Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2005-01-18
2005-01-18
Morse, Gregory (Department: 2134)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S166000
Reexamination Certificate
active
06845449
ABSTRACT:
A system and method for detecting and correcting errors using an authentication mechanism is described. In particular, a reversible inner function is used in a nested message authentication code configuration to provide both error detection and error correction in high performance applications.
REFERENCES:
patent: 5724428 (1998-03-01), Rivest
patent: 5835600 (1998-11-01), Rivest
Balenson et al., “Adaptive Cryptographically Synchronized Authentication”, Revision 1.0 Dec. 7th, 1998.*
Bellare et al., “Keying Hash Functions for Message Authentication”, Preliminary Version.*
M. Bellare, R. Canetti, and H. Krawczyk, “Keying Hash Functions for Message Authentication” inAdvances in Cryptology: Proceedings of CRYPTO '96, LNCS 1190, N. Koblitz, ed., Springer-Verlag (1996), 1-15.
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, “Multicast Security: A Taxonomy and Efficient Constructions” inINFOCOM '99 Proceedings, Mar. 1999.
P. Rogaway, “Design and Analysis of Message Authentication Codes,” presented at the 1996 RSA Data Security Conference, Jan. 19, 1996.
P. Rogaway, “Bucket Hashing and its Appication to Fast Message Authentication,”, J. of Cryptology, Oct. 13, 1997.
J. Touch, “Performance Analysis of MD5,” proceedings of Sigcomm '95, Boston, MA.
Atomic-2 Fast Security, http://www.isi.edu/atomic2/security/, printed Jan. 15, 2001.
Cryptographic Technologies Adaptive Cryptographically Synchronized Authentication (ACSA), http://www.pgp.com/research
ailabs/cryptograph/adaptive-cryptographic.asp, printed Jan. 12, 2001.
D. Balenson, et al. , ACSA Kickoff Brief presented to DARPA in Sep. 11, 1998.
D. Balenson, et al., ACSA Presentation to the DARPA/ITO Next Generation Internet (NGI) Principal Investigator's (PI) Meeting held on Oct. 29, 1998.
D. Balenson, et al. ACSA Presentation to the XIWT Workshop on Information Assurance and Trustworthy Networks held Nov. 18, 1998.
D. Carmen, “Adaptively Trading Off Strength and Performance in Network Authentication, ” Presentation at the RSA Conference 2000 held Jan. 19, 2000.
D. Balenson, et al., ACSA Model and Analysis Document—Revision 1.0 delivered to DARPA on Dec. 7, 1998.
D. Carmen, et al., ACSA Prototype System Design Document, Revision 1.0, May 12, 1999.
D. Carmen, et al., ACSA Final Report delivered to DARPA on Dec. 6, 2000.
DARPA ITO Sponsored Research, 1998 Project SummAry, Adaptive Cryptographically Synchronized Authentication.
DARPA ITO Sponsored Research, 1999 Project Summary, Adaptive Cryptographically Synchronized Authentication.
J. Black, S. Halevi, H. Krawczyk, T. Krovetz, and P. Rogaway, “UMAC: Fast and Secure Message Authentication,” Advances in Cryptology—CRYPTO '99, vol. 1666, Springer-Verlag, 1999, pp. 216-233.
J. Adcock, D. Balenson, D. Carman, M. Heyman, and A. Sherman, “Trading Off Strength and Performance in Network Authentication: Experience with the ACSA Project,” DARPA Information Survivability Conference and Exposition, Jan. 25-27, 2000.
Department of Defense Security Institute, STU-III Handbook for Industry, Feb. 1997.
Commerce Business Daily, PSA#2134, Jul. 10, 1998.
R. Gennaro and P. Rohatgi, “How to Sign Digital Streams,” In Proceedings of CRYPTO 97, pp. 180-197, Feb. 24, 1998, Santa Barbara, CA.
S. Halevi and H. Krawczyk, “MMH: Software message authentication in the Gbit/second rates,” Fast Software Encryption, LNCS 1267, E. Biham, Ed., Springer-Verlag, 1997, pp. 172-189.
D. McGrew, “Optimal One-Time Signature Methods, ” Trusted Information Systems Technical Report, Aug. 1997.
H. Krawczyk, “LFSR-Based Hashing and Authentication,” In Proc. CRYPTO 94, Lecture Notes in Computer Science. Springer-Verlag, 1994.
Wegman, et al. “New Hash Functions and Their Use in Authentication and Set Equality,” J Computer and System Services, (1981), 22:265-279.
Bellare et al., “Keying Hash Functions for Message Authentication”, Preliminary Version.
Carman David W.
Heyman Michael D.
Sherman Alan T.
Hamaty Christopher J.
Ho Thomas
Morse Gregory
Networks Associates Technology Inc.
Zilka-Kotab, PC
LandOfFree
System and method for fast nested message authentication... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for fast nested message authentication..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for fast nested message authentication... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3410285