System and method for selectively authenticating data

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S166000

Reexamination Certificate

active

06842860

ABSTRACT:
A high-speed, low-strength authentication mechanism is disclosed. This mechanism is based on a partial message authentication code, wherein a message authentication code is applied only to some portion of the message. By applying an authentication algorithm only to selected parts of the message, significant time can be saved while maintaining acceptable security.

REFERENCES:
patent: 5724428 (1998-03-01), Rivest
patent: 5835600 (1998-11-01), Rivest
Balenson et al., “Adaptive Cryptographically Synchronized Authentication”, Revision 1.0 Dec. 7th, 1998.*
Bellare et al., “Keying Hash Functions for Message Authentication”, Preliminary Version.*
M. Bellare, R. Canetti, and H. Krawczyk, “Keying Hash Functions for Message Authentication” inAdvances in Cryptology: Proceedings of CRYPTO '96, LNCS 1109, N. Koblitz, ed., Spinger-Verlag (1996), 1-15.
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, “Multicast Security: A Taxonomy and Efficient Constructions” inINFOCOM '99 Proceedings, Mar. 1999.
P. Rogaway, “Design and Analysis of Message Authentication Codes,” presented at the 1996 RSA Data Security Conference, Jan. 19, 1996.
P. Rogaway, “Bucket Hashing and its Application to Fast Message Authentication,” J. of Cryptology, Oct. 13, 1997.
J. Touch, “Performance Analysis of MD5,” proceedings of Sigcomm '95, Boston, MA.
Atomic-2 Fast Security, http://www.isi.edu/atomic2/security/, printed Jan. 15, 2001.
Cryptographic Technologies Adaptive Cryptographically Synchronized Authentication (ACSA), http://www.pgp.com/research
ailabs/cryptographic/adaptive-cryptographic.asp, printed Jan. 12, 2001.
D. Balenson, et al., ACSA Kickoff Brief presented to DARPA on Sep. 11, 1998.
D. Balenson, et al., ACSA Presentation to the DARPA/ITO Next Generation Internet (NGI) Principal Investigator's (PI) Meeting held on Oct. 29, 1998.
D. Balenson, et al., ACSA Presentation to the XIWT Workshop on Information Assurance and Trustworthy Networks held Nov. 18, 1998.
D. Carman, “Adaptively Trading Off Strength and Performance in Network Authentication,” Presentation at the RSA Conference 2000 held Jan. 19, 2000.
D. Balenson, et al., ACSA Model and Analysis Document—Revision 1.0 delivered to DARPA on Dec. 7, 1998.
D. Carman, et al., ACSA Prototype System Design Document, Revision 1.0, May 12, 1999.
D. Carman, et al., ACSA Final Report delivered to DARPA on Dec. 6, 2000.
DARPA ITO Sponsored Research, 1998 Project Summary, Adaptive Cryptographically Synchronized Authentication.
DARPA ITO Sponsored Research, 1999 Project Summary, Adaptive Cryptographically Synchronized Authentication.
J. Black, S. Halevi, H. Krawczyk, T. Krovetz, and P. Rogaway, “UMAC: Fast and Secure Message Authentication,” Advances in Cryptology—CRYPTO '99, vol. 1666, Springer-Verlag, 1999, pp. 216-233.
J. Adcock, D. Balenson, D. Carman, M. Heyman, and A. Sherman, “Trading Off Strength and Performance in Network Authentication: Experience with the ACSA Project,” DARPA Information Survivability Conference and Exposition, Jan. 25-27, 2000.
Department of Defense Security Institute, STU-III Handbook for Industry, Feb. 1997.
Commerce Business Daily, PSA#2134, Jul. 10, 1998.
R. Gennaro and P. Rohatgi, “How to Sign Digital Streams,” In Proceedings of CRYPTO 97, pp. 180-197, Feb. 24, 1998, Santa Barbara, CA.
S. Halevi and H. Krawczyk, “MMH: Software message authentication in the Gbit/second rates,” Fast Software Encryption, LNCS 1267, E. Biham, Ed., Springer-Verlag, 1997, pp. 172-189.
D. McGrew, “Optimal One-Time Signature Methods,” Trusted Information Systems Technical Report, Aug., 1997.
H. Krawczyk, “LFSR-Based Hashing and Authentication,” In Proc. CRYPTO 94, Lecture Notes in Computer Science. Springer-Verlag, 1994.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for selectively authenticating data does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for selectively authenticating data, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for selectively authenticating data will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3418327

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.