Cryptography – Key management – Having particular key generator
Reexamination Certificate
2011-08-23
2011-08-23
Flynn, Nathan (Department: 2431)
Cryptography
Key management
Having particular key generator
C380S027000, C380S028000, C380S037000, C380S042000, C380S047000, C380S269000, C713S176000, C713S189000, C331S078000, C370S344000, C375S132000, C708S250000, C708S255000
Reexamination Certificate
active
08005215
ABSTRACT:
A system including a pseudo-random number generator having a register to store an extended state having a reduced state and a dynamic constant, an initialization module to initialize a part of the extended state based on a Key and/or an Initial Value, a state update module to update the reduced state, an output word module to generate output words, the state update module and the output word module being adapted to operate through cyclical rounds, each round including updating the reduced state and then generating one of the output words, and an update dynamic constant module to update the dynamic constant, wherein in a majority of the rounds, updating of the reduced state and/or generation of the output word is based on the dynamic constant, and the dynamic constant is only updated in a minority of the rounds. Related apparatus and method are also described.
REFERENCES:
patent: 5297207 (1994-03-01), Degele
patent: 6785389 (2004-08-01), Sella et al.
patent: 2002/0176572 (2002-11-01), Ananth
patent: 2004/0086117 (2004-05-01), Petersen et al.
patent: WO 00/254756 (2000-05-01), None
Alex Biryukov et al.; “Real Time Cryptanalysis of A5/1 on a PC” (Apr. 2000); available on the World Wide Web at: http://cryptome.orq/a51-bsw.htm.
Lars R. Knudsen et al.; “Analysis Methods for (Alleged) RC4”,Advances in Crypytology—ASIACRYPT 1998, Lecture Notes in Computer Science 1514(Springer-Verlag, 1998, pp. 327-341); available on the World Wide Web at: http://www.cosic.esat.kuleuven.be/publications/article-68.pdf.
A. Menezes et al.;Handbook of Applied Cryptology(CRC Press, Inc., 1997, pp. 213-222).
Souradyuti Paul et al.; “A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher”, Fast Software Encryption, FSE 2004, Lecture Notes in Computer Science (Springer-Verlag, 2004, pp. 245-259); found on the World Wide Web at: http://www.cosic.esat.kuleuven.be/publications/article-40.pdf.
Bartosz Zoltak; VMPC One—Way Function and Stream Cipher (IACR, Feb. 2004); available on the World Wide Web at: http://www.vmpcfunction.com/vmpc.pdf.
Applied Cryptology(2d ed., pp. 397-398).
Dec. 21, 2009 Supplementary European Search Report in connection with EP 06 711294.6.
Mantin Itsik
Sella Yaron
Waisbard Erez
Flynn Nathan
Husch & Blackwell LLP
NDS Limited
Wright Bryan
LandOfFree
Table shuffle cipher system does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Table shuffle cipher system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Table shuffle cipher system will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2632402