Cryptography – Particular algorithmic function encoding – Public key
Reexamination Certificate
2007-06-26
2007-06-26
Zand, Kambiz (Department: 2134)
Cryptography
Particular algorithmic function encoding
Public key
C380S284000, C713S171000
Reexamination Certificate
active
09737046
ABSTRACT:
A data structure to be used for representing the problem is selected. An instance of the problem is represented with the data structure. The data is encrypted with a sequence which is obtained by solving the problem. Alternatively, in an alternative embodiment of the present invention, a program for heuristically solving an NP-hard problem is received. A data structure that represents an instance of the problem is received. The program is applied to the instance of the problem to obtain a sequence. The data is decrypted with the sequence.
REFERENCES:
patent: 4926479 (1990-05-01), Goldwasser et al.
patent: 5249295 (1993-09-01), Briggs et al.
patent: 5892899 (1999-04-01), Aucsmith et al.
patent: 5991408 (1999-11-01), Pearson et al.
patent: 6823068 (2004-11-01), Samid
Chor, Benny et al. “A Knapsack-Type Public Key Cryptosystem Based on Arithmetic in Finite Fields”, 1988 IEEE.
Cooper, Rodney H. “A More Efficient Public-Key Cryptosystem Using The Pascal Triangle”, 1989 IEEE.
Coutinho, S.C. The Mathematics of ciphers: number theority and RSA cryptography, 1999 AK Peters, Ltd., pp. 1-5 & 163-173.
Dakin, Robert. “The Travelling Salesman Problem”, 1997 <http://web.archive.org/web/*/http://www.pcug.org.au/˜dakin/tsp.htm>.
Desmedt, Yvo G. et al. “A Critical Analysis of the Security of Knapsack Pulic-Key Algorithms”, 1984 IEEE.
Management Science Modeling. “Mgmt Science Modeling Glossary”, Mar. 1999.
Menezes et al. Handbook of Applied Cryptography, 1997 CRC Press LLC, §8.6 and §13.3.
Mertens, Stephan. “Construction Heuristics”, May 1999 <http://itp.nat.uni-magdeburg.de/˜mertens/TSP
ode2.html>.
Microsoft. “Computer Dictionary, Third Edition”, 1997 Microsoft Press, p. 133.
Schneir, Bruce. Applied Cryptography, Second Edition, 1996 John Wiley & Sons, pp. 151-155.
Trick, Michael A. “Heuristic Problem Solving”, Oct. 1996, <http://mat.gsia.cmu.edu/mstc/heurnote
ode5.html>.
Aronsson, Hannu A. “Zero Knowledge Protocols and Small Systems”, Aug. 2000, <http://web.archive.org/web/20000831005309/http://www.tml.hut.fi/Opinnot/Tik-110.501/1995/zeroknowledge.html>.
British War Office (BWO). Manual Of Cryptography, 1997 Aegean Park Press (reproduction of classical, historical document, c. 1914), pp. 93-94.
Lange, Larry. “More NT Security Woes”, Apr. 1997, <http://www.pa.msu.edu/˜hamlin/facts/0416hack.html>.
Lucks, Stefan. “How to Exploit the Intractability of Exact TSP for Cryptography”, 1994.
Lucks, Stefan. “How Traveling Salespersons Prove Their Identity”, IMA Conf. 1995, 142-149.
McNett, David. “Secure Encryption Challenged by Internet-Linked Computers”, Oct. 1997, <http://www.distributed.net/pressroom/56-PR.html>.
Nechvatal, James. “Public-Key Cryptography”, Dec. 1990, <http://www.totse.com/en/privacy/encryption/165728.html>.
Ryan, Mark Dermot. “Zero Knowledge Protocols”, <http://www.cs.bham.ac.uk/˜mdr/teaching/modules03/security/students/SS2/handout.htm>.
Schneier, Bruce. Applied Cryptography, Second Edition, 1996 John Wiley & Sons, pp. 47-49 & 176-177.
Venkatesan, Ramarathnam et al. “Random Instances of a Graph Coloring Problem are Hard”, 1988 ACM.
Wikipedia. “Zero-knowledge proof”, <http://en.wikipedia.org/wiki/Zero-knowledge—proof>.
Foldoc. Definition: “knapsack problem”, 1995.
Menezes, Alfred J. et al. Handbook of Applied Cryptography, 1997 CRC Press, pp. 11-14, 59-62, 300-306.
NIST. Definition: “intractable”, <http://www.nist.gov/dads/HTML/intratable.html>.
Schneier, Bruce. Applied Cryptography, Second Edition, 1996 John Wiley & Sons, pp. 2-5, 13-15, 21-22, 47-49, 176-177.
Bhattacharya Prabir
Perkins Gregory Michael
Matsushita Electric - Industrial Co., Ltd.
RatnerPrestia
Simitoski Michael J.
Zand Kambiz
LandOfFree
Method and apparatus for protecting data does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for protecting data, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for protecting data will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3826759