Air-interface application layer security for wireless networks
First Claim
1. A method of encrypting data for transmission over a wireless link, comprising:
- encrypting at least one block of data, at an air-interface application layer, using an encryption algorithm that receives a cryptosynch as input, wherein the value of the cryptosynch is based on an order of the at least one block of data relative to other blocks of data, and the value of the cryptosynch is recoverable by a receiver based on the ordering of the blocks of data;
transmitting the at least one encrypted block of data to a receiver that is operable to preserve the order of the at least one block of data relative to the other blocks of data.
5 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides a method for encrypting data for transmission over a wireless link. The method includes encrypting at least one block of data, at an air-interface application layer, using an encryption algorithm that receives a cryptosynch as input. The value of the cryptosynch is based on an order of the at least one block of data relative to other blocks of data. The value of the cryptosynch is recoverable by a receiver based on the ordering of the ordering of the blocks of data. The at least one encrypted block of data is transmitted to a receiver that is operable to preserve the order of the at least one block of data relative to the other blocks of data.
-
Citations
42 Claims
-
1. A method of encrypting data for transmission over a wireless link, comprising:
-
encrypting at least one block of data, at an air-interface application layer, using an encryption algorithm that receives a cryptosynch as input, wherein the value of the cryptosynch is based on an order of the at least one block of data relative to other blocks of data, and the value of the cryptosynch is recoverable by a receiver based on the ordering of the blocks of data;
transmitting the at least one encrypted block of data to a receiver that is operable to preserve the order of the at least one block of data relative to the other blocks of data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method of decrypting data received over a wireless link, comprising:
-
receiving at least one packet used to transmit at least one encrypted block of data over the wireless link, wherein the at least one block of data has been encrypted using an encryption algorithm that receives a cryptosynch as input, and the value of the cryptosynch is based on an order of the at least one encrypted block of data relative to other blocks of data;
at an air-interface application layer, recovering the cryptosynch for the at least one encrypted block of data from the ordering of the at least one block of data relative to other blocks of data. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A method of encrypting data in a wireless network comprising:
-
generating a first pseudorandom stream from an encryption algorithm using a first value of a cryptosynch;
generating a second pseudorandom stream from the encryption algorithm using a second value of the cryptosynch; and
encrypting at least one block of data by performing an operation Y=AX+B in a finite field, where A is the first pseudorandom stream, B is the second pseudorandom stream, X is the at least one block of data, and Y is an encrypted block of data produced from the operation. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36)
-
-
37. The method of decrypting data in a wireless network comprising:
-
receiving at least one block of encrypted data, wherein the at least one block has been encrypted by performing an operation Y=AX+B in a finite field, where A is a first pseudorandom stream, B is a second pseudorandom stream, X is at least one block of unencrypted data, and Y is the at least one block of encrypted data; and
reproducing the first and second pseudorandom streams and decrypting the at least one block of encrypted data by performing an operation X=A−
1(Y−
B). - View Dependent Claims (38, 39, 40, 41, 42)
-
Specification