Efficient packet encryption method

Cryptography – Communication system using cryptography – Data stream/substitution enciphering

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S037000

Reexamination Certificate

active

07006628

ABSTRACT:
The present efficient packet encryption method decreases the computation time to encrypt and decrypt successive packets of plaintext data. An S-vector is generated and the S-vector is used to encrypt successive packets of plaintext, thus reducing the per packet encryption/decryption time. The formula for encrypting successive packets includes use of the packet sequence number with a third variable injected to eliminate the predictability of the variables, thus making the present efficient packet encryption method more secure. A fourth variable is injected into the calculations to generate an encryption stream that does not repeat as frequently to provide additional security from hackers. For encrypting a packet having a long payload of plaintext, a packet byte sequence number is used to generate an encryption stream that is less likely to repeat within a particular packet.

REFERENCES:
patent: 6490354 (2002-12-01), Venkatesan et al.
patent: 6549622 (2003-04-01), Matthews, Jr.
patent: 6862354 (2005-03-01), McGrew et al.
patent: 2002/0037079 (2002-03-01), Duval
patent: 2002/0044651 (2002-04-01), Tuvell
patent: 2002/0186839 (2002-12-01), Parker et al.
RSA Laboratories: “RSA Security Response to Weakness in Key Scheduling Algortihm of RC4”; retrieved from Internet URL:www.rsasecurity.com/rsalabs “retrieved on Sep. 13, 2005” The whole document.
Fluher, Scott, Mantin, Itsik, and Shimir, ADI; “Weaknesses in the Key Scheduling Algorithm of RC4,” 2001, http://www.eyetap.org/˜rguerra/toronto2001/rc4—ksaproc.pdf, University of Toronto, Toronto, Ontario, Canada.
Stubblefield, Adam, Ioannidis, John, and Rubin, Aviel D., “Using the Fluhrer, Martin, and Sharmir Attack to Break WEP,” Aug. 6, 2001, http://www.cs.rice.edu/˜astubbie/wep/wep—attack.html, AT&T Labs, Florham Park, NJ.
S.Fluher, I. Mantin, and A. shamir: “Weakness in the Key Scheduling Algorithm of RC4,” Retrieved from Internet: URL: www.drizzle.com(aboba/IEEE/rc4—ksaproc.pdf “retrieved on Feb. 26, 2003”, pp. 1-23. The whole document.
Kundarewich P D et al; “A CPLD-based RC-4 cracking system”; Electrical and Computer Engineering, 1999 IEEE Canadian Conference on Edmonton, ALTA., Canada, May 9-12, 1999, Piscataway, NJ, USA, IEEE, US, May 9, 1999, pp. 397-402, XP010359797, ISBN: 0-7803-5579-2.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Efficient packet encryption method does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Efficient packet encryption method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Efficient packet encryption method will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3639331

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.