Cryptography – Communication system using cryptography – Having compression
Reexamination Certificate
1997-11-12
2002-06-04
Barrón, Jr., Gilberto (Department: 2131)
Cryptography
Communication system using cryptography
Having compression
C713S176000, C713S189000, C380S269000, C380S217000
Reexamination Certificate
active
06400824
ABSTRACT:
ORIGIN OF THE INVENTION
The invention described herein was made in the performance of work under a NASA contract, and is subject to the provisions of Public Law 96-517 (35 U.S.C. 202) in which the Contractor has elected to retain title.
FIELD OF THE INVENTION
The present invention relates to semiconductor imaging sensors, and more particularly, to semiconductor imaging sensors having on-chip encryption capabilities.
BACKGROUND OF THE INVENTION
Semiconductor imaging sensors have been used in a wide range of imaging applications. Images captured by a sensor can be converted into digital form for imaging processing or storage. Development in data processing and communication devices and systems allows easy and convenient transmission and exchange of digital images or video through various electromagnetic transmission channels (e.g., telephone lines and coaxial cables) and portable storage media (e.g., optical or magnetic disks).
Privacy or security of digital images is desirable in many applications. In particular, exchange and transfer of digital images over a shared transmission channel present a challenge to the security of sensitive information. Internet and Intranet are two examples of such a shared information transmission channel in which many computers are connected with one another by local or wide area communication networks. It is possible for a third party or an intruder to intercept or tamper with an digital image that is transmitted through such a shared transmission channel.
Data encryption techniques have been developed to increase the security or privacy of digital data or images by encoding the data to limit unauthorized access. An encryption technique uses a “key” based on a particular algorithm to change the sequence or format of digital data or images (“plaintext”) so that the data or image is enciphered or “scrambled” into an unintelligible form (“ciphertext”). An authorized user recovers the scrambled data or image by using a “key” that is constructed based on the encryption method. However, an unauthorized user, who does not have the knowledge of either the encryption method (e.g., the encryption algorithm) or the key, cannot easily decode the information.
The keys may be a non-rigid type which allows the same encryption and decryption functions to be used with different keys. Rigid type keys are “fixed” into hardware and are desirable in certain types of turn-key systems where data transfer is mostly in one direction (transmission only).
Cryptosystems may be divided into two main categories, symmetrical systems (i.e., the private key systems) and asymmetrical systems (i.e., the public-private key systems). The former is based on functions which may be easily computed but for which it is computationally infeasible to compute the inverse functions. The latter uses a secret key which is shared by the communicants and an eavesdropper has to decipher this secret key among extremely large amount of possibilities.
One well-known symmetrical encryption system is the Data Encryption Standard (“DES”) which exploits confusion and diffusion techniques. The number of DES keys can be up to or longer than 512 bits with the current computational power and as short as 64 bits with a security level acceptable to many applications. The DES cryptosystem typically encrypts 64-bit blocks of plaintext using a key length of 56 bits. The fundamental building block in DES (referred to as a round) is a combination of a substitution and a subsequent permutation of the text, based on the key. The plaintext is encoded through 16 rounds of a function, which usually implements substitution, permutation, exclusive-OR (“XOR”), and shift operations on subsets of the text and the key. In each round, a different subset of the elements from the key are used to perform the encryption. Hence, for example, a key K
1
may be applied during the first round, and a key K
i
is applied during the ith round, etc. An analogous algorithm is used to decrypt the ciphertext, but the keys are now applied in reverse order, and the shift operations are also performed in the opposite direction.
Another cryptosystem is the asymmetric RSA (“Rivest-Shamir-Adleman”) Public Key Cryptosystem. See, Rivest et al., “On digital signatures and public-key cryptosystems,” Comm. Of the ACM, Vol. 21, pp. 120-126, February, 1978. Two different keys are used: a public key to encrypt the plaintext and a private key to decrypt the ciphertext. Hardware implementations of RSA are usually many orders (e.g., about 1000 to 10,000 times) slower than a respective DES implementation. In software implementations, RSA is generally about 100 times slower than DES. As a result, RSA is often used for secure key exchange without prior exchange of secrets. Digital data or images are encrypted with DES. The encrypted data or images are sent out with the DES key encrypted by using RSA public key encryption.
In addition to encryption, it also desirable in certain applications to ensure the validity of a digital image. Validity of images has been traditionally checked by visual inspection for clues such as internal consistency, documentable provenance, and consistency with existing beliefs. Certain digital manipulation and synthesis of images may be free of observable defects. One way to indicate the originality and validity is to superimpose a digital signature on a digital image prior to transmission or transfer.
Conventional implementations of the above image encryption techniques usually use encryption circuitry separate from the imaging sensor chip. This may compromise the security of the image data since the image data can be intercepted or tampered during transmission from the imaging sensor chip to the off-chip encryption circuitry.
SUMMARY OF THE INVENTION
The present invention integrates one or more analog-to-digital converters and encryption circuity on a focal plane of a semiconductor imaging chip to achieve on-chip encryption and/or superimposition of a digital signature.
A semiconductor imaging device according to one embodiment of the invention includes an imaging array with a plurality of sensing elements formed on a semiconductor substrate, at least one analog-to-digital converter formed on the substrate and electrically connected to the imaging array, and an encryption circuit formed on the substrate. An optical image received by the imaging array is converted to a digital image by the analog-to-digital converter. The encryption circuit encrypts the digital image according to an encryption key to produce an encrypted digital output.
An electronic circuit may also be formed on the substrate to produce a distinct digital number associated with the imaging device. The digital number can be superimposed on the digital image as a digital signature of the device.
These and other aspects and advantages of the present invention will become more apparent in light of the following detailed description, the accompanying drawings, and the claims.
REFERENCES:
patent: 5343297 (1994-08-01), Tiemann et al.
patent: 5367516 (1994-11-01), Miller
patent: 5406332 (1995-04-01), Shinohara et al.
patent: 5461425 (1995-10-01), Fowler et al.
patent: 5499294 (1996-03-01), Friedman
patent: 5502575 (1996-03-01), Kai et al.
patent: 5557678 (1996-09-01), Ganesan
patent: 5576758 (1996-11-01), Arai et al.
patent: 5625210 (1997-04-01), Lee et al.
patent: 5751809 (1998-05-01), Davis et al.
patent: 5801681 (1998-09-01), Sayag
patent: 5835599 (1998-11-01), Buer
patent: 5841126 (1998-11-01), Fossum et al.
patent: 5946396 (1999-08-01), Davis
patent: 5966446 (1999-10-01), Davis
Schneier, Bruce. “Applied Cryptography: Protocols, Algorithms, and Source Code in C”, 2nd ed. Chapter 10, section 6, p. 226.*
Microsoft Press Computer Dictionary, 2nd ed. Nov. 1993. p. 216.
Fossum Eric R.
Mansoorian Barmak
Barrón Jr. Gilberto
California Institute of Technology
Song Ho S.
LandOfFree
Semiconductor imaging sensor with on-chip encryption does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Semiconductor imaging sensor with on-chip encryption, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Semiconductor imaging sensor with on-chip encryption will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2968488