Process for generating a check word for a bit sequence for verifying the integrity and authenticity of the bit sequence
First Claim
1. A method for generating a check word for a bit string to check the integrity and authenticity of the bit string, the bit string comprising at least one set of data comprising a plurality of data words, each having the same word length defined by a number of bits, the method comprising:
- generating a random number for each data word, the number having the same number of bits as the data words,generating first and second operand pairs, each comprising a data word and a random number,combining the data word and the random number of each first operand pair by a first function,combining the data word and the random number of each second operand pair by a second function, andcombining the results of all operations applied to the first and second operand pairs, the result of this combination being the check word of the set of data.
2 Assignments
0 Petitions
Accused Products
Abstract
The method is intended for the generation of a check word for a bit string to check the integrity and authenticity of the bit string, the bit string comprising at least one data set consisting of a plurality of data words, each having the same word length defined by a number of bits. Here, a random number is generated for each data word, the number having the same number of bits as the data words. Further, first and second operand pairs are generated, each consisting of a data word and a random number. The data word and the random number of each first operand pair are subjected to a first linking operation, while the data word and the random number of each second operand pair is subjected to a second linking operation. The results of all operations applied to the first and second operand pairs are linked, the result of this linking being the check word of this data set.
4 Citations
28 Claims
-
1. A method for generating a check word for a bit string to check the integrity and authenticity of the bit string, the bit string comprising at least one set of data comprising a plurality of data words, each having the same word length defined by a number of bits, the method comprising:
-
generating a random number for each data word, the number having the same number of bits as the data words, generating first and second operand pairs, each comprising a data word and a random number, combining the data word and the random number of each first operand pair by a first function, combining the data word and the random number of each second operand pair by a second function, and combining the results of all operations applied to the first and second operand pairs, the result of this combination being the check word of the set of data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method of sending bit strings with secured integrity and/or authenticity from a sender to a receiver, the bit string comprising at least one data set comprising a plurality of data words, each having the same word length defined by a predeterminable number of bits, the method comprising:
-
generating a check word by means of a key known to the sender and to the receiver, generating a random number for each data word, having the same number of bits as the data words, forming first and second operand pairs, each comprising a data word and a random number, subjecting the data word and the random number of each first operand pair to a first function, subjecting the data word and the random number of each second operand pair to a second function, and combining the results of all operations applied to the first and second operand pairs, the result of this combining being the check word of the data set, and sending the bit string, together with the check word, from the sender to the receiver, wherein it is possible for the receiver to check the integrity and/or authenticity of the bit string by determining the check word from the received bit string and the key known to the receiver and by comparing the obtained check word to the check word received from the sender. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
Specification