Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2008-06-24
2008-06-24
Moazzami, Nasser (Department: 2136)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S181000, C380S044000, C380S255000, C380S277000, C380S278000, C380S280000
Reexamination Certificate
active
07392384
ABSTRACT:
A system and method are described supporting secure implementations of 3DES and other strong cryptographic algorithms. A secure key block having control, key, and MAC fields safely stores or transmits keys in insecure or hostile environments. The control field provides attribute information such as the manner of using a key, the algorithm to be implemented, the mode of use, and the exportability of the key. A MAC algorithm is applied across the key and control for generating a MAC field that cryptographically ties the control and key fields together. Improved security is provided because tampering with any portion of the key block results in an invalid key block. The work factor associated with any manner of attack is sufficient to maintain a high level of security consistent with the large keys and strong cryptographic algorithms supported.
REFERENCES:
patent: 4918728 (1990-04-01), Matyas et al.
patent: 4941176 (1990-07-01), Matyas et al.
patent: 5200999 (1993-04-01), Matyas et al.
patent: 6947556 (2005-09-01), Matyas et al.
patent: 2002/0080958 (2002-06-01), Ober et al.
patent: 2003/0108206 (2003-06-01), Diehl et al.
patent: 2003/0120598 (2003-06-01), Lam et al.
patent: 2003/0198351 (2003-10-01), Foster et al.
William Stallings, “Cryptography And Network Security Principles and Practice”, Second Edition, Prentice Hall, 1999, pp. 83-99, 243-263.
Method for Authenticating Key Data Set Records Message Authentication Codes, IBM Technical Disclosure Bulletin, Feb. 19992, TDB-ACC-No: NN 9202104, pp. 1-7.
William Stallings, Cryptography and Network Security Principles and Practices, 2nd Edition, 1999, pp. 243-252.
Coppersmith et al., IBM Research Report entitled “Triple DES Cipher Block Chaining with Output Feedback Masking”, Oct. 21, 1996, pp. 1-19, published by IBM Research Division.
“Advanced Encryption Standard”, found on Internet at http://searchsolaris.techtarget.com/sDefinition/O,,sid12—gci344759,00.html on Jun. 6, 2002.
“FIPS”, found on Advanced Encryption Standard website, http://csrc.nist.gov/encryption/aes/ on Jun. 6, 2002.
Chen Ching-Hsuan
Hines Larry
Hopkins Dale W.
Langford Susan
Abedin Shanto M
Hewlett--Packard Development Company, L.P.
Moazzami Nasser
LandOfFree
Method and system for secure storage, transmission and... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and system for secure storage, transmission and..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for secure storage, transmission and... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2811937