Systems and methods for protecting data secrecy and integrity
First Claim
Patent Images
1. A tangibly embodied computer-readable medium containing computer-executable program instructions, the computer-exectuable program instructions including instructions for:
- receiving a data file;
encrypting the data file;
preparing the data file for transmission, the instructions for preparing the data file for transmission including instructions for;
decrypting a copy of the encrypted data file;
receiving a first internal state from the computer code for decrypting the copy of the encrypted data file; and
generating a first validation code by using, at least in part, the first internal state; and
transmitting the encrypted data file and the first validation code.
2 Assignments
0 Petitions
Accused Products
Abstract
A technique for integrating message authentication with encryption and decryption is disclosed. Intermediate internal states of the decryption operation are used to generate a validation code that can be used to detect manipulation of the encrypted data. The technique is optimized with respect to processing time, execution space for code and runtime data, and buffer usage. The technique is generally applicable to a variety of block ciphers, including TEA, Rijndael, DES, RC5, and RC6.
-
Citations
26 Claims
-
1. A tangibly embodied computer-readable medium containing computer-executable program instructions, the computer-exectuable program instructions including instructions for:
-
receiving a data file; encrypting the data file; preparing the data file for transmission, the instructions for preparing the data file for transmission including instructions for; decrypting a copy of the encrypted data file; receiving a first internal state from the computer code for decrypting the copy of the encrypted data file; and generating a first validation code by using, at least in part, the first internal state; and transmitting the encrypted data file and the first validation code. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A tangibly embodied computer-readable medium containing information including a data structure configured to enable integrated decryption and authentication of an encrypted data file, the data structure including:
-
an encrypted data file; and a first validation code, the first validation code being operable to verify the authenticity of the encrypted data file; wherein the encrypted data file and the first validation code are configured for use with an integrated decryption and validation procedure that is operable to produce decrypted data and to use at least one internal decryption state to generate a second validation code, the second validation code being equal to the first validation code if the encrypted data are not modified before decryption. - View Dependent Claims (9, 10)
-
-
11. A tangibly embodied computer-readable medium containing computer-executable instructions for:
-
receiving a data file; encrypting the data file; preparing the data file for transmission, the instructions for preparing the data file for transmission including instructions for; decrypting a copy of the encrypted data file; receiving a first internal state from the computer code for decrypting the copy of the encrypted data file; and generating a first validation code by using, at least in part, the first internal state; executing a mixing function in association with one or both of the encryption or decryption processes; and transmitting the encrypted data file and the first validation code. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A tangibly embodied computer-readable medium configured to encrypt data, the tangibly embodied computer-readable medium containing computer-executable instructions for:
-
receiving a data file; encrypting the data file via a block cipher executed in rounds, including a key divided into subkeys; preparing the data file for transmission, the instructions for preparing the data file for transmission including instructions for; decrypting a copy of the encrypted data file; receiving a first internal state from the computer code for decrypting the copy of the encrypted data file; and generating a first validation code by using, at least in part, the first internal state; and transmitting the encrypted data file and the first validation code. - View Dependent Claims (23, 24, 25, 26)
-
Specification