System and method for enabling authentication at different...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S152000, C713S166000, C713S156000, C713S159000, C713S160000, C713S161000, C713S163000, C713S169000, C713S170000, C713S175000, C713S176000, C714S049000, C714S052000, C380S229000, C705S067000, C709S203000

Reexamination Certificate

active

06915426

ABSTRACT:
A system and method for generating a plurality of authentication tags using a plurality of authentication mechanisms is disclosed. The plurality of authentication tags can reflect different authentication strength-performance levels. It is a feature of the present invention that a receiver is afforded increased flexibility in adaptively choosing strength-performance levels. It is a further feature of the present invention that multiple authentication tags can be used in multicast environments, where different receivers may have different processor capabilities or security policies.

REFERENCES:
patent: 5724428 (1998-03-01), Rivest
patent: 5835600 (1998-11-01), Rivest
Balenson et al., “Adaptive Cryptographically Synchronized Authentication”, Revision 1.0 Dec. 7, 1998.
Black et al. “UMAC: Fast and Secure Message Authentication”, Jul. 15, 1999.
M. Bellare, R. Canetti, and H. Krawczyk, “Keying Hash Functions for Message Authentication” inAdvances in Cryptology: Proceedings of CRYPTO '96, LNCS 1109, N. Koblitz, ed., Springer-Verlag (1996), 1-15.
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, “Multicast Security: A Taxonomy and Efficient Constructions” inINFOCOM '99 Proceedings,Mar. 1999.
P. Rogaway, “Design and Analysis of Message Authentication Codes,” presented at the 1996 RSA Data Security Conference, Jan. 19, 1996.
P. Rogaway, “Bucket Hashing and its Application to Fast Message Authentication,” J. of Cryptology, Oct. 13, 1997.
J. Touch, “Performance Analysis of MD5,” proceedings of Sigcomm '95, Boston, MA.
Atomic-2 Fast Security, http://www.isi.edu/atomic2/security/, printed Jan. 15, 2001.
Cryptographic Technologies Adaptive Cryptographically Synchronized Authentication (ACSA), http://www.pgp.com/research
ailabs/cryptographic/adaptive-cryptographic.asp, printed Jan. 12, 2001.
D. Balenson, et al., ACSA Kickoff Brief presented to DARPA on Sep. 11, 1998.
D. Balenson, et al., ACSA Presentation to the DARP/ITO Next Generation Internet (NGI) Principal Investigator's (PI) Meeting held on Oct. 29, 1998.
D. Balenson, et al., ACSA Presentation to the XIWT Workshop on Information Assurance and Trustworthy Networks held Nov. 18, 1998.
D. Carman, “Adaptively Trading Off Strength and Peformance in Network Authentication,” Presentation at the RSA Conference 2000 held Jan. 19, 2000.
D. Balenson, et al., ACSA Model and Analysis Document—Revision 1.0 delivered to DARPA on Dec. 7, 1998.
D. Carman, et al., ACSA Prototype System Design Document, Revision 1.0, May 12, 1999.
D. Carman, et al., ACSA Final Report delivered to DARPA on Dec. 6, 2000.
DARPA ITO Sponsored Research, 1998 Project Summary, Adaptive Cryptographically Synchronized Authentication.
DARPA ITO Sponsored Research, 1999 Project Summary, Adaptive Cryptographically Synchronized Authenication.
J. Black, S. Halevi, H. Krawczyk, T. Krovetz, and P. Rogaway, “UMAC: Fast and Secure Message Authentication,” Advances in Cryptology—Crypto '99, vol. 1666, Springer-Verlag, 1999, pp. 216-233.
J. Adcock, D. Balenson, D. Carman, M. Heyman, and A. Sherman, “Trading Off Strength and Performance in Network Authenication: Experience with the ACSA Project,” DARPA Information Survivability Conference and Exposition, Jan. 25-27, 2000.
Department of Defense Security Institute, STU-III Handbook for Industry, Feb. 1997.
Commerce Business Daily, PSA#2134, Jul. 10, 1998.
R. Gennaro and P. Rohatgi, “How to Sign Digital Streams,” In Proceedings of CRYPTO 97, pp. 180-197, Feb. 24, 1998, Santa Barbara, CA.
S. Halevi and H. Krawczyk, “MMH: Software message authentication in the Gbit/second rates,” Fast Software Encryption, LNCS 1267, E. Biham, Ed., Springer-Verlag, 1997, pp. 172-189.
D. McGrew, “Optimal One-Time Signature Methods,” Trusted Information Systems Technical Report, Aug., 1997.
H. Krawczyk, “LFSR-Based Hashing and Authentication,” In Proc. CRYPTO 94, Lecture Notes in Computer Science. Springer-Verlag, 1994.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for enabling authentication at different... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for enabling authentication at different..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for enabling authentication at different... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3387397

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.