Data transformation apparatus and data transformation method

Electrical computers and digital processing systems: support – Data processing protection using cryptography

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S028000

Reexamination Certificate

active

07096369

ABSTRACT:
In a data transformation apparatus for transforming two arbitrary pieces of data of A input data and B input data, a first nonlinear transformation of the A input data is performed using a first key parameter, a transformed result is output, an XOR operation of the transformed result and the B input data is performed to output an XORed result as B intermediate data, and the B intermediate data is input to a next sub-transformation unit as B input data. On the other hand, the B input data is input to a next sub-transformation unit as A input data. A second nonlinear transformation of the B input data is performed using a second key parameter, the transformed result is output, an XOR operation of the transformed result and the B intermediate data is performed to output an XORed result as B intermediate data, and the B intermediate data is input to a next sub-transformation unit as B input data. The above configurations is connected in a cascade and the last A intermediate data and B intermediate data are output as transformation result.

REFERENCES:
patent: 5261003 (1993-11-01), Matsui
patent: 5317638 (1994-05-01), Kao et al.
patent: 5488661 (1996-01-01), Matsui
patent: 5717760 (1998-02-01), Satterfield
patent: 5940513 (1999-08-01), Aucsmith et al.
patent: 6125182 (2000-09-01), Satterfield
patent: 6201869 (2001-03-01), Matsui
patent: 2285562 (1995-07-01), None
patent: 60037586 (1985-02-01), None
patent: 61117940 (1986-06-01), None
patent: 1-276189 (1989-11-01), None
patent: 3-129384 (1991-06-01), None
patent: 4-170576 (1992-06-01), None
patent: 5- 35448 (1993-02-01), None
patent: 5- 88849 (1993-04-01), None
patent: 06075525 (1994-03-01), None
patent: 7-191603 (1995-07-01), None
patent: 08179690 (1996-07-01), None
patent: 09090870 (1997-04-01), None
Kaneko, “On Provable Security against Differential and Linear Cryptanalysis in Generalized Feistel Ciphers with Multiple Random Functions”, Kyushu University, Hakozaki, Higashi-ku, Fukuoka 812-81, Japan, (Aug. 1997).
Luby et al., “How to Construct Pseudorandom Permutations from Pseudorandom Functions,”Siam Journal on Computing, Apr. 1, 1988, pp. 373-386, vol. 17, No. 2.
Broscius et al., “Exploiting Parallelism in Hardware Implementation of the DES,”Proceedings of the Conference on Theory and Applications of Cryptographic Techniques, Aug. 11-15, 1991, pp. 367-376.
Stevens, IP Source Routing Option, “Traceroute Program,” pp. 97-109.
Schneier, Combining Block Ciphers, Chapter 15, pp. 357-366.
Mitsuru Matsui, New Block Encryption Algorithm MISTY, 4th International Workshop, FSE' 97, Haifa, Israel, Jan. 1997.
Hiroyuki Matsumoto et al., The FEAL Encryption Processor for Multimedia Communications, NTT R&D vol. 41, no. 6 1992, pp. 777-785, Fig. 5.
International Search Report issued in PCT/JP96/02154; filed on Jul. 31, 1996.
Mitsuru Matsui “On Provable Security Against Differential and Linear Cryptanalysis of Block Ciphers, Preliminary Reports from the 18th Symposium of Information Theory . . . ”Oct. 1995, vol. 1 of 2, pp. 175-177.
Mitsuru Matsui “New Structure of Block Ciphers with Provable Security against Differential and Linear Cryptanalysis” Lecture Notes in Computer Science, Springer-Verlag, 1996, vol. 1039, pp. 205-218.
Mitsuru Matsui, et al. “Practical Block Ciphers with Provable Security Against Differential and Linear Cryptanalysis,” Lecture Transactions of Cipher and Information Security Symposium SCIS96, IEICE Information Security Research AD HOC Committee, Jan. 1996,SCIS96-4C.
“What is Common Key Block Cipher? Would you be kind to tell me about MISTY Ciphers?” Electronics, Ohm, May 1996, p. 67.
Matsui M., “Linear Cryptanalysis Method for DES Cipher” EUROCRYPT '93, Lecture Notes in Computer Science, Springer-Verlag 1993, vol. 765, pp. 386-397.
Matsui M. et al. “A New Cryptanalytic Method for FEAL Cipher” IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences IEICE, Jan. 1994, vol. E77-A, pp. 2-7.
Koyama K. et al., How to Strengthen DES-like Cryptosystems against Differential Cryptanalysis, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, IEICE, Jan. 1994, vol. E77-A, pp. 63-69.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Data transformation apparatus and data transformation method does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Data transformation apparatus and data transformation method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Data transformation apparatus and data transformation method will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3690214

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.