scispace - formally typeset
Search or ask a question

Showing papers on "Client-side encryption published in 1992"


Patent
09 Nov 1992
TL;DR: In this article, the encryption process makes use of a data sequence or secret peculiar to each domain so that the key generated in the domain is also peculiar to that domain, and each device periodically generates a new key for distribution over the network.
Abstract: A data transmission network (12) has a plurality of computers (14) interconnected by a transmission channel (12). The computer communicates with the channel through a security device (16) which encrypts and decrypts data. The device uses a key packet distributed over the network from which a new key is derived by using the encryption process within the device. The encryption process makes use of a data sequence or 'secret' peculiar to each domain so that the key generated in the domain is also peculiar to that domain. The key is changed as the encryption proceeds and upon completion of the data transmission. Each device periodically generates a new key for distribution over the network.

11 citations


Journal ArticleDOI
TL;DR: This paper develops another machine that makes use of current high-speed encryption chips in combination with hardware fuzzy comparers to automate the breaking process of the Data Encryption Standard.
Abstract: The Data Encryption Standard (DES) has been the subject of multiple attempts at breaking. As of this date no one has announced a method that will break DES with certainty. In this paper we do not consider a method but develop another machine. Many such machines have been proposed over the years (see [14]). Our machine makes use of current high-speed encryption chips in combination with hardware fuzzy comparers to automate the breaking process.

4 citations


Journal Article

1 citations