Cryptography – Key management – Key distribution
Reexamination Certificate
2005-08-16
2005-08-16
Barron, Jr., Gilberto (Department: 2132)
Cryptography
Key management
Key distribution
C380S262000, C380S260000, C380S043000, C713S171000, C713S168000, C713S163000
Reexamination Certificate
active
06931132
ABSTRACT:
A secure wireless local or metropolitan area network and data communications device therefor are provided, where the device transmits plain text in an encrypted message including cipher text and an initialization vector. The device may include a seed generator for performing a one-way algorithm using a secret key, a device address, and a changing reference value for generating a seed. Further, a random initialization vector (IV) generator may be included for generating a random IV, and a key encryptor may generate a key sequence based upon the seed and the random IV. Additionally, a logic circuit may be included for generating cipher text based upon the key sequence and plain text, and a wireless communications device may be connected to the logic circuit and the random IV generator for wirelessly transmitting the encrypted message.
REFERENCES:
patent: 5239584 (1993-08-01), Hershey et al.
patent: 5345508 (1994-09-01), Lynn et al.
patent: 5778069 (1998-07-01), Thomlinson et al.
patent: 5832228 (1998-11-01), Holden et al.
patent: 5872847 (1999-02-01), Boyle et al.
patent: 6028939 (2000-02-01), Yin
patent: 6167514 (2000-12-01), Matsui et al.
patent: 6215876 (2001-04-01), Gilley
patent: 6263437 (2001-07-01), Liao et al.
patent: 6438666 (2002-08-01), Cassagnol et al.
patent: 6542608 (2003-04-01), Scheidt et al.
patent: 2002/0035687 (2002-03-01), Skantze
patent: 2003/0059052 (2003-03-01), Cheng
Stubblefield et al.,Using the Fluhrer, Mantin and Shamir Attack to Break WEP, AT&T Labs Technical Report, TD-4ZCPZZ, Revision 2, Aug. 21, 2001.
Borisov et al.,Intercepting Mobile Communications: The insecurity of 802.11, In MOBICOM 2001, Rome, Italy, Jul. 2001.
Smith et al.,Securing Distance-Vector Routing Protocols, ISOC Symposium on Network and Distributed System Security, San Diego, CA, 1997, pp. 85-92.
Nguyen et al.,Security Routing Analysis for Mobile Ad Hoc Networks, Department of Interdisciplinary Telecommunications, University of Colorado at Boulder, Spring 2000.
RSA Security Response to Weaknesses in Key Scheduling Algorithm of RC4, RSA Laboratories, Sep. 1, 2001, available at, www.rsasecurity.com/rsalabs/technotes/wep.html.
Getgen,Securing the Air: Don't Let Your Wireless LAN be a Moving Target, IBM, Dec. 2001, available at www.-106.ibm.com/developerworks/library/wi-sec1/.
Mehta,Wired Equivalency Privacy Vulnerability, Apr. 4, 2001, available at www.rr.sans.org/wireless/equiv.php.
Ross,Containing the Wireless LAN Security Risk, Nov. 4, 2000, available at www.rr.sans.org/wireless/wireless_LAN.php.
WEP Fix Using RC4 Fast Packet Keying, RSA Laboratories, Dec. 17, 2001, available at www.rsasecurity.com/rsalabs/technotes/wep-fix.html.
Phifer, Fixed Wireless Technology—Better Than WEP, ISP Planet, Feb. 1, 2002, available at www.isp-planet.com/fixed_wir...technology/2002/better_than_wep.html.
Ying,KeyHopping™—A Security Enhancement Scheme for IEE 802.11 WEP Standards, NextComm, Inc., 2002.
Billhartz Thomas Jay
Fleming Frank Joseph
Allen Dyer Doppelt Milbrath & Gilchrist, P.A.
Barron Jr. Gilberto
Harris Corporation
Nobahar A.
LandOfFree
Secure wireless local or metropolitan area network and... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Secure wireless local or metropolitan area network and..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure wireless local or metropolitan area network and... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3499270