NEW METHOD FOR PSEUDO-RANDOM NUMBER GENERATION FOR INFORMATION ENCRYPTION

Abstract

A method of generating at least one encryption key (130) for encrypting data (142), a method of 5 data transmission between at least two communication systems (136, 138), a method of encrypting data (142) and a method of decrypting encrypted data (144) are disclosed. Further disclosed are an encryption key generating device (110), a system (134), a data encryption system (148) and a data decryption system (150). The method of generating at least one encryption key (130) for encrypting data (142), specifically for data transmission over an insecure channel, comprises: i. blending at least two materials (114) according to at least one item of blending in-formation by using a blending device (112), thereby generating at least one blend (120); ii. detecting at least one material property (124) of the blend (120) by using at least one detector (126); and iii. transforming the material property (124) into the encryption key (130) by using at least one data processing device (132) configured for applying at least one trans-formation algorithm to the material property (124).

Claims

1.-46. (canceled)

47. A method of generating at least one encryption key (130) for encrypting data (142), specifically for data transmission over an insecure channel, the method comprising: i. blending at least two materials (114) according to at least one item of blending information by using a blending device (112), thereby generating at least one blend (120); ii. detecting at least one material property (124) of the blend (120) by using at least one detector (126); and iii. transforming the material property (124) into the encryption key (130) by using at least one data processing device (132) configured for applying at least one transformation algorithm to the material property (124).

48. The method according to claim 47, wherein step iii. is fully or partially performed in a computer-implemented fashion.

49. The method according to claim 47, wherein the data (142) comprises one or more of digital data, binary data, error correction data, payload data and; control data.

50. The method according to claim 47, wherein the data (142) is subdivided into data packages.

51. The method according to claim 47, wherein the at least one item of blending information comprises n blending variables, with n being a positive integer, wherein, in step ii., m material properties (124) of the blend (120) are detected, with m being a positive integer.

52. The method according to claim 47, wherein the at least two materials (114) comprise at least two materials (114) selected from the group consisting of: a powder, specifically a powder selected from the group consisting of: an inorganic powder, specifically an inorganic powder made of a mineral; an organic powder, specifically an organic powder made of a polymer; a pigment; a liquid, specifically a liquid selected from the group consisting of a pure liquid, a suspension, an emulsion or a solution, more specifically one or more of a liquid color and an ink.

53. The method according to claim 47, wherein the at least one item of blending information comprises at least one of: quantities for the at least two materials to be blended; weights for the at least two materials to be blended; volumes of the at least two materials to be blended; a blending ratio of volumes of the at least two materials to be blended; a blending ratio of weights of the at least two materials to be blended; mixing instructions for mixing two or more continuous or discontinuous streams of the at least two materials to be blended.

54. The method according to claim 53, wherein the substrate comprises a drum having a receiving surface for receiving the blend, specifically a drum on which the blend is temporarily secured electrostatically.

55. The method according to claim 54, wherein the drum is a rotating drum, wherein the method further comprises at least one cleaning step in which, after detecting the at least one material property, the blend is removed from the receiving surface of the drum.

56. The method according to claim 47, wherein the at least one material property (124) comprises at least one of a physical property of the blend (120) and a chemical property of the blend (120).

57. The method according to claim 47, wherein the transforming of the material property (124) into the encryption key (130) comprises subjecting the at least one material property (124) to at least one test, wherein the encryption key (130) is generated in accordance with the result of the test.

58. A method of data transmission between at least two communication systems (136, 138), specifically for data transmission over an insecure channel, the method comprising: I. assigning the role of a transmitting system (141) to at least one of the communication systems (136, 138); II. assigning the role of a receiving system (145) to at least another one of the communication systems (136, 138); III. providing at least one item of blending information both to the transmitting system (141) and to the receiving system (145); IV. generating, by the transmitting system (141), at least one encryption key (130) by using the at least one item of blending information and the method according to claim 47 referring to a method of generating at least one encryption key (130); V. encrypting, by the transmitting system (141), the data (142) to be transmitted by using the encryption key (130), thereby generating encrypted data (144); VI. transmitting, by the transmitting system (141), the encrypted data (144) to the receiving system (145); VII. receiving, by the receiving system (145), the encrypted data (144); VIII. generating, by the receiving system (145), the at least one encryption key (130) by using the at least one item of blending information and the method according to claim 47 referring to a method of generating at least one encryption key (130); and IX. decrypting, by the receiving system (145), the encrypted data (144) by using the encryption key (130).

59. The method according to claim 58, wherein the method is performed iteratively wherein, in the iterations, the roles of the transmitting system (141) and of the receiving system (145) are reassigned.

60. The method according to claim 59, wherein, in at least one of the iterations, in step III., at least one item of blending information is provided for at least one subsequent iteration.

61. A method of encrypting data (142), the method comprising: a. generating at least one encryption key (130) by using the method according to claim 47 referring to a method of generating an encryption key (130); and b. encrypting the data (142) by using the encryption key (130), thereby generating encrypted data (144).

62. A method of decrypting encrypted data (144), the method comprising: A. generating at least one key (130) by using the method according to claim 47 referring to a method of generating an encryption key (130); and B. decrypting the encrypted data (144) by using the encryption key (130), thereby generating decrypted data (152).

63. An encryption key generating device (110) for generating at least one encryption key (130) for encrypting data (142), comprising: at least one blending device (112) for blending at least two materials (114) according to at least one item of blending information, thereby generating at least one blend (120); at least one detecting device (122) configured for detecting at least one material property (124) of the blend (120), the detecting device (122) having at least one detector (126); and at least one transforming device (128) configured for transforming the material property (124) into the encryption key (130), the transforming device (128) having at least one data processing device (132) configured for applying at least one transformation algorithm to the material property (124).

64. The encryption key generating device (110) according to claim 63, wherein the encryption key generating device (110) is configured for performing the method of generating at least one encryption key (130) according to claim 47 referring to a method of generating at least one encryption key (130).

65. A printer configured for use as a blending device in the encryption key generating device according to claim 47 referring to an encryption key generating device, wherein the printer is configured for receiving the at least one item of blending information and for performing at least step i. of the method of generating at least one encryption key for encrypting data according to any one of the preceding embodiments referring to a method of generating at least one encryption key for encrypting data.

66. The printer according to claim 65, wherein the printer comprises one or more of a drum, such as an image drum; a laser, a lens system, such as a lens system comprising at least one mirror, e.g. a rotatable mirror; a cleaning element, such as a roll, a scraper or similar means for cleaning, e.g. for cleaning the drum; a cassette, e.g. for storing one or more of the substrate, such as a paper cassette; at least one transporting element, such as a roller and/or conveyor, e.g. for feeding, transferring and/or ejecting the substrate, specifically the paper, into, within and/or from the printer; a printer control unit configured for controlling the printer.

Description

SHORT DESCRIPTION OF THE FIGURES

[0237] Further optional features and embodiments will be disclosed in more detail in the subsequent description of embodiments, preferably in conjunction with the dependent claims. Therein, the respective optional features may be realized in an isolated fashion as well as in any arbitrary feasible combination, as the skilled person will realize. The scope of the invention is not restricted by the preferred embodiments. The embodiments are schematically depicted in the Figures. Therein, identical reference numbers in these Figures refer to identical or functionally comparable elements.

[0238] In the Figures:

[0239] FIGS. 1 and 2 show different embodiments of encryption key generating devices;

[0240] FIG. 3 shows an embodiment of a system;

[0241] FIG. 4 shows an embodiment of a data encryption system;

[0242] FIG. 5 shows an embodiment of a data decryption system;

[0243] FIG. 6 shows a flow chart of an embodiment of a method of generating at least one encryption key for encrypting data;

[0244] FIG. 7 shows a flow chart of an embodiment of a method of data transmission between at least two communication systems;

[0245] FIG. 8 shows a flow chart of an embodiment of a method of encrypting data;

[0246] FIG. 9 shows a flow chart of an embodiment of a method of decrypting data;

[0247] FIG. 10 shows an embodiment of a process of blending at least two materials such that at least one pattern is generated;

[0248] FIG. 11 shows an embodiment of an encryption key generating device in a perspective view; and

[0249] FIG. 12 shows a schematic illustration of an embodiment of an encryption key generating device.

DETAILED DESCRIPTION OF THE EMBODIMENTS

[0250] In FIG. 1 a schematic illustration of an embodiment of an encryption key generating device 110 is shown. The encryption key generating device 110 comprises one blending device 112 for blending at least two materials 114, specifically at least a first material 116 and a second material 118, according to at least one item of blending information, thereby generating at least one blend 120. Further, the encryption key generating device 110 comprises a detecting device 122 configured for detecting at least one material property 124 of the blend 120. The detecting device 122 has at least one detector 126. In addition, the encryption key generating device 110 comprises at least one transforming device 128 configured for transforming the material property 124 into the encryption key 130. The transforming device 128 has at least one data processing device 132 configured for applying at least one transformation algorithm to the material property 124. The transforming of the material property 124 into the encryption key 130 may specifically comprise comparing the at least one material property 124 with at least one threshold value s and assigning a number, for example a binary number, in accordance with the result of the comparison.

[0251] FIG. 2 illustrates a different embodiment of an encryption key generating device 110. Therein five materials 114 may be blended by a blending device 112 according to an item of blending information, generating the at least one blend 120. The detecting device 122 and the transforming device 128 may be integrally formed, detecting and transforming the material property 124 of the blend 120 into an encryption key 130.

[0252] In FIG. 3 an embodiment of a system 134 is illustrated. The system 134 comprises at least one first communication system 136 and at least one second communication system 138. Each of the communication systems 136, 138 may comprise an encryption key generating device 110. The first communication system 136, specifically a transmitting system 141, may comprise at least one encryption device 140 configured for encrypting data 142 to be transmitted by using the encryption key 130, thereby generating encrypted data 144. The terms transmitting system 141 and transmission system may be used interchangeably and may specifically refer to the same system. The second communication system 138, specifically a receiving system 145, may comprise at least one decryption device 146 configured for decrypting the encrypted data 144 by using the encryption key 130.

[0253] FIG. 4 shows an embodiment of a data encryption system 148 comprising the at least one encryption key generating device 110. Further, the data encryption system 148 comprises the at least one encryption device 140 which may be configured for encrypting the data 142 to be transmitted by using the encryption key 130, thereby generating the encrypted data 144.

[0254] FIG. 5 shows an embodiment of a data decryption system 150 comprising the at least one encryption key generating device 110. Further, the data decryption system 150 comprises the at least one decryption device 146 configured for decrypting the data, specifically the encrypted data 144, by using the encryption key 130, thereby generating decrypted data 152, such as for example the data 142.

[0255] The encryption key generating device 110, as for example illustrated in FIGS. 1 and 2, may be configured for performing a method 154 of generating at least one encryption key 130. FIG. 6 shows a flow chart of an embodiment of a method 154 of generating at least one encryption key 130 for encrypting data 142. The method 154 comprises the following steps, which may specifically be performed in the given order. Still, a different order may also be possible. It may be possible to perform two or more of the method steps fully or partially simultaneously. It may further be possible to perform one, more than one or even all of the method steps once or repeatedly. The method may comprise additional method steps which are not listed herein. The method steps of the method 154 of generating at least one encryption key 130 for encrypting data 142 are the following: [0256] step i. (denoted with reference number 156) blending at least two material 114 according to at least one item of blending information by using a blending device 112, thereby generating at least one blend 120; [0257] step ii. (denoted with reference number 158) detecting at least one material property 124 of the blend 120 by using at least one detector 126; and [0258] step iii. (denoted with reference number 160) transforming the material property 124 into the encryption key 130 by using at least one data processing device 132 configured for applying at least one transformation algorithm to the material property 124.

[0259] The system 134, as for example illustrated in FIG. 3, is configured for performing a method 162 of data transmission between at least two communication systems 136, 138. FIG. 7 shows a flow chart of an embodiment of the method 162 of data transmission between at least two communication systems 136, 138. The method 162 comprises the following steps, which may specifically be performed in the given order. Still, a different order may also be possible. It may be possible to perform two or more of the method steps fully or partially simultaneously. It may further be possible to perform one, more than one or even all of the method steps once or repeatedly. The method may comprise additional method steps which are not listed herein. The method steps of the method 162 of data transmission between at least two communication systems 136, 138 are the following: [0260] step I. (denoted with reference number 164) assigning the role of a transmitting system 141 to at least one of the communication systems 136, 138; [0261] step II. (denoted with reference number 166) assigning the role of a receiving system 145 to at least another one of the communication systems 136, 138; [0262] step III. (denoted with reference number 168) providing at least one item of blending information both to the transmitting system 141 and to the receiving system 145; [0263] step IV. (denoted with reference number 170) generating, by the transmitting system 141, at least one encryption key 130 by using the at least one item of blending information and the method 154 of generating at least one encryption key 130; [0264] step V. (denoted with reference number 172) encrypting, by the transmitting system 141, the data 142 to be transmitted by using the encryption key 130, thereby generating encrypted data 144; [0265] step VI. (denoted with reference number 174) transmitting, by the transmitting system 141, the encrypted data 144 to the receiving system 145; [0266] step VII. (denoted with reference number 176) receiving, by the receiving system 145, the encrypted data 144; [0267] step VIII. (denoted with reference number 178) generating, by the receiving system 145, the at least one encryption key 130 by using the at least one item of blending information and the method 154 of generating at least one encryption key 130; and [0268] step IX. (denoted with reference number 180) decrypting, by the receiving system 145, the encrypted data 144 by using the encryption key 130.

[0269] In FIG. 8 a flow chart of an embodiment of a method 182 of encrypting data is illustrated. The method 182 comprises the following steps, which may specifically be performed in the given order. It may be possible to perform one or more of the method steps once or repeatedly. The method may comprise additional method steps which are not listed herein. The method steps of the method 182 of encrypting data are the following: [0270] step a. (denoted with reference number 184) generating at least one encryption key 130 by using the method 154 of generating at least one encryption key 130; and [0271] step b. (denoted with reference number 186) encrypting the data 142 by using the encryption key 130, thereby generating encrypted data 144.

[0272] FIG. 9 shows a flow chart of an embodiment of a method 188 of decrypting data. The method 188 comprises the following steps, which may specifically be performed in the given order. It may be possible to perform one or more of the method steps once or repeatedly. The method may comprise additional method steps which are not listed herein. The method steps of the method 188 of decrypting data are the following: [0273] step A. (denoted with reference number 190) generating at least one key 130 by using the method 154 of generating an encryption key 130; and [0274] step B. (denoted with reference number 192) decrypting the encrypted data 144 by using the encryption key 130, thereby generating decrypted data 152.

[0275] FIG. 10 shows an embodiment of blending at least two materials such that at least one pattern is generated. In particular, the figure may show an example of generating a pattern, such as an interference pattern, when blending a first material 116 and a second material 118 into at least one blend 120. Specifically, when using a printer 194, e.g. exemplarily illustrated in FIGS. 11 and 12, the first material 116 may be applied onto at least one substrate 196, such as onto a drum 198 and/or onto a sheet of paper 200. For example, the pattern may specifically be generated by using differently tilted raster images. Thus, in particular, a raster image generated with the second material 118 may be tilted with respect to a raster image generated with the first material 116, for example by a printer control unit 202. As exemplarily illustrated in FIG. 10, blending the two materials, such as overlaying the raster images generated with the first material 116 and the second material 118 respectively, may result in a pattern within the blend 120.

[0276] Such a pattern within the blend 120 may specifically be generated by using a printer 194 such as exemplarily illustrated in FIG. 11. In particular, FIG. 11 shows an embodiment of an encryption key generating device 110 in a perspective view. The encryption key generating device 110 may specifically comprise a printer 194 configured for use as a blending device 112, and may further comprise a scanning device 204 configured for use as a detecting device 122. The printer 194 is configured for performing at least step i. of the method of generating at least one encryption key for encrypting data. The printer 194 may be or may comprise a laser printer, wherein at least one laser 206 and at least one rotating mirror 208 may be used for printing, e.g. blending, the at least two materials 114 contained in at least two reservoirs 210 onto the drum 198. Specifically, the first material 116 may be contained in a first reservoir 212 and the second material 118 may be contained in a second reservoir 214.

[0277] The scanning device 204 is configured for performing at least step ii. of the method of generating at least one encryption key for encrypting data. Further, the scanning device 204 may be used for detecting the pattern within the blend 120, e.g. by optically scanning the blend 120 printed onto the drum 198. Thus, the scanning device 204 may be configured for generating at least one item of measurement information, e.g. from the pattern. Additionally, the scanning device 204 may be configured for performing at least step iii. of the method, e.g. by transforming the pattern into an encryption key 130. Further, the printer 194 may comprise a cleaning element 216, such as a cleaning roll 218, e.g. for cleaning the substrate 196, specifically for removing the blend 120 from the drum 198. Thus, as an example, the cleaning element 216 may be configured for preparing the drum 198 for further printing, such as to be ready for carrying a next blend 120.

[0278] In particular, for generating the blend, e.g. an image, to be usable for generating at least one encryption key for encrypting data, the drum 198 may be coated in the laser printer with at least two printer powders, wherein these powders may be blended such as to create the pattern, e.g. a specific pattern. The pattern may specifically be created by using the printer control unit 202 for controlling a raster image processor (RIP) of the printer 194. In particular, the raster image processor of the printer 194 may be controlled such as to convert a brightness gradation of the printed matter into a different grid of tiny dots for each material 114, thereby, for example, tilting a raster image generated with the second material 118 with respect to a raster image generated with the first material 116. Specifically, as an example, the RIP may be controlled according to the item of blending information.

[0279] In FIG. 12, a schematic illustration of an embodiment of an encryption key generating device 110 is shown. The encryption key generating device 110 may specifically comprise as at least one printer 194 for the at least one blending device 112. Further, the encryption key generating device 110 may comprise at least one scanning device 204 for the at least one detecting device 122 and, e.g. additionally, for the at least one transforming device 128. As an example, the printer 194 may comprise a plurality of reservoirs 210, each reservoir 210 comprising at least one material 114, wherein each material 114 may be different from all other materials 114. In particular, the printer 194 may comprise a standard color laser cartridge, e.g. having “CMYK” toner colors. Thus, as an example, the printer 194 may comprise five reservoirs 210, wherein each reservoir 210 may comprise a material 114 having a different color, such as a cyan 220, a magenta 222, a yellow 224, and a black 226 colored material, e.g. a toner 217. Further, each reservoir may comprise at least one image roll 219 and at least one laser 227. Additionally or alternatively, the printer 194 may comprise at least one effect material 228, such as one or more of a reflective material, a fluorescent material, a material having an optically detectable reaction with one or more other materials, such as with one or more of the “CMYK” colored materials. In particular, by using a plurality of materials 114 a complexity of the encryption key 130 may be increased.

[0280] The scanning device 204 may further comprise at least one illuminating element 230, such as an element configured for illuminating the blend 120. Specifically, the scanning device 204 may be configured for detecting the at least one property of the blend 120 by using a reflection of the blend 120. Thus, as an example, a complexity of the encryption key 130 may be increased by using optical effects, such as a special reflection, e.g. by using effect materials 228, when scanning the blend 120 using the scanning device 204 with the illuminating element 230.

[0281] Further, controlling the printer 194, e.g. by the printer control unit 202, raster images may be varied, for example creating specific patterns and/or colors. Specifically, small amendments in the item of blending information, such as for example implementing changes only in the printer control unit 202 while keeping previously used materials, may result in new color images. Thus, specifically, a position of the deposition of the materials may be shifted, e.g. by a defined distance for some of the color components, which may lead to an image wherein previously blue or red areas may be amended into green or orange areas.

[0282] As illustrated in FIG. 12, the printer 194 may further comprise at least one transporting element, such as a roller 232 and/or conveyor 234, e.g. for feeding, transferring and/or ejecting the substrate 196, specifically the paper 200, into, within and/or from the printer 194. Furthermore, the conveyor 234 itself can be also used as substrate 196 to transport the blend 120, e.g. the printed color image, to the scanning device 204. The cleaning element 216 may further be used to clean the conveyor 234, specifically after the blend 120 passed the scanning device. Thus, as an example, the conveyor 234 may function as a transfer belt. In particular, the blend 120 may be printed onto the conveyor 234 and may then be transported by the conveyor 234 to the scanning device 204, such that the scanning device 204 may detect the at least one property of the blend 120. The conveyor 234 may then be configured to move the blend 120, specifically after passing the scanner, to the cleaning element 216 where the conveyor 234 may be cleaned, e.g. where the blend 120, e.g. the color image, may be removed from the conveyor 234. Thus, in case the conveyor 234 is used as the substrate 196, no paper 200 may be transported, e.g. as opposed to the printer 194 being in a normal printer mode. Specifically, in this case, the scanning device 204 may be arranged behind a paper ejection, as is exemplarily illustrated in FIG. 12.

[0283] The encryption key generating device 110, e.g. the printer 194 in conjunction with the scanning device 204, may be configured for generating the at least one encryption key 130 for encrypting data. As an example, for data communication, specifically secure communication, over an insecure channel, e.g. between at least two communication systems 136, 138, each communication system 136, 138 may comprise at least one encryption key generating device 110. Thus, each communication system 136,138 may for example comprise the at least one printer 194 and the at least one scanning device 204, wherein in each communication system 136, 138 the printer 194 and the scanner 204 may generate the same encryption key 130 to be used for encrypting and/or decrypting the data 142. In particular, in each communication system 136, 138 the printer 194 and the scanner 204 may generate the encryption key 130 by using identical materials 114, e.g. printer powders, according to the item of blending information, such as according to the same printing instructions and/or using identical information for controlling the printer 194, such as the printer control unit 202, e.g. the RIP of the printer 194.

[0284] In particular, for encrypting and decrypting data for a data communication, e.g. for secure communication, all of the involved communication systems 136, 138 may comprise identical printer 194 and identical scanning devices 204, such as identical in both hardware, e.g. identical laser printers and/or identical optical scanners, and software, e.g. used for controlling the printer 194 and/or the scanning device 204, such as identically programmed printer control units 202, e.g. RIPs.

[0285] A security of the communication may be increased by amending and/or changing the encryption key 130. Thus, as an example, the item of blending information may be varied and/or amended regularly. For example, the software, e.g. used for controlling the printer 194 and/or the scanning device 204, may be subjected to synchronous adjustments in predefined time intervals, wherein the materials 114 to be blended may be exchanged and/or amended according to information transferred via an external communication. Additionally or alternatively, the software may synchronously be amended according to an algorithm, wherein the materials 114 may be exchanged and/or amended due to information comprised within transferred encrypted data 144, such as within an appendix of the transferred encrypted data 144.

[0286] Specifically, the data, e.g. the data 142 to be encrypted, may be encrypted by being transformed and/or converted into an image, such as into an image format, e.g. into an image format printable by the printer 194. In particular, the item of blending information, for example comprising printing instructions as well as adaptations for controlling the printer 194, e.g. RIP adaptations, may be transmitted together with the encrypted data 144.

LIST OF REFERENCE NUMBERS

[0287] 110 encryption key generating device [0288] 112 blending device [0289] 114 material [0290] 116 first material [0291] 118 second material [0292] 120 blend [0293] 122 detecting device [0294] 124 material property [0295] 126 detector [0296] 128 transforming device [0297] 130 encryption key [0298] 132 data processing device [0299] 134 system [0300] 136 first communication system [0301] 138 second communication system [0302] 140 encryption device [0303] 141 transmitting system [0304] 142 data [0305] 144 encrypted data [0306] 145 receiving system [0307] 146 decryption device [0308] 148 data encryption system [0309] 150 data decryption system [0310] 152 decrypted data [0311] 154 method of generating at least one encryption key [0312] 156 step i. [0313] 158 step ii. [0314] 160 step iii. [0315] 162 method of data transmission between at least two communication systems [0316] 164 step I. [0317] 166 step II. [0318] 168 step III. [0319] 170 step IV. [0320] 172 step V. [0321] 174 step VI. [0322] 176 step VII. [0323] 178 step VIII. [0324] 180 step IX. [0325] 182 method of encrypting data [0326] 184 step a. [0327] 186 step b. [0328] 188 method of decrypting data [0329] 190 step A. [0330] 192 step B. [0331] 194 printer [0332] 196 substrate [0333] 198 drum [0334] 200 paper [0335] 202 printer control unit [0336] 204 scanning device [0337] 206 laser [0338] 208 rotating mirror [0339] 210 reservoir [0340] 212 first reservoir [0341] 214 second reservoir [0342] 216 cleaning element [0343] 217 toner [0344] 218 cleaning roll [0345] 219 image roll [0346] 220 cyan [0347] 222 magenta [0348] 224 yellow [0349] 226 black [0350] 227 laser [0351] 228 effect material [0352] 230 illuminating element [0353] 232 roller [0354] 234 conveyor