Cryptography related to keys

Cryptography – Communication system using cryptography – Symmetric key cryptography

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S028000, C380S284000

Reexamination Certificate

active

07657033

ABSTRACT:
In one embodiment, messages are encrypted with encrypted transformations that commute with one another. In another embodiment, a message is divided into message segments, and with each encrypted message segment one or more encrypted keys are sent. The encrypted keys may be used to decrypt a message segment that is sent at another time, such as the next message segment to be sent. In another embodiment, a sender encrypts a message with a first encryption, which may be unknown to the receiver. Then a receiver encrypts the message with a second encryption. Next the sender removes the first encryption, thereby allowing the receiver to reconstitute the original message by removing the second encryption.

REFERENCES:
patent: 4255811 (1981-03-01), Adler
patent: 4316055 (1982-02-01), Feistel
patent: 4405829 (1983-09-01), Rivest
patent: 5001753 (1991-03-01), Davio
patent: 5297207 (1994-03-01), Degele
patent: 5375170 (1994-12-01), Shamir
patent: 5511123 (1996-04-01), Adams
patent: 5687238 (1997-11-01), Shimada
patent: 5724428 (1998-03-01), Rivest
patent: 5835600 (1998-11-01), Rivest
patent: 6031911 (2000-02-01), Adams
patent: 6327661 (2001-12-01), Kocher
patent: 6347143 (2002-02-01), Goff
patent: 6971008 (2005-11-01), Wasilewski et al.
patent: 7215769 (2007-05-01), Fiske
patent: 7317799 (2008-01-01), Hammersmith et al.
patent: 2002/0172366 (2002-11-01), Peterka et al.
patent: 2003/0147532 (2003-08-01), Hakkarainen et al.
Applied Cryptography, Second Edition, Protocols, Algorithms and Source Code in C, pp. 13 thru 17, 1996, ISBN 0-471-12845-7, Bruce Schneier.
Computer and Network Security: Lecture Notes Ronald L. Rivest, 1998. rivest@mit.edu.
The Laws of Cryptography: Cryptographer's Favorites pp. 1 thru 8, 2002. Neal R. Wagner.
Author: Rivest, Title: “6.857 Computer and Network Security: Lecture Notes—Part 3: Unconditional Security”, Publisher: Ronald L. Rivest, Published at: http://web.mit.edu/6.857/www/home.html, (No longer a valid web address) Date: Sep. 1998, pp. 1-10. (See p. 2).
Author: Wagner, Title: “The Law of Cryptography: Cryptographer's Favorites 2002”, Publisher: Neal R. Wagner, Published at: http://www.cs.utsa.edu/˜wagner/laws/favorites.html, Date: Feb. 2002, pp. 1-8. (See pp. 1-2).
Author: Schneier, Title: “Applied Cryptography, Second Edition”, Publisher: John Wlley & Sons, Inc., Date: 1996, pp. 12-17 (See pp. 13-16).
Author: Shannon, Title: “Communication Theory of Secrecy Systems”, Publisher: Bell System Technical Journal, vol. 28(4), Date: 1949, pp. 656-715.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Cryptography related to keys does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Cryptography related to keys, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cryptography related to keys will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4159496

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.