Cryptography – Particular algorithmic function encoding – Nbs/des algorithm
Patent
1987-08-28
1990-03-13
Buczinski, Stephen C.
Cryptography
Particular algorithmic function encoding
Nbs/des algorithm
380 29, 380 30, 380 50, 34082534, H04K 100
Patent
active
049088610
ABSTRACT:
A cryptographic method and apparatus are disclosed which transform a message or arbitrary length into a block of fixed length (128 bits) defined modification detection code (MDC). Although there are a large number of messages which result in the same MDC, because the MDC is a many-to-one function of the input, it is required that it is practically not feasible for an opponent to find them. In analyzing the methods, a distinction is made between two types of attacks, i.e., insiders (who have access to the system) and outsiders (who do not). The first method employs four encryption steps per DEA block and provides the higher degree of security. Coupling between the different DEA operations is provided by using the input keys also as data in two of the four encryption steps. In addition, there is cross coupling by interchanging half of the internal keys. Although this second coupling operation does not add to security in this scheme, it is mandatory in the second method, which employs only two encryption steps per DEA block to trade off security for performance. By providing key cross coupling in both schemes, an identical kernel is established for both methods. This has an implementation advantage since the first method can be achieved by applying the second method twice. The MDC, when loaded into a secure device, authorizes one and only one data set to be authenticated by the MDC, whereas methods based on message authentication codes or digital signatures involving a public key algorithm authorize a plurality of data sets to be authenticated. The MDC therefore provides for greater security control.
REFERENCES:
patent: 4193131 (1980-03-01), Lennon et al.
patent: 4304961 (1981-12-01), Campbell, Jr.
patent: 4314097 (1982-02-01), Campbell, Jr.
patent: 4349695 (1982-09-01), Morgan et al.
patent: 4393269 (1983-07-01), Konheim et al.
patent: 4649233 (1987-03-01), Bass et al.
patent: 4731842 (1988-03-01), Smith
patent: 4747050 (1988-05-01), Brachtl et al.
patent: 4755940 (1988-07-01), Brachtl et al.
patent: 4771461 (1988-09-01), Matyas
D. Coppersmith, "The Real Reason For Rivest's Phenomenon", Advances in Cryptology--CRYPTO '85, Spring-Verlag, Lecture Notes in Computer Science, vol. 218, pp. 535-536.
D. Coppersmith, "Another Birthday Attack", Advances in Cryptology--CRYPTO '85, Springer-Verlag, Lecture Notes in Computer Science, vol. 218, pp. 14-17.
J. M. Pollard, "A Monte Carlo Method for Factorization", BIT, 15, pp. 331-334 (1975).
C. H. Meyer, et al., Cryptography: A New Dimension in Computer Data Security, John Wiley & Sons, Inc., NY, N.Y., pp. 517-577 (1982).
R. L. Rivest, et al., "A Method for Obtaining Digital Signatures and Public Key Cryptosystems", Communications of the ACM, 21, No. 2, pp. 120-126 (1978).
W. Diffie, et al., "New Directions in Cryptography", IEEE Trans. on Information Theory, IT-22, No. 6, pp. 644-654 (1976).
Brachtl Bruno O.
Coppersmith Don
Hyden Myrna M.
Matyas, Jr. Stephen M.
Meyer Carl H. W.
Buczinski Stephen C.
Gregory Bernarr Earl
Hoel John E.
International Business Machines - Corporation
LandOfFree
Data authentication using modification detection codes based on does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Data authentication using modification detection codes based on , we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Data authentication using modification detection codes based on will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-56281