Cryptography – Communication system using cryptography – Time segment interchange
Reexamination Certificate
2007-02-13
2007-02-13
Arani, Taghi T. (Department: 2131)
Cryptography
Communication system using cryptography
Time segment interchange
C380S259000, C380S268000, C380S028000, C380S042000
Reexamination Certificate
active
09572790
ABSTRACT:
An encryption system comprises a pseudo-random number generator (KS) for generating a long pseudo-random sequence (S) from a shorter encryption key (K) and, if necessary, a nonce value (N), and a mixing function (MX) for combining the sequence with a plaintext message (P) on a block-by-block basis, where successive blocks (S(i)) of 128 bits of the sequence are combined with successive 64-bit blocks of plaintext (P(i)) to produce successive 64-bit blocks of ciphertext. The blockwise use of a long pseudo-random sequence preserves the advantages of a block cipher in terms of data confidentiality and data integrity, as well as benefiting from the speed advantages of a stream cipher.
REFERENCES:
patent: 4316055 (1982-02-01), Feistel
patent: 5091942 (1992-02-01), Dent
patent: 5148485 (1992-09-01), Dent
patent: 5268962 (1993-12-01), Abadi et al.
patent: 5297207 (1994-03-01), Degele
patent: 5369705 (1994-11-01), Bird et al.
patent: 5420928 (1995-05-01), Aiello et al.
patent: 5734721 (1998-03-01), Clark
patent: 6014445 (2000-01-01), Kohda et al.
patent: 6058187 (2000-05-01), Chen
patent: 6072873 (2000-06-01), Bewick
patent: 6415032 (2002-07-01), Doland
patent: 6549622 (2003-04-01), Matthews, Jr.
patent: 6601175 (2003-07-01), Arnold et al.
patent: 6701434 (2004-03-01), Rohatgi
patent: 6804354 (2004-10-01), Driscoll
patent: 6961427 (2005-11-01), Qiu et al.
patent: 2001/0021253 (2001-09-01), Furuya et al.
patent: 2001/0021254 (2001-09-01), Furuya et al.
patent: 2004/0252836 (2004-12-01), Yoshida et al.
patent: 0 443 752 (1991-08-01), None
patent: 0 751 646 (1997-01-01), None
patent: 09-160490 (1997-06-01), None
Schneier, Bruce. Applied Cryptography, Second Edition. John Wiley and Sons Inc. Oct. 18, 1995.
Winternitz, Robert S. Crypto '82: A Workshop on the Theory and Application of Cryptographic Techniques; Security of a Keystream Cipher with Secret Initial Value. University of California. Aug. 23-25, 1982.
“Applied Cryptography”, Second Edition, Chapter 9, Bruce Schneier, pp. 189-211.
“Efficient, Parallelizable Methods for Data Encryption” IBM Technical.
Disclosure Bulletin, US, IBM Corp., New York, vol. 38, No. 3, pp. 75-77.
“Ein Schweizer Schluessel Mit Weltweiter Zukunft?”, T. Brueggermann.
Protector, CH, Graf Und Neuhaus, Zurich, vol. 21, No. 6, pp. 51-52, 55, 57, 59.
“Cryptographic Device”, IBM Technical Disclosure Bulletin, vol. 16, No. 10, .
Mar. 1974 (Mar. 1974), pp. 3406-3409.
Cryptography Theory and Practice, Douglas R. Stinson, CRC Press, 1995.
Furuya Soichi
Roe Michael
Arani Taghi T.
Hitachi , Ltd.
Mattingly ,Stanger ,Malur & Brundidge, P.C.
LandOfFree
Cryptographic apparatus and method does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Cryptographic apparatus and method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cryptographic apparatus and method will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3883112