Air-interface application layer security for wireless networks
First Claim
1. A method of encrypting data for transmission over a wireless link, comprising:
- encrypting one or more blocks of data, at an air-interface application layer, using an encryption algorithm that receives a cryptosynch as input, wherein each block of data includes a plurality of bytes associated with a corresponding plurality of sequence numbers, wherein the value of the cryptosynch includes a variable component that is based on an order of the one or more blocks of data relative to other blocks of data and where the variable component comprises an incremented value that is derived at the air-interface application layer, and the variable component of the cryptosynch is recoverable by a receiver based on the ordering of the blocks of data and a value of one of the plurality of sequence numbers; and
transmitting the one or more encrypted blocks of data to a receiver that is operable to preserve the order of the one or more blocks of data relative to the other blocks of data.
5 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides a method for encrypting data for transmission over a wireless link. The method includes encrypting at least one block of data, at an air-interface application layer, using an encryption algorithm that receives a cryptosynch as input. The value of the cryptosynch is based on an order of the at least one block of data relative to other blocks of data. The value of the cryptosynch is recoverable by a receiver based on the ordering of the ordering of the blocks of data. The at least one encrypted block of data is transmitted to a receiver that is operable to preserve the order of the at least one block of data relative to the other blocks of data.
-
Citations
42 Claims
-
1. A method of encrypting data for transmission over a wireless link, comprising:
-
encrypting one or more blocks of data, at an air-interface application layer, using an encryption algorithm that receives a cryptosynch as input, wherein each block of data includes a plurality of bytes associated with a corresponding plurality of sequence numbers, wherein the value of the cryptosynch includes a variable component that is based on an order of the one or more blocks of data relative to other blocks of data and where the variable component comprises an incremented value that is derived at the air-interface application layer, and the variable component of the cryptosynch is recoverable by a receiver based on the ordering of the blocks of data and a value of one of the plurality of sequence numbers; and transmitting the one or more encrypted blocks of data to a receiver that is operable to preserve the order of the one or more blocks of data relative to the other blocks of data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method of decrypting data received over a wireless link, comprising:
-
receiving at least one packet used to transmit one or more encrypted blocks of data over the wireless link, wherein each block of data includes a plurality of bytes associated with a corresponding plurality of sequence numbers, wherein the one or more blocks of data has been encrypted using an encryption algorithm that receives a cryptosynch as input, and the value of the cryptosynch includes an air-interface application layer derived, incremented variable component that is based on an order of the at least one encrypted block of data relative to other blocks of data and a value of one of the plurality of sequence numbers; and at an air-interface application layer, recovering the variable component of the cryptosynch for the at least one encrypted block of data from the ordering of the one or more blocks of data relative to other blocks of data. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A method of encrypting data in a wireless network comprising:
-
generating a first pseudorandom stream from an encryption algorithm using a first value of a cryptosynch; generating a second pseudorandom stream from the encryption algorithm using a second value of the cryptosynch; and encrypting at least one block of data by performing an operation Y=AX+B in a finite field, where A is the first pseudorandom stream, B is the second pseudorandom stream, X is the at least one block of data, and Y is an encrypted block of data produced from the operation. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36)
-
-
37. A method of decrypting data in a wireless network comprising:
-
receiving at least one block of encrypted data, wherein the at least one block has been encrypted by performing an operation Y=AX+B in a finite field, where A is a first pseudorandom stream, B is a second pseudorandom stream, X is at least one block of unencrypted data, and Y is the at least one block of encrypted data; and reproducing the first and second pseudorandom streams and decrypting, at an air-interface application layer, the at least one block of encrypted data by performing an operation X=A−
1(Y+B). - View Dependent Claims (38, 39, 40, 41, 42)
-
Specification