Cryptography – Particular algorithmic function encoding – Nbs/des algorithm
Patent
1991-11-05
1994-05-10
Cangialosi, Salvatore
Cryptography
Particular algorithmic function encoding
Nbs/des algorithm
380 23, H04C 912
Patent
active
053115953
DESCRIPTION:
BRIEF SUMMARY
The present invention relates to a method of transferring data, an electronic document or the like from a first computer system to a second computer system via a data transmission line, e.g. a public data transmission line.
Several techniques and standards are known for transferring data, electronic documents or the like from a first computer system to a second computer system via different data transmission lines such as high speed communication lines, private or public data transmission lines, etc. If the data transmission line itself is not secured against third parties with or without authorization being able to tap the data transferred via the data transmission line or the electronic document transferred via the data transmission line, it is a conventional technique to provide an encryption of the data or the electronic document in accordance with encryption/decryption techniques well-known per se, which techniques may comprise either symmetrical or asymmetrical encryption algorithms, secret or public keys. In this context reference is only to be made to the well-known DES algorithm (Data Encryption Standard), developed by IBM in cooperation with the National Bureau of Standards (NBS), USA. As an example of a data/document exchange protocol mention is here to be made of the data/document exchange protocol --LECAM-- developed by FRANCE TELECOM in connection with the Minitel computers used widely in France, in accordance with which the data/document transfer may take place in encrypted and not encrypted form (further specifications of the protocol are given in S.T.U.C.A.M-Specification Techniques d'Utilisation du LECAM, .COPYRGT.Decembre 1987, FRANCE TELECOM, Teletel). Such an encrypted data transmission presupposes, however, that the transmitter and the receiver can agree to establishing a mutual set of encryption/decryption keys, as the parties involved, transmitter and receiver, invariably have to reveal details concerning security levels, etc. Such an agreement requires, however, that both transmitter and receiver fully trust the other party. Even if the two parties, who are to make a transfer of data or a transfer of one electronic document from a first computer system to a second computer system, can agree to such an exchange of encryption/decryption keys for use in connection with an encryption/decryption algorithm agreed upon, not even such an encrypted data transmission ensures that the data sent from the first computer system or the electronic document sent from the first computer system is received correctly by the second computer system, as it will be possible to manipulate the data or the electronic document in connection with the execution of the encryption algorithm in the first computer system, just as the receiver after decryption can manipulate the data or the electronic document. Such an encrypted data transmission does not in itself ensure that the transfer taking place is the intended or desired transfer of the data or the electronic document, that the data received by the second computer system or the electronic document received by the second computer system, in the form in which the data or the electronic document exists in the second computer system after transfer, is identical to the data sent from the first computer system or the electronic document sent from the first computer system. Such an encrypted data transmission via a public or private data transmission line does neither in itself ensure that the two computer systems communicating with each other are the correct, intended parties of communication.
The object of the present invention is to provide a method of the type defined above, according to which method it is possible to establish immediately a secure data or document transfer between two computer systems without having to exchange encryption/decryption keys between the computer systems, reveal details concerning security levels, etc., and according to which method it is ensured that the desired data or document transfer actually takes place, as it is ensured that
REFERENCES:
patent: 4176246 (1979-11-01), Gaetzli
patent: 4467139 (1984-08-01), Mollier
patent: 4549075 (1985-10-01), Saada et al.
patent: 4656474 (1987-04-01), Mollier et al.
patent: 4677670 (1987-06-01), Henderson, Jr.
patent: 4807288 (1989-02-01), Ugon et al.
patent: 4823388 (1989-04-01), Mizutani et al.
patent: 4882779 (1989-11-01), Rahtgen
patent: 4907272 (1990-03-01), Hazarb et al.
patent: 4910773 (1990-03-01), Hazard et al.
patent: 4926480 (1990-03-01), Chaum
patent: 4935962 (1990-06-01), Austin
patent: 4974193 (1990-11-01), Beutelspacher et al.
patent: 4989244 (1991-01-01), Naruse et al.
Smart Credit Cards: the answer to cashless shopping; IEEE Spectrum Feb. 1984, pp. 43-49.
Bjerrum J rgen
Kj r Nielsen Sven
Ottosen Steen
Cangialosi Salvatore
Kommunedata I/S
LandOfFree
Method of transferring data, between computer systems using elec does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method of transferring data, between computer systems using elec, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method of transferring data, between computer systems using elec will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2417576