Fuzzy Keys
First Claim
Patent Images
1. A method for performing encryption using a fuzzy key, the method comprising:
- generating a message;
dividing a fuzzy key into a plurality of blocks;
generating an encrypted message by selecting a block from the fuzzy key corresponding to a bit position or bit pattern in the message.
2 Assignments
0 Petitions
Accused Products
Abstract
A method can be provided for performing encryption using a fuzzy key. The method can comprise generating a message, dividing a fuzzy key into a plurality of blocks; and generating an encrypted message by selecting a block from the fuzzy key corresponding to a bit position or bit pattern in the message.
130 Citations
38 Claims
-
1. A method for performing encryption using a fuzzy key, the method comprising:
-
generating a message; dividing a fuzzy key into a plurality of blocks; generating an encrypted message by selecting a block from the fuzzy key corresponding to a bit position or bit pattern in the message. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for performing encryption using a fuzzy key, the system comprising:
-
a key handler operable to divide a fuzzy key into a plurality of blocks; and a generator operable to generate an encrypted message by selecting a block from the fuzzy key corresponding to a bit position or bit pattern in a message to be encrypted. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method for performing decryption using a fuzzy key, the method comprising:
-
receiving a message encrypted using a fuzzy key; dividing a fuzzy key generated from the same source as a fuzzy key used to encrypt the message into a plurality of blocks; and comparing each block of the received message to a respective block of the fuzzy key to determine a value for a bit position or bit pattern in the message. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A system for performing decryption using a fuzzy key, the system comprising:
-
a receiver operable to receive a message encrypted using a fuzzy key; a key handler operable to divide a fuzzy key generated from the same source as a fuzzy key used to encrypt the message into a plurality of blocks; and a comparator operable to compare each block of the received message to a respective block of the fuzzy key to determine a value for a bit position or bit pattern in the message. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37)
-
-
38. A method for transmitting a message, the method comprising:
-
encrypting a message using a fuzzy key, the encrypting comprising dividing a fuzzy key into a plurality of blocks, and generating an encrypted message by selecting a block from the fuzzy key corresponding to a bit position or bit pattern in the message; transmitting the encrypted message; and decrypting the message using a fuzzy key, the decrypting comprising dividing a fuzzy key, generated from the same source as the fuzzy key used to encrypt the message, into a plurality of blocks, and comparing each block of the received message to a respective block of the fuzzy key to determine a value for a bit position or bit pattern in the message.
-
Specification