Cryptographic data integrity with serial bit processing and pseu

Cryptography – Particular algorithmic function encoding

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 46, 380268, H04K 100, H04L 900

Patent

active

06069954&

ABSTRACT:
A new structure for a secret key cryptography algorithm uses double exclusive-or (XOR) encryption (e.sub.i =k1.sub.i XOR m.sub.i XOR k2.sub.1), analogue to a stream cipher arrangement, but providing data integrity protection. The double XOR encryption creates an inner sequence, for example s.sub.i =k1.sub.i XOR m.sub.i for the encryption process, s.sub.i =k2.sub.i XOR e.sub.i for the decryption process, which is unknown to the adversary and is used as a starting point for feedback on the very key streams used in the encryption of following bits of the message. In its preferred embodiment, this structure is the Frogbit data integrity algorithm which uses 10 independent pseudo-random sources. The Frogbit algorithm is well suited to the design and implementation of "semi-proprietary" ciphers, where the overall design is publicly known and peer-reviewed but a significant amount of the implementation specification is left open to private customization. The Frogbit algorithm is a means to create computer programs and microprocessor-based devices that are harder to crack with reverse engineering than with the prior art.

REFERENCES:
patent: 4447672 (1984-05-01), Nakamura
patent: 5081676 (1992-01-01), Chou et al.
patent: 5483598 (1996-01-01), Kaufman et al.
patent: 5745571 (1998-04-01), Zuk
Schneier, Bruce, Applied Cryptography 2nd Ed., pp. 381-388, 1996.
Moreau, Thierry, Core Frogbit Algorithm Explanations [internet], http://www.connotech.com/FRGEXPL.HTM, May 1997.
Moreau, Thierry, Message salting with the Frogbit algorithm [internet], http://www.connotech.com/FRGSALT.HTM, May 1997.
Moreau, Thierry, How the Frogbit is used in hash function mode [internet], http://www.connotech.com/FRGBHAEX.HTM, May 1997.
Moreau, Thierry, The Frogbit Hash Function [internet], http//www.connotech.com/FRGBHASH.HTM, Jun. 1996.
Don Coppersmith et al, "The Shrinking Generator", in Advances in Cryptology, Crypto'93, LNCS No. 733, Springer-Verlag, 1994, pp. 22-39.
Hugo Krawczyk, "LFSR-Based Hashing and Authentication", in Advances in Cryptology, Crypto'94, LNCS (Lecture Notes in Computer Science) 839, Springer Verlag, 1994, pp. 129-139.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Cryptographic data integrity with serial bit processing and pseu does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Cryptographic data integrity with serial bit processing and pseu, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cryptographic data integrity with serial bit processing and pseu will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1916734

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.