Pulse or digital communications – Repeaters – Testing
Patent
1982-09-14
1986-01-28
Cangialosi, Salvatore
Pulse or digital communications
Repeaters
Testing
178 2209, 178 2211, 178 2214, 178 2215, H04L 904
Patent
active
045676003
ABSTRACT:
A private message of m bits is conveyed from its sender to its receiver by transmission of a public message of m bits, transmission of a public reply of m bits, and another transmission of a public message of m bits such that only the intended receiver can easily recover the private message from the three public messages. This private message now available to both the sender and intended receiver also allows all subsequent private messages between these two points to require only one public message for each private message while maintaining the property that only the intended receiver of each message can easily recover the private message for each public message.
REFERENCES:
patent: 3798605 (1974-03-01), Feistel
patent: 4165444 (1979-08-01), Gordon
patent: 4200770 (1980-04-01), Hellman et al.
patent: 4208739 (1980-06-01), Lu et al.
patent: 4218582 (1980-08-01), Hellman et al.
patent: 4399323 (1983-08-01), Henry
patent: 4417338 (1983-11-01), Davida
patent: 4424414 (1984-01-01), Hellmann et al.
Data Encryption with Public Key Distribution, by Brian P. Schanning, 1979 IEEE, pp. 653-660.
Communications Privacy: Integration of Public and Secret Key Cryptography, by Kowalchuk, Schanning & Powers, 11/30/80 IEEE, pp. 49.1.1-49.1.5.
Distributed Management System of Cryptographic Keys in Communication Networks, by Okamoto, et al., 1981, pp. 421-429.
A Subexponential Algorithm for the Discrete Logarithm Problem, by L. Adllman, 1979 IEEE FOCS; pp. 55-60.
Letter by Berkovits, et al., May 1979 issue of IEEE Communications Magazine, pp. 2, 3.
The Use of Public Key Cryptography in Communication System Design, by Adelman and Rivest, pp. 20-23.
An Overview of Public Key Cryptography by Hellman, pp. 24-32, IEEE Communications Society Magazine, Nov. 1978.
Cryptography a Primer, by Alan G. Konheim, 1981, pp. 345, 346.
New Directions in Cryptography, by Diffie and Hellman, pp. 644-654, IEEE Transactions on Information Theory, vol. IT-22, No. 6, 11/76.
An Improved Algorithm for Computing Logarithms over GF(p) and its Cryptographic Significance, by Pohling and Hellman, IEEE Transactions on Information Theory, vol. IT-24, No. 1, Jan. 1978.
Massey James L.
Omura Jimmy K.
Cangialosi Salvatore
Omnet Associates
LandOfFree
Method and apparatus for maintaining the privacy of digital mess does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for maintaining the privacy of digital mess, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for maintaining the privacy of digital mess will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1310571