Stream cipher encryption and message authentication

Cryptography – Communication system using cryptography – Data stream/substitution enciphering

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S043000, C380S255000

Reexamination Certificate

active

07623656

ABSTRACT:
Stream cipher encryption and message authentication. Stream cipher encryption is performed by generating a keystream at the transmitting end from a state value, applying the keystream to plaintext to generate an encrypted message block having at least a portion of the plaintext converted to ciphertext, and updating the state value as a function of said at least a portion of the plaintext. Stream cipher decryption is performed by generating a keystream at the receiving end from the same state value, applying the keystream to the encrypted message block to convert the ciphertext to plaintext, and updating the state value as a function of the plaintext. Message authentication techniques are also described.

REFERENCES:
http://www.tcpipguide.com/free/t—BitMaskingSettingClearingandInvertingUsingBooleanL.htm, pp. 1, 2, 3, printed out in year 2008.
Festa, Cnet News, Group prepares MPEG-4 encryption, year 2003.
Bellare and Namprepre, Authenticated Encryption, Dec. 7, 2000, UCSD.
Vuckovac, MAG Cipher Design Notes, as printed out in year 2008.
Adaptive chosen-ciphertext attack, Wikipedia, printed out in year 2008.
AEAD block cipher modes of operation, Wikipedia, printed out in year 2008.
Authenticated encryption, Wikipedia, printed out in year 2008.
Chosen plaintext attack, Wikipedia, printed out in year 2008.
eSTREAM, Wikipedia, printed out in year 2008.
EAX mode, Wikipedia, printed out in year 2008.
Initialization vector,Wikipedia, printed out in year 2008.
Linear feedback shift register, Wikipedia, printed out in year 2008.
Shrinking generator, Wikipedia, printed out in year 2008.
Malleability, Wikipedia, printed out in year 2008.
Mask,Wikipedia, printed out in year 2008.
Message authenication code, Wikipedia, printed out in year 2008.
NSLFSR, Wikipedia, printed out in year 2008.
Plaintext, Wikipedia, printed out in year 2008.
Shift register,Wikipedia, printed out in year 2008.
Design of keystream generator Chi-Kwong Chan; Cheng, L.M.; Electronics Letters vol. 34, Issue 12, Jun. 11, 1998 pp. 1206-1207.
Clock-controlled chaotic keystream generators Sang Tao; Wang Ruli; Yan Yixun; Electronics Letters vol. 34, Issue 20, Oct. 1, 1998 pp. 1932-1934.
Linear models for keystream generators Golic, J.D.; Computers, IEEE Transactions on vol. 45, Issue 1, Jan. 1996 pp. 41-49.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Stream cipher encryption and message authentication does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Stream cipher encryption and message authentication, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Stream cipher encryption and message authentication will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4138687

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.