A dynamic computer communication security
encryption method or
system using an
initial seed key and multiple random number generators of a specific design, whereby a sequence of independent random entropy values is produced by one set of random number generators and encrypted along with the message
stream using the
initial seed key, or the output of a second set of random number generators initialized with the
initial seed key, and following the subsequent transmission of the variable encrypted entropy / message block, the entropy values are used to symmetrically or identically augment or increase the current uncertainty or entropy of the
cryptosystem at both the sender and the
receiver, prior to the next
encryption block operation. The
encryption process effectively entailing the use of
multiple encryption ciphers, and the entropy augmentation process entailing the encryption or application of various logical mathematical operations on the already dynamic but deterministic internal state values of the second set of random number generators, effectively altering their deterministic outputs in a random probabilistic manner.Random length message value sequences from one or more data sources is combined with one or more random length entropy value sequences from an independent source, following which the entropy “updates” may also be used to alter, or change any
cryptosystem variable, value or component in a randomly determined manner. In addition, whilst ensuring synchronization, the random entropy sequences also serve to “pollute” the
cipher-
stream and thereby hinder most current forms of
cryptanalysis, whilst simultaneously injecting additional entropy into the cryptographic
system and allowing for its propagation to affect any connected
system nodes, and thereby introducing unpredictable entropy into the system
pseudorandom number generator outputs, and thereby ensuring the perpetual generation of unpredictable random numbers.Super-encryption
mechanics are independent of the user data, simple, fast and efficient, and can incorporate compression, error correction and asymmetric encryption
authentication routines. But most importantly, super-encryption ensures resistance to
brute force attacks (not possible to verify if a message was even sent), an ability to exceed “perfect secrecy” requirements, and an improvement on previous super-encipherment design, since overhead can be dramatically reduced from 100% overhead.Communication links previously established by system nodes with central authorities may be used for secure
node authentication and registration, whilst allowing the
central authority to broker and synchronize communication channels and providing
mutual authentication and other security functions between the system nodes.