Hierarchical key management encoding and decoding

Cryptography – Key management

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S030000, C380S044000, C380S045000, C380S239000, C380S283000, C380S286000, C380S273000, C713S152000, C713S156000, C713S165000, C713S166000, C705S051000, C705S077000

Reexamination Certificate

active

06907127

ABSTRACT:
The present invention discloses a construction for key management module functionality which provides for secure encoding and decoding of messages which are up to two blocks long. A method for generating an encoded value having a first encoded value part and a second encoded value part from an unencoded value having a first unencoded value part and a second unencoded value part, comprising the steps of: obtaining an initialization vector; and generating the first and second encoded value parts. The first encoded value part is generated by: generating a first result by encrypting the first unencoded value part; generating a second result by performing an exclusive or operation on the first result and the second unencoded value part; generating a third result by performing an exclusive or operation on the second result and the initialization vector; generating a fourth result by encrypting the third result; generating a fifth result by performing an exclusive or operation on the fourth result and the first unencoded value part; and encrypting the fifth result. The second encoded value part is generated by encrypting the second result.

REFERENCES:
patent: 4888801 (1989-12-01), Foster et al.
patent: 5345508 (1994-09-01), Lynn et al.
patent: 5381480 (1995-01-01), Butter et al.
patent: 5796836 (1998-08-01), Markham
patent: 5887251 (1999-03-01), Fehnel
patent: 5917911 (1999-06-01), Dabbish et al.
patent: 5995625 (1999-11-01), Sudia et al.
patent: 6055316 (2000-04-01), Perlman et al.
patent: 6301362 (2001-10-01), Matyas et al.
patent: 6333983 (2001-12-01), Enichen et al.
patent: 2002/0101989 (2002-08-01), Markandey et al.
patent: 0725511 (1994-11-01), None
patent: 0625845 (1996-01-01), None
Bruce Schneier, “Applied Crytography, protocols, Algorithms, and source code in c” 1996, John Wiley & Son, Inc. 2rd edition, pp. 189-197.
Shigeta et al. , “A Fine-Grained Protection Mechanism in Object-based Operating Systems”, 1996, Proceeding of IWOOOS, p. 156-160.
Lu et al., “Enhanced Protocols for Hierarchical Encryption Key Management for Secure Communication in Internet Environment:”, Apr. 1992, IEEE Transactions on Communication vol. 40, No. 4, pp. 658-660.
Stubblebine et al., “On Message Integrity in Cryptographic Protocols”, 1992, IEEE, p. 85-104.
Hellman, “A Cryptanalytic Time—Memory Trade Off”, Jul. 1980, IEEE Transactions on Information Theory, vol. IT 26, No. 4, pp. 401-406.
Coppersmith et al., “Attacks on MacDES MAC algorithm”, Sep., 1999, Electronic Letters, vol. 35, No. 19, pp. 1626-1627.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Hierarchical key management encoding and decoding does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Hierarchical key management encoding and decoding, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Hierarchical key management encoding and decoding will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3493757

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.