NEW METHOD FOR PSEUDO-RANDOM NUMBER GENERATION FOR INFORMATION ENCRYPTION
20220271931 · 2022-08-25
Inventors
- Lothar SEIDEMANN (Ludwigshafen am Rhein, DE)
- Holger PETERSEN (Ludwigshafen am Rhein, DE)
- Rainer FRIEHMLT (Ludwigshafen am Rhein, DE)
- Oliver PIKHARD (Ludwigshafen am Rhein, DE)
- Holger Kai Peter JELCH (Ludwigshafen am Rhein, DE)
Cpc classification
H04L9/0866
ELECTRICITY
International classification
Abstract
A method of generating at least one encryption key (130) for encrypting data (142), a method of 5 data transmission between at least two communication systems (136, 138), a method of encrypting data (142) and a method of decrypting encrypted data (144) are disclosed. Further disclosed are an encryption key generating device (110), a system (134), a data encryption system (148) and a data decryption system (150). The method of generating at least one encryption key (130) for encrypting data (142), specifically for data transmission over an insecure channel, comprises: i. blending at least two materials (114) according to at least one item of blending in-formation by using a blending device (112), thereby generating at least one blend (120); ii. detecting at least one material property (124) of the blend (120) by using at least one detector (126); and iii. transforming the material property (124) into the encryption key (130) by using at least one data processing device (132) configured for applying at least one trans-formation algorithm to the material property (124).
Claims
1.-46. (canceled)
47. A method of generating at least one encryption key (130) for encrypting data (142), specifically for data transmission over an insecure channel, the method comprising: i. blending at least two materials (114) according to at least one item of blending information by using a blending device (112), thereby generating at least one blend (120); ii. detecting at least one material property (124) of the blend (120) by using at least one detector (126); and iii. transforming the material property (124) into the encryption key (130) by using at least one data processing device (132) configured for applying at least one transformation algorithm to the material property (124).
48. The method according to claim 47, wherein step iii. is fully or partially performed in a computer-implemented fashion.
49. The method according to claim 47, wherein the data (142) comprises one or more of digital data, binary data, error correction data, payload data and; control data.
50. The method according to claim 47, wherein the data (142) is subdivided into data packages.
51. The method according to claim 47, wherein the at least one item of blending information comprises n blending variables, with n being a positive integer, wherein, in step ii., m material properties (124) of the blend (120) are detected, with m being a positive integer.
52. The method according to claim 47, wherein the at least two materials (114) comprise at least two materials (114) selected from the group consisting of: a powder, specifically a powder selected from the group consisting of: an inorganic powder, specifically an inorganic powder made of a mineral; an organic powder, specifically an organic powder made of a polymer; a pigment; a liquid, specifically a liquid selected from the group consisting of a pure liquid, a suspension, an emulsion or a solution, more specifically one or more of a liquid color and an ink.
53. The method according to claim 47, wherein the at least one item of blending information comprises at least one of: quantities for the at least two materials to be blended; weights for the at least two materials to be blended; volumes of the at least two materials to be blended; a blending ratio of volumes of the at least two materials to be blended; a blending ratio of weights of the at least two materials to be blended; mixing instructions for mixing two or more continuous or discontinuous streams of the at least two materials to be blended.
54. The method according to claim 53, wherein the substrate comprises a drum having a receiving surface for receiving the blend, specifically a drum on which the blend is temporarily secured electrostatically.
55. The method according to claim 54, wherein the drum is a rotating drum, wherein the method further comprises at least one cleaning step in which, after detecting the at least one material property, the blend is removed from the receiving surface of the drum.
56. The method according to claim 47, wherein the at least one material property (124) comprises at least one of a physical property of the blend (120) and a chemical property of the blend (120).
57. The method according to claim 47, wherein the transforming of the material property (124) into the encryption key (130) comprises subjecting the at least one material property (124) to at least one test, wherein the encryption key (130) is generated in accordance with the result of the test.
58. A method of data transmission between at least two communication systems (136, 138), specifically for data transmission over an insecure channel, the method comprising: I. assigning the role of a transmitting system (141) to at least one of the communication systems (136, 138); II. assigning the role of a receiving system (145) to at least another one of the communication systems (136, 138); III. providing at least one item of blending information both to the transmitting system (141) and to the receiving system (145); IV. generating, by the transmitting system (141), at least one encryption key (130) by using the at least one item of blending information and the method according to claim 47 referring to a method of generating at least one encryption key (130); V. encrypting, by the transmitting system (141), the data (142) to be transmitted by using the encryption key (130), thereby generating encrypted data (144); VI. transmitting, by the transmitting system (141), the encrypted data (144) to the receiving system (145); VII. receiving, by the receiving system (145), the encrypted data (144); VIII. generating, by the receiving system (145), the at least one encryption key (130) by using the at least one item of blending information and the method according to claim 47 referring to a method of generating at least one encryption key (130); and IX. decrypting, by the receiving system (145), the encrypted data (144) by using the encryption key (130).
59. The method according to claim 58, wherein the method is performed iteratively wherein, in the iterations, the roles of the transmitting system (141) and of the receiving system (145) are reassigned.
60. The method according to claim 59, wherein, in at least one of the iterations, in step III., at least one item of blending information is provided for at least one subsequent iteration.
61. A method of encrypting data (142), the method comprising: a. generating at least one encryption key (130) by using the method according to claim 47 referring to a method of generating an encryption key (130); and b. encrypting the data (142) by using the encryption key (130), thereby generating encrypted data (144).
62. A method of decrypting encrypted data (144), the method comprising: A. generating at least one key (130) by using the method according to claim 47 referring to a method of generating an encryption key (130); and B. decrypting the encrypted data (144) by using the encryption key (130), thereby generating decrypted data (152).
63. An encryption key generating device (110) for generating at least one encryption key (130) for encrypting data (142), comprising: at least one blending device (112) for blending at least two materials (114) according to at least one item of blending information, thereby generating at least one blend (120); at least one detecting device (122) configured for detecting at least one material property (124) of the blend (120), the detecting device (122) having at least one detector (126); and at least one transforming device (128) configured for transforming the material property (124) into the encryption key (130), the transforming device (128) having at least one data processing device (132) configured for applying at least one transformation algorithm to the material property (124).
64. The encryption key generating device (110) according to claim 63, wherein the encryption key generating device (110) is configured for performing the method of generating at least one encryption key (130) according to claim 47 referring to a method of generating at least one encryption key (130).
65. A printer configured for use as a blending device in the encryption key generating device according to claim 47 referring to an encryption key generating device, wherein the printer is configured for receiving the at least one item of blending information and for performing at least step i. of the method of generating at least one encryption key for encrypting data according to any one of the preceding embodiments referring to a method of generating at least one encryption key for encrypting data.
66. The printer according to claim 65, wherein the printer comprises one or more of a drum, such as an image drum; a laser, a lens system, such as a lens system comprising at least one mirror, e.g. a rotatable mirror; a cleaning element, such as a roll, a scraper or similar means for cleaning, e.g. for cleaning the drum; a cassette, e.g. for storing one or more of the substrate, such as a paper cassette; at least one transporting element, such as a roller and/or conveyor, e.g. for feeding, transferring and/or ejecting the substrate, specifically the paper, into, within and/or from the printer; a printer control unit configured for controlling the printer.
Description
SHORT DESCRIPTION OF THE FIGURES
[0237] Further optional features and embodiments will be disclosed in more detail in the subsequent description of embodiments, preferably in conjunction with the dependent claims. Therein, the respective optional features may be realized in an isolated fashion as well as in any arbitrary feasible combination, as the skilled person will realize. The scope of the invention is not restricted by the preferred embodiments. The embodiments are schematically depicted in the Figures. Therein, identical reference numbers in these Figures refer to identical or functionally comparable elements.
[0238] In the Figures:
[0239]
[0240]
[0241]
[0242]
[0243]
[0244]
[0245]
[0246]
[0247]
[0248]
[0249]
DETAILED DESCRIPTION OF THE EMBODIMENTS
[0250] In
[0251]
[0252] In
[0253]
[0254]
[0255] The encryption key generating device 110, as for example illustrated in
[0259] The system 134, as for example illustrated in
[0269] In
[0272]
[0275]
[0276] Such a pattern within the blend 120 may specifically be generated by using a printer 194 such as exemplarily illustrated in
[0277] The scanning device 204 is configured for performing at least step ii. of the method of generating at least one encryption key for encrypting data. Further, the scanning device 204 may be used for detecting the pattern within the blend 120, e.g. by optically scanning the blend 120 printed onto the drum 198. Thus, the scanning device 204 may be configured for generating at least one item of measurement information, e.g. from the pattern. Additionally, the scanning device 204 may be configured for performing at least step iii. of the method, e.g. by transforming the pattern into an encryption key 130. Further, the printer 194 may comprise a cleaning element 216, such as a cleaning roll 218, e.g. for cleaning the substrate 196, specifically for removing the blend 120 from the drum 198. Thus, as an example, the cleaning element 216 may be configured for preparing the drum 198 for further printing, such as to be ready for carrying a next blend 120.
[0278] In particular, for generating the blend, e.g. an image, to be usable for generating at least one encryption key for encrypting data, the drum 198 may be coated in the laser printer with at least two printer powders, wherein these powders may be blended such as to create the pattern, e.g. a specific pattern. The pattern may specifically be created by using the printer control unit 202 for controlling a raster image processor (RIP) of the printer 194. In particular, the raster image processor of the printer 194 may be controlled such as to convert a brightness gradation of the printed matter into a different grid of tiny dots for each material 114, thereby, for example, tilting a raster image generated with the second material 118 with respect to a raster image generated with the first material 116. Specifically, as an example, the RIP may be controlled according to the item of blending information.
[0279] In
[0280] The scanning device 204 may further comprise at least one illuminating element 230, such as an element configured for illuminating the blend 120. Specifically, the scanning device 204 may be configured for detecting the at least one property of the blend 120 by using a reflection of the blend 120. Thus, as an example, a complexity of the encryption key 130 may be increased by using optical effects, such as a special reflection, e.g. by using effect materials 228, when scanning the blend 120 using the scanning device 204 with the illuminating element 230.
[0281] Further, controlling the printer 194, e.g. by the printer control unit 202, raster images may be varied, for example creating specific patterns and/or colors. Specifically, small amendments in the item of blending information, such as for example implementing changes only in the printer control unit 202 while keeping previously used materials, may result in new color images. Thus, specifically, a position of the deposition of the materials may be shifted, e.g. by a defined distance for some of the color components, which may lead to an image wherein previously blue or red areas may be amended into green or orange areas.
[0282] As illustrated in
[0283] The encryption key generating device 110, e.g. the printer 194 in conjunction with the scanning device 204, may be configured for generating the at least one encryption key 130 for encrypting data. As an example, for data communication, specifically secure communication, over an insecure channel, e.g. between at least two communication systems 136, 138, each communication system 136, 138 may comprise at least one encryption key generating device 110. Thus, each communication system 136,138 may for example comprise the at least one printer 194 and the at least one scanning device 204, wherein in each communication system 136, 138 the printer 194 and the scanner 204 may generate the same encryption key 130 to be used for encrypting and/or decrypting the data 142. In particular, in each communication system 136, 138 the printer 194 and the scanner 204 may generate the encryption key 130 by using identical materials 114, e.g. printer powders, according to the item of blending information, such as according to the same printing instructions and/or using identical information for controlling the printer 194, such as the printer control unit 202, e.g. the RIP of the printer 194.
[0284] In particular, for encrypting and decrypting data for a data communication, e.g. for secure communication, all of the involved communication systems 136, 138 may comprise identical printer 194 and identical scanning devices 204, such as identical in both hardware, e.g. identical laser printers and/or identical optical scanners, and software, e.g. used for controlling the printer 194 and/or the scanning device 204, such as identically programmed printer control units 202, e.g. RIPs.
[0285] A security of the communication may be increased by amending and/or changing the encryption key 130. Thus, as an example, the item of blending information may be varied and/or amended regularly. For example, the software, e.g. used for controlling the printer 194 and/or the scanning device 204, may be subjected to synchronous adjustments in predefined time intervals, wherein the materials 114 to be blended may be exchanged and/or amended according to information transferred via an external communication. Additionally or alternatively, the software may synchronously be amended according to an algorithm, wherein the materials 114 may be exchanged and/or amended due to information comprised within transferred encrypted data 144, such as within an appendix of the transferred encrypted data 144.
[0286] Specifically, the data, e.g. the data 142 to be encrypted, may be encrypted by being transformed and/or converted into an image, such as into an image format, e.g. into an image format printable by the printer 194. In particular, the item of blending information, for example comprising printing instructions as well as adaptations for controlling the printer 194, e.g. RIP adaptations, may be transmitted together with the encrypted data 144.
LIST OF REFERENCE NUMBERS
[0287] 110 encryption key generating device [0288] 112 blending device [0289] 114 material [0290] 116 first material [0291] 118 second material [0292] 120 blend [0293] 122 detecting device [0294] 124 material property [0295] 126 detector [0296] 128 transforming device [0297] 130 encryption key [0298] 132 data processing device [0299] 134 system [0300] 136 first communication system [0301] 138 second communication system [0302] 140 encryption device [0303] 141 transmitting system [0304] 142 data [0305] 144 encrypted data [0306] 145 receiving system [0307] 146 decryption device [0308] 148 data encryption system [0309] 150 data decryption system [0310] 152 decrypted data [0311] 154 method of generating at least one encryption key [0312] 156 step i. [0313] 158 step ii. [0314] 160 step iii. [0315] 162 method of data transmission between at least two communication systems [0316] 164 step I. [0317] 166 step II. [0318] 168 step III. [0319] 170 step IV. [0320] 172 step V. [0321] 174 step VI. [0322] 176 step VII. [0323] 178 step VIII. [0324] 180 step IX. [0325] 182 method of encrypting data [0326] 184 step a. [0327] 186 step b. [0328] 188 method of decrypting data [0329] 190 step A. [0330] 192 step B. [0331] 194 printer [0332] 196 substrate [0333] 198 drum [0334] 200 paper [0335] 202 printer control unit [0336] 204 scanning device [0337] 206 laser [0338] 208 rotating mirror [0339] 210 reservoir [0340] 212 first reservoir [0341] 214 second reservoir [0342] 216 cleaning element [0343] 217 toner [0344] 218 cleaning roll [0345] 219 image roll [0346] 220 cyan [0347] 222 magenta [0348] 224 yellow [0349] 226 black [0350] 227 laser [0351] 228 effect material [0352] 230 illuminating element [0353] 232 roller [0354] 234 conveyor