Browse Prior Art Database

Password Generation for Encrypting by Exclusive ORing

IP.com Disclosure Number: IPCOM000075060D
Original Publication Date: 1971-Jul-01
Included in the Prior Art Database: 2005-Feb-24
Document File: 2 page(s) / 49K

Publishing Venue

IBM

Related People

Soldini, JF: AUTHOR

Abstract

This technique codes data through a password which renders the data unintelligible to anyone accessing it without the password, and assures privacy of proprietary data even when the data is out of the owner's physical control.

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 77% of the total text.

Page 1 of 2

Password Generation for Encrypting by Exclusive ORing

This technique codes data through a password which renders the data unintelligible to anyone accessing it without the password, and assures privacy of proprietary data even when the data is out of the owner's physical control.

The technique is that of Exclusive ORing the password, or portions of the password, against some portion of the data, and then making two uses of the result: first, the result becomes a portion of the final coded data; second the result becomes the new password to be used to code the next portion of the data. The coding is reversible, provided that the original form of the password is available. The fact that the password in changing as the data is coded, renders the results very hard to decipher by inspection alone.

Data to be protected is illustrated in Fig. 1 as divided into fields of the same length as the portion of the password to be used in the Exclusive ORing. These divisions are transparent to all but the encoding routine, which divides the data according to the password length.

There is no requirement that the data fields be consecutive or contiguous, but to simplify this example the fields will be processed consecutively. The entire password will also be employed, although in practice portions of the password could be used to indicate the order that the fields are to be coded as well as the portion of the password to be used in Exclusive ORing.

Fig. 2 illustrates the coding pr...