Cryptography – Key management
Reexamination Certificate
2005-06-14
2005-06-14
Morse, Gregory (Department: 2134)
Cryptography
Key management
C380S030000, C380S044000, C380S045000, C380S239000, C380S283000, C380S286000, C380S273000, C713S152000, C713S156000, C713S165000, C713S166000, C705S051000, C705S077000
Reexamination Certificate
active
06907127
ABSTRACT:
The present invention discloses a construction for key management module functionality which provides for secure encoding and decoding of messages which are up to two blocks long. A method for generating an encoded value having a first encoded value part and a second encoded value part from an unencoded value having a first unencoded value part and a second unencoded value part, comprising the steps of: obtaining an initialization vector; and generating the first and second encoded value parts. The first encoded value part is generated by: generating a first result by encrypting the first unencoded value part; generating a second result by performing an exclusive or operation on the first result and the second unencoded value part; generating a third result by performing an exclusive or operation on the second result and the initialization vector; generating a fourth result by encrypting the third result; generating a fifth result by performing an exclusive or operation on the fourth result and the first unencoded value part; and encrypting the fifth result. The second encoded value part is generated by encrypting the second result.
REFERENCES:
patent: 4888801 (1989-12-01), Foster et al.
patent: 5345508 (1994-09-01), Lynn et al.
patent: 5381480 (1995-01-01), Butter et al.
patent: 5796836 (1998-08-01), Markham
patent: 5887251 (1999-03-01), Fehnel
patent: 5917911 (1999-06-01), Dabbish et al.
patent: 5995625 (1999-11-01), Sudia et al.
patent: 6055316 (2000-04-01), Perlman et al.
patent: 6301362 (2001-10-01), Matyas et al.
patent: 6333983 (2001-12-01), Enichen et al.
patent: 2002/0101989 (2002-08-01), Markandey et al.
patent: 0725511 (1994-11-01), None
patent: 0625845 (1996-01-01), None
Bruce Schneier, “Applied Crytography, protocols, Algorithms, and source code in c” 1996, John Wiley & Son, Inc. 2rd edition, pp. 189-197.
Shigeta et al. , “A Fine-Grained Protection Mechanism in Object-based Operating Systems”, 1996, Proceeding of IWOOOS, p. 156-160.
Lu et al., “Enhanced Protocols for Hierarchical Encryption Key Management for Secure Communication in Internet Environment:”, Apr. 1992, IEEE Transactions on Communication vol. 40, No. 4, pp. 658-660.
Stubblebine et al., “On Message Integrity in Cryptographic Protocols”, 1992, IEEE, p. 85-104.
Hellman, “A Cryptanalytic Time—Memory Trade Off”, Jul. 1980, IEEE Transactions on Information Theory, vol. IT 26, No. 4, pp. 401-406.
Coppersmith et al., “Attacks on MacDES MAC algorithm”, Sep., 1999, Electronic Letters, vol. 35, No. 19, pp. 1626-1627.
Goldshlag David Moshe
Kravitz David William
Digital Video Express, L.P.
Grossman David G.
Morse Gregory
Tran Tongoc
LandOfFree
Hierarchical key management encoding and decoding does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Hierarchical key management encoding and decoding, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Hierarchical key management encoding and decoding will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3493757