Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Stack Processes for Increased Encryption Security

IP.com Disclosure Number: IPCOM000119833D
Original Publication Date: 1991-Mar-01
Included in the Prior Art Database: 2005-Apr-02
Document File: 2 page(s) / 68K

Publishing Venue

IBM

Related People

Ouchi, NK: AUTHOR

Abstract

Disclosed is an encryption process that creates highly secure messages using two successive chained processes where a STACK is used between the first and second chained processes to reverse the direction of the chaining.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 56% of the total text.

Stack Processes for Increased Encryption Security

      Disclosed is an encryption process that creates highly
secure messages using two successive chained processes where a STACK
is used between the first and second chained processes to reverse the
direction of the chaining.

      A stack is a Last-In/First-Out queue that may be used to
reverse the sequence of a string of data.  The Data Encryption
Standard (DES) is a chained encryption process. That is, the result
of a current operation is dependent on all of the data processed to
this point.  Thus, it is easy to decode a chained process in the
right direction but very difficult in the wrong direction.  In the
right direction the process works with "past" data; in the wrong
direction, the process must predict the "future".  In the DES
algorithm, the first eight bytes are encrypted with a key. The next
eight bytes are encrypted with a permutation of the previous
encrypted bytes and the key.  This is continued, chained, for all
subsequent data.  Thus, to decipher a given byte, all of the previous
bytes must be known.  However, the first eight bytes are the easiest
to decode and is a known weakness of any chained code.  There are
other chained processes, such as data compaction, that can be used as
the first process in encryption.  Disclosed is an encryption process
that uses one or more chained processes, followed by a stack to
reverse the chaining, followed by a DES encryption process.  The
decryption pr...