CA2337306A1 - Method and apparatus for symmetric-key encryption - Google Patents
Method and apparatus for symmetric-key encryption Download PDFInfo
- Publication number
- CA2337306A1 CA2337306A1 CA002337306A CA2337306A CA2337306A1 CA 2337306 A1 CA2337306 A1 CA 2337306A1 CA 002337306 A CA002337306 A CA 002337306A CA 2337306 A CA2337306 A CA 2337306A CA 2337306 A1 CA2337306 A1 CA 2337306A1
- Authority
- CA
- Canada
- Prior art keywords
- plain text
- random number
- text blocks
- feedback value
- symmetric
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0625—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0637—Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
- H04L9/0656—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
- H04L9/0662—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
- H04L2209/125—Parallelization or pipelining, e.g. for accelerating processing of cryptographic operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/20—Manipulating the length of blocks of bits, e.g. padding or block truncation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Abstract
The present invention provides a symmetric-key cryptographic technique capable of realizing both high-speed cryptographic processing having a high degree of parallelism and alteration detection. The present invention performs the steps of: dividing plain text composed of redundancy data and a message to generate a plurality of plain text blocks each having a predetermined length; generating a random number sequence based on a secret key; generating a random number block corresponding to one of the plurality of plain text blocks from the random number sequence;
outputting a feedback value obtained as a result of operation on the one of the plurality of plain text blocks and the random number block, the feedback value being fed back to another one of the plurality of plain text blocks;
and performing an encryption operation using the one of the plurality of plain text blocks, the random number block, and a feedback value obtained as a result of operation on still another one of the plurality of plain text blocks to produce a ciphertext block.
outputting a feedback value obtained as a result of operation on the one of the plurality of plain text blocks and the random number block, the feedback value being fed back to another one of the plurality of plain text blocks;
and performing an encryption operation using the one of the plurality of plain text blocks, the random number block, and a feedback value obtained as a result of operation on still another one of the plurality of plain text blocks to produce a ciphertext block.
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2000-070994 | 2000-03-09 | ||
JP2000070994 | 2000-03-09 | ||
JP2000-210690 | 2000-07-06 | ||
JP2000210690A JP3864675B2 (en) | 2000-03-09 | 2000-07-06 | Common key encryption device |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2337306A1 true CA2337306A1 (en) | 2001-09-09 |
CA2337306C CA2337306C (en) | 2004-05-25 |
Family
ID=26587471
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002337306A Expired - Fee Related CA2337306C (en) | 2000-03-09 | 2001-02-15 | Method and apparatus for symmetric-key encryption |
Country Status (4)
Country | Link |
---|---|
US (3) | US7110545B2 (en) |
EP (1) | EP1133099A3 (en) |
JP (1) | JP3864675B2 (en) |
CA (1) | CA2337306C (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113630386A (en) * | 2021-07-15 | 2021-11-09 | 金杉 | Encryption and decryption method, device and communication system thereof |
US11601260B1 (en) | 2021-10-29 | 2023-03-07 | Uti Limited Partnership | Encryption/decryption using key encapsulation/decapsulation |
Families Citing this family (88)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
ATE403992T1 (en) * | 1999-06-22 | 2008-08-15 | Hitachi Ltd | CRYPTOGRAPHIC APPARATUS AND METHOD |
JP3864675B2 (en) * | 2000-03-09 | 2007-01-10 | 株式会社日立製作所 | Common key encryption device |
US7177421B2 (en) * | 2000-04-13 | 2007-02-13 | Broadcom Corporation | Authentication engine architecture and method |
JP2002202719A (en) * | 2000-11-06 | 2002-07-19 | Sony Corp | Device and method for enciphering, device and method for deciphering, and storage medium |
US7299355B2 (en) * | 2001-01-12 | 2007-11-20 | Broadcom Corporation | Fast SHA1 implementation |
EP1383264A4 (en) * | 2001-04-24 | 2005-12-21 | Nti Inc | Data transmission method |
ITMI20011938A1 (en) * | 2001-09-17 | 2003-03-17 | Cit Alcatel | METHOD TO ENCRYPT A FLOW OF DATA |
KR20030083326A (en) * | 2002-04-20 | 2003-10-30 | 엘지전자 주식회사 | Method for encipherment |
US7082534B2 (en) * | 2002-05-31 | 2006-07-25 | Broadcom Corporation | Method and apparatus for performing accelerated authentication and decryption using data blocks |
US7636840B2 (en) * | 2002-07-10 | 2009-12-22 | Dresser, Inc. | Secure communications and control in a fueling environment |
JP2004088505A (en) * | 2002-08-27 | 2004-03-18 | Matsushita Electric Ind Co Ltd | Parallel stream encrypting/decrypting device, its method and parallel stream encrypting/decrypting program |
FR2850479B1 (en) * | 2003-01-24 | 2005-04-29 | France Telecom | PUBLIC KEY CRYPTOGRAPHIC METHOD FOR PROTECTING A CHIP AGAINST FRAUD |
US7685631B1 (en) * | 2003-02-05 | 2010-03-23 | Microsoft Corporation | Authentication of a server by a client to prevent fraudulent user interfaces |
US7844053B2 (en) * | 2003-04-18 | 2010-11-30 | Ip-First, Llc | Microprocessor apparatus and method for performing block cipher cryptographic functions |
US8060755B2 (en) * | 2003-04-18 | 2011-11-15 | Via Technologies, Inc | Apparatus and method for providing user-generated key schedule in a microprocessor cryptographic engine |
US7392400B2 (en) * | 2003-04-18 | 2008-06-24 | Via Technologies, Inc. | Microprocessor apparatus and method for optimizing block cipher cryptographic functions |
US7536560B2 (en) * | 2003-04-18 | 2009-05-19 | Via Technologies, Inc. | Microprocessor apparatus and method for providing configurable cryptographic key size |
US7542566B2 (en) | 2003-04-18 | 2009-06-02 | Ip-First, Llc | Apparatus and method for performing transparent cipher block chaining mode cryptographic functions |
US7925891B2 (en) * | 2003-04-18 | 2011-04-12 | Via Technologies, Inc. | Apparatus and method for employing cryptographic functions to generate a message digest |
US7529367B2 (en) * | 2003-04-18 | 2009-05-05 | Via Technologies, Inc. | Apparatus and method for performing transparent cipher feedback mode cryptographic functions |
US7539876B2 (en) * | 2003-04-18 | 2009-05-26 | Via Technologies, Inc. | Apparatus and method for generating a cryptographic key schedule in a microprocessor |
US7502943B2 (en) * | 2003-04-18 | 2009-03-10 | Via Technologies, Inc. | Microprocessor apparatus and method for providing configurable cryptographic block cipher round results |
US7529368B2 (en) * | 2003-04-18 | 2009-05-05 | Via Technologies, Inc. | Apparatus and method for performing transparent output feedback mode cryptographic functions |
US7519833B2 (en) * | 2003-04-18 | 2009-04-14 | Via Technologies, Inc. | Microprocessor apparatus and method for enabling configurable data block size in a cryptographic engine |
US7321910B2 (en) * | 2003-04-18 | 2008-01-22 | Ip-First, Llc | Microprocessor apparatus and method for performing block cipher cryptographic functions |
US7532722B2 (en) * | 2003-04-18 | 2009-05-12 | Ip-First, Llc | Apparatus and method for performing transparent block cipher cryptographic functions |
US7900055B2 (en) | 2003-04-18 | 2011-03-01 | Via Technologies, Inc. | Microprocessor apparatus and method for employing configurable block cipher cryptographic algorithms |
KR100446336B1 (en) | 2003-05-20 | 2004-09-01 | 엔에이치엔(주) | Method and Device of Data Encryption |
JP2004363739A (en) * | 2003-06-03 | 2004-12-24 | Hitachi Ltd | Enciphering device or deciphering device for common key cipher that can detect alteration |
DE10345457A1 (en) * | 2003-09-30 | 2005-04-28 | Infineon Technologies Ag | Data encrypting and decrypting device for protecting contents of e.g. smart card, against unauthorized reading, applies part of data to encryption input and part to decryption input |
US7406595B1 (en) * | 2004-05-05 | 2008-07-29 | The United States Of America As Represented By The Director, National Security Agency | Method of packet encryption that allows for pipelining |
US20060013387A1 (en) * | 2004-07-14 | 2006-01-19 | Ruei-Shiang Suen | Method and system for implementing KASUMI algorithm for accelerating cryptography in GSM/GPRS/EDGE compliant handsets |
US20060095761A1 (en) * | 2004-10-22 | 2006-05-04 | Tvidia Corporation | Selective video encryption method and apparatus |
KR100675837B1 (en) * | 2004-12-13 | 2007-01-29 | 한국전자통신연구원 | Fast-GCM-AES block encoding apparatus and method |
US20060126827A1 (en) * | 2004-12-14 | 2006-06-15 | Dan P. Milleville | Encryption methods and apparatus |
CN101091348B (en) | 2004-12-28 | 2011-09-07 | 皇家飞利浦电子股份有限公司 | Key generation using biometric data and secret extraction codes |
KR20060081847A (en) * | 2005-01-10 | 2006-07-13 | 삼성전자주식회사 | Smart card for protecting secret key and method thereof |
US7715553B2 (en) * | 2005-08-01 | 2010-05-11 | Durward D. Dupre | Encrypting a plaintext message with authentication |
US20070110225A1 (en) * | 2005-11-16 | 2007-05-17 | Sub-Crypto Systems, Llc | Method and apparatus for efficient encryption |
CN101317357B (en) * | 2005-12-01 | 2011-05-18 | 艾利森电话股份有限公司 | Key management |
US7695667B2 (en) * | 2006-03-01 | 2010-04-13 | Hitachi Global Storage Technologies Netherlands B.V. | Method and apparatus for separating a stamper from a patterned substrate |
US20080019517A1 (en) * | 2006-04-06 | 2008-01-24 | Peter Munguia | Control work key store for multiple data streams |
US7930551B2 (en) * | 2006-05-15 | 2011-04-19 | Arris Group, Inc. | Method and system for reusing an MMH function to perform a fast MMH-MAC calculation |
JP2007311940A (en) * | 2006-05-16 | 2007-11-29 | Kddi Corp | Encrypting device and decoding device |
JP5060081B2 (en) | 2006-08-09 | 2012-10-31 | 富士通株式会社 | Relay device that encrypts and relays frames |
JP2008104040A (en) * | 2006-10-20 | 2008-05-01 | Fujitsu Ltd | Common key producing device, and common key producing method |
EP2092763B1 (en) | 2006-10-23 | 2019-03-27 | T-Mobile USA, Inc. | System and method for managing access point functionality and configuration |
US8036380B2 (en) * | 2006-12-14 | 2011-10-11 | Telefonaktiebolaget L M Ericsson (Publ) | Efficient data integrity protection |
US20090119510A1 (en) * | 2007-11-06 | 2009-05-07 | Men Long | End-to-end network security with traffic visibility |
US8467527B2 (en) | 2008-12-03 | 2013-06-18 | Intel Corporation | Efficient key derivation for end-to-end network security with traffic visibility |
WO2009020060A1 (en) * | 2007-08-06 | 2009-02-12 | Nec Corporation | Common key block encryption device, common key block encryption method, and program |
JP2009048525A (en) * | 2007-08-22 | 2009-03-05 | Sharp Corp | Content reproduction device, control program, recording medium |
US8194854B2 (en) * | 2008-02-27 | 2012-06-05 | Intel Corporation | Method and apparatus for optimizing advanced encryption standard (AES) encryption and decryption in parallel modes of operation |
KR20090131696A (en) * | 2008-06-19 | 2009-12-30 | 삼성전자주식회사 | Enc/decryption device and security storage device including the same |
US8619545B2 (en) | 2008-07-17 | 2013-12-31 | T-Mobile Usa, Inc. | System and method for selectively provisioning telecommunications services between an access point and a telecommunications network based on landline telephone detection |
US8885635B2 (en) | 2008-07-17 | 2014-11-11 | T-Mobile Usa, Inc. | System and method for selectively provisioning telecommunications services between an access point and a telecommunications network using a subscriber identifier |
US9137138B2 (en) * | 2008-11-28 | 2015-09-15 | Stephen W. NEVILLE | Method and system of controlling spam |
US8320344B2 (en) | 2009-02-27 | 2012-11-27 | T-Mobile Usa, Inc. | System and method for provisioning telecommunications services between an access point and a telecommunications network and providing a missing information notification |
DE102009027086A1 (en) * | 2009-06-23 | 2010-12-30 | Robert Bosch Gmbh | Apparatus and method for forming a signature |
US9032208B2 (en) | 2010-08-24 | 2015-05-12 | Mitsubishi Electric Corporation | Communication terminal, communication system, communication method and communication program |
JP5801095B2 (en) * | 2011-04-28 | 2015-10-28 | Kddi株式会社 | Stream cipher encryption apparatus, stream cipher decryption apparatus, stream cipher encryption method, stream cipher decryption method, and program |
JP5706751B2 (en) * | 2011-04-28 | 2015-04-22 | Kddi株式会社 | Stream cipher encryption apparatus, stream cipher decryption apparatus, stream cipher encryption method, stream cipher decryption method, and program |
CN103368901A (en) * | 2012-03-27 | 2013-10-23 | 复旦大学 | Cloud computing system based on large-scale discrete data |
US9342712B2 (en) * | 2012-06-08 | 2016-05-17 | Advanced Micro Devices, Inc. | Method and system for accelerating cryptographic processing |
US8983916B2 (en) * | 2012-06-15 | 2015-03-17 | Timothy STOAKES | Configurable data generator |
US9176838B2 (en) | 2012-10-19 | 2015-11-03 | Intel Corporation | Encrypted data inspection in a network environment |
CN103036677A (en) * | 2012-12-12 | 2013-04-10 | 成都林海电子有限责任公司 | Improved pareek encryption method |
CN103825723B (en) * | 2014-01-24 | 2019-05-03 | 深圳市太和物联信息技术有限公司 | A kind of encryption method and device |
JP5992651B2 (en) * | 2014-04-28 | 2016-09-14 | 一郎 加沢 | ENCRYPTION METHOD, PROGRAM, AND SYSTEM |
KR102287946B1 (en) | 2014-09-05 | 2021-08-09 | 삼성전자주식회사 | Method and Apparatus For Data Encrypting |
WO2016096000A1 (en) * | 2014-12-17 | 2016-06-23 | Telefonaktiebolaget Lm Ericsson (Publ) | Stream ciphering technique |
US10013363B2 (en) * | 2015-02-09 | 2018-07-03 | Honeywell International Inc. | Encryption using entropy-based key derivation |
EP3089398B1 (en) * | 2015-04-30 | 2017-10-11 | Nxp B.V. | Securing a cryptographic device |
US9660803B2 (en) | 2015-09-15 | 2017-05-23 | Global Risk Advisors | Device and method for resonant cryptography |
DE102016219926A1 (en) * | 2016-10-13 | 2018-04-19 | Siemens Aktiengesellschaft | Method, sender and receiver for authentication and integrity protection of message content |
GB201617620D0 (en) * | 2016-10-18 | 2016-11-30 | Cybernetica As | Composite digital signatures |
US10708073B2 (en) | 2016-11-08 | 2020-07-07 | Honeywell International Inc. | Configuration based cryptographic key generation |
US10404667B2 (en) | 2016-11-17 | 2019-09-03 | Bank Of America Corporation | Secure, autonomous file encryption and decryption |
KR102603069B1 (en) * | 2016-11-19 | 2023-11-15 | 디피니티 스티프텅 | System architecture and data processing methods in system architecture |
US11924327B2 (en) * | 2019-01-09 | 2024-03-05 | British Telecommunications Public Limited Company | Variable data protection |
EP3681094B1 (en) * | 2019-01-09 | 2021-11-10 | British Telecommunications public limited company | Impeding data access |
US11838402B2 (en) | 2019-03-13 | 2023-12-05 | The Research Foundation For The State University Of New York | Ultra low power core for lightweight encryption |
CN110176988B (en) * | 2019-04-25 | 2022-04-08 | 中国人民解放军战略支援部队信息工程大学 | Device and method for ensuring consistency of encryption behaviors of redundant execution bodies |
CN110674526B (en) * | 2019-09-30 | 2024-01-19 | 深圳前海微众银行股份有限公司 | Asynchronous encryption realization method, device, equipment and readable storage medium |
CN110719160A (en) * | 2019-10-10 | 2020-01-21 | 杭州闪捷信息科技有限公司 | Database encryption method based on quantum random number and national encryption algorithm |
CN110768785B (en) * | 2019-10-22 | 2023-05-02 | 宜人恒业科技发展(北京)有限公司 | Encoding and decoding methods, related devices and computer equipment |
CN115039374A (en) | 2020-02-06 | 2022-09-09 | 三菱电机株式会社 | Encryption device, decryption device, encryption method, decryption method, encryption program, and decryption program |
US11610004B2 (en) * | 2021-04-14 | 2023-03-21 | Bank Of America Corporation | System for implementing enhanced file encryption technique |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5870474A (en) * | 1995-12-04 | 1999-02-09 | Scientific-Atlanta, Inc. | Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity of service providers |
JP2541113B2 (en) | 1993-07-14 | 1996-10-09 | 日本電気株式会社 | Pre-encryption processing device and post-decryption processing device in cipher chain |
JPH09160490A (en) | 1995-12-06 | 1997-06-20 | Shinu Ko | Method and apparatus for concealment and decoding of information by digital chaos signal |
US6708273B1 (en) * | 1997-09-16 | 2004-03-16 | Safenet, Inc. | Apparatus and method for implementing IPSEC transforms within an integrated circuit |
JPH11161162A (en) | 1997-11-27 | 1999-06-18 | Hitachi Ltd | Ciphering method or deciphering method, and device using the method |
US6189095B1 (en) * | 1998-06-05 | 2001-02-13 | International Business Machines Corporation | Symmetric block cipher using multiple stages with modified type-1 and type-3 feistel networks |
US6351539B1 (en) * | 1998-09-18 | 2002-02-26 | Integrated Device Technology, Inc. | Cipher mixer with random number generator |
US6345101B1 (en) * | 1998-10-07 | 2002-02-05 | Jayant Shukla | Cryptographic method and apparatus for data communication and storage |
AU1431301A (en) * | 1999-11-22 | 2001-06-04 | Intel Corporation | Integrity check values (icv) based on pseudorandom binary matrices |
EP1252738A2 (en) * | 2000-01-31 | 2002-10-30 | VDG Inc. | Block encryption method and schemes for data confidentiality and integrity protection |
JP3864675B2 (en) | 2000-03-09 | 2007-01-10 | 株式会社日立製作所 | Common key encryption device |
-
2000
- 2000-07-06 JP JP2000210690A patent/JP3864675B2/en not_active Expired - Fee Related
-
2001
- 2001-02-15 CA CA002337306A patent/CA2337306C/en not_active Expired - Fee Related
- 2001-02-16 US US09/784,254 patent/US7110545B2/en not_active Expired - Fee Related
- 2001-02-16 EP EP01103891A patent/EP1133099A3/en not_active Withdrawn
- 2001-03-28 US US09/818,567 patent/US7200232B2/en not_active Expired - Fee Related
-
2006
- 2006-11-21 US US11/602,263 patent/US7359515B2/en not_active Expired - Lifetime
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113630386A (en) * | 2021-07-15 | 2021-11-09 | 金杉 | Encryption and decryption method, device and communication system thereof |
US11601260B1 (en) | 2021-10-29 | 2023-03-07 | Uti Limited Partnership | Encryption/decryption using key encapsulation/decapsulation |
WO2023070219A1 (en) * | 2021-10-29 | 2023-05-04 | Uti Limited Partnership | Encryption/decryption using key encapsulation/decapsulation |
Also Published As
Publication number | Publication date |
---|---|
US20010021254A1 (en) | 2001-09-13 |
CA2337306C (en) | 2004-05-25 |
US20070064944A1 (en) | 2007-03-22 |
US7200232B2 (en) | 2007-04-03 |
US20010021253A1 (en) | 2001-09-13 |
EP1133099A2 (en) | 2001-09-12 |
US7359515B2 (en) | 2008-04-15 |
EP1133099A3 (en) | 2004-02-11 |
US7110545B2 (en) | 2006-09-19 |
JP2001324925A (en) | 2001-11-22 |
JP3864675B2 (en) | 2007-01-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2337306A1 (en) | Method and apparatus for symmetric-key encryption | |
EP1876748B1 (en) | Privacy-preserving concatenation of strings | |
JP2001324925A5 (en) | ||
EP1081888A3 (en) | Encryption method, encryption apparatus, decryption method, and decryption apparatus | |
US20080080709A1 (en) | Method for encrypting information and device for realization of the method | |
WO2001091366A3 (en) | Cryptographic communications using pseudo-randomly generated cryptography keys | |
HK1056234A1 (en) | Pseudo-random number generator | |
US20150244518A1 (en) | Variable-length block cipher apparatus and method capable of format preserving encryption | |
WO2003003171A3 (en) | A method and system for generating and verifying a key protection certificate. | |
ATE403992T1 (en) | CRYPTOGRAPHIC APPARATUS AND METHOD | |
EP1248408A3 (en) | Methods and apparatus for providing efficient password-authenticated key exchange | |
KR970064060A (en) | Encryption / Decryption Method and Device | |
IL157886A0 (en) | Secure multicast transmission | |
WO2002101972A3 (en) | Circuit and method for implementing the advanced encryption standard block cipher algorithm in a system having a plurality of channels | |
WO2001089138A3 (en) | Method and apparatus for the security of cryptographic ciphers | |
JP2010522477A (en) | Method, computer program and apparatus for encrypting plaintext messages (simple and efficient one-pass authentication encryption method) | |
WO2000070809A3 (en) | Method of and system for encrypting messages, generating encryption keys and producing secure session keys | |
RU97121649A (en) | DIGITAL DATA BLOCK ENCRYPTION METHOD | |
WO2002041566A2 (en) | Cryptographic combiner using two sequential non-associative enciphering and deciphering operations | |
WO2003081829A3 (en) | Method and apparatus for remote digital key generation | |
CA2259089A1 (en) | Method and apparatus for masking cryptographic operations | |
JP2008035305A (en) | Encryption method and data concealing method | |
JP2001177518A (en) | Enciphering method, and decoding method and device | |
Yadav et al. | A novel visual cryptography scheme based on substitution cipher | |
GB0006668D0 (en) | Encrypting and decrypting |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKLA | Lapsed |