Method and apparatus for producing a message authentication code

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 37, 380259, 380 28, 380 29, 713170, H04L 908

Patent

active

061287377

ABSTRACT:
A cryptographic technique that not only provides fast and extremely secure encryption and decryption but also assures integrity of a ciphertext message. This technique involves, during message encryption: generating, in response to an incoming plaintext message, an intermediate stream--such as by chaining the message, wherein a predefined portion of the intermediate stream defines a message authentication code (MAC); inserting an encrypted version of the MAC into a predefined portion of a ciphertext message; and generating, in response to the intermediate stream and the encrypted MAC, a remainder of the ciphertext message such that the remainder exhibits a predefined variation, e.g., a pseudo-random sequence, also contained within the encrypted MAC. Decryption proceeds in essentially a reverse fashion. By extending the sequence across the remainder of the ciphertext, any subsequent change to the ciphertext would likely destroy the continuity of the sequence otherwise residing throughout the remainder of the ciphertext. During decryption, any violation to the integrity of the ciphertext can be readily detected by decrypting the MAC contained in the ciphertext and comparing it, for any discrepancies, against a MAC generated from recovered plaintext.

REFERENCES:
patent: 4890323 (1989-12-01), Beker et al.
patent: 4918728 (1990-04-01), Matyas et al.
patent: 5671283 (1997-09-01), Michener et al.
patent: 5673319 (1997-09-01), Bellare et al.
U.S. application No. 09/062,836, Mariusz Jakubowski, filed Apr. 20, 1998.
K. Kaukonen et al, "A Stream Cipher Encryption Algorithm `Arcfour` ", IETF Internet Draft, Network Working Group, Jul. 1997, pp. 1-11.
W. A. Simpson, "ESP with Cipher Block Checksums (CBCS)", IETF Internet Draft, Network Working Group, Jul. 1997, pp. 1-9.
R. Thayer, "A Stream Cipher Encryption Algorithm", IETF Internet Draft, Network Working Group, Apr. 1997, pp. 1-8.
B. Schneier, Applied Cryptography, Second Edition, pp. 197-198 (.COPYRGT. 1996, J.W. Wiley & Sons, Inc.).
G. J. Simmons (ed.), Contemporary Cryptology--The Science of Information Integrity, Chapter 2, "Block Ciphers and Stream Ciphers", pp. 13-112 (.COPYRGT. 1992, IEEE Press).
C. H. Meyer et al, Cryptography: A New Dimension in Computer Data Security--A Guide for the Design and Implementation of Secure Systems, Chapter 2, "Stream Ciphers", pp. 65-134, (.COPYRGT. 1982, John Wiley & Sons, Inc.).
Schneier, Bruce. "Applied Cryptography: Protocols, Algorithms, and Source Code in C". pp. 30-31 and 455-459.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for producing a message authentication code does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for producing a message authentication code, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for producing a message authentication code will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-205781

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.