Stream cipher encryption method and apparatus that can...

Cryptography – Communication system using cryptography – Data stream/substitution enciphering

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S037000, C380S043000, C380S044000, C380S045000, C380S046000, C380S047000

Reexamination Certificate

active

06862354

ABSTRACT:
A stream cipher encryption method and apparatus that can efficiently seek to arbitrary location in a keystream, and a method of generating an arbitrary segment of keystream.

REFERENCES:
patent: 4944009 (1990-07-01), Micali et al.
patent: 5454039 (1995-09-01), Coppersmith et al.
patent: 5675652 (1997-10-01), Coppersmith et al.
patent: 5835597 (1998-11-01), Coppersmith et al.
patent: 6490354 (2002-12-01), Venkatesan et al.
O. Goldreich et al., “How to Construct Random Functions,” Journal of the Association for Computing Machinery, 53:4 (Oct., 1986), pp. 792-807.
B. Schneier, “Applied Cryptography: Protocols, Algorithms and Source Code in C,” 2nded. (New York: John Wiley & Sons, 1996), pp. 400-402.
Rogaway, P. and Coppersmith, D., “A Software-Optimized Encryption Algorithm”, Proc. of 1994 Fast Software Encryption Workshop, Lecture Notes In Computer Science, vol. 809, Springer-Verlag, 1994, pp. 56-63,reprinted inJ. Cryptology 11:4, Springer-Verlag, 1998, pp. 273-287,andhttp://www.cs.ucdavis.edu/˜rogaway/papers/seal-abstract.html.
M. Bellare et al., “Forward Integrity for Secure Audit Logs,” Dept. Comp. Sci. Eng., Univ. Calif. at San Diego, Nov. 23, 1997.
B. Schneier et al., “Cryptographic Support for Secure Logs on Untrusted Machines,” Proc. Seventh USENIX Security Symposium,, USENIX Press, Jan. 1998, pp. 53-62.
S. Kent et al., “Security Architecture for the Internet Protocol,” IETF Request for Comments (RFC) 2401, The Internet Society, Nov. 1998.
S. Kent et al., “IP Authentication Header,” IETF Request for Comments (RFC) 2402, The Internet Society, Nov. 1998.
S. Kent et al., “IP Encapsulating Security Payload (ESP),” IETF Request for Comments (RFC) 2406, The Internet Society, Nov. 1998.
D. Harkins et al., “The Internet Key Exchange (IKE),” RFC 2409, The Internet Society, Nov. 1998.
H. Orman, “The OAKLEY Key Determination Protocol,” RFC 2412, The Internet Society, Nov. 1998.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Stream cipher encryption method and apparatus that can... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Stream cipher encryption method and apparatus that can..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Stream cipher encryption method and apparatus that can... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3441934

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.