CRYPTOGRAPHIC METHOD AND APPARATUS
2 Assignments
0 Petitions
Accused Products
Abstract
A method of formatting data for transmission to another party including the step of incorporating in the data a flag indicative of the absence of data for authentication of the sender. An authentication tag length is also included to permit variable length tags to be used.
55 Citations
35 Claims
-
1-5. -5. (canceled)
-
6. A computer-implemented method of formatting data at a device capable of providing optional data confidentiality and optional data authenticity, the method comprising:
-
obtaining message data m and nonce data N, wherein a value M encoded in the nonce data N indicates a length of an authentication tag, wherein the nonce data N comprises an identification of a security level, wherein the security level inhibits or invokes data confidentiality, and wherein the security level inhibits or invokes data authenticity; and generating an output based on the message data m and the nonce data N, wherein the output comprises the authentication tag if the security level invokes data authenticity, and wherein the output comprises encrypted data if the security level invokes data confidentiality. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A computer-implemented method of processing data received at a device, the method comprising:
-
obtaining nonce data N and data c, wherein a value M encoded in the nonce data N indicates a length of an authentication tag, wherein the nonce data N comprises an identification of a security level, wherein the security level indicates whether data confidentiality is invoked or inhibited, wherein the security level indicates whether data authenticity is invoked or inhibited, wherein the data c comprises encrypted data if the security level indicates data confidentiality is invoked, and wherein the data c comprises the authentication tag if the security level indicates data authenticity is invoked; and determining message data m based on the data c and the nonce data N. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
-
34. A non-transitory machine-readable medium comprising machine-executable instructions for formatting data at a device capable of providing optional data confidentiality and optional data authenticity, the machine-executable instructions operable when executed to perform operations comprising:
-
obtaining message data m and nonce data N, wherein a value M encoded in the nonce data N indicates a length of an authentication tag, wherein the nonce data N comprises an identification of a security level, wherein the security level inhibits or invokes data confidentiality, and wherein the security level inhibits or invokes data authenticity; and generating an output based on the message data m and the nonce data N, wherein the output comprises the authentication tag if the security level invokes data authenticity, and wherein the output comprises encrypted data if the security level invokes data confidentiality.
-
-
35. A non-transitory machine-readable medium comprising machine-executable instructions for processing data received at a device, the machine-executable instructions operable when executed to perform operations comprising
obtaining nonce data N and data c, wherein a value M encoded in the nonce data N indicates a length of an authentication tag, wherein the nonce data N comprises an identification of a security level, wherein the security level indicates whether data confidentiality is invoked or inhibited, wherein the security level indicates whether data authenticity is invoked or inhibited, wherein the data c comprises encrypted data if the security level indicates data confidentiality is invoked, and wherein the data c comprises the authentication tag if the security level indicates data authenticity is invoked; - and
determining message data m based on the data c and the nonce data N.
- and
Specification