Method for the cryptographic conversion of L-bit input...

Cryptography – Communication system using cryptography – Time segment interchange

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S028000, C380S029000

Reexamination Certificate

active

07142673

ABSTRACT:
The present invention relates to the field of electric communication and computer engineering, and more particularly, to the field of cryptographic methods and devices for ciphering digital data. The method comprises dividing a block of data N≧2 subblocks; converting these subblocks one after another by generating at least one binary vector according to the subblocks value and modifying the subblock using the binary vector. Novelty of the claimed method is in generating the binary vector at the subsequent step of sub-block conversion depending on the binary vector structure at the preceding step of subblock conversion. Novelty is also in generating two binary vectors and converting one of them by operation of cyclic shift on a number of bits equal to the value of the second binary vector. Further, novelty is in modifying one of the subblocks by applying to it a cyclic shifting operation on a number of bits equal to the current value of the binary vector. Novelty is also in the use, in subblock conversion, a number T≧2 of stuffing tables, whereby the number (v) of the table is calculated on the basis of the binary vector, and the subblock is modified by a stuffing operation determined by the v-th table.

REFERENCES:
patent: 5142578 (1992-08-01), Matyas et al.
patent: 5442705 (1995-08-01), Miyano
patent: 5511123 (1996-04-01), Adams
patent: 5778074 (1998-07-01), Garcken et al.
patent: 6031911 (2000-02-01), Adams et al.
patent: 6298136 (2001-10-01), Den Boer
patent: 6301362 (2001-10-01), Matyas et al.
patent: 6937727 (2005-08-01), Yup et al.
patent: 3905667 (1990-08-01), None
patent: 4016203 (1991-11-01), None
patent: 2222809 (1974-10-01), None
patent: 2024209 (1994-11-01), None
patent: 2032990 (1995-10-01), None
Lai et al, “Hash Functions Based on Block Ciphers”, Signal and Information Processing Lab., pp. 55-70, 1992.
Rivest, “The RC5 Encryption Algorithm”, MIT Laboratory for Computer Science, pp. 86-96.
Schneier, Applied Cryptography Second Edition, Chapter 14, “Still Other Block Ciphers”, pp. 342-344, 1966.
Data Encryption Standard (DES), Federal Information Processing Standards Publication 46-2, 16 pgs., Dec. 30, 1993.
Kaliski, Jr. et al, Lecture Notes in Computer Science, vol. 809 “Fast Block Cipher Proposal”, pp. 33-39, 1994.
Biham et al, Differential Cryptanalysis of DES-like Cyptosystems, The Weizmann Institute . . . , pp. 1-105, Jul. 19, 1990.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for the cryptographic conversion of L-bit input... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for the cryptographic conversion of L-bit input..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for the cryptographic conversion of L-bit input... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3677959

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.