Electrical computers: arithmetic processing and calculating – Electrical digital calculating computer – Particular function performed
Patent
1998-01-16
1999-11-09
Malzahn, David H.
Electrical computers: arithmetic processing and calculating
Electrical digital calculating computer
Particular function performed
380 46, G06F 102
Patent
active
059832525
ABSTRACT:
In a finite state machine having a plurality of registers, a stream of pseudo-random numbers is generated by a method having characteristic non-zero integral value N. Repeatedly, over a series of time steps, a set of N combined values is calculated by applying N non-linear combining functions to N input sets of values and registering each combined value in one of N registers. At any time step after N time steps each input set consists of combined values, except that one input set may include as one value the result of combining a combined value with a value from an input stream, and at least two input sets comprise only registered values from distinct registers.
REFERENCES:
patent: 4047008 (1977-09-01), Perkins
patent: 4748576 (1988-05-01), Becker et al.
patent: 4965881 (1990-10-01), Dilley
patent: 5224165 (1993-06-01), Reinhardt et al.
patent: 5365589 (1994-11-01), Gutowitz
patent: 5596516 (1997-01-01), Higashi et al.
patent: 5608801 (1997-03-01), Aiello et al.
patent: 5724428 (1998-03-01), Rivest
Rivest, "The RC5 Encryption Algorithm", Dr. Dobbs Journal, pp. 146 and 148, Jan. 1995.
D.J. Wheeler, A Bulk Data Encryption Algorithm, Fast Software Encryption (Ed.R. Anderson), Lecture Notes in Computer Science, Spring-Verlag 809:127-134, 1994.
R.J. Anderson and E. Biham, Tiger: A Fast New Hash Function, Fast Software Encryption (Ed D. Gollmann), Lecture Notes in Computer Science, Springer-Verlag, 1039:89-97, 1996.
J. Daemen et al., Resynchronization Weaknesses in Synchronous Stream Ciphers, Advances in Cryptology--Eurocrypt '93 Proceedings, Springer-Verlag, 159-167, 1994.
ISO/IEC 10166, Information Technology, Modes of operation for an n-bit block ciper algorithm, International Organization for Standardization / International Electrotechnical Commission, 1991.
R.J. Jenkins, ISAAC, Fst Software Encryption (Ed. D. Gollmann), LNCS, Springer-Verlag, 1039:41-49, 1996.
B.S. Kaliski and M.J.B. Robshaw, Fast Block Cipher Proposal, Fast Software Encryption (Ed. R. Anderson), Springer-Verlag, 809: 33-40, 1994.
NBS FIPS PUB 46-1, Data Encryption Standard, National Bureau of Standards, U.S. Department of Commerce, Jan. 1988.
NIST FIPS PUB 180-1, Secure Hash Standard, National Institute of Standards and Technology, U.S. Department of Commerce, Apr., 1995.
P. Rogaway and D. Coppersmith, A software-Optimized Encryption Agorithm, Fast Software Encryption (Ed.R. Anderson), LNCS, Springer-Verlag, 809:56-63, 1994.
B.Schneier, Applied Cryptography, Second Ecition, John Wiley & Sons, 397-398, 1996.
B.Schneier, Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish), Fast Software Encryption (Ed. R. Anderson), LNCS sprinter-Verlag, 809;191-204, 1994.
R.L. Rivest, The RC5 Encryption Algorithm, Dr. Dobb's Journal, Jan. 1995, pp. 146 and 148.
Malzahn David H.
PictureTel Corporation
LandOfFree
Pseudo-random number generator capable of efficiently exploiting does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Pseudo-random number generator capable of efficiently exploiting, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Pseudo-random number generator capable of efficiently exploiting will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1469841