Methods and apparatus for performing encryption and...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S192000, C380S042000, C380S225000, C380S277000

Reexamination Certificate

active

10160322

ABSTRACT:
Methods and apparatus are provided for a cryptography accelerator to efficiently perform authentication and encryption operations. A data sequence is received at a cryptography accelerator. An encrypted authentication code and an encrypted data sequence is provided efficiently upon performing single pass authentication and encryption operations on the data sequence.

REFERENCES:
patent: 5598410 (1997-01-01), Stone
patent: 5796836 (1998-08-01), Markham
patent: 6182216 (2001-01-01), Luyster
patent: 6226742 (2001-05-01), Jakubowski et al.
patent: 6333983 (2001-12-01), Enichen et al.
patent: 6378072 (2002-04-01), Collins et al.
patent: 6477646 (2002-11-01), Krishna et al.
patent: 6484257 (2002-11-01), Ellis
patent: 6549622 (2003-04-01), Matthews, Jr.
patent: 6983366 (2006-01-01), Huynh et al.
patent: 7000120 (2006-02-01), Koodli et al.
patent: 7007163 (2006-02-01), Tardo et al.
patent: 7174452 (2007-02-01), Carr
patent: 2002/0078342 (2002-06-01), Matthews, Jr.
patent: 2002/0124177 (2002-09-01), Harper et al.
Guendouz, H.; Bouaziz, S.; Circuits and Systems, 1998. ISCAS '98. Proceedings of the 1998 IEEE International Symposium on vol. 6, May 31-Jun. 3, 1998 pp. 434-437 vol. 6 □□.
Korkishko, T.; Melnyk, A.; AFRICON, 1999 IEEE vol. 1, Sep. 27-Oct. 1, 1999 pp. 175-180 vol. 1 □□.
Mitsuyama, Y.; Andales, Z.; Onoye, T.; Shirakawa, I.; Circuits and Systems, 2001. ISCAS 2001. The 2001 IEEE International Symposium on vol. 4, May 6-9, 2001 pp. 734-737 vol. 4 □□.
“Secure Products VMS115”, VLSI Technology, Inc., Printed in USA, Document Control: VMS115, VI, 0, Jan. 1999, pp. 1-2.
“VMS115 Data Sheet”, VLSI Technology, Inc., a subsidiary of Philips Semiconductors, Revision 2:3, Aug. 10, 1999, pp. 1-64.
Senie, D., “NAT Friendly Application Design Guidelines”, Amaranth Networks, Inc., NAT Working Group, Internet-Draft, Sep. 1999, pp. 1-7.
Floyd, Sally, et al., “Random Early Detection Gateways for Congestion Avoidance”, Lawrence Berkeley Laboratory, University of California, IEEE/ACM Transactions on Networking, Aug. 1993, pp. 1-32.
Egevang, K., et al., “The IP Network Address Translator (NAT)”, Network Working Group, May 1994, pp. 1-10.
Pall, G. S., et al., “Microsoft Point-To-Point Encryption (MPPE) Protocol”, Microsoft Corporation, Network Working Group, Internet Draft, Oct. 1999, pp. 1-12.
Deutsch, P., “Deflate Compressed Data Format Specification Version 1.3”, Aladdin Enterprises, Network Working Group, May 1996, pp. 1-17.
Kent, S., “IP Authentication Header”, Network Working Group, Nov. 1998, pp. 1-22.
Kent, S., et al., “IP Encapsulating Security Payload (ESP)”, Network Working Group, Nov. 1998, pp. 1-22.
Maughan, D, et al., “Internet Security Association and Key Management Protocol (ISAKMP)”, Network Working Group, Nov. 1998, pp. 1-20.
Harkins, D., et al., “The Internet Key Exchange (IKE)”, Cisco Systems, Network Working Group, Nov. 1998, pp. 1-12.
Srisuresh, P., “Security Model with Tunnel-mode Ipsec for NAT Domains”, Lucent Technologies, Network Working Group, Oct. 1999, pp. 1-11.
Shenker, S., “Specification of Guaranteed Quality of Service”, Network Working Group, Sep. 1997, pp. 1-20.
Srisuresh, P., et al., “IP Network Address Translator (NAT) Terminology and Considerations”, Lucent Technologies, Network Working Group, Aug. 1999, pp. 1-30.
Kent, S., et al., “Security Architecture for the Internet Protocol”, Network Working Group, Nov. 1998, pp. 1-66.
“Compression for Broadband Data Communications”, BlueSteel Networks, Inc., Sep. 8, 1999, pp. 1-9.
“Securing Broadband Communications” BlueSteel Networks, Inc., Sep. 8, 1999, pp. 1-10.
Analog Devices: “ADSP2141 SafeNetDPS User's Manual, Revision 6”, Analog Devices Technical Specifications, Mar. 2000, XP002163401, 87 Pages.
C. Madson, R. Glenn: “RFC 2403- The Use of HMAC-MD5-96 within ESP and AH”, IETF Request for Comments, Nov. 1998, XP002163402, Retrieved from Internet on Mar. 20, 2001, http://www.faqs.org/rfcs/frc2403.html, 87 Pages.
S. Kent, R. Atkinson: “RFC 2406-IP Encapsulating Security Payload (ESP)” IETF Request for Comments, Nov. 1998, XP002163400, Retrieved from the Internet on Mar. 20, 2001, http://www.faqs.org/rfcs/frc2406.html, 5 Pages.
Keromytis, et al., “Implementing IPsec”, Global Telecommunications Conference (Globecom), IEEE, Nov. 3, 1997, pp. 1948-1952.
Pierson, et al., “Context-Agile Encryption for High Speed Communication Networks”, Computer Communications Review, Association for Computing Machinery, vol. 29, No. 1, Jan. 1999, pp. 35-49.
Sholander, et al., “The Effect of Algorithm-Agile Encryption on ATM Quality of Service”, Global Telecommunications Conference (Globecom), IEEE, Nov. 3, 1997, pp. 470-474.
Smirni, et al., “Evaluation of Multiprocessor Allocation Policies”, Technical Report, Vanderbilt University, Online, 1993, pp. 1-21.
Tarman, et al., “Algorithm-Agile Encryption in ATM Networks”, IEEE Computer, Sep. 1998, vol. 31, No. 1, pp. 57-64.
Wassal, et al., “A VLSI Architecture for ATM Algorithm-Agile Encryption”, Proceedings Ninth Great Lakes Symposium on VLSI, Mar. 4-6, 1999, pp. 325-328.
Analog Devices: “Analog Devices and IRE Announce First DSP-Based Internet Security System-On-A-Chip”, Analog Devices Press Release, Online, Jan. 19, 1999, pp. 1-3. http://content.analog.com/pressrelease/prdisplay/0,1622,16,00.html.
3Com: “3Com Launces New Era of Network Connectivity”, 3Com Press Release, Jun. 14, 1999, pp. 1-3.
Bruce Scheier, John Wiley & Sons “Applied Cryptograpy”, Chapter 8, “Key Management”, pp. 169-188, Copyright © 1996 by Bruce Schneier ISBN 0-471-12845-7, ISBN 0-471-11709-9.
Federal Information Processing Standards Publication 197, Nov. 26, 2001, “Specification For The Advanced Encryption Standards(AES)”, pp. ii-iv and pp. 1-47.
Dierks et al, “The TLS Protocol Version 1.0” Network Working Group Request for Comments: 2246, Copyright ©, The internet Society (1999) All rights reserved, pp. 1-69.
Tardo et al. Improving Data Transfer Efficiency In A Cryptography Accelerator System, U.S. Appl. No. 10/161,475, filed May 31, 2002.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Methods and apparatus for performing encryption and... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Methods and apparatus for performing encryption and..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods and apparatus for performing encryption and... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3910662

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.