Google Groups no longer supports new Usenet posts or subscriptions. Historical content remains viewable.
Dismiss

New encryption algorithm

8 views
Skip to first unread message

Tony Zelenoff

unread,
Aug 14, 1999, 3:00:00 AM8/14/99
to
THE ENCRYPTION SYSTEM

The new information conversion system was developed, that can be used in
cryptography, computer technology, cybernetics, encoding, information
systems and data transmissions systems. An open text can be encoded to the
encrypted text in any numeration system. One of this method applications is
onekey streaming encryption system, that can to work in following modes:

- Synchronous mode
- Selfsynchronizing mode
- The mode of the time-depending system with memory

The properties and operation modes of the encryption system are determined
by key structure.
There can be encryption systems with following properties:

-The key number can be as large as you like.
-The m-digits symbols of open text are input to the entry of the algorithm.
On the output of the algorithm there are formed the m-digits symbols of
encrypted text. The encrypted text length is equal the open text length. In
the binary numeration system the m-digits symbols are the m-bit symbols
(m=1,2,4,8).
-The decryption is carried out in reverse order from the end of encrypted
text.
-The system has the initial state. The system state is a function of the
previous system state and current input symbol of the open text.
-The output symbol of encrypted text is a complex function of the current
input symbol and all the previous input symbols of the open text, all the
key elements and the initial system state.
-The speed of the encryption/decryption is key length independed.
-Multiple encryption with different keys using is non-commutative.
-The results of multiple encryption with different keys using or with one
key using can not be achieved by single encryption.
-The same open text sequences after encryption are represented by different
encrypted text sequences of the same length.
-Cryptographic analysis: the full all keys examination.
-Authentication of encrypted data after storing and transmitting can be made
at decryption with as little probability of non-revealing changes as you
want. The system of authentication is included into the encryption system.
The authenticator is not classified.
-In the encryption the hidden randomisation can be used: the arbitrary
sequences are entered into an source open text, thus the enlarged open text
is formed. Then the enlarged open text is encrypted. The length of the
resulting encrypted text is the same as the initial open text length.

This method can be effectively used to develop encoding/encryption system
with an error correction. The method include the descriptions of six
different encryption/decryption algorithms with a lot of examples that
illustrate their work.
With using C/C++ languages for DOS there were written the programs for
developing keys by single encryption algorithm and the programs for
encryption/decryption:

-by algorithm;
-with data authentication;
-with hidden randomisation.

On the base of these programs there were written three new ones , that using
feedback on encrypted text (open text symbols modification by encrypted text
symbols).
In the program with hidden randomization, the random number generator plays
a role of second classified key, that strengthen cryptographic steadiness of
the algorithm.
There is the algorithm for generation of random number sequences with as
long period as possible. The formed random numbers have an even
distribution.

The author of this invention - Jury Andreevich Nedosekin will sell this
development by contract.
If you want to know more about method based on this invention, send a
message to this e-mail:
tony...@chat.ru


yaz...@gmail.com

unread,
Feb 12, 2013, 6:27:54 AM2/12/13
to
Encryption algorithm Yaz
Abstract

This paper provides an explanation for the encryption algorithm Yaz In terms of its inception , development , the most important features and applied through VB.NET 2008, and explain how the encryption of all the world's languages through Binary Code and ASCII Code letter encryption and Hex Code for file encryption , Through letter fragmentation from 2 to 8 parts and the method of forming composite symbols through matrices used in the algorithm.

More And Download : http://yazsys.com/encryptions.aspx
0 new messages