Cryptography – Key management – Having particular key generator
Reexamination Certificate
2005-03-14
2009-10-13
Kim, Jung (Department: 2432)
Cryptography
Key management
Having particular key generator
C380S046000
Reexamination Certificate
active
07602911
ABSTRACT:
As part of a cryptographic protocol, or in addition to it, a computer may participate in a cryptographic key generation protocol. The cryptographic key generation protocol may be such that it generates a set of bits sufficient for a cryptographic key and, also, one or more additional bits. The cryptographic protocol may have one or more parameters, and the parameters of the cryptographic protocol may be varied as a function of the additional bits generated by the cryptographic key generation protocol. The cryptographic protocol may specify a set of one or more cryptographic key sizes. An overkey may be generated that is at least one bit greater than the set of cryptographic key sizes specified by the cryptographic protocol. The parameters of the cryptographic protocol may then be varied as a function of some subset of bits of the overkey. Cryptography-based security may thus be enhanced.
REFERENCES:
patent: 4203166 (1980-05-01), Ehrsam et al.
patent: 4227253 (1980-10-01), Ehrsam et al.
patent: 5347580 (1994-09-01), Molva et al.
patent: 6292896 (2001-09-01), Guski et al.
patent: 6535607 (2003-03-01), Chandersekaran et al.
patent: 7096505 (2006-08-01), Vasudevan et al.
patent: 2002/0131590 (2002-09-01), Henson et al.
patent: 2003/0044020 (2003-03-01), Aboba et al.
patent: 2003/0135464 (2003-07-01), Mourad et al.
patent: 2004/0049585 (2004-03-01), Swander
patent: 2005/0111666 (2005-05-01), Blom et al.
Anonymous, “Announcing the Advanced Encryption Standard (AES),”Federal Information Processing Standards Publication197, pp. 1-51, National Institute of Standards and Technology (Nov. 2001).
Dierks et al., “The TLS Protocol,”Network Working Group RFC 2246, pp. 1-80, Version 1.0, The Internet Society (Jan. 1999).
Knuth, D., “Random Numbers,”The Art of Computer Programming, vol. 2: Seminumerical Algorithms, Chapter 3, Second Edition, Addison Wesley (1982).
Corbett Christopher J.
Hassan Amer A.
Kim Jung
Microsoft Corporation
Perungavoor Venkat
Wolf Greenfield & Sacks P.C.
LandOfFree
Method and system for enhancing cryptography-based security does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and system for enhancing cryptography-based security, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for enhancing cryptography-based security will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4055915