scispace - formally typeset
Search or ask a question

Showing papers on "Attribute-based encryption published in 1993"


Book ChapterDOI
09 Dec 1993
TL;DR: A new non-proprietary secret-key block-enciphering algorithm, SAFER K-64 (for Secure And Fast Encryption Routine with a Key of length 64 bits) is described, which uses an unorthodox linear transform to achieve the desired “diffusion” of small changes in the plaintext or the key over the resulting ciphertext.
Abstract: A new non-proprietary secret-key block-enciphering algorithm, SAFER K-64 (for Secure And Fast Encryption Routine with a Key of length 64 bits) is described. The blocklength is 64 bits (8 bytes) and only byte operations are used in the processes of encryption and decryption. New cryptographic features in SAFER K-64 include the use of an unorthodox linear transform, called the Pseudo-Hadamard Transform, to achieve the desired “diffusion” of small changes in the plaintext or the key over the resulting ciphertext and the use of additive key biases to eliminate the possibility of “weak keys”. The design principles of K-64 are explained and a program is given, together with examples, to define the encryption algorithm precisely.

197 citations


Patent
20 Oct 1993
TL;DR: In this article, information is read from a medium such as paper in which information is written and the read information is deciphered using as a decryption key the same key as the encryption key used when the encryption processing is performed.
Abstract: Information is read from a medium such as paper in which information is written. The read information is enciphered. When encryption processing is performed, an encryption key is used. As the encryption key, an encryption key generated for each encryption is used, or an encryption key already generated is used again. The enciphered information is written into another medium such as paper. When decryption processing is performed, information is read from the medium in which the enciphered information is written. The read information is deciphered using as a decryption key the same key as the encryption key used when the encryption processing is performed. The deciphered information is written into another medium such as paper.

23 citations


Patent
15 Feb 1993
TL;DR: In this article, the authors proposed a public key cryptosystem which comprises an encryption device, a compatible decryption device, and a feed-back loop which evaluates a one-way or a oneway trap door function incorporating modular exponentiation with a small positive exponent.
Abstract: The present invention provides a public key cryptosystem which comprises an encryption device, said device having means for encrypting information including a feed-back loop which evaluates a one-way or a one-way trap door function incorporating modular exponentiation with a small positive exponent and thereby processes successively the blocks into which the information has been divided, to encrypt the information; and a compatible decryption device. The encryption and decryption devices of the present invention provide an outstandingly high rate of encryption and decryption without impairing the level of security associated with public key cryptosystems.

6 citations