VOICE ENCIPHERING CODER
    1.
    发明专利

    公开(公告)号:JP2000031941A

    公开(公告)日:2000-01-28

    申请号:JP16759799

    申请日:1999-06-15

    Abstract: PROBLEM TO BE SOLVED: To obtain a voice processor architecture which does not have to use an external cipher synchronous input, has minimum voice deterioration and also accomplishes improved confidentiality by including a block eneryptor (enciphering device) and a key (key) stream generator in a transmitter side and enciphering a voice bit that is encoded by it. SOLUTION: A class 1A bit (1st block) is supplied as an input to a block encryptor (enciphering device) 34 from a voice coder (encoder) 32 included in a transmitter 30, a class 1B bit (2nd block) is supplied as an input to an XOR operator 38 and a class 2B bit (3rd block) is supplied as an input to an XOR operator 40. The encryptor (enciphering device) 34 enciphers (encrypts) a plaintext of a block into a cipher text by using an inversely transformable encryption algorithm having a key (key) related to an intended receiver.

    ENCRYPTION METHOD FOR MESSAGE IN CALL TO BE PROCESSED BY COMMUNICATION DEVICE

    公开(公告)号:JP2003263107A

    公开(公告)日:2003-09-19

    申请号:JP2003035500

    申请日:2003-02-13

    Abstract: PROBLEM TO BE SOLVED: To achieve an enhanced CMEA encryption system suitable for use in wireless telephony. SOLUTION: A plaintext message is introduced into the system and subjected to a first iteration of a CMEA process, using a fist CMEA key to produce an intermediate ciphertext. The intermediate ciphertext is then subjected to a second iteration of the CMEA process using a second CMEA key to produce a final ciphertext. Additional security is achieved by subjecting the plaintext and intermediate ciphertext to input and output transformation before and after each iteration of the CMEA process. The CMEA iterations may be performed using an improved use of a tbox function which adds permutations to a message or intermediate crypto-processed data. Decryption is achieved by subjecting a ciphertext message to the reverse order of steps used for encryption, replacing the input and output transformations by inverse output and inverse input transformations, respectively, as appropriate. COPYRIGHT: (C)2003,JPO

    7.
    发明专利
    未知

    公开(公告)号:BR9804845A

    公开(公告)日:1999-08-24

    申请号:BR9804845

    申请日:1998-04-14

    Abstract: An enhanced CMEA encryption system suitable for use in wireless telephony. A plaintext message is introduced into the system and subjected to a first iteration of a CMEA process, using a first CMEA key to produce an intermediate ciphertext. The intermediate ciphertext is then subjected to a second iteration of the CMEA process using a second CMEA key to produce a final ciphertext. Additional security is achieved by subjecting the plaintext and intermediate ciphertext to input and output transformations before and after each iteration of the CMEA process. The CMEA iterations may be performed using an improved use of a tbox function which adds permutations to a message or intermediate crypto-processed data. Decryption is achieved by subjecting a ciphertext message to the reverse order of the steps used for encryption, replacing the input and output transformations by inverse output and inverse input transformations, respectively, as appropriate.

    9.
    发明专利
    未知

    公开(公告)号:DE602006003763D1

    公开(公告)日:2009-01-02

    申请号:DE602006003763

    申请日:2006-06-22

    Abstract: The present invention provides a method for communication involving a supplicant, an authenticator, and an authentication server having an established security association based on a first key. The supplicant and the authenticator also have an established security association based on a second key. The method may include modifying the second key using the first key in response to determining that a challenge response from the supplicant is valid.

    10.
    发明专利
    未知

    公开(公告)号:DE69916931D1

    公开(公告)日:2004-06-09

    申请号:DE69916931

    申请日:1999-06-08

    Abstract: The present invention is an encrypting speech processor architecture that provides enhanced security without the use of external cryptosync and with minimal speech degradation. This is accomplished by incorporating a block encryptor (34) and a keystream generator (36) (instead of a fixed secret mask encryption scheme, such as those implemented in voice ciphers) for encrypting blocks of encoded speech bits at a transmitter side. The block encryptor (34) employs an invertible cryptographic algorithm and internal cryptosync to convert a first block of encoded speech bits into a first ciphertext block (output 34). The first ciphertext block (output 34) is used to generate a keystream (output 36), which is then used to encrypt a second ciphertext block.

Patent Agency Ranking