On 28 Feb 2002 at 12:39, Sunder wrote:

> So it's 
> 
> while(...)
> {
>  r=rng();       // read block from the rng
>  p=plaintext(); // read block of plaintext
>  c1=cypher1(plaintext,key1); // encrypt plaintext
>  c2=c1 ^ r;                  // xor c1 with rng block
>  c3=cypher2(r,key2);         // encrypt rng with 2nd cypher and 2nd key.
> }
> 
> Ok, so now what do we do with all this stuff?  Are c1..c3 further mixed?
> Are keys key1 and key2 related?  For example, does this attempt to be a
> public key mechanism?  Or perhaps some sort of data splitting like a k of
> n split?
> 
> How do we get back the plaintext? 
> 
> So before we can rule this out as snake oil or useful, we need more
> details...
> 
> 

The full text is available at the PTO.
As I understand it, in essence it's pretty much
equivalent to the old idea of using a real random number 
generator to make a OTP, then sending the (encrypted)
OTP and also the message XORed with the OTP, so the
message sent ends up being twice as long as the plaintext.

George

> ----------------------Kaos-Keraunos-Kybernetos---------------------------
>  + ^ + :Surveillance cameras|Passwords are like underwear. You don't /|\
>   \|/  :aren't security.  A |share them, you don't hang them on your/\|/\
> <--*-->:camera won't stop a |monitor, or under your keyboard, you   \/|\/
>   /|\  :masked killer, but  |don't email them, or put them on a web  \|/
>  + v + :will violate privacy|site, and you must change them very often.
> [EMAIL PROTECTED] http://www.sunder.net ------------
> 
> On Wed, 27 Feb 2002, Khoder bin Hakkin wrote:
> 
> > Cipher mixer with random number generator
> > 
> >                                                        Abstract
> > 
> > An encryption device has a random number generator whose output is
> > combined by exclusive-or with plaintext input which has been encrypted
> > by a first block cipher. The combined exclusive-or output is encrypted
> > with a second block cipher mechanism which produces a second enciphered
> > output. The output of the random number generator is also encrypted by a
> > third block cipher mechanism which produces a third enciphered output.
> > The first and second block cipher mechanisms differ from each other.
> > 
> > United States Patent
> > 6,351,539
> > February 26, 2002

Reply via email to