the scrambler to a starting point based on the insertion of the unscrambled pseudo-random sequence into the frame, and to transmit the frame in a data block over the link. | 10-29-2015 |
20150381307 | PROVISION OF A SECURED REPLICA PSEUDO RANDOM NOISE SIGNAL - A secure method and a secure provision unit provide a secured replica pseudo random noise signal for a receiver unit. A replica pseudo random noise code is modulated with a noise signal by a receiver-end provision unit. The replica pseudo random noise code has artificially produced noise superimposed thereon, so that the replica pseudo random noise code cannot be read from the noisy signal even at the receiver end, for example within a receiver or on a transmission path between provision unit and receiver. | 12-31-2015 |
20150381308 | Securely Providing a Receiver Unit with a Replica Pseudo-Random Noise Code - A method for securely providing a receiver unit with a replica pseudo-random noise code is provided. The replica pseudo-random noise code is provided in a restricted manner based on a result of an admissibility check. In order to carry out the admissibility check, values are recorded and are compared with predefined threshold values. | 12-31-2015 |
20160112189 | High-Security Communication System, and Transmitter and Receiver Both Used Therein - The objective of the invention is to provide an encoding method and a communication method wherein bit-error correction is easy for a authorized recipient but difficult for an unauthorized recipient. A transmission channel in which bit errors are moderately controlled is used to transmit/receive a random number sequence. A common key is shared between a transmitter and a receiver in advance; each bit value of the common key is connected with each slot of the random number sequence; the common key is used to divide the random number sequence into two or more random number series in accordance with the connection; and each random number series is independently encoded and parity check symbols are generated. The unit of the encoding is equal to or greater than the length of the common key so as to make a partial analysis by an unauthorized recipient impossible. | 04-21-2016 |