Method and apparatus for encryption/authentication of data in energy metering applications
First Claim
1. A method comprising the steps of:
- generating cipher text from message text utilizing an add and shift operation, the step of generating cipher text comprising the steps of;
(a) generating an initialization vector;
(b) forming a frame from the initialization vector;
(c) providing the frame as input for a round process;
(d) generating a key byte from the round process;
(e) generating cipher text from the key byte; and
(f) if cipher text has not been generated for each byte of message text, forming a next frame for processing utilizing the cipher text generated in step (e) and returning to step (e); and
replacing the message text with cipher text.
1 Assignment
0 Petitions
Accused Products
Abstract
In one embodiment, the present invention is an encryption/decryption and authentication algorithm. The algorithm has three major steps. The first step is generating cipher text. The second step is generating the authentication field. The third step is encrypting or deciphering the appropriate data in the message. One byte of cipher text is generated for every byte of plain text contained in the message. After all the cipher text is generated, a four byte authentication field is generated using the last four bytes of cipher text. The message is then scanned for data fields which have been encrypted or are to be encrypted and the corresponding byte of cipher text replaces the message bytes. The encryption is accomplished by sending the cipher text instead of message text. To decipher the message, the algorithm operates in a reverse mode to replace the cipher text with the message text, i.e., the algorithm is a self-reversing process.
92 Citations
40 Claims
-
1. A method comprising the steps of:
-
generating cipher text from message text utilizing an add and shift operation, the step of generating cipher text comprising the steps of; (a) generating an initialization vector; (b) forming a frame from the initialization vector; (c) providing the frame as input for a round process; (d) generating a key byte from the round process; (e) generating cipher text from the key byte; and (f) if cipher text has not been generated for each byte of message text, forming a next frame for processing utilizing the cipher text generated in step (e) and returning to step (e); and replacing the message text with cipher text. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method comprising the steps of:
generating an authentication field for message bytes using checksum bytes derived from cipher text of the message bytes, generating cipher text comprising the steps of; (a) generating an initialization vector; (b) forming a frame from the initialization vector; (c) providing the frame as input for a round process; (d) generating a key byte from the round process; (e) generating cipher text from the key byte; and (f) if cipher text has not been generated for each byte of message text, forming a next frame for processing utilizing the cipher text generated in step (e) and returning to step (e); and transmitting the authentication field with the message bytes. - View Dependent Claims (9, 10)
-
11. Apparatus, comprising:
-
computing means; means for inputting information to said computing means; memory means coupled to said computing means; and wherein said computing means is controlled to perform the steps of; generating an authentication field for message bytes using checksum bytes derived from cipher text of the message bytes, generating cipher text from message text comprising the steps of; (a) generating an initialization vector; (b) forming a frame from the initialization vector; (c) providing the frame as input for the round process; (d) generating a key byte from the round process; (e) generating cipher text from the key byte; (f) if cipher text has not been generated for each byte of message text, forming a next frame for processing utilizing the cipher text generated in step (e) and returning to step (e); and transmitting the authentication field with the message bytes. - View Dependent Claims (12, 13)
-
-
14. A method comprising the steps of:
generating an authentication field for message bytes using checksum bytes derived from cipher text of the message bytes, generating cipher text comprising the steps of; (a) generating an initialization vector; (b) forming a frame from the initialization vector; (c) providing the frame as input for a round process; (d) generating a key byte from the round process; (e) generating cipher text from the key byte; and (f) if cipher text has not been generated for each byte of message text, forming a next frame for processing utilizing the cipher text generated in step (e) and returning to step (e); transmitting the authentication field and the message information as one message from a central location to a remote location. - View Dependent Claims (15, 16, 17, 18, 19)
-
20. Energy meter means, comprising:
-
metering means for measuring energy consumed by an end-user and supplied from a power delivery system; computing means; means for transmitting information to a device external said energy meter means, said transmitting means being coupled to said computing means; memory means coupled to said computing means; and wherein said computing means is controlled to perform the steps of; generating an authentication field for message bytes using checksum bytes derived from cipher text of the message bytes, generating cipher text from message text comprising the steps of; (a) generating an initialization vector; (b) forming a frame from the initialization vector; (c) providing the frame as input for a round process; (d) generating a key byte from the round process; (e) generating cipher text from the key byte; (f) if cipher text has not been generated for each byte of message text, forming a next frame for processing utilizing the cipher text generated in step (e) and returning to step (e); and providing, to said transmitting means, the authentication field with the message bytes. - View Dependent Claims (21, 22, 23, 24)
-
-
25. A system, comprising:
-
central communication means comprising first computing means and first transmitting/receiving means; metering means for measuring energy consumed by an end-user and supplied from a power delivery system, said metering means comprising second computing means and second transmitting/receiving means; said first computing means and said second computing means being controlled to perform the steps of; generating an authentication field for message bytes using checksum bytes derived from cipher text of the message bytes, generating cipher text from message text comprising the steps of; (a) generating an initialization vector; (b) forming a frame from the initialization vector; (c) providing the frame as input for a round process; (d) generating a key byte from the round process; (e) generating cipher text from the key byte; (f) if cipher text has not been generated for each byte of message text, forming a next frame for processing utilizing the cipher text generated in step (e) and returning to step (e). - View Dependent Claims (26, 27, 28, 29)
-
-
30. Energy meter means, comprising:
-
metering means for measuring energy consumed by an end-user and supplied from a power delivery system; computing means; means for receiving information from a device external said energy meter means, said receiving means being coupled to said computing means; memory means coupled to said computing means; and wherein said computing means is controlled to perform the step of generating message text from cipher text by performing the steps of; (a) generating an initialization vector; (b) forming a frame from the initialization vector; (c) providing the frame as input for a round process; (d) generating a key byte from the round process; (e) generating message text from the key byte; (f) if message text has not been generated for each byte of cipher text, forming a next frame for processing utilizing the message text generated in step (e) and returning to step (e). - View Dependent Claims (31, 32, 33, 34)
-
-
35. Receiver means, comprising:
-
computing means; means for receiving information from a device external said energy meter means, said receiving means being coupled to said computing means; memory means coupled to said computing means; and wherein said computing means is controlled to perform the step of generating message text from cipher text by performing the steps of; (a) generating an initialization vector; (b) forming a frame from the initialization vector; (c) providing the frame as input for a round process; (d) generating a key byte from the round process; (e) generating message text from the key byte; (f) if message text has not been generated for each byte of cipher text, forming a next frame for processing utilizing the message text generated in step (e) and returning to step (e). - View Dependent Claims (36, 37, 38, 39, 40)
-
Specification