Abstract: Authentication by an intermediary F (e.g. a bank) of an originator C of a message (e.g. a client sending an instruction to pay a merchant M) is accomplished using a protocol which does not require the intermediary to possess passwords used by the originator C and the merchant M to protect the contents of the message. Furthermore, the protocol does not require any party to the transaction to decrypt any value previously encrypted by any other party, so a reversible encryption algorithm is not required.
Abstract: A method of decrypting data comprising encrypting bit-wise data, using a first plural bit mask, modulating the data into symbol format, and transmitting the symbol format data to a receiving apparatus, in a receiving apparatus, rotating a current received symbol sample by an amount equal to one of (i) its difference in phase from an immediately preceding received symbol sample toward the phase of the immediately preceding received symbol sample phase, and (ii) by an amount equal to estimated carrier phase towards zero phase, generating a second bit mask subset derived from values of the first bit mask, comprising plural bits for each symbol, reflecting the rotated symbol by a phase defined by the plural bits to form a symbol which is devoid of encryption, and providing the symbol devoid of encryption to a soft-decision decoder.
Abstract: The present invention provides a cryptosystem for encrypting an original image or voice file by using a camouflaging image or voice file. Each of the original and camouflaging files comprises a plurality of basic units arranged according to a predetermined sequence. The cryptosystem comprises a memory for storing the original and camouflaging files and programs, a processor for executing the programs stored in the memory, and an encrypting program stored in the memory for encrypting the original file by using the camouflaging file.