Cryptography – Particular algorithmic function encoding – Nbs/des algorithm
Patent
1997-02-21
1999-11-16
Laufer, Pinchus M.
Cryptography
Particular algorithmic function encoding
Nbs/des algorithm
380 28, 380 49, 713202, H04L 908
Patent
active
059871288
ABSTRACT:
For effecting cryptographic communications between entities i, j using a common cryptokey, each of the entities i, j generates a common cryptokey by applying an identifier transformation algorithm and a secret private key, which have previously been distributed from a center, to the identifier of the other entity with which to communicate (step 3). In a transmitting side, one-time pass cryptographic communication random number data are generated and encrypted by the common cryptokey, a plaintext is encrypted using the random number data, and the encrypted random number data and the encrypted plaintext are combined into an encrypted communication text (step 4). In a receiving side, the encrypted random number data in the encrypted communication text are decrypted using the common cryptokey, and the encrypted plaintext is decrypted using the decrypted random number data as a key (step 5).
REFERENCES:
patent: 3798605 (1974-03-01), Feistel
patent: 4238853 (1980-12-01), Ehrsam et al.
patent: 5016276 (1991-05-01), Matsumoto et al.
patent: 5202921 (1993-04-01), Herzberg et al.
patent: 5606615 (1997-02-01), Lapointe et al.
patent: 5729609 (1998-03-01), Moulart et al.
patent: 5778069 (1998-07-01), Thomlinson et al.
Bruce Schneier, "Applied Cryptography: Protocols, Algorithms, and Source Code in C", 2nd edition John Wiley and Sons, N.Y. (1995) pp. 166, 167, 678, 573, and 574.
S. Miyafuchi, "Can privacy be protected by KPS?", Electronics, No. 496, Sep. 1, 1995, p. 51-53.
T. Matsumoto et al., "A method for Sharing Cryptography Key without Communication: Key Predistribution System", Transactions of IEICE, vol. J71-A, No. 11, Nov. 25, 1988, p. 2046-53.
T. Matsumoto et al., "Performance of Linear Schemes for the Key Predistribution System", IEICE Technical Report ISEC88-5, Inst. of Elec., Info. and Comm. Engineers of Japan, vol. 88, No. 33, May 20, 1988, pp. 29-32.
H. Imai, "Coding Theory", IEICE, 5th ed., Jun. 10, 1994, p. 158-162.
M. Mitani et al., "Digital Signal Processing Series vol. 3 Digital Filter Design", Shokodo, Apr. 20, 1987, p. 75-78.
J. Massey et al., "A Fourier Transform Approach to the Linear complexity of Nonlinearly Filtered Sequences", Advances in Cryptology: Proceedings of Crypto97, Springer-Verlag (1994), p. 332-40.
R. Blom, "An Optimal Class of Symmetric Key Generation Systems," Lecture Notes in Computer Science, Advances in Crytology, 1985, pp. 335-338.
R. Blom, "Non-Public Key Distribution," Advances in Cryptology, Proceedings of Crypto 82, Plenum Press, New York, N.Y., pp. 231-236.
A. Shamir, "Identity-Based Cryptosystems and Signature Schemes," pp. 47-53 (date unknown).
Card Call Service Co., Ltd.
Guss Paul A.
Laufer Pinchus M.
LandOfFree
Method of effecting communications using common cryptokey does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method of effecting communications using common cryptokey, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method of effecting communications using common cryptokey will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1334390