Method and system for enhancing cryptography-based security

Cryptography – Key management – Having particular key generator

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S046000

Reexamination Certificate

active

07602911

ABSTRACT:
As part of a cryptographic protocol, or in addition to it, a computer may participate in a cryptographic key generation protocol. The cryptographic key generation protocol may be such that it generates a set of bits sufficient for a cryptographic key and, also, one or more additional bits. The cryptographic protocol may have one or more parameters, and the parameters of the cryptographic protocol may be varied as a function of the additional bits generated by the cryptographic key generation protocol. The cryptographic protocol may specify a set of one or more cryptographic key sizes. An overkey may be generated that is at least one bit greater than the set of cryptographic key sizes specified by the cryptographic protocol. The parameters of the cryptographic protocol may then be varied as a function of some subset of bits of the overkey. Cryptography-based security may thus be enhanced.

REFERENCES:
patent: 4203166 (1980-05-01), Ehrsam et al.
patent: 4227253 (1980-10-01), Ehrsam et al.
patent: 5347580 (1994-09-01), Molva et al.
patent: 6292896 (2001-09-01), Guski et al.
patent: 6535607 (2003-03-01), Chandersekaran et al.
patent: 7096505 (2006-08-01), Vasudevan et al.
patent: 2002/0131590 (2002-09-01), Henson et al.
patent: 2003/0044020 (2003-03-01), Aboba et al.
patent: 2003/0135464 (2003-07-01), Mourad et al.
patent: 2004/0049585 (2004-03-01), Swander
patent: 2005/0111666 (2005-05-01), Blom et al.
Anonymous, “Announcing the Advanced Encryption Standard (AES),”Federal Information Processing Standards Publication197, pp. 1-51, National Institute of Standards and Technology (Nov. 2001).
Dierks et al., “The TLS Protocol,”Network Working Group RFC 2246, pp. 1-80, Version 1.0, The Internet Society (Jan. 1999).
Knuth, D., “Random Numbers,”The Art of Computer Programming, vol. 2: Seminumerical Algorithms, Chapter 3, Second Edition, Addison Wesley (1982).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and system for enhancing cryptography-based security does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and system for enhancing cryptography-based security, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for enhancing cryptography-based security will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4055915

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.