Cryptography – Particular algorithmic function encoding
Patent
1997-05-09
2000-05-30
Swann, Tod R.
Cryptography
Particular algorithmic function encoding
380 46, 380268, H04K 100, H04L 900
Patent
active
06069954&
ABSTRACT:
A new structure for a secret key cryptography algorithm uses double exclusive-or (XOR) encryption (e.sub.i =k1.sub.i XOR m.sub.i XOR k2.sub.1), analogue to a stream cipher arrangement, but providing data integrity protection. The double XOR encryption creates an inner sequence, for example s.sub.i =k1.sub.i XOR m.sub.i for the encryption process, s.sub.i =k2.sub.i XOR e.sub.i for the decryption process, which is unknown to the adversary and is used as a starting point for feedback on the very key streams used in the encryption of following bits of the message. In its preferred embodiment, this structure is the Frogbit data integrity algorithm which uses 10 independent pseudo-random sources. The Frogbit algorithm is well suited to the design and implementation of "semi-proprietary" ciphers, where the overall design is publicly known and peer-reviewed but a significant amount of the implementation specification is left open to private customization. The Frogbit algorithm is a means to create computer programs and microprocessor-based devices that are harder to crack with reverse engineering than with the prior art.
REFERENCES:
patent: 4447672 (1984-05-01), Nakamura
patent: 5081676 (1992-01-01), Chou et al.
patent: 5483598 (1996-01-01), Kaufman et al.
patent: 5745571 (1998-04-01), Zuk
Schneier, Bruce, Applied Cryptography 2nd Ed., pp. 381-388, 1996.
Moreau, Thierry, Core Frogbit Algorithm Explanations [internet], http://www.connotech.com/FRGEXPL.HTM, May 1997.
Moreau, Thierry, Message salting with the Frogbit algorithm [internet], http://www.connotech.com/FRGSALT.HTM, May 1997.
Moreau, Thierry, How the Frogbit is used in hash function mode [internet], http://www.connotech.com/FRGBHAEX.HTM, May 1997.
Moreau, Thierry, The Frogbit Hash Function [internet], http//www.connotech.com/FRGBHASH.HTM, Jun. 1996.
Don Coppersmith et al, "The Shrinking Generator", in Advances in Cryptology, Crypto'93, LNCS No. 733, Springer-Verlag, 1994, pp. 22-39.
Hugo Krawczyk, "LFSR-Based Hashing and Authentication", in Advances in Cryptology, Crypto'94, LNCS (Lecture Notes in Computer Science) 839, Springer Verlag, 1994, pp. 129-139.
Anglehart James
Kabakoff Stephen
Swann Tod R.
LandOfFree
Cryptographic data integrity with serial bit processing and pseu does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Cryptographic data integrity with serial bit processing and pseu, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cryptographic data integrity with serial bit processing and pseu will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1916734