scispace - formally typeset
Patent

Method of designing optimum encryption function and optimized encryption apparatus in a mobile communication system

Reads0
Chats0
TLDR
In this paper, a method of designing an optimum encryption algorithm and an optimized encryption apparatus is described. But the method is not applicable to the problem of finding the optimal ciphertext.
Abstract
A method of designing an optimum encryption algorithm and an optimized encryption apparatus are disclosed. In the encryption apparatus, a function block produces a first ciphertext of length 2n by encrypting a first plaintext of length 2n with an encryption code of length 4n generated from a key scheduler, and a second ciphertext of length m by encrypting the first ciphertext with a second plaintext of length m under the control of a controller. A memory stores the second ciphertext.

read more

Citations
More filters
Patent

Method and system for hardware accelerator for implementing f8 confidentiality algorithm in WCDMA compliant handsets

TL;DR: In this paper, a method and system for hardware accelerator for implementing the f8 confidentiality algorithm in WCDMA compliant handsets are provided, where the number of processing blocks of output bits may be based on the length of the input bitstream.
Patent

Data-mover controller with plural registers for supporting ciphering operations

TL;DR: In this paper, a data processing system ciphers and transfers data between a first memory unit and a second memory unit, such as, for example, between a share memory architecture (SMA) static random access memory (SRAM) and a double data rate (DDR) synchronous dynamic random access (SDRAM).
Patent

Method and system for implementing FI function in KASUMI algorithm for accelerating cryptography in GSM/GPRS/EDGE compliant handsets

TL;DR: In this paper, a method and system for implementing an FI function in a KASUMI algorithm for accelerating cryptography in GSM/GPRS/EDGE compliant handsets are provided.
Patent

Method and system for implementing the A5/3 encryption algorithm for GSM and EDGE compliant handsets

TL;DR: In this article, a method and system for implementing the A5/3 encryption algorithm for GSM and EDGE compliant handsets are provided, where input variables may be initialized in a keystream generator and an intermediate value may be generated with a cipher key parameter and a key modifier.
Patent

Encryption device, encryption method and storage medium storing its program

TL;DR: In this article, the logical calculation result t 3 of the exclusive OR 614 of the process result of the FI function 602 of the MISTY structure in the second stage is not stored in a register.
References
More filters
Journal ArticleDOI

Cryptography and Computer Privacy

Horst Feistel
- 01 May 1973 - 
Patent

Block cipher cryptographic system

Feistel H
TL;DR: In this paper, a cryptographic system for encrypting a block of binary data under the control of a key consisting of a set of binary symbols is presented, which is utilized within a data processing environment to ensure complete privacy of data and information that is stored or processed within a computing system.
Patent

Data encryption system for encrypting plaintext data

Kim Yong Deok
TL;DR: In this paper, a preset master key is used to obtain a set of round subkeys, and each of the plaintext data blocks is encrypted by using the master key and combining the encrypted blocks.
Patent

Variant key matrix cipher system

TL;DR: In this article, a product cipher is used to encode a stream of binary data by using a modulo-two addition function, which is dependent on previous internal cipher digits transmitted and varies for each message bit processed.
Book ChapterDOI

Small and High-Speed Hardware Architectures for the 3GPP Standard Cipher KASUMI

TL;DR: In this paper, the authors designed compact and high-speed implementations of the KASUMI block cipher and compared several prototypes to existing designs in ASICs and FPGAs.