摘要 |
The present method for modification-encryption of authentic data and under a selected processing series (7) to create an encrypted form of authentic data (8), so that the only possible attack de-crypting method is the `trial and error`, uses: 1) a key processor (1), 2) a number of banks containing encryptors (4A, 4B, 4C, 4D` 4n) and 3) a scrambler of processing series (5). The encryption key may have any length from 64 byte for 2A64 trials up to (n) bytes for 2An trials. The encryption key may be created randomly (i. e. automatically) or may be provided by the user. If the length of the encryption key provided by the user is small in byte, a special procedure is activated (in the key processor) which adds further bytes, which are direct and unique products of the specific key provided by the user. |