Techniques for performing symmetric cryptography

Boris Asipov

Abstract: Techniques are described for performing decryption using a key-specific decryption engine. A message including an encrypted data portion is received. The encrypted data portion is formed by performing a symmetric encryption operation using a symmetric key. The encrypted data portion is decrypted using a key-specific decryption engine which does not use the symmetric key as an input. Also described are techniques for generating the key-specific decryption engine which may be implemented using boolean functions determined for the symmetric key.

References

  1. Sherman S. M. Chow. "Forward Security from Bilinear Pairings: Signcryption and Threshold Signature", University of Hong Kong, Date: Aug. 2004, 148 Pages.
  2. CN Notice on the First Office Action for Application No. 200980123097.2, Jan. 31, 2013.
  3. CN Notice on the Second Office Action for Application No. 200980123097.2, Aug. 28, 2013.
  4. Dodis, et al., "Exposure-Resilience for Free: the Hierarchical ID-based Encryption Case" Security in Storage Workshop, 2002. Proceedings. First International IEEE, Date: Dec. 11, 2002, pp. 45-52.
  5. Golomb (Solomon Golomb, "On the Cryptanalysis of Nonlienear Sequences", IMA-Crypto& Coding '99, LNCS 1746, pp. 236-242,1999). *
  6. Golomb (Solomon Golomb, "On the Cryptanalysis of Nonlienear Sequences", IMA—Crypto& Coding '99, LNCS 1746, pp. 236-242,1999). *
  7. International Search Report and Written Opinion Received for PCT Application No. PCT/US2009/041225, mailed on Nov. 30, 2009, 11 pages.
  8. Johansson (Johansson et al., "Fast Correlation Attacks through Reconstruction of Linear Polynomials", Crypto 200, LNCS 1880, pp. 300-315, 2000). *
  9. JP Notice of Reason for Rejection for Application No. 2011-513515, Aug. 22, 2013.
  10. Kaeo (Merike Kaco, "Designing Network Security", ISBN 1-57870-043-4, 1999), p. 6-10. *
  11. Larsson Anders, "Cryptography", Linkoping University, Dec. 15, 2000, 11 Pages.
  12. Meier (Meier et al., Algebraic Attacks and Decomposition of Boolean Functions, Advances in Cryptology-Eurocrypt, 2004). *
  13. Meier (Meier et al., Algebraic Attacks and Decomposition of Boolean Functions, Advances in Cryptology—Eurocrypt, 2004). *
  14. Menezes et al. (Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone, "Handbook of applied cryptography", 1997, ISBN: 0849385237), Chapter 7. *
  15. Porwik (Porwik et al., "Dedicated Spectral Method of Boolean Functio Decomposition", Int. J. Appl. Math. Comput. Sci., 2006, vol. 16, No. 1, 271-278). *
  16. Xue (Yuan Xue, "Lecture 5: Ctryptography Basics", Sep. 2006), found on http://vanets.vuse.vanderbilt.edu/~xue/cs291fall06/ "CS 291 Network Security page, listed as "Secret-keyCryptography (Cryptography Basics).
  17. Xue (Yuan Xue, "Lecture 5: Ctryptography Basics", Sep. 2006), found on http://vanets.vuse.vanderbilt.edu/˜xue/cs291fall06/ "CS 291 Network Security page, listed as "Secret-key Cryptography (Cryptography Basics).