Data Encryption and Authentication Using a Mixing Function in a Communication System
First Claim
Patent Images
1. A system for encrypting data in a communication system, the system comprising one or more logic circuits configured to:
- receive a plurality of parameters including at least two of an initial key, a nonce, a sequence number, and a previous key;
apply a bit mix function to generate a subsequent key based on the plurality of parameters for key rolling; and
encrypt data using the subsequent key.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of encrypting and authenticating messages in a communication system includes generating new keys by receiving a plurality of parameters including at least one of an initial key, a nonce, a sequence number, and a previous key. The method may include applying a mix function to generate a subsequent key based on the plurality of parameters for key rolling. The method may include encrypting and authenticating data using different subsequent keys.
-
Citations
20 Claims
-
1. A system for encrypting data in a communication system, the system comprising one or more logic circuits configured to:
-
receive a plurality of parameters including at least two of an initial key, a nonce, a sequence number, and a previous key; apply a bit mix function to generate a subsequent key based on the plurality of parameters for key rolling; and encrypt data using the subsequent key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for encrypting data in a communication system, the method comprising:
-
receiving a plurality of parameters including at least two of an initial key, a nonce, a sequence number, and a previous key; applying a bit-mix function to generate a subsequent key based on the plurality of parameters for key rolling; and encrypting data using the subsequent key. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A method for providing security in a communication system, the method comprising:
-
receiving a plurality of parameters including at least two of an initial key, a nonce, a sequence number, and a previous key; applying a bit-mix function to generate a subsequent key based on the plurality of parameters, wherein at least one of an XOR logic tree, a substitution-permutation network (SPN), and a double-mix Feistel network is included in the bit-mix function; and encrypting data using the subsequent key. - View Dependent Claims (19, 20)
-
Specification