EFFICIENT ENCRYPTION AND AUTHENTICATION FOR DATA PROCESSING SYSTEMS

    公开(公告)号:AU2003296887A1

    公开(公告)日:2004-05-04

    申请号:AU2003296887

    申请日:2003-07-24

    Applicant: QUALCOMM INC

    Abstract: Methods and apparatus are presented for encrypting and authenticating data, wherein some data is encrypted and some data is not encrypted, but all of the data is authenticated. Different formulations for authentication blocks are used according to whether a block of data occupies a cleartext position or ciphertext position. The authentication blocks are then combined to form a checksum, which is encrypted to form an authentication tag.

    EFFICIENT ENCRYPTION AND AUTHENTICATION FOR DATA PROCESSING SYSTEMS

    公开(公告)号:CA2493567A1

    公开(公告)日:2004-04-22

    申请号:CA2493567

    申请日:2003-07-24

    Applicant: QUALCOMM INC

    Abstract: Methods and apparatus are presented for encrypting and authenticating data, wherein some data is encrypted and some data is not encrypted, but all of th e data is authenticated. Different formulations for authentication blocks are used according to whether a block of data occupies a cleartext position (442 A, 442B, 442C) or ciphertext position. (444A 444B, 444C, 444D) The authenticati on blocks are then combined to form a checksum, which is encrypted to form an authentication tag.

    Method for negotiating weakened keys in ecryption systems.

    公开(公告)号:HK1042391A1

    公开(公告)日:2002-08-09

    申请号:HK02104020

    申请日:2002-05-30

    Applicant: QUALCOMM INC

    Inventor: ROSE GREGORY G

    Abstract: A method for permitting encrypted communications between two stations which are operable with compatible encryption algorithms that accept encryption keys having work factors with respectively different values, comprising: determining a lowest one of the different work factor values: providing an initial encryption key with a given work factor value; comparing the given work factor value with the lowest one of the different work factor values; and wherein, if the given work factor value is greater than the lowest one of the different work factor values, the method further comprises: deriving from the initial encryption key a final encryption key having a work factor value not greater than the lowest one of the different work factor values; and using the final encryption key for the encrypted communications.

    Method and apparatus for efficient irregular synchronization of a stream cipher

    公开(公告)号:AU2904201A

    公开(公告)日:2001-06-06

    申请号:AU2904201

    申请日:2000-11-13

    Applicant: QUALCOMM INC

    Inventor: ROSE GREGORY G

    Abstract: A method and apparatus for efficiently synchronizing a stream cipher. State information is transmitted that will allow the intended recipient of the encrypted data stream to set a stream cipher generator to the correct state from which to start generating the stream cipher. A cycle number indicating the current state of a linear feedback shift register and a stutter number indicating whether an output of the linear feedback shift register is dropped are both transmitted to a remote station along with the encrypted data stream.

    Method and apparatus for providing authentication security in a wireless communication system

    公开(公告)号:AU732083B2

    公开(公告)日:2001-04-12

    申请号:AU5901498

    申请日:1997-12-19

    Applicant: QUALCOMM INC

    Abstract: An apparatus for providing authentication of a mobile station in a wireless communication system. The present invention takes the number dialed by the mobile station user and computes the 24 bit number (AUTH-DATA) for authentication in accordance with a hashing function that has the following characteristics. The hashing function takes as its input at least the entire dialed digit string contained in the request for service and the number of digits. In a preferred embodiment, the ordering of the digits affects the result, as well as, the values of the digits. The preferred embodiment of the hashing function also accepts some or all of the mobile station identifier data. The function provides as output a number of suitable size for input to a second calculation of an authentication signature, such as the 24 bits required for AUTH-DATA. The output number is created in such a way that there is a minimum likelihood that other sets of dialed digits may create the same result.

    27.
    发明专利
    未知

    公开(公告)号:ID24932A

    公开(公告)日:2000-08-31

    申请号:ID991097

    申请日:1998-03-04

    Applicant: QUALCOMM INC

    Inventor: ROSE GREGORY G

    Abstract: In a communications system, a method of transforming a set of message signals representing a message comprising the steps of first encoding one of the set of message signals in accordance with a first keyed transformation, a second encoding of the one of the set of message signals in accordance with at least one additional keyed transformation, a third encoding of the one of the set of message signals in accordance with a self-inverting transformation in which at least one of the set of message signals is altered, a fourth encoding of the one of the set of message signals in accordance with at least one additional inverse keyed transformation wherein each of the at least one additional inverse keyed transformation is a corresponding inverse of at least one additional keyed transformation, and fifth encoding the one of the set of message signals in accordance with first inverse keyed transformation wherein the first inverse keyed transformation is the inverse of the first keyed transformation.

    Method for negotiating weakened keys in encryption systems

    公开(公告)号:AU2203400A

    公开(公告)日:2000-07-03

    申请号:AU2203400

    申请日:1999-12-17

    Applicant: QUALCOMM INC

    Inventor: ROSE GREGORY G

    Abstract: A method for permitting encrypted communications between two stations which are operable with compatible encryption algorithms that accept encryption keys having work factors with respectively different values, comprising: determining a lowest one of the different work factor values: providing an initial encryption key with a given work factor value; comparing the given work factor value with the lowest one of the different work factor values; and wherein, if the given work factor value is greater than the lowest one of the different work factor values, the method further comprises: deriving from the initial encryption key a final encryption key having a work factor value not greater than the lowest one of the different work factor values; and using the final encryption key for the encrypted communications.

    29.
    发明专利
    未知

    公开(公告)号:BR9714320A

    公开(公告)日:2000-02-08

    申请号:BR9714320

    申请日:1997-12-19

    Applicant: QUALCOMM INC

    Abstract: An apparatus for providing authentication of a mobile station in a wireless communication system. The present invention takes the number dialed by the mobile station user and computes the 24 bit number (AUTH-DATA) for authentication in accordance with a hashing function that has the following characteristics. The hashing function takes as its input at least the entire dialed digit string contained in the request for service and the number of digits. In a preferred embodiment, the ordering of the digits affects the result, as well as, the values of the digits. The preferred embodiment of the hashing function also accepts some or all of the mobile station identifier data. The function provides as output a number of suitable size for input to a second calculation of an authentication signature, such as the 24 bits required for AUTH-DATA. The output number is created in such a way that there is a minimum likelihood that other sets of dialed digits may create the same result.

Patent Agency Ranking