Patents by Inventor Elad Barkan

Elad Barkan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210367931
    Abstract: A cryptanalysis method comprising: (A) Performing a ciphertext-only direct cryptanalysis of A5/1 and (B) Using results of Step (A) to facilitate the decryption and/or encryption of further communications that are consistent with encryption using the session key and/or decryption using the session key, wherein the cryptanalysis considers part of the bits of the session key to have a known fixed value, and wherein the cryptanalysis finds the session key. An efficient known plaintext attack on AS/2 comprises trying all the possible values for R4, and for each such value solving the linearized system of equations that describe the output; The solution of the equations gives the internal state of RI, R2, and R3; Together with R4, this gives the full internal state which gives a suggestion for the key.
    Type: Application
    Filed: January 15, 2021
    Publication date: November 25, 2021
    Inventor: Elad Barkan
  • Patent number: 10924462
    Abstract: A cryptanalysis method comprising: (A) Performing a ciphertext-only direct cryptanalysis of A5/1 and (B) Using results of Step (A) to facilitate the decryption and/or encryption of further communications that are consistent with encryption using the session key and/or decryption using the session key, wherein the cryptanalysis considers part of the bits of the session key to have a known fixed value, and wherein the cryptanalysis finds the session key. An efficient known plaintext attack on AS/2 comprises trying all the possible values for R4, and for each such value solving the linearized system of equations that describe the output; The solution of the equations gives the internal state of RI, R2, and R3; Together with R4, this gives the full internal state which gives a suggestion for the key.
    Type: Grant
    Filed: September 11, 2019
    Date of Patent: February 16, 2021
    Inventor: Elad Barkan
  • Publication number: 20200112547
    Abstract: A cryptanalysis method comprising: (A) Performing a ciphertext-only direct cryptanalysis of A5/1 and (B) Using results of Step (A) to facilitate the decryption and/or encryption of further communications that are consistent with encryption using the session key and/or decryption using the session key, wherein the cryptanalysis considers part of the bits of the session key to have a known fixed value, and wherein the cryptanalysis finds the session key. An efficient known plaintext attack on AS/2 comprises trying all the possible values for R4, and for each such value solving the linearized system of equations that describe the output; The solution of the equations gives the internal state of RI, R2, and R3; Together with R4, this gives the full internal state which gives a suggestion for the key.
    Type: Application
    Filed: September 11, 2019
    Publication date: April 9, 2020
    Inventor: Elad Barkan
  • Patent number: 10447666
    Abstract: A cryptanalysis method comprising: (A) Performing a ciphertext-only direct cryptanalysis of A5/1 and (B) Using results of Step (A) to facilitate the decryption and/or encryption of further communications that are consistent with encryption using the session key and/or decryption using the session key, wherein the cryptanalysis considers part of the bits of the session key to have a known fixed value, and wherein the cryptanalysis finds the session key. An efficient known plaintext attack on AS/2 comprises trying all the possible values for R4, and for each such value solving the linearized system of equations that describe the output; The solution of the equations gives the internal state of RI, R2, and R3; Together with R4, this gives the full internal state which gives a suggestion for the key.
    Type: Grant
    Filed: January 2, 2018
    Date of Patent: October 15, 2019
    Inventor: Elad Barkan
  • Publication number: 20190028446
    Abstract: A cryptanalysis method comprising: (A) Performing a ciphertext-only direct cryptanalysis of A5/1 and (B) Using results of Step (A) to facilitate the decryption and/or encryption of further communications that are consistent with encryption using the session key and/or decryption using the session key, wherein the cryptanalysis considers part of the bits of the session key to have a known fixed value, and wherein the cryptanalysis finds the session key. An efficient known plaintext attack on A5/2 comprises trying all the possible values for R4, and for each such value solving the linearized system of equations that describe the output; The solution of the equations gives the internal state of R1, R2, and R3; Together with R4, this gives the full internal state which gives a suggestion for the key.
    Type: Application
    Filed: January 2, 2018
    Publication date: January 24, 2019
    Inventor: Elad Barkan
  • Patent number: 9887972
    Abstract: A cryptanalysis method comprising: (A) Performing a ciphertext-only direct cryptanalysis of A5/1 and (B) Using results of Step (A) to facilitate the decryption and/or encryption of further communications that are consistent with encryption using the session key and/or decryption using the session key, wherein the cryptanalysis considers part of the bits of the session key to have a known fixed value, and wherein the cryptanalysis finds the session key. An efficient known plaintext attack on AS/2 comprises trying all the possible values for R4, and for each such value solving the linearized system of equations that describe the output; The solution of the equations gives the internal state of R1, R2, and R3; Together with R4, this gives the full internal state which gives a suggestion for the key.
    Type: Grant
    Filed: March 22, 2017
    Date of Patent: February 6, 2018
    Inventor: Elad Barkan
  • Publication number: 20170195301
    Abstract: A cryptanalysis method comprising: (A) Performing a ciphertext-only direct cryptanalysis of A5/1 and (B) Using results of Step (A) to facilitate the decryption and/or encryption of further communications that are consistent with encryption using the session key and/or decryption using the session key, wherein the cryptanalysis considers part of the bits of the session key to have a known fixed value, and wherein the cryptanalysis finds the session key. An efficient known plaintext attack on AS/2 comprises trying all the possible values for R4, and for each such value solving the linearized system of equations that describe the output; The solution of the equations gives the internal state of RI, R2, and R3; Together with R4, this gives the full internal state which gives a suggestion for the key.
    Type: Application
    Filed: March 22, 2017
    Publication date: July 6, 2017
    Inventor: Elad Barkan
  • Patent number: 9634832
    Abstract: A cryptanalysis method comprising: (A) Performing a ciphertext-only direct cryptanalysis of A5/1 and (B) Using results of Step (A) to facilitate the decryption and/or encryption of further communications that are consistent with encryption using the session key and/or decryption using the session key, wherein the cryptanalysis considers part of the bits of the session key to have a known fixed value, and wherein the cryptanalysis finds the session key. An efficient known plaintext attack on AS/2 comprises trying all the possible values for R4, and for each such value solving the linearized system of equations that describe the output; The solution of the equations gives the internal state of R1, R2, and R3; Together with R4, this gives the full internal state which gives a suggestion for the key.
    Type: Grant
    Filed: May 14, 2015
    Date of Patent: April 25, 2017
    Inventor: Elad Barkan
  • Patent number: 9392638
    Abstract: Systems and apparatus, and methods relating thereto, can be implemented to include base station having a transceiver adapted to establish a radio-frequency link with a mobile telephone; a first interface, separate from said transceiver, that is adapted for communication over the public Internet; and a controller. The controller can be adapted to obtain, from a server accessed via the public Internet, gateway address information for a remote gateway that provides an interface between the public Internet and a network of a telephone service provider and route data from the mobile telephone, over the public Internet, to the remote gateway.
    Type: Grant
    Filed: August 21, 2012
    Date of Patent: July 12, 2016
    Assignee: Barkan Wireless IP Holdings, L.P.
    Inventor: Elad Barkan
  • Publication number: 20150244519
    Abstract: A cryptanalysis method comprising: (A) Performing a ciphertext-only direct cryptanalysis of A5/1 and (B) Using results of Step (A) to facilitate the decryption and/or encryption of further communications that are consistent with encryption using the session key and/or decryption using the session key, wherein the cryptanalysis considers part of the bits of the session key to have a known fixed value, and wherein the cryptanalysis finds the session key. An efficient known plaintext attack on AS/2 comprises trying all the possible values for R4, and for each such value solving the linearized system of equations that describe the output; The solution of the equations gives the internal state of R1, R2, and R3; Together with R4, this gives the full internal state which gives a suggestion for the key.
    Type: Application
    Filed: May 14, 2015
    Publication date: August 27, 2015
    Inventor: Elad Barkan
  • Patent number: 9038192
    Abstract: A cryptanalysis method comprising: (A) Performing a ciphertext-only direct cryptanalysis of A5/1 and (B) Using results of Step (A) to facilitate the decryption and/or encryption of further communications that are consistent with encryption using the session key and/or decryption using the session key, wherein the cryptanalysis considers part of the bits of the session key to have a known fixed value, and wherein the cryptanalysis finds the session key. An efficient known plaintext attack on AS/2 comprises trying all the possible values for R4, and for each such value solving the linearized system of equations that describe the output; The solution of the equations gives the internal state of RI, R2, and R3; Together with R4, this gives the full internal state which gives a suggestion for the key.
    Type: Grant
    Filed: September 20, 2012
    Date of Patent: May 19, 2015
    Inventors: Elad Barkan, Eli Biham
  • Patent number: 8559369
    Abstract: A method for providing a wireless Internet connection to WiFi-enabled devices (STAs) comprising: wirelessly connecting a first STA to the Internet through a first AP with a first SSID; remaining connected to the first Access Point (AP), the first STA creates a software-based wireless AP with a second SSID for wirelessly connecting other STAs to the Internet through the first STA. A software module running on the first STA allows a second STA a wide access to the Internet only if the second STA has a copy of the software module running installed and active therein. A method for configuring STAs to connect to a wireless network, comprising: a customer first connects a STA by wire to its network; a software on the STA copies to the STA the security information gained through the wired connection, thus setting the security parameters for the STA.
    Type: Grant
    Filed: February 22, 2007
    Date of Patent: October 15, 2013
    Inventor: Elad Barkan
  • Patent number: 8559312
    Abstract: In a cellular network system, an add-on base station (43) including: A. a first channel (51) for connecting to a customer's phone; B. a second channel (52) for connecting to a network; C. circuits for connecting (53) the customer's phone to a destination on the network; and D. billing means (55) for collecting a payment for services related to connecting the customer's phone to the network. The customer's phone may be connected through a wireless link, the network may be an IP network, such as the Internet, and the payments may be in the form of digital documents, such as tokens, digital cash or credit.
    Type: Grant
    Filed: July 13, 2011
    Date of Patent: October 15, 2013
    Inventor: Elad Barkan
  • Publication number: 20130083918
    Abstract: A cryptanalysis method comprising: (A) Performing a ciphertext-only direct cryptanalysis of A5/1 and (B) Using results of Step (A) to facilitate the decryption and/or encryption of further communications that are consistent with encryption using the session key and/or decryption using the session key, wherein the cryptanalysis considers part of the bits of the session key to have a known fixed value, and wherein the cryptanalysis finds the session key. An efficient known plaintext attack on AS/2 comprises trying all the possible values for R4, and for each such value solving the linearized system of equations that describe the output; The solution of the equations gives the internal state of RI, R2, and R3; Together with R4, this gives the full internal state which gives a suggestion for the key.
    Type: Application
    Filed: September 20, 2012
    Publication date: April 4, 2013
    Inventors: Elad Barkan, Eli Biham
  • Publication number: 20120314683
    Abstract: Systems and apparatus, and methods relating thereto, can be implemented to include base station having a transceiver adapted to establish a radio-frequency link with a mobile telephone; a first interface, separate from said transceiver, that is adapted for communication over the public Internet; and a controller. The controller can be adapted to obtain, from a server accessed via the public Internet, gateway address information for a remote gateway that provides an interface between the public Internet and a network of a telephone service provider and route data from the mobile telephone, over the public Internet, to the remote gateway.
    Type: Application
    Filed: August 21, 2012
    Publication date: December 13, 2012
    Applicant: BARKAN WIRELESS IP HOLDINGS, L.P.
    Inventor: Elad Barkan
  • Patent number: 8295477
    Abstract: A cryptanalysis method comprising: (A) Performing a ciphertext-only direct cryptanalysis of A5/1 and (B) Using results of Step (A) to facilitate the decryption and/or encryption of further communications that are consistent with encryption using the session key and/or decryption using the session key, wherein the cryptanalysis considers part of the bits of the session key to have a known fixed value, and wherein the cryptanalysis finds the session key. An efficient known plaintext attack on AS/2 comprises trying all the possible values for R4, and for each such value solving the linearized system of equations that describe the output; The solution of the equations gives the internal state of RI, R2, and R3; Together with R4, this gives the full internal state which gives a suggestion for the key.
    Type: Grant
    Filed: July 18, 2011
    Date of Patent: October 23, 2012
    Inventors: Elad Barkan, Eli Biham
  • Publication number: 20110280393
    Abstract: A cryptanalysis method comprising: (A) Performing a ciphertext-only direct cryptanalysis of A5/1 and (B) Using results of Step (A) to facilitate the decryption and/or encryption of further communications that are consistent with encryption using the session key and/or decryption using the session key, wherein the cryptanalysis considers part of the bits of the session key to have a known fixed value, and wherein the cryptanalysis finds the session key. An efficient known plaintext attack on AS/2 comprises trying all the possible values for R4, and for each such value solving the linearized system of equations that describe the output; The solution of the equations gives the internal state of RI, R2, and R3; Together with R4, this gives the full internal state which gives a suggestion for the key.
    Type: Application
    Filed: July 18, 2011
    Publication date: November 17, 2011
    Inventors: Elad Barkan, Eli Biham
  • Publication number: 20110268278
    Abstract: In a cellular network system, an add-on base station (43) including: A. a first channel (51) for connecting to a customer's phone; B. a second channel (52) for connecting to a network; C. circuits for connecting (53) the customer's phone to a destination on the network; and D. billing means (55) for collecting a payment for services related to connecting the customer's phone to the network. The customer's phone may be connected through a wireless link, the network may be an IP network, such as the Internet, and the payments may be in the form of digital documents, such as tokens, digital cash or credit.
    Type: Application
    Filed: July 13, 2011
    Publication date: November 3, 2011
    Inventor: Elad BARKAN
  • Patent number: 8014284
    Abstract: In a cellular network system, an add-on base station comprising: A. a first channel for connecting to a customer's phone; B. a second channel for connecting to a network; C. circuits for connecting the customer's phone to a destination on the network; and D. billing means for collecting a payment for services related to connecting the customer's phone to the network. The customer's phone may be connected through a wireless link. A method to establish a link between a caller and an addressee comprising the steps of: A. The caller sends a request to a cellular center requesting to connect to a specific addressee, using a message encrypted with the public key of the center; B. the center decrypts the message, identifies the caller and the addressee; C. the center composes a message for the addressee and encrypts it with the public key of the addressee. The message is then sent to base stations; D. the base station transmits the message “as is” or in a modified form; E.
    Type: Grant
    Filed: June 4, 2001
    Date of Patent: September 6, 2011
    Inventor: Elad Barkan
  • Patent number: D802484
    Type: Grant
    Filed: May 23, 2016
    Date of Patent: November 14, 2017
    Inventor: Elad Barkan