Cryptography – Key management – Having particular key generator
Reexamination Certificate
2011-08-16
2011-08-16
Zand, Kambiz (Department: 2434)
Cryptography
Key management
Having particular key generator
C380S028000, C380S029000, C380S030000, C380S045000, C380S046000, C380S047000
Reexamination Certificate
active
08000471
ABSTRACT:
In an iterated block cipher, a method for round key encryption and key generation, the method including providing a first function Fi and a second function Fj, providing a round key generation function, the round key generation function being operative to utilize, in any given round, exactly one of the first function Fi, and the second function Fj, providing a round mixing function, the round mixing function being operative to utilize, in any given round, exactly one of the first function Fi, and the second function Fj, utilizing the round key generation function in at least a first round to generate a second round key for use in a second round, and utilizing the round mixing function in at least the first round to mix a first round key with a cipher state, wherein one of the following is performed in the first round the round key generation function utilizes the first function Fi to generate the second round key for use in the second round, substantially simultaneously with the round key mixing function utilizing the second function Fj to mix the first round key with the cipher state, and the round key generation function utilizes the second function Fj to generate the second round key for use in the second round, substantially simultaneously with the round key mixing function utilizing the first function Fi to mix the first round key with the cipher state. Related apparatus and methods are also described.
REFERENCES:
patent: 4157454 (1979-06-01), Becker
patent: 4543646 (1985-09-01), Ambrosius et al.
patent: 5533123 (1996-07-01), Force et al.
patent: 6028939 (2000-02-01), Yin
patent: 6243470 (2001-06-01), Coppersmith et al.
patent: 7639797 (2009-12-01), Lee et al.
patent: 2001/0386931 (2001-11-01), Luyster
patent: 2002/0118827 (2002-08-01), Luyster
patent: 2003/0108195 (2003-06-01), Okada et al.
patent: 2003/0198345 (2003-10-01), Van Buer
patent: 2004/0047466 (2004-03-01), Feldman et al.
patent: 2005/0135607 (2005-06-01), Lee et al.
patent: 2006/0029223 (2006-02-01), Ari
patent: 2345229 (1998-12-01), None
patent: WO 2007075154 (2007-07-01), None
Mar. 28, 2008 Written Opinion of the International Searching Authority for captioned application.
Bruce Schneier,Applied Cryptography: Protocols, Algorithms and Source Code in C(2d ed. pp. 265-368) (John Wiley & Sons 1996).
“Announcing The Advanced Encryption Standard (AES)” (Federal Information Processing Standards Publication 197, Nov. 26, 2001).
“Data Encryption Standard (DES)” (Federal Information Processing Standards Publication 46-3, Oct. 25, 1999).
Bruce Schneier, Applied Cryptography: Protocols, Algorithms and Source Code in C (2d ed. pp. 351-353, 1996).
Grabovsky Aharon
Mantin Itsik
Husch & Blackwell LLP
NDS Limited
Tran Tongoc
Zand Kambiz
LandOfFree
Robust cipher design does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Robust cipher design, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Robust cipher design will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2687719