Cryptography – Communication system using cryptography – Time segment interchange
Reexamination Certificate
2006-05-30
2006-05-30
Moise, Emmanuel L. (Department: 2137)
Cryptography
Communication system using cryptography
Time segment interchange
C380S028000, C380S044000, C713S170000
Reexamination Certificate
active
07054445
ABSTRACT:
An authentication method and schemes using a block cipher to protect data integrity (authenticity) during communication over insecure channels and during data storage on insecure media. The authentication method and schemes of this invention allow, in a further aspect, message and data signing and verification in parallel or pipelined manners, in addition to sequential operation, without requiring twice as many block enciphering operations as the number of input plaintext blocks. The present invention allows, in a yet further aspect, software and hardware implementations used in high-performance systems and networks where multiple processing units are available for block enciphering operations. In a yet further aspect, the authentication method and schemes of this invention allow incremental updates and out-of-order processing of authentication tags. In a yet further aspect, the authentication method and schemes of this invention are suitable for real-time applications where message length remains unknown until the entire message is received, and commencing message authentication cannot be deferred until the end of the message.
REFERENCES:
patent: 4423287 (1983-12-01), Zeidler
patent: 5757913 (1998-05-01), Bellare et al.
patent: 6434699 (2002-08-01), Jones et al.
patent: 6591364 (2003-07-01), Patel
patent: 6769063 (2004-07-01), Kanda et al.
Bernstein, Daniel, “How to stretch random funcitons: the security of protected counter sums”, 1999, Journal of Cryptology, vol. 12, No. 3, pp. 185-192.
Jueneman et al, “Message authenticaiton with manipulation detection codes”, Proc. of the IEEE Symp. on Security and Privacy, Oakland, CA pp. 33-54, 1983, IEEE Computer Society.
Virgil D. Gligor et al., “Object Migration and Authentication.”, IEEE Transactions on software Engineering, vol. SE-5, No. 6, Nov. 1979, pp. 607-611.
Alfred J. Menezes et al., “Handbook of Applied Cryptography”, pp. 321-367, (1965).
J. Black et al., “UMAC: Fast and Secure Message Authentication.”, Advances in Cryptology-CRYPTO '99, pp. 216-233.
Mihir Bellare et al., “Keying Hash Functions For Message Authentication”, Springer-Verlag Berlin Heidelberg, pp. 216-233, (1996).
Mihir Bellare et al., “The Security of Cipher Block Chaining.”, Advances in Cryptology-CRYPTO '94, pp. 341-358.
Federal Information Processing Standards Publication 46-1, Data Encryption Standard (DES), pp. 1-16, (1988).
Federal Information Processing Standards Publication 46-2, Data Encryption Standard (DES), pp. 1-18, (1993).
Erez Petrank et al., “CBC MAC For Real-Time Data Sources”, Federal Information Processing Standards Publication 46-2, Data Encryption, pp. 1-23, (1993).
American National Standard ANSI X9.9 (1986) pp. 6-8.
Mihir Bellare et al., “XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions”, pp. 1-20, (1995) Preliminary version appearing in Advances in Cryptology-CRYPTO '95, Lecture Notes in Computer Science vol. 963.
Mihir Bellare et al., “Incremental Cryptography and Application to Virus Protection.”, pp. 1-15, (1995), Abstract appearing in Proceedings of the 27thACM Symposium on the Theory of Computing, May (1995).
Moni Naor et al., “From Unpredictability to Indistinguishability: A Simple Construction of Pseudo-Random Functions from MACs.”, Advances In Cryptology-CRYPTO '98, Springer-Verlag Berlin Heidelberg, pp. 265-282, (1998).
Mihir Bellare et al., “A Concrete Security Treatment of Symmetric Encryption”, Proceedings of the 38thSympposium on Foundations of Computer Science, IEEE,(1997) pp. 394-403.
Donald E. Knuth., “The Art of Computer Programming-vol. 2: Seminumerical Algorighms.”, Addison-Wesley, (1981) (Second Edition), Chapter 3.
Gligor et al., “Object Migration And Authentication”,IEEE Transactions On Software Engineering, vol. SE-5(6):607-611, (1979).
Menezes et al., “Handbook of Applied Cryptography”, pp. 321-367, (1965).
Gilbert et al., “A Chosen Plaintext Attack Of The 16-Round Khufu Cryptosystem”, pp. 340-358, (1988).
Desmedt, “Advances In cryptology—CRYPTO '94”, 14thAnnual International Cryptology Conference, pp. 1-19, (1994).
Bellare et al., “Keying Hash Functions For Message Authentication”, Springer-Verlang Berlin Heidelberg, pp. 216-233, (1996).
Wiener, “Advances In Cryptoloty—CRYPTO '99”, 19thAnnual International Cryptology Conference, pp. 368-383, (1999).
Federal Information Processing Standards Publication 46-2, Data Encryptioin Standard (DES), pp. 1-5, (1993).
Petrank et al., “CBC MAC For Real-Time Data Sources”, Federal Information Processing Standards Publication 46-2, Data Encryptioin, pp. 1-18 and 1-23, (1993).
Bellare et al., “XOR MACs: new Methods for Message Authentication Using Finite Pseudorandom Functions”, pp. 1-20 and 1-15, (1995).
Krawczyk, “Advances In Cryptology CRYPTO '98”, Springer-Verlag Berlin Heidelberg, pp. 265-282, (1998).
Bellare et al., “A Concrete Security Treatment of Symmetric Encryption”, pp. 394-404, (1996).
Donescu Pompiliu
Gligor Virgil Dorin
Moise Emmanuel L.
Nguyen Minh Dieu
VDG, Inc.
LandOfFree
Authentication method and schemes for data integrity protection does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Authentication method and schemes for data integrity protection, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Authentication method and schemes for data integrity protection will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3605782