scispace - formally typeset
Patent

Recursive key schedule cryptographic system

Reads0
Chats0
TLDR
An encryption system in which a code word is processed, byte by byte, by a Vernan type process followed by non-linear encryption techniques, all of which are repeated several times, to generate a working key schedule is then used in the same process to encrypt the text as discussed by the authors.
Abstract
An encryption system in which a code word is processed, byte by byte, by a Vernan type process followed by non-linear encryption techniques, all of which are repeated several times, to generate a working key schedule. This key schedule is then used in the same process to encrypt the text.

read more

Citations
More filters
Book ChapterDOI

Differential Power Analysis

TL;DR: In this paper, the authors examine specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices. And they also discuss approaches for building cryptosystems that can operate securely in existing hardware that leaks information.
Patent

Method and apparatus for creating a secure communication channel among multiple event service nodes

TL;DR: In this paper, an approach for establishing secure multicast communication among multiple event service nodes is described, which can be distributed throughout an enterprise domain, in a logical tree that mimics the logical tree arrangement of domains in a directory server system.
Patent

Security system network

TL;DR: In this article, a series of slave transponders (T) are coupled via a full duplex bus to a master node (GW), and the master node periodically polls its slaves transponder to authenticate them.
Patent

Method and apparatus for distributing and updating group controllers over a wide area network using a tree structure

TL;DR: In this article, the authors propose an approach for establishing secure multicast communication among multiple multicast proxy service nodes of domains of a replicated directory service that spans a wide area network.
Patent

Block encryption algorithm with data-dependent rotations

TL;DR: A simple encryption and decryption device has been developed in this article, which is a fast block cipher that may be implemented efficiently in hardware or software, and makes heavy use of data-dependent rotations.
References
More filters
Patent

End-to-end encryption system and method of operation

TL;DR: In this article, an efficient end-to-end encryption system including key management procedures for providing secure, financial data communication between a system user at one of a plurality of transaction terminals of one of the plurality of acquirer institutions and one of an issuer institutions, with selected elements of the data being encrypted, decrypted and processed using a onetime session key which is similarly encrypted with master keys and efficiently sent along with the specific segments of the request and response messages.
Patent

Encryption system key distribution method and apparatus

TL;DR: In this article, a key distribution method and apparatus is described, which uses a channel from identified terminals (A, B, X) to a central key distribution center (KDC) for the establishment, on a one-session basis, of the key which is to be used for the next session between those terminals.
Patent

Block cipher cryptographic system

Feistel H
TL;DR: In this paper, a cryptographic system for encrypting a block of binary data under the control of a key consisting of a set of binary symbols is presented, which is utilized within a data processing environment to ensure complete privacy of data and information that is stored or processed within a computing system.
Patent

Key management system for on-line communication

TL;DR: In this article, a new and improved key management system was proposed to facilitate communication between point of sale terminals and a host processor, where the system provides for the generation of a table of keys in the terminal.
Patent

Cryptographic verification of operational keys used in communication networks

TL;DR: In this paper, an operational key verification scheme was proposed for data communication networks, in which a first number provided at the first station is operated upon in accordance with the first-station operational key to obtain cryptographic data for transmission to the second-station.