Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2005-07-05
2005-07-05
Morse, Gregory (Department: 2134)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S152000, C713S166000, C713S156000, C713S159000, C713S160000, C713S161000, C713S163000, C713S169000, C713S170000, C713S175000, C713S176000, C714S049000, C714S052000, C380S229000, C705S067000, C709S203000
Reexamination Certificate
active
06915426
ABSTRACT:
A system and method for generating a plurality of authentication tags using a plurality of authentication mechanisms is disclosed. The plurality of authentication tags can reflect different authentication strength-performance levels. It is a feature of the present invention that a receiver is afforded increased flexibility in adaptively choosing strength-performance levels. It is a further feature of the present invention that multiple authentication tags can be used in multicast environments, where different receivers may have different processor capabilities or security policies.
REFERENCES:
patent: 5724428 (1998-03-01), Rivest
patent: 5835600 (1998-11-01), Rivest
Balenson et al., “Adaptive Cryptographically Synchronized Authentication”, Revision 1.0 Dec. 7, 1998.
Black et al. “UMAC: Fast and Secure Message Authentication”, Jul. 15, 1999.
M. Bellare, R. Canetti, and H. Krawczyk, “Keying Hash Functions for Message Authentication” inAdvances in Cryptology: Proceedings of CRYPTO '96, LNCS 1109, N. Koblitz, ed., Springer-Verlag (1996), 1-15.
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, “Multicast Security: A Taxonomy and Efficient Constructions” inINFOCOM '99 Proceedings,Mar. 1999.
P. Rogaway, “Design and Analysis of Message Authentication Codes,” presented at the 1996 RSA Data Security Conference, Jan. 19, 1996.
P. Rogaway, “Bucket Hashing and its Application to Fast Message Authentication,” J. of Cryptology, Oct. 13, 1997.
J. Touch, “Performance Analysis of MD5,” proceedings of Sigcomm '95, Boston, MA.
Atomic-2 Fast Security, http://www.isi.edu/atomic2/security/, printed Jan. 15, 2001.
Cryptographic Technologies Adaptive Cryptographically Synchronized Authentication (ACSA), http://www.pgp.com/research
ailabs/cryptographic/adaptive-cryptographic.asp, printed Jan. 12, 2001.
D. Balenson, et al., ACSA Kickoff Brief presented to DARPA on Sep. 11, 1998.
D. Balenson, et al., ACSA Presentation to the DARP/ITO Next Generation Internet (NGI) Principal Investigator's (PI) Meeting held on Oct. 29, 1998.
D. Balenson, et al., ACSA Presentation to the XIWT Workshop on Information Assurance and Trustworthy Networks held Nov. 18, 1998.
D. Carman, “Adaptively Trading Off Strength and Peformance in Network Authentication,” Presentation at the RSA Conference 2000 held Jan. 19, 2000.
D. Balenson, et al., ACSA Model and Analysis Document—Revision 1.0 delivered to DARPA on Dec. 7, 1998.
D. Carman, et al., ACSA Prototype System Design Document, Revision 1.0, May 12, 1999.
D. Carman, et al., ACSA Final Report delivered to DARPA on Dec. 6, 2000.
DARPA ITO Sponsored Research, 1998 Project Summary, Adaptive Cryptographically Synchronized Authentication.
DARPA ITO Sponsored Research, 1999 Project Summary, Adaptive Cryptographically Synchronized Authenication.
J. Black, S. Halevi, H. Krawczyk, T. Krovetz, and P. Rogaway, “UMAC: Fast and Secure Message Authentication,” Advances in Cryptology—Crypto '99, vol. 1666, Springer-Verlag, 1999, pp. 216-233.
J. Adcock, D. Balenson, D. Carman, M. Heyman, and A. Sherman, “Trading Off Strength and Performance in Network Authenication: Experience with the ACSA Project,” DARPA Information Survivability Conference and Exposition, Jan. 25-27, 2000.
Department of Defense Security Institute, STU-III Handbook for Industry, Feb. 1997.
Commerce Business Daily, PSA#2134, Jul. 10, 1998.
R. Gennaro and P. Rohatgi, “How to Sign Digital Streams,” In Proceedings of CRYPTO 97, pp. 180-197, Feb. 24, 1998, Santa Barbara, CA.
S. Halevi and H. Krawczyk, “MMH: Software message authentication in the Gbit/second rates,” Fast Software Encryption, LNCS 1267, E. Biham, Ed., Springer-Verlag, 1997, pp. 172-189.
D. McGrew, “Optimal One-Time Signature Methods,” Trusted Information Systems Technical Report, Aug., 1997.
H. Krawczyk, “LFSR-Based Hashing and Authentication,” In Proc. CRYPTO 94, Lecture Notes in Computer Science. Springer-Verlag, 1994.
Carman David W.
Heyman Michael D.
Sherman Alan T.
Hamaty Christopher J.
Ho Thomas
Morse Gregory
Networks Associates Technology Inc.
Zilka-Kotab, PC
LandOfFree
System and method for enabling authentication at different... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for enabling authentication at different..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for enabling authentication at different... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3387397