Block encryption method and schemes for data confidentiality...

Cryptography – Particular algorithmic function encoding

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S037000, C380S043000, C380S044000, C380S046000, C713S170000

Reexamination Certificate

active

06973187

ABSTRACT:
A block encryption method and schemes (modes of operation) that provide both data confidentiality and integrity with a single cryptographic primitive and a single processing pass over the input plaintext string by using a non-cryptographic Manipulation Detection Code function for secure data communication over insecure channels and for secure data storage on insecure media. The present invention allows, in a further aspect, software and hardware implementations, and use in high-performance and low-power applications, and low-power, low-cost hardware devices. The block encryption method and schemes of this invention allow, in yet a further aspect, encryption and decryption in parallel or pipelined manners in addition to sequential operation. In a yet further aspect, the block encryption method and schemes of this invention are suitable for real-time applications.

REFERENCES:
patent: 6226742 (2001-05-01), Jakubowski et al.
patent: 6333983 (2001-12-01), Enichen et al.
A.J. Menezes et al, “Hash Functions and Data Integrity”, Handbook of Applied Crytography, Chp 7, pp 223-282; Chp 9, pp 321-383, 1997; CRC Press, Boca Raton.
Gligor et al, “Object Migration and Authentication”, IEEE Transactions on Software Engineering SE-5, vol. 5, pp. 607-611, 1979, IEEE.
NBS FIPS pub 46, titled “Data Encryption Standard”, National Bureau of Standards, U.S. Dept of Commerce Jan. 1977, pp. 1-18.
NBS FIPS Pub 81, Titled “DES Modes of Operation”, National Bureau of Standards, U.S. Dept of Commerce pp. 1-17, Dec. 1980.
Meyer et al, Cryptography; A New Dimension in Computer Data Security, A Guide For The Design and Implementation of Secure Systems, pp. 69-71, 1982, John Wiley & Sons, 2ndprinting.
Bellare et al. “A Concrete Security Treatment of Symmetric Encryption”, Proceedings of the 38thSymposium on Foundations of Computer Science, IEEE, 1997, pp. 394-403.
C.M. Campbell, “Design and Specification of Cryptographic Capabilities”, in Computer Science And The Data Encryption Standard, (D.K. Brandstad (ed.) National Bureau of Standards Special Publications 500-527 U. S. Dept of Commerce, Feb. 1978, pp. 54-66.
Naor et al, “From Unpredictability to Indistinguishability: A Simple Construction of Pseudo-Random Functions From MACs”, in Advances in Cryptolog—CRYPTO '98 (LNCS 1462), pp. 267-282, 1998, Springer-Verlag.
Goldwasser et al, “Lecture Notes on Cryptography”, 1999, Available at http://www.cse.ucsd.edu/users/mihir/papers/gb.pdf.
Kohl et al, RFC 1510, The Kerberos Network Authentication Service (V5) , Internet Request For Comments 1510.
Petrank et al, CBC MAC for Real-Time Data Sources:, Manuscript Available at http://www.cs.technion.ac.il/˜erez/publications.html, 1999.
Jueneman et al, “Message Authentication with Manipulation Detection Codes”, Proc. Of the IEEE Symp on Security and Privacy, Oakland, CA, pp. 33-54, 1983, IEEE Computer Society.
Stubblebine et al, “On Message Integrity in Cryptographic Protocols”, Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 85-104, 1992, IEEE Computer Society Press.
Kohl et al, “The use of Encryption in Kerberos for Network Authentication”, Advances in Cryptology-CRYPTO 1989, (LNCS 435), pp. 35-43, 1990, Digital Equip. Corp.
D. E. Knuth, “The Art of Computer Programming—Vol. 2: Seminumerical Algorithms”, 1981, (2nded.) Chapter 3, pp. 1-110, Addison Wesley.
Gligor Virgil D. and Donescu Pompiliu. “Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes.” VDG Inc. Oct. 27, 2000. pp. 1-30, <http://citeseer.nj.nec.com/cs>.
Rogaway, Phillip. “Comments to NIST Concerning AES Modes of Operation: PMAC: A Parallelizable Message Authentication Code.” Univ. of CA at Davis and Chiang Mai Univ. Thailand. Oct. 16, 2000. pp. 1-6. http://citeseer.nj.nec.com/cs.
Proceedings IEEE Symposium on Security and Privacy. Jueneman, R.R., Matyas, S.M., and Meyer, C.H. “Message Authentication with Manipulation Detection Codes.” pp. 33-54. Apr. 25, 1983.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Block encryption method and schemes for data confidentiality... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Block encryption method and schemes for data confidentiality..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Block encryption method and schemes for data confidentiality... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3472107

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.