$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Encryption of data packets using a sequence of private keys generated from a public key exchange 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/22
출원번호 US-0919728 (1997-08-28)
발명자 / 주소
  • Wright Andrew S.,CAX
출원인 / 주소
  • Telefonaktiebolaget L M Ericsson (publ), SEX
대리인 / 주소
    Jenkens & Gilchrist P.C.
인용정보 피인용 횟수 : 46  인용 특허 : 11

초록

A first cipher stream generated from a private key negotiated as a result of a public key exchange is partitioned to form a sequence of secondary keys. The secondary keys are then indexed. In one instance, each plaintext data packet is encrypted with a second cipher streams generated from a differen

대표청구항

[ What is claimed is:] [1.] A private key generator, comprising:a first generator for generating a private key;a second generator initialized with the private key for generating a first cipher stream;a partitioner that partitions the first cipher stream into a plurality of secondary keys for use in

이 특허에 인용된 특허 (11)

  1. Hellman Martin E. (Stanford CA) Diffie Bailey W. (Berkeley CA) Merkle Ralph C. (Palo Alto CA), Cryptographic apparatus and method.
  2. Goss Kenneth C (Oceano CA), Cryptographic method and apparatus for public key exchange with authentication.
  3. Beller Michael J. (Red Bank NJ) Chang Li Fung (Holmdel NJ) Yacobi Yacov (Berkeley Heights NJ), Cryptographic method for key agreement and user authentication.
  4. Dent Paul (Stehag SEX), Encrypton system for digital cellular communications.
  5. Normile James O. (Woodside CA) Chu Ke-Chiang (Saratoga CA), Method and apparatus for improving the security of an electronic codebook encryption scheme utilizing an offset in the p.
  6. Finkelstein Louis D. (Wheeling IL) Kosmach James J. (Palatine IL) Smolinske Jeffrey C. (Hoffman Estates IL), Method and apparatus for providing cryptographic protection of a data stream in a communication system.
  7. Raith Krister A. (Durham NC) Dent Paul W. (Stehag SEX), Method of and apparatus for selective resynchronization in a digital cellular communications system.
  8. Hellman Martin E. (Stanford CA) Merkle Ralph C. (Palo Alto CA), Public key cryptographic apparatus and method.
  9. Faucher David W. (Omaha NE), Secure communication method and apparatus.
  10. Maurer Robert E. (North Andover MA), Secure transmission system.
  11. Beller Michael J. (Red Bank NJ) Yacobi Yacov (Berkeley Heights NJ), Two-way public key authentication and key agreement for low-cost terminals.

이 특허를 인용한 특허 (46)

  1. Roig,Daniel, Authentication protocol.
  2. Benaloh,Josh D., Data signal with a database and a compressed key.
  3. Rubin, Frank, Device, system and method for cryptographic key exchange.
  4. Rubin, Frank, Device, system and method for cryptographic key exchange.
  5. Brumley, Billy Bob; Deivasigamani, Vinoth Kumar; Anand, Satish Nithianandan, Dynamic encryption keys for use with XTS encryption systems employing reduced-round ciphers.
  6. Benaloh, Josh D., Encrypted content data structure package and generation thereof.
  7. Benaloh,Josh D., Encrypted content data structure package and generation thereof.
  8. Tehranchi,Babak, Encryption apparatus and method for synchronizing multiple encryption keys with a data stream.
  9. Kasahara,Masao; Murakami,Yasuyuki, Encryption method, cryptographic communication method, ciphertext generating device and cryptographic communication system of public-key cryptosystem.
  10. Chandran, Gayathiri R.; Pickel, James W.; Springgay, Michael R., Encryption of security-sensitive data by re-using a connection.
  11. Benaloh, Josh D., Extraction of multiple single keys from a compressed key.
  12. Felsher, David Paul, Information record infrastructure, system and method.
  13. Benaloh,Josh D., Key compression.
  14. Benaloh,Josh D., Key generation.
  15. Fu, Judy, Key management for group communications.
  16. Darabi, Hooman; Leete, John, LNA gain adjustment for intermodulation interference reduction.
  17. Strasser,David A.; Pang,Edwin; Varga,Gabriel Z., Method and apparatus for providing a bus-encrypted copy protection key to an unsecured bus.
  18. Strasser, David A.; Pang, Edwin; Varga, Gabriel Z., Method and apparatus for providing bus-encrypted copy protection key to an unsecured bus.
  19. Bagshaw,Stephen A., Method and system for dual link communications encryption.
  20. Nyberg, Kaisa; Niemi, Valtteri, Method for ensuring data transmission security, communication system and communication device.
  21. Dultz,Wolfgang; Hildebrandt,Eric; Schmitzer,Heidrun; Dultz,Gisela, Method for the secure transmission of messages.
  22. Boyle, Jr.,Vincent Michael; Salter,Christopher Mark, Method of packet encryption that allows for pipelining.
  23. Shibata, Osamu; Yugawa, Taihei; Sekibe, Tsutomu; Hirota, Teruto; Saito, Yoshiyuki; Otake, Toshihiko, Method, apparatus and system for performing authentication according to challenge-response protocol using scrambled access information.
  24. Goodman, James, Method, module and system for providing cipher data.
  25. Kuehnel,Thomas, Methods and systems for frustrating statistical attacks by injecting pseudo data into a data system.
  26. Benaloh, Josh D.; Rosen, Andrew D.; Yuval, Gideon A., Methods and systems of protecting digital content.
  27. Benaloh,Josh D.; Rosen,Andrew D.; Yuval,Gideon A., Methods and systems of protecting digital content.
  28. Hammond, Peter M.; Munro, James F.; Kapp, Steven C., Methods for creating secret keys based upon one or more shared characteristics and systems thereof.
  29. Hoffberg, Steven M., Multifactorial optimization system and method.
  30. She,Alfred C.; Gimlett,James L., Pipelined deciphering round keys generation.
  31. Arkko,Jari; Turtiainen,Esa; Blom,Rolf, Secured map messages for telecommunications networks.
  32. Fadaie, Farid; Norberg, Lars Arvid, Securely sharing information via a public key-value data store.
  33. Hoffberg, Steven M., System and method for determining contingent relevance.
  34. Bestler, Caitlin; Aizman, Alexander, System and method for distributed deduplication of encrypted chunks.
  35. Bestler, Caitlin; Aizman, Alexander, System and method for distributed deduplication of encrypted chunks.
  36. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  37. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  38. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  39. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  40. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  41. Kendrick, Rodney B., System of charging for automobile insurance.
  42. Benaloh, Josh D., Systems and methods for compression of key sets having multiple keys.
  43. Benaloh,Josh D., Systems and methods for compression of key sets having multiple keys.
  44. Yung, Marcel M. M.; Patel, Sarvar, Systems and methods for faster public key encryption using the associated private key portion.
  45. Ungerboeck, Gottfried; Powell, Scott Richard; Shen, Ba-Zhong, Two-stage block synchronization and scrambling.
  46. Benaloh,Josh D., User access to a unique data subset of a database.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로