Cryptography – Key management – Having particular key generator
Reexamination Certificate
2004-08-23
2009-11-24
Korzuch, William R (Department: 2431)
Cryptography
Key management
Having particular key generator
C380S028000, C380S037000, C380S259000, C380S270000
Reexamination Certificate
active
07623658
ABSTRACT:
In a wireless communication system, a method and system for implementing the A5/3 encryption algorithm for GSM and EDGE compliant handsets are provided. Input variables may be initialized in a keystream generator and an intermediate value may be generated with a cipher key parameter and a key modifier. A number of processing blocks of output bits may be determined based on a number of bits in an output keystream. The processing blocks of output bits may be generated utilizing a KASUMI operation and may be based on an immediately previous processing block of output bits, the intermediate value, and an indication of the processing block of output bits being processed. The processing blocks of output bits may be generated after an indication that an immediately previous processing block of output bits is available and may be grouped into two final blocks of output bits in the output keystream.
REFERENCES:
patent: 5381480 (1995-01-01), Butter et al.
patent: 7184549 (2007-02-01), Sorimachi et al.
patent: 7212631 (2007-05-01), Averbuj et
patent: 2004/0047466 (2004-03-01), Feldman et al.
patent: 2004/0131180 (2004-07-01), Mazuz et al.
patent: 2004/0156499 (2004-08-01), Heo et al.
patent: 2005/0226407 (2005-10-01), Kasuya et al.
ARIB STD-T63-35.201 V4.1.0 3G Security; Specification of the 3GPP Confidentiality and Integrity Algorithms; Document 1: fO and f9 Specification (Release 4).
3GPP Organizational Partners, “3rdGeneration Partnership Project: Technical Specification Group Services and Systems Apects, 3G Security, Specification of the 3GPP Confidentiality and Integrity Algorithms, Document 2: KATSUMI Specification (Release 5)” 2002.
3GPP Organizational Partners, “3rdGeneration Partnership Project: Technical Specification Group Services and Systems Aspects, 3G Security, Specification of the A5/3 Encryption Algorithms for GSM and ECSD, and the GEA3 Encryption Algorithm for GPRS, Document 1: A5/3 and GEA3 Specifications (Release 6)” 2002.
Suen Ruei-Shiang
Surendran Srinivasan
Broadcom Corporation
Korzuch William R
McAndrews Held & Malloy Ltd.
Wright Bryan
LandOfFree
Method and system for implementing the A5/3 encryption... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and system for implementing the A5/3 encryption..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for implementing the A5/3 encryption... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4132835