Electrical computers and digital processing systems: support – Data processing protection using cryptography
Reexamination Certificate
2006-08-22
2006-08-22
Decady, Albert (Department: 2133)
Electrical computers and digital processing systems: support
Data processing protection using cryptography
C380S028000
Reexamination Certificate
active
07096369
ABSTRACT:
In a data transformation apparatus for transforming two arbitrary pieces of data of A input data and B input data, a first nonlinear transformation of the A input data is performed using a first key parameter, a transformed result is output, an XOR operation of the transformed result and the B input data is performed to output an XORed result as B intermediate data, and the B intermediate data is input to a next sub-transformation unit as B input data. On the other hand, the B input data is input to a next sub-transformation unit as A input data. A second nonlinear transformation of the B input data is performed using a second key parameter, the transformed result is output, an XOR operation of the transformed result and the B intermediate data is performed to output an XORed result as B intermediate data, and the B intermediate data is input to a next sub-transformation unit as B input data. The above configurations is connected in a cascade and the last A intermediate data and B intermediate data are output as transformation result.
REFERENCES:
patent: 5261003 (1993-11-01), Matsui
patent: 5317638 (1994-05-01), Kao et al.
patent: 5488661 (1996-01-01), Matsui
patent: 5717760 (1998-02-01), Satterfield
patent: 5940513 (1999-08-01), Aucsmith et al.
patent: 6125182 (2000-09-01), Satterfield
patent: 6201869 (2001-03-01), Matsui
patent: 2285562 (1995-07-01), None
patent: 60037586 (1985-02-01), None
patent: 61117940 (1986-06-01), None
patent: 1-276189 (1989-11-01), None
patent: 3-129384 (1991-06-01), None
patent: 4-170576 (1992-06-01), None
patent: 5- 35448 (1993-02-01), None
patent: 5- 88849 (1993-04-01), None
patent: 06075525 (1994-03-01), None
patent: 7-191603 (1995-07-01), None
patent: 08179690 (1996-07-01), None
patent: 09090870 (1997-04-01), None
Kaneko, “On Provable Security against Differential and Linear Cryptanalysis in Generalized Feistel Ciphers with Multiple Random Functions”, Kyushu University, Hakozaki, Higashi-ku, Fukuoka 812-81, Japan, (Aug. 1997).
Luby et al., “How to Construct Pseudorandom Permutations from Pseudorandom Functions,”Siam Journal on Computing, Apr. 1, 1988, pp. 373-386, vol. 17, No. 2.
Broscius et al., “Exploiting Parallelism in Hardware Implementation of the DES,”Proceedings of the Conference on Theory and Applications of Cryptographic Techniques, Aug. 11-15, 1991, pp. 367-376.
Stevens, IP Source Routing Option, “Traceroute Program,” pp. 97-109.
Schneier, Combining Block Ciphers, Chapter 15, pp. 357-366.
Mitsuru Matsui, New Block Encryption Algorithm MISTY, 4th International Workshop, FSE' 97, Haifa, Israel, Jan. 1997.
Hiroyuki Matsumoto et al., The FEAL Encryption Processor for Multimedia Communications, NTT R&D vol. 41, no. 6 1992, pp. 777-785, Fig. 5.
International Search Report issued in PCT/JP96/02154; filed on Jul. 31, 1996.
Mitsuru Matsui “On Provable Security Against Differential and Linear Cryptanalysis of Block Ciphers, Preliminary Reports from the 18th Symposium of Information Theory . . . ”Oct. 1995, vol. 1 of 2, pp. 175-177.
Mitsuru Matsui “New Structure of Block Ciphers with Provable Security against Differential and Linear Cryptanalysis” Lecture Notes in Computer Science, Springer-Verlag, 1996, vol. 1039, pp. 205-218.
Mitsuru Matsui, et al. “Practical Block Ciphers with Provable Security Against Differential and Linear Cryptanalysis,” Lecture Transactions of Cipher and Information Security Symposium SCIS96, IEICE Information Security Research AD HOC Committee, Jan. 1996,SCIS96-4C.
“What is Common Key Block Cipher? Would you be kind to tell me about MISTY Ciphers?” Electronics, Ohm, May 1996, p. 67.
Matsui M., “Linear Cryptanalysis Method for DES Cipher” EUROCRYPT '93, Lecture Notes in Computer Science, Springer-Verlag 1993, vol. 765, pp. 386-397.
Matsui M. et al. “A New Cryptanalytic Method for FEAL Cipher” IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences IEICE, Jan. 1994, vol. E77-A, pp. 2-7.
Koyama K. et al., How to Strengthen DES-like Cryptosystems against Differential Cryptanalysis, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, IEICE, Jan. 1994, vol. E77-A, pp. 63-69.
Matsui Mitsuru
Tokita Toshio
Birch & Stewart Kolasch & Birch, LLP
De'cady Albert
Jack Todd
Mitsubishi Denki & Kabushiki Kaisha
LandOfFree
Data transformation apparatus and data transformation method does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Data transformation apparatus and data transformation method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Data transformation apparatus and data transformation method will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3690214