Method and apparatus for protecting data

Cryptography – Particular algorithmic function encoding – Public key

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S284000, C713S171000

Reexamination Certificate

active

09737046

ABSTRACT:
A data structure to be used for representing the problem is selected. An instance of the problem is represented with the data structure. The data is encrypted with a sequence which is obtained by solving the problem. Alternatively, in an alternative embodiment of the present invention, a program for heuristically solving an NP-hard problem is received. A data structure that represents an instance of the problem is received. The program is applied to the instance of the problem to obtain a sequence. The data is decrypted with the sequence.

REFERENCES:
patent: 4926479 (1990-05-01), Goldwasser et al.
patent: 5249295 (1993-09-01), Briggs et al.
patent: 5892899 (1999-04-01), Aucsmith et al.
patent: 5991408 (1999-11-01), Pearson et al.
patent: 6823068 (2004-11-01), Samid
Chor, Benny et al. “A Knapsack-Type Public Key Cryptosystem Based on Arithmetic in Finite Fields”, 1988 IEEE.
Cooper, Rodney H. “A More Efficient Public-Key Cryptosystem Using The Pascal Triangle”, 1989 IEEE.
Coutinho, S.C. The Mathematics of ciphers: number theority and RSA cryptography, 1999 AK Peters, Ltd., pp. 1-5 & 163-173.
Dakin, Robert. “The Travelling Salesman Problem”, 1997 <http://web.archive.org/web/*/http://www.pcug.org.au/˜dakin/tsp.htm>.
Desmedt, Yvo G. et al. “A Critical Analysis of the Security of Knapsack Pulic-Key Algorithms”, 1984 IEEE.
Management Science Modeling. “Mgmt Science Modeling Glossary”, Mar. 1999.
Menezes et al. Handbook of Applied Cryptography, 1997 CRC Press LLC, §8.6 and §13.3.
Mertens, Stephan. “Construction Heuristics”, May 1999 <http://itp.nat.uni-magdeburg.de/˜mertens/TSP
ode2.html>.
Microsoft. “Computer Dictionary, Third Edition”, 1997 Microsoft Press, p. 133.
Schneir, Bruce. Applied Cryptography, Second Edition, 1996 John Wiley & Sons, pp. 151-155.
Trick, Michael A. “Heuristic Problem Solving”, Oct. 1996, <http://mat.gsia.cmu.edu/mstc/heurnote
ode5.html>.
Aronsson, Hannu A. “Zero Knowledge Protocols and Small Systems”, Aug. 2000, <http://web.archive.org/web/20000831005309/http://www.tml.hut.fi/Opinnot/Tik-110.501/1995/zeroknowledge.html>.
British War Office (BWO). Manual Of Cryptography, 1997 Aegean Park Press (reproduction of classical, historical document, c. 1914), pp. 93-94.
Lange, Larry. “More NT Security Woes”, Apr. 1997, <http://www.pa.msu.edu/˜hamlin/facts/0416hack.html>.
Lucks, Stefan. “How to Exploit the Intractability of Exact TSP for Cryptography”, 1994.
Lucks, Stefan. “How Traveling Salespersons Prove Their Identity”, IMA Conf. 1995, 142-149.
McNett, David. “Secure Encryption Challenged by Internet-Linked Computers”, Oct. 1997, <http://www.distributed.net/pressroom/56-PR.html>.
Nechvatal, James. “Public-Key Cryptography”, Dec. 1990, <http://www.totse.com/en/privacy/encryption/165728.html>.
Ryan, Mark Dermot. “Zero Knowledge Protocols”, <http://www.cs.bham.ac.uk/˜mdr/teaching/modules03/security/students/SS2/handout.htm>.
Schneier, Bruce. Applied Cryptography, Second Edition, 1996 John Wiley & Sons, pp. 47-49 & 176-177.
Venkatesan, Ramarathnam et al. “Random Instances of a Graph Coloring Problem are Hard”, 1988 ACM.
Wikipedia. “Zero-knowledge proof”, <http://en.wikipedia.org/wiki/Zero-knowledge—proof>.
Foldoc. Definition: “knapsack problem”, 1995.
Menezes, Alfred J. et al. Handbook of Applied Cryptography, 1997 CRC Press, pp. 11-14, 59-62, 300-306.
NIST. Definition: “intractable”, <http://www.nist.gov/dads/HTML/intratable.html>.
Schneier, Bruce. Applied Cryptography, Second Edition, 1996 John Wiley & Sons, pp. 2-5, 13-15, 21-22, 47-49, 176-177.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for protecting data does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for protecting data, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for protecting data will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3826759

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.