CA2210763A1 - Key generation from a given string for entity authentication - Google Patents
Key generation from a given string for entity authenticationInfo
- Publication number
- CA2210763A1 CA2210763A1 CA 2210763 CA2210763A CA2210763A1 CA 2210763 A1 CA2210763 A1 CA 2210763A1 CA 2210763 CA2210763 CA 2210763 CA 2210763 A CA2210763 A CA 2210763A CA 2210763 A1 CA2210763 A1 CA 2210763A1
- Authority
- CA
- Canada
- Prior art keywords
- bitstream
- character string
- bitstreams
- sub
- given
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
- H04L9/0656—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
Abstract
The invention provides a scheme for generating a symmetric encryption key for a given character string, such as a password or an alphanumeric. There is no limitation on the length or content of the given character string. The character string is converted to a bitstream using a standard character encoding scheme, such as ASCII. The bitstream is then subjected to combinations of bitstream processing operations over multiple rounds. The bitstream processing operations can include splitting the bitstream into multiple sub-bitstreams, reordering and shuffling the sub-bitstreams, performing logical bit-wise operations on the sub-bitstreams, performing one-way hashing on the sub-bitstreams, and combining the multiple sub-bitstreams back into a single bitstream through logical bit-wise operations on the sub-bitstreams. Prior to converting the character string into a bitstream, the given character string may be optionally combined with an initialization character string (for example, an initialization string associated with a particular processor), and it is the combined character string that is then encoded and used for generating an encryption key. Applying the combination rounds of the bitstream processes multiple times, for example sixteen times, will result in a strong key for encryption.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA 2210763 CA2210763C (en) | 1997-07-17 | 1997-07-17 | Key generation from a given string for entity authentication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA 2210763 CA2210763C (en) | 1997-07-17 | 1997-07-17 | Key generation from a given string for entity authentication |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2210763A1 true CA2210763A1 (en) | 1999-01-17 |
CA2210763C CA2210763C (en) | 2000-02-29 |
Family
ID=4161080
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA 2210763 Expired - Fee Related CA2210763C (en) | 1997-07-17 | 1997-07-17 | Key generation from a given string for entity authentication |
Country Status (1)
Country | Link |
---|---|
CA (1) | CA2210763C (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001013572A1 (en) * | 1999-08-19 | 2001-02-22 | Visto Corporation | System and method for encrypting and decrypting files |
US6233341B1 (en) | 1998-05-19 | 2001-05-15 | Visto Corporation | System and method for installing and using a temporary certificate at a remote site |
US6708221B1 (en) | 1996-12-13 | 2004-03-16 | Visto Corporation | System and method for globally and securely accessing unified information in a computer network |
US6766454B1 (en) | 1997-04-08 | 2004-07-20 | Visto Corporation | System and method for using an authentication applet to identify and authenticate a user in a computer network |
US7739334B1 (en) | 2000-03-17 | 2010-06-15 | Visto Corporation | System and method for automatically forwarding email and email events via a computer network to a server computer |
US7752166B2 (en) | 2001-11-15 | 2010-07-06 | Visto Corporation | System and methods for asynchronous synchronization |
US8117450B2 (en) * | 2001-10-11 | 2012-02-14 | Hewlett-Packard Development Company, L.P. | System and method for secure data transmission |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060195595A1 (en) | 2003-12-19 | 2006-08-31 | Mendez Daniel J | System and method for globally and securely accessing unified information in a computer network |
US8549314B2 (en) | 2010-04-29 | 2013-10-01 | King Saud University | Password generation methods and systems |
DE102011016150A1 (en) * | 2011-03-28 | 2012-10-04 | Jurij Schilling | Method for authentication of code password based on algorithm, involves using authentication not only between processing system and user, but also between processing system and another processing system |
US9083510B1 (en) * | 2013-03-13 | 2015-07-14 | Emc Corporation | Generation and management of crypto key for cloud data |
-
1997
- 1997-07-17 CA CA 2210763 patent/CA2210763C/en not_active Expired - Fee Related
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6708221B1 (en) | 1996-12-13 | 2004-03-16 | Visto Corporation | System and method for globally and securely accessing unified information in a computer network |
US6766454B1 (en) | 1997-04-08 | 2004-07-20 | Visto Corporation | System and method for using an authentication applet to identify and authenticate a user in a computer network |
US6233341B1 (en) | 1998-05-19 | 2001-05-15 | Visto Corporation | System and method for installing and using a temporary certificate at a remote site |
WO2001013572A1 (en) * | 1999-08-19 | 2001-02-22 | Visto Corporation | System and method for encrypting and decrypting files |
US7373517B1 (en) | 1999-08-19 | 2008-05-13 | Visto Corporation | System and method for encrypting and decrypting files |
US7739334B1 (en) | 2000-03-17 | 2010-06-15 | Visto Corporation | System and method for automatically forwarding email and email events via a computer network to a server computer |
US8117450B2 (en) * | 2001-10-11 | 2012-02-14 | Hewlett-Packard Development Company, L.P. | System and method for secure data transmission |
US7752166B2 (en) | 2001-11-15 | 2010-07-06 | Visto Corporation | System and methods for asynchronous synchronization |
US8069144B2 (en) | 2001-11-15 | 2011-11-29 | Visto Corporation | System and methods for asynchronous synchronization |
US8255359B2 (en) | 2001-11-15 | 2012-08-28 | Visto Corporation | System and methods for asynchronous synchronization |
Also Published As
Publication number | Publication date |
---|---|
CA2210763C (en) | 2000-02-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
HUP9902892A2 (en) | Method and apparatus for providing for the recovery of a cryptographic key | |
US4288659A (en) | Method and means for securing the distribution of encoding keys | |
NZ500201A (en) | Downloading data to an MPEG receiver/decoder | |
EP0792043A3 (en) | Method of sharing cryptokey | |
TWI268688B (en) | System and method for acoustic two factor authentication | |
EP1699165A3 (en) | Authentication of data transmitted in a digital transmission system | |
Hindi et al. | A novel technique for data steganography | |
EP1248408A3 (en) | Methods and apparatus for providing efficient password-authenticated key exchange | |
HUP0100232A2 (en) | Method and apparatus for encrypted data stream transmission | |
CA2210763A1 (en) | Key generation from a given string for entity authentication | |
TW367684B (en) | A process of cryptographic communication | |
CA2056886A1 (en) | Method for secure communication | |
AU2002212345A1 (en) | Method and system for web-based cross-domain single-sign-on authentication | |
EP0966126A3 (en) | Encrypting speech coder | |
EP0802654A3 (en) | Enciphering method, deciphering method and certifying method | |
EP0894377A4 (en) | A method for providing a secure non-reusable one-time password | |
HK83995A (en) | Method for having a portable object, such as a memory card coupled to an external medium, be authenticated by this medium | |
CA2109554A1 (en) | Secure Document and Method and Apparatus for Producing and Authenticating Same | |
TW375721B (en) | DES chip processor capable of executing data encryption standard (DES) operation | |
CA2197915A1 (en) | Cryptographic key recovery system | |
EP0792045A3 (en) | Method and apparatus for authentication using digital signatures | |
CA2235359A1 (en) | Implicit certificate scheme with ca chaining | |
CA2151590A1 (en) | Method of Extending the Validity of a Cryptographic Certificate | |
WO2001056221B1 (en) | Block encryption method and schemes for data confidentiality and integrity protection | |
WO1998047259A3 (en) | File encryption method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKLA | Lapsed |