Cryptographic system using pseudocomplements of vector Boolean algebra

ABSTRACT

By using properties of pseudocomplements of vector Boolean algebra defined herein, a vector Boolean value which represents a plaintext of a message is converted to an enciphered text. The enciphered text consists of a pair of conjugate pseudocomplements of the plaintext with respect to a parameter which is a cipher key. In the deciphering process, the pair of the conjugate pseudocomplements is needed to recover the original plaintext. When a higher degree of message security is desired, both parties (a sender and a receiver) of a communication can establish two parameters (s,p) rather than one, and the sender can encipher a plaintext M into a pair of conjugate pseudocomplements (C 1 ,C 2 ) derived independently from the parameters where p is a pseudocomplement of a key c with respect to s. The derived conjugate pseudocomplements are C 1  =T S  *(M) and C 2  =T p   +  (M) where T s  * and T p   +  represent the transformations of pseudocomplementing operations with respect to its suffixed parameters. The receiver performs a pseudocomplementing operation with respect to c on C 1 , namely T c   +  (C 1 )=T c   +  (T s  *(M))=T p  *(M)and recovers the original message M by deciphering T p  *(M) and T p   +  (M) with respect to p. An advantage of this method is an increase of information entropy in each enciphered pseudocomplement over the one in a plaintext. Another advantage is an increase of the message length of an enciphered text. The first advantage can be applied to quickly establish a transient cipher key between a sender and a receiver through an insecure communication medium. The second advantage can strengthen a combinational complexity in an enciphered text so that in cryptanalysis, a decryption of the enciphered text becomes more difficult. Furthermore, when the two keys used in this system are enciphered by the third key, the decipher key used is different from its corresponding encipher key and is difficult to retrieve from the encipher key, which may be announced to general public. Thus this system becomes a public key system.

BACKGROUND OF THE INVENTION

This invention relates to a cryptographic system for enciphering and deciphering a digital signal conveying messages in data transmission networks. It is often necessary to protect stored and transmitted data from unauthorized parties or eavesdroppers. Cryptography offers the protection necessary for data privacy. However, as the required amount of privacy increases, the processing time for enciphering and deciphering a plaintext lengthens due to an increased complexity of the cryptography. It is desirable to have a simpler and faster cryptographic process and to provide a higher secrecy of data.

DESCRIPTION OF PRIOR ART

In the prior art, there are many cryptographic encipher/decipher techniques which are readily available to protect, to some degree, the secrecy of the stored and transmitted data. An example is the data encryption standard adopted by the National Bureau of Standards. See Federal Register, Mar. 17, 1975, Volume 40, No. 52 and Aug. 1, 1975, Volume 40, No. 149.

In general, cryptographic systems have three main components: (i) enciphering unit which transforms, by a mathematical one-to-one mapping, a plaintext and an encipher key(s) to a corresponding unintelligible ciphertext; (ii) an insecure medium for the storage or transmission of the ciphertext; (iii) deciphering unit which recovers the imbedded plaintext from the ciphertext by an inverse one-to-one mathematical mapping. This system includes at least two necessary parties utilizing the enciphering unit and the deciphering unit. These two parties are generally called the sender of the message and the authorized receiver of the message. A possible third party is generally referred as an unauthorized eavesdropper.

When the sender wants to secure his plaintext from the third party during transmission or storage, he can use enciphering unit using an enciphering key(s). An authorized receiver, who may be the sender, can retrieve the plaintext from the ciphertext in the medium by utilizing a deciphering key(s) on the deciphering unit. In an ideal situation, an eavesdropper trying to recover the plaintext from a ciphertext without knowing the deciphering key(s) will find the recovery computationally infeasible.

The effectiveness of a cryptographic system to protect against an attack by an eavesdropper depends on the computational complexity of the enciphering and deciphering processes and the sizes of the mathematical domains applicable to these processes. In other words, the effectiveness depends upon the capability to ensure that the eavesdropper is unable to decode any such ciphertexts. The sender and receiver arrange to have corresponding enciphering and deciphering keys which are kept secret from the eavesdropper, so that even if the eavesdropper knows the computational processes of the enciphering unit and the deciphering unit, he would not be able to decrypt the ciphertexts. A task is considered computationally infeasible if its cost, as measured by either the amount of memory used or the computing time, is finite but impractically large, for example 100 years computing time.

A byte is a string of n-bits, a word is a segment of m-bytes, a message to encipher or to decipher is a block of t-words, and a plaintext is a collection of messages. Since the enciphering and deciphering processes directed by a pair of chosen enciphering and deciphering keys are mathematically one-to-one mappings from plaintext-message domain to ciphertext-message domain and vice versa, the effectiveness of a cryptographic system can generally be measured by the computational complexity of the mapping functions (including the domain size of the keys) and the ratio of the size of the subdomain containing all meaningful messages over the size of the entire message domain. For example, when one considers twenty-six roman letters (bytes) and a blank letter (space) and words composed of five letters or less, the domain size of the words is 27×27×27×27×27=14348907 because there are twenty-seven choices for each byte (a letter) in the five letter-window. The size of the subdomain of all meaningful words of which the length of the words in English is less than six letters is much smaller than the domain 14348907.

SUMMARY OF THE INVENTION

An object of the present invention is to provide a cryptographic system which performs a simpler and faster process of an enciphering and deciphering computation based on pseudocomplements of vector-Boolean algebra described herein.

Another object of the present invention is to provide a cryptographic system which encodes a plaintext into a 2^(m) -time longer ciphertext (m is greater than or equal to one) than the length of the plaintext and which decodes the ciphertext into the original plaintext. The longer ciphertext implies that an eavesdropper requires a larger domain of ciphertexts in order to retrieve the plaintext.

Another object of the present invention is to enable an enlargement of information entropy in a ciphertext to increase the difficulty of the deciphering process employed by an eavesdropper.

Another object of the present invention is to quickly and safely replace a cipher key through an insecure communication medium.

Another object of the present invention is to strengthen a combinational complexity in a ciphertext by a factor of a factorial operation when another cryptography (for example DES of National Bureau of Standard) is additionally used.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a state transition diagram from regular set {A,A',A^(P),A_(p) } to star set {A*,A**,A*^(P),A*'} or to plus set {A⁺,A⁺⁺,A⁺ _(P),A⁺ '} and from star set and plus set to trapped set {I,O,P,P'}. Remark: The passages from the regular set to the trapped set are one-way paths through two conjugate pseudocomplementing operations.

FIG. 2 is a block diagram of a cryptographic system having a conjugate pseudocomplement generator for enciphering and a conjugate pseudocomplement desegregator for deciphering in accordance with the present invention.

FIG. 3 is a chart illustrating a procedure to quickly and safely establish a transient key through an insecure communication medium in accordance with the present invention.

FIG. 4 is a block diagram of a conjugate pseudocomplement generator of an enciphering device.

FIG. 5 is a block diagram of a conjugate pseudocomplement desegregator of a deciphering device.

FIG. 6 is a block diagram of conjugate pseudocomplement generators using two keys composed by two parameters or three parameters.

FIG. 7 is a block diagram of conjugate pseudocomplement desegregators using the two keys composed by two parameters or three parameters.

DETAILED DESCRIPTION

A Boolean algebra consisting of exactly 2^(n) elements for some integer n is represented by f(x₁, x₂, . . . ,x_(n)): mapping from n-product space of b to b, namely bxbx . . . xb→b={0,1} and x_(i) for i=1,2, . . . , n is a two-valued variable of b. The 2^(n) elements can be denoted by binary vector forms having n components. Using such a notation, we execute the operations, join, meet and complement-negation, of the Boolean algebra componentwise by considering each component in a vector form as an independent two-valued element of Boolean algebra. In a vector form, the notation of the zero element and the unity element are 0=00 . . . 0 and I=11 . . . 1, respectively.

In the vector form of a variable X, the classic complement (negation) X' of X is defined under join and meet operations, i.e., X+X'=I and X·X'=O. By utilizing exclusive-OR, X^(P) =X'P+XP', or coincidence, X_(P) =XP+X'P', operations with respect to a parameter P, X^(P) or X_(P) may be considered as relative complements of a variable X. Since X+X^(P) =X+P and X·X^(P) =X·P' or X+X_(P) =X+P' and X·X_(P) =X·P, both become I and O when P=I or P'=I under exclusive-OR and coincidence operations respectively. In contrast, when P=O or P'=O, the relative complements results in X+X^(P) =X+P=X and X·X^(P) =XP'=X for exclusive-OR operation, and X+X_(P) =X+P'=X and X·X_(P) =XP=X for coincidence operation. Because of the exchangeability (described later) between X, X', X^(P) and X_(P) under these operations, these complements are called regular complements.

From a view point of information theory introduced by C. E. Shannon, a variable X in the vector form can carry a certain information. Similarly, X', X^(P) and X_(P) can carry the same information as X after repeating its respectively applied operation twice, i.e., (X')'=X, (X^(P))^(P) =X and (X_(p))_(p) =X. In other words, information entropy carried by X, X', X^(P) and X_(P) is the same under these reciprocative operations. The information entropy is defined by ##EQU1## where p_(i) and lg denote a probability of the i^(th) event among 2^(n) possible events (values) and logarithm with base 2, i.e., log₂, respectively.

An increase of the information entropy in a variable indicates a magnification of vaguenesses of the context in X. In order to magnify the information entropy of an enciphered text, pseudocomplements X* and X⁺ are introduced by defining X+X*=I, X·X*=XP≦P, and P≦X+X⁺ =X+P, X·X⁺ =0, respectively where P is a parameter. From this definition, one can determine X*=X'+P and X⁺ =X'·P. Moreover, the pseudocomplementing operations X* and X⁺ are one-way operations to X* and X⁺ from X, X', X^(P) and X_(P). In other words, there are no Boolearn operations to map from X* and X⁺ to X, X', X^(P) and X_(P), namely X* and X⁺ operations are irreversible (magnification of the entropy). Table 1 illustrates the result of an operation applied on an argument A. For example, by choosing an operation from X⁺, X^(P), X', X.sub. P, X* and I in the top row, and an argument in the left column of table 1, the intersection of the column of the operation and the row of the argument displays the result of this operation on the argument. When an operation and an argument chosen are X* and A_(P) respectively, the result A** of the operation X* on A_(P) is found at the intersection of the column of X* and the row of A_(P).

Considering repeated applications of operations on an argument, one can find a successive result of the applications from table 1. The transitiveness of successive applications of operations are depicted in FIG. 1 which shows (i) four distinct sets: regular set, star set, plus set and trapped set, and (ii) irreversible courses of the X* and X⁺ operations from the regular set to the star and plus sets and then from these two sets to the trapped set.

Since the defined pseudocomplement of a variable A associates with a parameter P, the pseudocomplement with respect to the parameter must be denoted with the P. The notation --P-- is used after a pseudocomplement symbol to denote the respected parameter P. For example, X* and X⁺ with respect to the parameter P are now X*--P-- and X⁺ --P--. However, when a pseudocomplementation involves a single parameter then the pseudocomplement will be abbreviated by omitting the parameter notation --P--, otherwise, parameter notations indicate the pseudocomplements with respect to each parameter. For example, operations X* and X^(P) applied on A with respect to P₁ and X⁺ and X' applied on the subsequent result with respect to P₂ result in (A*^(P) --P₁ --)⁺ '--P₂ --.

                  TABLE 1                                                          ______________________________________                                                Operations                                                              Arguments                                                                               X.sup.+ X.sub.P X'    X.sup.P                                                                              X*    I                                   ______________________________________                                         A.sup.+  A.sup.++                                                                               A.sup.+.sub.P                                                                          A.sup.+                                                                              A.sup.++                                                                             I     A.sup.+                             A.sup.++ A.sup.+ A.sup.+ '                                                                              A.sup.+.sub.P                                                                        A.sup.+                                                                              I     A.sup.++                            A*'      P       A*.sup.P                                                                               A*    A**   A*    A*'                                 A*.sup.P P       A*'     A**   A*    A**   A*.sup.P                            A        A.sup.+ A.sub.P A'    A.sup.P                                                                              A*    A                                   A'       A.sup.++                                                                               A.sup.P A     A.sub.P                                                                              A**   A'                                  A.sup.P  A.sup.++                                                                               A'      A.sub.P                                                                              A     A*    A.sup.P                             A.sub.P  A.sup.+ A       A.sup.P                                                                              A'    A**   A.sub.P                             A.sup.+ '                                                                               A.sup.+ A.sup.++                                                                               A.sup.+                                                                              A.sup.+.sub.P                                                                        P     A.sup.+ '                           A.sup.+.sub.P                                                                           A.sup.++                                                                               A.sup.+ A.sup.++                                                                             A.sup.+ '                                                                            P     A.sup.+.sub.P                       A*       O       A**     A*'   A*.sup.P                                                                             A**   A*                                  A**      O       A*      A*.sup.P                                                                             A*'   A*    A**                                 ______________________________________                                    

INFORMATION ENTROPY OF PSEUDOCOMPLEMENTS

An increase of information entropy in pseudocomplements is computed as follows: For X* operation, there are ##EQU2## terms indicating the number of choices of pseudocomplements defined by a parameter p_(i) which consists of i ones and (n-i) zeros in its vector form. These i ones in a pseudocomplement can mask i-bits among n-bits of a plaintext so that there are 2^(i) varieties of the maskings. Therefore the sum: ##EQU3## represents the total message capacity of n-bits in a vector form with p_(i). Thus, the entropy is ##EQU4## which is larger than the entropy ##EQU5## without the p_(i). An increase of the entropy is signified by the ratio R,

    R=n(lg3)/n=lg3=1.58496 . . .

where uniform distributions of the events are assumed. For X⁺ operation, the same result is obtained.

RECOVERY A PLAINTEXT A FROM ITS TWO PSEUDOCOMPLEMENTS THAT CONSTITUTE A CONJUGATE PAIR

FIG. 1 illustrates the transition of pseudocomplements from the regular set to the trapped set by applying the pseudocomplementing operations X* and X⁺. There are four elements in the star set and four in the plus set which are derived from regular set elements. Since entropies of these eight elements have been increased, one cannot retrieve an element of the regular set from an element of these pseudocomplement sets. However, from the duality of Boolean algebra, a conjugate relationship between a star set element and a plus set element exists due to conjugate operations of join and meet. Therefore, one can recover an element of the regular set from a pair of conjugate pseudocomplements as follows: ##EQU6##

ENCIPHERING AND DECIPHERING PROCESS USING A SINGLE PARAMETER

An encipher/decipher key K(n,P,q) consists of three components: (1) n=block size of a plaintext, (2) P=pseudocomplement parameter which masks the plaintext and (3) q=combinational identifier of a conjugate pair of pseudocomplements. FIG. 2 despicts the process of enciphering/deciphering a plaintext. A plaintext A and a key K are supplied to the input port 4 of the enciphering unit 1 and the key register 2, respectively. The three components of the key are transmitted to the conjugate pseudocomplement generator 3. Then the plaintext is transformed mathematically into a conjugate pair of pseudocomplements, (C₁,C₂)=T_(k) (A) by generator 3, and is stored in the ciphertext register 9. The content of the ciphertext register is transmitted to an authorized receiver through the communication line or medium 10 which is connected to an input port of the deciphering unit 11. If a repetition m is greater than one then the repetition control 6 shall control the looping operation of the enciphering through node 7 and the feedback line 8 until the number of repetitions is satisfied.

The authorized receiver who keeps key K in the key register 12 of the deciphering unit 11 shall exercise a reverse course of the enciphering process. The received ciphertext (C₁,C₂) in the ciphertext register 15 is converted into the plaintext by the conjugate pseudocomplement desegregator 13 using key K. The deciphered text which is the original plaintext appears at the plaintext register 19. When the repetition constant m is greater than one, the repetition control 16 shall perform the repeated loop-operation of the deciphering process through node 17 and the feedback path 18 until the specified looping is accomplished. The retrieved plaintext is sent out from the output port 20.

ESTABLISHMENT OF A TRANSIENT CIPHER KEY BETWEEN SENDER AND RECEIVER

Before a sender sends a message to an authorized receiver, both parties must know the transient encipher/decipher key. FIG. 3 illustrates a process to establish such a key between the sender and the authorized receiver. An encipher/decipher key S stored in the register 31 is distributed to all authorized users of the cryptographic system. Also assume that an eavesdropper gets the key S. A sender initiates an inquiry to establish with an authorized receiver a transient key by sending a pseudocomplement C_(s) =T_(S) (P_(s)) in box 36 of a parameter P_(s) stored in register 32 using the system key S where T_(S) denotes a transformation. Remark: The sent inquiry consisting of half of a conjugate pair P_(s) is lengthened fully to 2n with padding bits.

The receiver does not decipher the received pseudocomplement C_(s) but he shall use the C_(s) as a parameter for his sending message, i.,e., transient encipher/decipher key P_(r) stored in register 33. The eavesdropper encounters difficulty in deciphering P_(s) from the C_(s) because of the missing half of the conjugate pair P_(s) and of a larger entropy of C_(s). The receiver generates a conjugate pair, consisting of two components: (1) C_(r1) =T_(Cs) (P_(r)) indicated in box 37 and (2) C_(rs) =T_(S) (P_(r)) indicated in box 38 of the P_(r) using two parameters C_(s) and S, respectively and transmits these to the sender.

The sender who has the parameters C_(s) and P_(s) receives the pair, C_(r1) and C_(rs). Then, he generates the other conjugate pseudocomplement C_(r2) of the P_(r) by C_(r2) =T_(Ps) (C_(rs))=T_(Ps) (T_(S) (P_(r)))=T_(PsxS) (P_(r))=T_(Cs) (P_(r)) using eq.s (3) and (4) below and deciphers the P_(r) from the conjugate pair of C_(r1) and C_(r2) with respect to the parameter C_(s) by P_(r) =T_(Cs) (C_(r1),C_(r2)) using eq.s (2) where PsxS denotes C_(s) =T_(S) (P_(s)).

    __________________________________________________________________________     (A.sup.+.sub.P --(P.sub.i)--).sup.+ '--(P.sub.j)--                                        = (A.sup.++ --(P.sub.i)--).sup.+.sub.P --(P.sub.j)--                                       = A.sup.+.sub.P --(P.sub.i .sup.++ --(P.sub.j)--                               )--         = A*--(P.sub.i .sup.+.sub.P --(P.sub.j)                                        -- )--     (3-1)                            (A.sup.+.sub.P --(P.sub.i)--)**--(P.sub.j)--                                              = (A.sup.++ --(P.sub.i)--)*--(P.sub.j --                                                   = A.sup.+.sub.P --(P.sub.i *'--(P.sub.j)--                                                 = A*--(P.sub.i *--(P.sub.j)-- )--                                                         (3-2)                            (A*--(P.sub.i)--).sup.+ '--(P.sub.j)--                                                    = (A*'--(P.sub.i)--).sup.+.sub.P --(P.sub.j)--                                             = A.sup.+.sub.P --(P.sub.i .sup.+ --(P.sub.j)--                                            = A*--(P.sub.i .sup.+ '--(P.sub.j)--                                           )--        (3-3)                            (A*--(P.sub.i)--)**--(P.sub.j)--                                                          = (A*'--(P.sub.i)--)*--(P.sub.j)--                                                         = A.sup.+.sub.P --(P.sub.i *.sup.P --(P.sub.j)--                               )--         = A*--(P.sub.i **--(P.sub.j)--                                                            (3-4)                            (A.sup.+ '--(P.sub.i)--).sup.+ '--(P.sub.j)--                                             = (A.sup.+ --(P.sub.i)--).sup.+.sub.P --(P.sub.j)--                                        = A.sup.+ '--(P.sub.i .sup.++ --(P.sub.j)----                                              = A**--(P.sub.i .sup.+.sub.P --(P.sub.j                                        )-- ) --   (3-5)                            (A.sup.+ '--(P.sub.i --)**--(P.sub.j)--                                                   = (A.sup.+ --(P.sub.i)--)*--(P.sub.j)--                                                    = A.sup.+ '--(P.sub.i *'--(P.sub.j)-- )--                                                  = A**--(P.sub.i *--(P.sub.j)--                                                            (3-6)                            (A**--(P.sub.i)--).sup.+ '--(P.sub.j)--                                                   = (A*.sup.P --(P.sub.i)--).sup.+.sub.P --(P.sub.j)--                                       = A.sup.+ '--(P.sub.i.sup.+ --(P.sub.j)-- )--                                              = A**--(P.sub.i .sup.+ '--(P.sub.j)--                                          )--        (3-7)                            (A**--(P.sub.i)--)**--(P.sub.j)--                                                         = (A*.sup.P --(P.sub.i)--)*--(P.sub.j)--                                                   = A.sup.+ '--(P.sub.i *.sup.P --(P.sub.j)--                                                = A**--(P.sub.i **--(P.sub.j)--                                                           (3-8)                            (A*.sup.P --(P.sub.i)--)*'--(P.sub.j)--                                                   = (A**--(P.sub.i)--)*.sup.P --(P.sub.j)--                                                  = A.sup.+ --(P.sub.i *.sup.P --(P.sub.j)--                                                 = A*.sup.P --(P.sub.i **--(P.sub.j)--                                          )--        (3-9)                            (A*.sup.P --(P.sub.i)--).sup.++ --(P.sub.j)--                                             = (A**--(P.sub.i)--).sup.+ --(P.sub.j)--                                                   = A.sup.+ --(P.sub.i.sup.+--(P.sub.j)-- )--                                                = A*.sup.P --(P.sub.i .sup.+ '--(P.sub.                                        j)-- )--   (3-10)                           (A.sup.+ --(P.sub.i)--)*'--(P.sub.j)--                                                    = (A.sup. + '--(P.sub.i)--)*.sup.P --(P.sub.j)--                                           = A.sup.+ --(P.sub.i *'--(P.sub.j)-- )--                                                   = A*.sup.P --(P.sub.i *--(P.sub.j)--                                           )--        (3-11)                           (A.sup.+ --(P.sub.i)--).sup.++--(P.sub.j)--                                               = (A.sup.+ '--(P.sub.i)--).sup.+ --(P.sub.j)--                                             = A.sup.+ --(P.sub.i .sup.++ --(P.sub.j)--                                                 = A*.sup.P --(P.sub.i .sup.+.sub.P                                             --(P.sub.j)-- )--                                                                         (3-12)                           (A*'--(P.sub.i)--)*'--(P.sub.j)--                                                         = (A*--(P.sub.i)--)*.sup.P --(P.sub.j)--                                                   = A.sup.++ --(P.sub.i *.sup.P --(P.sub.j)--                                                =  A*'--(P.sub.i **--(P.sub.j)--                                                          (3-13)                           (A*'--(P.sub.i)--).sup.++ --(P.sub.j)--                                                   = (A*--(P.sub.i)--).sup.+ --(P.sub.j)--                                                    = A.sup.++ --(P.sub.i .sup.+ --(P.sub.j)--                                                 = A*'--(P.sub.i .sup.+ '--(P.sub.j)--                                          )--        (3-14)                           (A.sup.++ --(P.sub.i)--)*'--(P.sub.j)--                                                   = (A.sup.+.sub.P --(P.sub.i)--)*.sup.P --(P.sub.j)--                                       = A.sup.++--(P.sub.i *'--(P.sub.j)-- )--                                                   = A*'--(P.sub.i *--(P.sub.j)--                                                            (3-15)                           (A.sup.++ --(P.sub.i)--).sup.++ --(P.sub.j)--                                             = (A.sup.+.sub. P --(P.sub.i)--).sup.+ --(P.sub.j)--                                       = A.sup.++ --(P.sub.i .sup.++ --(P.sub.j)--                                                = A*'--(P.sub.i .sup.+.sub.P --(P.sub.j                                        )-- )--    (3-16)                           __________________________________________________________________________

Also the following relationships exist.

    ______________________________________                                                  A.sup.+ --(P)-- = P*'--(A)--                                                                       (4-1)                                                      A*--(P)-- = P.sup.+ '--(A)--                                                                       (4-2)                                                      A.sup.+ '--(P)-- = P*--(A)--                                                                       (4-3)                                                      A*'--(P)-- = P.sup.+ --(A)--                                                                       (4-4)                                                      A.sup.++ --(P)-- = P.sup.++ --(A)--                                                                (4-5)                                                      A**--(P)-- = P**--(A)--                                                                            (4-6)                                                      A*.sup.P --(P)-- = P*.sup.P --(A)--                                                                (4-7)                                                      A.sup.+.sub.P --(P)-- = P.sup.+.sub.P --(A)--                                                      (4-8)                                                      A.sup.P --(P)-- = P.sup.P --(A)--                                                                  (4-9)                                                      A.sub.P --(P)-- = P.sub.P --(A)--                                                                  (4-10)                                                     A.sup.+ --(P')-- = A*.sup.P --(P)--                                                                (5-1)                                                      A*--(P' )-- = A.sup.+.sub.P --(P)--                                                                (5-2)                                                      A.sup.++ --(P')-- = A*'--(P)--                                                                     (5-3)                                                      A**--(P')-- = A.sup.+ '--(P)--                                                                     (5-4)                                                      A.sub.P --(P')-- = A.sup.P --(P)--                                                                 (5-5)                                             ______________________________________                                    

In general, the eavesdropper knows C_(s) and S but not P_(s) when deciphering P_(r) from the intercepted C_(r1) and C_(rs). The difficulty in retrieving P_(r) from C_(r1) and C_(rs) arises because (i) they are derived from two independent parameters C_(s) and S, and (ii) the halves of the conjugate pairs P_(r) with respect to C_(s) and S are missing. A similar difficulty occurs in retrieving C_(r2) from C_(rs) because the eavesdropper generally does not know P_(s).

After the sender deciphers P_(r), both the parties now have the transient key P_(r). The sender can encipher a plaintext and can send the ciphertext indicated in box 39 to the receiver who is able to decipher it.

In FIG. 4 which illustrates the enciphering process, the three components (n,P,q) of a key are stored in the n register 41, the P register 42 and the q register 43, respectively. The length control 44 generates a row of n ones in the masking register 45 from the n of the key. Logical AND operation masks the P register 42 and the plaintext register 46 using the n ones generated. The content of the P register 42 is the parameter P for enciphering a plaintext.

The third component q of the key in the q register 43 denotes the pseudocomplementing operation applied on a plaintext to produce the ciphertext.

A pseudocomplement in the star set {A*,A**,A*^(P),A*'} can be coded with 2 bits u₁ u₀ taking on corresponding binary values 00 (=0), 01 (=1), 10 (=2) and 11 (=3), respectively. Similarly, a pseudocomplement in the plus set {A⁺,A⁺⁺,A⁺ _(P),A⁺ '} is coded with v₁ v₀ bits. The bits u₁ u₀ and v₁ v₀ are components of the q. For example, A*^(P) and A⁺ ' are coded as u₁ u₀ =10 (=2) and v₁ v₀ =11 (=3). Further a single bit w₀ of the q indicates the order of the two pseudocomplements of a conjugate pair in a ciphertext. When this bit is on (=1) or off (=0), it may express the plus-star sequence or the star-plus sequence in a ciphertext.

After a block of plaintext is loaded in the plaintext register 46 through the input port 47, the block is enciphered by the star operation 48 and the plus operation 49 using the bits w₀, u₁ u₀ and v₁ v₀ of the q register 43. The bits u₁ u₀ and v₁ v₀ designate the star pseudocomplement operation of {X*,X**,X*^(P),X*'} and the plus pseudocomplement operation of {X⁺,X⁺⁺,X⁺ _(P),X⁺ '} to apply on the content of the plaintext register using the parameter P in the P register. The two pseudocomplements, produced by the star operation and by the plus operation using the bits u₁ u₀ and v₁ v₀, are transmitted to the M₀ register 51 and the M₁ register 52 through switch 50 dictated by bit w₀ where a,b terminals are connected to c,d terminals if w₀ =0 (off) or to d,c terminals if w₀ =1 (on). Then a ciphertext is dispatched to the output port 54 after concatenating the contents of the registers M₁ and M₀. The M₁ content is placed in the right half of the ciphertext and the M₀ content in the left half.

In FIG. 5 which illustrates the deciphering process using OR version of eq. (2-1), the three components (n,P,q) of a key are stored in the n register 61, the P register 62, and the q register 63, respectively. The length control 64 generates a row of n ones in the masking register 65 from the n component of the key. Logical AND operation masks the P register 62 and the ciphertext register 73 using the n ones generated.

The third component q, consisting of the bits w₀, u₁ u₀ and v₁ v₀, of the key in the q register 63 is used in the deciphering process. After a ciphertext is loaded in the ciphertext register 73 through the input port 67, the left half and the right half of the ciphertext are forwarded to the star operation 68 and the plus operation 69 respectively through switch 70 where the switching position depends upon bit w_(O) in the q register. The bits u₁ u₀ and v₁ v₀ in the q register 63, connected directly to the star operation 68 and the plus operation 69 respectively, select one of the operations {X',X^(P),X_(P),I} and one of the operations {X^(P),I,X',X_(P) }. The respective operations applied on the star pseudocomplement and the plus pseudocomplement of the ciphertext produce A*' and A⁺⁺, respectively. The A*' and A⁺⁺ generated by these operations are stored in registers M₀ 71 and M₁ 72, respectively. Then the contents of the registers M₁ and M₀ are joined by logical OR operation 74, and the result of the OR operation is forwarded to the plaintext register 66 and dispatched through the output port 75.

Similarly, one can arrange another deciphering process like the one in FIG. 5 using the other equation in eq.s (2). For example, when using the AND version of eq. (2-1) in order to obtain the quantity A, one can determine by referncing table 1 the process required to transform the star pseudocomplement in a ciphertext (designated by the u₁ u₀ in the q component) into the term A** that appears in eq. (2-1) and also the process required to transform the plus pseudocomplement in the ciphertext (designated by the v₁ v₀ in the q component) into the term A⁺, that appears in eq. (2-1). The found processes are as follows: The transformation from a star pseudocomplement of set {A* (when u₁ u₀ =00), A** (when u₁ u₀ =01), A*^(P) (when u₁ u₀ =10), A*' (when u₁ u₀ =11)} to A** can be accomplished by applying a respective operation of set {X_(P) ,I,X',X^(P) } on it, and the transformation from a plus pseudocomplement of set {A⁺ (when v₁ v₀ =00), A⁺⁺ (when v₁ v₀ =01), A⁺ _(P) (when v₁ v₀ =10), A⁺ ' (when v₁ v₀ =11)} to A⁺ ' can be accomplished by applying a respective operation of set {X',X_(P),X^(P),I}. Thus an AND operation on the terms A** and A⁺ ' results in the quantity A which represents the plaintext as shown in eq. (2-1).

A DETAILED EXAMPLE OF AN ESTABLISHMENT OF A NEW TRANSIENT KEY

When a sender initiates an inquiry for a new transient key by sending an authorized receiver a C_(s) (for example, C_(s) =P_(s) *--S--) which is a half of a conjugate pseudocomplement pair of a parameter P_(s) with respect to a system key S, the receiver uses the parameters S and C_(s) as P₁ and P₂ (P₁) for enciphering the transient key P_(r) as his message (a plaintext A) in the enciphering process illustrated in FIG. 6. And he transmits the enciphered message (for example, P_(r) *'--S-- and P_(r) ⁺ '--C_(s) --) to the sender. The sender who receives the enciphered message firstly enciphers P_(r) *'--S-- to (P_(r) *'--S--)⁺ _(P) --P_(s) --=P_(r) *--S⁺ '--P_(s) ----=P_(r) *--P_(s) *--S---- based on eq. (3-3) by using an encipher device shown in FIG. 4 where S and P_(s) are equivalent to P_(i) and P_(j) of eq. (3-3), respectively, and secondly deciphers P_(r) *--P_(s) *--S---- and P_(r) ⁺ '--P_(s) *--S----(=P_(r) ⁺ '--C_(s) --) into P_(r) by using a decipher device shown in FIG. 5 where the parameter used is P_(s) *--S--.

In FIG. 5, suppose that P_(r) *--P_(s) *--S---- and P_(r) ⁺ '--P_(s) *--S---- are loaded in the right half and in the left half of the cipher register 73, respectively. Since, in this case, the order in the cipher register is the plus-star sequence (from the left to the right) of the pseudocomplements, the w₀ is on, namely w₀ =1 in switch 70. The bits u₁ u₀ and v₁ v₀ are u₁ u₀ =00 and v₁ v₀ =11 due to the pseudocomplement symbols * and ⁺ ', respectively. Accordingly to the operations discussed above, the applied deciphering operations are X' on P_(r) *--P_(s) *--S---- and X_(p) on P_(r) ⁺ '--P_(s) *--S---- usig the parameter P_(s) *--S-- through the star operation 68 and the plus operation 69, respectively. And the applied operations result in P_(r) *'--P_(s) *--S-- -- at the M₀ register 71 and in P_(r) ⁺⁺ --P_(s) *--S---- at the M₁ register 72, respectively.

The contents of the two registers M₀ and M₁ are ORed to produce the plaintext P_(r) in the plaintext register 66. Note: The terms P_(r), P_(s) and S are equivalent to A, P_(j) and P_(i) in eq. (3-3) respectively and S⁺ '--P_(s) --=P_(s) *--S-- of eq. (4-2) is used here.

A CRYPTOGRAPHIC SYSTEM USING TWO ENCIPHER/DECIPHER KEYS

When a higher degree of message security, like an establishment of a new ciphering transient key discussed in the preceding section, is desired, both parties in communication can establish two keys rather then one, and the sender can encipher a plaintext into a pair of conjugate pseudocomplements derived independently from the two parameters. Generally, the parties choose an equation among eq.s (3-1) through (3-16), for example, eq. (3-3), i.e., ##EQU7## Furthermore, suppose that the sender takes a plus pseudocomplement of the message A with respect to P_(i) ⁺ '--P_(j) --, for example A⁺ _(P) --P_(i) ⁺ '--P_(j----) as a buddy of A*--P_(i) ⁺ '--P_(j) ---- of the conjugate pair (A*,A⁺ _(P)) with respect to P_(i) ⁺ '(--P_(j) -- where the A* pseudocomplement is underlined in the equation above, then he must encipher his message A by A*'--P_(i) -- (or A*--P_(i) --) according to the first (or the second) term of eq. (3-3) and send a pair of pseudocomplements A⁺ _(P) --P_(i) ⁺ '--P_(j) ---- and A*'--P_(i) -- (or A*--P_(i) --) to the receiver. The receiver shall encipher his received pseudocomplement A*'--P_(i) -- (or A*--P_(i) --) by taking the specified pseudocomplementing operation ()⁺ _(P) --P_(j) -- appeared in the first term (or ()⁺ '--P_(j) -- appeared in the second term) of eq. (3-3) in order to acquire the fourth term A*--P_(i) ⁺ 'P_(j) ---- of eq. (3-3). Since he has the pair of the conjugate pseudocomplements A*--P_(i) ⁺ '--P_(j) ---- and A⁺ _(P) --P_(i) ⁺ '--P_(j) ---- of the message A with respect to the parameter P_(i) ⁺ '--P_(j) --, the plaintext A can be recovered by performing (A')'=(A⁺ _(P) ·A*)'=A⁺⁺ +A*' which is eq. (2-1) by the receiver.

FIG. 6 depicts an enciphering process using two parameters where P₁ and P₂ are equivalent to P_(i) and P_(j) of eq.s (3). A plaintext A is loaded in the plaintext register 80 and two keys, (n,P₁,q₁) and (n,P₂ (P₁),q₂), are set in the two conjugate complement generators 81 and 82 respectively where P₂ (P₁) denotes a pseudocomplement P₂ with respect to P₁. Each generator produces a star pseudocomplement and a plus pseudocomplement at the M₀ and M₁ terminals of the generator from the plaintext A and its key where the M₀ and M₁ terminals are the M₀ register 51 and the M₁ register 52 in FIG. 4. The switches, 83 and 84, which are a part of selector 90 named with w₁, negates the effect of switch 50, which is w₀, in FIG. 4 at the exit of each generator, specifically it restores the order of the star pseudocomplement and the plus pseudocomplement, namely w₀ =0 providing the star-plus sequence. Note: In order to negate the effect of the switch w₀, the control bit of w₁ must be the same as the bit of w₀ in this restoring process. Selector 90 consisting of the four additional switches 85,86,87 and 88, which are w₂ and w₃, selects a star pseudocomplement and a plus pseudocomplement with respect to two parameters P₁ and P₂ (P₁), respectively, and arranges the order of the selected two pseudocomplements in the ciphertext register 89 depending upon the switch control bit w₂ and w₃ where selector 90 may be a part of the q component of the key.

An example of a sequential event, which illustrates how to choose these switch control bits w₁, w₂ and w₃, and the q components of the keys, is described here. In other words, it is assumed that two transient keys and the bits w₁, w₂ and w₃, which may be a part of the q component of the keys, are being established between a sender and a receiver. The sender sets the two parameters, P₁ and P₂ (P₁), in the two generators 81 and 82 respectively. For example, he choose the pseudocomplments *' and ⁺ _(P) by placing u₁ u₀ =11 and v₁ v₀ =10 in the corresponding q₁ and q₂ of the two keys, respectively when the keys are eatablished. Note: The bits v₁ v₀ of q₁ and the bits of u₁ u₀ of q₂ are "don't care" of Boolean algebra. Each generator proceduces the star and plus pseudocomplements specified by the bits u₁ u₀ and v₁ v₀ in each key. Remark: The other halves of the two conjugate pairs generated by the two "don't care" codes are not in this case. Thus, the bits w₁ (=w₀), w₂ and w₃ that are used in the switches 83 through 88, must be chosen properly in order to purposely place the *' pseudocomplement and the ⁺ _(P) pseudocomplement in the ciphertext register 89. For example, by setting w₁ =0, w₂ =0 and w₃ =1, the pseudocomplements A*'--P₁ -- and A⁺ _(P) --P₂ (P₁)-- are placed in the left half and in the right half of the ciphertext register 89 from the M₀ terminal of generator 81 and from the M₁ terminal of generator 82, respectively.

A deciphering process of this example is illustrated next. The receiver obtains the ciphertext in the ciphertext register 100 in FIG. 7. Then, in this example, the conjugate pseudocomplement generator 110 performs the pseudocomplementing operation with respect to P₂, i.e., ()⁺ _(P) --P₂ -- on A*'--P₁ -- passing via the switches w₃ and w₂, which are a part of selector 101, from the ciphertext register. The result of the pseudocomplementation (A*'--P₁ --)⁺ _(P) --P₂ -- appeared at the M₀ terminal of generator 110 is equivalent to A*--P₂ *--P₁ ----(=A*--P₁ ⁺ '--P₂ ---- according to eq. (4-2)) where the bits u₁ u₀, v₁ v₀ and w₀ of q_(a) in the key (n,P₂,q_(a)) used by generator 110 are "don't care", 10 and 1, respectively. Remark: The control bit of w₀ in switch 50 is different from the control bit of w₁ in switches 106 and 107 because eq. (3-3) indicates that the ³⁰ _(P) pseudocomplement on A*'--P_(i) -- with respect to P_(j) is equivalent to the * pseudocomplement on A with respect to P_(i) ⁺ '--P_(j) --, i.e., (A*'--P_(i) --)⁺ _(P) --P_(j) --=A*--P_(i) ⁺ '--P_(j) ----. In other words, the resultant of the ⁺ _(P) pseudocomplementation on A*'--P_(i) -- must be treated as the * pseudocomplement of A with respect to P_(i) ⁺ '--P_(j) --. Therefore, the bit of w₀ must be on (=1).

The pseudocomplement A⁺ _(P) --P₁ ⁺ '--P₂ ---- in the ciphertext register 100 reaches at the M₁ terminal (and at the M₀ terminal) of box 111 passing via the switches w₃ and w₂. Subsequently, the pseudocomplements A*--P₁ ⁺ '--P₂ ---- appeared at the M₀ terminal of generator 110 and A⁺ _(P) --P₁ ⁺ '--P₁ ---- appeared at the M₁ terminal of box 111 are stored in the left half and in the right half of register 108, respectively. From the discussion above, the control bits of w₃, w₂ and w₁ are set with w₃ =1, w₂ =0 and w₁ =0, respectively. The conjugate pseudocomplement desegregator 109 which is the same as the desegregator described in FIG. 5 receives a key (n,P₂ (P₁),q_(b)) and the content of register 108, and produces the pseudocomplement of a targeted pair (A*',A⁺ +) from (A*,A⁺ _(P)) with respect to P₁ ⁺ '--P₂ -- specified by the control bits of the q_(b) component of the key. In this example, node 74 of the desegregator in FIG. 5 performs OR operation on the targeted pair (A*',A⁺⁺) specified in eq. (2-1) which concludes the deciphering process by storing the plaintext A in the plaintext register 114.

Relationships between these chosen pseudocomplements and the bits w₀, u₁ u₀ and v₁ v₀ of q₁, q₂, q_(a) and q_(b), which are derived from eq.s (3-3) and (4-2), are summarized here by assuming w₁ =0, w₂ =0 and w₃ =1 in the example. For the q₁ of P₁ in generator 81, the bits w₀ =0 (this means the star-plus sequence), u₁ u₀ =11 and v₁ v₀ =(-- --) are determined from A*'--P₁ -- appeared at the M₀ terminal of generator 81 and stored in the left half of the ciphertext register 89; for the q₂ of P₂ (P₁) in generator 82, the bits w₀ =0 (this means the star-plus sequence), u₁ u₀ =(-- --) and v₁ v₀ =10 are determined from A⁺ _(P) --P₁ ⁺ '--P₂ ----=A⁺ _(P) --P₂ *--P₁ ---- appeared at the M₁ terminal of generator 82 and stored in the right half of the ciphertext register 89; for the q_(a) of P₂ in generator 110, the bits w₀ =1, (see the remark above), u₁ u₀ =(-- --) and v₁ v₀ =10 are determined from (A*'--P₁ --)⁺ _(P) --P₂ --=A*--P₁ ⁺ '--P₂ ----=A*--P₂ *--P₁ ---- appeared at the M₀ terminal of generator 110 and stored in the left half of register 108; for the q_(b) of P₂ (P₁) in desegregator 109, the bits w₀ =0 (this means the star-plus sequence), u₁ u₀ =00 and v₁ v₀ =10 are determined from A*--P₂ *--P₁ ---- stored in the left half and A⁺ _(P) --P₂ *--P₁ ---- stored in the right half of register 108 which is connected to the star operation 68 and to the plus operation 69 of the desegregator (see FIG. 5), respectively where bars (-- --) indicate "don't care" bits. Similarly, one can determine the bits w₀, u₁ u₀ and v₁ v₀ as well as the bits w₁, w₂ and w₃ in other cases.

AN EXAMPLE USING BINARY BITS STRINGS

When P₁ =01101011, P₂ =10101100 and A (message)=11011011 in the discussion above, the sender produces P₂ *--P₁ --=01111011, A*'--P₁ --=10010000 and A⁺ _(P) --P₂ *--P₁ ----=10100100, and transmits the ciphertext 1001000010100100 (in the star-plus sequence) to the receiver who shall find it in the ciphertext register 100. Since w₃ =1, w₂ =0 and w₁ =0 in selector 101 (and in selector 90), the A*--P₂ *--p₁ ---- pseudocomplement and the A⁺ _(P) --P₂ *--P₁ ---- pseudocomplement are in the left half and in the right half of register 108, respectively where generator 110 performs the pseudocomplementing operation ⁺ _(P) on A*'--P₁ --, i.e., (A*'--P₁ --)⁺ _(P) --P₂ --=A*--P₂ *--P₁ ----=01111111 and produces it at the M₀ terminal of the generator and where the half of the ciphertext, which is A⁺ _(P) --P₂ *--P₁ ----, appears at the M₁ terminal of box 111 through node 113. The content of register 108 are now a pair of the conjugate pseudocomplements of A with respect to P₂ *--P₁ --. Desegregator 109 retrieves the plaintext A from (A*--P₂ *--P₁ ----'=10000000 and (A⁺ _(P) --P₂ *--P₁ ----)'=01011011 by accomplishing the logical OR operation of 10000000+01011011=11011011 at node 74 shown in FIG. 5. The ORed result, which is the bit string of the message A, appears in the plaintext register 114.

PUBLIC KEY SYSTEM

If an encipher key, which is known to general public, is different from its corresponding decipher key, which is kept in secret and which is difficult to derive from the encipher key, then this cryptographic system is called a public key system. When the two keys used in the preceding discussion of this invention are enciphered by a third key, the conditon of a public key system is satisfied. Namely, the condition is that a decipher key is different from its corresponding encipher key and is difficult to derive from the encipher key. In this case, the following relationships of three keys, P_(i), P_(j) and P_(k) exist:

    ______________________________________                                         P.sub.1 (Q.sub.1)                                                                         Q.sub.2 (Q.sub.3)                                                                           Q.sub.1 (P.sub.1)                                      ______________________________________                                         P.sub.i .sup.+ --(P.sub.j .sup.+.sub.P --(P.sub.k)-- )--  =                                                 (6-1)                                             (P.sub.i *.sup.P --(P.sub.j)--)**--(P.sub.i *.sup.P --(P.sub.k)-- )--  =       (P.sub.j .sup.+.sub.P --(P.sub.k)--)*'--(P.sub.i)--                            P.sub.i .sup.+ --(P.sub.j *--(P.sub.k)-- )-- =                                                              (6-2)                                             (P.sub.i *.sup.P --(P.sub.j)--)**--(P.sub.i .sup.+ --(P.sub.k)-- )-- =         (P.sub.j *--(P.sub.k)--)*'--(P.sub.i)--                                        P.sub.i .sup.+ --(P.sub.j .sup.+ '--(P.sub.k)-- )-- =                                                       (6-3)                                             (P.sub.i .sup.+ --(P.sub.j)-- )**--(P.sub.i *.sup.P --(P.sub.k)-- )-- =        (P.sub.j .sup.+ '--(P.sub.k)--)*'--(P.sub.i)--                                 P.sub.i .sup.+ --(P.sub.j **--(P.sub.k)-- )-- =                                                             (6-4)                                             (P.sub.i .sup.+ --(P.sub.j)--)**--(P.sub.i .sup.+ --(P.sub.k)-- )-- =          (P.sub.j **--(P.sub.k)--)*'--(P.sub.i)--                                       P.sub.i .sup.++ --(P.sub.j .sup.+.sub.P --(P.sub.k)-- )-- =                                                 (6-5)                                             (P.sub.i *'--(P.sub.j)--)**--(P.sub.i *'--(P.sub.k)-- )-- =                    (P.sub.j .sup.+.sub.P --(P.sub.k)--).sup.++ --(P.sub.i)--                      P.sub.i .sup.++ --(P.sub.j *--(P.sub.k)--  )-- =                                                            (6-6)                                             (P.sub.i *'--(P.sub.j)--)**--(P.sub.i .sup.++ --(P.sub.k)-- )-- =              (P.sub.j *--(P.sub.k)--).sup.++-- (P.sub.i)--                                  P.sub.i .sup.++ --(P.sub.j .sup.+ '--(P.sub.k)-- )-- =                                                      (6-7)                                             (P.sub.i .sup.++ --(P.sub.j)--)**--(P.sub.i *'--(P.sub.k)-- )-- =              (P.sub.j .sup.+ '--(P.sub.k)--).sup.++ --(P.sub.i)--                           P.sub.i .sup.++ --(P.sub.j **--(P.sub.k)-- )-- =                                                            (6-8)                                             (P.sub.i .sup.++ --(P.sub.j)--)**--(P.sub.i .sup.++ --(P.sub.k)--)-- =         (P.sub.j **--(P.sub.k)--).sup.++ -- (P.sub.i)--                                P.sub.i *--(P.sub.j *.sup.P --(P.sub.k)-- )-- =                                                             (6-9)                                             (P.sub.k.sup.+.sub.P --(P.sub.j)--).sup.++ --(P.sub.i .sup.+.sub.P             --(P.sub.k)-- )-- =                                                            (P.sub.j *.sup.P --(P.sub.k)--).sup.+ '-- (P.sub.i)--                          P.sub.i *--(P.sub.j .sup.+ --(P.sub.k)-- )-- =                                                              (6-10)                                            (P.sub.i .sup.+.sub.P --(P.sub.j)--).sup.++ --(P.sub.i *--(P.sub.k)-- )--      (P.sub.j .sup.+ --(P.sub.k)--).sup.+ '--(P.sub.i)--                            P.sub.i *--(P.sub.j *'--(P.sub.k)-- )-- =                                                                   (6-11)                                            (P.sub.i *--(P.sub.j)--).sup.++ --(P.sub.i .sup.+.sub.P --(P.sub.k)-- )--      =                                                                              (P.sub.j *'--(P.sub.k)--).sup.+ '--(P.sub.i)--                                 P.sub.i *--(P.sub.j .sup.++ --(P.sub.k)-- )-- =                                                             (6-12)                                            (P.sub.i *--(P.sub.j)--).sup.++ --(P.sub.i *--(P.sub.k)-- )-- =                (P.sub.j .sup.++ --(P.sub.k)--).sup.+ '--(P.sub.i)--                           P.sub.i **--(P.sub.j *.sup.P --(P.sub.k)-- =                                                                (6-13)                                            (P.sub.i .sup.+ '--(P.sub.j)--).sup.++ --(P.sub.i .sup.+ '--(P.sub.k)--        )-- =                                                                          (P.sub.j *.sup.P --(P.sub.k)--)**--(P.sub.i)--                                 P.sub.i **--(P.sub.j .sup.+ --(P.sub.k)-- )-- =                                                             (6-14)                                             (P.sub.i .sup.+ '--(P.sub.j)--).sup.++ --(P.sub.i **--(P.sub.k)-- )-- =       (P.sub.j .sup.+ --(P.sub.k)--)**--(P.sub.i)--                                  P.sub.i **--(P.sub.j *'--(P.sub.k)-- )-- =                                                                  (6-15)                                            (P.sub.i **--(P.sub.j)--).sup.++ --(P.sub.i .sup.+ '--(P.sub.k)-- )-- =        (P.sub.j *'--(P.sub.k)--)**--(P.sub.i)--                                       P.sub.i **--(P.sub.j .sup.++ --(P.sub.k)-- )-- =                                                            (6-16)                                            (P.sub.i **--(P.sub.j)--).sup.++ --(P.sub.i **--(P.sub.k)-- )-- =              (P.sub.j .sup.++ --(P.sub.k)--)**--(P.sub.i)--                                 ______________________________________                                    

By using eq.s (6) eq.s (3) (also eq.s (4) and eq.s (5) if these are needed), one can determine applicable pseudocomplementing operations on a plaintext A employing the three parameters by parties of a sender and a receiver. For simplicity in the following presentation, three compound parameters Q₁, Q₂ and Q₃ are defined: Q₁ =P_(j) (P_(k)), Q₂ =P_(i) (P_(j)) and Q₃ =P_(i) (P_(k)) where P(Q) denotes a pseudocomplement of P with respect to Q. Firstly, by choosing an equation among eq.s (6-1) through (6-16), one can determine two applicable pseudocomplementing operations on Q₁ with respect to P₁, which is equivalent to P₁ in this case, and on Q₂ with respect to Q₃. Next, by considering the paired terms of the pseudocomplementing operations on Q₁ (P₁) and Q₂ (Q₃), one selects two equations from eq.s (3-1) through (3-16) which include the pseudocomplements of a message A with respect to the paired terms, i.e., A--Q₁ (P₁)-- and A--Q₂ (Q₃)-- (an example is presented later). Finally, from three chosen equations and the pseudocomplements of the two paired terms, one can find the applicable enciphering pseudocomplements by the sender and the applicable deciphering pseudocomplements by the receiver.

An example: Firstly, by choosing an equation such as eq. (6-3), P_(i) ⁺ --P_(j) ⁺ '--P_(k) ----=(P_(i) ⁺ --P_(i) --)**--P_(i) *^(P) --P_(k) ----=(P_(j) ⁺ '--P_(k) --)*'--P_(i) --, which is equivalent to P_(i) ⁺ --Q₁ --=Q₂ **--Q₃ --=Q₁ *'--P_(i) -- after substituting Q₁ =P_(j) ⁺ '--P_(k) --, Q₂ =P_(i) ⁺ --P_(j) -- and Q₃ =P_(i) *^(P) --P_(k) --, one can determine P₁ =P_(i) and the pseudocomplements ⁺ ', ⁺ and *^(P) of P_(j), P_(i) and P_(j) with respect to P_(k), P_(j) and P_(k), respectively. Next, by considering the pseudocomplements *' and ** of the paired terms Q₁ (P.sub. 1) and Q₂ (Q₃), which are underlined in the equation above, one can find eq.s (3-2), (3-6), (3-11) and (3-15) which include the pseudocomplement *' of P_(i) (P_(j)) in the third terms where P_(i) and P_(j) are now equivalent to Q₁ and P₁ respectively, and eq.s (3-4), (3-8), (3-9) and (3-13) which include the pseudocomplement ** of P_(i) (P_(j)) in the fourth terms where P_(i) and P_(j) are now equivalent to Q₂ and Q₃ respectively. Finally, suppose that one takes eq.s (3-11) and (3-4) arbitrarily. Then the two equations become (A⁺ --Q₁ --)*'--P₁ --=(A⁺ '--Q₁ --)*^(P) --P₁ --=A⁺ --Q₁ *'--P₁ ----=A*^(P) --Q₁ *--P₁ ---- and (A*--Q₂ --)**--Q₃ --=(A*'--Q₂ --)*13q₃ --=A⁺ _(P) --Q₂ *^(P) --Q₃ ----=A*--Q₂ **--Q₃ ---- after substituting the equivalent terms in each equation. The underlines of the terms Q₁ *'--P₁ -- and Q₂ **--Q₃ -- indicate the paired pseudocomplement terms considered according to eq. (6-3).

Lastly, the applicable pseudocomplementing operations to a message A by the sender are betokened from the two chosen eq.s (3-11) and (3-4). The necessary operations applicable to the message A by the sender are A⁺ --Q₁ -- (or A⁺ '--Q₁ --) and A*--Q₂ -- (or A*'--Q₂ --) which are the first terms (or the second terms) of each equation that was taken. Then the sender transmits these generated plus and star pseudocomplements to the receiver as a ciphertext from the ciphertext register 89. The necessary operations applicable to the received ciphertext by the receiver are ()*'--P₁ -- (or ()*^(P) --P₁ --) and ()**--Q₃ -- (or ()*--Q₃ --) which are the first terms (or the second terms) of each equation that was taken. After performing these pseudocomplementing operations, the receiver now has a pair of conjugate pseudocomplements A⁺ --Q₁ *'--P₁ ---- and A*--Q₂ **--Q₃ ---- where the term Q₁ *'--P₁ -- is equal to the term Q₂ **--Q₃ -- according to eq. (6-3). Thus he can decipher the pair into the plaintext A with respect to the parameter Q₂ **--Q₃ -- (=Q₁ *'--P₁ --).

In conclusion, the encipher parameters Q₁ =P_(j) ⁺ '--P_(k) -- (=P_(k) *--P_(j) --) and Q₂ =P_(i) ⁺ --P_(j) -- (=P_(j) *'--P_(i) --) are two single components of pseuodocomplements of two conjugate pairs with respect to two parameters P_(k) and P_(j) generated independently. The decipher parameters P₁ (=P_(i)) and Q₃ =P_(i) *^(P) --P_(k) -- are different from the encipher parameters Q₁ and Q₂. A retrieval of P_(i) and P_(k) from the eccipher parameters for an attempting restoration of the decipher parameters is difficult without knowing P_(j) because of the single components of the pseudocomplements generated independently.

This example of the invented public key system using the chosen pseudocomplements for the enciphering process by the sender and the deciphering process by the receiver is depicted in FIGS. 6 and 7 where the definition of the key (n,P,q) consisting of three components: (i) n=block size of a plaintext, (ii) P=pseudocomplement parameter and (iii) q=combinational identifier of a conjugate pair of pseudocomplements is used. The encipher keys (n,Q₁,q₁) and (n,Q₂,q₂) are supplied to generators 81 and 82, respectively. Each generator illustrated in FIG. 4. The pseudocomplements, A⁺ --Q₁ -- appeared at the M₀ terminal of generator 81 and A*--Q₂ -- appeared at the M₁ terminal of generator 82, are designated by two bit-pairs of the switch control bits (u₁ u₀), (v₁ v₀) and w₀ which are (u₁ u₀ =don't care), (v₁ v₀ =00) and w₀ =1 in q₁, and (u₁ u₀ =00), (v₁ v₀ =don't care) and w₀ =1 in q₂. The bit w₀ =1 means that one selects the order of the plus-star sequence in the ciphertext register 89. Namely, the plus pseudocomplement A⁺ --Q₁ -- is in the left half and the star pseudocomplement A*--Q₂ -- is in the right half of the ciphertext register 89. Therefore, the control switch bits w₁ (=w₀), w₂ and w₃ of selector 90 must be 1, 1 and 0, respectively. When a plaintext A enters in the plaintext register 80 and an enciphering process starts, the enciphering device in FIG. 6 produces the ciphertext in the ciphertext register 89 which contains A⁺ --Q₁ -- and A*--Q₂ -- from the left to the right.

In a deciphering process after receiving the ciphertext in the ciphertext register 100, the control switch bits w₃ =0, w₂ =1 and w₁ =1 in selector 101 are the same as these in selector 90. Thus, the plus pseudocomplement A⁺ --Q₁ -- appeared at node 112 and the star pseudocomplement A*--Q₂ -- appeared node 113 are the inputs to generators 110 and 111, respectively. When the keys (n,P₁, q_(a)) and (n,Q₃,q₃) are supplied to generators 110 and 111, respectively, the generators apply pseudocomplementing operations ()*'--P₁ -- on the input A⁺ --P₁ -- and ()**--Q₃ -- on the input A*--Q₂ -- to produce A⁺ --Q₁ *'--P₁ ---- at the M₁ terminal of generator 110 and A*--Q₂ **--Q₃ ---- at the M₀ terminal of generator 111 according to eq.s (3-11) and (3-4), respectively.

Since there are (A⁺ --Q₁ --)*'--P₁ --=A⁺ --Q₁ *'--P₁ ----=A⁺ --Q₂ **--Q₃ ---- in eq. (3-11) and (A*--Q₂ --)**--Q₃ --=A*--Q₂ **--Q₃ ---- in eq. (3-4), the two switch control bits w₀ 's (referencing switch 50 in FIG. 4) of q_(a) and of q₃ must be 1 (on) and 0 (off) respectively due to the correspondences between the applied pseudocomplementing operation ()*' and its resultant pseudocomplement A⁺ --Q₂ **--Q₃ ---- and between the applied operation ()** and its resultant pseudocomplement A*--Q₂ **--Q₃ ----, i.e., a change from a star *' to a plus + of the pseudocomplements in the former and no change from a (double) star ** to a star * of the pseudocomplements in the latter.

Consequently, the paired conjugate pseudocomplements A⁺ and A* with respect to Q₂ **--Q₃ --(=Q₁ *'--P₁ --) appear in the left half and in the right half of the temporary register 108 through the control switches 106 and 107, respectively. Note: The order of the pseudocomplements in the temporary register is the plus-star sequence. Furthermore, these pseudocomplementing operations ()*' with respect to P₁ and ()** with respect to Q₃ are specified by setting (u₁ u₀ =11) and v₁ v₀ =don't care) in q_(a), and (u₁ u₀ =01) and v₁ v₀ =don;t care) in q₃, respectively.

The conjugate pseudocomplement desegregator 109, which is depicted in FIG. 5, retrieves the plaintext A from the conjugate psuedocomplements with respect to Q₂ **--Q₃ -- by obtaining a targeted pair of pseudocomplements utilizing the key (n,Q₂ (Q₃),q_(b)) and by performing an OR operation on the targeted pair, and stores the retieved plaintext A in the plaintext register 114. The control bits (u₁ u₀), (v₁ v₀) and w₀ of q_(b) are (u₁ u₀ =00), (v₁ v₂ =00) and w₀ =1. These are derived from the fact: the pseudocomplements A⁺ and A*, and the plus-star sequence in the temporary register 108.

Consider the following bit strings for P₁ =P_(i) =01101011, P₂ =P_(j) =10101100, P₃ =P_(k) =01111101 and A(=plaintext message)=11011011 in the above example where Q₁ =P₂ ⁺ '--P₃ --=10101110, Q₂ =P₁ ⁺ --P₂ --=10000100, Q₃ =P₁ *^(P) --P₃ --=10000000 and Q₂ **--Q₃ --=10000100. The sender produces the pseudocomplements A⁺ --Q₁ --=00100100 and A*--Q₂ --=10100100 and stores these in the left half and in the right half of the ciphertext register 89, respectively. Then he transmits the ciphertext to the receiver.

When the receiver finds the content of the ciphertext register 100, the deciphering process starts. Generators 110 and 111 produce the pseudocomplements (A⁺ --Q₁ --)*'--P₁ --, which is equivalent to A⁺ --Q₁ *'--P₁ ----=A⁺ --Q₂ **--Q₃ ----=00000100, appearing at the M₁ terminal of generator 110 and (A*--Q₂ --)**--Q₃ --, which is equivalent to A*--Q₂ **--Q₃ ----=10100100, appearing at the M₀ terminal of generator 111. Subsequently, these pseudocomplements A⁺ and A* with respect to Q₂ **--Q₃ -- are stored in the left half and in the right half of the temporary register, respectively. The conjugate pseudocomplement desegregator 109 performs the complementing operations ()^(P) and ()', i.e., (A⁺ --Q₂ **--Q₃ ----)^(P) --Q₂ **--Q₃ ----=10000000 and (A*--Q₂ **--Q³ ----)'=01011011 and an OR operation on the results of the complementing operations to make 10010000+01001011=11011011 (=plaintext). Finally, the plaintext bit string appears in the plaintext register 114.

Similar to the feedback loops, which are controlled by the repetition controls 6 and 16 in the figures in FIG. 2 respectively, from the ciphertext register to the plaintext register in the enciphering process shown in the former figure and from the plaintext register to the ciphertext register in the deciphering process shown in the latter figure, one can install the feedback loops in the enciphering process shown in FIG. 6 and in the deciphering process shown in FIG. 7 where both the processes use multiple parameters. When a repetition (control) constant m (=2), that may be a part of a key, is supplied to the repitition controls 95 and 120, the previous example becomes as follows.

In the enciphering process, the generated ciphertext, A⁺ --Q₁ --=00100100 in the left half and A*--Q₂ --=10100100 in the right half, is feedbacked to the plaintext register 80 through the feedback path 97 in order to encipher one more time, namely (A⁺ --Q₁ --)⁺ --Q₁ --=10001010, (A⁺ --Q₁ --)* --Q₂ --=11011111, (A*--Q₂ --)⁺ --Q₁ --=00001010 and (A*--Q₂ --)*--Q₂ --=11011111. The ciphertext is 10001010110111110000101011011111 in the nested plus-star sequence. In the deciphering process, the rightmost 16 bits of the ciphertext are deciphered as (((A*--Q₂ --0⁺ --Q₁ --)*'--P₁ --)^(P) --Q₂ **--Q₃ ----=11111111·10000100+00000000·01111011=10000100, (((A*--Q₂ --)*--Q₂ --)**--Q₃ --)'=(00100000)'=00100000 and OR operation on these results 10000100+00100000=10100100. The leftmost 16 bits of the ciphertext are deciphered as (((A⁺ --Q₁ --)⁺ --Q₁ --)*'--P₁ --)^(P) --Q₂ **--Q₃ ----=01111111·10000100+10000000·01111011=00000100, (((A⁺ --Q₁ --)*--Q₂ --)**--Q₃ --)'=(11011111)'=00100000 and OR operation on these results 00000100+00100000=00100100. The repetition control directs one more deciphering process for the current ciphertext 0010010010100100, which is the plus-star sequence of A⁺ --Q₁ -- and A*--Q₂ -- as shown in the previous discussion, to retrieve the plaintext 11011011.

Since the length of an enciphered message (an enciphertext) is 2^(m) longer than the length of an original plaintext (m≧1), one can utilize this advantage of the 2^(m) longer length in order to increase cryptanalysis complexity. For example, by transmitting 2^(m) -original length messages in 2^(m) independent communication passages from sender to receiver, the complexity of an decoding process can be increased. Also message scramble algorithms such as byte permutation may be applicable to ciphertext. 

What is claimed is:
 1. In a process for communicating securely over an insecure communication medium of the type which communicates a digital message A from a sender to a receiver by enciphering at said sender said digital massage with a secret enciphering/deciphering parameter P, by transmitting said enciphered massage from said sender to said receiver, and by deciphering at the receiver's end said enciphered message with said parameter, the process characterized in thatsaid sender means includes means for receiving and storing said enciphering/deciphering parameter, means for receiving and enciphering said digital message by applying a conjugate pseudocomplementing operation with respect to said parameter, and means for transmitting said enciphered message to said receiver; said receiver means includes means for receiving and storing said enciphered message, means for deciphering said enciphered message into said original digital message by applying a desegregate pseudocomplementing operation with respect to said parameter, and means for storing said deciphered digital message in a plaintext register which is a row of flipflops; said conjugate pseudocomplementing operation includes means for transforming said digital message received by said sender into a pair consisting of a star pseudocomplement of {A*,A**,A*^(P),A*'} by applying an operation of {X*,X**,X*^(P),A*'} and a plus pseudocomplement of {A⁺,A⁺⁺,A⁺ _(P),A⁺ '} by applying an operation of {X⁺,X⁺⁺,X⁺ _(P),X⁺ '} with respect to said parameter P, and said desegregate pseudocomplementing operation includes means for transforming said enciphered message consisting of said star pseudocomplement and said plus pseudocomplement received by said receiver into a targeted pair of a star pseudocomplement and a plus pseudocomplement such as {(A*',A⁺⁺),(A**,A⁺ '0,(A*^(P),A⁺),(A*,A⁺ _(P)),A*',A⁺),(A**,A⁺ _(P)),(A*^(P),A⁺⁺),(A*,A⁺ ')} by performing necessary Boolean algebra operations of {X_(P),X',X^(P),I} with respect to said parameter, and means for combining the star pseudocomplement and the plus pseudocomplement of said targeted pair by a logical AND or a logical OR operation performing A=A** AND A⁺ '=A*' OR A⁺⁺, A'=A* AND A⁺ _(P) =A*^(P) OR A⁺, A^(P) =A** AND A⁺ _(P) =A*' OR A⁺ or A_(P) =A* AND A⁺ '=A*^(P) OR A⁺⁺ in order to produce a deciphered message of {A,A',A^(P),A_(P) } and to convert said deciphered message into said original digital message by applying an operation of {I,X',X_(P),X^(P) }, respectively.
 2. The process for communicating securely over an insecure communication medium set forth in claim 1 including:said necessary Boolean algebra operations for performing a transformation operation, which is indicated at the intersection of the table below, from a present pseudocomplement in the leftmost column to a targeted pseudocomplement in the top row,

    ______________________________________                                         Star pseudocomplement                                                                            Plus pseudocomplement                                        to                       to                                                    from  *      **     *.sup.P                                                                             *'   from +    ++   +.sub.P                                                                             +'                           ______________________________________                                         *     I      X.sub.P                                                                               X.sup.P                                                                             X'   +    I    X.sup.P                                                                             X.sub.P                                                                             X'                           **    X.sub.P                                                                               I      X'   X.sup.P                                                                             ++   X.sup.P                                                                             I    X'   X.sub.P                      *.sup.P                                                                              X.sup.P                                                                               X'     I    X.sub.P                                                                             +.sub.P                                                                             X.sub.P                                                                             X'   I    X.sup.P                      *'    X'     X.sup.P                                                                               X.sub.P                                                                             I    +'   X'   X.sub.P                                                                             X.sup.P                                                                             I                            ______________________________________                                    


3. The process for communication securely over an insecure communication medium set forth in claim 1 including:said conjugate psuedocomplementing operation means for forming said enciphered message from a single (a star or a plus) pseudocomplement derived from said digital message.
 4. In a process for communication securely over an insecure communication medium of the type which communicates a digital message A from a sender to a receiver by enciphering at said sender said digital message using two secret enciphering/deciphering parameters P_(i) and P_(j), by transmitting said enciphered message from said sender to said receiver, and by deciphering at the receiver's end said enciphered message using said two parameterrs, the process characterized in thatsaid sender means includes means for receiving and storing said two enciphering/deciphering parameters; means for procreating a compound parameter, a pseudocomplement P_(i) with respect to P_(j) denoted as P_(i) (P_(j)), of {P_(i) *'--P_(j) --, P_(i) *--P_(j) --, P_(i) ⁺⁺ --P_(j) --, P_(i) ⁺ _(P) --P_(j) --, P_(i) **--P_(j) --, P_(i) *^(P) --P_(j) --, P_(i) ⁺ '--P_(j) 13 , P_(i) ⁺ --P_(j) --} which appear in the third term or the fourth term of the equations (3-1) through (3-16); means for receiving and enciphering said digital message A by applying two pseudocomplementing operations on said message A (i) with respect to the parameter P_(i) in order to choose a pseudocomplement of A (with respect to P_(i)) which appears in the first term or the second term of an equation elected from the equations (3-1) through (3-16) where said compound parameter P_(i) (P_(j)) exists in the third term or the fourth term as a parameter and (ii) with respect to said compound parameter P_(i) (P_(j)) in order to produce a component of a conjugate psuedocomplement pair with respect to P_(i) (P_(j)) where said component is a buddy of said pseudocomplement existed in the third term or the fourth term of said elected equation that contains said chosen pseudocomplement of A with respect to P_(i) in the first term or the second term,

    __________________________________________________________________________     (A.sup.+.sub.P --(P.sub.i)--).sup.+ '--(P.sub.j)--                                        = (A.sup.++ --(P.sub.i)--).sup.+.sub.P --(P.sub.j)--                                       = A.sup.+.sub.P --(P.sub.i .sup.++ --(P.sub.j)--                               )--         = A*--(P.sub.i .sup.+.sub.P --(P.sub.j)                                        -- )--     (3-1)                            (A.sup.+.sub.P --(P.sub.i)--)**--(P.sub.j)--                                              = (A.sup.++ --(P.sub.i)--)*--(P.sub.j --                                                   = A.sup.+.sub.P --(P.sub.i *'--(P.sub.j)--                                                 = A*--(P.sub.i *--(P.sub.j)-- )--                                                         (3-2)                            (A*--(P.sub.i)--).sup.+ '--(P.sub.j)--                                                    = (A*'--(P.sub.i)--).sup.+.sub.P --(P.sub.j)--                                             = A.sup.+.sub.P --(P.sub.i .sup.+ --(P.sub.j)--                                            = A*--(P.sub.i .sup.+ '--(P.sub.j)--                                           )--        (3-3)                            (A*--(P.sub.i)--)**--(P.sub.j)--                                                          = (A*'--(P.sub.i)--)*--(P.sub.j)--                                                         = A.sup.+.sub.P --(P.sub.i *.sup.P --(P.sub.j)--                               )--         = A*--(P.sub.i **--(P.sub.j)--                                                            (3-4)                            (A.sup.+ '--(P.sub.i)--).sup.+ '--(P.sub.j)--                                             = (A.sup.+ --(P.sub.i)--).sup.+.sub.P --(P.sub.j)--                                        = A.sup.+ '--(P.sub.i .sup.++ --(P.sub.j)----                                              = A**--(P.sub.i .sup.+.sub.P --(P.sub.j                                        )-- ) --   (3-5)                            (A.sup.+ '--(P.sub.i --)**--(P.sub.j)--                                                   = (A.sup.+ --(P.sub.i)--)*--(P.sub.j)--                                                    = A.sup.+ '--(P.sub.i *'--(P.sub.j)-- )--                                                  = A**--(P.sub.i *--(P.sub.j)--                                                            (3-6)                            (A**--(P.sub.i)--).sup.+ '--(P.sub.j)--                                                   = (A*.sup.P --(P.sub.i)--).sup.+.sub.P --(P.sub.j)--                                       = A.sup.+ '--(P.sub.i.sup.+ --(P.sub.j)-- )--                                              = A**--(P.sub.i .sup.+ '--(P.sub.j)--                                          )--        (3-7)                            (A**--(P.sub.i)--)**--(P.sub.j)--                                                         = (A*.sup.P --(P.sub.i)--)*--(P.sub.j)--                                                   = A.sup.+ '--(P.sub.i *.sup.P --(P.sub.j)--                                                = A**--(P.sub.i **--(P.sub.j)--                                                           (3-8)                            (A*.sup.P --(P.sub.i)--)*'--(P.sub.j)--                                                   = (A**--(P.sub.i)--)*.sup.P --(P.sub.j)--                                                  = A.sup.+ --(P.sub.i *.sup.P --(P.sub.j)--                                                 = A*.sup.P --(P.sub.i **--(P.sub.j)--                                          )--        (3-9)                            (A*.sup.P --(P.sub.i)--).sup.++ --(P.sub.j)--                                             = (A**--(P.sub.i)--).sup.+ --(P.sub.j)--                                                   = A.sup.+ --(P.sub.i.sup.+--(P.sub.j)-- )--                                                = A*.sup.P --(P.sub.i .sup.+ '--(P.sub.                                        j)-- )--   (3-10)                           (A.sup.+ --(P.sub.i)--)*'--(P.sub.j)--                                                    = (A.sup. + '--(P.sub.i)--)*.sup.P --(P.sub.j)--                                           = A.sup.+ --(P.sub.i *'--(P.sub.j)-- )--                                                   = A*.sup.P --(P.sub.i *--(P.sub.j)--                                           )--        (3-11)                           (A.sup.+ --(P.sub.i)--).sup.++--(P.sub.j)--                                               = (A.sup.+ '--(P.sub.i)--).sup.+ --(P.sub.j)--                                             = A.sup.+ --(P.sub.i .sup.++ --(P.sub.j)--                                                 = A*.sup.P --(P.sub.i .sup.+.sub.P                                             --(P.sub.j)-- )--                                                                         (3-12)                           (A*'--(P.sub.i)--)*'--(P.sub.j)--                                                         = (A*--(P.sub.i)--)*.sup.P --(P.sub.j)--                                                   = A.sup.++ --(P.sub.i *.sup.P --(P.sub.j)--                                                =  A*'--(P.sub.i **--(P.sub.j)--                                                          (3-13)                           (A*'--(P.sub.i)--).sup.++ --(P.sub.j)--                                                   = (A*--(P.sub.i)--).sup.+ --(P.sub.j)--                                                    = A.sup.++ --(P.sub.i .sup.+ --(P.sub.j)--                                                 = A*'--(P.sub.i .sup.+ '--(P.sub.j)--                                          )--        (3-14)                           (A.sup.++ --(P.sub.i)--)*'--(P.sub.j)--                                                   = (A.sup.+.sub.P --(P.sub.i)--)*.sup.P --(P.sub.j)--                                       = A.sup.++--(P.sub.i *'--(P.sub.j)-- )--                                                   = A*'--(P.sub.i *--(P.sub.j)--                                                            (3-15)                           (A.sup.++ --(P.sub.i)--).sup.++ --(P.sub.j)--                                             = (A.sup.+.sub. P --(P.sub.i)--).sup.+ --(P.sub.j)--                                       = A.sup.++ --(P.sub.i .sup.++ --(P.sub.j)--                                                = A*'--(P.sub.i .sup.+.sub.P --(P.sub.j                                        )-- )--    (3-16)                           __________________________________________________________________________

means for forming said enciphered message consisting of pseudocomplements of a conjugate pair constructed from said pseudocomplement obtained with respect to said parameter P_(i) and said pseudocomplement with respect to said compound parameter P_(i) (P_(j)); and means for transmitting said enciphered message to said receiver; said receiver means includes means for receiving and storing said enciphered message received by said receiver; means for taking receiver-pseudocomplementing operation with respect to P_(j) defined in the first term or the second term in order to acquire the third term or the fourth in said elected equation; means for transforming a pair consisting of(i) the conjugate component with respect to P_(i) (P_(j)), which is the third term or the fourth term of said elected equation, produced by said receiver-pseudocomplementing operation with respect to P_(j) on said pseudocomplement with respect to P_(i) of said enciphered message and (ii) the pseudocomplement with respect to said compound parameter P_(i) (P_(j)) of said enciphered message into a targeted pair of {(A*',A⁺⁺),(A**,A⁺ '),(A*^(P),A⁺),(A*,A⁺ _(P)),(A*',A⁺),(A**,A⁺ _(P)),(A*^(P),A⁺⁺),(A*,A⁺ ')} with respect to said compound parameter P_(i) (P_(j)) by performing necessary Boolean algebra operations of {X_(P),X',X^(P),I}; and means for combining the star pseudocomplement and the plus pseudocomplement of said targeted pair by a logical AND or a logical OR separation which achieves A=A**·A⁺ '=A*'+A⁺⁺,A'=A*·A⁺ _(P) =A*^(P) +A⁺, A^(P) =A**·A⁺ _(P) =A*'+A⁺ or A_(P) =A*·A⁺ '=A*^(P) +A⁺⁺ in order to retrieve a deciphered message of {A,A',A^(P),A_(P) } and to convert said deciphered message into said original digital message A by applying a respective operation of {I,X',X_(P),X^(P) }, respectively; said conjugate pseudocomplementing operations include means for transforming said digital message A received by said sender into two conjugate sets of a pair consisting of a star pseudocomplement of {A*,A**,A*^(P),A*'} by applying an operation of {X*,X**,X*^(P),X*'} and a plus pseudocomplement of {A⁺,A⁺⁺,A⁺ _(P),A⁺ '} by applying an operation of {X⁺,X⁺⁺,X⁺ _(P),X⁺ '}, respectively (i) with respect to said parameter P_(i) and(ii) with respect to said compound parameter P_(i) (P_(j)).
 5. The process for communicating securely over an insecure communication medium set forth in claim 4 including:said necessary Boolean algebra operations for performing a transformation operation, which is indicated at the intersection of the table below, from a present pseudocomplement in the leftmost column to a targeted pseudocomplement in the top row,

    ______________________________________                                         Star pseudocomplement                                                                            Plus pseudocomplement                                        to                       to                                                    from  *      **     *.sup.P                                                                             *'   from +    ++   +.sub.P                                                                             +'                           ______________________________________                                         *     I      X.sub.P                                                                               X.sup.P                                                                             X'   +    I    X.sup.P                                                                             X.sub.P                                                                             X'                           **    X.sub.P                                                                               I      X'   X.sup.P                                                                             ++   X.sup.P                                                                             I    X'   X.sub.P                      *.sup.P                                                                              X.sup.P                                                                               X'     I    X.sub.P                                                                             +.sub.P                                                                             X.sub.P                                                                             X'   I    X.sup.P                      *'    X'     X.sup.P                                                                               X.sub.P                                                                             I    +'   X'   X.sub.P                                                                             X.sup.P                                                                             I                            ______________________________________                                    


6. An apparatus for communicating securely over an insecure communication medium of the type which communicates a digital message A from a sender to a receiver by enciphering at said sender said digital message with a secret enciphering/deciphering parameter P, by transmitting said enciphered message from said sender to said receiver, and by deciphering at the receiver's end said enciphered message with said parameter comprising:s-plaintext register means for receiving and storing a digital message, s-P register means for receiving and storing a parameter P, s-q register means for receiving and storing control bits u₁ u₀, v₁ v₀ and w₀ of a component q, s-ciphertext register means for receiving and transmitting an enciphered message of said digital message, s-star operation means for performing a pseudocomplementing operation of {X*,X**,X*^(P),X*'} with respect to said parameter P on said digital message, s-plus operation means for performing a pseudocomplementing operation of {X⁺,X⁺⁺,X⁺ _(P),X⁺ '} with respect to said parameter P on said digital message, s-switch means for connecting two input terminals (a,b) to two output terminals (c,d) by alternatively switching said connection (a,b) to (c,d) and (a,b) to (d,c) respectively using said control bit w₀, first means, connect said s-P register means, said s-plaintext register means and said s-q register means to said s-star operation means in order to obtain a star pseudocomplement, which is specified by the bits u₁ u₀ of said s-q register means, of said digital message, second means, connect said s-P register means, said s-plaintext register means and said s-q register means to said s-plus operation means in order to obtain a plus pseudocomplement, which is specified by the bits v₁ v₀ of said s-q register means, of said digital message, third means, connect said s-star operation means to said s-ciphertext register means through said s-switch means using said w₀ of said s-q register means in order to form said enciphered message with plus pseudocomplement and to transmit said enciphered message, fourth means, connect said s-plus operation means to said s-ciphertext register means through said s-switch means using said w₀ of said s-q register means in order to form said enciphered message with said star pseudocomplement and to transmit said enciphered message, r-ciphertext register means for receiving and storing said enciphered message, r-P register means for receiving and storing said parameter P, r-plaintext register means for receiving and storing a deciphered message of said enciphered message, r-q register means for receiving and storing said control bits u₁ u₀, v₁ v₀ and w₀ of a component q, r-switch means for connecting two input terminals (a,b) to two output terminals (c,d) by alternatively switching said connection (a,b) to (c,d) and (a,b) to (d,c) respectively using said control bit w₀, r-star operation means for performing a complementing operation of γX',X^(P),X_(P), I} with respect to said parameter P on said enciphered message, r-plus operation means for performing a complementing operation of {X^(P),I,X',X_(P) } with respect to said parameter P on said enciphered message, fifth means, connect r-ciphertext register means to said r-star operation means through said r-switch means in order to obtain the pseudocomplement A*', where the applicable complementing operation is specified by the bits u₁ u₀, namely the applicable operations {X',X^(P),X_(P),I} for pseudocomplements {A*,A**,A*^(P),A*'} respectively, sixth means, connect r-ciphertext register means to said r-plus operation means through said r-switch means in order to obtain the pseudocomplement A⁺⁺, where the applicable complementing operation is specified by the bits v₁ v₀, namely the applicable operations {X^(P),I,X',X_(P) } for pseudocomplements {A⁺,A⁺⁺,A⁺ _(P),A⁺ '} respectively. seventh means, performing a logical OR operation on said obtained pseudocomplements A*' and A⁺⁺ forming A=I·(A*'+A⁺⁺) and storing the result in said r-plaintext register means.
 7. The apparatus for communicating securely over an insecure communication medium set forth in claim 6 including:alternative logical operations, which can result in the same logical values due to Boolean algebra operations, in three means listed below:

    ______________________________________                                                          applicable  applicable                                        said seventh means                                                                              operations in                                                                              operations in                                     performing       said fifth means                                                                           said sixth means                                  ______________________________________                                         A = I · (A*' + A.sup.++)                                                               {X',X.sup.P,X.sub.P,I}                                                                     {X.sup.P,I,X',X.sub.P }                           A = I · (A** · A.sup.+ ')                                                     {X.sub.P,I,X',X.sup.P }                                                                    {X',X.sub.P,X.sup.P,I}                            A = (A')' = (A*.sup.P + A.sup.+)'                                                               {X.sup.P,X',I,X.sub.P }                                                                    {I,X.sup.P,X.sub.P,X'}                            A = (A')' = (A* · A.sup.+.sub.P)'                                                      {I,X.sub.P,X.sup.P,X'}                                                                     {X.sub.P,X',I,X.sup.P}                            A = (A.sup.P).sup.P = (A*' + A.sup.+).sup.P                                                     {X',X.sup.P,X.sub.P,I}                                                                     {I,X.sup.P,X.sub.P,X'}                            A = (A.sup.P).sup.P = (A** ·  A.sup.+.sub.P).sup.P                                     {X.sub.P,I,X',X.sup.P }                                                                    {X.sub.P,X',I,X.sup.P }                           A = (A.sub.P).sub.P = (A*.sup.P + A.sup.++).sub.P                                               {X.sup.P,X',I,X.sub.P }                                                                    {X.sup.P,I,X',X.sub.P }                           or A = (A.sub.P).sub.P = (A* · A.sup.+ ').sub.P                                        {I,X.sub.P,X.sup.P,X'}                                                                     {X',X.sub.P,X.sup.P,I}.                           ______________________________________                                    


8. The apparatus for communicating securely over an insecure communication medium set forth in claim 6 including:physical wirings (hard wirings) of said control connections by choosing a configuration of a connecting arrangement designated by bits u₁ u₀, v₁ v₀ and w₀, instead of said control connections by said control bits, u₁ u₀ in said first means, v₁ v₀ in said second means, w₀ in said third means, w₀ in said fourth means, u₁ u₀ in said fifth means, and v₁ v₀ in said sixth means.
 9. The apparatus for communicating securely over an insecure communication medium set forth in claim 6 including:said third means replacing said plus pseudocomplement with any other bits and said fourth means replacing said star pseudocomplement with any other bits.
 10. An apparatus for communicating securely over an insecure communication medium of the type which communicates a digital message A from a sender to a receiver by enciphering at said sender said digital message with two secret enciphering/deciphering parameters P_(i) and P_(j), by transmitting said enciphered message from said sender to said receiver, and by deciphering at the receiver's end said enciphered message with said two parameters comprising:s-plaintext register means for receiving and storing a digital message A, first generator means for receiving and storing (i) a parameter P_(i) and (ii) (u₁ u₀)₁, (v₁ v₀)₁ and w₀₁ of control bits q₁, for receiving the content of said s-plaintext register means, for enciphering said received digital message into a pair of conjugate pseudocomplements by performing conjugate pseudocomplementing operations with respect to said parameter P_(i), and for outputting said pair of the conjugate pseudocomplements from its terminals M₀ and M₁, second generator means for receiving and storing (i) a pseudocomplement of P_(i) with respect to P_(j) as a parameter denoted as P_(i) (P_(j)) and (ii) (u₁ u₀)₂, (v₁ v₀)₂ and w₀₂ of control bits q₂, for receiving the content of said s-plaintext register means, for enciphering said received digital message into a pair of conjugate pseudocomplements by performing conjugate pseudocomplementing operations with respect to said parameter P_(i) (P_(j)), and for outputting said pair of the conjugate pseudocomplements from its terminals M₀ and M₁, s-selector means for receiving (i) two pairs of conjugate pseudocomplements and (ii) switching bits w₃ and w₂, and control bit w₁, for selectively passing said received two pairs of conjugate pseudocomplements using said switching and control bits, and for outputting a selected pair of the pseudocomplements consisting of one pseudocomplement with respect to P_(i) and the other pseudocomplement with respect to P_(i) (P_(j)), s-ciphertext register means for receiving and transmitting an enciphered message, first means, connect said s-plaintext register means to said first generator means and to said second generator means, second means, connect said terminals M₀ and M₁ of each said generator means to said s-selector means, and for passing said selected pair of pseudocomplements to said s-ciphertext register means through said s-selector means selected by ssaid bits w₃, w₂ and w₁, r-ciphertext register means for receiving and storing an enciphered message, r-selector means for receiving (i) said switching bits w₃ and w₂, and control bit w₁, and (ii) an enciphered message, for selectively passing the conjugate pseudocomplements of said enciphered message received by using said switching and control bits w₃, w₂ and w₁, and for outputting each of the condjugate pseudocomplements, temporary register means for receiving and storing a pair of conjugate pseudocomplements with respect to P_(i) (P_(j)) obtained from said enciphered message, third generator means for receiving and storing a parameter P_(j) and (u₁ u₀)_(a), (v₁ v₀)_(a) and (w₀)_(a) of control bits q_(a), for receiving and enciphering the pseudocomplement with respect to P_(i) of the enciphered message by taking pseudocomplementing operations with respect to P_(j), which is specified by said bits (u₁ u₀)_(a) and (v₁ v₀)_(a), and for outputting a produced pair of conjugate pseudocomplements with respect to P_(i) (P_(j)), box means for receiving and passing the pseudocomplement with respect to P_(i) (P_(j)) of said enciphered message to its output terminals M₀ and M₁, r-plaintext register means for receiving and storing a deciphered message as the original plaintext, switcher means for connecting two input terminals (a,b) to two output terminals (c,d) by alternatively switching said connection (a,b) to (c,d) and (a,b) to (d,c) respectively using control bit w_(i) where i denotes the suffix of said bits w₀, w₁, w₂ and w₃, desegregator means for receiving and storing said parameter P_(i) (P_(j)) and control bits (u₁ u₀)_(b), (v₁ v₀)_(b) and (w₀)_(b) of q_(b), for receiving and transforming said pair of conjugate pseudocomplements with respect to P_(i) (P_(j)), which is the content of said temporary register means, to a targeted pair of the conjugate pseudocomplements (A*',A⁺⁺) by performing the applicable complementing operations of {X',X^(P),X_(P),I} specified by (u₁ u₀)_(b) and of {X^(P),I,X',X_(P) } specified by (v₁ v₀)_(b), for executing a logical OR operation on said targeted pair, which has been transformed, in order to retrieve said original plaintext, third means, connect said r-ciphertext register means to said third generator means through the first two switches of said r-selector means controlled by said bits w₃ and w₂ where said generator means generates said pair of conjugate pseudocomplements with respect to P_(j), fourth means, connect said third generator means to said desegregator means through (i) the third switch of said r-selector means controlled by said bit w₁ and (ii) said temporary register means where said desegregator means produces said targeted pair of conjugate pseudocomplements using said parameter P_(i) (P_(j)) and said q_(b), fifth means, connect said r-ciphertext register means to said desegregator means through (i) the first two switches of ssaid r-selector means controlled by said bits w₃ and w₂, (ii) said box means, (iii) the third switch of said r-selector means controlled by said bit w₁ and (iv) said temporary register means, sixth means for transferring the deciphered message produced by executing said logical OR operation into said ciphertext register means, seventh means for obtaining (i) first pseudocomplement by performing said conjugate pseudocomplementing operations with respect to said parameter P_(i) in said first generator means and (ii) second pseudocomplement by performing said conjugate pseudocomplementing operations with respect to said parameter P_(j) in said third generator means where said first pseudocomplement and said second pseudocomplement are defined in the first term or the second term of an equation chosen from the equations (3-1) through (3-16), in order to acquire an objective term which is the third term or the fourth term of said chosen equation, eighth means for obtaining third pseudocomplement by performing said conjugate pseudocomplementing operations with respect to said parameter P_(i) (P_(j)) in said second generator means where said third pseudocomplement with respect to said parameter P_(i) (P_(j)) constitutes a conjugate pair with said objective term, where said equations (3-1) through (3-16) are ##EQU8##
 11. The apparatus for communicating securely over an insecure communication medium set forth in claim 10 including:alternative logical operations applicable to said complementations specified by u₁ u₀ and v₁ v₀ in said desegregator means can result in the same logical values due to Boolean algebra operations, these operations are

    ______________________________________                                                           complementa-                                                                              complementa-                                                        tion specified                                                                            tion specified                                    logical operation by u.sub.1 u.sub.0                                                                        by v.sub.1 v.sub.0                                ______________________________________                                         A = I · (A*' + A.sup.++)                                                                {X',X.sup.P,X.sub.P,I}                                                                    {X.sup.P,I,X',X.sub.P }                           A = I · (A** · A.sup.+ ')                                                      {X.sub.P,I,X',X.sup.P }                                                                   {X',X.sub.P,X.sup.P,I}                            A = (A')' = (A*.sup.P + A.sup.+)'                                                                {X.sup.P,X',I,X.sub.P }                                                                   {I,X.sup.P,X.sub.P,X'}                            A = (A')' = (A* · A.sup.+.sub.P)'                                                       {I,X.sub.P,X.sup.P,X'}                                                                    {X.sub.P,X',IX.sup.P }                            A = (A.sup.P).sup.P = (A*'+ A.sup.+).sup.P                                                       {X',X.sup.P,X.sub.P I}                                                                    {I,,X.sup.P,X.sub.P,X'}                           A = (A.sup.P).sup.P (A** · A.sup.+.sub.P).sup.P                                         {X.sub.P,I,X',X.sup.P }                                                                   {X.sub.P,X',I,X.sup.P }                           A = (A.sub.P).sub.P = (A*.sup.P + A.sup.++).sub.P                                                {X.sup.P,X',I,X.sub.P }                                                                   {X.sup.P,I,X',X.sub.P }                           or                                                                             A = (A.sub.P).sub.P = (A* · A.sup.+ ').sub.P                                            {I,X.sub.P,X.sup.P,X'}                                                                    {X',X.sub.P,X.sup.P,I}                            ______________________________________                                    


12. The apparatus for communicating securely over an insecure communication medium set forth in claim 10 including:said parameters P_(i) and P_(j) are interchangeable, namely P_(i) can be used in the place of P_(j) and P_(j) can be used in the place of P_(i).
 13. In a process for communicating securely over an insecure communication medium of the type which communicates a digital message A from a sender to a receiver by enciphering at said sender said digital message using two compound parameters Q₁ =P_(j) (P_(k)) and Q₂ =P_(i) (P_(j)), which are kept in secret or which are open to general public, constructed by pseudocomplementing operations from three parameters P_(i), P_(j) and P_(k), by transmitting said enciphered message from said sender to said receiver, and by deciphering at the receiver's end said enciphered message using said parameter P_(i) and a third compound parameter Q₃ =P_(i) (P_(k)) constructed from said parameters P_(i) and P_(k) where applicable pseudocomplementing operations that define the pseudocomplements of Q₁ =P_(j) (P_(k)), Q₂ =P_(i) (P_(j)) and Q₃ =P_(i) (P_(k)) as well as P₁ (Q₁)=Q₂ (Q₃)=Q₁ (P₁) and P₁ =P_(i) are determined in first equation selected among the equations (6-1) through (6-16) which are

    ______________________________________                                         P.sub.1 (Q.sub.1)                                                                         Q.sub.2 (Q.sub.3)                                                                           Q.sub.1 (P.sub.1)                                      ______________________________________                                         P.sub.i .sup.+ --(P.sub.j .sup.+.sub.P --(P.sub.k)-- )--  =                                                 (6-1)                                             (P.sub.i *.sup.P --(P.sub.j)--)**--(P.sub.i *.sup.P --(P.sub.k)-- )--  =       (P.sub.j .sup.+.sub.P --(P.sub.k)--)*'--(P.sub.i)--                            P.sub.i .sup.+ --(P.sub.j *--(P.sub.k)-- )-- =                                                              (6-2)                                             (P.sub.i *.sup.P --(P.sub.j)--)**--(P.sub.i .sup.+ --(P.sub.k)-- )-- =         (P.sub.j *--(P.sub.k)--)*'--(P.sub.i)--                                        P.sub.i .sup.+ --(P.sub.j .sup.+ '--(P.sub.k)-- )-- =                                                       (6-3)                                             (P.sub.i .sup.+ --(P.sub.j)-- )**--(P.sub.i *.sup.P --(P.sub.k)-- )-- =        (P.sub.j .sup.+ '--(P.sub.k)--)*'--(P.sub.i)--                                 P.sub.i .sup.+ --(P.sub.j **--(P.sub.k)-- )-- =                                                             (6-4)                                             (P.sub.i .sup.+ --(P.sub.j)--)**--(P.sub.i .sup.+ --(P.sub.k)-- )-- =          (P.sub.j **--(P.sub.k)--)*'--(P.sub.i)--                                       P.sub.i .sup.++ --(P.sub.j .sup.+.sub.P --(P.sub.k)-- )-- =                                                 (6-5)                                             (P.sub.i *'--(P.sub.j)--)**--(P.sub.i *'--(P.sub.k)-- )-- =                    (P.sub.j .sup.+.sub.P --(P.sub.k)--).sup.++ --(P.sub.i)--                      P.sub.i .sup.++ --(P.sub.j *--(P.sub.k)--  )-- =                                                            (6-6)                                             (P.sub.i *'--(P.sub.j)--)**--(P.sub.i .sup.++ --(P.sub.k)-- )-- =              (P.sub.j *--(P.sub.k)--).sup.++-- (P.sub.i)--                                  P.sub.i .sup.++ --(P.sub.j .sup.+ '--(P.sub.k)-- )-- =                                                      (6-7)                                             (P.sub.i .sup.++ --(P.sub.j)--)**--(P.sub.i *'--(P.sub.k)-- )-- =              (P.sub.j .sup.+ '--(P.sub.k)--).sup.++ --(P.sub.i)--                           P.sub.i .sup.++ --(P.sub.j **--(P.sub.k)-- )-- =                                                            (6-8)                                             (P.sub.i .sup.++ --(P.sub.j)--)**--(P.sub.i .sup.++ --(P.sub.k)--)-- =         (P.sub.j **--(P.sub.k)--).sup.++ -- (P.sub.i)--                                P.sub.i *--(P.sub.j *.sup.P --(P.sub.k)-- )-- =                                                             (6-9)                                             (P.sub.k.sup.+.sub.P --(P.sub.j)--).sup.++ --(P.sub.i .sup.+.sub.P             --(P.sub.k)-- )-- =                                                            (P.sub.j *.sup.P --(P.sub.k)--).sup.+ '-- (P.sub.i)--                          P.sub.i *--(P.sub.j .sup.+ --(P.sub.k)-- )-- =                                                              (6-10)                                            (P.sub.i .sup.+.sub.P --(P.sub.j)--).sup.++ --(P.sub.i *--(P.sub.k)-- )--      (P.sub.j .sup.+ --(P.sub.k)--).sup.+ '--(P.sub.i)--                            P.sub.i *--(P.sub.j *'--(P.sub.k)-- )-- =                                                                   (6-11)                                            (P.sub.i *--(P.sub.j)--).sup.++ --(P.sub.i .sup.+.sub.P --(P.sub.k)-- )--      =                                                                              (P.sub.j *'--(P.sub.k)--).sup.+ '--(P.sub.i)--                                 P.sub.i *--(P.sub.j .sup.++ --(P.sub.k)-- )-- =                                                             (6-12)                                            (P.sub.i *--(P.sub.j)--).sup.++ --(P.sub.i *--(P.sub.k)-- )-- =                (P.sub.j .sup.++ --(P.sub.k)--).sup.+ '--(P.sub.i)--                           P.sub.i **--(P.sub.j *.sup.P --(P.sub.k)-- =                                                                (6-13)                                            (P.sub.i .sup.+ '--(P.sub.j)--).sup.++ --(P.sub.i .sup.+ '--(P.sub.k)--        )-- =                                                                          (P.sub.j *.sup.P --(P.sub.k)--)**--(P.sub.i)--                                 P.sub.i **--(P.sub.j .sup.+ --(P.sub.k)-- )-- =                                                             (6-14)                                             (P.sub.i .sup.+ '--(P.sub.j)--).sup.++ --(P.sub.i **--(P.sub.k)-- )-- =       (P.sub.j .sup.+ --(P.sub.k)--)**--(P.sub.i)--                                  P.sub.i **--(P.sub.j *'--(P.sub.k)-- )-- =                                                                  (6-15)                                            (P.sub.i **--(P.sub.j)--).sup.++ --(P.sub.i .sup.+ '--(P.sub.k)-- )-- =        (P.sub.j *'--(P.sub.k)--)**--(P.sub.i)--                                       P.sub.i **--(P.sub.j .sup.++ --(P.sub.k)-- )-- =                                                            (6-16)                                            (P.sub.i **--(P.sub.j)--).sup.++ --(P.sub.i **--(P.sub.k)-- )-- =              (P.sub.j .sup.++ --(P.sub.k)--)**--(P.sub.i)--                                 ______________________________________                                          the process characterized in that

said sender means includes means for receiving and storing said two compound parameters Q₁ and Q₂ ; means for receiving and enciphering said digital message by applying two conjugate pseudocomplementing operations (i) with respect to said compound parameter Q₁ and (ii) with respect to said compound parameter Q₂ where by electing (i) second equation from four equations which are chosen from the equations (3-1) through (3-16) by collecting the pseudocomplement terms with respect to said parameter Q₁ (P₁) (that is also appeared in said first equation) in the third term of the fourth term after substituting Q₁ and P₁ in the places of P_(i) and P_(j) of the equations (3-1) through (3-16) and (ii) third equation from four equations which are chosen from the equations (3-1) through (3-16) by collecting the pseudocomplement terms with respect to said parameter Q₂ (Q₃) (that is also appeared in said first equation) in the third term or the fourth term after substituting Q₂ and Q₃ in the places of P_(i) and P_(j) of the equations (3-1) through (3-16), the first term or the second term of the pseudocomplement with respect to Q₁ of said second equation and the first term or the second term of the pseudocomplement with respect to Q₂ of said third equation specify said applicable two conjugate pseudocomplementing operations, respectively,

    __________________________________________________________________________     (A.sup.+.sub.P --(P.sub.i)--).sup.+ '--(P.sub.j)--                                        = (A.sup.++ --(P.sub.i)--).sup.+.sub.P --(P.sub.j)--                                       = A.sup.+.sub.P --(P.sub.i .sup.++ --(P.sub.j)--                               )--         = A*--(P.sub.i .sup.+.sub.P --(P.sub.j)                                        -- )--     (3-1)                            (A.sup.+.sub.P --(P.sub.i)--)**--(P.sub.j)--                                              = (A.sup.++ --(P.sub.i)--)*--(P.sub.j --                                                   = A.sup.+.sub.P --(P.sub.i *'--(P.sub.j)--                                                 = A*--(P.sub.i *--(P.sub.j)-- )--                                                         (3-2)                            (A*--(P.sub.i)--).sup.+ '--(P.sub.j)--                                                    = (A*'--(P.sub.i)--).sup.+.sub.P --(P.sub.j)--                                             = A.sup.+.sub.P --(P.sub.i .sup.+ --(P.sub.j)--                                            = A*--(P.sub.i .sup.+ '--(P.sub.j)--                                           )--        (3-3)                            (A*--(P.sub.i)--)**--(P.sub.j)--                                                          = (A*'--(P.sub.i)--)*--(P.sub.j)--                                                         = A.sup.+.sub.P --(P.sub.i *.sup.P --(P.sub.j)--                               )--         = A*--(P.sub.i **--(P.sub.j)--                                                            (3-4)                            (A.sup.+ '--(P.sub.i)--).sup.+ '--(P.sub.j)--                                             = (A.sup.+ --(P.sub.i)--).sup.+.sub.P --(P.sub.j)--                                        = A.sup.+ '--(P.sub.i .sup.++ --(P.sub.j)----                                              = A**--(P.sub.i .sup.+.sub.P --(P.sub.j                                        )-- ) --   (3-5)                            (A.sup.+ '--(P.sub.i --)**--(P.sub.j)--                                                   = (A.sup.+ --(P.sub.i)--)*--(P.sub.j)--                                                    = A.sup.+ '--(P.sub.i *'--(P.sub.j)-- )--                                                  = A**--(P.sub.i *--(P.sub.j)--                                                            (3-6)                            (A**--(P.sub.i)--).sup.+ '--(P.sub.j)--                                                   = (A*.sup.P --(P.sub.i)--).sup.+.sub.P --(P.sub.j)--                                       = A.sup.+ '--(P.sub.i hu +--(P.sub.j)-- )--                                                = A**--(P.sub.i .sup.+ '--(P.sub.j)--                                          )--        (3-7)                            (A**--(P.sub.i)--)**--(P.sub.j)--                                                         = (A*.sup.P --(P.sub.i)--)*--(P.sub.j)--                                                   = A.sup.+ '--(P.sub.i *.sup.P --(P.sub.j)--                                                = A**--(P.sub.i **--(P.sub.j)--                                                           (3-8)                            (A*.sup.P --(P.sub.i)--)*'--(P.sub.j)--                                                   = (A**--(P.sub.i)--)*.sup.P --(P.sub.j)--                                                  = A.sup.+ --(P.sub.i *.sup.P --(P.sub.j)--                                                 = A*.sup.P --(P.sub.i **--(P.sub.j)--                                          )--        (3-9)                            (A*.sup.P --(P.sub.i)--).sup.++ --(P.sub.j)--                                             = (A**--(P.sub.i)--).sup.+ --(P.sub.j)--                                                   = A.sup.+ --(P.sub.i.sup.+--(P.sub.j)-- )--                                                = A*.sup.P --(P.sub.i .sup.+ '--(P.sub.                                        j)-- )--   (3-10)                           (A.sup.+ --(P.sub.i)--)*'--(P.sub.j)--                                                    = (A.sup. + '--(P.sub.i)--)*.sup.P --(P.sub.j)--                                           = A.sup.+ --(P.sub.i *'--(P.sub.j)-- )--                                                   = A*.sup.P --(P.sub.i *--(P.sub.j)--                                           )--        (3-11)                           (A.sup.+ --(P.sub.i)--).sup.++--(P.sub.j)--                                               = (A.sup.+ '--(P.sub.i)--).sup.+ --(P.sub.j)--                                             = A.sup.+ --(P.sub.i .sup.++ --(P.sub.j)--                                                 = A*.sup.P --(P.sub.i .sup.+.sub.P                                             --(P.sub.j)-- )--                                                                         (3-12)                           (A*'--(P.sub.i)--)*'--(P.sub.j)--                                                         = (A*--(P.sub.i)--)*.sup.P --(P.sub.j)--                                                   = A.sup.++ --(P.sub.i *.sup.P --(P.sub.j)--                                                =  A*'--(P.sub.i **--(P.sub.j)--                                                          (3-13)                           (A*'--(P.sub.i)--).sup.++ --(P.sub.j)--                                                   = (A*--(P.sub.i)--).sup.+ --(P.sub.j)--                                                    = A.sup.++ --(P.sub.i .sup.+ --(P.sub.j)--                                                 = A*'--(P.sub.i .sup.+ '--(P.sub.j)--                                          )--        (3-14)                           (A.sup.++ --(P.sub.i)--)*'--(P.sub.j)--                                                   = (A.sup.+.sub.P --(P.sub.i)--)*.sup.P --(P.sub.j)--                                       = A.sup.++--(P.sub.i *'--(P.sub.j)-- )--                                                   = A*'--(P.sub.i *--(P.sub.j)--                                                            (3-15)                           (A.sup.++ --(P.sub.i)--).sup.++ --(P.sub.j)--                                             = (A.sup.+.sub. P --(P.sub.i)--).sup.+ --(P.sub.j)--                                       = A.sup.++ --(P.sub.i .sup.++ --(P.sub.j)--                                                = A*'--(P.sub.i .sup.+.sub.P --(P.sub.j                                        )-- )--    (3-16);                          __________________________________________________________________________

means for forming said enciphered message consisting of pseudocomplements of a conjugate pair constructed from (i) said pseudocomplement with respect to Q₁ in the first term or the second term of said second equation and (ii) said pseudocomplement with respect to Q₂ in the first term or the second term of said third equation by considering the conjugateness between (i) a star or plus pseudocomplement of A with respect to Q₁ (P₁) appeared in the third term or the fourth term of said second equation and (ii) a star or plus pseudocomplement of A with respect to Q₂ (Q₃) appeared in the third term or the fourth term of said third equation; and means for transmitting said enciphered message to said receiver; said receiver means includes means for receiving storing said enciphered message received by said receiver; means for performing two receiver-pseudocomplementing operations (i) with respect to P₁ specified in the first term or the second term of said second equation in order to acquire the third term or the fourth term which is the pseudocomplement with respect to Q₁ (P₁) and (ii) with respect to Q₃ specified in the first term or the second term of said third equation in order to acquire the third term or the fourth term which is the pseudocomplement with respect to Q₂ (Q₃); means for transforming a pair consisting of said acquired third term or fourth term of said second equation and said acquired third term or the fourth term of said third equation into a targeted pair of {(A*',A⁺⁺), (A**,A⁺ '), (A*^(P),A⁺), (A*,A⁺ _(P)), (A*',A⁺), (A**,A⁺ _(P)), (A*^(P),A⁺⁺), (A*,A⁺ ')} with respect to said parameter Q₁ (P₁ )=Q₂ (Q₃) by performing necessary Boolean algebra operations of {X_(p) X',X^(P),I}; and means for combining the star pseudocomplement and the plus pseudocomplement of said targeted pair by a logical AND or a logical OR operation which achieves A=A**·A⁺ =A*'+A⁺⁺, A'=A*·A⁺ _(P) =A*^(P) +A⁺, A^(P) =A**·A⁺ _(P) =A*'+A⁺, or A_(P) =A*·A⁺ '=A*^(P) +A⁺⁺ in order to retrieve a diciphered message of {A,A', A^(P), A_(P) } and to convert said deciphered message into said original digital message A by applying a respective operation of {I,X',X_(P),X^(P) }, respectively; said conjugate pseudocomplementing operations include means for transforming a digital message received by said sender and an enciphered message received by said receiver into two conjugate sets of a pair consisting of a star pseudocomplement of {A*,A**,A*^(P),A*'} by applying an operation of {X*,X**,X*^(P),X*'} and a plus pseudocomplement of {A⁺,A⁺⁺,A⁺ _(P),A⁺ '} by applying an operation of {X⁺,X⁺⁺,X⁺ _(P),X⁺ '}, respectively, (i) with respect to said parameter Q₁ or P₁ and (ii) with respect to said parameter Q₂ or Q₃.
 14. The process for communicating securely over an insecure communication medium set forth in claim 13 including:said necessary Boolean algebra operations for performing a transformation operation, which is indicated at the intersection of the table below, from a present pseudocomplement in the leftmost column to a targeted pseudocomplement in the top row,

    ______________________________________                                         Star pseudocomplement                                                                            Plus pseudocomplement                                        to                       to                                                    from  *      **     *.sup.P                                                                             *'   from +    ++   +.sub.P                                                                             +'                           ______________________________________                                         *     I      X.sub.P                                                                               X.sup.P                                                                             X'   +    I    X.sup.P                                                                             X.sub.P                                                                             X'                           **    X.sub.P                                                                               I      X'   X.sup.P                                                                             ++   X.sup.P                                                                             I    X'   X.sub.P                      *.sup.P                                                                              X.sup.P                                                                               X'     I    X.sub.P                                                                             +.sub.P                                                                             X.sub.P                                                                             X'   I    X.sup.P                      *'    X'     X.sup.P                                                                               X.sub.P                                                                             I    +'   X'   X.sub.P                                                                             X.sup.P                                                                             I                            ______________________________________                                    


15. The process for communicating securely over an insecure communication medium set forth in claim 13 including:said parameters P_(i), P_(j) and P_(k) are interchangeable, namely changing placed with each other.
 16. An apparatus for communicating securely over an insecure communication medium of the type which communicates a digital message A from a sender to a receiver by enciphering at said sender said digital message with two compound parameters Q₁ =P_(j) (P_(k)) and Q₂ =P_(i) (P_(j)), which are kept in secret or which are open to general public, constructed from three parameters, P_(i), P_(j) and P_(k), by transmitting said enciphered message from said sender to said receiver, by deciphering at the receiver's end said enciphered message using said parameter P_(i) (=P₁) and a third compound parameter Q₃ =P_(i) (P_(k)), which are kept in secret, constructed from said three parameters where applicable pseudocomplementing operations that define the pseudocomplements of Q₁ =P_(j) (P_(k)), Q₂ =P_(i) (P_(j)) and Q₃ =P_(i) (P_(k)) as well as relationships P₁ (Q₁)=Q₂ (Q₃)=Q₁ (P₁) and P₁ =P_(i) are determined in first equation selected among the equations (6-1) through (6-16) which are

    ______________________________________                                         P.sub.1 (Q.sub.1)                                                                         Q.sub.2 (Q.sub.3)                                                                           Q.sub.1 (P.sub.1)                                      ______________________________________                                         P.sub.i .sup.+ --(P.sub.j .sup.+.sub.P --(P.sub.k)-- )--  =                                                 (6-1)                                             (P.sub.i *.sup.P --(P.sub.j)--)**--(P.sub.i *.sup.P --(P.sub.k)-- )--  =       (P.sub.j .sup.+.sub.P --(P.sub.k)--)*'--(P.sub.i)--                            P.sub.i .sup.+ --(P.sub.j *--(P.sub.k)-- )-- =                                                              (6-2)                                             (P.sub.i *.sup.P --(P.sub.j)--)**--(P.sub.i .sup.+ --(P.sub.k)-- )-- =         (P.sub.j *--(P.sub.k)--)*'--(P.sub.i)--                                        P.sub.i .sup.+ --(P.sub.j .sup.+ '--(P.sub.k)-- )-- =                                                       (6-3)                                             (P.sub.i .sup.+ --(P.sub.j)-- )**--(P.sub.i *.sup.P --(P.sub.k)-- )-- =        (P.sub.j .sup.+ '--(P.sub.k)--)*'--(P.sub.i)--                                 P.sub.i .sup.+ --(P.sub.j **--(P.sub.k)-- )-- =                                                             (6-4)                                             (P.sub.i .sup.+ --(P.sub.j)--)**--(P.sub.i .sup.+ --(P.sub.k)-- )-- =          (P.sub.j **--(P.sub.k)--)*'--(P.sub.i)--                                       P.sub.i .sup.++ --(P.sub.j .sup.+.sub.P --(P.sub.k)-- )-- =                                                 (6-5)                                             (P.sub.i *'--(P.sub.j)--)**--(P.sub.i *'--(P.sub.k)-- )-- =                    (P.sub.j .sup.+.sub.P --(P.sub.k)--).sup.++ --(P.sub.i)--                      P.sub.i .sup.++ --(P.sub.j *--(P.sub.k)--  )-- =                                                            (6-6)                                             (P.sub.i *'--(P.sub.j)--)**--(P.sub.i .sup.++ --(P.sub.k)-- )-- =              (P.sub.j *--(P.sub.k)--).sup.++-- (P.sub.i)--                                  P.sub.i .sup.++ --(P.sub.j .sup.+ '--(P.sub.k)-- )-- =                                                      (6-7)                                             (P.sub.i .sup.++ --(P.sub.j)--)**--(P.sub.i *'--(P.sub.k)-- )-- =              (P.sub.j .sup.+ '--(P.sub.k)--).sup.++ --(P.sub.i)--                           P.sub.i .sup.++ --(P.sub.j **--(P.sub.k)-- )-- =                                                            (6-8)                                             (P.sub.i .sup.++ --(P.sub.j)--)**--(P.sub.i .sup.++ --(P.sub.k)--)-- =         (P.sub.j **--(P.sub.k)--).sup.++ -- (P.sub.i)--                                P.sub.i *--(P.sub.j *.sup.P --(P.sub.k)-- )-- =                                                             (6-9)                                             (P.sub.k.sup.+.sub.P --(P.sub.j)--).sup.++ --(P.sub.i .sup.+.sub.P             --(P.sub.k)-- )-- =                                                            (P.sub.j *.sup.P --(P.sub.k)--).sup.+ '-- (P.sub.i)--                          P.sub.i *--(P.sub.j .sup.+ --(P.sub.k)-- )-- =                                                              (6-10)                                            (P.sub.i .sup.+.sub.P --(P.sub.j)--).sup.++ --(P.sub.i *--(P.sub.k)-- )--      (P.sub.j .sup.+ --(P.sub.k)--).sup.+ '--(P.sub.i)--                            P.sub.i *--(P.sub.j *'--(P.sub.k)-- )-- =                                                                   (6-11)                                            (P.sub.i *--(P.sub.j)--).sup.++ --(P.sub.i .sup.+.sub.P --(P.sub.k)-- )--      =                                                                              (P.sub.j *'--(P.sub.k)--).sup.+ '--(P.sub.i)--                                 P.sub.i *--(P.sub.j .sup.++ --(P.sub.k)-- )-- =                                                             (6-12)                                            (P.sub.i *--(P.sub.j)--).sup.++ --(P.sub.i *--(P.sub.k)-- )-- =                (P.sub.j .sup.++ --(P.sub.k)--).sup.+ '--(P.sub.i)--                           P.sub.i **--(P.sub.j *.sup.P --(P.sub.k)-- =                                                                (6-13)                                            (P.sub.i .sup.+ '--(P.sub.j)--).sup.++ --(P.sub.i .sup.+ '--(P.sub.k)--        )-- =                                                                          (P.sub.j *.sup.P --(P.sub.k)--)**--(P.sub.i)--                                 P.sub.i **--(P.sub.j .sup.+ --(P.sub.k)-- )-- =                                                             (6-14)                                             (P.sub.i .sup.+ '--(P.sub.j)--).sup.++ --(P.sub.i **--(P.sub.k)-- )-- =       (P.sub.j .sup.+ --(P.sub.k)--)**--(P.sub.i)--                                  P.sub.i **--(P.sub.j *'--(P.sub.k)-- )-- =                                                                  (6-15)                                            (P.sub.i **--(P.sub.j)--).sup.++ --(P.sub.i .sup.+ '--(P.sub.k)-- )-- =        (P.sub.j *'--(P.sub.k)--)**--(P.sub.i)--                                       P.sub.i **--(P.sub.j .sup.++ --(P.sub.k)-- )-- =                                                            (6-16)                                            (P.sub.i **--(P.sub.j)--).sup.++ --(P.sub.i **--(P.sub.k)-- )-- =              (P.sub.j .sup.++ --(P.sub.k)--)**--(P.sub.i)--                                 ______________________________________                                    

comprising: s-plaintext register means for receiving and storing a digital message A, first generator means for receiving and storing (i) said compound parameter Q₁ and (ii) (u₁ u₀)₁, (v₁ v₀)₁ and w₀₁ of control bits q₁, for receiving the content of said s-plaintext register means, for enciphering said received digital message into a pair of conjugate pseudocomplements by performing conjugate pseudocomplementing operations with respect to said parameter Q₁, and for outputting said pair of the conjugate pseudocomplements from its terminals M₀ and M₁, second generator means for receiving and storing (i) said compound parameter Q₂ and (ii) (u₁ u₀)₂, (v₁ v₀)₂ and w₀₂ of control bits q₂, for receiving the content of said s-plaintext register means, for enciphering said received digital message into a pair of conjugate pseudocomplements by performing conjugate pseudocomplementing operations with respect to said parameter Q₂, and for outputting said pair of the conjugate pseudocomplements from its terminals M₀ and M₁, s-selector means for receiving (i) two pairs of conjugate pseudocomplements and (ii) switching bits w₃ and w₂, and control bit w₁, for selectively passing said received two pairs of conjugate pseudocomplements using said switching and control bits, and for outputting a selected pair of the pseudocomplements consisting of one pseudocomplement with respect to Q₁ and the other pseudocomplement with respect to Q₂, s-ciphertext register means for receiving and transmitting an enciphered message, first means, connect said s-plaintext register means to said first generator means and to said second generator means, second means, connect said terminals M₀ and M₁ of each said generator means to said s-selector means, and for passing said selected pair of the pseudocomplements to said s-ciphertext register means through said s-selector means selected by said bits w₃, w₂ and w₁, r-ciphertext register means for receiving and storing an enciphered message, r-selector means for receiving (i) said switching bits w₃ and w₂, and control bit w₁, and (ii) an enciphered message, for selectively passing the conjugate pseudocomplements of said enciphered message received using said switching and control bits w₃, w₂ and w₁, and for outputting each of the conjugate pseudocomplements, temporary register means for receiving and storing a pair of conjugate pseudocomplements with respect to Q₂ (Q₃) obtained from said enciphered message, third generator means for receiving and storing said parameter P_(i) (=P₁) and (u₁ u₀)_(a), (v₁ v₀)_(a) and (w₀)_(a) of control bits q_(a), for receiving and enciphering the pseudocomplement with respect to Q₁ of said enciphered message by taking pseudocomplementing operations with respect to P_(i) (=P₁), which is specified by said bits (u₁ u₀)_(a), (v₁ v₀)_(a), and for outputting a produced pair of conjugate pseudocomplements with respect to Q₁ (P₁)=Q₂ (Q₃), fourth generator means for receiving and storing said compound parameter Q₃ and (u₁ u₀)₃, (v₁ v₀)₃ and (w₀)₃ of control bits q₃, for receiving and enciphering the pseudocomplement with respect to Q₂ of said enciphered message by taking pseudocomplementing operations with respect to Q₃, which is specified by said (u₁ u₀)₃ and (v₁ v₀)₃, and for outputting a produced pair of conjugate pseudocomplements with respect to Q₂ (Q₃)=Q₁ (P₁), r-plaintext register means for receiving and storing a deciphered message as the original plaintext, switcher means for connecting two input terminals (a,b) to two output terminals (c,d) by alternatively switching said connection (a,b) to (c,d) and (a,b) to (d,c) respectively using control bit w_(i) where i denotes the suffix of said bits w₀, w₁, w₂ and w₃, desegregator means for receiving and storing said compound parameter Q₂ (Q₃)=Q₁ (P₁) and control bits (u₁ u₀)_(b), (v₁ v₀)_(b) and (w₀)_(b) of q_(b), for receiving and transforming said pair of conjugate pseudocomplements with respect to Q₂ (Q₃), which is the content of said temporary register means, to a targeted pair of the conjugate pseudocomplements (A*',A⁺⁺) by performing the applicable complementing operations of {X',X^(P),X_(P),I} specified by (u₁ u₀)_(b) and of {X^(p),I,X',X_(P) } specified by (v₁ v₀)_(b), and for executing a logical OR operation on said targeted pair, which has been transformed, in order to retrieve said digital message, third means, connect said r-ciphertext register means to said third generator means through the first two switches of said r-selector means controlled by said bits w₃ and w₂ where said generator means generates said pair of conjugate pseudocomplements with respect to P₁, fourth means, connect said third generator means to said desegregator means through (i) the third switch of said r-selector means controlled by said bit w₁ and (ii) said temporary register means where said desegregator means produces said targeted pair of conjugate pseudocomplements using said parameter Q₂ (Q₃)=Q₁ (P₁) and said q_(b), fifth means, connect said fourth generator means to said desegregator means through (i) the third switch of said r-selector means controlled by said bit w₁ and (ii) said temporary register means where said desegregator means produced said targeted pair of conjugate pseudocomplements using said parameter Q₂ (Q₃)=Q₁ (P₁) and said q₃, sixth means for transferring the deciphered message produced by executing said logical OR operation into said ciphertext register means, seventh means for obtaining (i) first pseudocomplement by performing said conjugate pseudocomplementing operations with respect to said compound parameter Q₁ in said first generator means and (ii) third pseudocomplement by performing said conjugate pseudocomplementing operations with respect to said parameter P₁ in said third generator means where said first pseudocomplement and said third pseudocomplement are defined in the first term or the second term of said second equation chosen from the equations (3-1) through (3-16), in order to acquire first objective term which is the third term or the fourth term of said chosen second equation, eighth means for obtaining (i) second pseudocomplement by performing said conjugate pseudocomplementing operations with respect to said compound parameter Q₂ in said second generator means and (ii) fourth pseudocomplement by performing said conjugate pseudocomplementing operations with respect to said compound parameter Q₃ in said fourth generator means where said second pseudocomplement and said fourth pseudocomplement are defined in the first term or the second term of said third equation chosen from the equations (3-1) through (3-16), in order to acquire second objective term which is the third term or the fourth term of said chosen third equation, ninth means for obtaining said conjugate pair of pseudocomplements with respect to said compound parameter Q₂ (Q₃)=Q₁ (P₁) from said first objective term and said second objective term, where said equations (3-1) through (3-16) are (A(Q₁))(P₁) or (A(Q₂))(Q₃) A(Q₁ (P₁)) or A(Q₂ (Q₃)) ##EQU9##
 17. The apparatus for communicating securely over an insecure communication medium set forth in claim 16 including:alternative logical operations applicable to said complementations specified by u₁ u₀ and v₁ v₀ in said desegregator means can result in the same logical values due to Boolean algebra operations, these operations are

    ______________________________________                                                           complementa-                                                                              complementa-                                                        tion specified                                                                            tion specified                                    logical operation by u.sub.1 u.sub.0                                                                        by v.sub.1 v.sub.0                                ______________________________________                                         A = I · (A*'+ A.sup.++)                                                                 {X',X.sup.P,X.sub.P,I}                                                                    {X.sup.P,I,X',X.sub.P }                           A = I · (A** · A.sup.+ ')                                                      {X.sub.P,I,X',X.sup.P }                                                                   {X',X.sub.P,X.sup.P,I}                            A = (A')' = (A*.sup.P + A.sup.+)'                                                                {X.sup.P,X',I,X.sub.P }                                                                   {I,X.sup.P,X.sub.P,X'}                            A = (A')' = (A* · A.sup.+.sub.P)'                                                       {I,X.sub.P,X.sup.P,X'}                                                                    {X.sub.P,X',I,X.sup.P }                           A = (A.sup.P).sup.P = (A*' + A.sup.+).sup.P                                                      {X',X.sup.P,X.sub.P,I}                                                                    {I,X.sup.P,X.sub.P,X'}                            A = (A.sup.P).sup.P =  (A** · A.sup.+.sub.P).sup.P                                      {X.sub.P,I,X',X.sup.P }                                                                   {X.sub.P,X',I,X.sup.P }                           A = (A.sub.P).sub.P = (A*.sup.P +A.sup.++).sub.P                                                 {X.sup.P,X',I,X.sub.P }                                                                   {X.sup.P,I,X',X.sub.P }                           or A = (A.sub.P).sub.P = (A* · A.sup.+ ').sub.P                                         {I,X.sub.P,X.sup.P,X'}                                                                    {X',X.sub.P,X.sup.P,I}.                           ______________________________________                                    


18. The apparatus for communicating securely over an insecure communication medium set forth in claim 16 including:said parameters P_(i), P_(j) and P_(k) are interchangeable, namely changing placed with each other. 