Cryptography – Communication system using cryptography – Data stream/substitution enciphering
Reexamination Certificate
2007-12-04
2007-12-04
Moise, Emmanuel L. (Department: 2137)
Cryptography
Communication system using cryptography
Data stream/substitution enciphering
C380S028000, C380S259000, C380S037000
Reexamination Certificate
active
09893785
ABSTRACT:
In each stage, multiple parallel nonlinear transformation modules each perform local lower-level diffusion, then a diffusion module performs higher-level diffusion over the block width and multiple parallel nonlinear transformation modules each perform local lower-level diffusion. This operation is repeated a predetermined number of times corresponding to the number of stages. Each nonlinear transformation module is formed into the nested SPN structure by arranging alternately nonlinear transformation modules and a diffusion module. The diffusion module performs linear transformation for spreading the state of at least one bit in input data to the preceding nonlinear transformation modules to at least one bit in input data to the succeeding nonlinear transformation modules.
REFERENCES:
patent: 3798359 (1974-03-01), Feistel
patent: 4275265 (1981-06-01), Davida et al.
patent: 4751733 (1988-06-01), Delayaye et al.
patent: 5727062 (1998-03-01), Ritter
patent: 6182216 (2001-01-01), Luyster
patent: 6769063 (2004-07-01), Kanda et al.
patent: 7194090 (2007-03-01), Muratani et al.
V. Rijmen, et al., “The Cipher SHARK”, Fast Software Encryption, LNCS 1039, 1996, pp. 100-111.
Kazumaro Aoki, et al., “Stricter Evaluation for the Maximum Average of Differential Probability and the Maximum Average of Linear Probability”, SCIS 96-4A, 1996, 12 pages.
Mitsuru Matsui, “Block Encryption Algorithm MISTY”, ISEC 96-11, 1996, pp. 1-14.
J. Daemen, et al., “The Block Cipher SQUARE”, Fast Software Encryption, 1997 (FSE97), LNCS 1267, pp. 149-165.
J. Daemen, et al., “AES Proposal: Rijndael”, Document Version 2, 1999, pp. 1-45.
A.J. Menezes, et al., Handbook of Applied Cryptography, CRC Press, 1996, 11 pages.
B. Schneier, Applied Cryptography, Second Edition, 1995, 10 pages.
K. Ohkuma, et al., “The block cipher Hierocrypt”, Proceedings of Selected Area in Cryptography 2000 (SAC 2000), 2000, pp. 70-82.
K. Ohkuma, et al., “Security and Performance Evaluations for the block ciphers Hierocrypt-3 and Hierocrypt-L1”, Technical Report of IEICE, ISEC-71, 2000(Japan), 2001, pp. 71-100.
K. Ohkuma, et al., The Institute of Electronics, Information and Communication Engineers, vol. 99, No. 702, pp. 99-104, “On the Recursive SPN Structure”, Mar. 17, 2000 (with English Abstract).
K. Ohkuma, et al., The Institute of Electronics, Information and Communication Engineers, vol. 100, No. 76, pp. 77-104, “Specification and Assessment of the Block Cipher Hierocrypt”, May 18, 2000.
Kawamura Shin'ichi
Muratani Hirofumi
Ohkuma Kenji
Sano Fumihiko
LandOfFree
Encryption apparatus and method, and decryption apparatus... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Encryption apparatus and method, and decryption apparatus..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Encryption apparatus and method, and decryption apparatus... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3864569