Patent
Recursive key schedule cryptographic system
Reads0
Chats0
TLDR
An encryption system in which a code word is processed, byte by byte, by a Vernan type process followed by non-linear encryption techniques, all of which are repeated several times, to generate a working key schedule is then used in the same process to encrypt the text as discussed by the authors.Abstract:
An encryption system in which a code word is processed, byte by byte, by a Vernan type process followed by non-linear encryption techniques, all of which are repeated several times, to generate a working key schedule. This key schedule is then used in the same process to encrypt the text.read more
Citations
More filters
Book ChapterDOI
Differential Power Analysis
TL;DR: In this paper, the authors examine specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices. And they also discuss approaches for building cryptosystems that can operate securely in existing hardware that leaks information.
Patent
Method and apparatus for creating a secure communication channel among multiple event service nodes
TL;DR: In this paper, an approach for establishing secure multicast communication among multiple event service nodes is described, which can be distributed throughout an enterprise domain, in a logical tree that mimics the logical tree arrangement of domains in a directory server system.
Patent
Security system network
TL;DR: In this article, a series of slave transponders (T) are coupled via a full duplex bus to a master node (GW), and the master node periodically polls its slaves transponder to authenticate them.
Patent
Method and apparatus for distributing and updating group controllers over a wide area network using a tree structure
TL;DR: In this article, the authors propose an approach for establishing secure multicast communication among multiple multicast proxy service nodes of domains of a replicated directory service that spans a wide area network.
Patent
Block encryption algorithm with data-dependent rotations
TL;DR: A simple encryption and decryption device has been developed in this article, which is a fast block cipher that may be implemented efficiently in hardware or software, and makes heavy use of data-dependent rotations.
References
More filters
Patent
End-to-end encryption system and method of operation
TL;DR: In this article, an efficient end-to-end encryption system including key management procedures for providing secure, financial data communication between a system user at one of a plurality of transaction terminals of one of the plurality of acquirer institutions and one of an issuer institutions, with selected elements of the data being encrypted, decrypted and processed using a onetime session key which is similarly encrypted with master keys and efficiently sent along with the specific segments of the request and response messages.
Patent
Encryption system key distribution method and apparatus
TL;DR: In this article, a key distribution method and apparatus is described, which uses a channel from identified terminals (A, B, X) to a central key distribution center (KDC) for the establishment, on a one-session basis, of the key which is to be used for the next session between those terminals.
Patent
Block cipher cryptographic system
TL;DR: In this paper, a cryptographic system for encrypting a block of binary data under the control of a key consisting of a set of binary symbols is presented, which is utilized within a data processing environment to ensure complete privacy of data and information that is stored or processed within a computing system.
Patent
Key management system for on-line communication
TL;DR: In this article, a new and improved key management system was proposed to facilitate communication between point of sale terminals and a host processor, where the system provides for the generation of a table of keys in the terminal.
Patent
Cryptographic verification of operational keys used in communication networks
Jonathan Oseas,Carl H. W. Meyer,Stephen M. Matyas,Richard Edward Lennon,Paul Norman Prentice,Walter Leonard Tuchman +5 more
TL;DR: In this paper, an operational key verification scheme was proposed for data communication networks, in which a first number provided at the first station is operated upon in accordance with the first-station operational key to obtain cryptographic data for transmission to the second-station.