Systems and methods of ambiguity envelope encryption scheme and applications

ABSTRACT

Ambiguity Envelope (AE) security uses prior art encryption algorithms and prior art encryption keys and provides systems and methods for random-variant-keys that are used in place of the prior art encryption keys. In AE an ambiguity envelope is created over the transmission of data packets, so that no specific encryption key, as in prior art, is used but random-variant-keys are used that are distinct and separate for each packet and may also be distinct and separate for each incoming and outgoing packet. Random-variant-keys have no mathematical relationship to each other or to the prior art encryption keys. These random-variant-keys are not created, stored at either end or exchanged with each end of transmission. The random-variant-keys are only created at the time of the actual use for encrypting or decrypting a data packet and not before and then discarded after one time use. The AE use is applicable to wireless network using wireless access points, cellular phone and data networks and ad hoc mobile wireless networks.

CROSS REFERENCE TO RELATED APPLICATIONS

This application claims priority on Provisional Application Ser. No.U.S. 60/699,593, titled “Ambiguity Envelope Encryption Scheme andApplications” filed on Jul. 14, 2005, by Tara Chand Singhal. Thecontents of the Provisional Application Ser. No. 60/699,593 areincorporated herein by reference.

FIELD OF THE INVENTION

The present invention is directed to systems and methods for anencryption scheme and its applications that make the security ofencryption keys irrelevant to the security of wireless and wiredtransmissions by using random-variant-keys that are different from theprior art encryption keys.

BACKGROUND

In prior art encryption schemes a standard well-known encryptionalgorithm is used. The algorithm may be initialized with a seed value.This algorithm is present at both ends of a transmission path such as awireless network.

There is an encryption key, which is randomly generated and is definedby the number of bits such as, 56 bits, 64 bits, 128 bits, 192 bits, 256bits, 384 bits or 512 bits. The longer the key in bits, more difficultit is to break it by brute force. The key needs to be also present atboth ends of the transmission path. Hence once a key is created it isexchanged between both the ends of the transmission path that is usedfor the wireless transmission.

At one end of the transmission path, a plain text is entered into theencryption algorithm that uses the encryption key to encrypt the filethat is made up of data packets and at the other end the same key isthen used to decrypt the message to get back the plain text.

In this scheme of encryption since the algorithm is standard, great careis exercised in protecting the key, in how the key is stored and safeguarded while in storage, how it is distributed or exchanged, how it issafeguarded during the distribution or exchange process, and how it ischanged or re-keyed on a periodic basis such as every month on highlysecure systems in military and perhaps once a year in other systems.When a wireless transmission path is used, it is easier for hackers tobreak the key.

Hence the security of transmissions depends upon the key and keystrength in bits. However, with the increase in computer power and useof wireless as well, it has become easier to break such keys. For awhile, 128 bits was considered a strong key. However, it is not now and256 bit keys have begun to be used.

Use of wireless technology has grown in many applications. Thesewireless technologies use digital transmission of data packets. Adigital data packet has a header and a data body. The data in the bodyis encrypted during transmission.

One of the popular uses of wireless transmission has been and is betweena laptop computer and a wireless access point (WAP) or router to acompany network or the Internet. Other uses have been between the salesterminal of a business and their central server.

Such WAPs are commonly used by businesses and in offsite locations suchas airports, hotels and coffee shops as well as in homes. These usestypically operate for a few hundred meters, based on the strength of thetransmission. To facilitate wide spread use and manufacture of suchdevices, various industry standards have been developed, such as 802.11band 802.11g.

Another use of wireless that is emerging is the use of Bluetooth, wherecell phones equipped with blue tooth capability communicate to awireless earpiece. Still another use is in military application such asin ad hoc mobile wireless networks in a theatre of operation. Cellularphones are another prominent use of wireless networks.

It has become well known, that others may capture and decipher privatewireless transmissions to steal private information. It has become knownthat in spite of encryption, the hackers have been successful instealing private transmissions. A standard called wired equivalentprivacy (WEP) has been developed for these wireless transmissions. TheWEP is designed to deliver the same encryption as available on a wiredtransmission; hence the name wired equivalent privacy.

The weaknesses that have been demonstrated are: (i) To be able tocapture transmissions from very great distances using special telescopicantennas. For example, in tests conducted, wireless transmissionsbetween laptop and WAPs, that from a user point of view are limited afew hundred feet, can be captured from as far away as 11 miles using aspecial antenna. Wireless transmissions using blue tooth that from auser perspective are good for 10 to 20 feet can be captured from as faraway as a city block. (ii) One of the ways of stealing privatetransmission have been via specially equipped roving van, which rovearound city blocks to find and capture transmissions. (iii) Defeatingthe authentication between the user and the wireless access point andsetting up rogue wireless access points between the user and the realwireless access points that redirect traffic to a spoofed access point.And (iv) breaking the encryption key, that is used for encryption.Having access to samples of plain text and encrypted text, an encryptionkey such as a 128-bit key is easily broken. Hence, even though thewireless transmissions are encrypted, they are still compromised byhackers.

The ease with which the security of wireless transmission has beencompromised has been demonstrated both by the information securitypersonnel of banks as well as the special agents of FBI in InformationSystem Security Association local chapter security briefings.

Hence, it is a primary objective of this invention to have a differentform of encryption scheme that does not rely on the security of wirelesskeys to provide security for wireless transmissions.

It is also an objective of this invention to have encryption scheme thatdoes not rely on the security of encryption keys for providing networksthat use both wireless and wired networks.

SUMMARY

This invention describes Ambiguity Envelope (AE), a different form ofencryption technology specifically developed for security of wirelesstransmissions but may be used for wired transmission and a combinationof wired and wireless networks locally or nationally.

In AE an ambiguity envelope is created over the transmission path ofdata packets, so that no specific encryption key, as in prior art, isused. Instead, random-variant-keys are used that are distinct andseparate for each packet and may also be distinct and separate for eachincoming and outgoing packet.

AE uses prior art encryption algorithms and prior art encryption keysand provides systems and methods for random-variant-keys that arederived from and used in place of the prior art encryption keys.

These random-variant-keys have no mathematical relationship to eachother or to the prior art encryption keys. The random-variant-keys arenot created, stored at either end, or exchanged with each end oftransmission. The random-variant-keys are only created at the time ofthe actual use for encrypting or decrypting a data packet and thendiscarded after one time use.

Because the random-variant-keys are neither stored, nor transmitted byany method, there are no keys to create, secure, safeguard, distribute,destroy and recover as in prior art. Because random-variant-keys areindeterminate based on multiple degrees of randomness, as describedlater, the random-variant-keys cannot be computed. Therefore,random-variant-keys used in transmission cannot be determined. Thus AEprovides wireless transmission security that does not have thedeficiencies of the prior art as described in the background section.

BRIEF DESCRIPTION OF THE DRAWINGS

The novel features of this invention, as well as the invention itself,both as to its structure and its operation, will be best understood fromthe accompanying drawings, taken in conjunction with the accompanyingdescription, in which similar reference characters refer to similarparts. The drawings are:

FIG. 1 is a block diagram that illustrates the encryption scheme of thecurrent invention.

FIG. 2 is a detailed block diagram that illustrates the encryptionscheme of the current invention.

FIG. 3A-B are block diagrams that illustrate the operation of theencryption scheme of the current invention.

FIG. 4A is a block diagram that illustrates the application of thisencryption scheme in a national wireless network of this invention.

FIG. 4B is a block diagram that illustrates the operation of theapplication of this encryption scheme in a national wireless network ofthis invention.

FIG. 5 is a block diagram that illustrates the operation of theapplication of this encryption scheme between wireless devices such ascell phones.

FIG. 6 is a block diagram that illustrates the operation of theapplication of this encryption scheme in a mobile ad hoc wirelessnetwork.

FIG. 7 is a block diagram that illustrates the use of optical means totransfer BRNs between devices that use the encryption scheme of thisinvention

DESCRIPTION

With reference to FIG. 1, this invention has an Ambiguity Envelope (AE)security system 10, which has a bounded random number generator function16, an ambiguity envelope function 12 and a jitter function 14. Theoutput of the bounded random number generator function 16 is calledbounded random numbers or BRNs 17. BRNs 17 are input to the ambiguityenvelope function 12. The AE function 12 using a shuffling and pairingsub-function 22, and an envelope creating sub-function 24 creates anambiguity envelope 13. An envelope offset sub-function 26 uses envelope13 and when inputted packet number 22, outputs an envelope offset 27,which is input to the jitter function 14. The jitter function 14 usingthe input of the ambiguity envelope offset 27 and the prior art key 20outputs random-variant-keys 18.

The AE implementation uses a small memory and processing throughputfootprint that rides over the existing prior encryption schemes thusmaking the AE implementation relatively convenient in prior artencryption devices and prior art devices that embody embedded encryptionmechanisms. Integrated circuits, firmware and components that facilitateuse of AE may be manufactured and sold to manufacturers of wirelessdevices such as cell phones, wireless access points, and other devices.

With respect to upper part 60 of FIG. 2, the system 10 uses prior artencryption scheme using encryption algorithm 42, seed value 44, plaintext 46 and encryption key 20 over a prior art wireless network 40.

As illustrated in lower part 62 of FIG. 2, in AE 10, the prior artencryption key 20 is jittered or randomly modified to createrandom-variant-keys 18 for each packet #X. The random-variant-key 18 isthen what is used for each packet instead of the prior art key 20. Therandom-variant-key 18 is like the prior art key 20 in every respectincluding the key length. The difference between the random-variant-keys18 and the encryption key 20 is that the random-variant-keys 18 arerandomly created variants of the encryption key 20.

As shown, the random-variant key 18 is created by a Jitter function 14to which is input, the prior art encryption key 20, and the ambiguityenvelope offset 27. The offset 27 is output by the AE function 12, whenthe AE function 12 is input the packet sequence #X 21. The envelope 13,which is used to compute the offset 27 is based on the BRNs 17 and theAE parameters 48 as described later.

In the AE function 12, the packet sequence #X 21 is used to read anoffset value 27 from the envelope 13 and is used by the jitter function14 to create a random-variant-key for that packet number #X 21.

The ambiguity envelope 13 has x-axis as packet sequence number andy-axis has as the amplitude or offset of the envelope. This offset valueis read from the envelope for a given packet number and is used by theJitter function 14 to create a random-variant-keys 18 for this packet.Hence, the random-variant-keys are different for every packet and iscreated at the time of use for one time use in the temporary memory andthen discarded.

A time slice such as one second or some other time, in place of packetnumber 22 may also be used. The packet number is preferred as it is arecognized unique prior art mechanism to identify the order and sequenceof transmission of packets between the two ends of transmission. Howevera time slice instead of packet may also be used provided the time systemclocks at the ends of transmission are synchronized and can be reliedupon.

With reference to FIG. 2, the AE function 12 and Jitter function 14 arepresent at both ends of the transmission path. For illustrationpurposes, the line 40 divides the transmitting end 40A and the receivingend 40B.

The BRNs 17 and the AE parameters 48 enable the random variation of theprior art key 20 resulting in random-variant-keys 18. The BRNs 17 arecreated at one end of the transmission path and then transferred to theother end by an out-of-band method depending upon the application asdescribed later with reference to FIGS. 4, 5, 6 and 7.

With reference to FIGS. 1 and 2, AE parameters 48 determine how the BRNs17 are transformed into an ambiguity envelope 13 using shuffling andpairing function 22 and a envelope creation function 24. The offsetfunction 26 outputs an offset 27 of the envelope 13 when input a packetsequence 21. These functions 22, 24 and 26 are described in more detaillater and add or provide multiple degrees of random separation from theBRNs to the envelope itself. Thus knowledge of the BRNs 17 themselvesdoes not provide knowledge or computation of the ambiguity envelope 13.The AE parameters 48 may be unique and different for different classesof wireless devices that use encryption such as Wireless access point'snetwork and cell phones.

With reference to FIGS. 1 and 2, in a system of encryption forcommunication security that uses an encryption algorithm 42 and apre-placed encryption key 20, this invention provides a securityfunction 10 that generates a sequence of random-variant-keys 17 one at atime, on a per packet basis in temporary memory of an encryption devicefrom the pre-placed key 20 at the time of encryption and not before anduses these random-variants-keys 18 for encryption instead of thepre-placed key 20 and immediately thereafter discards therandom-variant-keys 18.

Bounded Random Number Generator Function 16

Prior art random generators of any type may be used to generate asequence or set of random numbers of specified number of digits. Whenthe random number is limited to a specified number of digits it may becalled a bounded random number or a BRN. For example, if an up to 2digit random number is derived from a larger random number generatedfrom a prior art random number generator function it is a bounded randomnumber.

The random numbers may be bounded to any number of digits depending uponthe application. For some applications they may be single digit boundedand for some other applications they may be bounded to such as 2 or manymore digits. Further, a sequence of such bounded random numbers iscreated. Such a sequence may have a short sequence of 6, or a mediumsequence, or a long sequence that have many tens of bounded randomnumbers. A sequence that is even and of at least six numbers ispreferred as is described later. These bounded random numbers are usedfor creating an indeterminate envelope as described later. The envelopeis considered indeterminate having multiple stages or degrees of randomseparation from the BRNs themselves.

Ambiguity Envelope Function 12

This function has three sub-functions as described here. The input tothe function 12 is the sequence of BRNs from the function 16 and theoutput is an ambiguity envelope offset 27, which is input to the jitterfunction 14. The three sub-functions are:

Shuffling and Pairing Sub-function 22

This sub-function takes the BRNs 17 shuffles them, and then pairs themso that each pair may describe cycle time and amplitude parameters of awave. As a simplified illustration, if there are six numbers, 12, 45,56, 23, 67, 98 generated in that order by the BRN function 16, then theshuffling function shuffles this sequence in one of many shuffles. An AEparameter 48A may be used to define one of many shuffle approaches. Theshuffled BRNs are then paired in three pairs. Another AE parameter 48Bmay be used to define the pairing. The pairs then may be furthershuffled to define which of the number of a pair represent the cycletime of the wave and which represents the amplitude. The output of thissub-function is a number of pairs. As a simplified illustration, whenthe BRNs are six in number, output of this function, are three pairs ofnumbers, where each pair represents the cycle time and amplitude of awave. The three wave pairs from the six BRNs after the operation of thisfunction may be (56, 98), (45, 12), and (23, 67) where the first numberof the pair is cycle time and the second number is the amplitude.

Envelope Creation Function 24

In this function, each pair of BRNs is then mapped to a wave type suchas a sine wave, or a square wave or a triangle wave. Again an AEparameter 48C may define which one of many possible approaches tomapping may be used. The wave types are chosen to be a sinusoidal, atriangle and a square wave type. Other wave types may also be used butthese wave types are preferred as they are defined by a pair of numbersthat map to two of the BRNs and are distinct in their properties of howtheir amplitude on y-axis varies along the x-axis.

Once the mapping to the wave types is done, this function then takes thethree waves and additively combines them into one envelope. By addingthese wave types of different types results is an ambiguity envelope 13.Optionally a phase value may be assigned to each of the waves beforethey are additively combined if one of the BRNs may be used to representa phase value. In addition, a phase may be added to the entire envelope,where such a phase would be different for the sending and receiving endsof the transmission.

How the BRNs 17 may be converted to an ambiguity envelope 13 has beendescribed. Many approaches in addition to the above may be used and arenot ruled out. The shuffling, pairing and then shuffling within the pairthat map to one of the wave types provide different types of randomapproaches to separate the envelope from the BRN itself. Mere knowledgeof the BRNs themselves would make impossible the creation of theenvelope. Alternatively the BRNs may be straight forward used to createan envelope without the use of shuffling, pairing and shuffling with inpairs as defined by the AE parameters 48. However, it is believed thatthese functions add different types of randomness for the creation ofthe envelope from the BRNs and thus provide additional level or layer ofsecurity. Therefore, the compromise of the BRNs does not affect thesecurity as provided by this invention in creating random-variant-keys18.

Furthermore, the ambiguity envelop 13 that results is indeterminate andcould not have been duplicated by any means as it is a summation ofdifferent wave types, randomly selected, and used randomly assignedparameters from a random set of parameters. The ambiguity envelope doesrepeat but at a random cycle time. The cycle time of the envelope isbased on the factorial of the cycle time of the three waves. Forexample, if the three cycle times are 56, 45 and 23, then the cycle timeof the envelope would be a lowest number that is divisible by 56, 45 and23. Hence the ambiguity envelope is indeterminate having been derivedfrom the BRNs by a series of operations as described herein. Theamplitude of the envelope 13 would randomly vary between the positiveand negative values of maximum of sum of individual wave amplitudes.Hence the offset value 27 for a packer sequence number #X 21 may bepositive or negative between these maximums or zero.

Given the same BRNs 17 at the two ends of the transmission and the sameAE parameters 48, the same ambiguity envelope can be created. There maybe two envelopes at each end of the transmission, one for generatingrandom-variant-keys for encrypting outgoing packets and one forgenerating random-variant keys for decrypting the incoming packets.These two different envelopes may use a different sets of BRNs or usethe same set of BRNs but add a different phase to the envelope, so thata different random-variant-key would result for the incoming packet andthe outgoing packet, even if the packet sequence number is the same andeven if the packet sequence number is different. In a real transmissionthe packet sequence numbers may be different as more packets may betransmitted in one direction than in the other direction. For examplewhen the same BRNs are used at the two ends, the phase offset may bezero at one end and another number at the other end. For this offset,some of the numbers from the sequence of the BRNs themselves may beused.

Envelope Offset Function 26

This function, when input a value for an x-axis, computes a y-axis valuefrom the ambiguity envelope. The x-axes value is a packet sequencenumber in a session of communication. The y-axis is an envelope offsetwhich is input to the jitter function 14. This function is input thepacket sequence number at the time of the packet creation and outputs anoffset value. The offset value from the envelope for a given packetsequence number maybe an integer, maybe an integer plus a fraction, ormaybe positive or negative or zero. This offset may be used in a varietyof random ways to provide random-variant-keys 18 as described in thejitter function 14.

Jitter Function 14

The jitter function 14 transforms the y-axis offset of the envelope intoa series of numbers and this series of numbers is used to alter thepre-placed key 20 to arrive at a random-variant-keys 18, where eachy-axis offset yields a new random-variant-key.

The jitter function 14 may use one or a combination of techniques of,(i) the pre-placed key is altered by performing an operation such as bitreversal corresponding to the series of numbers, (ii) the pre-placed keyis altered by performing an operation such as adding or subtracting theoffset from the pre-placed key. Any number of possible approaches fromthe envelope offset maybe used to create random-variant-keys in additionto the two described above.

As a simplified illustration, using the first technique, if the offsetis 329.7, the series of numbers derived from this offset may be 3, 2, 9,32, 29, 39, 5, 11, 14 by a combination of the numbers 3, 2, and 9. Thesebit numbers in the key may be flipped from a 0 to 1 or a 1 to a 0. As asimplified illustration, using the 2^(nd) technique, the offset number329 may be added to the prior art key at the 7^(th) bit position fromone end of the key. Other similar techniques that are derived from theoffset value may be used. These techniques are embedded in the jitterfunction 14 that is present at both ends of the transmission. Thetechnique that is used in a jitter function may be different fordifferent classes of the devices that use the security function 10. Forexample one technique may be used in cell phones and another techniquemay be used in the wireless access points of a network.

A third technique may also be used for creating random-variant keys 18.This third technique may create two random-variant-keys for each packetthat may be used as layers of keys for double encryption. For example,technique 1 may be used to create a random-variant-key1 18 and technique2 may be used to create a random-variant-key2 as shown in FIGS. 3B-1 and3B-2. Then key1 may be used to encrypt a data packet and key2 may beused to further encrypt the same data packet.

This technique provides an additional level of randomness in thegeneration of random-variant-keys and an additional layer of security.For a given packet even if brute force approach were attempted to breakthe random-variant-key for that packet alone, the plain text of thepacket's data contents would not result and would not verify theaccuracy of the random-variant-key.

Operational Steps

FIGS. 3A and 3B-1 & 2 describes the operation of the security function10. As shown security function 10 of FIG. 1, has three steps, 82, 84 and86. Step 82 is a Bounded random Number (BRN) function. The Step 84 is anambiguity envelope function. Step 86 or 87, is a Jitter function.

Step 82

Step 82, as in FIG. 3A is a bounded random number (BRN) generatorfunction. It is used to create six two-digit numbers. Since, suchnumbers are commonly used in a lottery, the output of Step 82, as such,may be named a lottery number. Hence Step 82 generates a lottery numbermade of six two-digit numbers. Where manual methods maybe used to copy aBRNs from one device to another device, the concept of lottery numbermakes it easier to humanly read, receive and enter into a device.

In this description, the terms AE coefficients, lottery number and BRNmean the same thing and may be used interchangeably. These are a set ofbounded randomly generated numbers by a random number generatorfunction. When they are limited in size such as one digit, 2 digit, etc,they are referred to as bounded random numbers. When they are bounded to2 digits and are six in number they are referred to as a lottery ticket,as customarily, a lottery ticket has six two-digit numbers. However,depending upon the application the BRN may be longer numbers and maycorrespond to more than six numbers.

Step 82 is performed on one end of the two points of a wirelesstransmission path. Which end of the transmission link it is performed,how often it is performed or the BRNs are refreshed and how the BRNs arecarried or conveyed over to the other end of the transmission path isillustrated later with reference to FIGS. 4, 5, 6 and 7 for differentapplications. Thus having the lottery number, AE coefficients or BRNs atboth ends of the transmission now leads us to Step 84.

Step 84

As shown in FIG. 3A, Step 84 has four sub-steps 1 to 4. Optionally an AEflag 33 may be used to turn the features of security function 10 on oroff in a given application.

In sub-step 1, the AE function 12 takes the lottery number 17 andcreates an ambiguity envelope 13. A simplified representative envelope13 is shown. The envelope 13 has an x-axis and y-axis. The x-axis ispacket sequence number 21 and y-axis is amplitude or offset 27 for thepacket sequence number 21.

Three different AE parameters 48 may be used to quantify how the BRNs 17may be transformed into an ambiguity envelope. The AE parameters may be,(i) Wave Pairs (WP), (ii) Wave Order (WO), and (iii) Wave Type (WT).

As an illustration, if the BRN is a set of six two digit numbers 24, 64,23, 89, 72 44, then for example, WP may be 1, 6, 2, 4, 3, 5. This meansthat 1st and 6th number form a pair, 2^(nd) and 4^(th) number form apair and 3^(rd) and 5^(th) number form a pair, so that the pairs thatdefine a wave are (24, 44), (64, 89), and (23, 72). The WO defines ineach pair, which number is cycle time and which number is amplitude. Forexample, WO may be, (23 is Cycle time and 44 is Amplitude), (64 isamplitude and 89 is cycle time) and (23 is amplitude and 72 is cycletime). The WT defines the type of each of the waves, such as, first pairrepresents a Triangle wave, second pair represents a Square wave, andthird pair represents a Sine wave or even a Cosine wave.

These AE parameters take the original six randomly generated numbers andturn them into three waves, each with an amplitude and cycle time. Thusthe lottery number yields three waves of different amplitudes, cycletimes and different shapes or types based on the lottery number set ofsix numbers. Then these individual waves are additively combined toyield an ambiguity envelope 13.

These steps of starting from the random bounded random numbers 17 andarriving at the ambiguity envelope 13 provide different types ofrandomness and break the chain of mathematical causation between theBRNs 17 and the ambiguity envelope 13.

Having a different set of AE parameters 48 enables AE function 12 to bedifferent from application to application or even among applications byassigning a version number to the AE function.

The ambiguity envelope would repeat after a number that is equal tofactored number of multiplication of three cycle times. For example, ifthe cycle times of the three waves are 33, 67, 99, and since 99 isdivisible by 33, then the envelope would repeat after 99×67 packets orseconds (if time slice is used), because at that interval, a wholenumber of each of the waves are present.

The AE function 12, performs the tasks of, given or initialized with alottery number, creates the ambiguity envelope as described above, andwhen is inputted a packet sequence number or time sequence, looks up thecorresponding offset for it. The amplitude or offset of the ambiguityenvelope may be positive, zero or negative for different packet sequencenumbers. It may be a whole number that may be rounded from a fraction ormay be fraction.

At sub-step 2, the standard 128-bit encryption key and the offset fromthe ambiguity envelope function 12 is input to the Jitter function 14.The Jitter function 14 then yields a random-variant-key 18 for a givenpacket sequence number, as illustrated in Step 86. At sub-step 3, astandard encryption function 42 is used with the random-variant-key 18.At sub-step 4, a function keeps track of the incoming and outgoingpacket sequence numbers by incrementing these two variables. Thesevariables are used in sub-step 1 and sub-step 3 as shown.

The Step 84 functions of AE function 12 and Jitter function 14, asoutlined above, are duplicated in the software or firmware at both theends of the wireless transmission. The separate incoming and outgoingpacket sequence numbers synchronize the generation and use of therandom-variant-keys 18 at both ends of transmission.

Generally for each transmission/communication, the packet sequencenumber is initialized. However, there may be reset or synch commandsexchanged between the two ends of transmission that would reset orre-synch the packet counters to either zero or another fixed number.Alternatively, instead of packet number a time such as in secondsreferenced to the beginning of the session may be used. When time isused the ambiguity envelope on the x-axis will have time in seconds. Aparticular offset for a given time read on the x-axis may be used untilthe next time segment.

Step 86

The offset 2 is used to jitter or vary the prior art key 20. Forexample, if the AE offset is 69, this number may be used arbitrarily sothat the random-variant-key for this packet may be where the 6^(th),9^(th), 15^(th) and 69th bit are flipped in the 128 bit encryption key.

If offset is zero, the packet data may be dummied up. If offset isnegative, then a slightly different jitter approach may be used or thenegative may be treated as a positive offset. If the offset is a wholenumber and a fraction such as 79.23, then these numbers may be used todecide which of the bits will be altered or flipped.

The random-variant-keys, as described above, have no mathematicalrelationship to the original static key 20. Thus the jitter function 14creates a large number of random-variant-keys 18 from one original key20 that permit a different random-variant-key to be used for each packetas long as the incoming and outgoing packet sequence numbers remainsynchronized at the two ends of the wireless transmission path.

In an alternative scheme different layers of random-variant-keys may beused. For example, what is described above with reference to FIG. 3B-1may become the first layer of random-variant-keys and what is describedin Step 87, in FIG. 3B-2 may become the second layer ofrandom-variant-key.

Step 87

FIG. 3B-2 illustrates that the offset number itself may be used tocreate another key, where the offset number is placed in some randomvariable location of the 128 bit key. As an illustration, if the offsetis 329.72, the second layer of random variant key may be the number 329starting in the 72^(nd) bit location. Similar other schemes may be usedbased on the offset.

Now with the help of FIGS. 4 to 7, different applications where thesecurity function 10 of FIGS. 1 and 2 may be used are described. FIG. 4describes a wireless network application, FIG. 5 describes a cell phoneapplication, FIG. 6 describes a mobile ad hoc wireless networkapplication, and FIG. 7 describes the use of optical means fordistribution of BRNs in some of the applications.

Wireless Network Application 100

With reference to FIG. 4A, this invention describes a system of security100 in a nationwide wireless network that uses the security function 10of this invention.

The system 100 may use adapted wireless access points (WAPs) 140connected to either a local area network, a wide area network of abusiness or to a global network 112. The WAPs may be used by wirelessdevices such as laptops 132, of users with cell phones 130. The usersmay be employees of a business, or at large users who have subscribed tothis service as described herein.

In the system 100, there is a call screening function 102 that receivescellular calls with caller id and geographic cell data and screenspermitted calls based on a pre-stored list of caller id; a call mappingfunction 104 that maps the call to a WAP in the area identified by thecell; and a call routing function 106 that routes the call to atelephone number assigned to a WAP in the area.

The service related to functions 102, 104, and 106 maybe provided by aservice provider or the service maybe provided by a cellular telephonecompany 120, which provides the telephone numbers. It is to be notedthat the cell network provides a unique caller id mechanism that is tiedto the SIM card of the cell phone, along with a cell based geographiclocation identification of the caller's physical location at the timethe call was made.

Some of these functions, 102, 104 and 106 may be provided by a cellularcompany and other functions provided by a service provider. For example,the cellular company may provide caller id and geographic location datafor each call and the cellular company 120 may maintain a list ofauthorized account holder caller ids, who have subscribed to thisservice and screen calls against this list and forward such screenedcalls to a service provider. The service provider may a business entitythat maintains the servers that facilitate the automatic operation offunctions 102, 104 and 106.

The service provider then may map the caller id and location data to aWAP in that geographic area. The mapping may be based on both thegeographic area as well as the caller id. This dual mapping would enableidentifying and mapping the callers to those WAPs that are available forcertain network as those belonging to a national business based oncaller id identification. This would enable different WAP and networksto be maintained for different national companies. The service providerthen is able to route the calls from cell phones to a specific WAP inthe geographic area.

In this system of security 100, the prior art WAP 108 is adapted with atelephone interface and a simplified IVR 110 that is able to voicedeliver a sequence of numbers resembling a lottery ticket, such as twodigit BRNs, to the caller.

The WAP 108 is further adapted with the functions of security function10, as was described earlier with reference to FIG. 1. These functionsare bounded random number generator function 16, ambiguity envelopefunction 12, and jitter function 14. These functions (i) generate BRNs,(ii) converts the BRNs numbers to an envelope, with x-axis packet andy-axis identifying envelope amplitude as an offset, and (iii) using theoffset as a parameter provide random variants of the pre-placedencryption key and using the random-variant-key as the encryption key inplace of the pre-placed key for encryption in the WAP.

The adaptation of WAP 108 also includes a function to receive a call,create a data record anchored by the caller id of the call, and select aport number that may be assigned to this caller, use function 16 togenerate BRNs 17. The adapted WAP 140 maintains data records with theinformation fields of, time stamp of the call, caller id of the call,port number assigned to this call and the BRNs that were generated forthis call. Similar records are maintained for each call that is receivedby the adapted WAP 140. The WAP 140 may also have a feature to deletesuch a record at the end of session or 24 hours which ever occurs first

The wireless card 134 present in the laptop computer 132 of the user isan adapted wireless network interface card. The wireless interface card134 adapted with a function to display and be able to input a series ofrandom numbers and a port number of a WAP via a display screen 122.

The wireless card is further adapted with some of the function ofsecurity function 10 that is the ambiguity envelope function 12 andjitter function 14. These functions (i) converts the BRNs numbers thatare received via screen 122, to an envelope, with x-ax-s packet andy-axis identifying envelope amplitude as an offset, and (ii) a functionthat using the offset as a parameter provide randomly variants of thepre-placed encryption key and using the random-variant-key in place ofthe pre-placed key for encryption in the wireless card 134. The wirelessinterface card 134 of the computer device 132 is adapted to work withthe adapted Wireless access point 140.

Hence, the adapted WAP 140 and the adapted wireless card 134 are able touse random-variant-keys for encryption and decryption of the wirelesscommunication between the wireless card 134 and the WAP 140.

FIG. 4B illustrates the operation of the nationwide wireless applicationof this invention.

At Step 1, the laptop computer user equipped with an adapted wirelesscard, using his cell phone, calls a designated telephone number.

At Step 2, the cell phone company 120 receives the call.

At Step 2A, the service provider performs a Screen Function, whichscreens the call as one who has subscribed to the service, based oncaller id and then routes the call to a Map function.

At Step 2B, the Map function maps the call's geographic cell location toavailable WAPs in that cell location. The mapping in addition to thephysically proximity of the WAP to the cell location may also use thecaller id for mapping. The caller id mapping may be able todifferentiate those WAPs that belong to a private business networkbelonging to a national business and are allowed to be used bypre-identified callers with pre-registered caller ids with thisbusiness.

If the mapping function is unable to map such a refinement of location,due to multiple WAPs in the same location, the caller may be asked toselect from a sorted list of locations in the specific cell by the Mapfunctions.

At Step 3, the cellular company uses a Route function, which routes thecall via a public telephone network 121 to the specific WAP approved forthe caller's use from the collection of WAPs in the database.

At Step 4, thus the call, after being routed through the ScreenFunction, the Map function and the Route Function, is answered by thespecific WAP adapted with a telephone modem interface with an IVR. Thecaller is unaware of these functions and the call is answered by thespecific WAP close to the caller's physical location.

At Step 5, the adapted WAP 140 answers the call.

At Step 5A, the WAP 140 creates a record with the time stamp and callerid, assigns a port number, generates, stores in the record the BRNs, andvoice delivers BRNs to the caller along with the port number.

At Step 5B, the WAP 140 monitors the sessions and deletes the record, ifthe wireless communication session is not established within a specifiedtime threshold of the time of delivering the BRNs to the caller anddeletes the record at the end of the session or up to a time limit suchas 24 hours if the session is continuing. Thus the WAP does not maintaina long list of records anchored by the caller id and the port number andfrees up the port for other users.

At Step 6A, the caller hears the seven numbers port number and the sixBRNs and at step 6B enters them into the screen 122 that is provided bythe adapted wireless card. The caller enters his caller id and clicks OKto complete Step 6B.

In this application, the caller id of the phone that is used to call theWAP or some other number that is created by the caller may be used forauthentication between the laptop and the wireless access point. If thecaller id is used it is automatically recorded from the call by the WAP,and is also entered by the user along with lottery numbers in screen 122as shown in FIG. 4B. This number may be used in the body of the datapackets to authenticate the laptop to the WAP and vice versa.

At step 7A, the adapted wireless card stores the BRNs and uses securityfunction 10 to create random-variant-keys that are used in place of thestandard key for encryption and decryption of the wirelesscommunication. At Step 7B, a similar function is performed in thewireless access point 140.

At Step 8, the packets that are exchanged between the laptop and the WAPmay provide the port number in the header of the packet in addition tothe prior art information such as SSID. This enables the WAP to identifythe packets for one of the ports and be able to find the record that hasthe caller id and the BRNs and know which BRNs to use for thisparticular laptop transmission for this particular user. This enablesthe WAP to apply the right envelope and the right random-variant-keys todecrypt the packet and find in the data the caller id, which is used toauthenticate the laptop user as the one who made the call and was giventhis set of BRNs.

Cell Phone Network Security System Application 200

Cell phones and similar wireless devices are used by individuals, lawenforcement groups, business entities, and other special groups who maywish to add extra security to their conversations and data transmittalsthan what is provided by the digital phones themselves as part ofwireless security by the cellular telephone companies. Such wirelessdevices are used for both voice and data communication.

As part of the encryption already provided in digital cell phones, anencryption key that may be part of the SIM of a cell phone encrypts thewireless communication from the cell phone to the cell company network,where the cell company decrypts the communication and may route it on aland line to the network of the recipient cell phone company, where therecipient phone company encrypts it with the encryption key of therecipient phone and routes it wirelessly to the recipient phone. Thusthis encryption security as provided by prior art devices protects thewireless part of the communication. Many people are of the opinion thatthis encryption is not strong and may be broken by determined parties.The security provided by the security function 10 as described earlierwith reference to FIG. 1 may additionally be provided to such a wirelessor cellular network. The security function 10 may be adapted in the cellphones to work at a layer below the mode of encryption security in priorart cell phones, thus leaving the prior art encryption intact.

With reference to FIG. 5, a system of security 200 against eavesdroppingbetween handheld wireless devices such as cell phone communication basedon security function 10 is described. The system 200 has prior art celltowers 220, prior art cell phones 202, and prior art caller id 204associated with each phone.

In system 200, each cell phone 202 is adapted to provide the securityfunction 10 as has been described earlier with reference to FIG. 1. Inthis adaptation, each cell phone is further adapted with an AE cellPhone Function 206, BRN Function key 208 and AE function key 210.

The AE cell phone function 206 provides interfaces to soft key 208 andsoft key 210 and maintains a table 212. The table 212 maintains a listof phones identified by caller id 204 and their corresponding BRNs 17.

When the BRN function key 208 is activated, it launches the BRN function16 of the security function 10 and displays BRNs 17 on the screen of thephone 202. These BRNs 17 are then manually transferred or copied toother cell phones. The BRNs may also be transferred via an opticalinterface, if the phones 202 are equipped with such an interface.

The function 206 maintains a table 212, which for each caller id 204maintains the corresponding BRN 17. Thus function 206 allows each phoneto maintain a BRN for itself and each phone it may choose to communicatewith the use of security function 10.

Soft key 210 enables each phone 202 to choose to activate the securityfunction 10 for all calls or for some calls by turning the soft key onand off. When the soft key 210 is off, the phone works like a prior artphone without using the security function 10. Hence, in this system 200,each phone may selectively enable and disable the security function 10for each communication by setting a flag via soft key 210 that is underthe control of the user.

In FIG. 5, for the purpose of explanation, one of the cell phones 202 isidentified as cell phone A 202A and another is identified as cell phoneB 202B.

When cell phone A communicates with the cell phone B, and when the softkey 210 is activated in the cell phone A, the cell phone A activates thefunction 206. The AE cell phone function 206 searches for the BRNs inthe table 212, that are applicable to the caller id 310 332 4343 of cellphone A (caller phone), as 345679 and searches for the BRNs in the sametable 212, that are applicable to the caller id 626 332 4834 of cellphone B (called phone). The function 206 with the help of function 10uses these BRNs to generate random-variant-keys and usesrandom-variant-keys for encrypting outgoing transmission that are fromthe BRN associated with own caller id and uses the random-variant keysfor decryption that are from the BRN that is associated with the callerid of the other phone in the table 212. A similar operation takes placein the called cell phone B.

Cell phone A and B each equipped with a security function 10 thatgenerates BRNs for each phone or caller id, converts each BRNs at eachend into an ambiguity envelope, with an x-axis and a y-axis and with ajitter function 14 that using the offset from the envelope creates atime and packet dependent sequence of random-variant-keys from theexisting key and use such keys for encryption.

Hence in this application, it is possible, while leaving all thefunctions of existing cell phone intact, add or overlay AE encryptionsecurity between any two or more specific cell phones. Each cell phonepair may have software functions that enable a layer of encryption usingAE in addition to what ever is used in prior art. Hence, the AE can beoptionally be used between any two phones and not other phones and notall phones and it may be activated or deactivated to be used or not usedfor each call. When the call is received at a cell phone and if AE ison, then it checks the caller id against the list and if a BRN is found,which will be the same as used by the caller, then AE encryption isused.

The system of security 200 has an exchange mechanism where the cellphones may use manual, infrared, and radio frequency means of exchangingthe BRNs. AE may also be used in many other wireless as well as wiredapplications that are not described here.

Mobile Ad Hoc Wireless Networks 400

Some times ad hoc wireless networks may need to be set up in remoteareas and or in a theatre of operation. FIG. 6 shows the mobile ad hocwireless network application 400 most likely to be used in a theatre ofoperation. Assuming such an application 400 has a base station 402 andmultiple forward base stations such as 404 and 406, and each basestation supports multiple hand held units 406 and 408.

These base stations 402, forward stations 404 and 406 and handhelds 406and 408 may be equipped with the security function 10 as has beendescribed earlier with reference to FIG. 1.

In such an application 400, BRNs may be generated in the forward basestation 404 and either may be manually keyed in each of the hand sets406 for this forward base station. Alternatively, as shown in FIG. 7, ifthe forward base station and the hand held units are equipped withinfrared capability, then the BRN may be transferred to all hand unitsat one time within a few seconds from the forward base station byplacing them in close proximity to each other.

As shown in FIG. 7, the base station #2 406 is equipped with an opticaltransmitting means 410 and each of the handhelds 408 are equipped withan optical receiving means 412. Multiple handhelds 408 may be placed asa group in the optical transmitting path of optical interface 410 andthus would be able to simultaneously transfer the BRNs to the handhelds408. The BRNs may be changed for each mission or whenever desired forsecurity reasons of the environment where the mobile ad hoc wirelessnetwork is put in place.

Hence, optical means such as use of infrared, if the devices areequipped with infrared sensors such as commonly used in televisions andlike, may be used to quickly and efficiently transfer the BRNs to theother end of the transmission path.

Different BRNs may be used for different forward base stations. Forexample forward base station #1 404 may use BRN1 that it generated forits hand held units 406. Forward base station #2 406 may use BRN2 thatis generated for its hand units 408.

Forward base station # 1 to communicate with forward base station #2 maygenerate BRN3 and that may be manually entered in forward base station#2 or copied via other means. Each of the forward base stations may usea different BRN such as BRN 4 and BRN 5 when communicating with the basestation 402. These BRNs 4 and 5 may be generated by base station 402 andmanually communicated and entered in by the people setting up the baseunits at the time of set up. This having different BRNs spread out overa theatre of operation of ad hoc mobile network provides additionaltransmission security.

Other Applications

There are many other applications where the security function 10 may beused in addition to the three applications of wireless networks, cellphone networks and ad hoc wireless networks as described above.

In an application, the wireless and wired part of a network may becombined to provide the security function 10 over an entire network fromend to end. In this application the user of a laptop may directlycontact the host computer and receive BRNs. While the user may still usea wireless network, the security function 10 may provide security overthe entire network from the laptop to the host computer including thewireless and the wired part of the network to the host computer.

The system of security 10 may also be used in the wireless device thatmay be blue-tooth equipped device, where the communication is betweenthe cell phone and a blue tooth extension of the device such as anearpiece.

If the other end of the blue tooth device is an earpiece, which may useprior art means of switches and display window to manually transfer theBRN. The cell phone owner reads the BRNs on the phone and one by onemanually transfers them to the earpiece via the switches and thedisplay. This manual operation is required to be done only once by theuser or when ever he/she wants to reset the encryption, every few monthsor year or so. Alternatively, if the Bluetooth devices are so equipped,the BRNs may be transferred via Bluetooth format or an optical format.

Another application may be satellite to ground communication, where theBRNs may be long and complex and are installed in the satellite atlaunch times or they may be updated at other times by other means.

The security function 10 may be implemented in software, firmware andhardware integrated circuits depending upon the application. Ifimplemented in an integrated circuit chip that embeds the securityfunction 10 then it has, (i) an interface for inputting a series ofbounded random numbers, (ii) a logic that converts the numbers to anenvelope, with x-axis corresponding to a packet sequence and y-axiscorresponding to an envelope amplitude offset for a packet sequence, and(c) a logic that uses the offset for a packet sequence number and astatic encryption key as inputs and randomly variates the staticencryption key outputting random-variant-keys, thereby enabling the useof the random-variant-keys for encryption and decryption of data packetsin place of the static key.

The use of security function 10 in these and other applications providesfor a robust and in-depth transmission security, where the security ofthe communication is not dependent upon the security of prior artencryption keys and thus reduces the cost and effort of frequentlyupdating the prior art encryption keys and maintaining a key managementinfrastructure for them.

While the particular system and method as illustrated herein anddisclosed in detail is fully capable of obtaining the objective andproviding the advantages herein before stated, it is to be understoodthat it is merely illustrative of the presently preferred embodiments ofthe invention and that no limitations are intended to the details ofconstruction or design herein shown other than as described in theappended claims.

1. In a system of encryption for communication security that uses anencryption algorithm and a pre-placed encryption key, the systemcomprising: a security function that generates a sequence ofrandom-variant-keys one at a time in temporary memory of an encryptiondevice from the pre-placed key at the time of encryption and uses theserandom-variants-keys for encryption instead of the pre-placed key andimmediately thereafter discards the random-variant-keys.
 2. The systemas in claim 1, the security function comprising: a. an ambiguityenvelope function that creates an envelope, from which y-axis offsetscan be derived from x-axis values; b. a jitter function that using they-axis offsets creates random-variant-keys.
 3. The claim as in 2, theambiguity envelope function comprising: a. a randomly derived set ofnumbers using a bounded random number generator; b. the random numbersin the set are randomly paired and assigned to different wave types andtheir properties such as, cycle times and amplitudes.
 4. The claim as in3, the ambiguity envelope function comprising: a. additively combining aset of waves from a group of type of, triangle, sinusoid, and square,conceived from the randomly derived set of numbers; b. an enveloperesulting from such combination of wave types, with an x-axis thatcorresponds to time or packet sequence number and y-axis thatcorresponds to an envelope offset, where the envelope offset is used inthe jitter function to create random-variant-keys.
 5. The claim as in 2,the jitter function comprising: a. transforming the y-axis offset of theenvelope into a series of numbers; b. the series of numbers are used toalter the pre-placed key to arrive at a random-variant-key, where eachy-axis offset yields a new random-variant-key.
 6. The claim as in 5, thejitter function comprising: one of a technique of (i) the pre-placed keyis altered by performing an operation such as bit reversal correspondingto the series of numbers, (ii) the pre-placed key is altered by addingor subtracting the offset from the pre-placed key.
 7. The claim as in 5,the jitter function comprising: creating a random-variant-key1 using atechnique of where the pre-placed key is altered by performing anoperation such as bit reversal corresponding to the series of numbers,creating a random-variant-key2 using a technique where the pre-placedkey is altered by adding or subtracting the offset from the pre-placedkey, and then using these keys in two different layers of encryption. 8.A system of security in a nationwide wireless network using wirelessaccess points (WAP) to a global network, the system comprising: a. acall screening function that receives cellular calls with caller id andgeographic cell data and screens permitted calls based on a pre-storedlist of caller id; b. a call mapping function that maps the call to aWAP in the area identified by the geographic location of the cell; c. acall routing function that routes the call to a telephone numberassigned to a WAP in the geographic location of the cell and the WAP isadapted with a telephone interface.
 9. The system of security as inclaim 8, comprising: a. the WAP adapted with, a random number functionthat generates a set of bounded random numbers, and assigns a portnumber and delivers to the caller; b. a computer with an adaptedwireless network interface card adapted to being input the set ofbounded random numbers via a display screen, wherein the WAP and thewireless card use the set of bounded numbers to createrandom-variant-keys to encrypt the communication between the wirelesscard and the WAP.
 10. A system of security in a nationwide wirelessnetwork using wireless access points (WAP), the WAP comprising: awireless router adapted with a (i) telephone interface with the abilityto receive telephone calls, generate a set of bounded random numbers anddeliver to a caller.
 11. The system of security as in claim 10, therouter adaptation further comprising: a. a function that converts theset of bounded random numbers to an envelope, with x-axis identifyingpacket numbers and y-axis identifying envelope amplitude as an offset;and b. a function using the envelope offset as a parameter to generaterandom-variant-keys and uses the random-variant-keys as the encryptionkey in place of the pre-placed key for encryption from and to the WAP.12. The system as in claim 10, further comprising: a function that (i)assigns a port number and delivers as part of the set of bounded randomnumbers, (ii) create a record with the caller id used as a reference forthe set of numbers, (iii) delete the record at the end of thecommunication session or a twenty four hour period which ever occursfirst.
 13. A system of security in a nationwide wireless network usingwireless access points (WAP) for communication to wireless computingdevices, a wireless interface card of the computer device, comprising:the wireless interface card adapted with (i) a function to input aseries of random numbers and a port number of a WAP, (ii) a functionthat converts the numbers to an envelope, with x-axis packet number andy-axes identifying envelope amplitude as an offset, and (iii) a functionthat using the offset as a parameter generates random-variant-keys anduses the random-variant-keys for encryption in place of the pre-placedkey for communication to and from the wireless interface card.
 14. Asystem of security against eavesdrop between two handheld wirelessdevices such as cell phone communication, the device/cell phone,comprising: a. a cell phone A and a cell phone B, each adapted with afunction that generates a set of bounded random numbers; b. a sharingmechanism to share that set of bounded random numbers with cell phone Ato B and from B to A, each phone stores the set with reference to thecaller id of each of cell phones; c. cell phone A and B each equippedwith an ambiguity envelope function that converts each of the set ofbounded random numbers at each end into an ambiguity envelope, with anx-axis and a y-axis; d. cell phone A and B each equipped with a jitterfunction that using the offset from the envelope creates a packet numberdependent sequence of random-variant-keys from the pre-placed key anduses such keys for encryption.
 15. The system of security as in claim14, comprising: on communication from cell phone A to cell phone B, cellphone A encrypts the communication using random-variant-keys, cell phoneB finds the set of bounded random numbers corresponding to the caller idof cell phone A and decrypts the communication by using the samerandom-variant-keys, and on communication from cell phone B to cellphone A, cell phone B encrypts the communication usingrandom-variant-keys, cell phone A finds the set of bounded randomnumbers corresponding to the cell phone B and decrypts the communicationby using the same random-variant-keys.
 16. The system of security as inclaim 14, comprising: the sharing mechanism may include manual, optical,and radio frequency.
 17. The system of security as in claim 14,comprising: a function in each phone that can selectively enable anddisable the security for each communication by setting a flag that isunder the control of the user.
 18. The system of security as in claim14, comprising: the wireless device may be blue-tooth equipped device,where the communication is between the cell phone and a blue toothextension of the device and a wireless device that communicates with abase station.
 19. An integrated circuit chip that embeds a securityfunction that comprises: a. an interface for inputting a series ofbounded random numbers; b. a logic that converts the numbers to anenvelope, with x-axis corresponding to a packet number and y-axiscorresponding to an envelope amplitude offset for a packet number. 20.The claim as in 19, the integrated circuit chip further comprising: alogic that uses the envelope offset for a packet number and a staticencryption key as inputs and generates random-variant-keys, enabling theuse of the random-variant-keys for encryption and decryption of datapackets in place of the static key.