Cryptography – Particular algorithmic function encoding
Reexamination Certificate
2008-03-18
2008-03-18
Jung, David Y (Department: 2134)
Cryptography
Particular algorithmic function encoding
C380S042000, C380S255000
Reexamination Certificate
active
10829654
ABSTRACT:
A method for encryption data subdivided into segments of random lengths. A data source having a state corresponding to initialization parameters and the number of patterns output therefrom provides for a reversible encryption process. Decryption is accomplished by repeating encryption using a data source having an identical initial state. The data source consists random pattern generation machines (RPGMs). A portion of RPGMs may each contain patterns of a different length. Randomly selecting an RPGM and outputting a pattern therefrom effectively provides a pattern of random length. The data source may output patterns interpreted to govern the behavior of obfuscation operations. Patterns output from the data source may be interpreted as instructions as to what obfuscation to perform and what parameters shall define the obfuscation.
REFERENCES:
patent: 4484027 (1984-11-01), Lee et al.
patent: 4853962 (1989-08-01), Brockman
patent: RE33189 (1990-03-01), Lee et al.
patent: 4997288 (1991-03-01), Rosenow
patent: 5008936 (1991-04-01), Hamilton et al.
patent: 5016277 (1991-05-01), Hamilton
patent: 5022076 (1991-06-01), Rosenow et al.
patent: 5063596 (1991-11-01), Dyke
patent: 5128996 (1992-07-01), Rosenow et al.
patent: 5175766 (1992-12-01), Hamilton
patent: 5297207 (1994-03-01), Degele
patent: 5412729 (1995-05-01), Liu
patent: 5452358 (1995-09-01), Normile et al.
patent: 5479513 (1995-12-01), Protopopescu et al.
patent: 5539827 (1996-07-01), Liu
patent: 5548648 (1996-08-01), Yorke-Smith
patent: 5623548 (1997-04-01), Akiyama et al.
patent: 5675652 (1997-10-01), Coppersmith et al.
patent: 5675653 (1997-10-01), Nelson, Jr.
patent: 5724427 (1998-03-01), Reeds, III
patent: 5724428 (1998-03-01), Rivest
patent: 5825882 (1998-10-01), Kowalski et al.
patent: 5835597 (1998-11-01), Coppersmith et al.
patent: 5983252 (1999-11-01), Clapp
patent: 5995624 (1999-11-01), Fielder et al.
patent: 6014446 (2000-01-01), Finkelstein
patent: 6108421 (2000-08-01), Kurdziel et al.
patent: 6252958 (2001-06-01), Rose
patent: 6266413 (2001-07-01), Shefi
patent: 6304657 (2001-10-01), Yokota et al.
patent: 6321201 (2001-11-01), Dahl
patent: 6415032 (2002-07-01), Doland
patent: 6445794 (2002-09-01), Shefi
patent: 6463150 (2002-10-01), Moldovyan et al.
patent: 6490357 (2002-12-01), Rose
patent: 6510228 (2003-01-01), Rose
patent: 6535980 (2003-03-01), Kumar et al.
patent: 6560338 (2003-05-01), Rose et al.
patent: 6782101 (2004-08-01), Huntress
patent: 6782473 (2004-08-01), Park
patent: 6785388 (2004-08-01), Kasahara et al.
patent: 6788787 (2004-09-01), Shono et al.
patent: 6788788 (2004-09-01), Kasahara et al.
patent: 6792108 (2004-09-01), Patera et al.
patent: 6810407 (2004-10-01), Jaques et al.
patent: 6820198 (2004-11-01), Ross
patent: 6823068 (2004-11-01), Samid
Data obfuscation: anonymity and desensitization of usable data sets Bakken, D.E.; Rarameswaran, R.; Blough, D.M.; Franz, A.A.; Palmer, T.J.; Security & Privacy Magazine, IEEE vol. 2, Issue 6, Nov.-Dec. 2004 pp. 34-41.
Conference on Computer and Communications Security; Proceedings of the 12th ACM conference on Computer and communications; Alexandria, VA, USA; SESSION: Privacy and anonymity; pp. 102-111 Year of Publication: 2005.
On the impossibility of obfuscation with auxiliary input Goldwasser, S.; Yael Tauman Kalai; Foundations of Computer Science, 2005. FOCS 2005. 46th Annual IEEE Symposium on Oct. 23-25, 2005 pp. 553-562.
Analysis of the statistical cipher feedback mode of block ciphers Heys, H.M.; Computers, IEEE Transactions on vol. 52, Issue 1, Jan. 2003 pp. 77-92.
Protection against indirect overflow attacks on pointers Zhu, G.; Tyagi, A.; Information Assurance Workshop, 2004. Proceedings. Second IEEE International 2004 pp. 97-106.
Hardware and Binary Modificaiton Support for Code Pointer Protection From Buffer Overflow Tuck, N.; Calder, B.; Varghese, G.; Microarchitecture, 2004. MICRO-37 2004. 37th International Symposium on Dec. 4-8, 2004 pp. 209-220.
Jung David Y
Pate & Pierce & Baird
LandOfFree
Randomization-based encryption apparatus and method does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Randomization-based encryption apparatus and method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Randomization-based encryption apparatus and method will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3934294