Hybrid data encryption

Cryptography – Particular algorithmic function encoding

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S037000

Reexamination Certificate

active

07925009

ABSTRACT:
A method and apparatus for encrypting and decrypting data. A first block cipher encrypts data to generate a first cipher output. A first double irregular columnar transposition cipher encrypts the first cipher output to generate a second cipher output. A second block cipher encrypts the second cipher output to generate a third cipher output.

REFERENCES:
patent: 5214703 (1993-05-01), Massey et al.
patent: 5799088 (1998-08-01), Raike
patent: 6061449 (2000-05-01), Candelore et al.
patent: 6560338 (2003-05-01), Rose et al.
patent: 6999588 (2006-02-01), Oishi
patent: 7103181 (2006-09-01), Ananth
patent: 7795899 (2010-09-01), Grohoski et al.
patent: 2001/0029608 (2001-10-01), Nagashima et al.
patent: 2001/0033656 (2001-10-01), Gligor et al.
patent: 2002/0136406 (2002-09-01), Fitzhardinge et al.
patent: 2005/0177727 (2005-08-01), Moskowitz et al.
patent: 2006/0126843 (2006-06-01), Brickell et al.
patent: 2007/0076890 (2007-04-01), Muresan et al.
patent: 2007/0237327 (2007-10-01), Taylor et al.
patent: 2008/0130876 (2008-06-01), Etienne et al.
patent: 2009/0214024 (2009-08-01), Schneider
patent: 2009/0220083 (2009-09-01), Schneider
Friedrich L. Bauer, 8.Transposition Ciphers, 2000, decypted secrets, 2nded.
Transposition cipher, Wikipedia, the free encyclopedia, http://en.wikipedia.org/wiki/Transposition—cipher; accessed May 8, 2007, 8 pages.
Fauzan Mirza, “Block Ciphers and Cryptanalysis”, Mar. 1998, pp. 1-27.
Shannon, C. E, “Communication Theory of Secrecy Systems”,Bell System Technical Journal, vol. 28 (4), 1949, pp. 656-715.
“Data Encryption Standard (DES)”,Federal Information Processing Standards Publication 46-2, http://www.itl.nist.gov/fipspubs/fip46-2.htm, Dec. 30, 1993, 16 pages.
“Data Encryption Standard (DES)”,U.S. Department of Commerce/National Institute of Standards and Technology, FIPS PUB 46-3, ReaffirmedOct. 25, 1999, 26 pages.
Red Hat Office Action for U.S. Appl. No. 12/072,069 (P309) mailed Sep. 2, 2010.
Red Hat Office Action for U.S. Appl. No. 12/074,012 (P310) mailed Sep. 3, 2010.
Barker, William C., “Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher”,National Institute of Standards and Technology, Technology Administration U.S. Department of Commerce, Information Security, NIST Special Publication 800-67, Version 1.1, Revised May 19, 2008, (May 2004), 40 pages.
Fischer, Viktor , “Realization of the Round 2 AES Candidates Using Altera FPGA”, (2000), pp. 1-15.
Rose, Greg , “A Stream Cipher Based on Linear Feedback over GF(2Λ8)”, Springer-Verlag Berlin Heidelberg, C. Boyd and E. Dawson:ACISP '98, LNCSI1438, (1998), pp. 135-145.
Schneier, “Applied Cryptography”, John Wiley and Sons, 2nd Edition, (1996), p. 319.
Tan, Chih Jeng K., “The PLFG parallel pseudorandom number generator”,Future Generation computer Systemsvol. 18, Issue 5, Feb. 2002, pp. 693-698.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Hybrid data encryption does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Hybrid data encryption, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Hybrid data encryption will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2658396

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.