WO2024218781A1 - Recursive time encryption with cryptography - Google Patents
Recursive time encryption with cryptography Download PDFInfo
- Publication number
- WO2024218781A1 WO2024218781A1 PCT/IN2023/050389 IN2023050389W WO2024218781A1 WO 2024218781 A1 WO2024218781 A1 WO 2024218781A1 IN 2023050389 W IN2023050389 W IN 2023050389W WO 2024218781 A1 WO2024218781 A1 WO 2024218781A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- encryption
- key
- text
- strategically
- cryptography
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0872—Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
- H04L2209/046—Masking or blinding of operations, operands or results of the operations
Definitions
- the present invention is an Encryption that can used to protect data and communication from unauthorized access, modification, and theft and which in any case cannot be reverse engineered.
- time-encryption is important:
- Encryption can be used to keep sensitive information confidential. This is important for businesses, governments, and individuals who need to protect sensitive data, such as financial information, personal information, trade secrets, or national security secrets.
- Encryption can be used to protect individual privacy. For example, end-to-end encryption in messaging apps ensures that only the sender and recipient can read the messages, preventing governments or hackers from intercepting and reading them.
- Encryption can be used to verify the authenticity of data and communication.
- Digital signatures and certificates are examples of encryption techniques used for authentication.
- Integrity Encryption can be used to ensure that data and communication are not tampered with or altered during transmission. This is important for ensuring the accuracy and reliability of information.
- Encryption is often required to comply with laws, regulations, and industry standards related to data privacy and security.
- encryption is an essential tool for protecting data and communication from cyber threats and maintaining the confidentiality, privacy, authenticity, integrity, and compliance of information.
- Fig.1 illustrates an embodiment of random key generation based on time
- Fig.2 illustrates an embodiment of the process of encoding plain text to unreadable text i.e., the encryption process
- Fig. 3 illustrates an embodiment of strategic attachment of a key to the plain text
- Fig.4 illustrates an embodiment of sselling conversion of plain text to cipher text
- Fig. 5 illustrates an embodiment of sselling conversion of cipher text to masked encryption text (unreadable text).
- a random key based on timestamp is generated individually for each plain text dynamically.
- the key then is broken into sub keys using absolute sum parameter.
- the plain text is processed through n+1 layers dynamically.
- the key is attached strategically and is then processed recursively. Once the text is fully encrypted, it is then masked using custom cryptographic initialization.
- SUBSTITUTE SHEET (RULE 26) As shown in Fig. 3, the Key(n) is strategically added to the plain text based on odd/even value of the key. If the key is odd, it is added to the start of the text and otherwise if not.
- Fig. 4 represents the core encoding of processed plain text to cipher text.
- Each character of the plain text is converted to its respective ASCII value based on the chart shown on the right end of the figure shown.
- the final value formed is the cipher text.
- Fig 5 shows final step of encryption i.e., Mask.
- the cipher text generated using steps shown in Fig.4 is then processed through a dynamic cryptographic conversion using custom initialised values.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
Encryption is the process of converting plain text or other types of data into encoded, unreadable text that can only be deciphered by authorized parties. The process of encryption involves the use of algorithms, keys, and protocols that scramble the original data into ciphertext, which can be safely transmitted or stored. Even if a messaging app uses encryption, it may not be secure if it has vulnerabilities in its code. For example, in 2018, a messaging app that uses end-to-end encryption, announced that a security flaw had allowed hackers to install spyware on users' phones (The Guardian, 2019). This spyware could be used to access the users' messages, photos, and other personal information. The time encryption uses a key created using timestamp and divides it further into many keys which are recursively added and encrypted to form a strong cipher text which is further masked using cryptography.
Description
Title: Recursive Time Encryption with Cryptography
The present invention is an Encryption that can used to protect data and communication from unauthorized access, modification, and theft and which in any case cannot be reverse engineered. Here are some of the reasons why time-encryption is important:
Confidentiality: Encryption can be used to keep sensitive information confidential. This is important for businesses, governments, and individuals who need to protect sensitive data, such as financial information, personal information, trade secrets, or national security secrets.
Privacy: Encryption can be used to protect individual privacy. For example, end-to-end encryption in messaging apps ensures that only the sender and recipient can read the messages, preventing governments or hackers from intercepting and reading them.
Authentication: Encryption can be used to verify the authenticity of data and communication. Digital signatures and certificates are examples of encryption techniques used for authentication.
Integrity: Encryption can be used to ensure that data and communication are not tampered with or altered during transmission. This is important for ensuring the accuracy and reliability of information.
Compliance: Encryption is often required to comply with laws, regulations, and industry standards related to data privacy and security.
Overall, encryption is an essential tool for protecting data and communication from cyber threats and maintaining the confidentiality, privacy, authenticity, integrity, and compliance of information.
Statement of invention
"Recursive Time Encryption with Cryptography" effectively will encrypt every message with a dynamic encryption key generated every millisecond.
Brief Description of The Drawings
1
SUBSTITUTE SHEET (RULE 26)
It will be convenient to further describe the present invention with respect to the accompanying drawings that illustrate possible arrangements of the invention. Other arrangements of the invention are possible, and consequently the particularity of the accompanying drawings is not intended to be limiting of the present invention.
Fig.1 illustrates an embodiment of random key generation based on time
Fig.2 illustrates an embodiment of the process of encoding plain text to unreadable text i.e., the encryption process
Fig. 3 illustrates an embodiment of strategic attachment of a key to the plain text
Fig.4 illustrates an embodiment of showcasing conversion of plain text to cipher text
Fig. 5 illustrates an embodiment of showcasing conversion of cipher text to masked encryption text (unreadable text).
Detailed description of the invention
Before explaining the present invention in detail, it is to be understood that the invention is not limited in its application to the details of the construction and arrangement of parts illustrated in the accompanying drawings. The invention is capable of other embodiments, as depicted in different figures as described above and of being practiced or carried out in a variety of ways. It is to be understood that the phraseology and terminology employed herein is for the purpose of description and not of limitation.
Fig.1
As shown in Fig.1, a random key based on timestamp is generated individually for each plain text dynamically. The key then is broken into sub keys using absolute sum parameter.
Fig.2
As shown in Fig. 2 the plain text is processed through n+1 layers dynamically. In each round of the encryption, the key is attached strategically and is then processed recursively. Once the text is fully encrypted, it is then masked using custom cryptographic initialization.
Fig.3
2
SUBSTITUTE SHEET (RULE 26)
As shown in Fig. 3, the Key(n) is strategically added to the plain text based on odd/even value of the key. If the key is odd, it is added to the start of the text and otherwise if not.
Fig.4
Fig. 4 represents the core encoding of processed plain text to cipher text. Each character of the plain text is converted to its respective ASCII value based on the chart shown on the right end of the figure shown. The final value formed is the cipher text.
Fig.5
The final figure i.e., Fig 5 shows final step of encryption i.e., Mask. The cipher text generated using steps shown in Fig.4 is then processed through a dynamic cryptographic conversion using custom initialised values.
Described above, only the preferred embodiment of the present invention only, not for the present invention any formal restrictions, although the invention has been revealed as the preferred embodiment, however, not intended to limit the present invention, any skilled in the art technical staff, without departing from the scope of the present invention within the program, can be used when the contents of the above disclosed techniques make little changes or substitutions and changes in the equivalent embodiments, but any aspect of the invention without departing from the content, according to the present invention, technical substance of any of the above embodiments when taken in a simple modification, equivalent variation and modification as would fall within the scope of the present invention the technical solution.
SUBSTITUTE SHEET (RULE 26)
Claims
1. The Present invented technique that recursively encrypts plain text when strategically added with a part of generated key which is then further added and encrypted to generate a strong and secure cipher text. Furthermore, the cipher text is masked using cryptography using custom preinitialized values.
2. The system as claimed in claim 1 wherein the system is random key generation based on timestamp.
3. The system as claimed in claim 1 wherein the system is multiple sub-keys broken from main key using absolute sum of the key until the value of sum is less than 9.
4. The system as claimed in claim 1 wherein further comprising, the key is added to plain text strategically which is then encrypted. The next key part is added strategically to the new plain text generated which is further encrypted forming recursive addition and encryption until key(n) K(n) is processed.
5. The system as claimed in claim 1 wherein the cipher text generated recursively is masked to hide its cipher value. The said value is masked using cryptography with pre-initialized dynamic values.
6. The system as claimed in claim 1 wherein the dynamic cryptographic values of the characters are determined using timestamp and base value of the custom initialization.
7. The system as claimed in claim 1 wherein the system works as a combination of processes strategically processed together in any order of any nature in any case whatsoever.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/IN2023/050389 WO2024218781A1 (en) | 2023-04-21 | 2023-04-21 | Recursive time encryption with cryptography |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/IN2023/050389 WO2024218781A1 (en) | 2023-04-21 | 2023-04-21 | Recursive time encryption with cryptography |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2024218781A1 true WO2024218781A1 (en) | 2024-10-24 |
Family
ID=93152280
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IN2023/050389 WO2024218781A1 (en) | 2023-04-21 | 2023-04-21 | Recursive time encryption with cryptography |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2024218781A1 (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008108764A2 (en) * | 2007-03-06 | 2008-09-12 | Oxford William V | Method and system for a recursive security protocol for digital copyright control |
US20130010963A1 (en) * | 2011-07-07 | 2013-01-10 | Farrugia Augustin J | Multiplicative splits to protect cipher keys |
-
2023
- 2023-04-21 WO PCT/IN2023/050389 patent/WO2024218781A1/en unknown
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008108764A2 (en) * | 2007-03-06 | 2008-09-12 | Oxford William V | Method and system for a recursive security protocol for digital copyright control |
US20130010963A1 (en) * | 2011-07-07 | 2013-01-10 | Farrugia Augustin J | Multiplicative splits to protect cipher keys |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Aleisa | A Comparison of the 3DES and AES Encryption Standards | |
AbuTaha et al. | Survey paper: cryptography is the science of information security | |
Biswas et al. | A systematic study on classical cryptographic cypher in order to design a smallest cipher | |
Erondu et al. | An encryption and decryption model for data security using vigenere with advanced encryption standard | |
Sharma et al. | Cryptography Algorithms and approaches used for data security | |
Venkateswaran et al. | Information Security: Text Encryption and Decryption with poly substitution method and combining the features of Cryptography | |
WO2024218781A1 (en) | Recursive time encryption with cryptography | |
Achary | Cryptography and network security: an introduction | |
Kako | Classical Cryptography for Kurdish Language | |
Kaur | A Review: Network Security Based On Cryptography & Steganography Techniques. | |
Arshad et al. | Hill Matrix and Radix-64 Bit Algorithm to Preserve Data Confidentiality. | |
US20180048629A1 (en) | Expression and Method to Send and Receive Text Messages Encrypted For The Targeted Receiving User to Render Eavesdropping Useless. | |
Mohammed et al. | Cryptography and Network Security in Modern Era | |
Chandurkar et al. | Case Study on Cryptography | |
Rahmani | Cryptographic algorithms and protocols | |
Paderes | Cross-Crypto Algorithm: Leveraging the Features of the ROT13 and Vigenere Ciphers | |
Singh | A Review Paper on Network Security and Cryptography | |
Osaghae | Replication of ciphertext in cryptographic system | |
Cernov | Security in Computer Networks | |
Shodiq et al. | A Literature Review on the Role of Mathematics in Enhancing Cyber Security Through Data Encryption | |
Madhukar | Cryptography technology with network security | |
Hombrebueno et al. | Symmetric cryptosystem based on data encryption standard integrating HMAC and digital signature scheme implemented in multi-cast messenger application | |
Choudhary | A Short Survey on Comparative Study of Modern Cryptography Approach | |
Nabeel et al. | CRYPTOGRAPHIC TECHNIQUE FOR COMMUNICATION SYSTEM | |
Rana | A brief study on cryptography |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 23933949 Country of ref document: EP Kind code of ref document: A1 |