Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2005-12-13
2005-12-13
Morse, Gregory (Department: 2134)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C380S280000, C713S176000, C713S152000
Reexamination Certificate
active
06976168
ABSTRACT:
A system and method for implementing adaptive cryptographically synchronized authentication is disclosed. The authentication system includes a controller that dynamically selects one of a plurality of authentication mechanisms to be used in providing authentication for an exchange of message data. The variation in the level of authentication assurance can be based on one or more factors such as the current security conditions and the available CPU utilization.
REFERENCES:
patent: 5164988 (1992-11-01), Matyas et al.
patent: 5555309 (1996-09-01), Kruys
patent: 5689565 (1997-11-01), Spies et al.
patent: 5724428 (1998-03-01), Rivest
patent: 5835600 (1998-11-01), Rivest
patent: 6185682 (2001-02-01), Tang
Cheng, et al., “Design and Implementation of Modular Key Management Protocol □□and IP Secure Tunnel on AIX”, Apr. 28, 1995.
Samar et al., Unified Login with Pluggable Authentication Modules (PAM), Oct. 1995, Open Software Foundation.
More et al., “Throughput Improvement Through Dynamic Load Balance”, 1994, IEEE.
Venkatesan et al, “Threat-Adaptive Security Policy”, 1997, IEEE, 0-7803-3873-1/97, pp. 525-531.
Harkins, et al, “The Internet Key Exchange (IKE)”, Nov. 1998, Network Working Group.
D. Carman, et al., ACSA Final Report delivered to DARPA on Dec. 6, 2000, NAI Labs Technical Report #00-024.
DARPA ITO Sponsored Research, 1998 Project Summary, Adaptive Cryptographically Synchronized Authentication.
DARPA ITO Sponsored Research, 1999 Project Summary, Adaptive Cryptographically Synchronized Authentication.
J. Black, S. Halevi, H. Krawczyk, T. Krovetz, and P. Rogaway, “UMAC: Fast and Secure Message Authentication,” Advances in Cryptology—CRYPTO '99, vol. 1666, Springer-Verlag, 1999, pp. 216-233.
J. Adcock, D. Balenson, D. Carman, M. Heyman, and A. Sherman, “Trading Off Strength and Performance in Network Authentication: Experience with the ACSA Project,” DARPA Information Survivability Conference and Exposition, Jan. 25-27, 2000.
Department of Defense Security Institute, STU-III Handbook for Industry, Feb. 1997.
Commerce Business Daily, PSA#2134, Jul. 10, 1998.
R. Gennaro and P. Rohatgi, “How to Sign Digital Streams,” In Proceedings of CRYPTO 97, pp. 180-197, Feb. 24, 1998. Santa Barbara, CA.
S. Halevi and H. Krawczyk, “MMH: Software message authentication in the Gbit/second rates,” Fast Software Encryption, LNCS 1267, E. Biham, ED., Springer-Verlag, 1997, pp. 172-189.
D. McGrew, “Optimal One-Time Signature Methods,” Trusted Information Systems Technical Report, Aug., 1997.
H. Krawczyk, “LFSR-Based Hashing and Authentication,” In Proc. CRYPTO 94, Lecture Notes in Computer Science. Springer-Verlag, 1994.
M. Bellare, R. Canetti, and H. Krawczyk, “Keying Hash Functions for Message Authentication” inAdvances in Cryptology: Proceedings of CRYPTO '96,LNCS 1109, N. Koblitz, ed., Springer-Verlag (1996), 1-15.
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, “Multicast Security: A Taxonomy and Efficient Constructions” inINFOCOM '99 Proceedings,Mar. 1999.
P. Rogaway, “Design and Analysis of Message Authentication Codes,” presented at the 1996 RSA Data Security Conference, Jan. 19, 1996.
P. Rogaway, “Bucket Hashing and its Application to Fast Message Authentication”, J. of Cryptology, Oct. 13, 1997.
J. Touch, “Performance Analysis of MDS,” proceedings of Sigcomm '95, Boston, MA.
Atomic-2 Fast Security, http://www.isi.edu/atomic2/security/, printed Jan. 15, 2001.
Cryptographic Technologies Adaptive Cryptographically Synchronized Authentication (ACSA), http://www.pgp.com/research
ailabs/cryptographic/adaptive-cryptographic.asp, printed Jan. 12, 2002.
D. Balenson, et al., ACSA Kickoff Brief presented to DARPA on Sep. 11, 1998.
D. Balenson, et al., ACSA Presentation to the DARPA/ITO Next Generation Internt (NGI) Principal Investigator's (PI) Meeting held on Oct. 29, 1998.
D. Balenson, et al., ACSA Presentation to the XIWT Workshop on Information Assurance and Trustworthy Networks held Nov. 18, 1998.
D. Carman, “Adaptively Trading Off Strength and Peformance in Network Authentication,” Presentation at the RSA Conference 2000 held Jan. 19, 2000.
D. Balenson, et al., ACSA Model and Analysis Document—Revision 1.0 delivered to DARPA on Dec. 7, 1998, TIS Report #0758.
D. Carman, et al., ACSA Prototype System Design Document, Revision 1.0, May 12, 1999, TIS Report #0764.
Branstad Dennis K.
Carman David W.
Hamaty Christopher J.
Heneghan Matthew
McAfee, Inc.
Morse Gregory
Zilka-Kotab, PC
LandOfFree
System and method for adaptive cryptographically... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for adaptive cryptographically..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for adaptive cryptographically... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3495705