Cryptography – Particular algorithmic function encoding – Nbs/des algorithm
Patent
1998-04-20
1999-11-23
Cangialosi, Salvatore
Cryptography
Particular algorithmic function encoding
Nbs/des algorithm
H04L 900
Patent
active
059914068
ABSTRACT:
A system and method for data escrow cryptography are described. An encrypting user encrypts a message using a secret storage key (KS) and attaches a data recovery field (DRF), including an access rule index (ARI) and KS, to the encrypted message. The DRF and the encrypted message are stored in a storage device. To recover KS, a decrypting user extracts and sends the DRF to a data recovery center (DRC) that issues a challenge based on access rules (ARs) originally defined by the encrypting user. If the decrypting user meets the challenge, the DRC sends KS in a message to the decrypting user. Generally, KS need not be an encryption key but could represent any piece of confidential information that can fit inside the DRF. In all cases, the DRC limits access to decrypting users who can meet the challenge defined in either the ARs defined by the encrypting user or the ARs defined for override access.
REFERENCES:
patent: 4200770 (1980-04-01), Hellman et al.
patent: 4386233 (1983-05-01), Smid et al.
patent: 4405829 (1983-09-01), Rivest et al.
patent: 4590470 (1986-05-01), Koenig
patent: 4607137 (1986-08-01), Jansen et al.
patent: 4868877 (1989-09-01), Fischer
patent: 4910774 (1990-03-01), Barakat
patent: 4926480 (1990-05-01), Chaum
patent: 4947430 (1990-08-01), Chaum
patent: 4996711 (1991-02-01), Chaum
patent: 5005200 (1991-04-01), Fischer
patent: 5144665 (1992-09-01), Takaragi et al.
patent: 5191611 (1993-03-01), Lang
patent: 5200999 (1993-04-01), Matyas et al.
patent: 5210795 (1993-05-01), Lipner et al.
patent: 5214702 (1993-05-01), Fischer
patent: 5224163 (1993-06-01), Gasser et al.
patent: 5226080 (1993-07-01), Cole et al.
patent: 5263157 (1993-11-01), Janis
patent: 5265163 (1993-11-01), Golding et al.
patent: 5265164 (1993-11-01), Matyas et al.
patent: 5267313 (1993-11-01), Hirata
patent: 5276736 (1994-01-01), Chaum
patent: 5276737 (1994-01-01), Micali
patent: 5276901 (1994-01-01), Howell et al.
patent: 5280527 (1994-01-01), Gullman et al.
patent: 5299263 (1994-03-01), Beller et al.
patent: 5313521 (1994-05-01), Torii et al.
patent: 5313637 (1994-05-01), Rose
patent: 5315658 (1994-05-01), Micali
patent: 5341426 (1994-08-01), Barney et al.
patent: 5347578 (1994-09-01), Duxbury
patent: 5351293 (1994-09-01), Michener et al.
patent: 5371794 (1994-12-01), Diffie et al.
patent: 5373559 (1994-12-01), Kaufman et al.
patent: 5386470 (1995-01-01), Carter et al.
patent: 5406628 (1995-04-01), Beller et al.
patent: 5436972 (1995-07-01), Fischer et al.
patent: 5481613 (1996-01-01), Ford et al.
patent: 5557346 (1996-09-01), Lipner et al.
patent: 5557765 (1996-09-01), Lipner et al.
patent: 5564106 (1996-10-01), Puhl et al.
patent: 5640454 (1997-06-01), Lipner et al.
patent: 5745573 (1998-04-01), Lipner et al.
Computer Systems Laboratory, National Institute of Standards and Technology, Gaithersburg, MD, "Escrowed Encryption Standard (EES)", Federal Information Processing Standards Publication, FIPS PUB 185, Feb. 9, 1994.
Dorothy Denning, "The Clipper Chip: A Technical Summary", Revised Apr. 21, 1993.
Dorothy Denning, "The Clipper Chip: A Technical Summary", Apr. 19, 1993.
L. Harn and H. Y. Lin, "Integration of user authentication and access control", IEEE Proceedings-E, vol. 139, No. 2, pp. 139-143, Mar. 1992.
Brickell et al., "Skipjack Review: Interim Report: The Skipjack Algorithm", Georgetown University. Office of Public Affairs, pp. 1-6, Jul. 28, 1993.
Maher, David P., CryptoBackup and key escrow, AT&T Bell Labs Dept. D10083000, Oct. 1994, pp. 1-7. >Proprietary< Material Not Open to Public, to be Opened Only by Examiner or Other Authorized Patent and Trademark Office Employee.
Maher, David P., "Trust in the New Information Age", AT&T Technical Journal, Sep./Oct. 1994, vol.73, No. 5, Security Technologies, pp. 9-16.
"Fair Cryptosystems", Micali, S., Aug. 11, 1993.
"Draft Proposed Escrowed Encryption Standard", Branstad et al., viewgraphs presented at Computer Security and Privacy Meeting, Mar. 1994.
"Protocol Failure in the Escrowed Encryption Standard", Blaze, M., presented on Internet, Jun. 3, 1994.
"Private Escrow Key Management", Key Escrow Encryption Workshop, Scheidt et al., paper distributed Jun. 10, 1994.
"A Solution for the International Community", TECSEC, Key Escrow Encryption Workshop, viewgraphs distributed Jun. 10, 1994.
"An Advanced Key Management System", TECSEC, Key Escrow Encryption Workshop, paper distributed Jun. 10, 1994.
"Key Escrowing Today", Denning et al., IEEE Communications, Sep. 1994.
"A Taxonomy for Key Escrow Encryption Systems", Denning et al., draft distributed Sep. 24, 1994.
"Key Escrow Encryption: Does it Protect or Compromise User Interests?", Denning, D., Jan. 3, 1995.
"Observations About Key Escrow Alternatives", Denning, D., Jan. 2, 1995.
Denning, Dorothy, "International Key Escrow Encryption: Proposed Objectives", Georgetown University, draft of May 23, 1994.
Eldridge, Alan, Lotus Notes, "Key Escrow for Lotus Notes", comments submitted in Key Escrow Alternatives Workshop, Jun. 8,1994.
Fischer, Addison, Fischer International, "Software Key Escrow--Corporate Implementation", comments submitted in Key Escrow Alternatives Workshop, Jun. 10, 1994.
Novell, "Encryption Alternatives", comments submitted in Key Escrow Alternatives Workshop, Jun. 10, 1994.
Computer Associates International, Inc., "Commercial Cryptography Perspectives", comments submitted in Key Escrow Alternatives Workshop, Jun. 10, 1994.
Puhl, Larry, Motorola, comments submitted in Key Escrow Alternatives Workshop, Jun. 8, 1994.
Ferguson, Bill, Semaphore, comments submitted in Key Escrow Alternatives Workshop, Jun. 7, 1994.
COMPAQ Computer Corporation, "Proposed NIST Draft", comments submitted in Key Escrow Alternatives Workshop, Jun. 10, 1994.
Housley, Russell, SPYRUS, letter to Lynn McNulty, Aug. 3, 1994.
Desmedt, Yvo et al., "A Scientific Statement on the Clipper Chip Technology and Alternatives", University of Wisconsin, Milwaukee.
Droge, John C., "International Key Escrow", presented to NIPLI, Sep. 22, 1994.
Ford et al., "A Key Distribution Method for Object-Based Protection", presented at the Second ACM Conference on Computer and Communications Security, Nov. 2-4, 1994, Fairfax, VA., pp. 193-197.
Zimmerman, P., "Phil's Pretty Good Software Presents PGP: Pretty Good Privacy Public Key Encryption for the Masses", PGP User's Guide vol. I: Essential Topics, Dec. 3. 1992, pp. 1-40.
Zimmerman, P., "Phil's Pretty Good Software Presents PGP: Pretty Good Privacy Public Key Encryption for the Masses", PGP User's Guide vol. II: Special Topics, Dec. 3, 1992, pp. 1-53.
Appendix A. Internal Data Structures Used by PGP 2.1, Dec. 3, 1992, pp. 1-18.
Balenson David M.
Ellison Carl M.
Lipner Steven B.
Walker Stephen T.
Cangialosi Salvatore
Network Associates, Inc.
LandOfFree
System and method for data recovery does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for data recovery, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for data recovery will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1231191