Claims
- 1. A security apparatus comprising;
- a number input device;
- an address register responsive to said number input device;
- an encryption schema memory storing an encryption schema including a random array of bits, said on schema memory addressable by said address register to produce both an output code including a length of spring identifier and an encryption algorithm identifier, and a relative address code; and
- address incrementing logic responsive to said relative address code and operative to increment said address register,
- whereby said encryption algorithm identifier identifies a particular encryption algorithm utilized to encrypt a set of data having a length defined by said length of string identifier.
- 2. A security apparatus as recited in claim 1 further comprising:
- a PIN register coupled to said number input device;
- a public code register coupled to said number input device; and
- merging logic merging outputs of said PIN register and said public code register to be input to said address register.
- 3. A security apparatus as recited in claim 2 further comprising an output shift register operative to shift out said output code of said encryption schema memory.
- 4. A security apparatus as recited in claim 1, wherein said encryption schema memory is read only memory.
- 5. A security apparatus as recited in claim 1, wherein said encryption schema memory includes a writeable memory.
- 6. A security apparatus as recited in claim 1 wherein said random array of bits consists of 1M bits of random information.
- 7. A security apparatus as recited in claim 1 wherein said length of said data set defined by said length of string identifier is randomly determined.
- 8. A security apparatus as recited in claim 7 wherein said length of said data set although random is no greater than a predefined length.
- 9. A security apparatus as recited in claim 1 wherein said security apparatus is a portable device which when in operation must be coupled to a host computer system said host computer performing said encryption utilizing said output code, whereby security is enhanced as the identification of said particular encryption algorithm utilized and said length of said data set encryted by said particular encryption algorithm is determined by said security apparatus which being a device separate from said host computer system decreases risks of security attacks.
- 10. A security apparatus as recited in claim 6 wherein security apparatus plugs into a peripheral device port of said host computer system.
- 11. A security apparatus as recited in claim 7 wherein said peripheral device port is a mouse port.
- 12. A security apparatus as recited in claim 6 wherein said security apparatus is operable to draw any needed power from said host computer system.
- 13. A security apparatus as recited in claim 1 wherein said number input device is an electro-mechanical device manually actuated to enter a sequence of numbers.
- 14. A security apparatus as recited in claim 10 wherein said electro-mechanical device includes a plurality of number wheels.
- 15. A security apparatus as recited in claim 1 wherein said number input device is an electronic input device.
- 16. A security apparatus comprising:
- a processor;
- a plurality of memories coupled to said processor, where each memory stores an encryption schema including a random array of bits;
- a number input device coupled to said processor to at least partially provide a starting address for at least one of said plurality of memories; and
- an address register process executing on said processor, said address register process maintaining an address register variable initially storing said starting address, said address register process operable to access at least one of said encryption schemas in order to generate a length of string identifier, an encryption algorithm identifier, and a relative address code;
- an address incrementing process executing on said processor, said address incrementing process responsive to said relative address code and operable to increment said address register variable,
- whereby said encryption algorithm identifier identifies a particular encryption algorithm utilized to encrypt a set of data having a size defined by said length of string identifier.
- 17. A security apparatus as recited in claim 16 wherein at least one of said plurality of memories is a read-only memory, and wherein at least one of said memories is a writeable memory.
- 18. A security apparatus as recited in claim 17 further comprising an output port coupled to said processor, and an input port coupled to said output port.
- 19. A security apparatus as recited in claim 18 further comprising a downloading port separate from said input port for downloading encryption schema into said writeable memory.
CROSS REFERENCE TO RELATED APPLICATIONS
The present application represents the National Phase filing of International Application No. PCT/U.S. Pat. No. 98/12,578 filed Jun. 15, 1998, which application claims priority of U.S. Provisional Application No. 60/050,176 filed Jun. 19, 1997, under 35 U.S.C. .sctn.119(e), the subject matter disclosed therein being incorporated herein by reference in its entirety.
US Referenced Citations (15)
Foreign Referenced Citations (1)
Number |
Date |
Country |
0797329 A1 |
Sep 1997 |
EPX |