Cryptography – Particular algorithmic function encoding – Public key
Patent
1989-05-09
1992-12-29
Gregory, Bernarr E.
Cryptography
Particular algorithmic function encoding
Public key
380 23, 380 25, 380 49, 370 60, 370 92, 370 93, 370 941, H04L 930
Patent
active
051757656
ABSTRACT:
A public-key encryption system is used to reliably transmit packets over a network subject to malicious failures. Each node on the network is associated with a public and private key. A transmission over the network identifies its originating node and also includes a digital-signature code word generated by encoding predetermined portions of the transmission using the private key of the originating node. When a transmission is received, the receiving node verifies that the transmission was originated by the identified originating node by manipulating the packet contents using the public key associated with the originating node. The packet is accepted only if the digital-signature code word in the packet corresponds to contents of the packet and the public key of the originating node.
REFERENCES:
patent: 3781815 (1973-12-01), Boudreau et al.
patent: 3979733 (1976-09-01), Fraser
patent: 4058672 (1977-11-01), Crager et al.
patent: 4081612 (1978-03-01), Hafner
patent: 4466060 (1984-08-01), Riddle
patent: 4527267 (1985-07-01), Cohen
patent: 4534024 (1985-08-01), Maxemchuk et al.
patent: 4550397 (1985-10-01), Turner et al.
patent: 4617657 (1986-10-01), Drynan et al.
patent: 4630260 (1986-12-01), Toy et al.
patent: 4661947 (1987-04-01), Lea et al.
patent: 4670871 (1987-06-01), Vaidya
patent: 4679189 (1987-07-01), Olson et al.
patent: 4683563 (1987-07-01), Rouse et al.
patent: 4696000 (1987-09-01), Payne, III
patent: 4701906 (1987-10-01), Ransom et al.
patent: 4706080 (1987-11-01), Sincoskie
patent: 4740954 (1988-04-01), Cotton et al.
patent: 4742511 (1988-05-01), Johnson
patent: 4755986 (1988-07-01), Hirata
patent: 4787082 (1988-11-01), Delaney
patent: 4787083 (1988-11-01), Tanaka
patent: 4811337 (1989-03-01), Hart
patent: 4825206 (1989-04-01), Brice, Jr. et al.
patent: 4969146 (1990-11-01), Twitty et al.
patent: 4975952 (1990-12-01), Mabey et al.
Rivest et al. "A Method for Obtaining Digital Signatures and Public Key Cryptosystems", Communications of the ACM, vol. 21, No. 2, Feb. 1978, pp. 120-126.
Dolev "Unanimity in an Unknown and Unreliable Environment", available from the IEEE, New York, N.Y., under catalog number CH1695-6/81/0000/159, 1981.
Diffie et al. "New Directions in Cryptography", IEEE Transactions on Information Theory, vol. IT-22, No. 6, Nov. 1976, pp. 644-654.
Perlman "Fault-Tolerant Broadcast of Routing Information", Computer Networks 7 (1983), North-Holland, Inc., pp. 395-405.
Humblet et al. "Topology Broadcast Algorithms", Computer Networks and ISDN Systems 16 (1988/89), North-Holland, Inc., pp. 179-186.
Gallagher et al. Chapter 5 of Data Networks, Prentice-Hall, Englewood Cliffs, N.J., 1987.
Digital Equipment Corporation
Gregory Bernarr E.
LandOfFree
Robust data broadcast over a distributed network with malicious does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Robust data broadcast over a distributed network with malicious , we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Robust data broadcast over a distributed network with malicious will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1893049