Cryptography – Particular algorithmic function encoding
Reexamination Certificate
2011-04-12
2011-04-12
Smithers, Matthew B (Department: 2437)
Cryptography
Particular algorithmic function encoding
C380S037000
Reexamination Certificate
active
07925009
ABSTRACT:
A method and apparatus for encrypting and decrypting data. A first block cipher encrypts data to generate a first cipher output. A first double irregular columnar transposition cipher encrypts the first cipher output to generate a second cipher output. A second block cipher encrypts the second cipher output to generate a third cipher output.
REFERENCES:
patent: 5214703 (1993-05-01), Massey et al.
patent: 5799088 (1998-08-01), Raike
patent: 6061449 (2000-05-01), Candelore et al.
patent: 6560338 (2003-05-01), Rose et al.
patent: 6999588 (2006-02-01), Oishi
patent: 7103181 (2006-09-01), Ananth
patent: 7795899 (2010-09-01), Grohoski et al.
patent: 2001/0029608 (2001-10-01), Nagashima et al.
patent: 2001/0033656 (2001-10-01), Gligor et al.
patent: 2002/0136406 (2002-09-01), Fitzhardinge et al.
patent: 2005/0177727 (2005-08-01), Moskowitz et al.
patent: 2006/0126843 (2006-06-01), Brickell et al.
patent: 2007/0076890 (2007-04-01), Muresan et al.
patent: 2007/0237327 (2007-10-01), Taylor et al.
patent: 2008/0130876 (2008-06-01), Etienne et al.
patent: 2009/0214024 (2009-08-01), Schneider
patent: 2009/0220083 (2009-09-01), Schneider
Friedrich L. Bauer, 8.Transposition Ciphers, 2000, decypted secrets, 2nded.
Transposition cipher, Wikipedia, the free encyclopedia, http://en.wikipedia.org/wiki/Transposition—cipher; accessed May 8, 2007, 8 pages.
Fauzan Mirza, “Block Ciphers and Cryptanalysis”, Mar. 1998, pp. 1-27.
Shannon, C. E, “Communication Theory of Secrecy Systems”,Bell System Technical Journal, vol. 28 (4), 1949, pp. 656-715.
“Data Encryption Standard (DES)”,Federal Information Processing Standards Publication 46-2, http://www.itl.nist.gov/fipspubs/fip46-2.htm, Dec. 30, 1993, 16 pages.
“Data Encryption Standard (DES)”,U.S. Department of Commerce/National Institute of Standards and Technology, FIPS PUB 46-3, ReaffirmedOct. 25, 1999, 26 pages.
Red Hat Office Action for U.S. Appl. No. 12/072,069 (P309) mailed Sep. 2, 2010.
Red Hat Office Action for U.S. Appl. No. 12/074,012 (P310) mailed Sep. 3, 2010.
Barker, William C., “Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher”,National Institute of Standards and Technology, Technology Administration U.S. Department of Commerce, Information Security, NIST Special Publication 800-67, Version 1.1, Revised May 19, 2008, (May 2004), 40 pages.
Fischer, Viktor , “Realization of the Round 2 AES Candidates Using Altera FPGA”, (2000), pp. 1-15.
Rose, Greg , “A Stream Cipher Based on Linear Feedback over GF(2Λ8)”, Springer-Verlag Berlin Heidelberg, C. Boyd and E. Dawson:ACISP '98, LNCSI1438, (1998), pp. 135-145.
Schneier, “Applied Cryptography”, John Wiley and Sons, 2nd Edition, (1996), p. 319.
Tan, Chih Jeng K., “The PLFG parallel pseudorandom number generator”,Future Generation computer Systemsvol. 18, Issue 5, Feb. 2002, pp. 693-698.
Blakely , Sokoloff, Taylor & Zafman LLP
Red Hat, Inc.
Sholeman Abu
Smithers Matthew B
LandOfFree
Hybrid data encryption does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Hybrid data encryption, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Hybrid data encryption will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2658396