Method and apparatus for maintaining the privacy of digital mess

Pulse or digital communications – Repeaters – Testing

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

178 2209, 178 2211, 178 2214, 178 2215, H04L 904

Patent

active

045676003

ABSTRACT:
A private message of m bits is conveyed from its sender to its receiver by transmission of a public message of m bits, transmission of a public reply of m bits, and another transmission of a public message of m bits such that only the intended receiver can easily recover the private message from the three public messages. This private message now available to both the sender and intended receiver also allows all subsequent private messages between these two points to require only one public message for each private message while maintaining the property that only the intended receiver of each message can easily recover the private message for each public message.

REFERENCES:
patent: 3798605 (1974-03-01), Feistel
patent: 4165444 (1979-08-01), Gordon
patent: 4200770 (1980-04-01), Hellman et al.
patent: 4208739 (1980-06-01), Lu et al.
patent: 4218582 (1980-08-01), Hellman et al.
patent: 4399323 (1983-08-01), Henry
patent: 4417338 (1983-11-01), Davida
patent: 4424414 (1984-01-01), Hellmann et al.
Data Encryption with Public Key Distribution, by Brian P. Schanning, 1979 IEEE, pp. 653-660.
Communications Privacy: Integration of Public and Secret Key Cryptography, by Kowalchuk, Schanning & Powers, 11/30/80 IEEE, pp. 49.1.1-49.1.5.
Distributed Management System of Cryptographic Keys in Communication Networks, by Okamoto, et al., 1981, pp. 421-429.
A Subexponential Algorithm for the Discrete Logarithm Problem, by L. Adllman, 1979 IEEE FOCS; pp. 55-60.
Letter by Berkovits, et al., May 1979 issue of IEEE Communications Magazine, pp. 2, 3.
The Use of Public Key Cryptography in Communication System Design, by Adelman and Rivest, pp. 20-23.
An Overview of Public Key Cryptography by Hellman, pp. 24-32, IEEE Communications Society Magazine, Nov. 1978.
Cryptography a Primer, by Alan G. Konheim, 1981, pp. 345, 346.
New Directions in Cryptography, by Diffie and Hellman, pp. 644-654, IEEE Transactions on Information Theory, vol. IT-22, No. 6, 11/76.
An Improved Algorithm for Computing Logarithms over GF(p) and its Cryptographic Significance, by Pohling and Hellman, IEEE Transactions on Information Theory, vol. IT-24, No. 1, Jan. 1978.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for maintaining the privacy of digital mess does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for maintaining the privacy of digital mess, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for maintaining the privacy of digital mess will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1310571

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.