Data authentication using modification detection codes based on

Cryptography – Particular algorithmic function encoding – Nbs/des algorithm

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 29, 380 30, 380 50, 34082534, H04K 100

Patent

active

049088610

ABSTRACT:
A cryptographic method and apparatus are disclosed which transform a message or arbitrary length into a block of fixed length (128 bits) defined modification detection code (MDC). Although there are a large number of messages which result in the same MDC, because the MDC is a many-to-one function of the input, it is required that it is practically not feasible for an opponent to find them. In analyzing the methods, a distinction is made between two types of attacks, i.e., insiders (who have access to the system) and outsiders (who do not). The first method employs four encryption steps per DEA block and provides the higher degree of security. Coupling between the different DEA operations is provided by using the input keys also as data in two of the four encryption steps. In addition, there is cross coupling by interchanging half of the internal keys. Although this second coupling operation does not add to security in this scheme, it is mandatory in the second method, which employs only two encryption steps per DEA block to trade off security for performance. By providing key cross coupling in both schemes, an identical kernel is established for both methods. This has an implementation advantage since the first method can be achieved by applying the second method twice. The MDC, when loaded into a secure device, authorizes one and only one data set to be authenticated by the MDC, whereas methods based on message authentication codes or digital signatures involving a public key algorithm authorize a plurality of data sets to be authenticated. The MDC therefore provides for greater security control.

REFERENCES:
patent: 4193131 (1980-03-01), Lennon et al.
patent: 4304961 (1981-12-01), Campbell, Jr.
patent: 4314097 (1982-02-01), Campbell, Jr.
patent: 4349695 (1982-09-01), Morgan et al.
patent: 4393269 (1983-07-01), Konheim et al.
patent: 4649233 (1987-03-01), Bass et al.
patent: 4731842 (1988-03-01), Smith
patent: 4747050 (1988-05-01), Brachtl et al.
patent: 4755940 (1988-07-01), Brachtl et al.
patent: 4771461 (1988-09-01), Matyas
D. Coppersmith, "The Real Reason For Rivest's Phenomenon", Advances in Cryptology--CRYPTO '85, Spring-Verlag, Lecture Notes in Computer Science, vol. 218, pp. 535-536.
D. Coppersmith, "Another Birthday Attack", Advances in Cryptology--CRYPTO '85, Springer-Verlag, Lecture Notes in Computer Science, vol. 218, pp. 14-17.
J. M. Pollard, "A Monte Carlo Method for Factorization", BIT, 15, pp. 331-334 (1975).
C. H. Meyer, et al., Cryptography: A New Dimension in Computer Data Security, John Wiley & Sons, Inc., NY, N.Y., pp. 517-577 (1982).
R. L. Rivest, et al., "A Method for Obtaining Digital Signatures and Public Key Cryptosystems", Communications of the ACM, 21, No. 2, pp. 120-126 (1978).
W. Diffie, et al., "New Directions in Cryptography", IEEE Trans. on Information Theory, IT-22, No. 6, pp. 644-654 (1976).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Data authentication using modification detection codes based on does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Data authentication using modification detection codes based on , we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Data authentication using modification detection codes based on will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-56281

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.