An operating encryption algorithm is converted to another encryption algorithm. When different encryption algorithms are operated by a personal computer 100 for use by a group A and a personal computer 200 for use by group B, an encryption algorithm, operated by the personal computer 100 is encrypted by the personal computer 100 with the encryption algorithm operated by the personal computer 200 and transmitted to the personal computer 200.

 
Web www.patentalert.com

< Synchronization of session keys

< Method and apparatus for the compression and decompression of image files using a chaotic system

> Modifying material

> Secure access method and system

~ 00286