Cryptographic method and apparatus

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Packet header designating cryptographically protected data

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

08060743

ABSTRACT:
A method of formatting data for transmission to another party including the step of incorporating in the data a flag indicative of the absence of data for authentication of the sender. An authentication tag length is also included to permit variable length tags to be used.

REFERENCES:
patent: 6092191 (2000-07-01), Shimbo et al.
patent: 2004/0073796 (2004-04-01), Kang et al.
Housley, R.; Whiting, D.; and Ferguson, N.; “Counter with CBC-MAC(CCM)”, submission to N.I.S.T., Jun. 3, 2002. Available from: http://csrc.nist.gov/encryption/modes/proposedmodes/.
Institute of Electrical and Electronics Engineers (IEEE),IEEE Std. 802.15.3-2003,IEEE Standard for Information Technology—Telecommunications and Information Exchange between Systems—Local and Metropolitan Area Networks—Specific Requirements—Part 15.3: Wireless Medium Access Control(MAC)and Physical Layer(PHY)Specifications for High Rate Wireless Personal Area Networks(WPAN); Clause 10.4; pp. 236-242 New York: IEEE Press, 2003.
Institute of Electrical and Electronics Engineers (IEEE),IEEE Std. 802.15.4-2003,IEEE Standard for Information Technology—Telecommunications and Information Erchange between Systems—Local and Metropolitan Area Networks—Specific Requirements—Part 15.4: Wireless Medium Access Control(MAC)and Physical Layer(PHY)Specifications for Low Rate Wireless Personal Area Networks(WPAN); Appendix B.1; pp. 191-195; New York: IEEE Press, 2003.
Jonsson, J.; “On the Security of CTR + CBC-MAC”, inProceedings of Selected Areas in Cryptography—SAC 2002, K. Nyberg, H. Heys, Eds., Lecture Notes in Computer Science, vol. 2595, pp. 76-93, Berlin: Springer, 2002.
Jonsson, J.; “On the Security ofCTR + CBC-MAC, NIST Mode of Operation—Additional CCM Documentation”; 2002. Available from: http://csrc.nist.gov/encryption/modes/proposedmodes/.
Dworkin, Morris; NIST Pub 800-38A 2001 ED, “Recommendation for Block Cipher Modes of Operation—Methods and Techniques”, NIST Special Publication 800-38A, 2001 Edition, US Department of Commerce/N.I.S.T., Dec. 2001. Available from: http://csrc.nist.gov/.
Dworkin, Morris; NIST Pub 800-38C,Draft “ Recommendation for Block Cipher Modes of Operation—The CCM Mode for Authentication and Confidentiality”, NIST Special Publication 800.38C, US Department of Commerce/N.I.S.T., Springfield, Virginia, Sep. 4, 2003. Available from: http://csrc.nist.gov/.
Rogaway, P.; Wagner, D.; “A Critique ofCCM”; IACR ePrint Archive 2003-070, Apr. 13, 2003.
Struik, R.; “02469r0P802-15—TG4-Draft-D17-Annex B-Security-Recommendation-for-IEEE-802.15.4-Low-Rate-WPAN”, IEEE submission, Nov. 19, 2002. Available from: http://grouper.ieee.org/groups/802/15/pub/2002/Nov02/.
Struik, R.; “02474rIP802-15—TG4-Security-and-Security-Architectural-Recommendations-for-the-IEEE-802.15.4-Low-Rate-WPAN”, IEEE submission, Nov. 19, 2002. Available from: http://grouper.ieee.org/groups/802/15/pub/2002/Nov02/.
Struik, R.; “Comments onNIST Draft Pub 800-38C: CCM Mode of Operation”, Oct. 20, 2003. Available from:http://csrc.nist.gov/CryptoToolkit/modes/Recommendation/.
ANSI X9, 63-2001, Public Key Cryptography for the Financial Services Industry—Key Agreement and Key Transport Using Elliptic Curve Cryptography, American Bankers Association, Nov. 20, 2001, 415 pp.
FIPS Pub 113, Computer Data Authentication, Federal Information Processing Standards Publication 113, US Department of Commerce/N.I.S.T., May 30, 1985, 6 pp.
FIPS Pub 197, Advanced Encryption Standard (AES), Federal Information Processing Standards Publication 197, US Department of Commerce/N.I.S.T. Springfield, Virginia, Nov. 26, 2001, 51 pp.
Institute of Electrical and Electronics Engineers, Inc., IEEE Std. 802.11-99, IEEE Standard for Telecommunications and Information Exchange Between Systems—LAN/MAN Specific Requirements—Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications, New York: IEEE Press, 1999, 526 pp.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Cryptographic method and apparatus does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Cryptographic method and apparatus, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cryptographic method and apparatus will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4292226

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.