scispace - formally typeset
Search or ask a question
Author

Daburiyuu Deeru Hopukinzu

Bio: Daburiyuu Deeru Hopukinzu is an academic researcher. The author has contributed to research in topics: Message authentication code & Encryption. The author has an hindex of 1, co-authored 1 publications receiving 3 citations.

Papers
More filters
Patent
10 Nov 1995
TL;DR: In this paper, the authors proposed to improve reliability in a message from node to node by using one session key for encrypting a personal identification number(PIN) together with a message authentication code(MAC), random number, message and continuous numbers.
Abstract: PURPOSE: To improve reliability in a message from node to node by using one session key for encrypting a personal identification number(PIN) together with a message authentication code(MAC), random number, message and continuous numbers. CONSTITUTION: When a user inputs his own PIN 37 at a starting node 31, the PIN is transformed into a block, together with additional data bits and the PIN of reference bit length is formed. Furthermore, transaction data or a message 41 is linked with continuous numbers 43. These linked message and continuous numbers are encrypted by an ordinary DES module 45 by the PIN and one field 53 in these data is operated as a MAC. The field 53 of selected MAC is encrypted by an ordinary encryption module 55 together with the random number, while using a session key K1 as an encryption key 50. Moreover, a PIN 39 is encrypted by a DES encryption module 60, while using the session key K1 as the encryption key 50.

3 citations


Cited by
More filters
Patent
01 Nov 2004
TL;DR: In this article, the two levels of session keys and response values may be used by upgraded subscriber stations and network access points to prevent attackers from intercepting authentication triplets in wireless communications between a network and a subscriber station.
Abstract: Systems and methods of securing wireless communications between a network and a subscriber station include inserting a marker denoting an encryption type within a random value used for authentication, calculating a first session key and a first response value as a function of the random value, then calculating a second session key and a second response value as a function of the random value, first session key and first response value. The two levels of session keys and response values may be used by upgraded subscriber stations and network access points to prevent attackers from intercepting authentication triplets.

20 citations

Patent
11 May 2004
TL;DR: In this paper, the authors proposed a secure protocol for sending data among user equipment of nodes connected to a network, which is characterised in that it comprises generating random keys (6) that are different for each packet, which are used for enciphering each packet by means of the DES Enciphering algorithm, and the sending in the header of the packet of that random key (6), in turn enciphered by a more secure algorithm than the DES algorithm, which permits improvement in the security of transmissions on a non-secure medium to which are connected the nodes and
Abstract: Applicable in communications systems in the sending of data among user equipment of nodes connected to a network. It is characterised in that it comprises generating random keys (6) that are different for each packet, which are used for enciphering each packet by means of the DES enciphering algorithm, and the sending in the header of the packet of that random key (6), in turn enciphered (9) by means of a more secure algorithm than the DES algorithm, which permits improvement in the security of transmissions on a non-secure medium to which are connected the nodes and user equipment of a telecommunications system using the procedure of the invention instead of the DES enciphering algorithm.

8 citations

Patent
Jin-hyeon Choi1, Sang-hyun Shin1
22 Jun 2006
TL;DR: In this article, a wireless network apparatus including an authentication information storage unit to store first authentication information for network communication, authentication information converting unit to generate second authentication information by converting the stored authentication information according to an predetermined authentication method, and an authentication processing unit to conduct an authentication based on the second authenticated information.
Abstract: A wireless network apparatus including an authentication information storage unit to store first authentication information for network communication, an authentication information converting unit to generate second authentication information by converting the stored first authentication information according to an predetermined authentication method, a nonvolatile storage unit to store the generated second authentication information, and an authentication processing unit to conduct an authentication based on the second authentication information.

1 citations