Method Of Manufacturing A Security Device
Original Publication Date: 1979-Jul-01
Included in the Prior Art Database: 2005-Feb-20
In order to provide security for data stored in a computer by a computer user, several encrypting algorithms have been devised which combine the data to be secured with a key to obtain a binary bit string of information which is not decipherable, even by a person knowing the algorithm, unless the key is also known. Pseudo noise sequences and linear feedback shift register sequences are elementary examples of such algorithms. In order to enhance security when the data is transmitted over communication lines, several stages of encryption, each using different keys and perhaps different algorithms, may be employed.