Cryptography – Particular algorithmic function encoding – Nbs/des algorithm
Patent
1997-02-21
1999-11-16
Laufer, Pinchus M.
Cryptography
Particular algorithmic function encoding
Nbs/des algorithm
380 28, H04L 908
Patent
active
059871296
ABSTRACT:
In a center, a Fourier transformation with a weighting function and a center matrix are applied to the identifier of each entity (steps 2-1, 2-2), which is then randomized by one-time pass random number data generated by a manual operation at each entity, thereby generating a secret private key peculiar to each entity (steps 2-3.about.2-5). The center also generates an identifier transformation algorithm based on the one-time pass random number data and the Fourier transformation with a weighting function (step 2-6). Thereafter, the center distributes the identifier transformation algorithm and the secret private key to each entity. Each entity applies the identifier transformation algorithm and the secret private key to the identifier of another entity with which to communicate, for thereby generating a common cryptokey for cryptographic communications between the entities.
REFERENCES:
patent: 5016276 (1991-05-01), Matsumoto et al.
patent: 5202921 (1993-04-01), Herzberg et al.
patent: 5606615 (1997-02-01), Lapointe et al.
patent: 5729609 (1998-03-01), Moulart et al.
patent: 5778069 (1998-07-01), Tomlinson et al.
R. Blom, "An Optimal Class of Symmetric Key Generation Systems," Lecture Notes in Computer Science, Advances in Cryptology, 1985, pp. 335-338.
R. Blom, "Non-Public Key Distribution," Advances in Cryptology, Proceedings of Crypto 82, Plenum Press, New York, N.Y., pp. 231-236.
T. Matsumoto et al., "Performance of Linear Schemes for the Key Predistribution System," IEICE Technical Report on Information Security, May 20, 1988.
M. Mitani et al., "Digital Signal Processing Series vol. 3 Digital Filter Design", Shokodo, Apr. 20, 1987, pp. 75-78.
T. Matsumoto et al., "A Method for Sharing Cryptography Key Without Communication: Key Predistribution System", Trans. of IEICE, vol. J71-A, No. 11, Nov. 25, 1988, pp. 2046-2053.
T. Matsumoto et al., "Performance of Linear Schemes for the Key Predistribution System", IEICE Technical Report ISEC88-5, Inst. of Elec., Info. and Comm. Engineers of Japan, vol. 88, No. 33, May 20, 1988, pp. 29-32.
H. Imai, "Coding Theory", IEICE, 5th ed., Jun. 10, 1994, pp. 158-159.
J. Massey et al., "A Fourier Transform Approach to the Linear complexity of Nonlinearly Filtered Sequences", Advances in Cryptology: Proceedings of CRYPTO97, Springer-Verlag (1994), pp. 332-340.
Card Call Service Co., Ltd.
Guss Paul A.
Laufer Pinchus M.
LandOfFree
Method of sharing cryptokey does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method of sharing cryptokey, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method of sharing cryptokey will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1334392