-
公开(公告)号:JP2003263109A
公开(公告)日:2003-09-19
申请号:JP2003035739
申请日:2003-02-13
Applicant: LUCENT TECHNOLOGIES INC
Inventor: ETZEL MARK H , FRANK ROBERT JOHN , HEER DANIEL NELSON , MCNELIS ROBERT JOSEPH , MIZIKOVSKY SEMYON B , RANCE ROBERT JOHN , SHIPP R DALE
Abstract: PROBLEM TO BE SOLVED: To provide methods and apparatus for enhanced CMEA or ECMEA processing. SOLUTION: A forward ECMEA process and a reverse ECMEA process are performed. The forward ECMEA process decrypts a text encrypted by the reverse ECMEA process and the reverse ECMEA process decrypts a text encrypted by the forward ECMEA process. The forward ECMEA process employs a transformation, an iteration of the CMEA process and an inverse transformation. The reverse ECMEA process employs a reverse transformation, an iteration of the CMEA process, and a reverse inverse transformation. The transformation, reverse transformations and the iteration of the CMEA process employ secret offsets to improve security. The transformations and the iteration of the CMEA process also employ an enhanced tbox function using an involutary lookup table. COPYRIGHT: (C)2003,JPO
-
公开(公告)号:CA2266683A1
公开(公告)日:1999-02-04
申请号:CA2266683
申请日:1998-07-22
Applicant: LUCENT TECHNOLOGIES INC
Inventor: ETZEL MARK H , FRANK ROBERT JOHN , MIZIKOVSKY SEMYON B , SHIPP R DALE , RANCE ROBERT JOHN , HEER DANIEL NELSON , MCNELIS ROBERT JOSEPH
IPC: G09C1/00 , H04K1/06 , H04L9/06 , H04L29/06 , H04W12/00 , H04W12/02 , H04Q7/32 , H04L9/28 , H04Q7/30
Abstract: Methods and apparatus for enhanced CMEA, or ECMEA, processing. A forward ECMEA and a reverse ECMEA process are provided. The forward ECMEA process decrypts text encrypted by the reverse ECMEA process and the reverse ECMEA process decrypts text encrypted by the forward ECMEA process. The forward ECMEA process employs a first transformation, an iteration of the CMEA process, and a second transformation. The reverse ECMEA process employs a first inverse transformation, an iteration of the CMEA process, and a second inverse transformation. The transformations and inverse transformations, and the iterations of the CMEA process, employ secret offsets to improve security. The transformations and the iteration of the CMEA process also employ an enhanced tbox function using an involuntary lookup table.
-
公开(公告)号:BR9804845A
公开(公告)日:1999-08-24
申请号:BR9804845
申请日:1998-04-14
Applicant: LUCENT TECHNOLOGIES INC
Inventor: ETZEL MARK H , FRANK ROBERT JOHN , HEER DANIEL NELSON , MCNELIS ROBERT JOSEPH , MIZIKOVKY SEMYON B , RANCE ROBERT JOHN
Abstract: An enhanced CMEA encryption system suitable for use in wireless telephony. A plaintext message is introduced into the system and subjected to a first iteration of a CMEA process, using a first CMEA key to produce an intermediate ciphertext. The intermediate ciphertext is then subjected to a second iteration of the CMEA process using a second CMEA key to produce a final ciphertext. Additional security is achieved by subjecting the plaintext and intermediate ciphertext to input and output transformations before and after each iteration of the CMEA process. The CMEA iterations may be performed using an improved use of a tbox function which adds permutations to a message or intermediate crypto-processed data. Decryption is achieved by subjecting a ciphertext message to the reverse order of the steps used for encryption, replacing the input and output transformations by inverse output and inverse input transformations, respectively, as appropriate.
-
公开(公告)号:CA2258750A1
公开(公告)日:1999-01-21
申请号:CA2258750
申请日:1998-04-13
Applicant: LUCENT TECHNOLOGIES INC
Inventor: FRANK ROBERT JOHN , MIZIKOVSKY SEMYON B , MCNELIS ROBERT JOSEPH , HEER DANIEL NELSON , ETZEL MARK H , SHIPP R DALE , RANCE ROBERT JOHN
Abstract: An enhancement to the use of a tbox function for CMEA encryption. Offsets are generated for application of the tbox function to a message, using secret values and previously encrypted message octets. The offsets are used to permute the message for application of the tbox function. For the first message of a call, the previously encrypted message octets are replaced by an initialization value. In a system employing a single iteration of CMEA encryption, first and second offsets are generated. In a system employing two iterations of CMEA encryption, first, second, third and fourth offsets are generated, with the first and second offsets being used in the first iteration of CMEA encryption and the third and fourth offsets being used in the second iteration of CMEA encryption.
-
公开(公告)号:CA2266665A1
公开(公告)日:1999-02-11
申请号:CA2266665
申请日:1998-07-29
Applicant: LUCENT TECHNOLOGIES INC
Inventor: RANCE ROBERT JOHN , ETZEL MARK H , FRANK ROBERT JOHN , MIZIKOVSKY SEMYON B , MCNELIS ROBERT JOSEPH , HEER DANIEL NELSON , SHIPP R DALE
IPC: G09C1/00 , H04L9/06 , H04L9/10 , H04L9/12 , H04L29/06 , H04W12/00 , H04W12/02 , H04Q7/32 , H04L9/28 , H04Q7/30
Abstract: Methods and apparatus for enhanced CMEA, or ECMEA, processing. A forward ECMEA and a reverse ECMEA process are provided. The forward ECMEA process decrypts text encrypted by the reverse ECMEA process and the reverse ECMEA process decrypts text encrypted by the forward ECMEA process. The forward ECMEA process employs a transformation, an iteration of the CMEA process, and an inverse transformation. The reverse ECMEA process employs a reverse transformation, an iteration of the CMEA process, and a reverse inverse transformation. The transformations and inverse transformations, and the iteration of the CMEA process, employ secret offsets to improve security. The transformations and the iteration of the CMEA process also employ an enhanced tbox function using an involutary lookup table.
-
公开(公告)号:CA2258749A1
公开(公告)日:1998-10-22
申请号:CA2258749
申请日:1998-04-14
Applicant: LUCENT TECHNOLOGIES INC
Inventor: FRANK ROBERT JOHN , ETZEL MARK H , MCNELIS ROBERT JOSEPH , HEER DANIEL NELSON , SHIPP R DALE , RANCE ROBERT JOHN , MIZIKOVSKY SEMYON B
Abstract: An enhanced CMEA encryption system suitable for use in wireless telephony. A plaintext message is introduced into the system and subjected to a first iteration of a CMEA process, using a first CMEA key to produce an intermediate ciphertext. The intermediate ciphertext is then subjected to a second iteration of the CMEA process using a second CMEA key to produce a final ciphertext. Additional security is achieved by subjecting the plaintext and intermediate ciphertext to input and output transformations before and after each iteration of the CMEA process. The CMEA iterations may be performed using an improved use of a box function which adds permutations to a message or intermediate crypto-processed data. Decryption is achieved by subjecting a ciphertext message to the reverse order of the steps used for encryption, replacing the input and output transformations by inverse output and inverse input transformations, respectively, as appropriate.
-
-
-
-
-