Encryption/decryption method and authentication method using...

Cryptography – Key management – Having particular key generator

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S277000, C380S046000, C708S250000, C708S255000

Reexamination Certificate

active

07660414

ABSTRACT:
In the encryption/decryption method, a random number sequence {ri} is generated on the basis of a given multiple-affine key system K and encryption is performed by an exclusive OR of the random number sequence {ri} with a plain text. Further, the multiple-affine key system K is automatically sequentially rewritten into a series of new multiple-affine key systems each time when the number of use times of the multiple-affine key system reaches a predetermined number and encryption of plain texts thereafter is continued while generating random numbers using the series of the rewritten multiple-affine key systems. Likewise, in decryption as well, since decryption is performed using a multiple-affine key system automatically rewritten each time when the number of use times reaches a predetermined number, a third party cannot reproduce the multiple-affine key system and therefore cannot decipher a cipher text.

REFERENCES:
patent: 4418275 (1983-11-01), Oosterbaan et al.
patent: 5444781 (1995-08-01), Lynn et al.
patent: 6058476 (2000-05-01), Matsuzaki et al.
patent: 6081598 (2000-06-01), Dai
patent: 6351813 (2002-02-01), Mooney et al.
patent: 6550011 (2003-04-01), Sims, III
patent: WO 85/00259 (1985-01-01), None
http://sciencelinks.jp/j-east/article/199921/000019992199A0793739.php, 1 page, printed: Jul. 27, 2009.
Roggeman, Yves, “Varying Feedback Shift Registers,” inAdvances in Cryptology—Eurocrypt '89, Workshop on the Theory and Application of Cryptographic Techniques Proceedings, Hourthalem, Belgium, Apr. 10, 1989, pp. 670-679.
Boyar, Journal of the Association for Computing Machinery, vol. 36, No. 1, Jan. 1989, pp. 129-141.
Journal of Sichuan University (Natural Science Edition), vol. 34, No. 5 (Oct. 1997).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Encryption/decryption method and authentication method using... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Encryption/decryption method and authentication method using..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Encryption/decryption method and authentication method using... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4214477

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.