Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2007-11-20
2007-11-20
Moazzami, Nasser (Department: 2136)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C380S028000, C380S030000, C380S229000, C380S232000, C708S710000, C708S711000, C708S712000, C708S252000
Reexamination Certificate
active
10042019
ABSTRACT:
Provided is an architecture (hardware implementation) for an authentication engine to increase the speed at which SHA1 multi-loop and/or multi-round authentication algorithms may be performed on data packets transmitted over a computer network. As described in this application, the invention has particular application to the variant of the SHA1 authentication algorithms specified by the IPSec cryptography standard. In accordance with the IPSec standard, the invention may be used in conjunction with data encryption/encryption architecture and protocols. However it is also suitable for use in conjunction with other non-IPSec cryptography algorithms, and for applications in which encryption/decryption is not conducted (in IPSec or not) and where it is purely authentication that is accelerated. Among other advantages, an authentication engine in accordance with the present invention provides improved performance with regard to the processing of short data packets.
REFERENCES:
patent: 5276635 (1994-01-01), Naini et al.
patent: 5297206 (1994-03-01), Orton
patent: 5299319 (1994-03-01), Vassiliadis et al.
patent: 5375081 (1994-12-01), Anderson
patent: 5548544 (1996-08-01), Matheny et al.
patent: 5796836 (1998-08-01), Markham
patent: 5870474 (1999-02-01), Wasilewski et al.
patent: 5877973 (1999-03-01), Kato et al.
patent: 5936967 (1999-08-01), Baldwin et al.
patent: 5940877 (1999-08-01), Eickemeyer et al.
patent: 5943338 (1999-08-01), Duclose et al.
patent: 5951631 (1999-09-01), Hwang
patent: 6111858 (2000-08-01), Greaves et al.
patent: 6216167 (2001-04-01), Momirov
patent: 6304657 (2001-10-01), Yokota et al.
patent: 6334190 (2001-12-01), Silverbrook et al.
patent: 2001/0021253 (2001-09-01), Furuya et al.
patent: 2003/0145033 (2003-07-01), Bradley et al.
patent: WO 01/80483 (2001-10-01), None
Sait, S.M.; Farooqui, A.A.; Beckhoff, G.F.; A novel technique for fast multiplication, Computers and Communications, Conference Proceedings of the 1995 IEEE Fourteenth Annual International Phoenix Conference on Mar. 28-31, 1995 pp. 109-114.
Hao-Yung Lo; Sha-Fen Ling; Chun-Ming Shie; A high-speed of self-timing carry-completion for direct two's complement multipliers, Circuits and Systems IEEE APCCAS 1998. The 1998 IEEE Asia-Pacific Conference on Nov. 24-27, 1998 pp. 643-646.
Ragab, A.H.M.; Ismail, N.A.; Allah, O.S.F.; An efficient message digest algorithm (MD) for data security, Electrical and Electronic Technology, TENCON. Proceedings of IEEE Region 10 international Conference on vol. 1, Aug. 19-22, 2001 pp. 191-197.
Deepakumara, J.; Heys, H.M.; Venkatesan, R.; FPGA implementation of MD5 hash algorithm Electrical and Computer Engineering, 2001. Canadian Conference on May 13-16, 2001 pp. 919-924 vol. 2.
Yong Kyu Kang, Dae Won Kim, Taek Won Kwon, and Jun Rim Choi; “An Efficient Implementation of Hash Function Processor for IPSEC”; ACM 2000; pp. 1-4.
Ravichandran Ramachandran and Shih-Lien Lu; “Carry Logic”; 1999 by John Wiley & Sons, Inc; pp. 49-54.
“Applied Cryptography, Second Edition”, Schneider, B., 1996, John Wiley & Sons, New York, XP002184521, cited in the application, p. 442, paragraph 18.7—p. 445.
“SHA: The Secure Hash Algorithm Putting Message Digests to Work”, Stallings, W., Dr. Dobbs Journal, Redwood City, CA, Apr. 1, 1994, p. 32-34, XP000570561.
Schneier B, “Applied Cryptography, Second Edition”, 1996, John Wiley & Sons, New York US XP002184521, pp. 436-445.
Stallings W., “SHA: The Secure Hash Algorithm Putting Message Digests to Work”, Dr. Dobbs Journal, Redwood City, CA, US, Apr. 1, 1994, XP00570561, p. 32-33.
Analog Devices: “ADSP2141 SafeNetDPS User's Manual, Revision 6” Analog Devices Technical Specifications, Mar. 2000, XP002163401, 87 Pages.
C. Madson, R. Glenn: “RFC 2403- The Use of HMAC-MD5-96 within ESP and AH”, IETF Request for Comments, Nov. 1998, XP002163402, Retrieved from Internet on Mar. 20, 2001, http://www.faqs.org/rfcs/frc2403.html, 87 Pages.
S. Kent, R. Atkinson: “RFC 2406-IP Encapsulating Security Payload (ESP)” IETF Request for Comments, Nov. 1998, XP002163400, Retrieved from the Internet on Mar. 20, 2001, http://www.faqs.org/rfcs/frc2406.html, 5 Pages.
Keromytis, et al., “Implementing IPsec”, Global Telecommunications Conference (Globecom), IEEE, Nov. 3, 1997, pp. 1948-1952.
Pierson, et al., “Context-Agile Encryption for High Speed Communication Networks”, Computer Communications Review, Association for Computing Machinery, vol. 29, No. 1, Jan. 1999, pp. 35-49.
Sholander, et al., “The Effect of Algorithm-Agile Encryption on ATM Quality of Service”, Global Telecommunications Conference (Globecom), IEEE, Nov. 3, 1997, pp. 470-474.
Smirni, et al., “Evaluation of Multiprocessor Allocation Policies,” Technical Report, Vanderbilt University, Online, 1993, pp. 1-21.
Tarman, et al., “Algorithm-Agile Encryption in ATM Networks”, IEEE Computer, Sep. 1998, vol. 31, No. 1, pp. 57-64.
Wassal, et al., “A VLSI Architecture for ATM Algorithm-Agile Encryption”, Proceedings Ninth Great Lakes Symposium on VLSI, Mar. 4-6, 1999, pp. 325-328.
Analog Devices: “Analog Devices and IRE Announce First DSP-Based Internet Security System-On-A-Chip”, Analog Devices Press Release, Online, Jan. 19, 1999, pp. 1-3. http://content.analog.com/pressrelease/prdisplay/0,1622,16,00.html.
3Com: “3Com Launces New Era of Network Connectivity”, 3Com Press Release, Jun. 14, 1999, pp. 1-3.
“Secure Products VMS115”, VLSI Technology, Inc., Printed in USA, Document Control: VMS115, VI, 0, Jan. 99, pp. 1-2.
“VMS115 Data Sheet”, VLSI Technology, Inc., a subsidiary of Philips Semiconductors, Revision 2:3, Aug. 10, 1999, pp. 1-64.
“Data Sheet 7751 Encryption Processor”, Network Security Processors, Jun. 1999, pp. 1-84.
Senie, D., “NAT Friendly Application Design Guidelines”, Amaranth Networks, Inc., NAT Working Group, Internet-Draft, Sep. 1999, pp. 1-7.
Floyd, Sally, et al., “Random Early Detection Gateways for Congestion Avoidance”, Lawrence Berkeley Laboratory, University of California, IEEE/ACM Transactions on Networking, Aug. 1993, pp. 1-32.
Egevang, K., et al., “The IP Network Address Translator (NAT)”, Network Working Group, May 1994, pp. 1-10.
Pall, G. S., et al., “Microsoft Point-To-Point Encryption (MPPE) Protocol”, Microsoft Corporation, Network Working Group, Internet Draft, Oct. 1999, pp. 1-12.
Deutsch, P., “DEFLATE Compressed Data Format Specification Version 1.3”, Aladdin Enterprises, Network Working Group, May 1996, pp. 1-17.
Kent, S., “IP Authentication Header”, Network Working Group, Nov. 1998, pp. 1-22.
Kent, S., et al., “IP Encapsulating Security Payload (ESP)”, Network Working Group, Nov. 1998, pp. 1-22.
Maughan, D, et al., “Internet Security Association and Key Management Protocol (ISAKMP)”, Network Working Group, Nov. 1998, pp. 1-20.
Harkins, D., et al., “The Internet Key Exchange (IKE)”, Cisco Systems, Network Working Group, Nov. 1998, pp. 1-12.
Srisuresh, P., “Security Model with Tunnel-mode Ipsec for NAT Domains”, Lucent Technologies, Network Working Group, Oct. 1999, pp. 1-11.
Shenker, S., “Specification of Guaranteed Quality of Service”, Network Working Group, Sep. 1997, pp. 1-20.
Srisuresh, P., et al., “IP Network Address Translator (NAT) Terminology and Considerations”, Lucent Technologies, Network Working Group, Aug. 1999, pp. 1-30.
Kent, S., et al., “Security Architecture for the Internet Protocol”, Network Working Group, Nov. 1998, pp. 1-66.
“Compression for Broadband Data Communications”, BlueSteel Networks, Inc., Sep. 8, 1999, pp. 1-9.
“Securing and Accelerating e-Commerce Transactions”, BlueSteel Networks, Inc., Revision 2.0, Oct. 20, 1999, pp. 1-7.
“Securing Broadband C
Broadcom Corporation
Colin Carl
Moazzami Nasser
Sterne Kessler Goldstein & Fox P.L.L.C.
LandOfFree
Fast SHA1 implementation does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Fast SHA1 implementation, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Fast SHA1 implementation will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3848255