METHODS, APPARATUSES, AND COMPUTER-READABLE STORAGE MEDIA FOR DATA AUTHENTICATION AND ERROR CORRECTION USING ERROR-TOLERANT MESSAGE AUTHENTICATION CODE: abstract simplified (17718631)

From WikiPatents
Jump to navigation Jump to search
  • This abstract for appeared for patent application number 17718631 Titled 'METHODS, APPARATUSES, AND COMPUTER-READABLE STORAGE MEDIA FOR DATA AUTHENTICATION AND ERROR CORRECTION USING ERROR-TOLERANT MESSAGE AUTHENTICATION CODE'

Simplified Explanation

The abstract describes an encoder that is used to encrypt a piece of text, called plaintext, into a secret code, called ciphertext. The encoder has two main components: an encoding submodule and a hash submodule.

The encoding submodule has two modes of operation. In the offline mode, it acts as a deterministic random bit generator (DRBG) to generate one or more possible values for a hash key. This key is used in the encryption process. In the online mode, it functions as a stream encryptor, which takes the plaintext and converts it into the ciphertext.

The encoder also includes a hash key selector, which chooses one specific value for the hash key from the generated candidates. This selected key is then used by the hash submodule.

The hash submodule is responsible for generating a MAC (Message Authentication Code) tag. It uses the ciphertext and the selected hash key to create this tag. The MAC tag helps ensure the integrity and authenticity of the encrypted message.

The abstract also mentions that a corresponding decoder is provided, although it does not provide any further details about its functionality.


Original Abstract Submitted

An encoder for encrypting a plaintext into a ciphertext. The encoder has an encoding submodule for acting as a deterministic random bit generator (DRBG) in an offline mode for generating one or more hash-key value candidates, and for acting as a stream encryptor in an online mode for encrypting the plaintext into the ciphertext; a hash key selector for selecting a hash-key value H from the one or more hash-key value candidates; and a hash submodule for generating a MAC tag using at least the ciphertext and the selected hash-key value H. A corresponding decoder is also provided.