Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Patent
1998-04-20
2000-10-03
Hayes, Gail O.
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
380 37, 380259, 380 28, 380 29, 713170, H04L 908
Patent
active
061287377
ABSTRACT:
A cryptographic technique that not only provides fast and extremely secure encryption and decryption but also assures integrity of a ciphertext message. This technique involves, during message encryption: generating, in response to an incoming plaintext message, an intermediate stream--such as by chaining the message, wherein a predefined portion of the intermediate stream defines a message authentication code (MAC); inserting an encrypted version of the MAC into a predefined portion of a ciphertext message; and generating, in response to the intermediate stream and the encrypted MAC, a remainder of the ciphertext message such that the remainder exhibits a predefined variation, e.g., a pseudo-random sequence, also contained within the encrypted MAC. Decryption proceeds in essentially a reverse fashion. By extending the sequence across the remainder of the ciphertext, any subsequent change to the ciphertext would likely destroy the continuity of the sequence otherwise residing throughout the remainder of the ciphertext. During decryption, any violation to the integrity of the ciphertext can be readily detected by decrypting the MAC contained in the ciphertext and comparing it, for any discrepancies, against a MAC generated from recovered plaintext.
REFERENCES:
patent: 4890323 (1989-12-01), Beker et al.
patent: 4918728 (1990-04-01), Matyas et al.
patent: 5671283 (1997-09-01), Michener et al.
patent: 5673319 (1997-09-01), Bellare et al.
U.S. application No. 09/062,836, Mariusz Jakubowski, filed Apr. 20, 1998.
K. Kaukonen et al, "A Stream Cipher Encryption Algorithm `Arcfour` ", IETF Internet Draft, Network Working Group, Jul. 1997, pp. 1-11.
W. A. Simpson, "ESP with Cipher Block Checksums (CBCS)", IETF Internet Draft, Network Working Group, Jul. 1997, pp. 1-9.
R. Thayer, "A Stream Cipher Encryption Algorithm", IETF Internet Draft, Network Working Group, Apr. 1997, pp. 1-8.
B. Schneier, Applied Cryptography, Second Edition, pp. 197-198 (.COPYRGT. 1996, J.W. Wiley & Sons, Inc.).
G. J. Simmons (ed.), Contemporary Cryptology--The Science of Information Integrity, Chapter 2, "Block Ciphers and Stream Ciphers", pp. 13-112 (.COPYRGT. 1992, IEEE Press).
C. H. Meyer et al, Cryptography: A New Dimension in Computer Data Security--A Guide for the Design and Implementation of Secure Systems, Chapter 2, "Stream Ciphers", pp. 65-134, (.COPYRGT. 1982, John Wiley & Sons, Inc.).
Schneier, Bruce. "Applied Cryptography: Protocols, Algorithms, and Source Code in C". pp. 30-31 and 455-459.
Jakubowski Mariusz H.
Venkatesan Ramarathnam
Hayes Gail O.
Michaelson Peter L.
Microsoft Corporation
Tucker Christopher M.
LandOfFree
Method and apparatus for producing a message authentication code does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for producing a message authentication code, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for producing a message authentication code will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-205781