System and method for cryptographic communications using permutation

Information

  • Patent Application
  • 20120027198
  • Publication Number
    20120027198
  • Date Filed
    January 27, 2009
    15 years ago
  • Date Published
    February 02, 2012
    12 years ago
  • Inventors
  • Original Assignees
    • (SUNNYVALE, CA, US)
Abstract
The present invention discloses a system and method for cryptographic communications. It may significantly improve operation efficiency of existing symbol level encryption algorithms by permutating at symbol sequence level with significantly less computational requirements. The system includes a communications channel, at least one terminal with encoding device and at least one terminal with decoding device. A message comprising ordered symbols can be partitioned into ordered symbol sequences. Then the order of symbol sequences is permutated by the encoding device. The partition and permutation can be repeated recursively on the resultant symbol sequences to obtain the ciphertext. All the partition and permutating information are characterized by a secret key, used for decoding on the receiving terminal. It is required that the final resultant symbol sequences in the ciphertext should not disclose information confidentiality. The present invention can be also applied to secure distributed data storage.
Description
FEDERALLY SPONSORED RESEARCH

Not Applicable


SEQUENCE LISTING OR PROGRAM

Not Applicable


US PATENT REFERENCES

1. U.S. Pat. No. 4,405,829 September 1983, Rivest, Ronald L. et al, Cryptographic communications system and method


BACKGROUND OF THE INVENTION

1. Field of the Invention


The present invention relates to a cryptographic communications system and method.


2. Description of the Related Art


Data privacy and security have been increasingly important in generation, exchange and storage of information. Data transmitted over communications channels are susceptible to interception, eavesdropping and modification. Computer networks and internet can be monitored, accessed without permission. Due to various reasons, data storage devices may be accessed undesirably. Therefore, a cryptographic communications system and method is undoubtedly required to protect information confidentiality.


There have been a plurality of encryption algorithms to protect information security. These encryption algorithms involve extensive arithmetic operations and bit/symbol substitution, therefore, require substantial computing power. Some sophisticated approaches even require dedicated hardware acceleration to achieve targeted performance. Fundamentally, the daunting computing cost is due to the fact that all current transformations and mathematical operations are performed at symbol/bit level to prevent bit/symbol level security breaches.


However, in a plurality of secure communications applications, symbol/bit level data security may not be required. For instance, in on-line software release, a binary executable is a bit sequence of 1s and 0s. Current encryption algorithms would encode the binary executable at bit level, which would be time consuming.


Nonetheless, encoding binary executables at bit sequence level can achieve data security at lower computational cost. For example, a 64-kilo-byte binary executable can be first partitioned into 64 1-kilo-byte bit sequences. Then these 64 1-kilo-byte bit sequences can be permutated to generate an encoded form of the binary executable ready for on-line software release.


In this example of encoding 64-kilo-byte binary executable at 1-kilo-byte bit sequence level, the permutation information can be defined as a secret key for this encryption. There are factorial 64! possible permutations, more complex than exponential complexity. Thus, without knowing the secret key, it is computationally infeasible to restore the order of the re-ordered 64 1-kilo-byte bit sequences and obtain the original binary executable using current computing technologies.


Furthermore, symbol sequence level permutation operates at symbol sequence level, therefore, may significantly improve encryption and decryption efficiency compared to symbol/bit level cryptographic manipulations.


Since symbol sequence level permutation encodes and decodes messages using the same secret key, it is a symmetric encryption approach.


Accordingly, it is an object of this invention to provide a system and method for implementing a secure communications system.


It is another object to provide a system and method for encoding and decoding data.


It is yet another object to provide a system and method for secure distributed data storage.


BRIEF SUMMARY OF THE INVENTION

The present invention includes a communications channel, at least one terminal with an encoding device and at least one terminal with a decoding device. The encoding device transforms an applied message-to-be-transmitted M to a ciphertext C for transmission over the communications channel to the receiving terminal.


To clearly describe the symbol sequence level partition and permutation method, the symbol level permutation method is presented first. It is a special case of symbol sequence level permutation, where each of the symbol sequences comprises only one symbol.


Please note that the present invention included in this patent application specification is about symbol sequence level partition and permutation. The description of symbol level permutation only serves to delineate key concepts of symbol sequence level encryption.


The message M is an ordered symbol sequence of length k and can be represented as a k-tuple (mk, . . . , m2, m1), k<=kmax, where kmax is the maximum symbol length of messages specified by the communications system. Please note that elements within parenthesis are counted from right to left in this patent application specification for consistency.


The symbols in message M can be defined as the minimum units for encryption. For instance, in on-line software release, the bits in binary executables are the minimum units for manipulation. Therefore, symbols refer to bits in this example. In ASCII message communications the minimum manipulation units are ASCII characters. Thus, symbols refer to ASCII characters.


The position of each symbol in M can be defined as another k-tuple (k, k−1, . . . , 2, 1). This information is trivial because it is the obvious original position of each symbol in M. However, this position information will be changed in permutation and can be defined as a secret key for encryption:


For example, an ASCII message ABCDEFGHI can be represented as a 9-tuple (A, B, C, D, E, F, G, H, I). The length of this symbol sequence is 9.


The position of each symbol in M can be represented as a 9-tuple (9, 8, 7, 6, 5, 4, 3, 2, 1), which is obviously trivial.


If the length of M is bigger than kmax, then M can be transformed into blocks of length no bigger than kmax, which are separately encoded and transmitted over the channel. The encoded blocks are separately decoded on the receiving terminal and transformed back to M. If the length of M is shorter than a minimum length, symbol permutation of M may still leak confidential information of message M. In this case, M can be padded to a longer sequence. Therefore, symbol permutation will not leak confidential information. The padded symbols will be dropped after decryption. These two cases apply to symbol sequence level permutation as well.


To obtain ciphertext C, the encoder permutates all symbols in M according to predefined ordering information (pk, . . . , p2, p1), which is a permutation of (k, k−1, . . . , 1). pi is the position of symbol mi in ciphertext C, where 1<=i<=k. The k-tuple (pk, . . . , p2, p1) is defined as the secret encryption key. There are a plurality of approaches to reduce the size of the secret key shared by both the encoding device and the decoding device.


For example, the ASCII message ABCDEFGHI can be permutated to a ciphertext EHGBICDFA according to permutation ordering information (p9, . . . , p2, p1)=(1, 6, 4, 3, 9, 2, 7, 8, 5), which is a permutation of (9, 8, 7, 6, 5, 4, 3, 2, 1). The 4 in the 9-tuple (p0, . . . , p2, p1)=(1, 6, 4, 3, 9, 2, 7, 8, 5) means that the 7th symbol C in the message ABCDEFGHI is placed at the 4th position in the ciphertext EHGBICDFA. Apparently, the secret key for this encoding is information (p9, . . . , p2, p1)=(1, 6, 4, 3, 9, 2, 7, 8, 5).


Another form of symbol level permutation encryption is involved with the secret key. In this form, the secret key is always a permutation of (kmax, . . . , 2, 1) instead of a permutation of (k, k−1, . . . , 1). Accordingly, messages with length less than kmax have to be padded to have length of kmax.


For example, assuming kmax is 15, the ASCII message ABCDEFGHI is first padded to ABCDEFGHI+JKLMN. Then the padded message is permutated to J EHKGLBIMC+DNFA according to (p15, . . . , p2, p1)=(1, 9, 6, 4, 14, 2, 11, 13, 8, 5, 15, 12, 10, 7, 3). Actually, because the positioning information for the remaining 6 padded symbols in the ciphertext is not important, only the first 9 elements in this 15-tuple are needed for decryption. Therefore, the encryption key can be reduced to 9-tuple (p15, . . . , p8, p7)=(1, 9, 6, 4, 14, 2, 11, 13, 8).


Unlike symbol level permutation, symbol sequence level permutation is performed at symbol sequence level. The encoding device first partitions M into n symbol sequences as (Mn, . . . , M2, M1). Each of Mn, . . . , M2 and M1 is a symbol sequence within M and can be represented as:

    • (mj+si−1, . . . , mj+1, mj)


      where mj is the starting symbol for Mi, 1<=i<=n. si is the length of Mi, Thus, the partition can be characterized by (sn, . . . , s2, s1).


For example, the ASCII message ABCDEFGHI can be partitioned into 3 symbol sequences AB CDE FGHI according to partition information 3-tuple (s3, s2, s1)=(2, 3, 4). The 3 in this 3-tuple means that the 2nd symbol sequence of this partition has 3 symbols, i.e. CDE.


Then (Mn, . . . , M2, M1) is permutated to (M1n, . . . , M12, M11) according to (pn, . . . , p2, p1), which is a permutation of (n, n−1, . . . , 2, 1). pi is the sequence position of Mi within the ciphertext (M1n, . . . , M12, M11), 1<=i<=n. The 1 in the subscript of M1i denotes the first level permutation in case of recursive partition and permutation, which will be described in the following. The partition information (sn, . . . , s2, s1) and permutation information (pn, . . . , p2, p1) are defined as the secret encryption key.


In the previous ASCII message ABCDEFGHI, the message has been partitioned into (M3, M2, M1)=AB CDE FGHI according to partition information 3-tuple (s3, s2, s1)=(2, 3, 4). Then it is permutated to (M13, M12, M11)=CDE FGHI AB according to permutation information (p3, p2, p1)=(1, 3, 2). The 3 in (p3, p2, p1)=(1, 3, 2) means that the second symbol sequence CDE is placed as the third symbol sequence in the permutation. Please keep in mind that elements in parenthesis are counted from right to left in this application specification.


However, if necessary, the partition and permutation can be repeated recursively and sequentially on the resultant symbol sequences in a manner not necessarily same as previous partition and permutation until stopped by the encoding device. For instance, M1i is one of M1n, . . . , M12 and M11, wherein 1<=i<=n, and can be further partitioned into n′ symbol sequences as (M1in′, . . . , M1i2, M1i1) according to (s1in′, . . . , s1i2, s1i1). s1ij is the number of symbols in M1ij, 1<=j<=n′. The 1i in the subscript means a partition on sequence M1i. Then (M1in′, . . . , M1i2, M1i1) is permutated according to (p1in′, . . . , p1i2, p1i1), which is a permutation of (n′, n′−1, . . . , 2, 1). (p1in′, . . . , p1i2, p1i1) and (s1in′, . . . , s1i2, s1i1) may not be necessarily distinct from previous partitions and permutations respectively. The procedure of partition and permutation can be repeated recursively and sequentially on the resultant symbol sequences until stopped by the system.


For the recursive symbol sequence level permutation, the encryption key corresponds to information for all levels of partitions and permutations.


In the ASCII message ABCDEFGHI example, the message is already partitioned and permutated into symbol sequences (M13, M12, M11)=CDE FGHI AB. M12=FGHI can be further partitioned into (M122, M121)=F GHI according to (s122, s121)=(1, 3). The 3 in (1, 3) means that the first symbol sequence has 3 symbols, i, e, GHI. (M122, M121)=F GHI can then be permutated to GHI F according to permutation information (p122, p121)=(1, 2). The 2 in (p122, p121)=(1, 2) means that the first symbol sequence M121 is placed as the second sequence in GHI F. As a result, the ciphertext is CDE GHI F AB.


In this recursive symbol sequence level permutation of ABCDEFGHI, the encryption key corresponds to (s3, s2, s1)=(2, 3, 4) and (p3, p2, p1)=(1, 3, 2) for partition and permutation on M, (s122, s121)=(1, 3) and (p122, p121)=(1, 2) for partition and permutation on M12.


Assuming M is partitioned into n symbol sequences, the number of possible combinations is factorial n!, which is larger than any exponential function in n. If the resultant symbol sequences are further partitioned and permutated, the complexity of encryption is further confounded. Therefore, assuming the resultant symbol sequences do not leak message confidential information, without the knowledge of the secret key, it is computationally infeasible to decode the ciphertext with current computing technology. As a result, symbol sequence level recursive partition and permutation provides sufficient information security for applications with no symbol level security requirement.


The partition and permutation information is used as encryption and decryption key. In some applications, a shared secret encryption key is established between the transmitter and the receiver per session basis. In this case, a distinct key is required for a separate communications session. This distinct encryption key can be encoded by other encryption techniques such as public key encryption techniques, thereafter being transmitted over the communications channel to the intended receiver. For this reason, it is important to shorten or reduce the size of the secret key.


There are a plurality of methods to shorten or reduce the size of the shared secret encryption key. For instance, same partition and permutation schemes can be applied, thus no need to transmit multiple partition and permutation information as the secret encryption key.


Alternatively, some conventional data compression techniques or hashing techniques can be applied on the secret encryption key to reduce the size of the key. When received by the intended receiver, the size-shortened key is converted back to the original secret key, which is applied on the decoding device.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 shows a block diagram for a 2-way cryptographic communications system in accordance with the present invention.



FIG. 2 shows a detailed block diagram for an encoding/decoding device in the system in FIG. 1.



FIG. 3 shows another embodiment of detailed block diagram for an encoding/decoding device in the system in FIG. 1.



FIG. 4 shows a block diagram of another embodiment for a cryptographic communications system in accordance with the present invention.



FIG. 5 shows a block diagram of yet another embodiment for a cryptographic communications system in accordance with the present invention.



FIG. 6 shows in block diagram how to encode data and distribute the encoded data to storage terminals in a secure distributed storage system in accordance with the present invention.



FIG. 7 shows in block diagram how to collect distributed encoded data and restore the original data in a secure distributed storage system in accordance with the present invention.





DETAILED DESCRIPTION OF THE INVENTION

Basic Configuration



FIG. 1 shows an embodiment of the present invention in block diagram form. This system comprises a communications channel 14 and two terminals A and B. The communications channel 14 in the embodiment in FIG. 1 is a two-way communications channel. Nonetheless, the communications channel consistent with the present invention may be one-way, 2-way or even multi-way in other embodiments. Each of terminals A and B includes encoding device 10A and 10B, respectively, and decoding device 12A and 12B, respectively. An encryption key keyA is applied on both encoding device 10A, which transforms a message MA to a ciphertext CA, and decoding device 12B, which transforms the received ciphertext CA back to M′A. Similarly, an encryption key keyB is applied on both encoding device 10B, which transforms a message MB to a ciphertext CB, and decoding device 12A, which transforms the received ciphertext CB back to M′B. In other embodiments of one-way communications from terminal A to terminal B, only encoding device 10A and decoding device 12B are required.


A plaintext message MA, represented as (mk, . . . , m2, m1), can be partitioned into (MAn, . . . , MA2, MA1), k<=kmax, where kmax is the maximum message length allowed by terminal A. If the length of M is bigger than kmax, then M is transformed into blocks of length no bigger than kmax. The blocks are encoded and transmitted separately. On the receiving terminal, the blocks are decoded separately and transformed back to original message M. If the message length is shorter than the minimum symbol length, then M is padded before encryption to avoid potential information disclosure.


Symbol sequence MAi, one of MAn, . . . , MA2 and MA1, is a symbol sequence within MA and its length is sAi, where 1<=i<=n. When the length of each MAi is one, this symbol sequence level permutation scheme is reduced to a symbol level permutation, therefore, symbol level permutation is a special case of symbol sequence level permutation.


In the operation of encryption, (MAn, . . . , MA2, MA1) is permutated to (MA1n, . . . , MA12, MA11) according to (pAn, . . . , pA2, pA1), which is a permutation of (n, n−1, . . . , 2, 1). pAi is where MAi is placed within (MA1n, . . . , MA12, MA11). This partition and permutation can be characterized by (sAn, . . . , sA2, sA1) and (pAn, . . . , pA2, pA1) respectively. Each MA1i can be further partitioned and permutated not necessarily in the same way as previously, wherein 1<=i<=n. This process can be repeated recursively and sequentially until stopped by the encoder. The final sequence of symbol sequences is defined as a ciphertext CA. The information including all levels of partition and permutation schemes characterized by (sAn, . . . , sA2, sA1) and (pAn, . . . , pA2, pA1) respectively is defined as the secret encryption key, keyA. When necessary to reduce the size of the encryption key, same partition and permutation schemes can be applied. Moreover, conventional data compression and hashing techniques can be applied on the encryption key as well.


Please note that, to avoid information disclosure, it is required that the final resultant symbol sequences should not leak any confidential information. Otherwise, the process of recursive partition and permutation should be continued on those leaky symbol sequences until the information security is guaranteed.


In accordance with the present invention, an exemplary form for encoding device 10A, 10B and decoding device 12A, 12B is shown in FIG. 2. The device in FIG. 2 includes an M memory buffer 26 for receiving an applied digital message-to-be-transferred, a key register 24 for receiving an applied digital encryption key and a memory buffer 28 for storing the encoded ciphertext C. The memory buffer 26 has Kmax entries and each entry stores one symbol of the message-to-be-transferred in either the top-down order or the bottom-up order as specified by the system. The memory buffer 28 also has Kmax entries with each entry storing one symbol of the encoded ciphertext C in an order as specified by the system.


The device further includes a finite state machine 20 and an address register 22. The finite state machine 20 obtains the encryption key from key register 24 and generates a symbol address pi, which is written into the address register 22. A message symbol mi, which is an output from message buffer 26 in an order specified by the system, is written into ciphertext memory buffer 28 at the address specified by pi. This is how the operation of permutation is implemented. It is required that the output of symbol address pi from address register 22 and the output of symbol mi from the message buffer 26 should be synchronized.


The device in FIG. 2 can operate in either encryption or decryption mode using the same encryption key. This is controlled by the finite state machine 20 when generating symbol address pi. If the encryption key is reduced by conventional compression or hashing techniques, the original encryption key can be recovered either before storing into the key register 24, which is not depicted in FIG. 2, or inside the finite state machine 20.


Another embodiment of the encoding and decoding devices consistent with the present invention is shown in FIG. 3. The M memory buffer 26 is replaced by a message symbol FIFO 30. This is the only difference between the embodiment in FIG. 2 and the embodiment in FIG. 3. After all symbols of the message are written into memory buffer 28 in FIG. 2 and FIG. 3, the data in memory buffer 28 are read out in either the top-down order or the bottom-up order as specified by the communications system. This is the ciphertext C.


The embodiments in FIG. 2 and FIG. 3 can only perform permutation one symbol at a time, however, it is possible that the encoding and decoding devices may process more than one symbol at a time in other embodiments of the present invention.


Other Configurations


In the recursive symbol sequence level permutation encryption, every symbol sequence after previous partition and permutation can be partitioned and permutated distinctly and independently. Therefore, it is possible to process each of the symbol sequences in parallel. As embodied in FIG. 4, a message M is partitioned and permutated according to keyA0 by encoder 10A0, the resultant symbol sequence Ms, which is one of M1n, . . . , M12 and M11, is de-selected by a 1-to-n de-selector (demux) 31A to generate MA1i, where i is in the range of 1 to n inclusive. MA1i is applied on encoding device 10Ai to generate Ci using keyAi. Ci is transmitted to terminal B over the channel 14. Upon received by terminal B. Ci is decoded by decoding device 12Bi to obtain M′1i using keyAi, where 1<=i<=n. Then M′s is selected from M′1n, . . . , M′12 and M′11 by a n-to-1 selector(mux) 32B and is applied to decoding device 12B0. Thereby, message M′ is obtained, which should be the same as M.


As the decoding of Ci is essentially the same as encoding of M1, where 1<=i<=n, it is possible to use a single decoder 12B, as embodied in FIG. 5. The terminal A in FIG. 5 is the same as that in FIG. 4. The decoding schemes are different from that in FIG. 4. Ciphertext Ci is received and stored in memory buffer 34Bi Then Cs is selected from Cn, . . . , C2 and C1 by a n-to-1 selector (mux) 38B and decoded by the decoding device 12B. Thereby, M′ is obtained, which is the same as M. The key used by decoder 12B is generated by a key generator 36B according to the particular symbol sequence fed to decoder 12B.


In addition, the finite state machine 20, as embodied in FIG. 2 and FIG. 3, should be designed accordingly to generate correct symbol addresses.


The communications channel in both FIG. 4 and FIG. 5 is shown to have n physical links. However, there may be either multiple physical links or only one physical link to channel 14. How Cn, . . . , C2 and C1 are transmitted to the receiving terminal should be designed according to the specific communications channel.


There are other forms of encoder/decoder configurations consistent with the present invention in addition to the embodiments in FIG. 4 and FIG. 5. The finite state machine and memory buffers inside the encoding and decoding devices, as embodied in FIG. 2 and FIG. 3, should be designed accordingly. Moreover, the embodiments in FIG. 4 and FIG. 5 are one-way communciations system. Nonetheless, there can be other forms of the present invention capable of two-way or multi-way communications.


Secure Distributed Storage


The present invention can also be applied to secure distributed data storage as embodiments in FIG. 6 and FIG. 7. FIG. 6 is an embodiment of the present invention for distributed data storage. It comprises an encoding and distributing terminal A, n distributed data storage terminals and a communications channel 14. Terminal A comprises an encoding device 10A, a 1-to-n deselector (demux) 42A, and n memory buffers from 40A1 to 40An. The encoder 10A partitions the message-to-be-stored into n symbol sequences (Mn, . . . , M2, M1) and permutates them into (M1n, . . . , M12, M11), which may be further partitioned and permutated. M1is are stored into memory buffers 40Ai respectively and transmitted to n distributed storage terminals separately over channel 14, wherein 1<=i<=n. The ith distributed data storage terminal includes a storage device 38i, where the data is stored.


The embodiment in FIG. 7 describes how the distributed data is recovered. The n data storage terminals are the same as that in FIG. 6. Terminal C, knowing the encryption key, receives Cis from the n storage terminals over channel 14 and store Cis in memory buffers from 46C1 to 46Cn respectively. The memory buffers feed Cis to decoding device 12C via an n-to-1 selector (mux) 48C. Cis are decoded by decoding device 12C to obtain message M′, which is the same as original message M.


Conclusion


The present invention describes a recursive symbol sequence level partition and permutation method for cryptographic communications. It is required that the final symbol sequences in the ciphertext should not disclose any information confidentiality. Otherwise, the recursive partition and permutation process should be continued until information security is satisfied. The symbol level permutation method is a special case for symbol sequence level permutation. The present invention can also be applied to secure distributed data storage.


The following variations on the use of the encoding/decoding devices are to be considered as obvious to one skilled in the art and therefore within the intended scope of the attached claims:

    • 1. Using encoders/decoders consistent with the present invention for messages that are either partitioned into smaller blocks to meet maximum message length requirement or padded into longer sequence to meet minimum message length requirement. It is also possible to steal symbols from other symbol sequence when particular symbol sequence is too short
    • 2. Using encoders/decoders consistent with the present invention in conjunction with other types of encoders/decoders. Other encoders/decoders can be used either before or after encoders/decoders consistent with the present invention. Particularly, the symbols may be substituted, if needed, in encoding or decoding consistent with the present invention. The substitution symbols should also be considered as part of the secret encryption key in addition to the partition and permutation information.
    • 3. Using a shared secret key established with other encryption schemes in implementations consistent with the present invention,
    • 4. Using a secret key, size of which is shortened with conventional compression and hashing techniques, in encoding or decoding consistent with the present invention,
    • 5. Implementing the present invention in software alone or hardware alone or as a combination of software and hardware,
    • 6. Implementing the present invention as a standalone system, or embeded into or attached to another system.


The present invention has been disclosed and described with respect to the herein disclosed embodiments. However, these embodiments should be considered in all respects as illustrative and not restrictive. Other forms of the present invention could be made within the spirit and scope of the invention.

Claims
  • 1. A cryptographic communications system, comprising: A. a communications channel,B. an encoding means for transforming a message signal M to a ciphertext signal C for transmitting on said channel, where said message M is an ordered sequence of symbols, denoted as (mk, . . . , m2, m1), k<=kmax, where kmax is the maximum message symbol length specified by said system, wherein said transforming partitions said message M into (Mn, . . . , M2, M1) and permutates (Mn, . . . , M2, M1) to (M1n, . . . , M12, M11), where Mi includes one or more symbols and is an ordered symbol segment within M, 1<=i<=n, where said partitioning is characterized by predetermined (sn, . . . , s2, s1), where si is the number of symbols in Mi, 1<=i<=n,said permutating is characterized by predetermined (pn, . . . , p2, p1), where pi is the sequence position of Mi in (M1n, . . . , M12, M11), 1<=i<=n,wherein a secret key either explicitly or implicitly characterizes both said partitioning information (sn, . . . , s2, s1) and said permutating information (pn, . . . , p2, p1),C. a decoding means for receiving C from said channel and for permutating C using said secret key to obtain message M.
  • 2. A system according to claim 1 wherein at least one of said transforming means comprises: a first memory buffer means for receiving and storing each symbol of a first digital signal representative of said signal-to-be-permutated in a predetermined order specified by said communications system, wherein the output of said first memory buffer means is in a predetermined order specified by said system, anda first register means for receiving and storing a second digital signal representative of said secret key, anda second memory buffer means for storing symbols of said ciphertext C in a predetermined order specified by said system upon transform completion, wherein output from said first memory buffer means is written into said second memory buffer means at the location determined by a symbol address signal, anda second register means for receiving and storing said symbol address signal, anda finite state machine means for generating said symbol address signal from said second digital signal and for writing said symbol address signal into said second register means.
  • 3. A communications system for transferring message signals, comprising a plurality of terminals, wherein a first terminal includes means for encoding a message signal M for transmission from said first terminal to a second terminal, wherein M is an ordered sequence of symbols, wherein said first terminal includes means for transforming said message signal M for transmission to said second terminal, wherein said transforming means includes steps of: means for transforming said signal M into one or more message block signals M″, denoted as (mk, . . . , m2, m1), k<=kmax, wherein kmax is the maximum message symbol length specified by said system,means for partitioning each of said message block signals M″ into (Mn, . . . , M2, M1), wherein Mi includes one or more symbols and is an ordered symbol segment within M″, 1<=i<=n, wherein saidpartitioning is characterized by predetermined (sn, s2, s1), where si is the number of symbols in M1, 1<=i<=n, means for permutating (Mn, . . . , M2, M1) to (M1n, . . . , M12, M11), thereby obtaining a ciphertext C, wherein said permutating is characterized by predetermined (pn, . . . , p12, p11), where pi is the sequence position of Mi in (M1n, . . . , M12, M11), 1<=i<=n,wherein a secret key either explicitly or implicitly characterizes both said partitioning information (sn, . . . , s2, s1) and said permutating information (pn, . . . , p2, p1).
  • 4. A system according to claim 3 wherein at least one of said transforming means comprises: a first memory buffer means for receiving and storing each symbol of a first digital signal representative of said signal-to-be-permutated in a predetermined order specified by said communications system, wherein the output of said first memory buffer means is in a predetermined order specified by said system, anda first register means for receiving and storing a second digital signal representative of said secret key, anda second memory buffer means for storing symbols of said ciphertext C in a predetermined order specified by said system upon transform completion, wherein output from said first memory buffer means is written into said second memory buffer means at the location determined by a symbol address signal, anda second register means for receiving and storing said symbol address signal, anda finite state machine means for generating said symbol address signal from said second digital signal and for writing said symbol address signal into said second register means.
  • 5. The system of claim 3 further comprising: means for transmitting said ciphertext signals C from said first terminal to said second terminal, wherein said second terminal includes means for receiving said ciphertext signals C from said channel and for decoding said ciphertext C to said message block signals M″ using said secret key and means for transforming said block signals M″ back to said message M.
  • 6. A cryptographic communications system, comprising: A. a communications channel;B. an encoding means for transforming a message signal M to a ciphertext signal C for transmitting on said channel, where said message M is an ordered sequence of symbols, denoted as (mk, . . . , m2, m1), k<=kmax where kmax is the maximum message symbol length specified by said system,wherein said transforming comprises steps of: 1. means for partitioning said message M into (Mn, . . . , M3, M2, M1), where Mi includes one or more symbols and is an ordered symbol segment within M, 1<=i<=n, wherein said partitioning is characterized by predetermined (sn, . . . , s2, s1), where si is the number of symbols in Mi, 1<=i<=n,2. means for permutating (Mn, . . . , M3, M2, M1) into (M1n, . . . , M12, M11), according to predetermined permutation information (pn, . . . , p2, p1), where pi is the sequence position of Mi in (M1n, . . . , M12, M11), 1<=i<=n,3. means for repeating step 1 and step 2 on said symbol sequence M1i recursively, in a predetermined manner not necessarily same as previous partition and permutation, until stopped by said system, 1<=i<=n,wherein step 3 may not be necessarily required as specified by said system,wherein a secret key characterizes all levels of partition information by (sn, . . . , s2, s1) and permutation information (pn, . . . , p2, p1),C. a decoding means for receiving C from said channel and for transforming ciphertext C back to message M using said secret key.
  • 7. A system according to claim 6 wherein at least one of said transforming means comprises: a first memory buffer means for receiving and storing each symbol of a first digital signal representative of said signal-to-be-permutated in a predetermined order specified by said communications system, wherein the output of said first memory buffer means is in a predetermined order specified by said system, anda first register means for receiving and storing a second digital signal representative of said secret key, anda second memory buffer means for storing symbols of said ciphertext C in a predetermined order specified by said system upon transform completion, wherein output from said first memory buffer means is written into said second memory buffer means at the location determined by a symbol address signal, anda second register means for receiving and storing said symbol address signal, anda finite state machine means for generating said symbol address signal from said second digital signal and for writing said symbol address signal into said second register means.
  • 8. A communications system for transferring message signals, comprising a plurality of terminals, wherein a first terminal includes means for encoding a message signal M for transmission from said first terminal to a second terminal, wherein M is an ordered sequence of symbols, wherein said first terminal includes means for transforming said message signal M to a ciphertext C for transmission to said second terminal, wherein said transforming means includes steps of: means for transforming said message M to one or more message block signals M″, denoted as (mk, . . . , m2, m1), where k<=kmax, wherein kmax is the maximum message symbol length specified by said system,means for transforming message block signals M″, wherein said transforming comprises the sub-steps of: 1. means for partitioning said message block signal M″ into (Mn, . . . , M2, M1), where Mi includes one or more symbols and is an ordered symbol segment within M″, where 1<=i<=n, wherein said partitioning is characterized by predetermined (sn, . . . , s2, s1), where si is the number of symbols in Mi, where 1<=i<=n,2. means for permutating (Mn, . . . , M3, M2, M1) into (M1n, . . . , M12, M11), according to predetermined permutation information (pn, . . . , p2, p1), where pi is the sequence position of Mi in (M1n, . . . , M12, M11), 1<=i<=n,3. means for repeating step 1 and step 2 on said symbol sequence M1i recursively, in a predetermined manner not necessarily same as previous partition and permutation, until stopped by said system, where 1<=i<=n,wherein said step 3 may not be necessarily required as specified by said system,wherein a secret encryption key characterizes all levels of partition information (sn, . . . , s2, s1) and permutation information (pn, . . . , p2, p1).
  • 9. A system according to claim 8 wherein at least one of said transforming means comprises: a first memory buffer means for receiving and storing each symbol of a first digital signal representative of said signal-to-be-permutated in a predetermined order specified by said communications system, wherein the output of said first memory buffer means is in a predetermined order specified by said system, anda first register means for receiving and storing a second digital signal representative of said secret key, anda second memory buffer means for storing symbols of said ciphertext C in a predetermined order specified by said system upon transform completion, wherein output from said first memory buffer means is written into said second memory buffer means at the location determined by a symbol address signal, anda second register means for receiving and storing said symbol address signal, anda finite state machine means for generating said symbol address signal from said second digital signal and for writing said symbol address signal into said second register means.
  • 10. The system of claim 8 further comprising: means for transmitting said ciphertext signals C from said first terminal to said second terminal, wherein said second terminal includes means for receiving said ciphertext C from said channel and for decoding said ciphertext signals C to said message block signals M″ using said secret key and means for transforming said message block signals M″ back to said message M.
  • 11. A secure distributed data storage system comprising a communications channel and a plurality of terminals, including a first terminal and a second terminal and n storage terminals, wherein said first terminal comprises: means for transforming said data M to a ciphertext C,said transforming comprising the further steps of 1. means for partitioning said data M into (Mn, . . . , M2, M1), wherein said partitioning is characterized by predetermined (sn, . . . , s2, s1), where si is the number of symbols in Mi, 1<=i<=n,2. means for permutating (Mn, M2, M1) to (M1n, . . . , M12, M11), where said permutating is characterized by predetermined (pn, . . . , p2, p1), where pi is the symbol sequence position of Mi in (M1n, . . . , M12, M11), 1<=i<=n,3. means for repeating step 1 and step 2 on said symbol sequence M1i recursively, in a predetermined manner not necessarily same as previous partition and permutation, until stopped by said system, 1<=i<=n,wherein, step 3 may not be neccesarily required as specified by said system,wherein a secret key either explicitly or implicitly corresponds to all levels of said partitioning information (sn, . . . , s2, s1) and said permutating information (pn, . . . , p2, p1).means for transferring said permutated symbol sequences M1n, . . . , M12 and M11 to said n storage terminals respectively over said channel.each of said n storage terminals includes means for receiving one of said n permutated symbol sequences and storing received symbol sequence on said storage terminal.said second terminal includes means for receiving said n permutated symbol sequences from said n storage terminals and for decoding said n permutated symbol sequences to said data block M using said secret key.
  • 12. A system according to claim 11 wherein at least one of said transforming means comprises: a first memory buffer means for receiving and storing each symbol of a first digital signal representative of said signal-to-be-permutated in a predetermined order specified by said communications system, wherein the output of said first memory buffer means is in a predetermined order specified by said system, anda first register means for receiving and storing a second digital signal representative of said secret key, anda second memory buffer means for storing symbols of said ciphertext C in a predetermined order specified by said system upon transform completion, wherein output from said first memory buffer means is written into said second memory buffer means at the location determined by a symbol address signal, anda second register means for receiving and storing said symbol address signal, anda finite state machine means for generating said symbol address signal from said second digital signal and for writing said symbol address signal into said second register means.
  • 13. A secure distributed data storage system comprising a communications channel and a plurality of terminals, wherein a first terminal includes: means for encoding a data M for transmission from said first terminal to n storage terminals, wherein M is an ordered sequence of symbols, wherein said first terminal includesmeans for transforming said data M for transmission to n storage terminals, wherein said transforming means includes steps of: means for transforming said data M into one or more data block signals M″, denoted as (mk, . . . , m2, m1), k<=kmax, wherein kmax is the maximum data symbol length specified by said system,means for transforming each of said data block M″ to a ciphertext C, said transforming comprising the further steps of 1. means for partitioning each of said data block M″ into (Mn, . . . , M2, M1), wherein said partitioning is characterized by predetermined (sn, . . . , s2, s1), where si is the number of symbols in Mi, 1<=i<=n,2. means for permutating (Mn, . . . , M2, M1) to (M1n, . . . , M12, M11), where said permutating is characterized by predetermined (pn, . . . , p2, p1), where pi is the symbol sequence position of Mi in (M1n, . . . , M12, M11), 1<=i<=n,3. means for repeating step 1 and step 2 on said symbol sequence M1i recursively, in a predetermined manner not necessarily same as previous partition and permutation, until stopped by said system, 1<=i<=n,wherein, step 3 may not be neccesarily required as specified by said system,wherein a secret key either explicitly or implicitly corresponds to all levels of said partitioning information (sn, . . . , s2, s1) and said permutating information (pn, . . . , p2, p1).means for transferring said n permutated symbol sequences M1n, . . . , M12, M11 to said n storage terminals respectively over said channel.
  • 14. A system according to claim 13 wherein at least one of said transforming means comprises: a first memory buffer means for receiving and storing each symbol of a first digital signal representative of said signal-to-be-permutated in a predetermined order specified by said communications system, wherein the output of said first memory buffer means is in a predetermined order specified by said system, anda first register means for receiving and storing a second digital signal representative of said secret key, anda second memory buffer means for storing symbols of said ciphertext C in a predetermined order specified by said system upon transform completion, wherein output from said first memory buffer means is written into said second memory buffer means at the location determined by a symbol address signal, anda second register means for receiving and storing said symbol address signal, anda finite state machine means for generating said symbol address signal from said second digital signal and for writing said symbol address signal into said second register means.
  • 15. The system of claim 13 further comprising: said n storage terminals wherein each of said n storage terminals includes means for receiving one of said n permutated symbol sequences from said channel and storing received symbol sequence on said storage terminal.a second terminal including means for receiving said n permutated symbol sequences from said n storage terminals over said channel and for decoding said n permutated symbol sequences to said data block signals M″ using said secret key and means for transforming said data block signals M″ back to said data M.
  • 16. A method for transferring a message M in a communications system having a plurality of terminals, comprising the steps of: encoding a message signal M for transmission from a first terminal to a second terminal, wherein M is an ordered sequence of symbols, said encoding step including the sub-steps of transforming said message signal M to one or more message block signals M″, each of block signals M″ being representative of a portion of said message M, denoted as (mk, . . . , m2, m1), k<=kmax, where kmax is the maximum message symbol length specified by said system,transforming each of said block signals to a ciphertext signal C, said transforming comprising: partitioning each of said message block signals M″ into (Mn, . . . , M2, M1), wherein said partitioning is characterized by predetermined (sn, . . . , s2, s1, where si is the number of symbols in Mi, 1<=i<=n,permutating (Mn, . . . , M2, M1) to (M1n, . . . , M12, M11), where said permutating is characterized by predetermined (pn, . . . , p2, p1), where pi is the symbol sequence position of Mi in (M1n, . . . , M12, M11), 1<=i<=n,wherein a secret key either explicitly or implicitly corresponds to both said partitioning information (sn, . . . , s2, s1) and said permutating information (pn, . . . , p2, p1).
  • 17. The method of claim 16 comprising the further steps of: transmitting said ciphertext signals C to said second terminal, and decoding said ciphertext signals C to said message M, said decoding step including: transforming said ciphertext signals C to said block signals M″ using said secret key,transforming block signals M″ back to said message signal M.
  • 18. A method for transferring a message M in a communications system having a plurality of terminals, comprising the steps of: encoding a message signal M for transmission from a first terminal to a second terminal, wherein M is an ordered sequence of symbols, said encoding step including the sub-steps of transforming said message signal M to one or more message block signals M″, each of block signals M″ being representative of a portion of said message M, denoted as (mk, . . . , m2, m1), k<=kmax, where kmax is the maximum message symbol length specified by said system,transforming each of said block signals M″ to a ciphertext signal C, said transforming comprising the further steps of 1. partitioning each of said message block signals M″ into (Mn, . . . , M3, M2, M1), where Mi includes one or more symbols and is an ordered symbol segment within M, 1<=i<=n, wherein said partitioning is characterized by predetermined (sn, . . . , s2, s1), where si is the number of symbols in Mi, 1<=i<=n,2. permutating (Mn, . . . , M3, M2, M1) into (M1n, . . . , M12, M11), according to predetermined permutation information (pn, . . . , p2, p1), where pi is the sequence position of Mi in (M1n, . . . , M12, M11), 1<=i<=n,3. repeating step 1 and step 2 on said symbol sequence M1i recursively, in a predetermined manner not necessarily same as previous partition and permutation, until stopped by said system, 1<=i<=n,wherein said step 3 may not be necessarily required as specified by said system,wherein a secret encryption key characterizes all levels of partition and permutation performed on said block signals M″ to obtain said ciphertext signals C.
  • 19. The method of claim 18 comprising the further steps of: transmitting said ciphertext signals C to said second terminal, anddecoding said ciphertext signals C to said message M, said decoding step including: transforming said ciphertext signals C to said block signals M″ using said secret encryption key,transforming block signals M″ back to said message signal M.
  • 20. A method for storing a data M in a distributed storage system having a plurality of terminals, comprising the steps of: encoding a data M for transmission from a first terminal to n storage terminals, wherein M is an ordered sequence of symbols, said encoding step including the sub-steps of transforming said data M to one or more data blocks M″, each of data blocks M″ being a portion of said data M and denoted as (mk, . . . , m2, m1), k<=kmax, where kmax is the maximum data symbol length specified by said system,transforming each of said data blocks M″ to a ciphertext C, said transforming comprising the further steps of 1. partitioning each of said data blocks M″ into (Mn, . . . , M2, M1), wherein said partitioning is characterized by predetermined (sn, . . . , s2, s1), where si is the number of symbols in Mi, 1<=i<=n,2. permutating (Mn, . . . , M2, M1) to (M1n, . . . , M12, M11), where said permutating is characterized by predetermined (pn, . . . , p2, p1), where pi is the symbol sequence position of Mi in (M1n, . . . , M12, M11), 1<=i<=n,3. repeating step 1 and step 2 on said symbol sequence M1 recursively, in a predetermined manner not necessarily same as previous partition and permutation, until stopped by said system, 1<=i <=n,wherein, step 3 may not be neccesarily required as specified by said system,wherein a secret key either explicitly or implicitly corresponds to all levels of said partitioning information (sn, . . . , s2, s1) and said permutating information (pn, . . . , p2, p1).transmitting said permutated symbol sequences M1n, . . . , M12 and M11 to said n storage terminals respectively, and storing on said n storage terminals respectively.
  • 21. The method of claim 20 comprising the further steps of: transmitting said n symbol sequences M1n, . . . , M12 and M11 from said n storage terminals respectively to a second terminal,decoding said n symbol sequences M1n, . . . , M12 and M11 to said data M, said decoding step includes: transforming said n permutated symbol sequences M1n, . . . , M12 and M11 to said block data M″ using said secret key,transforming said block data M″ back to said data M.
CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims the benefit of provisional patent application No. 61/065,591 filed on date Feb. 13, 2008, “A System and Method For Cryptographic Communications Using Permutation”.

Provisional Applications (1)
Number Date Country
61065591 Feb 2008 US