Patents by Inventor Kush T. Tyagi
Kush T. Tyagi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11743049Abstract: Message authenticators for quantum-secured communications facilitate low-latency authentication with assurances of security. Low-latency message authenticators are especially valuable in infrastructure systems where security and latency constraints are difficult to satisfy with conventional non-quantum cryptography. For example, a message transmitter receives a message and derives an authentication tag for the message based at least in part on an authenticator that uses one or more quantum keys. The message transmitter outputs the message and its authentication tag. A message receiver receives a message and authentication tag for the message. The message receiver derives a comparison tag for the message based at least in part on an authenticator that uses one or more quantum keys. The message receiver checks whether the message is authentic based on a comparison of the authentication tag and the comparison tag. In example implementations, the authenticator uses stream-wise cyclic redundancy code operations.Type: GrantFiled: February 24, 2020Date of Patent: August 29, 2023Assignee: Triad National Security, LLCInventors: Richard J. Hughes, Jane E. Nordholt, Charles G. Peterson, Kush T. Tyagi, Christopher C. Wipf, Raymond T. Newell, Kevin P. McCabe, Nicholas Dallmann
-
Publication number: 20200252215Abstract: Message authenticators for quantum-secured communications facilitate low-latency authentication with assurances of security. Low-latency message authenticators are especially valuable in infrastructure systems where security and latency constraints are difficult to satisfy with conventional non-quantum cryptography. For example, a message transmitter receives a message and derives an authentication tag for the message based at least in part on an authenticator that uses one or more quantum keys. The message transmitter outputs the message and its authentication tag. A message receiver receives a message and authentication tag for the message. The message receiver derives a comparison tag for the message based at least in part on an authenticator that uses one or more quantum keys. The message receiver checks whether the message is authentic based on a comparison of the authentication tag and the comparison tag. In example implementations, the authenticator uses stream-wise cyclic redundancy code operations.Type: ApplicationFiled: February 24, 2020Publication date: August 6, 2020Applicant: Triad National Security, LLCInventors: Richard J. Hughes, Jane E. Nordholt, Charles G. Peterson, Kush T. Tyagi, Christopher C. Wipf, Raymond T. Newell, Kevin P. McCabe, Nicholas Dallmann
-
Patent number: 10574461Abstract: Message authenticators for quantum-secured communications facilitate low-latency authentication with assurances of security. Low-latency message authenticators are especially valuable in infrastructure systems where security and latency constraints are difficult to satisfy with conventional non-quantum cryptography. For example, a message transmitter receives a message and derives an authentication tag for the message based at least in part on an authenticator that uses one or more quantum keys. The message transmitter outputs the message and its authentication tag. A message receiver receives a message and authentication tag for the message. The message receiver derives a comparison tag for the message based at least in part on an authenticator that uses one or more quantum keys. The message receiver checks whether the message is authentic based on a comparison of the authentication tag and the comparison tag. In example implementations, the authenticator uses stream-wise cyclic redundancy code operations.Type: GrantFiled: September 30, 2014Date of Patent: February 25, 2020Assignee: Triad National Security, LLCInventors: Richard John Hughes, Jane Elizabeth Nordholt, Charles Glen Peterson, Kush T. Tyagi, Christopher C. Wipf, Raymond Thorson Newell, Kevin P. McCabe, Nicholas Dallmann
-
Patent number: 9680641Abstract: Techniques and tools for quantum key distribution (“QKD”) between a quantum communication (“QC”) card, base station and trusted authority are described herein. In example implementations, a QC card contains a miniaturized QC transmitter and couples with a base station. The base station provides a network connection with the trusted authority and can also provide electric power to the QC card. When coupled to the base station, after authentication by the trusted authority, the QC card acquires keys through QKD with a trust authority. The keys can be used to set up secure communication, for authentication, for access control, or for other purposes. The QC card can be implemented as part of a smart phone or other mobile computing device, or the QC card can be used as a fillgun for distribution of the keys.Type: GrantFiled: April 6, 2015Date of Patent: June 13, 2017Assignee: Los Alamos National Security, LLCInventors: Jane E. Nordholt, Richard John Hughes, Raymond Thorson Newell, Charles Glen Peterson, Danna Rosenberg, Kevin Peter McCabe, Kush T. Tyagi, Nicholas Dallmann
-
Publication number: 20160248586Abstract: Message authenticators for quantum-secured communications facilitate low-latency authentication with assurances of security. Low-latency message authenticators are especially valuable in infrastructure systems where security and latency constraints are difficult to satisfy with conventional non-quantum cryptography. For example, a message transmitter receives a message and derives an authentication tag for the message based at least in part on an authenticator that uses one or more quantum keys. The message transmitter outputs the message and its authentication tag. A message receiver receives a message and authentication tag for the message. The message receiver derives a comparison tag for the message based at least in part on an authenticator that uses one or more quantum keys. The message receiver checks whether the message is authentic based on a comparison of the authentication tag and the comparison tag. In example implementations, the authenticator uses stream-wise cyclic redundancy code operations.Type: ApplicationFiled: September 30, 2014Publication date: August 25, 2016Inventors: Richard John HUGHES, Jane Elizabeth NORDHOLT, Charles Glen PETERSON, Kush T. TYAGI, Christopher C. WIPF, Raymond Thorson NEWELL, Kevin P. MCCABE, Nicholas DALLMANN
-
Publication number: 20160065365Abstract: Techniques and tools for quantum key distribution (“QKD”) between a quantum communication (“QC”) card, base station and trusted authority are described herein. In example implementations, a QC card contains a miniaturized QC transmitter and couples with a base station. The base station provides a network connection with the trusted authority and can also provide electric power to the QC card. When coupled to the base station, after authentication by the trusted authority, the QC card acquires keys through QKD with a trust authority. The keys can be used to set up secure communication, for authentication, for access control, or for other purposes. The QC card can be implemented as part of a smart phone or other mobile computing device, or the QC card can be used as a fillgun for distribution of the keys.Type: ApplicationFiled: April 6, 2015Publication date: March 3, 2016Applicant: Los Alamos National Security, LLCInventors: Jane E. NORDHOLT, Richard John HUGHES, Raymond Thorson NEWELL, Charles Glen PETERSON, Danna ROSENBERG, Kevin Peter MCCABE, Kush T. TYAGI, Nicholas DALLMANN
-
Patent number: 9002009Abstract: Techniques and tools for quantum key distribution (“QKD”) between a quantum communication (“QC”) card, base station and trusted authority are described herein. In example implementations, a QC card contains a miniaturized QC transmitter and couples with a base station. The base station provides a network connection with the trusted authority and can also provide electric power to the QC card. When coupled to the base station, after authentication by the trusted authority, the QC card acquires keys through QKD with a trusted authority. The keys can be used to set up secure communication, for authentication, for access control, or for other purposes. The QC card can be implemented as part of a smart phone or other mobile computing device, or the QC card can be used as a fillgun for distribution of the keys.Type: GrantFiled: September 30, 2010Date of Patent: April 7, 2015Assignee: Los Alamos National Security, LLCInventors: Jane Elizabeth Nordholt, Richard John Hughes, Raymond Thorson Newell, Charles Glen Peterson, Danna Rosenberg, Kevin Peter McCabe, Kush T. Tyagi, Nicholas Dallman
-
Publication number: 20130101119Abstract: Techniques and tools for quantum key distribution (“QKD”) between a quantum communication (“QC”) card, base station and trusted authority are described herein. In example implementations, a QC card contains a miniaturized QC transmitter and couples with a base station. The base station provides a network connection with the trusted authority and can also provide electric power to the QC card. When coupled to the base station, after authentication by the trusted authority, the QC card acquires keys through QKD with a trusted authority. The keys can be used to set up secure communication, for authentication, for access control, or for other purposes. The QC card can be implemented as part of a smart phone or other mobile computing device, or the QC card can be used as a fillgun for distribution of the keys.Type: ApplicationFiled: September 30, 2010Publication date: April 25, 2013Applicant: Los Alamos National Security LLCInventors: Jane Elizabeth Nordholt, Richard John Hughes, Raymond Thorson Newell, Charles Glen Peterson, Danna Rosenberg, Kevin Peter McCabe, Kush T. Tyagi, Nicholas Dallmann