G09C   1/00  \	0	0	5J104	G09C   1/00	1380	餫줿ˤäơޤ淲줫ޤϤ¾֤뤳ȤˤäơͿ줿ν㡥Ǥ븶ʸǤʤν˸򴹤֤ޤˡʰŹ沽ץ饤ǣã	Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system (cryptographic typewriters G09C 3/00)
G09C   1/00 310 \	1	1	5J104	G09C   1/00	83	ץΰŹ沽	Encrypting programs
G09C   1/00 610 \	1	1	5J104	G09C   1/00	12	̸Ź	Common key encryptosystems
G09C   1/00 610 A	1	0	5J104	G09C   1/00	928	֥åŹ	Block encryption
G09C   1/00 610 B	1	1	5J104	G09C   1/00	256	ģţ	DES (Data Encryption Standard)
G09C   1/00 610 C	1	1	5J104	G09C   1/00	63	ƣţ	FEAL (Fast data Encipherment Algorithm)
G09C   1/00 610 D	1	0	5J104	G09C   1/00	168	ȥ꡼Ź	Stream encryption
G09C   1/00 610 Z	1	0	5J104	G09C   1/00	350	¾	Others
G09C   1/00 620 \	1	1	5J104	G09C   1/00	5	Ź	Public key encryptosystem
G09C   1/00 620 A	1	0	5J104	G09C   1/00	507	٤;Źʣңţ̣ǣ졢տŹ	Exponentiation ciphers (Rabin, ELGamel, reciprocal ciphers and the equivalent)
G09C   1/00 620 B	1	1	5J104	G09C   1/00	155	ңӣ	RSA
G09C   1/00 620 Z	1	0	5J104	G09C   1/00	784	¾ʥʥåץåŹ	Others (knapsack encryption and the equivalent)
G09C   1/00 630 \	1	1	5J104	G09C   1/00	0	δ	Key management
G09C   1/00 630 A	1	0	5J104	G09C   1/00	114	ƿŹ沽	Secrecy and encrypting of keys
G09C   1/00 630 B	1	0	5J104	G09C   1/00	127	̿ϩ𤷤	key generation via distribution and telecommunication paths
G09C   1/00 630 C	1	1	5J104	G09C   1/00	82	ʬʥ󥿤פʤΡ	Distributed types (no need for centre)
G09C   1/00 630 D	1	1	5J104	G09C   1/00	93	ʬʣɣ󥿤Ͽ줿˴ŤƸΡ	Distributed administration type (keys being generated and delivered based on the initial information registered at the centre such as ID or the equivalent)
G09C   1/00 630 E	1	0	5J104	G09C   1/00	165	̸˴ؤΡʬ	Regarding common keys (sub-classifications)
G09C   1/00 630 F	1	0	5J104	G09C   1/00	62	˴ؤΡʬ	Regarding public keys (sub-classifications)
G09C   1/00 630 Z	1	0	5J104	G09C   1/00	127	¾	Others
G09C   1/00 640 \	1	1	5J104	G09C   1/00	2	ǧڡ̾	Authentication and signatures
G09C   1/00 640 A	1	0	5J104	G09C   1/00	256	оηϤˤΡǧ¦ǧ¦ƱξĤΡ	By symmetrical systems (both authenticating party and authenticated party having the same information)
G09C   1/00 640 B	1	0	5J104	G09C   1/00	792	оηϤˤΡǧ¦ǧ¦̩ξĤΡ	By asymmetrical systems (only authenticating party having confidential information of authenticated party)
G09C   1/00 640 C	1	1	5J104	G09C   1/00	98	μˤ	By zero knowledge verifications
G09C   1/00 640 D	1	0	5J104	G09C   1/00	2223	åǧڡʬ	Message authentication (sub-classification)
G09C   1/00 640 E	1	0	5J104	G09C   1/00	2786	ƥƥǧڡʬ	Entity authentication (sub-verification)
G09C   1/00 640 Z	1	0	5J104	G09C   1/00	491	¾	Others
G09C   1/00 650 \	1	1	5J104	G09C   1/00	13	黻ι	Constructions of calculating instruments
G09C   1/00 650 A	1	0	5J104	G09C   1/00	670	軻;٤;	Multiplication residues, power residues
G09C   1/00 650 B	1	0	5J104	G09C   1/00	766	ȯ	Generating random numbers
G09C   1/00 650 Z	1	0	5J104	G09C   1/00	1781	¾ʥϥåؿǿȽ	Others (hash functions, discriminating prime numbers and the like)
G09C   1/00 660 \	1	1	5J104	G09C   1/00	2	ӡʸ§Ȥʬ	Particular usage (sub-classification as a general rule)
G09C   1/00 660 A	1	0	5J104	G09C   1/00	561	ɣå	IC cards
G09C   1/00 660 B	1	0	5J104	G09C   1/00	304	Х󥭥	Banking
G09C   1/00 660 C	1	1	5J104	G09C   1/00	212	ŻҸ	Electronics money
G09C   1/00 660 D	1	0	5J104	G09C   1/00	2568	ե롦ץ	File programs
G09C   1/00 660 E	1	0	5J104	G09C   1/00	929	饤󡦥ͥåȥ	Online networks
G09C   1/00 660 F	1	0	5J104	G09C   1/00	89	̸ŹѤ	Using common key encryption
G09C   1/00 660 G	1	0	5J104	G09C   1/00	215	ŹѤ	Using public key encryption
G09C   1/00 660 Z	1	0	5J104	G09C   1/00	139	¾	Others
G09C   1/02  \	1	1	5J104	G09C   1/02	85	ɽΰŹ沽Ѥ뤳Ȥˤ	by using a ciphering code in chart form
G09C   1/04  \	1	1	5J104	G09C   1/04	63	Ŭˡб븶ʸޤϰŹ沽줿ʸ򼨤ˡޤϥˤ꤭줿֤ظߤŪ˰ưΤޤɽĤ	with sign carriers or indicators moved relative to one another to positions determined by a permutation code or key, so as to indicate the appropriate corresponding clear or ciphered text
G09C   1/06  \	1	1	5J104	G09C   1/06	25	ƤʸʸƤ˳ǤŹ沽줿ʸƤ˳Ǥ˵ǽŪ˷礵Ƥꡤ֤δּưŪˤϢ³Ūˡ沽ޤϥˤäѴˤ	wherein elements corresponding to the signs making up the clear text are operatively connected with elements corresponding to the signs making up the ciphered text, the connections, during operation of the apparatus, being automatically and continuously permuted by a coding or key member
G09C   1/08  \	2	2	5J104	G09C   1/08	1	Ūʷˤ	the connections being mechanical
G09C   1/10  \	2	2	5J104	G09C   1/10	48	ŵŪʷˤ	the connections being electrical
G09C   1/12  \	3	3	5J104	G09C   1/12	0	ͭѴפʤ	comprising contact-bearing permutation discs
G09C   1/14  \	2	2	5J104	G09C   1/14	0	ưΤޤִǤ沽ࡤ㡥ޥơסɡȼʤ	involving removable or interchangeable coding numbers, e.g. master tapes, punched cards
G09C   3/00  \	0	0	5J104	G09C   3/00	51	Ź沽ʸŹ沽ޤϲɤ뤿Υץ饤	Typewriters for ciphering or deciphering cryptographic text
G09C   3/02  \	1	1	5J104	G09C   3/02	1	Υޤϥܡɤ˺ѤΥޤϥܡɤĤ	with auxiliary keys or keyboards acting on the original keys or keyboards
G09C   3/04  \	1	1	5J104	G09C   3/04	1	ȥץСδ֤η礬沽ޤϥˤäư˼ưŪˤϢ³Ū˴	wherein the operative connections between the keys and the type-bars are automatically and continuously permuted, during operation, by a coding or key member
G09C   3/06  \	2	2	5J104	G09C   3/06	0	Ūʷˤ	the connections being mechanical
G09C   3/08  \	2	2	5J104	G09C   3/08	4	ŵŪʷˤ	the connections being electrical
G09C   3/10  \	2	2	5J104	G09C   3/10	1	ưΤޤִǤ沽ȼʤΡ㡥ޥơס	involving removable or interchangeable coding members, e.g. master tapes, punched cards
G09C   5/00  \	0	0	5J104	G09C   5/00	1803	嵭Υ롼פ˴ޤޤʤŹ沽ޤϰŹɤ֤ޤˡ㡥ްơϿޤϰ줿Τ褦ʿɽˤαƿޤѷȼʤ	Ciphering or deciphering apparatus or methods not provided for in other groups of this subclass, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
