-
公开(公告)号:JP2000031941A
公开(公告)日:2000-01-28
申请号:JP16759799
申请日:1999-06-15
Applicant: LUCENT TECHNOLOGIES INC
Inventor: BERENZWEIG ADAM L , FALCO STEVEN ANTHONY , MIZIKOVSKY SEMYON B , PEKRUL WINSTON EDWARD , RANCE ROBERT JOHN , YOUTKUS DONALD JOSEPH
IPC: G10L19/00 , H04K1/00 , H04L9/06 , H04L9/12 , H04L9/20 , H04L9/26 , H04Q7/38 , H04K1/02 , G09C1/00
Abstract: PROBLEM TO BE SOLVED: To obtain a voice processor architecture which does not have to use an external cipher synchronous input, has minimum voice deterioration and also accomplishes improved confidentiality by including a block eneryptor (enciphering device) and a key (key) stream generator in a transmitter side and enciphering a voice bit that is encoded by it. SOLUTION: A class 1A bit (1st block) is supplied as an input to a block encryptor (enciphering device) 34 from a voice coder (encoder) 32 included in a transmitter 30, a class 1B bit (2nd block) is supplied as an input to an XOR operator 38 and a class 2B bit (3rd block) is supplied as an input to an XOR operator 40. The encryptor (enciphering device) 34 enciphers (encrypts) a plaintext of a block into a cipher text by using an inversely transformable encryption algorithm having a key (key) related to an intended receiver.
-
公开(公告)号:JP2003263109A
公开(公告)日:2003-09-19
申请号:JP2003035739
申请日:2003-02-13
Applicant: LUCENT TECHNOLOGIES INC
Inventor: ETZEL MARK H , FRANK ROBERT JOHN , HEER DANIEL NELSON , MCNELIS ROBERT JOSEPH , MIZIKOVSKY SEMYON B , RANCE ROBERT JOHN , SHIPP R DALE
Abstract: PROBLEM TO BE SOLVED: To provide methods and apparatus for enhanced CMEA or ECMEA processing. SOLUTION: A forward ECMEA process and a reverse ECMEA process are performed. The forward ECMEA process decrypts a text encrypted by the reverse ECMEA process and the reverse ECMEA process decrypts a text encrypted by the forward ECMEA process. The forward ECMEA process employs a transformation, an iteration of the CMEA process and an inverse transformation. The reverse ECMEA process employs a reverse transformation, an iteration of the CMEA process, and a reverse inverse transformation. The transformation, reverse transformations and the iteration of the CMEA process employ secret offsets to improve security. The transformations and the iteration of the CMEA process also employ an enhanced tbox function using an involutary lookup table. COPYRIGHT: (C)2003,JPO
-
3.
公开(公告)号:JP2003263108A
公开(公告)日:2003-09-19
申请号:JP2003035501
申请日:2003-02-13
Applicant: LUCENT TECHNOLOGIES INC
Inventor: ETZEL MARK H , FRANK ROBERT JOHN , HEER DANIEL NELSON , MCNELIS ROBERT JOHN , MIZIKOVSKY SEMYON B , RANCE ROBERT JOHN , SHIPP R DALE
Abstract: PROBLEM TO BE SOLVED: To enhance the use of a tbox function for CMEA encryption. SOLUTION: Offsets are generated for inputting a message to the tbox function by using secret values and previously encrypted message octets. The offset are used to permute the message for application of the tbox function. For the first message of a call, the previously encrypted message octets are replaced by an initialization value. In a system employing a single iteration of CMEA encryption, first and second offsets are generated. In a system employing two iterations of CMEA encryption, the first, second, third, and fourth offsets are generated, with the first and second offsets being used in the first iteration of CMEA encryption and the third and fourth offsets being used in the second iteration of CMEA encryption. COPYRIGHT: (C)2003,JPO
-
公开(公告)号:JP2003263107A
公开(公告)日:2003-09-19
申请号:JP2003035500
申请日:2003-02-13
Applicant: LUCENT TECHNOLOGIES INC
Inventor: ETZEL MARK H , FRANK ROBERT JOHN , HEER DANIEL NELSON , MCNELIS ROBERT JOHN , MIZIKOVSKY SEMYON B , RANCE ROBERT JOHN , SHIPP R DALE
Abstract: PROBLEM TO BE SOLVED: To achieve an enhanced CMEA encryption system suitable for use in wireless telephony. SOLUTION: A plaintext message is introduced into the system and subjected to a first iteration of a CMEA process, using a fist CMEA key to produce an intermediate ciphertext. The intermediate ciphertext is then subjected to a second iteration of the CMEA process using a second CMEA key to produce a final ciphertext. Additional security is achieved by subjecting the plaintext and intermediate ciphertext to input and output transformation before and after each iteration of the CMEA process. The CMEA iterations may be performed using an improved use of a tbox function which adds permutations to a message or intermediate crypto-processed data. Decryption is achieved by subjecting a ciphertext message to the reverse order of steps used for encryption, replacing the input and output transformations by inverse output and inverse input transformations, respectively, as appropriate. COPYRIGHT: (C)2003,JPO
-
5.
公开(公告)号:JP2003186395A
公开(公告)日:2003-07-04
申请号:JP2002313581
申请日:2002-10-29
Applicant: LUCENT TECHNOLOGIES INC
Inventor: ETZEL MARK H , FRANK ROBERT JOHN , HEER DANIEL NELSON , MCNELIS ROBERT J , MIZIKOVSKY SEMYON B , RANCE ROBERT JOHN , SHIPP R DALE
Abstract: PROBLEM TO BE SOLVED: To provide a method and apparatus for an emphasized CMEA (cellular message encryption algorithm) or an ECMEA process. SOLUTION: A forward ECMEA process decrypts text encrypted by an inverse ECMEA process, and the inverse ECMEA process decrypts the text encrypted by the forward ECMEA process. The forward ECMEA process utilizes a first transformation, iteration of the CMEA, and a second transformation. The inverse ECMEA process utilizes a first inverse transformation, the iteration of the CMEA process, and a second inverse transformation. The transformation and the inverse transformation, and the iteration of the CMEA process improve the security, utilizing a secret offset. The transformation and the iteration, of the CMEA process also utilize an emphasized TBOX function using an involuntary lookup table. COPYRIGHT: (C)2003,JPO
-
公开(公告)号:CA2266683A1
公开(公告)日:1999-02-04
申请号:CA2266683
申请日:1998-07-22
Applicant: LUCENT TECHNOLOGIES INC
Inventor: ETZEL MARK H , FRANK ROBERT JOHN , MIZIKOVSKY SEMYON B , SHIPP R DALE , RANCE ROBERT JOHN , HEER DANIEL NELSON , MCNELIS ROBERT JOSEPH
IPC: G09C1/00 , H04K1/06 , H04L9/06 , H04L29/06 , H04W12/00 , H04W12/02 , H04Q7/32 , H04L9/28 , H04Q7/30
Abstract: Methods and apparatus for enhanced CMEA, or ECMEA, processing. A forward ECMEA and a reverse ECMEA process are provided. The forward ECMEA process decrypts text encrypted by the reverse ECMEA process and the reverse ECMEA process decrypts text encrypted by the forward ECMEA process. The forward ECMEA process employs a first transformation, an iteration of the CMEA process, and a second transformation. The reverse ECMEA process employs a first inverse transformation, an iteration of the CMEA process, and a second inverse transformation. The transformations and inverse transformations, and the iterations of the CMEA process, employ secret offsets to improve security. The transformations and the iteration of the CMEA process also employ an enhanced tbox function using an involuntary lookup table.
-
公开(公告)号:BR9804845A
公开(公告)日:1999-08-24
申请号:BR9804845
申请日:1998-04-14
Applicant: LUCENT TECHNOLOGIES INC
Inventor: ETZEL MARK H , FRANK ROBERT JOHN , HEER DANIEL NELSON , MCNELIS ROBERT JOSEPH , MIZIKOVKY SEMYON B , RANCE ROBERT JOHN
Abstract: An enhanced CMEA encryption system suitable for use in wireless telephony. A plaintext message is introduced into the system and subjected to a first iteration of a CMEA process, using a first CMEA key to produce an intermediate ciphertext. The intermediate ciphertext is then subjected to a second iteration of the CMEA process using a second CMEA key to produce a final ciphertext. Additional security is achieved by subjecting the plaintext and intermediate ciphertext to input and output transformations before and after each iteration of the CMEA process. The CMEA iterations may be performed using an improved use of a tbox function which adds permutations to a message or intermediate crypto-processed data. Decryption is achieved by subjecting a ciphertext message to the reverse order of the steps used for encryption, replacing the input and output transformations by inverse output and inverse input transformations, respectively, as appropriate.
-
公开(公告)号:CA2258750A1
公开(公告)日:1999-01-21
申请号:CA2258750
申请日:1998-04-13
Applicant: LUCENT TECHNOLOGIES INC
Inventor: FRANK ROBERT JOHN , MIZIKOVSKY SEMYON B , MCNELIS ROBERT JOSEPH , HEER DANIEL NELSON , ETZEL MARK H , SHIPP R DALE , RANCE ROBERT JOHN
Abstract: An enhancement to the use of a tbox function for CMEA encryption. Offsets are generated for application of the tbox function to a message, using secret values and previously encrypted message octets. The offsets are used to permute the message for application of the tbox function. For the first message of a call, the previously encrypted message octets are replaced by an initialization value. In a system employing a single iteration of CMEA encryption, first and second offsets are generated. In a system employing two iterations of CMEA encryption, first, second, third and fourth offsets are generated, with the first and second offsets being used in the first iteration of CMEA encryption and the third and fourth offsets being used in the second iteration of CMEA encryption.
-
公开(公告)号:DE602006003763D1
公开(公告)日:2009-01-02
申请号:DE602006003763
申请日:2006-06-22
Applicant: LUCENT TECHNOLOGIES INC
Inventor: MIZIKOVSKY SEMYON B , RANCE ROBERT JOHN
Abstract: The present invention provides a method for communication involving a supplicant, an authenticator, and an authentication server having an established security association based on a first key. The supplicant and the authenticator also have an established security association based on a second key. The method may include modifying the second key using the first key in response to determining that a challenge response from the supplicant is valid.
-
公开(公告)号:DE69916931D1
公开(公告)日:2004-06-09
申请号:DE69916931
申请日:1999-06-08
Applicant: LUCENT TECHNOLOGIES INC
Inventor: BERENZWEIG ADAM L , FALCO STEVEN ANTHONY , MIZIKOVSKY SEMYON B , PEKRUL WINSTON EDWARD , RANCE ROBERT JOHN , YOUTKUS DONALD JOSEPH
Abstract: The present invention is an encrypting speech processor architecture that provides enhanced security without the use of external cryptosync and with minimal speech degradation. This is accomplished by incorporating a block encryptor (34) and a keystream generator (36) (instead of a fixed secret mask encryption scheme, such as those implemented in voice ciphers) for encrypting blocks of encoded speech bits at a transmitter side. The block encryptor (34) employs an invertible cryptographic algorithm and internal cryptosync to convert a first block of encoded speech bits into a first ciphertext block (output 34). The first ciphertext block (output 34) is used to generate a keystream (output 36), which is then used to encrypt a second ciphertext block.
-
-
-
-
-
-
-
-
-