Cryptography – Communication system using cryptography – Data stream/substitution enciphering
Reexamination Certificate
2006-02-28
2006-02-28
Smithers, Matthew (Department: 2137)
Cryptography
Communication system using cryptography
Data stream/substitution enciphering
C380S037000
Reexamination Certificate
active
07006628
ABSTRACT:
The present efficient packet encryption method decreases the computation time to encrypt and decrypt successive packets of plaintext data. An S-vector is generated and the S-vector is used to encrypt successive packets of plaintext, thus reducing the per packet encryption/decryption time. The formula for encrypting successive packets includes use of the packet sequence number with a third variable injected to eliminate the predictability of the variables, thus making the present efficient packet encryption method more secure. A fourth variable is injected into the calculations to generate an encryption stream that does not repeat as frequently to provide additional security from hackers. For encrypting a packet having a long payload of plaintext, a packet byte sequence number is used to generate an encryption stream that is less likely to repeat within a particular packet.
REFERENCES:
patent: 6490354 (2002-12-01), Venkatesan et al.
patent: 6549622 (2003-04-01), Matthews, Jr.
patent: 6862354 (2005-03-01), McGrew et al.
patent: 2002/0037079 (2002-03-01), Duval
patent: 2002/0044651 (2002-04-01), Tuvell
patent: 2002/0186839 (2002-12-01), Parker et al.
RSA Laboratories: “RSA Security Response to Weakness in Key Scheduling Algortihm of RC4”; retrieved from Internet URL:www.rsasecurity.com/rsalabs “retrieved on Sep. 13, 2005” The whole document.
Fluher, Scott, Mantin, Itsik, and Shimir, ADI; “Weaknesses in the Key Scheduling Algorithm of RC4,” 2001, http://www.eyetap.org/˜rguerra/toronto2001/rc4—ksaproc.pdf, University of Toronto, Toronto, Ontario, Canada.
Stubblefield, Adam, Ioannidis, John, and Rubin, Aviel D., “Using the Fluhrer, Martin, and Sharmir Attack to Break WEP,” Aug. 6, 2001, http://www.cs.rice.edu/˜astubbie/wep/wep—attack.html, AT&T Labs, Florham Park, NJ.
S.Fluher, I. Mantin, and A. shamir: “Weakness in the Key Scheduling Algorithm of RC4,” Retrieved from Internet: URL: www.drizzle.com(aboba/IEEE/rc4—ksaproc.pdf “retrieved on Feb. 26, 2003”, pp. 1-23. The whole document.
Kundarewich P D et al; “A CPLD-based RC-4 cracking system”; Electrical and Computer Engineering, 1999 IEEE Canadian Conference on Edmonton, ALTA., Canada, May 9-12, 1999, Piscataway, NJ, USA, IEEE, US, May 9, 1999, pp. 397-402, XP010359797, ISBN: 0-7803-5579-2.
Garstin Mark
Gilman Robert R.
Robinson Richard L.
Siddiqui Anwar
Wutzke Mark
Avaya Technology Corp.
Patton & Boggs LLP
Smithers Matthew
LandOfFree
Efficient packet encryption method does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Efficient packet encryption method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Efficient packet encryption method will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3639331