Techniques for performing symmetric cryptography
Boris Asipov
Abstract:
Techniques are described for performing decryption using a key-specific decryption engine. A message including an
encrypted data portion is received. The encrypted data portion is formed by performing a symmetric encryption
operation using a symmetric key. The encrypted data portion is decrypted using a key-specific decryption engine
which does not use the symmetric key as an input. Also described are techniques for generating the key-specific
decryption engine which may be implemented using boolean functions determined for the symmetric key.
References
-
Sherman S. M. Chow. "Forward Security from Bilinear Pairings: Signcryption and Threshold Signature", University of Hong Kong, Date: Aug. 2004, 148 Pages.
-
CN Notice on the First Office Action for Application No. 200980123097.2, Jan. 31, 2013.
-
CN Notice on the Second Office Action for Application No. 200980123097.2, Aug. 28, 2013.
-
Dodis, et al., "Exposure-Resilience for Free: the Hierarchical ID-based Encryption Case" Security in Storage Workshop, 2002. Proceedings. First International IEEE, Date: Dec. 11, 2002, pp. 45-52.
-
Golomb (Solomon Golomb, "On the Cryptanalysis of Nonlienear Sequences", IMA-Crypto& Coding '99, LNCS 1746, pp. 236-242,1999). *
-
Golomb (Solomon Golomb, "On the Cryptanalysis of Nonlienear Sequences", IMA—Crypto& Coding '99, LNCS 1746, pp. 236-242,1999). *
-
International Search Report and Written Opinion Received for PCT Application No. PCT/US2009/041225, mailed on Nov. 30, 2009, 11 pages.
-
Johansson (Johansson et al., "Fast Correlation Attacks through Reconstruction of Linear Polynomials", Crypto 200, LNCS 1880, pp. 300-315, 2000). *
-
JP Notice of Reason for Rejection for Application No. 2011-513515, Aug. 22, 2013.
-
Kaeo (Merike Kaco, "Designing Network Security", ISBN 1-57870-043-4, 1999), p. 6-10. *
-
Larsson Anders, "Cryptography", Linkoping University, Dec. 15, 2000, 11 Pages.
-
Meier (Meier et al., Algebraic Attacks and Decomposition of Boolean Functions, Advances in Cryptology-Eurocrypt, 2004). *
-
Meier (Meier et al., Algebraic Attacks and Decomposition of Boolean Functions, Advances in Cryptology—Eurocrypt, 2004). *
-
Menezes et al. (Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone, "Handbook of applied cryptography", 1997, ISBN: 0849385237), Chapter 7. *
-
Porwik (Porwik et al., "Dedicated Spectral Method of Boolean Functio Decomposition", Int. J. Appl. Math. Comput. Sci., 2006, vol. 16, No. 1, 271-278). *
-
Xue (Yuan Xue, "Lecture 5: Ctryptography Basics", Sep. 2006), found on http://vanets.vuse.vanderbilt.edu/~xue/cs291fall06/ "CS 291 Network Security page, listed as "Secret-keyCryptography (Cryptography Basics).
-
Xue (Yuan Xue, "Lecture 5: Ctryptography Basics", Sep. 2006), found on http://vanets.vuse.vanderbilt.edu/˜xue/cs291fall06/ "CS 291 Network Security page, listed as
"Secret-key Cryptography (Cryptography Basics).