[go: up one dir, main page]

WO2024218781A1 - Recursive time encryption with cryptography - Google Patents

Recursive time encryption with cryptography Download PDF

Info

Publication number
WO2024218781A1
WO2024218781A1 PCT/IN2023/050389 IN2023050389W WO2024218781A1 WO 2024218781 A1 WO2024218781 A1 WO 2024218781A1 IN 2023050389 W IN2023050389 W IN 2023050389W WO 2024218781 A1 WO2024218781 A1 WO 2024218781A1
Authority
WO
WIPO (PCT)
Prior art keywords
encryption
key
text
strategically
cryptography
Prior art date
Application number
PCT/IN2023/050389
Other languages
French (fr)
Inventor
Parth Shah
Original Assignee
Parth Shah
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Parth Shah filed Critical Parth Shah
Priority to PCT/IN2023/050389 priority Critical patent/WO2024218781A1/en
Publication of WO2024218781A1 publication Critical patent/WO2024218781A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0872Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/04Masking or blinding
    • H04L2209/046Masking or blinding of operations, operands or results of the operations

Definitions

  • the present invention is an Encryption that can used to protect data and communication from unauthorized access, modification, and theft and which in any case cannot be reverse engineered.
  • time-encryption is important:
  • Encryption can be used to keep sensitive information confidential. This is important for businesses, governments, and individuals who need to protect sensitive data, such as financial information, personal information, trade secrets, or national security secrets.
  • Encryption can be used to protect individual privacy. For example, end-to-end encryption in messaging apps ensures that only the sender and recipient can read the messages, preventing governments or hackers from intercepting and reading them.
  • Encryption can be used to verify the authenticity of data and communication.
  • Digital signatures and certificates are examples of encryption techniques used for authentication.
  • Integrity Encryption can be used to ensure that data and communication are not tampered with or altered during transmission. This is important for ensuring the accuracy and reliability of information.
  • Encryption is often required to comply with laws, regulations, and industry standards related to data privacy and security.
  • encryption is an essential tool for protecting data and communication from cyber threats and maintaining the confidentiality, privacy, authenticity, integrity, and compliance of information.
  • Fig.1 illustrates an embodiment of random key generation based on time
  • Fig.2 illustrates an embodiment of the process of encoding plain text to unreadable text i.e., the encryption process
  • Fig. 3 illustrates an embodiment of strategic attachment of a key to the plain text
  • Fig.4 illustrates an embodiment of sselling conversion of plain text to cipher text
  • Fig. 5 illustrates an embodiment of sselling conversion of cipher text to masked encryption text (unreadable text).
  • a random key based on timestamp is generated individually for each plain text dynamically.
  • the key then is broken into sub keys using absolute sum parameter.
  • the plain text is processed through n+1 layers dynamically.
  • the key is attached strategically and is then processed recursively. Once the text is fully encrypted, it is then masked using custom cryptographic initialization.
  • SUBSTITUTE SHEET (RULE 26) As shown in Fig. 3, the Key(n) is strategically added to the plain text based on odd/even value of the key. If the key is odd, it is added to the start of the text and otherwise if not.
  • Fig. 4 represents the core encoding of processed plain text to cipher text.
  • Each character of the plain text is converted to its respective ASCII value based on the chart shown on the right end of the figure shown.
  • the final value formed is the cipher text.
  • Fig 5 shows final step of encryption i.e., Mask.
  • the cipher text generated using steps shown in Fig.4 is then processed through a dynamic cryptographic conversion using custom initialised values.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

Encryption is the process of converting plain text or other types of data into encoded, unreadable text that can only be deciphered by authorized parties. The process of encryption involves the use of algorithms, keys, and protocols that scramble the original data into ciphertext, which can be safely transmitted or stored. Even if a messaging app uses encryption, it may not be secure if it has vulnerabilities in its code. For example, in 2018, a messaging app that uses end-to-end encryption, announced that a security flaw had allowed hackers to install spyware on users' phones (The Guardian, 2019). This spyware could be used to access the users' messages, photos, and other personal information. The time encryption uses a key created using timestamp and divides it further into many keys which are recursively added and encrypted to form a strong cipher text which is further masked using cryptography.

Description

Title: Recursive Time Encryption with Cryptography
The present invention is an Encryption that can used to protect data and communication from unauthorized access, modification, and theft and which in any case cannot be reverse engineered. Here are some of the reasons why time-encryption is important:
Confidentiality: Encryption can be used to keep sensitive information confidential. This is important for businesses, governments, and individuals who need to protect sensitive data, such as financial information, personal information, trade secrets, or national security secrets.
Privacy: Encryption can be used to protect individual privacy. For example, end-to-end encryption in messaging apps ensures that only the sender and recipient can read the messages, preventing governments or hackers from intercepting and reading them.
Authentication: Encryption can be used to verify the authenticity of data and communication. Digital signatures and certificates are examples of encryption techniques used for authentication.
Integrity: Encryption can be used to ensure that data and communication are not tampered with or altered during transmission. This is important for ensuring the accuracy and reliability of information.
Compliance: Encryption is often required to comply with laws, regulations, and industry standards related to data privacy and security.
Overall, encryption is an essential tool for protecting data and communication from cyber threats and maintaining the confidentiality, privacy, authenticity, integrity, and compliance of information.
Statement of invention
"Recursive Time Encryption with Cryptography" effectively will encrypt every message with a dynamic encryption key generated every millisecond.
Brief Description of The Drawings
1
SUBSTITUTE SHEET (RULE 26) It will be convenient to further describe the present invention with respect to the accompanying drawings that illustrate possible arrangements of the invention. Other arrangements of the invention are possible, and consequently the particularity of the accompanying drawings is not intended to be limiting of the present invention.
Fig.1 illustrates an embodiment of random key generation based on time
Fig.2 illustrates an embodiment of the process of encoding plain text to unreadable text i.e., the encryption process
Fig. 3 illustrates an embodiment of strategic attachment of a key to the plain text
Fig.4 illustrates an embodiment of showcasing conversion of plain text to cipher text
Fig. 5 illustrates an embodiment of showcasing conversion of cipher text to masked encryption text (unreadable text).
Detailed description of the invention
Before explaining the present invention in detail, it is to be understood that the invention is not limited in its application to the details of the construction and arrangement of parts illustrated in the accompanying drawings. The invention is capable of other embodiments, as depicted in different figures as described above and of being practiced or carried out in a variety of ways. It is to be understood that the phraseology and terminology employed herein is for the purpose of description and not of limitation.
Fig.1
As shown in Fig.1, a random key based on timestamp is generated individually for each plain text dynamically. The key then is broken into sub keys using absolute sum parameter.
Fig.2
As shown in Fig. 2 the plain text is processed through n+1 layers dynamically. In each round of the encryption, the key is attached strategically and is then processed recursively. Once the text is fully encrypted, it is then masked using custom cryptographic initialization.
Fig.3
2
SUBSTITUTE SHEET (RULE 26) As shown in Fig. 3, the Key(n) is strategically added to the plain text based on odd/even value of the key. If the key is odd, it is added to the start of the text and otherwise if not.
Fig.4
Fig. 4 represents the core encoding of processed plain text to cipher text. Each character of the plain text is converted to its respective ASCII value based on the chart shown on the right end of the figure shown. The final value formed is the cipher text.
Fig.5
The final figure i.e., Fig 5 shows final step of encryption i.e., Mask. The cipher text generated using steps shown in Fig.4 is then processed through a dynamic cryptographic conversion using custom initialised values.
Described above, only the preferred embodiment of the present invention only, not for the present invention any formal restrictions, although the invention has been revealed as the preferred embodiment, however, not intended to limit the present invention, any skilled in the art technical staff, without departing from the scope of the present invention within the program, can be used when the contents of the above disclosed techniques make little changes or substitutions and changes in the equivalent embodiments, but any aspect of the invention without departing from the content, according to the present invention, technical substance of any of the above embodiments when taken in a simple modification, equivalent variation and modification as would fall within the scope of the present invention the technical solution.
SUBSTITUTE SHEET (RULE 26)

Claims

Claims
1. The Present invented technique that recursively encrypts plain text when strategically added with a part of generated key which is then further added and encrypted to generate a strong and secure cipher text. Furthermore, the cipher text is masked using cryptography using custom preinitialized values.
2. The system as claimed in claim 1 wherein the system is random key generation based on timestamp.
3. The system as claimed in claim 1 wherein the system is multiple sub-keys broken from main key using absolute sum of the key until the value of sum is less than 9.
4. The system as claimed in claim 1 wherein further comprising, the key is added to plain text strategically which is then encrypted. The next key part is added strategically to the new plain text generated which is further encrypted forming recursive addition and encryption until key(n) K(n) is processed.
5. The system as claimed in claim 1 wherein the cipher text generated recursively is masked to hide its cipher value. The said value is masked using cryptography with pre-initialized dynamic values.
6. The system as claimed in claim 1 wherein the dynamic cryptographic values of the characters are determined using timestamp and base value of the custom initialization.
7. The system as claimed in claim 1 wherein the system works as a combination of processes strategically processed together in any order of any nature in any case whatsoever.
PCT/IN2023/050389 2023-04-21 2023-04-21 Recursive time encryption with cryptography WO2024218781A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/IN2023/050389 WO2024218781A1 (en) 2023-04-21 2023-04-21 Recursive time encryption with cryptography

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/IN2023/050389 WO2024218781A1 (en) 2023-04-21 2023-04-21 Recursive time encryption with cryptography

Publications (1)

Publication Number Publication Date
WO2024218781A1 true WO2024218781A1 (en) 2024-10-24

Family

ID=93152280

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IN2023/050389 WO2024218781A1 (en) 2023-04-21 2023-04-21 Recursive time encryption with cryptography

Country Status (1)

Country Link
WO (1) WO2024218781A1 (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008108764A2 (en) * 2007-03-06 2008-09-12 Oxford William V Method and system for a recursive security protocol for digital copyright control
US20130010963A1 (en) * 2011-07-07 2013-01-10 Farrugia Augustin J Multiplicative splits to protect cipher keys

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008108764A2 (en) * 2007-03-06 2008-09-12 Oxford William V Method and system for a recursive security protocol for digital copyright control
US20130010963A1 (en) * 2011-07-07 2013-01-10 Farrugia Augustin J Multiplicative splits to protect cipher keys

Similar Documents

Publication Publication Date Title
Aleisa A Comparison of the 3DES and AES Encryption Standards
AbuTaha et al. Survey paper: cryptography is the science of information security
Biswas et al. A systematic study on classical cryptographic cypher in order to design a smallest cipher
Erondu et al. An encryption and decryption model for data security using vigenere with advanced encryption standard
Sharma et al. Cryptography Algorithms and approaches used for data security
Venkateswaran et al. Information Security: Text Encryption and Decryption with poly substitution method and combining the features of Cryptography
WO2024218781A1 (en) Recursive time encryption with cryptography
Achary Cryptography and network security: an introduction
Kako Classical Cryptography for Kurdish Language
Kaur A Review: Network Security Based On Cryptography & Steganography Techniques.
Arshad et al. Hill Matrix and Radix-64 Bit Algorithm to Preserve Data Confidentiality.
US20180048629A1 (en) Expression and Method to Send and Receive Text Messages Encrypted For The Targeted Receiving User to Render Eavesdropping Useless.
Mohammed et al. Cryptography and Network Security in Modern Era
Chandurkar et al. Case Study on Cryptography
Rahmani Cryptographic algorithms and protocols
Paderes Cross-Crypto Algorithm: Leveraging the Features of the ROT13 and Vigenere Ciphers
Singh A Review Paper on Network Security and Cryptography
Osaghae Replication of ciphertext in cryptographic system
Cernov Security in Computer Networks
Shodiq et al. A Literature Review on the Role of Mathematics in Enhancing Cyber Security Through Data Encryption
Madhukar Cryptography technology with network security
Hombrebueno et al. Symmetric cryptosystem based on data encryption standard integrating HMAC and digital signature scheme implemented in multi-cast messenger application
Choudhary A Short Survey on Comparative Study of Modern Cryptography Approach
Nabeel et al. CRYPTOGRAPHIC TECHNIQUE FOR COMMUNICATION SYSTEM
Rana A brief study on cryptography

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23933949

Country of ref document: EP

Kind code of ref document: A1