Cryptography – Communication system using cryptography – Time segment interchange
Reexamination Certificate
2006-11-28
2006-11-28
Sheikh, Ayaz (Department: 2131)
Cryptography
Communication system using cryptography
Time segment interchange
C380S028000, C380S029000
Reexamination Certificate
active
07142673
ABSTRACT:
The present invention relates to the field of electric communication and computer engineering, and more particularly, to the field of cryptographic methods and devices for ciphering digital data. The method comprises dividing a block of data N≧2 subblocks; converting these subblocks one after another by generating at least one binary vector according to the subblocks value and modifying the subblock using the binary vector. Novelty of the claimed method is in generating the binary vector at the subsequent step of sub-block conversion depending on the binary vector structure at the preceding step of subblock conversion. Novelty is also in generating two binary vectors and converting one of them by operation of cyclic shift on a number of bits equal to the value of the second binary vector. Further, novelty is in modifying one of the subblocks by applying to it a cyclic shifting operation on a number of bits equal to the current value of the binary vector. Novelty is also in the use, in subblock conversion, a number T≧2 of stuffing tables, whereby the number (v) of the table is calculated on the basis of the binary vector, and the subblock is modified by a stuffing operation determined by the v-th table.
REFERENCES:
patent: 5142578 (1992-08-01), Matyas et al.
patent: 5442705 (1995-08-01), Miyano
patent: 5511123 (1996-04-01), Adams
patent: 5778074 (1998-07-01), Garcken et al.
patent: 6031911 (2000-02-01), Adams et al.
patent: 6298136 (2001-10-01), Den Boer
patent: 6301362 (2001-10-01), Matyas et al.
patent: 6937727 (2005-08-01), Yup et al.
patent: 3905667 (1990-08-01), None
patent: 4016203 (1991-11-01), None
patent: 2222809 (1974-10-01), None
patent: 2024209 (1994-11-01), None
patent: 2032990 (1995-10-01), None
Lai et al, “Hash Functions Based on Block Ciphers”, Signal and Information Processing Lab., pp. 55-70, 1992.
Rivest, “The RC5 Encryption Algorithm”, MIT Laboratory for Computer Science, pp. 86-96.
Schneier, Applied Cryptography Second Edition, Chapter 14, “Still Other Block Ciphers”, pp. 342-344, 1966.
Data Encryption Standard (DES), Federal Information Processing Standards Publication 46-2, 16 pgs., Dec. 30, 1993.
Kaliski, Jr. et al, Lecture Notes in Computer Science, vol. 809 “Fast Block Cipher Proposal”, pp. 33-39, 1994.
Biham et al, Differential Cryptanalysis of DES-like Cyptosystems, The Weizmann Institute . . . , pp. 1-105, Jul. 19, 1990.
Moldovyan Alexandr Andreevich
Moldovyan Nikolay Andreevich
Abrishamkar Kaveh
Jacobson & Holman PLLC
Otkrytoye aktsionernoye obschestvo “Moskovskaya Gorodskay
Sheikh Ayaz
LandOfFree
Method for the cryptographic conversion of L-bit input... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method for the cryptographic conversion of L-bit input..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for the cryptographic conversion of L-bit input... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3677959