Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and apparatus for encrypting data in a wireless communication system

a wireless communication system and wireless communication technology, applied in the field of communication systems, can solve the problems of inability to combine information gathered inability to combine information from analyzing texts of different lengths, and inability to achieve combining analysis of different lengths. , to achieve the effect of reducing the number of arithmetic operations, reducing the number of table lookups, and efficient compromis

Inactive Publication Date: 2012-08-16
QUALCOMM INC
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The present invention is a novel and improved method for data encryption called Block Encryption Variable Length (BEVL) encoding. The invention addresses several weaknesses of the CMEA algorithm, including incomplete mixing of upper buffer entries, repeated use of tbox( ) value, and lack of encryption of the least significant bit of the first byte. The invention uses two tables, t1box and t2box, to eliminate the exploitable statistical characteristics of the CAVE table and mitigate these weaknesses. The invention is efficient to evaluate on 8-bit microprocessors, uses a 64 bit key, and can be easily modified to use a longer or shorter key. The invention also addresses the issue of meet-in-the-middle attacks and ensures that all 64 bits of the key are significant.

Problems solved by technology

The first weakness identified in CMEA is that the CAVE (Cellular Authentication Voice Privacy and Encryption) table used for table lookups is incomplete.
The second weakness of CMEA is the repeated use of the value of a function called tbox( ), evaluated at zero.
A related weakness in CMEA is that information gathered from analyzing texts of different lengths can generally be combined.
The use of the second critical tbox( ) entry in BEVL depends on the length of the message and makes combining the analysis of different length texts less feasible.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for encrypting data in a wireless communication system
  • Method and apparatus for encrypting data in a wireless communication system
  • Method and apparatus for encrypting data in a wireless communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027]The exemplary embodiment of the present invention consists of a first station 1000 encrypting data for wireless transmission to a second receiving station 2000, as depicted in FIG. 1. First station 1000 can be a remote station transmitting to a second station 2000, which could be a base station. Alternatively, first station 1000 could be a base station transmitting to a second station 2000, which could be a remote station. In all likelihood, both remote and base stations will have encryption and decryption means, as well as transmission and reception means, but the simplified system shown in FIG. 1 shows clearly the elements required to enable the present invention. Further, the benefits of this invention are not limited to wireless communications but can be readily applied in any situation where secure data must be transmitted over a medium which is susceptible to interception, as will be well understood by those skilled in the relevant art.

[0028]In FIG. 1, memory 10 containi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In a communications system, a method of transforming a set of message signals representing a message comprising the steps of first encoding one of the set of message signals in accordance with a first keyed transformation, a second encoding of the one of the set of message signals in accordance with at least one additional keyed transformation, a third encoding of the one of the set of message signals in accordance with a self inverting transformation in which at least one of the set of message signals is altered, a fourth encoding of the one of the set of message signals in accordance with at least one additional inverse keyed transformation wherein each of the at least one additional inverse keyed transformation is a corresponding inverse of at least one additional keyed transformation, and fifth encoding the one of the set of message signals in accordance with first inverse keyed transformation wherein the first inverse keyed transformation is the inverse of the first keyed transformation.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS[0001]This application is a divisional of U.S. patent application Ser. No. 10 / 814,065, filed Mar. 30, 2004, allowed, which is a continuation of U.S. Pat. No. 6,768,797, issued Jul. 27, 2004, which is a continuation of U.S. patent application Ser. No. 10 / 081,750, filed Feb. 21, 2002, pending, which is a continuation of U.S. Pat. No. 6,385,316, issued May 7, 2002, which is a continuation of U.S. Pat. No. 6,075,859, issued Jun. 13, 2000, all assigned to the assignee hereof and hereby expressly incorporated herein.BACKGROUND OF THE INVENTION[0002]I. Field of the Invention[0003]The present invention relates to communications systems. More particularly, the present invention relates to a novel and improved method for encrypting data for security in wireless communication systems.[0004]II. Description of the Related Art[0005]In a wireless communication system, it is desirable for the service provider to be able to verify that a request for service fro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04K1/00H04L9/06G09C1/00
CPCH04L9/0618H04L9/06
Inventor ROSE, GREGORY G.
Owner QUALCOMM INC