Cryptography – Particular algorithmic function encoding
Reexamination Certificate
2007-05-15
2007-05-15
Moazzami, Nasser (Department: 2136)
Cryptography
Particular algorithmic function encoding
C380S044000
Reexamination Certificate
active
09999560
ABSTRACT:
The present invention relates to a cryptosystem. A keystream table [Ks] is a virtual data space. Every data of 1 byte in a secondary ciphertext E2provides a vector directional component IR. The data Ks (IR) in the keystream table [Ks] designated by the directional component IR of the vector is recognized as the quantitative component of the vector. By handling a secondary ciphertext E2of 1 byte as the address in the keystream table [Ks], the secondary ciphertext E2can be recognized as the directional component of the vector. A logical operation for the data Ks (IR) is performed, and the internal vector data V is sequentially replaced every 1 byte. An exclusive OR operation is performed between the internal vector data V and the primary ciphertext E1for generating a secondary ciphertext E2.
REFERENCES:
patent: 5048086 (1991-09-01), Bianco et al.
patent: 5365589 (1994-11-01), Gutowitz
patent: 5438622 (1995-08-01), Normile et al.
patent: 5479513 (1995-12-01), Protopopescu et al.
patent: 5481613 (1996-01-01), Ford et al.
patent: 5544245 (1996-08-01), Tsubakiyama
patent: 5606616 (1997-02-01), Sprunk et al.
patent: 5659569 (1997-08-01), Padovani et al.
patent: 5673319 (1997-09-01), Bellare et al.
patent: 5680462 (1997-10-01), Miller et al.
patent: 5696826 (1997-12-01), Gao
patent: 5729607 (1998-03-01), DeFries et al.
patent: 5740246 (1998-04-01), Saito
patent: 5745576 (1998-04-01), Abraham et al.
patent: 5748734 (1998-05-01), Mizikovsky
patent: 5751811 (1998-05-01), Magnotti et al.
patent: 5761306 (1998-06-01), Lewis
patent: 5850450 (1998-12-01), Schweitzer et al.
patent: 5857025 (1999-01-01), Anderson et al.
patent: 5933501 (1999-08-01), Leppek
patent: 5949883 (1999-09-01), Ford
patent: 6014445 (2000-01-01), Kohda et al.
patent: 6055316 (2000-04-01), Perlman et al.
patent: 6064738 (2000-05-01), Fridrich
patent: 6178217 (2001-01-01), Defries et al.
patent: 6178244 (2001-01-01), Takeda et al.
patent: 6240187 (2001-05-01), Lewis
patent: 6252958 (2001-06-01), Rose
patent: 6259790 (2001-07-01), Takagi et al.
patent: 6269163 (2001-07-01), Rivest et al.
patent: 6314186 (2001-11-01), Lee et al.
patent: 6331974 (2001-12-01), Yang et al.
patent: 6337910 (2002-01-01), Goff et al.
patent: 6404888 (2002-06-01), Barbir
patent: 6415032 (2002-07-01), Doland
patent: 6430588 (2002-08-01), Kobayashi et al.
patent: 6480605 (2002-11-01), Uchiyama et al.
patent: 6490357 (2002-12-01), Rose
patent: 6647493 (2003-11-01), Occhipinti et al.
patent: 6704871 (2004-03-01), Kaplan et al.
patent: 6708273 (2004-03-01), Ober et al.
patent: 6711680 (2004-03-01), Cordery
patent: 6732127 (2004-05-01), Karp
patent: 6763363 (2004-07-01), Driscoll
patent: 6868159 (2005-03-01), Leppek
patent: 6879689 (2005-04-01), Carroll et al.
patent: 2002/0023209 (2002-02-01), Domstedt et al.
patent: 2003/0182246 (2003-09-01), Johnson et al.
patent: 1071242 (2001-01-01), None
Douglas Frey, Chaotic Digital Encoding: An Approach to Secure Communication, Oct. 1993, IEEE, vol. 40, Issue: 10, pp. 660-666.
Dachselt et al., Discrete-Time Chaotic encryption systems, Part III: Cryptographical Analysis, Sep. 1998, IEEE, vol. 45, issue 9, pp. 983-988.
Gotz et al., Discrete-Time Chaotic encryption systems, Part I: Statistical Design Approach, Oct. 1997, IEEE, vol. 44, issue 10, pp. 963-970.
Yong et al., A new method of the Chaos Encryption, Oct. 1998, IEEE, Signal Processing Proceedings, 1998. ICSP '98, pp. 233-236.
Jui-Cheng et al., A new chaotic key-based design for image encryption and decryption, May 2000, The 2000 IEEE international Symposium on Circuits and Systems, vol. 4, 28-31, pp. 49-52, vol. 4.
Beritelli et al., Multilayer chaotic encryption for secure communications in packet switching networks, Aug. 2000, IEEE, International Conference on Communication Technology, Proceedings, vol. 2, 21-25 pp. 1575-1582 vol. 2.
Zhou et al., Secure communication via one-dimensional chaotic inverse systems, Jun. 1997, IEEE International Symposium on Circuits and Systems, vol. 2, 9-12 pp. 1029-1032 vol. 2.
Chambers, Comments on “Chaotic digital encoding: an approach to secure communication” and reply by Frey, D., Nov. 1999 IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, vol. 46, Issue 11, pp. 1445-1447.
Dachselt et al., Chaotic coding and cryptoanalysis, Jun. 1997, IEEE International Symposium on Circuits and Systems, 1997, vol. 2, 9-12, pp. 1061-1064 vol. 2.
Sobhy et al., Chaotic algorithms for data encryption, May 2001, IEEE International Conference on Acoustics, Speech, and Signal Processing, 2001, vol. 2, 7-11, pp. 997-1000 vol. 2.
Papadimitriou et al., Chaotic real-time encryption using systems of difference equations with large parameter spaces, Jun. 1996, 8th IEEE Signal Processing Workshop on Statistical Signal and Array Processing, pp. 566-569.
Delgado-Restituto et al., Discrete-time integrated circuits for chaotic communication, Jun. 1997, IEEE International Symposium on Circuits and Systems, vol. 2, pp. 1073-1076 vol. 2.
Kocarev et al., From chaotic maps to encryption schemes, Jun. 1998, IEEE International Symposium on Circuits and Systems, vol. 4, pp. 514-517 vol. 4.
Sobhy et al., Methods of attacking chaotic encryption and countermeasures, May 2001, IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 2, pp. 1001-1004 vol. 2.
Jakimoski et al., Chaos and cryptography: block encryption ciphers based on chaotic maps, Feb. 2001, IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, vol. 48, Issue: 2, pp. 163-169.
Microsoft Press Computer Dictionary, 3rd Edition, 1997.
Bruce Schneier, Applied Cryptography, Second Edition, Protocols, Algorithms, and Source Code in C, 1996, John Wiley & Sons, pp. 189-211.
Menezes et al., Handbook of Applied Cryptography, 1996, CRC Press, pp. 223-282.
Kakeya Satoshi
Li Jingye
C4 Technology Inc.
Cervetti David Garcia
Moazzami Nasser
Ostrolenk Faber Gerb & Soffen, LLP
LandOfFree
Encryption method, program for encryption, memory medium for... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Encryption method, program for encryption, memory medium for..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Encryption method, program for encryption, memory medium for... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3751260