Cryptography – Communication system using cryptography – Time segment interchange
Reexamination Certificate
2007-06-05
2007-06-05
Vu, Kim (Department: 2135)
Cryptography
Communication system using cryptography
Time segment interchange
C380S042000, C380S043000, C713S189000
Reexamination Certificate
active
09799028
ABSTRACT:
An encryption apparatus for block data, comprises a first processing unit randomizing the block data in units of first portions obtained by dividing the block data, and a second processing unit diffusing the block data output from the first processing unit with respect to a second portion of the block data which is wider than the first portion. The first processing unit comprises first nonlinear processing units nonlinearly transforming the block data in units of the first portions. The second processing unit comprises a first linear diffusion processing unit linearly diffusing the second portion of the block data. At least one of the first nonlinear processing units comprises second nonlinear processing units nonlinearly transforming the block data in units of the first portions, and a second linear diffusion processing unit linearly diffusing the second portion of the block data.
REFERENCES:
patent: 1-144091 (1989-06-01), None
patent: WO 97/09705 (1997-03-01), None
A. J. Menezes, et al., Handbook of Applied Cryptography, CRC Press, 1996.
Bruce Schneier, Applied Cryptography, 2ndEdition, John Wiley & Sons, 1995.
V. Rijmen, et al. “The Cipher SHARK”, Fast Software Encryption, LNCS 1039, pp. 99-111, 1996.
Kazumaro Aoki, et al. “Stricter Evaluation for the Maximum Average of Differential Probability and the Maximum Average of Linear Probablility”, SCIS 96-4A, pp. 1-11, 1996.
Mitsuru Matsui, “Block Encryption Algorithm MISTY”, ISEC 96-11, pp. 1-14, 1996.
J. Daemen, et al., “The Block Cipher Square”, Fast Software Encryption, LNCS 1267, pp. 149-165, 1997.
J. Daemen, et al. “AES Proposal Rijndael”, Document Version 2, Mar. 9, 1999 pp. 1-45.
Hideo Shimizu, et al., “On the Diffusion Layer of Block Ciphers”, Technical Report of IEICE, ISEC99-72 (Nov. 1999).
H.M. Heys, et al., Electronics Letters, vol. 29, No. 1, pp. 40-41, “Cryptanalysis of Tree-Structured Substitution-Permutation Networks”, Jan. 7, 1993.
B. Schneier, et al., http://www.counterpane.com/twofish.html, pp. 1-68, “Twofish: A 128-Bit Block Cipher”, Jun. 15, 1998.
A. M. Youssef, et al., http://www.scs.carleton.ca/-sac97/program/papers.html, http://www.ncf.Carleton.ca/˜cf744, 9 pages, “On the Design of Linear Transformations for Substitution Permutation Encryption Networks”, Aug. 11, 1997.
E. Biham, et al., Lecture Notes in Computer Science, vol. 1372, pp. 222-238, “Serpent: a New Block Cipher Proposal”, Apr. 13, 1998.
K. Ohkuma, et al, Selected Areas in Cryptography 2000. Lecture Notes in Computer Science, vol. 2012, pp. 72-88, XP-002216690, “The Blcok Cipher Hierocrypt”, Aug. 15, 2000.
Kawamura Shin'ichi
Muratani Hirofumi
Ohkuma Kenji
Sano Fumihiko
Pich Ponnoreay
Vu Kim
LandOfFree
Encryption apparatus and method, and decryption apparatus... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Encryption apparatus and method, and decryption apparatus..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Encryption apparatus and method, and decryption apparatus... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3874006