Cryptography – Key management – Having particular key generator
Reexamination Certificate
2005-09-27
2005-09-27
Jung, David (Department: 2134)
Cryptography
Key management
Having particular key generator
C380S046000, C380S267000, C380S268000
Reexamination Certificate
active
06950518
ABSTRACT:
A system (100) and method (400, 500) for data encryption and decryption are disclosed. The encryption system is operable at encryption rates in excess of 10 Mbps and is expandable to over 200 Mpbs. For encryption, plain characters are received, and a key block (120) includes key characters corresponding to the plain characters is accessed. A current key character corresponding to a current plain character is located. A next key character corresponding to a next plain character is located. An offset between the current key character and the next key character is determined to encrypt the plain characters. Aliases are used to facilitate the encryption and decryption. Vector distances of offsets are utilized for the encryption and decryption, using many variables and many dimensions, such as using coordinates.
REFERENCES:
patent: 5245658 (1993-09-01), Bush et al.
http://www.quantdec.com/encryption.htm.
Mellen, G. E. “Cryptology, computers, and common sense” AFIPS Conference Proceedings, National Computer Composition and Exposition, New York, NY, vol. 42, 1973 Jun. 4-8, 1973.
Schneier, Bruce; “Applied Cryptography Second Edition” 1996, John Wiley & Sons, Inc. USA XP002268639, p. 10-p. 12, p. 193-p. 196.
Henson Kevin M.
Smith Eric Myron
Asier Technology Corporation
Jackson & Walker, LLP
Jung David
Klinger Robert C.
LandOfFree
Data encryption system does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Data encryption system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Data encryption system will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3408067