Method of effecting communications using common cryptokey

Cryptography – Particular algorithmic function encoding – Nbs/des algorithm

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 28, 380 49, 713202, H04L 908

Patent

active

059871288

ABSTRACT:
For effecting cryptographic communications between entities i, j using a common cryptokey, each of the entities i, j generates a common cryptokey by applying an identifier transformation algorithm and a secret private key, which have previously been distributed from a center, to the identifier of the other entity with which to communicate (step 3). In a transmitting side, one-time pass cryptographic communication random number data are generated and encrypted by the common cryptokey, a plaintext is encrypted using the random number data, and the encrypted random number data and the encrypted plaintext are combined into an encrypted communication text (step 4). In a receiving side, the encrypted random number data in the encrypted communication text are decrypted using the common cryptokey, and the encrypted plaintext is decrypted using the decrypted random number data as a key (step 5).

REFERENCES:
patent: 3798605 (1974-03-01), Feistel
patent: 4238853 (1980-12-01), Ehrsam et al.
patent: 5016276 (1991-05-01), Matsumoto et al.
patent: 5202921 (1993-04-01), Herzberg et al.
patent: 5606615 (1997-02-01), Lapointe et al.
patent: 5729609 (1998-03-01), Moulart et al.
patent: 5778069 (1998-07-01), Thomlinson et al.
Bruce Schneier, "Applied Cryptography: Protocols, Algorithms, and Source Code in C", 2nd edition John Wiley and Sons, N.Y. (1995) pp. 166, 167, 678, 573, and 574.
S. Miyafuchi, "Can privacy be protected by KPS?", Electronics, No. 496, Sep. 1, 1995, p. 51-53.
T. Matsumoto et al., "A method for Sharing Cryptography Key without Communication: Key Predistribution System", Transactions of IEICE, vol. J71-A, No. 11, Nov. 25, 1988, p. 2046-53.
T. Matsumoto et al., "Performance of Linear Schemes for the Key Predistribution System", IEICE Technical Report ISEC88-5, Inst. of Elec., Info. and Comm. Engineers of Japan, vol. 88, No. 33, May 20, 1988, pp. 29-32.
H. Imai, "Coding Theory", IEICE, 5th ed., Jun. 10, 1994, p. 158-162.
M. Mitani et al., "Digital Signal Processing Series vol. 3 Digital Filter Design", Shokodo, Apr. 20, 1987, p. 75-78.
J. Massey et al., "A Fourier Transform Approach to the Linear complexity of Nonlinearly Filtered Sequences", Advances in Cryptology: Proceedings of Crypto97, Springer-Verlag (1994), p. 332-40.
R. Blom, "An Optimal Class of Symmetric Key Generation Systems," Lecture Notes in Computer Science, Advances in Crytology, 1985, pp. 335-338.
R. Blom, "Non-Public Key Distribution," Advances in Cryptology, Proceedings of Crypto 82, Plenum Press, New York, N.Y., pp. 231-236.
A. Shamir, "Identity-Based Cryptosystems and Signature Schemes," pp. 47-53 (date unknown).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method of effecting communications using common cryptokey does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method of effecting communications using common cryptokey, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method of effecting communications using common cryptokey will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1334390

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.