Cryptography – Communication system using cryptography – Symmetric key cryptography
Reexamination Certificate
2008-04-15
2008-04-15
Tran, Ellen (Department: 2134)
Cryptography
Communication system using cryptography
Symmetric key cryptography
C380S262000, C380S259000
Reexamination Certificate
active
07359515
ABSTRACT:
A symmetric-key cryptographic technique capable of realizing both high-speed cryptographic processing having a high degree of parallelism, and alteration detection. The invention includes dividing plaintext composed of redundancy data and a message to generate plaintext blocks each having a predetermined length; generating a random number sequence based on a secret key, generating a random number block corresponding to one of the plaintext blocks from the random number sequence, outputting a feedback value obtained as a result of operation on the one plaintext block and the random number block, the feedback value being fed back for using the operation on another plaintext block, and performing an encryption operation using the one plaintext block, random number block, and feedback value.
REFERENCES:
patent: 6189095 (2001-02-01), Coppersmith et al.
patent: 6345101 (2002-02-01), Shukla et al.
patent: 6351539 (2002-02-01), Djakovic
patent: 6424714 (2002-07-01), Wasilewski et al.
patent: 6708273 (2004-03-01), Ober et al.
patent: 7110545 (2006-09-01), Furuya et al.
patent: 2001/0033656 (2001-10-01), Gilgor et al.
patent: 2004/0230799 (2004-11-01), Davis
patent: 07028405 (1995-01-01), None
patent: 9160490 (1997-06-01), None
patent: 11161162 (1999-06-01), None
Cryptography: A New Dimension in Computer Data Security, p. 13-116, Feb. 10, 1986, (p. 64-109).
Integrity Aware Mode of Stream Cipher, The 2000 Symposium on Cryptography and Information Security, SCIS2000-A17, Jan. 10, 2000.
Integrity-Aware PCBC Encryption Schemes, Lecture Notes in Computer Science, vol. 1796, pp. 153-171, no date.
A Zuquete, et al Transparent Authentication and Confidentiality for Stream Sockets, IEEE Micro, vol. 16, No. 3, pp. 34-41, Jun. 1996.
D. R. Stinson, “Cryptography Theory and Practice”, 1995, pp. 1-13.
D. R. Stinson, Advances in Cryptology CRYPTO '93, 13thAnnual International Crytology Conf., Santa Barbara, CA, Aug. 22-26, 1993, pp. 5pgs.
Advances in Cryptology-Crypto, etc., no date.
The Chain & Sum Primitive and its Applications to MACs and Stream Ciphers, M. Jakubowski et al, pp. 281-293, Advances in Cryptology Crypto '98 Kaisa Nyberg (Ed.).
An Integrity Check Value Algorithm for Stream Ciphers, R. Taylor, pp. 40-48, Advances in Cryptology Crypto '93, D. Stinson (Ed.).
Algorithm Types and Modes (189-401), no date.
UMAC: Fast and Secure Message Authentication, J. Black et al, pp. 216-269, Advances in Cryptology Crypto ‘99’, M. Wiener (Ed.).
MMH: Software Message Authentication in the Gbit/Second Rates, S. Halevi et al, 172-189, Fast Software Encryption, E. Biham (Ed.), no date.
Integrity-Aware PCBC Encryption Schemes, V. Gligor, 1-13, “The 1999 Security Protocols Workshop Pre-proceedings”.
Stream ciphers based on LFSRs pp. 203-369, no date.
Keying Hash Functions for Message Authentication Mihir Bellare et al, 1-328, Advances in Cryptology Crypto '96 Neal Koblitz (Ed.).
Furuya Soichi
Kurumatani Hiroyuki
Miyazaki Kunihiko
Sato Hisayoshi
Takahashi Masashi
Hitachi , Ltd.
Mattingly ,Stanger ,Malur & Brundidge, P.C.
Tran Ellen
LandOfFree
Method and apparatus for symmetric-key decryption does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for symmetric-key decryption, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for symmetric-key decryption will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2762695