Cryptography – Communication system using cryptography – Data stream/substitution enciphering
Reexamination Certificate
2008-07-22
2008-07-22
Moise, Emmanuel L (Department: 2137)
Cryptography
Communication system using cryptography
Data stream/substitution enciphering
C380S255000, C380S037000
Reexamination Certificate
active
10026109
ABSTRACT:
Methods and apparatus are provided for improving ARC4 processing in a cryptography engine. A multiple ported memory can be used to allow pipelined read and write access to values in memory. Coherency checking can be applied to provide that read-after-write and write-after-write consistency is maintained. Initialization of the memory can be improved with a reset feature occurring in a single cycle. Key shuffle and key stream generation can also be performed using a single core.
REFERENCES:
patent: 4737933 (1988-04-01), Chiang et al.
patent: 4998221 (1991-03-01), Correale, Jr.
patent: 5297206 (1994-03-01), Orton
patent: 5796836 (1998-08-01), Markham
patent: 5870474 (1999-02-01), Wasilewski et al.
patent: 5936967 (1999-08-01), Baldwin et al.
patent: 5943338 (1999-08-01), Duclose et al.
patent: 6088800 (2000-07-01), Jones et al.
patent: 6111858 (2000-08-01), Greaves et al.
patent: 6216167 (2001-04-01), Momirov
patent: 6289418 (2001-09-01), Koppala
patent: 6549622 (2003-04-01), Matthews, Jr.
patent: 6694430 (2004-02-01), Zegelin et al.
patent: 6873707 (2005-03-01), Batcher
patent: 7006634 (2006-02-01), Batcher
patent: 7277542 (2007-10-01), Duval
patent: 2002/0037079 (2002-03-01), Duval
patent: 2002/0186839 (2002-12-01), Parker et al.
patent: 2003/0167374 (2003-09-01), Hronik
patent: 2005/0240764 (2005-10-01), Koshy et al.
patent: 0 241 671 (1987-10-01), None
patent: 11213671 (1999-08-01), None
patent: WO 01/80483 (2001-10-01), None
Schneier, Bruce, “Applied Cryptography”, 1996, John Wiley & Sons, Inc., 2nd editiion, pp. 397-398.
Kundarewich et al., “A CPLD-based RC4 cracking system”, 1999, IEEE, pp. 397-401.
J. Burke et al. “Architectural Support for Fast Symmetric-Key Cryptography” Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS). Nov. 12-15, 2000. pp. 178-189.
“Applied Cryptography, Second Edition”, Schneider, B., 1996, John Wiley & Sons, New York, XP002184521, cited in the application, p. 442, paragraph 18.7—p. 445.
“SHA: The Secure Hash Algorithm Putting Message Digests to Work”, Stallings, W., Dr. Dobbs Journal, Redwood City, CA, Apr. 1, 1994, p. 32-34, XP000570561.
Analog Devices: “ADSP2141 SafeNetDPS User's Manual, Revision 6”,. Analog Devices Technical Specifications, Mar. 2000, XP002163401, 87 Pages.
C. Madson, R. Glenn: “RFC 2403- The Use of HMAC-MD5-96 within ESP and AH”, IETF Request for Comments, Nov. 1998, XP002163402, Retrieved from Internet on Mar. 20, 2001, http://www.faqs.org/rfcs/frc2403.html, 87 Pages.
S. Kent, R. Atkinson: “RFC 2406-IP Encapsulating Security Payload (ESP)” IETF Request for Comments, Nov. 1998, XP002163400, Retrieved from the Internet on Mar. 20, 2001, http://www.faqs.org/rfcs/frc2406.html, 5 Pages.
Keromytis, et al., “Implementing IPsec”, Global Telecommunications Conference (Globecom), IEEE, Nov. 3, 1997, pp. 1948-1952.
Pierson, et al., “Context-Agile Encryption for High Speed Communication Networks”, Computer Communications Review, Association for Computing Machinery, vol. 29, No. 1, Jan. 1999, pp. 35-49.
Sholander, et al., “The Effect of Algorithm-Agile Encryption on ATM Quality of Service”, Global Telecommunications Conference (Globecom), IEEE, Nov. 3, 1997, pp. 470-474.
Smirni, et al., “Evaluation of Multiprocessor Allocation Policies”, Technical Report, Vanderbilt University, Online, 1993, pp. 1-21.
Tarman, et al., “Algorithm-Agile Encryption in ATM Networks”, IEEE Computer, Sep. 1998, vol. 31, No. 1, pp. 57-64.
Wassal, et al., “A VLSI Architecture for ATM Algorithm-Agile Encryption”, Proceedings Ninth Great Lakes Symposium on VLSI, Mar. 4-6, 1999, pp. 325-328.
Analog Devices: “Analog Devices and IRE Announce First DSP-Based Internet Security System-On-A-Chip”, Analog Devices Press Release, Online, Jan. 19, 1999, pp. 1-3. http://content.analog.com/pressrelease/prdisplay/0,1622,16,00.html.
3Com: “3Com Launces New Era of Network Connectivity”, 3Com Press Release, Jun. 14, 1999, pp. 1-3.
“Secure Products VMS115”, VLSI Technology, Inc., Printed in USA, Document Control: VMS115, VI, 0, Jan. 1999, pp. 1-2.
“VMS115 Data Sheet”, VLSI Technology, Inc., a subsidiary of Philips Semiconductors, Revision 2:3, Aug. 10, 1999, pp. 1-64.
“Data Sheet 7751 Encryption Processor”, Network Security Processors, Jun. 1999, pp. 1-84.
Senie, D., “NAT Friendly Application Design Guidelines”, Amaranth Networks, Inc., NAT Working Group, Internet-Draft, Sep. 1999, pp. 1-7.
Floyd, Sally, et al., “Random Early Detection Gateways for Congestion Avoidance”, Lawrence Berkeley Laboratory, University of California, IEEE/ACM Transactions on Networking, Aug. 1993, pp. 1-32.
Egevang, K., et al., “The IP Network Address Translator (NAT)”, Network Working Group, May 1994, pp. 1-10.
Pall, G. S., et al., “Microsoft Point-To-Point Encryption (MPPE) Protocol”, Microsoft Corporation, Network Working Group, Internet Draft, Oct. 1999, pp. 1-12.
Deutsch, P., “Deflate Compressed Data Format Specification Version 1.3”, Aladdin Enterprises, Network Working Group, May 1996, pp. 1-17.
Kent, S., “IP Authentication Header”, Network Working Group, Nov. 1998, pp. 1-22.
Kent, S., “IP Encapsulating Security Payload (ESP)”, Network Working Group, Nov. 1998, pp. 1-22.
Maughan, D, et al., “Internet Security Association and Key Management Protocol (ISAKMP)”, Network Working Group, Nov. 1998, pp. 1-20.
Harkins, D., et al., “The Internet Key Exchange (IKE)”, Cisco Systems, Network Working Group, Nov. 1998, pp. 1-12.
Srisuresh, P., “Security Model with Tunnel-mode Ipsec for NAT Domains”, Lucent Technologies, Network Working Group, Oct. 1999, pp. 1-11.
Shenker, S., “Specification of Guaranteed Quality of Service”, Network Working Group, Sep. 1997, pp. 1-20.
Srisuresh, P., et al., “IP Network Address Translator (NAT) Terminology and Considerations”, Lucent Technologies, Network Working Group, Aug. 1999, pp. 1-30.
Kent, S., et al., “Security Architecture for the Internet Protocol”, Network Working Group, Nov. 1998, pp. 1-66.
“Compression for Broadband Data Communications”, BlueSteel Networks, Inc., Sep. 8, 1999, pp. 1-9.
“Securing and Accelerating e-Commerce Transactions”, BlueSteel Networks, Inc., Revision 2.0, Oct. 20, 1999, pp. 1-7.
“Securing Broadband Communications” BlueSteel Networks, Inc., Sep. 8, 1999, pp. 1-10.
R. Sedgewick, “Algorithms in C—Third Edition”, 1998, Addison Wesley XP002163543, pp. 573-608.
Paul D. Kundarewich et al.,A CPLD-based RC-4 Cracking System, Electrical and Computer Engineering, 1999 IEEE Canadian Conference on Edmonton, Alta., Canada May 9-12, 1999, Piscataway, NJ, USA, IEEE, US May 9, 1999, pp. 397-402.
European Search Report dated Jun. 3, 2003 for EP 02 25 4773.
Broadcom Corporation
Moise Emmanuel L
Pyzocha Michael
Sterne Kessler Goldstein & Fox p.l.l.c.
LandOfFree
Methods and apparatus for accelerating ARC4 processing does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Methods and apparatus for accelerating ARC4 processing, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods and apparatus for accelerating ARC4 processing will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3957075