Patents by Inventor Elad Barkan
Elad Barkan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20210367931Abstract: A cryptanalysis method comprising: (A) Performing a ciphertext-only direct cryptanalysis of A5/1 and (B) Using results of Step (A) to facilitate the decryption and/or encryption of further communications that are consistent with encryption using the session key and/or decryption using the session key, wherein the cryptanalysis considers part of the bits of the session key to have a known fixed value, and wherein the cryptanalysis finds the session key. An efficient known plaintext attack on AS/2 comprises trying all the possible values for R4, and for each such value solving the linearized system of equations that describe the output; The solution of the equations gives the internal state of RI, R2, and R3; Together with R4, this gives the full internal state which gives a suggestion for the key.Type: ApplicationFiled: January 15, 2021Publication date: November 25, 2021Inventor: Elad Barkan
-
Patent number: 10924462Abstract: A cryptanalysis method comprising: (A) Performing a ciphertext-only direct cryptanalysis of A5/1 and (B) Using results of Step (A) to facilitate the decryption and/or encryption of further communications that are consistent with encryption using the session key and/or decryption using the session key, wherein the cryptanalysis considers part of the bits of the session key to have a known fixed value, and wherein the cryptanalysis finds the session key. An efficient known plaintext attack on AS/2 comprises trying all the possible values for R4, and for each such value solving the linearized system of equations that describe the output; The solution of the equations gives the internal state of RI, R2, and R3; Together with R4, this gives the full internal state which gives a suggestion for the key.Type: GrantFiled: September 11, 2019Date of Patent: February 16, 2021Inventor: Elad Barkan
-
Publication number: 20200112547Abstract: A cryptanalysis method comprising: (A) Performing a ciphertext-only direct cryptanalysis of A5/1 and (B) Using results of Step (A) to facilitate the decryption and/or encryption of further communications that are consistent with encryption using the session key and/or decryption using the session key, wherein the cryptanalysis considers part of the bits of the session key to have a known fixed value, and wherein the cryptanalysis finds the session key. An efficient known plaintext attack on AS/2 comprises trying all the possible values for R4, and for each such value solving the linearized system of equations that describe the output; The solution of the equations gives the internal state of RI, R2, and R3; Together with R4, this gives the full internal state which gives a suggestion for the key.Type: ApplicationFiled: September 11, 2019Publication date: April 9, 2020Inventor: Elad Barkan
-
Patent number: 10447666Abstract: A cryptanalysis method comprising: (A) Performing a ciphertext-only direct cryptanalysis of A5/1 and (B) Using results of Step (A) to facilitate the decryption and/or encryption of further communications that are consistent with encryption using the session key and/or decryption using the session key, wherein the cryptanalysis considers part of the bits of the session key to have a known fixed value, and wherein the cryptanalysis finds the session key. An efficient known plaintext attack on AS/2 comprises trying all the possible values for R4, and for each such value solving the linearized system of equations that describe the output; The solution of the equations gives the internal state of RI, R2, and R3; Together with R4, this gives the full internal state which gives a suggestion for the key.Type: GrantFiled: January 2, 2018Date of Patent: October 15, 2019Inventor: Elad Barkan
-
Publication number: 20190028446Abstract: A cryptanalysis method comprising: (A) Performing a ciphertext-only direct cryptanalysis of A5/1 and (B) Using results of Step (A) to facilitate the decryption and/or encryption of further communications that are consistent with encryption using the session key and/or decryption using the session key, wherein the cryptanalysis considers part of the bits of the session key to have a known fixed value, and wherein the cryptanalysis finds the session key. An efficient known plaintext attack on A5/2 comprises trying all the possible values for R4, and for each such value solving the linearized system of equations that describe the output; The solution of the equations gives the internal state of R1, R2, and R3; Together with R4, this gives the full internal state which gives a suggestion for the key.Type: ApplicationFiled: January 2, 2018Publication date: January 24, 2019Inventor: Elad Barkan
-
Patent number: 9887972Abstract: A cryptanalysis method comprising: (A) Performing a ciphertext-only direct cryptanalysis of A5/1 and (B) Using results of Step (A) to facilitate the decryption and/or encryption of further communications that are consistent with encryption using the session key and/or decryption using the session key, wherein the cryptanalysis considers part of the bits of the session key to have a known fixed value, and wherein the cryptanalysis finds the session key. An efficient known plaintext attack on AS/2 comprises trying all the possible values for R4, and for each such value solving the linearized system of equations that describe the output; The solution of the equations gives the internal state of R1, R2, and R3; Together with R4, this gives the full internal state which gives a suggestion for the key.Type: GrantFiled: March 22, 2017Date of Patent: February 6, 2018Inventor: Elad Barkan
-
Publication number: 20170195301Abstract: A cryptanalysis method comprising: (A) Performing a ciphertext-only direct cryptanalysis of A5/1 and (B) Using results of Step (A) to facilitate the decryption and/or encryption of further communications that are consistent with encryption using the session key and/or decryption using the session key, wherein the cryptanalysis considers part of the bits of the session key to have a known fixed value, and wherein the cryptanalysis finds the session key. An efficient known plaintext attack on AS/2 comprises trying all the possible values for R4, and for each such value solving the linearized system of equations that describe the output; The solution of the equations gives the internal state of RI, R2, and R3; Together with R4, this gives the full internal state which gives a suggestion for the key.Type: ApplicationFiled: March 22, 2017Publication date: July 6, 2017Inventor: Elad Barkan
-
Patent number: 9634832Abstract: A cryptanalysis method comprising: (A) Performing a ciphertext-only direct cryptanalysis of A5/1 and (B) Using results of Step (A) to facilitate the decryption and/or encryption of further communications that are consistent with encryption using the session key and/or decryption using the session key, wherein the cryptanalysis considers part of the bits of the session key to have a known fixed value, and wherein the cryptanalysis finds the session key. An efficient known plaintext attack on AS/2 comprises trying all the possible values for R4, and for each such value solving the linearized system of equations that describe the output; The solution of the equations gives the internal state of R1, R2, and R3; Together with R4, this gives the full internal state which gives a suggestion for the key.Type: GrantFiled: May 14, 2015Date of Patent: April 25, 2017Inventor: Elad Barkan
-
Patent number: 9392638Abstract: Systems and apparatus, and methods relating thereto, can be implemented to include base station having a transceiver adapted to establish a radio-frequency link with a mobile telephone; a first interface, separate from said transceiver, that is adapted for communication over the public Internet; and a controller. The controller can be adapted to obtain, from a server accessed via the public Internet, gateway address information for a remote gateway that provides an interface between the public Internet and a network of a telephone service provider and route data from the mobile telephone, over the public Internet, to the remote gateway.Type: GrantFiled: August 21, 2012Date of Patent: July 12, 2016Assignee: Barkan Wireless IP Holdings, L.P.Inventor: Elad Barkan
-
Publication number: 20150244519Abstract: A cryptanalysis method comprising: (A) Performing a ciphertext-only direct cryptanalysis of A5/1 and (B) Using results of Step (A) to facilitate the decryption and/or encryption of further communications that are consistent with encryption using the session key and/or decryption using the session key, wherein the cryptanalysis considers part of the bits of the session key to have a known fixed value, and wherein the cryptanalysis finds the session key. An efficient known plaintext attack on AS/2 comprises trying all the possible values for R4, and for each such value solving the linearized system of equations that describe the output; The solution of the equations gives the internal state of R1, R2, and R3; Together with R4, this gives the full internal state which gives a suggestion for the key.Type: ApplicationFiled: May 14, 2015Publication date: August 27, 2015Inventor: Elad Barkan
-
Patent number: 9038192Abstract: A cryptanalysis method comprising: (A) Performing a ciphertext-only direct cryptanalysis of A5/1 and (B) Using results of Step (A) to facilitate the decryption and/or encryption of further communications that are consistent with encryption using the session key and/or decryption using the session key, wherein the cryptanalysis considers part of the bits of the session key to have a known fixed value, and wherein the cryptanalysis finds the session key. An efficient known plaintext attack on AS/2 comprises trying all the possible values for R4, and for each such value solving the linearized system of equations that describe the output; The solution of the equations gives the internal state of RI, R2, and R3; Together with R4, this gives the full internal state which gives a suggestion for the key.Type: GrantFiled: September 20, 2012Date of Patent: May 19, 2015Inventors: Elad Barkan, Eli Biham
-
Patent number: 8559369Abstract: A method for providing a wireless Internet connection to WiFi-enabled devices (STAs) comprising: wirelessly connecting a first STA to the Internet through a first AP with a first SSID; remaining connected to the first Access Point (AP), the first STA creates a software-based wireless AP with a second SSID for wirelessly connecting other STAs to the Internet through the first STA. A software module running on the first STA allows a second STA a wide access to the Internet only if the second STA has a copy of the software module running installed and active therein. A method for configuring STAs to connect to a wireless network, comprising: a customer first connects a STA by wire to its network; a software on the STA copies to the STA the security information gained through the wired connection, thus setting the security parameters for the STA.Type: GrantFiled: February 22, 2007Date of Patent: October 15, 2013Inventor: Elad Barkan
-
Patent number: 8559312Abstract: In a cellular network system, an add-on base station (43) including: A. a first channel (51) for connecting to a customer's phone; B. a second channel (52) for connecting to a network; C. circuits for connecting (53) the customer's phone to a destination on the network; and D. billing means (55) for collecting a payment for services related to connecting the customer's phone to the network. The customer's phone may be connected through a wireless link, the network may be an IP network, such as the Internet, and the payments may be in the form of digital documents, such as tokens, digital cash or credit.Type: GrantFiled: July 13, 2011Date of Patent: October 15, 2013Inventor: Elad Barkan
-
Publication number: 20130083918Abstract: A cryptanalysis method comprising: (A) Performing a ciphertext-only direct cryptanalysis of A5/1 and (B) Using results of Step (A) to facilitate the decryption and/or encryption of further communications that are consistent with encryption using the session key and/or decryption using the session key, wherein the cryptanalysis considers part of the bits of the session key to have a known fixed value, and wherein the cryptanalysis finds the session key. An efficient known plaintext attack on AS/2 comprises trying all the possible values for R4, and for each such value solving the linearized system of equations that describe the output; The solution of the equations gives the internal state of RI, R2, and R3; Together with R4, this gives the full internal state which gives a suggestion for the key.Type: ApplicationFiled: September 20, 2012Publication date: April 4, 2013Inventors: Elad Barkan, Eli Biham
-
Publication number: 20120314683Abstract: Systems and apparatus, and methods relating thereto, can be implemented to include base station having a transceiver adapted to establish a radio-frequency link with a mobile telephone; a first interface, separate from said transceiver, that is adapted for communication over the public Internet; and a controller. The controller can be adapted to obtain, from a server accessed via the public Internet, gateway address information for a remote gateway that provides an interface between the public Internet and a network of a telephone service provider and route data from the mobile telephone, over the public Internet, to the remote gateway.Type: ApplicationFiled: August 21, 2012Publication date: December 13, 2012Applicant: BARKAN WIRELESS IP HOLDINGS, L.P.Inventor: Elad Barkan
-
Patent number: 8295477Abstract: A cryptanalysis method comprising: (A) Performing a ciphertext-only direct cryptanalysis of A5/1 and (B) Using results of Step (A) to facilitate the decryption and/or encryption of further communications that are consistent with encryption using the session key and/or decryption using the session key, wherein the cryptanalysis considers part of the bits of the session key to have a known fixed value, and wherein the cryptanalysis finds the session key. An efficient known plaintext attack on AS/2 comprises trying all the possible values for R4, and for each such value solving the linearized system of equations that describe the output; The solution of the equations gives the internal state of RI, R2, and R3; Together with R4, this gives the full internal state which gives a suggestion for the key.Type: GrantFiled: July 18, 2011Date of Patent: October 23, 2012Inventors: Elad Barkan, Eli Biham
-
Publication number: 20110280393Abstract: A cryptanalysis method comprising: (A) Performing a ciphertext-only direct cryptanalysis of A5/1 and (B) Using results of Step (A) to facilitate the decryption and/or encryption of further communications that are consistent with encryption using the session key and/or decryption using the session key, wherein the cryptanalysis considers part of the bits of the session key to have a known fixed value, and wherein the cryptanalysis finds the session key. An efficient known plaintext attack on AS/2 comprises trying all the possible values for R4, and for each such value solving the linearized system of equations that describe the output; The solution of the equations gives the internal state of RI, R2, and R3; Together with R4, this gives the full internal state which gives a suggestion for the key.Type: ApplicationFiled: July 18, 2011Publication date: November 17, 2011Inventors: Elad Barkan, Eli Biham
-
Publication number: 20110268278Abstract: In a cellular network system, an add-on base station (43) including: A. a first channel (51) for connecting to a customer's phone; B. a second channel (52) for connecting to a network; C. circuits for connecting (53) the customer's phone to a destination on the network; and D. billing means (55) for collecting a payment for services related to connecting the customer's phone to the network. The customer's phone may be connected through a wireless link, the network may be an IP network, such as the Internet, and the payments may be in the form of digital documents, such as tokens, digital cash or credit.Type: ApplicationFiled: July 13, 2011Publication date: November 3, 2011Inventor: Elad BARKAN
-
Patent number: 8014284Abstract: In a cellular network system, an add-on base station comprising: A. a first channel for connecting to a customer's phone; B. a second channel for connecting to a network; C. circuits for connecting the customer's phone to a destination on the network; and D. billing means for collecting a payment for services related to connecting the customer's phone to the network. The customer's phone may be connected through a wireless link. A method to establish a link between a caller and an addressee comprising the steps of: A. The caller sends a request to a cellular center requesting to connect to a specific addressee, using a message encrypted with the public key of the center; B. the center decrypts the message, identifies the caller and the addressee; C. the center composes a message for the addressee and encrypts it with the public key of the addressee. The message is then sent to base stations; D. the base station transmits the message “as is” or in a modified form; E.Type: GrantFiled: June 4, 2001Date of Patent: September 6, 2011Inventor: Elad Barkan
-
Patent number: D802484Type: GrantFiled: May 23, 2016Date of Patent: November 14, 2017Inventor: Elad Barkan