Cryptography – Communication system using cryptography – Data stream/substitution enciphering
Reexamination Certificate
2005-02-17
2009-11-24
Jung, David Y (Department: 2434)
Cryptography
Communication system using cryptography
Data stream/substitution enciphering
C380S043000, C380S255000
Reexamination Certificate
active
07623656
ABSTRACT:
Stream cipher encryption and message authentication. Stream cipher encryption is performed by generating a keystream at the transmitting end from a state value, applying the keystream to plaintext to generate an encrypted message block having at least a portion of the plaintext converted to ciphertext, and updating the state value as a function of said at least a portion of the plaintext. Stream cipher decryption is performed by generating a keystream at the receiving end from the same state value, applying the keystream to the encrypted message block to convert the ciphertext to plaintext, and updating the state value as a function of the plaintext. Message authentication techniques are also described.
REFERENCES:
http://www.tcpipguide.com/free/t—BitMaskingSettingClearingandInvertingUsingBooleanL.htm, pp. 1, 2, 3, printed out in year 2008.
Festa, Cnet News, Group prepares MPEG-4 encryption, year 2003.
Bellare and Namprepre, Authenticated Encryption, Dec. 7, 2000, UCSD.
Vuckovac, MAG Cipher Design Notes, as printed out in year 2008.
Adaptive chosen-ciphertext attack, Wikipedia, printed out in year 2008.
AEAD block cipher modes of operation, Wikipedia, printed out in year 2008.
Authenticated encryption, Wikipedia, printed out in year 2008.
Chosen plaintext attack, Wikipedia, printed out in year 2008.
eSTREAM, Wikipedia, printed out in year 2008.
EAX mode, Wikipedia, printed out in year 2008.
Initialization vector,Wikipedia, printed out in year 2008.
Linear feedback shift register, Wikipedia, printed out in year 2008.
Shrinking generator, Wikipedia, printed out in year 2008.
Malleability, Wikipedia, printed out in year 2008.
Mask,Wikipedia, printed out in year 2008.
Message authenication code, Wikipedia, printed out in year 2008.
NSLFSR, Wikipedia, printed out in year 2008.
Plaintext, Wikipedia, printed out in year 2008.
Shift register,Wikipedia, printed out in year 2008.
Design of keystream generator Chi-Kwong Chan; Cheng, L.M.; Electronics Letters vol. 34, Issue 12, Jun. 11, 1998 pp. 1206-1207.
Clock-controlled chaotic keystream generators Sang Tao; Wang Ruli; Yan Yixun; Electronics Letters vol. 34, Issue 20, Oct. 1, 1998 pp. 1932-1934.
Linear models for keystream generators Golic, J.D.; Computers, IEEE Transactions on vol. 45, Issue 1, Jan. 1996 pp. 41-49.
Hawkes Phillip
Paddon Michael
Rose Gregory Gordon
Choi Jae-Hee
Jung David Y
Kim Won Tae C.
QUALCOMM Incorporated
LandOfFree
Stream cipher encryption and message authentication does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Stream cipher encryption and message authentication, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Stream cipher encryption and message authentication will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4138687