Cryptography – Particular algorithmic function encoding – Nbs/des algorithm
Patent
1996-09-12
1997-06-17
Cangialosi, Salvatore
Cryptography
Particular algorithmic function encoding
Nbs/des algorithm
380 30, H04L 908
Patent
active
056404549
ABSTRACT:
A cryptographic communications system and method is provided for access field verification. A key exchange field which includes an encryption of at least part of a first encryption key using a public portion of a second encryption key, an access field which includes an encryption of at least part of the first encryption key using a public portion of a third encryption key, and a verification field which is created from at least one value used to create at least one of the key exchange field and the access field are provided to a receiver. Using the verification field, the receiver verifies that at least part of the first encryption key contained within the key exchange field and at least part of the first encryption key contained within the access field are equivalent. If the receiver's verification is successful, the access field is determined to be authentic.
REFERENCES:
patent: 5276737 (1994-01-01), Micali
patent: 5315658 (1994-05-01), Micali
patent: 5557346 (1996-09-01), Lipner et al.
patent: 5557765 (1996-09-01), Lipner et al.
Harn, L. and H. Y. Lin, "Integration of User Authentication and Access Control," IEEE Proceedings-E, vol. 139, No. 2, pp. 139-143, Mar. 1992.
Brickell et al., "SKIPJACK Review: Interim Report: The SKIPJACK Algorithm," Georgetown University, Office of Public Affairs, pp. 1-6, Jul. 28, 1993.
Computer Systems Laboratory, National Institute of Standards and Technology, Gaithersburg, MD, "Escrowed Encryption Standard (EES)," Federal Information Processing Standards Publication, FIPS PUB 185, Feb. 9, 1994.
Denning, Dorothy, "The Clipper Chip: A Technical Summary," Revised Apr. 21, 1993.
Denning, Dorothy, "The Clipper Chip: A Technical Summary," Apr. 19, 1993.
Micali, S., "Fair Cryptosystems," Aug. 11, 1993.
Branstad et al., "Draft Proposed Escrowed Encryption Standard", viewgraphs presented at Computer Security and Privacy meeting, Mar. 1994.
Blaze, M., "Protocol Failure in the Escrowed Encryption Standard," presented on the Internet, Jun. 3, 1994.
Scheidt et al., "Private Escrow Key Management," Key Escrow Encryption Workshop, paper distributed Jun. 10, 1994.
"A Solution for the International Community," TECSEC, Key Escrow Encryption Workshop, viewgraphs distributed Jun. 10, 1994.
"Private Escrow Key Management," TECSEC, Key Escrow Encryption Workshop, viewgraphs distributed Jun. 10, 1994.
"An Advanced Key Management System," TECSEC, Key Escrow Encryption Workshop, paper distributed Jun. 10, 1994.
Denning, Dorothy "International Key Escrow Encryption: Proposed Objectives," Georgetown University, draft of May 23, 1994.
Denning, Dorothy et al., "Key Escrowing Today," Georgetown University, pre-published draft on Jul. 13, 1994 of IEEE Communications of Sep. 1994.
Eldridge, Alan, Lotus Notes, "Key Escrow for Lotus Notes," comments submitted in Key Escrow Alternatives Workshop, Jun. 10, 1994.
Fischer, Addison, Fischer International, "Software Key Escrow--Corporate Implementation," comments submitted in Key Escrow Alternatives Workshop, Jun. 10, 1994.
Novell, "Encryption Alternatives," comments submitted in Key Escrow Alternatives Workshop, Jun. 10, 1994.
Computer Associates International, Inc., "Commercial Cryptography Perspectives," comments submitted in Key Escrow Alternatives Workshop, Jun. 10, 1994.
Puhl, Larry, Motorola, comments submitted in Key Escrow Alternatives Workshop, Jun. 10, 1994.
Ferguson, Bill, Semaphore, comments submitted in Key Escrow Alternatives Workshop, Jun. 10, 1994.
COMPAQ Computer Corporation, "Proposed NIST Draft," comments submitted in Key Escrow Alternatives Workshop, Jun. 10, 1994.
Housley, Russell, SPYRUS, letter to Lynn McNulty, Aug. 3, 1994.
Desmedt, Yvo et al., "A Scientific Statement on the Clipper Chip Technology and Alternatives," University of Wisconsin, Milwaukee.
Balenson David M.
Ellison Carl M.
Lipner Steven B.
Walker Stephen T.
Cangialosi Salvatore
Trusted Information Systems, Inc.
LandOfFree
System and method for access field verification does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for access field verification, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for access field verification will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2163967