System and method for encrypting and verifying messages using three-phase encryption

    公开(公告)号:AU2003282981A1

    公开(公告)日:2005-01-28

    申请号:AU2003282981

    申请日:2003-10-20

    Applicant: IBM

    Abstract: A method and system for encrypting and verifying the integrity of a message using a three-phase encryption process is provided. A source having a secret master key that is shared with a target receives the message and generates a random number. The source then generates: a first set of intermediate values from the message and the random number; a second set of intermediate values from the first set of values; and a cipher text from the second set of values. At the three phases, the values are generated using the encryption function of a block cipher encryption/decryption algorithm. The random number and the cipher text are transmitted to the target, which decrypts the cipher text by reversing the encryption process. The target verifies the integrity of the message by comparing the received random number with the random number extracted from the decrypted cipher text.

    SYSTEM AND METHOD FOR AUTHENTICATING SOFTWARE USING HIDDEN INTERMEDIATE KEYS

    公开(公告)号:CA2525376A1

    公开(公告)日:2005-01-20

    申请号:CA2525376

    申请日:2003-12-15

    Applicant: IBM

    Inventor: CRAFT DAVID J

    Abstract: A processing unit (300) includes a read-only encryption key (394). Loader co de image (250) is loaded into system memory (205) from non-volatile storage (270). Loader code image (250) includes a prefix value (225) and a suffix value (235). The prefix value (225) is combined with the master key (394) fr om the processing unit (300) to create a random value that is the seed for a hashing algorithm. The hashing algorithm uses the seed value with a signatur e formed from the blocks of code to form a result. During the hashing algorith m, intermediate key values are generated and stored in a memory area inaccessib le by the user. The intermediate key values are used by the loader code after t he loader has been authenticated and loaded. The loader combines one or more of the intermediate key values with prefix and suffix values that correspond to other software modules to authenticate the software, using a hashing algorithm, and load the software upon authentication.

    METHOD AND APPARATUS FOR ENCODING LEMPEL-ZIV VARIANTS

    公开(公告)号:MY116715A

    公开(公告)日:2004-03-31

    申请号:MYPI9803737

    申请日:1998-08-17

    Applicant: IBM

    Inventor: CRAFT DAVID J

    Abstract: A METHOD FOR ENCODING AN INPUT DATA STREAM OF SOURCE SYMBOLS TO PRODUCE AN OUTPUT SEQUENCE OF POINTERS IS DISCLOSED. A LITERAL STRING IN AN INPUT DATA STREAM (13) IS FIRST LOADED INTO A HISTORY-BUFFER (12). A VALUE OF A HISTORY-BUFFER POINTER IS COPIED TO A REGISTER TO INDICATE A STARTING POSITION OF THE LITERAL STRING WITHIN THE HISTORY-BUFFER. A COUNTER IS INCREMENTED FOR EACH SUBSEQUENT LITERAL SYMBOL FROM THE INPUT DATA STREAM. THEN, THE LITERAL STRING AND EACH SUBSEQUENT LITERAL SYMBOL FROM THE INPUT DATA STREAM IS ENCODED UTILIZING A VALUE WITHIN THE REGISTER AND A VALUE WITHIN THE COUNTER AS A LITERAL-- POINTER. FINALLY, THE LITERAL-- POINTER IS OUTPUTTED FROM A DATA COMPRESSOR (10). (FIGURE 1A)

    Microcode compression
    24.
    发明专利

    公开(公告)号:GB2319366A

    公开(公告)日:1998-05-20

    申请号:GB9720302

    申请日:1997-09-25

    Applicant: IBM

    Abstract: In a data processing system (10, Figure 1), a set of compiled microcode is parsed 21, into multiple microcode segments, wherein each of these microcode segments is of equal length. Each of the microcode segments is then individually compressed 22 using a data-compression routine. Next, all of these compressed microcode segments are concatenated and linked 23 to yield a set of compressed executable microcode. Finally, the starting address for each of the compressed microcode segments is stored 24 in an indexer. By so doing, the required memory for storing the compressed executable microcode is reduced.

Patent Agency Ranking