US Patent Application 18231626. ENCRYPTION DEVICE, DECRYPTION DEVICE, ENCRYPTION METHOD, DECRYPTION METHOD, AND COMPUTER READABLE MEDIUM simplified abstract

From WikiPatents
Jump to navigation Jump to search

ENCRYPTION DEVICE, DECRYPTION DEVICE, ENCRYPTION METHOD, DECRYPTION METHOD, AND COMPUTER READABLE MEDIUM

Organization Name

Mitsubishi Electric Corporation

Inventor(s)

Yusuke Naito of Tokyo (JP)

ENCRYPTION DEVICE, DECRYPTION DEVICE, ENCRYPTION METHOD, DECRYPTION METHOD, AND COMPUTER READABLE MEDIUM - A simplified explanation of the abstract

This abstract first appeared for US patent application 18231626 titled 'ENCRYPTION DEVICE, DECRYPTION DEVICE, ENCRYPTION METHOD, DECRYPTION METHOD, AND COMPUTER READABLE MEDIUM

Simplified Explanation

The patent application describes an encryption device that divides a plaintext into multiple parts and encrypts them using a block cipher.

  • The encryption device uses a key and a replacement function to encrypt each part of the plaintext.
  • It generates an n-bit value for each part by encrypting the previous value using the key.
  • The device also generates a value by combining the encrypted values and the corresponding parts of the plaintext.
  • To detect any alteration of the ciphertext, the device generates an authenticator using a value and the last encrypted value.
  • The encryption device ensures secure encryption and detection of alterations in the ciphertext.


Original Abstract Submitted

An encryption device divides a plaintext M to generate a value M[1], . . . , and a value M[m]. The encryption device generates an n-bit value B[i] by encrypting a value B[i−1] by a block cipher with a value T[i−1] as a key, for each integer i of i=1, . . . , m in ascending order, generates a value C[i] from the value B[i] and a value M[i], and generates an n-bit value T[i] from a value P(T[i−1]) obtained by converting the value T[i−1] using a replacement function P, a value F(B[i]) obtained by converting the value B[i] using a replacement function F, and the value C[i]. The encryption device generates a ciphertext C by connecting the values C[i] for i=1, . . . , m. The encryption device generates from a value H[m] and the value B[m], an authenticator Tag for detecting an alteration of the ciphertext C.