Block encryption method and schemes for data confidentiality and integrity protection

a technology of integrity protection and block encryption, applied in the field of secure data communication, can solve the problems of reducing performance or requiring additional power, prior-art block encryption schemes are less suitable for use in high-performance, low-power applications, and cannot be used in most real-time applications for embedded systems. the effect of low cos

Inactive Publication Date: 2006-03-16
VDG
View PDF6 Cites 109 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0016] The inventors have recognized, and it is an aspect of this invention, that it is highly advantageous to provide encryption schemes that several or all of the following aspects (1) require only one processing pass over the data or message with only one cryptographic primitive (i.e., the block cipher), (2) withstand chosen-message attacks, (3) can be used for high-performance and low-power applications, and low-power, low-cost hardware devices, (4) are suitable for real-time applications, and (5) can be used in parallel or pipelined fashion in addition to that of the standard sequential processing.

Problems solved by technology

In the prior art, block encryption schemes that require two passes over the data (e.g., one for encryption and one for computing a MAC) and a single cryptographic primitive, or two cryptographic primitives (e.g., block cipher and hash function), to provide both confidentiality and integrity, result in decreased performance or demand additional power when compared to schemes using a single cryptographic primitive (i.e., the block cipher) in one pass over the data.
Hence, prior-art block-encryption schemes are less suitable for use in high-performance, low-power applications, and low-power, low-cost hardware devices.
Furthermore, these prior-art block encryption schemes cannot be used in most real-time applications for embedded systems where commencing integrity verification cannot be deferred until the completion of message decryption.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block encryption method and schemes for data confidentiality and integrity protection
  • Block encryption method and schemes for data confidentiality and integrity protection
  • Block encryption method and schemes for data confidentiality and integrity protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0099] Referring to FIG. 1, a plaintext string x 23 representing the input data is presented to the encryption scheme providing data confidentiality and integrity 50 resulting in an output ciphertext string y 24. It is assumed that the sender and the receiver share a pair of secret keys K and K′ (i.e., a first key K 31, and a second key K′32) and that a random-number generator 73 is available. Keys K and K′ have the same length k and can be derived from a master key using key separation techniques well-known in the art. The input plaintext string x 23 is padded in some standard fashion so that it is a multiple of l bits. The padding is not shown in FIG. 1, as it is commonly known in the data processing art. It is assumed that the plaintext string x 23 is composed of n l-bit plaintext blocks 21. FIG. 1 shows an example plaintext string 23 composed of n=4 blocks, x=x1 x2 x3 x4.

[0100] In the description to follow, F is an l-bit block cipher with key length k, FK 70 is the l-bit block ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A block encryption method and schemes (modes of operation) that provide both data confidentiality and integrity with a single cryptographic primitive and a single processing pass over the input plaintext string by using a non-cryptographic Manipulation Detection Code function for secure data communication over insecure channels and for secure data storage on insecure media. The present invention allows, in a further aspect, software and hardware implementations, and use in high-performance and low-power applications, and low-power, low-cost hardware devices. The block encryption method and schemes of this invention allow, in yet a further aspect, encryption and decryption in parallel or pipelined manners in addition to sequential operation. In a yet further aspect, the block encryption method and schemes of this invention are suitable for real-time applications.

Description

CROSS-REFERENCE TO RELATED APPLICATION(S) [0001] This application is a Continuation of U.S. Ser. No. 09 / 761,771, filed on Jan. 18, 2001, which claims priority from U.S. provisional patent application Ser. No. 60 / 179,147, filed Jan. 31, 2000. The entire contents of each of the aforementioned applications are incorporated herein by reference.FIELD OF THE INVENTION [0002] The present invention relates to the technical field of secure data communication over insecure channels and secure data storage on insecure media using data encryption techniques. Specifically, the invention relates to encryption methods, program products and systems that achieve both data confidentiality and integrity in a single pass over the data with a single cryptographic primitive and allow encryption and decryption in sequential, parallel or pipelined manners. BACKGROUND OF THE INVENTION [0003] It is generally accepted that whenever two or more parties want to communicate over an insecure channel, encryption w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L9/28H04L9/00H04K1/00H04L9/06H04L9/32
CPCH04L9/0637H04L9/0643H04L9/0656H04L2209/20H04L2209/08H04L2209/125H04L9/3242
Inventor GLIGOR, VIRGIL DORINDONESCU, POMPILIU
Owner VDG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products