scispace - formally typeset
Patent

Implementation efficient encryption and message authentication

Reads0
Chats0
TLDR
In this article, a block cipher is used in combination with a series of other data manipulation operations, including XOR operations and rotate operations, to provide a good degree of system security.
Abstract
Encryption and authentication techniques which can be implemented on inexpensive, e.g., 8-bit, microprocessors and micro-controllers, using very little of the microprocessor's memory, are described. While the described techniques require little system resources to implement they still provide a good degree of security. In accordance with the present invention, in order to avoid having to specifically dedicate a portion of the microprocessor's limited memory for use as a substitution box, a portion of the code stored in the microprocessor's memory, dedicated to performing another function, is selected to serve as an S-box. This memory saving technique is used to implement a block cipher. The block cipher is used in combination with a series of other data manipulation operations, including XOR operations and rotate operations, to provide a good degree of system security. The operations used to implement the techniques of the present invention are capable of being implemented using 8 bit instructions making the techniques of the present invention well suited for implementation on 8 bit systems such as those used in home and auto control applications. The message protocol and encryption scheme of the present invention involves the subtracting of current message payloads from previously received message payloads to distinguish between new messages and repeated messages which have already been acted upon. Messages are acted upon only once thereby rendering the recording and playing back of previous messages ineffective at defeating system security.

read more

Citations
More filters
Patent

Mass storage device with automated credentials loading

TL;DR: A portable mass storage device for use in two-factor authentication systems and methods is described in this paper, where a client application residing in the mass storage devices acts as both a password manager and an authentication manager that seamlessly performs the authentication procedures in the background while signing a user into various institutions of his choosing.
Patent

Methods used in a mass storage device with automated credentials loading

TL;DR: A portable mass storage device for use in two-factor authentication systems and methods is described in this article, where a client application residing in the mass storage devices acts as both a password manager and an authentication manager that seamlessly performs the authentication procedures in the background while signing a user into various institutions of his choosing.
Patent

Methods for remote monitoring and control of appliances over a computer network

TL;DR: In this article, a user is able to monitor the information appliances from a remote location, and control the appliances from the remote location using graphical user interfaces, which can be facilitated by graphical user interface.
Patent

Circuit and method for implementing the advanced encryption standard block cipher algorithm in a system having a plurality of channels

TL;DR: In this paper, the AES block cipher algorithm is implemented in a system having a plurality of channels and a single circuit for individually generating, on the fly, the round keys used during each round of AES block ciphers.
Patent

Secure memory card with life cycle phases

TL;DR: A secure memory card with encryption capabilities comprises various life cycle states that allow for testing of the hardware and software of the card in certain of the states, thus closing potential back doors to secure data and cryptographic keys as mentioned in this paper.
References
More filters
Patent

Product block cipher system for data security

TL;DR: In this article, a device for ciphering a block of data bits under control of a cipher key is described. But the cipher device performs a ciphering process by carrying out an operation in which the block of bits is first expanded by duplicating predetermined ones of the data bits, and then the substitution set of bits are then subjected to a linear transformation in accordance with an arbitrary but fixed permutation.
Patent

Message verification and transmission error detection by block chaining

TL;DR: In this article, a message transmission system for the secure transmission of multi-block data messages from a sending station to a receiving station is described, where the sending station contains cryptographic apparatus operative in successive cycles of operation during each of which an input block of clear data bits is ciphered under control of an input set of cipher key bits to generate an output block of ciphered data bits for transmission to the receiving station.
Patent

Byte stream selective encryption/decryption device

TL;DR: In this paper, the authors proposed an apparatus for insertion in a communications line for providing message secrecy within a significant portion of existing communications networks, where data is encoded by combining the data received with the output of an algorithm, the algorithm output being dependent on the data previously encoded and a unique key entered by the user.
Patent

Flexible mode DES system

TL;DR: A DES (Data Encryption Standard) system utilizing an input register, control logic and output register to provide for a selection from a multiplicity of operable modes on a single chip or family of chips is described in this paper.