Cryptography – Particular algorithmic function encoding
Reexamination Certificate
2003-07-18
2008-03-04
Moazzami, Nasser (Department: 2136)
Cryptography
Particular algorithmic function encoding
C380S243000, C380S255000, C380S277000
Reexamination Certificate
active
07340053
ABSTRACT:
This invention intends to reduce the amount of calculation required by a cipher strength estimating device for estimating a ciphertext in collectively finding session keys for plural rounds of transformation. The cipher strength estimating device is configured to: first calculate one session key prospect presumed to be equivalent to a session key for use at a certain round of transformation in encryption which is calculated from a key; perform a decrypting operation with the session key prospect presumed to be true; calculating a session key prospect for the round immediately preceding the certain round based on the resulting text thereby calculating session keys for different rounds. This device enhances the possibility that plural true session keys are calculated faster.
REFERENCES:
patent: 2005/0180315 (2005-08-01), Chitrapu et al.
patent: 932272 (1999-07-01), None
Babbage & Frisch, “On MISTY1 Higher Order Differential Cryptanalysis,” 3rd International Conference on Information Security and Cryptology ICISC 2000, Seoul, Korea, Dec. 8-9, 2000 (pp. 22-36).
Daemen, Knudsen & Rijmen “The Block Cipher SQUARE”, 4th International Workshop FSE '97 on Fast Software Encryption, Haifa, Israel, Jan. 20-22, 1997 (Eli Biham ed.) (pp. 149-165).
Jakobsen & Knudsen “The Interpolation Attack on Block Cipher,” FSE-4th International Workshop LNCS 1008.
Nyberg, Knudsen, “Provable Security Against Differential Cryptanalysis,” Journal of Cryptology, vol. 8-No. 1.
Shimoyama, Moriai, Kaneko, “Improving the Higher Order Differential Attack and Cryptanalysis of the KN Cipher,” 1997 1st International Workshop on Information Security Workshop LNCS 1396, Tatsunokuchi, Ishikawa, Japan, Sep. 1997 (pp. 32-42).
Tanaka, Hisamatsu, Kaneko, “Strength of MISTY1 without FL Function for Higher Order Differential Attack,” 13th International (Symposium, Applied Algebra-Algebraic Algorithms and Error-Correcting Codes) 1999, LNCS 1636 (pp. 221-231).
L. Knudsen, “Truncated and Higher Order Differentials,”Fast Software Encryption: 2ndInternational Workshop, Leuven, Belgium (Dec. 14-16, 1994), LNCS 1008, pp. 196-211, Springer-Verlag.
X. Lai, “Higher Order Derivatives and Differentia Cryptanalysis,” R3Security Engineering AG Ch-8607 Aathal, Switzerland, pp. 1-7; Reprint of pp. 227-233, “Communications and Cryptography,” (Ed. R Blahut et al.), Kluwer Academic Publishers (1994).
M. Matsui, “New Structure of Block Ciphers with Provable Security against Differential and Linear Cryptanalysis,Fast Software Encryption: 3rdInternational Workshop, Cambridge, UK (Feb. 21-23, 1996), LNCS. 1039, pp. 205-218.
S. Moriai, T. Shimoyama, T. Kaneko, “Higher Order Differential Attack of a CAST Cipher,Fast Software Encryption: 4thInternational Workshop, LNCS 1372, pp. 17-31.
Kaneko Toshinobu
Tanaka Hidema
Moazzami Nasser
National Institute of Information and Communications Technology
Okoronkwo Chinwendu C
LandOfFree
Cipher strength estimating device does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Cipher strength estimating device, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cipher strength estimating device will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3972350