Patent
Implementation efficient encryption and message authentication
Reads0
Chats0
TLDR
In this article, a block cipher is used in combination with a series of other data manipulation operations, including XOR operations and rotate operations, to provide a good degree of system security.Abstract:
Encryption and authentication techniques which can be implemented on inexpensive, e.g., 8-bit, microprocessors and micro-controllers, using very little of the microprocessor's memory, are described. While the described techniques require little system resources to implement they still provide a good degree of security. In accordance with the present invention, in order to avoid having to specifically dedicate a portion of the microprocessor's limited memory for use as a substitution box, a portion of the code stored in the microprocessor's memory, dedicated to performing another function, is selected to serve as an S-box. This memory saving technique is used to implement a block cipher. The block cipher is used in combination with a series of other data manipulation operations, including XOR operations and rotate operations, to provide a good degree of system security. The operations used to implement the techniques of the present invention are capable of being implemented using 8 bit instructions making the techniques of the present invention well suited for implementation on 8 bit systems such as those used in home and auto control applications. The message protocol and encryption scheme of the present invention involves the subtracting of current message payloads from previously received message payloads to distinguish between new messages and repeated messages which have already been acted upon. Messages are acted upon only once thereby rendering the recording and playing back of previous messages ineffective at defeating system security.read more
Citations
More filters
Patent
Mass storage device with automated credentials loading
TL;DR: A portable mass storage device for use in two-factor authentication systems and methods is described in this paper, where a client application residing in the mass storage devices acts as both a password manager and an authentication manager that seamlessly performs the authentication procedures in the background while signing a user into various institutions of his choosing.
Patent
Methods used in a mass storage device with automated credentials loading
TL;DR: A portable mass storage device for use in two-factor authentication systems and methods is described in this article, where a client application residing in the mass storage devices acts as both a password manager and an authentication manager that seamlessly performs the authentication procedures in the background while signing a user into various institutions of his choosing.
Patent
Methods for remote monitoring and control of appliances over a computer network
TL;DR: In this article, a user is able to monitor the information appliances from a remote location, and control the appliances from the remote location using graphical user interfaces, which can be facilitated by graphical user interface.
Patent
Circuit and method for implementing the advanced encryption standard block cipher algorithm in a system having a plurality of channels
Nhu-Ha Yup,Satish N. Anand +1 more
TL;DR: In this paper, the AES block cipher algorithm is implemented in a system having a plurality of channels and a single circuit for individually generating, on the fly, the round keys used during each round of AES block ciphers.
Patent
Secure memory card with life cycle phases
TL;DR: A secure memory card with encryption capabilities comprises various life cycle states that allow for testing of the hardware and software of the card in certain of the states, thus closing potential back doors to secure data and cryptographic keys as mentioned in this paper.
References
More filters
Patent
Product block cipher system for data security
William Friedrich Ehrsam,Carl H. W. Meyer,Robert Lowell Powers,John Lynn Smith,Walter Leonard Tuchman +4 more
TL;DR: In this article, a device for ciphering a block of data bits under control of a cipher key is described. But the cipher device performs a ciphering process by carrying out an operation in which the block of bits is first expanded by duplicating predetermined ones of the data bits, and then the substitution set of bits are then subjected to a linear transformation in accordance with an arbitrary but fixed permutation.
Patent
Message verification and transmission error detection by block chaining
TL;DR: In this article, a message transmission system for the secure transmission of multi-block data messages from a sending station to a receiving station is described, where the sending station contains cryptographic apparatus operative in successive cycles of operation during each of which an input block of clear data bits is ciphered under control of an input set of cipher key bits to generate an output block of ciphered data bits for transmission to the receiving station.
Patent
Byte stream selective encryption/decryption device
TL;DR: In this paper, the authors proposed an apparatus for insertion in a communications line for providing message secrecy within a significant portion of existing communications networks, where data is encoded by combining the data received with the output of an algorithm, the algorithm output being dependent on the data previously encoded and a unique key entered by the user.
Patent
Flexible mode DES system
TL;DR: A DES (Data Encryption Standard) system utilizing an input register, control logic and output register to provide for a selection from a multiplicity of operable modes on a single chip or family of chips is described in this paper.