Cryptography – Communication system using cryptography – Symmetric key cryptography
Reexamination Certificate
2005-12-08
2010-02-02
Dinh, Minh (Department: 2432)
Cryptography
Communication system using cryptography
Symmetric key cryptography
C380S028000, C380S284000
Reexamination Certificate
active
07657033
ABSTRACT:
In one embodiment, messages are encrypted with encrypted transformations that commute with one another. In another embodiment, a message is divided into message segments, and with each encrypted message segment one or more encrypted keys are sent. The encrypted keys may be used to decrypt a message segment that is sent at another time, such as the next message segment to be sent. In another embodiment, a sender encrypts a message with a first encryption, which may be unknown to the receiver. Then a receiver encrypts the message with a second encryption. Next the sender removes the first encryption, thereby allowing the receiver to reconstitute the original message by removing the second encryption.
REFERENCES:
patent: 4255811 (1981-03-01), Adler
patent: 4316055 (1982-02-01), Feistel
patent: 4405829 (1983-09-01), Rivest
patent: 5001753 (1991-03-01), Davio
patent: 5297207 (1994-03-01), Degele
patent: 5375170 (1994-12-01), Shamir
patent: 5511123 (1996-04-01), Adams
patent: 5687238 (1997-11-01), Shimada
patent: 5724428 (1998-03-01), Rivest
patent: 5835600 (1998-11-01), Rivest
patent: 6031911 (2000-02-01), Adams
patent: 6327661 (2001-12-01), Kocher
patent: 6347143 (2002-02-01), Goff
patent: 6971008 (2005-11-01), Wasilewski et al.
patent: 7215769 (2007-05-01), Fiske
patent: 7317799 (2008-01-01), Hammersmith et al.
patent: 2002/0172366 (2002-11-01), Peterka et al.
patent: 2003/0147532 (2003-08-01), Hakkarainen et al.
Applied Cryptography, Second Edition, Protocols, Algorithms and Source Code in C, pp. 13 thru 17, 1996, ISBN 0-471-12845-7, Bruce Schneier.
Computer and Network Security: Lecture Notes Ronald L. Rivest, 1998. rivest@mit.edu.
The Laws of Cryptography: Cryptographer's Favorites pp. 1 thru 8, 2002. Neal R. Wagner.
Author: Rivest, Title: “6.857 Computer and Network Security: Lecture Notes—Part 3: Unconditional Security”, Publisher: Ronald L. Rivest, Published at: http://web.mit.edu/6.857/www/home.html, (No longer a valid web address) Date: Sep. 1998, pp. 1-10. (See p. 2).
Author: Wagner, Title: “The Law of Cryptography: Cryptographer's Favorites 2002”, Publisher: Neal R. Wagner, Published at: http://www.cs.utsa.edu/˜wagner/laws/favorites.html, Date: Feb. 2002, pp. 1-8. (See pp. 1-2).
Author: Schneier, Title: “Applied Cryptography, Second Edition”, Publisher: John Wlley & Sons, Inc., Date: 1996, pp. 12-17 (See pp. 13-16).
Author: Shannon, Title: “Communication Theory of Secrecy Systems”, Publisher: Bell System Technical Journal, vol. 28(4), Date: 1949, pp. 656-715.
Dinh Minh
Fiske Software LLC
Lewis David
LandOfFree
Cryptography related to keys does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Cryptography related to keys, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cryptography related to keys will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4159496