Cipher strength estimating device

Cryptography – Particular algorithmic function encoding

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S243000, C380S255000, C380S277000

Reexamination Certificate

active

07340053

ABSTRACT:
This invention intends to reduce the amount of calculation required by a cipher strength estimating device for estimating a ciphertext in collectively finding session keys for plural rounds of transformation. The cipher strength estimating device is configured to: first calculate one session key prospect presumed to be equivalent to a session key for use at a certain round of transformation in encryption which is calculated from a key; perform a decrypting operation with the session key prospect presumed to be true; calculating a session key prospect for the round immediately preceding the certain round based on the resulting text thereby calculating session keys for different rounds. This device enhances the possibility that plural true session keys are calculated faster.

REFERENCES:
patent: 2005/0180315 (2005-08-01), Chitrapu et al.
patent: 932272 (1999-07-01), None
Babbage & Frisch, “On MISTY1 Higher Order Differential Cryptanalysis,” 3rd International Conference on Information Security and Cryptology ICISC 2000, Seoul, Korea, Dec. 8-9, 2000 (pp. 22-36).
Daemen, Knudsen & Rijmen “The Block Cipher SQUARE”, 4th International Workshop FSE '97 on Fast Software Encryption, Haifa, Israel, Jan. 20-22, 1997 (Eli Biham ed.) (pp. 149-165).
Jakobsen & Knudsen “The Interpolation Attack on Block Cipher,” FSE-4th International Workshop LNCS 1008.
Nyberg, Knudsen, “Provable Security Against Differential Cryptanalysis,” Journal of Cryptology, vol. 8-No. 1.
Shimoyama, Moriai, Kaneko, “Improving the Higher Order Differential Attack and Cryptanalysis of the KN Cipher,” 1997 1st International Workshop on Information Security Workshop LNCS 1396, Tatsunokuchi, Ishikawa, Japan, Sep. 1997 (pp. 32-42).
Tanaka, Hisamatsu, Kaneko, “Strength of MISTY1 without FL Function for Higher Order Differential Attack,” 13th International (Symposium, Applied Algebra-Algebraic Algorithms and Error-Correcting Codes) 1999, LNCS 1636 (pp. 221-231).
L. Knudsen, “Truncated and Higher Order Differentials,”Fast Software Encryption: 2ndInternational Workshop, Leuven, Belgium (Dec. 14-16, 1994), LNCS 1008, pp. 196-211, Springer-Verlag.
X. Lai, “Higher Order Derivatives and Differentia Cryptanalysis,” R3Security Engineering AG Ch-8607 Aathal, Switzerland, pp. 1-7; Reprint of pp. 227-233, “Communications and Cryptography,” (Ed. R Blahut et al.), Kluwer Academic Publishers (1994).
M. Matsui, “New Structure of Block Ciphers with Provable Security against Differential and Linear Cryptanalysis,Fast Software Encryption: 3rdInternational Workshop, Cambridge, UK (Feb. 21-23, 1996), LNCS. 1039, pp. 205-218.
S. Moriai, T. Shimoyama, T. Kaneko, “Higher Order Differential Attack of a CAST Cipher,Fast Software Encryption: 4thInternational Workshop, LNCS 1372, pp. 17-31.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Cipher strength estimating device does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Cipher strength estimating device, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cipher strength estimating device will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3972350

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.