DE60112130D1 - Vorrichtung zur datenverschlüsselung unter verwendung einer schlüsselmatrix - Google Patents
Vorrichtung zur datenverschlüsselung unter verwendung einer schlüsselmatrixInfo
- Publication number
- DE60112130D1 DE60112130D1 DE60112130T DE60112130T DE60112130D1 DE 60112130 D1 DE60112130 D1 DE 60112130D1 DE 60112130 T DE60112130 T DE 60112130T DE 60112130 T DE60112130 T DE 60112130T DE 60112130 D1 DE60112130 D1 DE 60112130D1
- Authority
- DE
- Germany
- Prior art keywords
- encryption
- plain
- character
- characters
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Classifications
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C1/00—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
- G09C1/02—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system by using a ciphering code in chart form
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/20—Manipulating the length of blocks of bits, e.g. padding or block truncation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/24—Key scheduling, i.e. generating round keys or sub-keys for block encryption
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US26640001P | 2001-02-02 | 2001-02-02 | |
US266400P | 2001-02-02 | ||
PCT/US2001/040737 WO2002063592A2 (en) | 2001-02-02 | 2001-05-15 | Data encryption system using key matrix |
Publications (2)
Publication Number | Publication Date |
---|---|
DE60112130D1 true DE60112130D1 (de) | 2005-08-25 |
DE60112130T2 DE60112130T2 (de) | 2006-06-08 |
Family
ID=23014417
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DE60112130T Expired - Lifetime DE60112130T2 (de) | 2001-02-02 | 2001-05-15 | Vorrichtung zur datenverschlüsselung unter verwendung einer schlüsselmatrix |
Country Status (7)
Country | Link |
---|---|
US (5) | US6996234B2 (de) |
EP (1) | EP1410558B1 (de) |
AT (1) | ATE300134T1 (de) |
AU (1) | AU2001259860B2 (de) |
CA (1) | CA2437500C (de) |
DE (1) | DE60112130T2 (de) |
WO (1) | WO2002063592A2 (de) |
Families Citing this family (60)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7418098B1 (en) * | 2000-11-27 | 2008-08-26 | Protegrity Corporation | Data type preserving encryption |
US6996234B2 (en) * | 2001-02-02 | 2006-02-07 | Asier Technology Corporation | Data decryption methodology |
US7016493B2 (en) * | 2001-03-01 | 2006-03-21 | Asier Technology Corporation | Key matrix system |
GB2373074B (en) * | 2001-03-10 | 2004-10-13 | Ibm | A method and apparatus for storage of security keys and certificates |
DE60130902T2 (de) * | 2001-11-23 | 2008-07-17 | Protegrity Research & Development | Verfahren zum Erkennen des Eindringens in ein Datenbanksystem |
US20030149876A1 (en) * | 2002-02-01 | 2003-08-07 | Secure Choice Llc | Method and system for performing perfectly secure key exchange and authenticated messaging |
US7826466B2 (en) | 2002-06-26 | 2010-11-02 | Atheros Communications, Inc. | Communication buffer scheme optimized for VoIP, QoS and data networking over a power line |
US8149703B2 (en) | 2002-06-26 | 2012-04-03 | Qualcomm Atheros, Inc. | Powerline network bridging congestion control |
WO2004034632A1 (en) * | 2002-10-10 | 2004-04-22 | Asier Technology Corporation | Method and system for data encryption and decryption |
US20040148356A1 (en) * | 2002-11-04 | 2004-07-29 | Bishop James William | System and method for private messaging |
US7383586B2 (en) | 2003-01-17 | 2008-06-03 | Microsoft Corporation | File system operation and digital rights management (DRM) |
US8213601B2 (en) * | 2003-02-07 | 2012-07-03 | Patrick Zuili | Font level encryption method and apparatus |
US8666065B2 (en) * | 2003-02-07 | 2014-03-04 | Britesmart Llc | Real-time data encryption |
US8064474B2 (en) * | 2003-03-20 | 2011-11-22 | Qualcomm Atheros, Inc. | Method and apparatus for selecting a responder to enable reliable multicast |
US7281187B2 (en) * | 2003-11-20 | 2007-10-09 | Intellon Corporation | Using error checking bits to communicated an address or other bits |
US7684568B2 (en) * | 2003-11-24 | 2010-03-23 | Intellon Corporation | Encrypting data in a communication network |
US8090857B2 (en) | 2003-11-24 | 2012-01-03 | Qualcomm Atheros, Inc. | Medium access control layer that encapsulates data from a plurality of received data units into a plurality of independently transmittable blocks |
US7660327B2 (en) | 2004-02-03 | 2010-02-09 | Atheros Communications, Inc. | Temporary priority promotion for network communications in which access to a shared medium depends on a priority level |
EP1577791B1 (de) * | 2004-03-16 | 2011-11-02 | Microdasys Inc. | Inhaltsüberwachung für XML |
US7422152B2 (en) | 2004-05-13 | 2008-09-09 | Cisco Technology, Inc. | Methods and devices for providing scalable RFID networks |
EP1790115A1 (de) * | 2004-09-14 | 2007-05-30 | P. Prahlad Singanamala | Verfahren und system zur rechnerischen transformation |
US7509431B2 (en) * | 2004-11-17 | 2009-03-24 | Cisco Technology, Inc. | Performing message and transformation adapter functions in a network element on behalf of an application |
US7664879B2 (en) | 2004-11-23 | 2010-02-16 | Cisco Technology, Inc. | Caching content and state data at a network element |
US7987272B2 (en) | 2004-12-06 | 2011-07-26 | Cisco Technology, Inc. | Performing message payload processing functions in a network element on behalf of an application |
US7496750B2 (en) | 2004-12-07 | 2009-02-24 | Cisco Technology, Inc. | Performing security functions on a message payload in a network element |
US7725934B2 (en) * | 2004-12-07 | 2010-05-25 | Cisco Technology, Inc. | Network and application attack protection based on application layer message inspection |
US7606267B2 (en) * | 2004-12-10 | 2009-10-20 | Cisco Technology, Inc. | Reducing the sizes of application layer messages in a network element |
US8082304B2 (en) | 2004-12-10 | 2011-12-20 | Cisco Technology, Inc. | Guaranteed delivery of application layer messages by a network element |
US7551567B2 (en) * | 2005-01-05 | 2009-06-23 | Cisco Technology, Inc. | Interpreting an application message at a network element using sampling and heuristics |
US20060155862A1 (en) * | 2005-01-06 | 2006-07-13 | Hari Kathi | Data traffic load balancing based on application layer messages |
US7698416B2 (en) * | 2005-01-25 | 2010-04-13 | Cisco Technology, Inc. | Application layer message-based server failover management by a network element |
US7725715B2 (en) * | 2005-02-24 | 2010-05-25 | Access Business Group International Llc | System and method for three-phase data encryption |
US7602911B2 (en) * | 2005-03-14 | 2009-10-13 | Microsoft Corporation | Method and system for enhancing cryptography-based security |
US9787471B1 (en) * | 2005-06-02 | 2017-10-10 | Robert T. Jenkins and Virginia T. Jenkins | Data enciphering or deciphering using a hierarchical assignment system |
US7953826B2 (en) | 2005-07-14 | 2011-05-31 | Cisco Technology, Inc. | Provisioning and redundancy for RFID middleware servers |
US8175190B2 (en) | 2005-07-27 | 2012-05-08 | Qualcomm Atheros, Inc. | Managing spectra of modulated signals in a communication network |
US7345585B2 (en) | 2005-08-01 | 2008-03-18 | Cisco Technology, Inc. | Network based device for providing RFID middleware functionality |
US7853018B2 (en) * | 2005-11-10 | 2010-12-14 | Atallah Mikhail J | Method and apparatus for hiding a private key |
US8698603B2 (en) | 2005-11-15 | 2014-04-15 | Cisco Technology, Inc. | Methods and systems for automatic device provisioning in an RFID network using IP multicast |
US8769311B2 (en) | 2006-05-31 | 2014-07-01 | International Business Machines Corporation | Systems and methods for transformation of logical data objects for storage |
US8626726B2 (en) | 2006-05-31 | 2014-01-07 | International Business Machines Corporation | Method and system for transformation of logical data objects for storage |
US7792301B2 (en) * | 2006-06-29 | 2010-09-07 | Microsoft Corporation | Access control and encryption in multi-user systems |
US8396221B2 (en) | 2006-12-21 | 2013-03-12 | Oracle International Corporation | Secure broadcasting and multicasting |
US9059838B2 (en) * | 2007-03-30 | 2015-06-16 | Verizon Patent And Licensing Inc. | Encryption algorithm with randomized buffer |
US20090103726A1 (en) * | 2007-10-18 | 2009-04-23 | Nabeel Ahmed | Dual-mode variable key length cryptography system |
US8225106B2 (en) | 2008-04-02 | 2012-07-17 | Protegrity Corporation | Differential encryption utilizing trust modes |
CN101661546B (zh) * | 2008-08-28 | 2012-12-19 | 深圳富泰宏精密工业有限公司 | 在手持行动电子装置中进行文件加密的系统及方法 |
US8364984B2 (en) | 2009-03-13 | 2013-01-29 | Microsoft Corporation | Portable secure data files |
US9684710B2 (en) * | 2009-05-28 | 2017-06-20 | Microsoft Technology Licensing, Llc | Extending random number summation as an order-preserving encryption scheme |
US8958554B2 (en) * | 2009-11-30 | 2015-02-17 | Red Hat, Inc. | Unicode-compatible stream cipher |
US9058497B2 (en) | 2010-12-23 | 2015-06-16 | Microsoft Technology Licensing, Llc | Cryptographic key management |
US20130254553A1 (en) * | 2012-03-24 | 2013-09-26 | Paul L. Greene | Digital data authentication and security system |
US9673983B2 (en) | 2012-09-14 | 2017-06-06 | Qualcomm Incorporated | Apparatus and method for protecting message data |
WO2014135989A2 (en) | 2013-03-06 | 2014-09-12 | Assa Abloy Ab | Localized pin management with reader verification and no disclosure |
US10360821B2 (en) | 2014-02-03 | 2019-07-23 | AT Communications Co., Ltd. | Sentence recognition device, sentence recognition method, and recording medium |
RU2600100C2 (ru) * | 2014-07-29 | 2016-10-20 | Федеральное государственное бюджетное образовательное учреждение высшего профессионального образования "Амурский государственный университет" | Способ шифрования информации |
KR101689165B1 (ko) * | 2015-03-12 | 2016-12-23 | 권오헌 | 이미지를 이용한 암호화 장치 및 방법 |
US9692598B2 (en) * | 2015-08-07 | 2017-06-27 | Terry L. Davis | Multi-use long string authentication keys |
US10277561B2 (en) | 2016-07-22 | 2019-04-30 | International Business Machines Corporation | Database management system shared ledger support |
CN111241606B (zh) * | 2020-01-21 | 2021-03-23 | 北京连山科技股份有限公司 | 一种一拖三的移动存储设备 |
Family Cites Families (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4809327A (en) * | 1986-09-02 | 1989-02-28 | Unisys Corporation | Encrtption of messages employing unique control words and randomly chosen encryption keys |
GB9015799D0 (en) * | 1990-07-18 | 1991-06-12 | Plessey Telecomm | A data communication system |
US5245658A (en) * | 1992-01-06 | 1993-09-14 | George Bush | Domain-based encryption |
US5438622A (en) * | 1994-01-21 | 1995-08-01 | Apple Computer, Inc. | Method and apparatus for improving the security of an electronic codebook encryption scheme utilizing an offset in the pseudorandom sequence |
DE69532434T2 (de) * | 1994-10-27 | 2004-11-11 | Mitsubishi Corp. | Gerät für Dateiurheberrechte-Verwaltungssystem |
US5799090A (en) * | 1995-09-25 | 1998-08-25 | Angert; Joseph C. | pad encryption method and software |
US5991403A (en) * | 1996-12-23 | 1999-11-23 | Intel Corporation | Recoverable cryptographic transformation on YUV data suitable for compressions |
US6885747B1 (en) * | 1997-02-13 | 2005-04-26 | Tec.Sec, Inc. | Cryptographic key split combiner |
US6373948B1 (en) * | 1997-08-15 | 2002-04-16 | Lucent Technologies Inc. | Cryptographic method and apparatus for restricting access to transmitted programming content using program identifiers |
US7095852B2 (en) * | 1998-02-13 | 2006-08-22 | Tecsec, Inc. | Cryptographic key split binder for use with tagged data elements |
US6118873A (en) * | 1998-04-24 | 2000-09-12 | International Business Machines Corporation | System for encrypting broadcast programs in the presence of compromised receiver devices |
US6363480B1 (en) * | 1999-09-14 | 2002-03-26 | Sun Microsystems, Inc. | Ephemeral decryptability |
US6891951B2 (en) * | 2000-01-21 | 2005-05-10 | Victor Company Of Japan, Ltd. | Cryptosystem-related method and apparatus |
JP2001211153A (ja) * | 2000-01-25 | 2001-08-03 | Murata Mach Ltd | 秘密鍵生成方法 |
US6922472B2 (en) * | 2000-05-05 | 2005-07-26 | Teleputers, Llc | Method and system for performing permutations using permutation instructions based on butterfly networks |
FR2814009B1 (fr) | 2000-09-14 | 2003-01-31 | Jean Roland Riviere | Procede et dispositif de transformation de donnees a caractere convolutif et decalages variables, et systemes les mettant en oeuvre |
US6996234B2 (en) * | 2001-02-02 | 2006-02-07 | Asier Technology Corporation | Data decryption methodology |
US7016493B2 (en) | 2001-03-01 | 2006-03-21 | Asier Technology Corporation | Key matrix system |
-
2001
- 2001-03-01 US US09/797,068 patent/US6996234B2/en not_active Expired - Fee Related
- 2001-03-01 US US09/797,107 patent/US7016497B2/en not_active Expired - Fee Related
- 2001-03-01 US US09/796,964 patent/US20020131590A1/en not_active Abandoned
- 2001-03-01 US US09/797,272 patent/US6950518B2/en not_active Expired - Fee Related
- 2001-03-01 US US09/797,066 patent/US7003108B2/en not_active Expired - Fee Related
- 2001-05-15 EP EP01933433A patent/EP1410558B1/de not_active Expired - Lifetime
- 2001-05-15 CA CA002437500A patent/CA2437500C/en not_active Expired - Fee Related
- 2001-05-15 WO PCT/US2001/040737 patent/WO2002063592A2/en active IP Right Grant
- 2001-05-15 AU AU2001259860A patent/AU2001259860B2/en not_active Ceased
- 2001-05-15 AT AT01933433T patent/ATE300134T1/de not_active IP Right Cessation
- 2001-05-15 DE DE60112130T patent/DE60112130T2/de not_active Expired - Lifetime
Also Published As
Publication number | Publication date |
---|---|
CA2437500C (en) | 2006-02-21 |
EP1410558B1 (de) | 2005-07-20 |
US6950518B2 (en) | 2005-09-27 |
US7016497B2 (en) | 2006-03-21 |
DE60112130T2 (de) | 2006-06-08 |
ATE300134T1 (de) | 2005-08-15 |
US20020131591A1 (en) | 2002-09-19 |
US6996234B2 (en) | 2006-02-07 |
US20020136403A1 (en) | 2002-09-26 |
US20020141573A1 (en) | 2002-10-03 |
US20020141574A1 (en) | 2002-10-03 |
EP1410558A2 (de) | 2004-04-21 |
AU2001259860B2 (en) | 2007-02-15 |
US7003108B2 (en) | 2006-02-21 |
WO2002063592A2 (en) | 2002-08-15 |
US20020131590A1 (en) | 2002-09-19 |
CA2437500A1 (en) | 2002-08-15 |
WO2002063592A3 (en) | 2003-09-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE60112130D1 (de) | Vorrichtung zur datenverschlüsselung unter verwendung einer schlüsselmatrix | |
GB2397735A (en) | An encryption system | |
WO2001097480A3 (en) | System and method for controlling the access to digital works through a network | |
EP0998080A3 (de) | Verfahren zur Sicherung einer Funkverbindung in einem drahtlosen System | |
EP0802654A3 (de) | Verschlüsselungsverfahren, Entschlüsselungsverfahren und Beglaubigungsverfahren | |
ATE355671T1 (de) | Vorrichtung und verfahren zur informationsverarbeitung | |
DE60043053D1 (de) | Selbstgenerierung von zertifikaten unter verwendung eines sicheren mikroprozessors in einer vorrichtung zur digitalen datenübertragung | |
WO2002043309A3 (en) | Cryptographic data security system and method | |
EP1843343A3 (de) | Verfahren und Gerät zum Kontrollieren des Verteilens und der Benutzung von Digitalwerken | |
EP1249964A3 (de) | Empfangsendgerät, Vorrichtung zum Schlüsselverwaltung und Verfahren zum Anpassen eines Schlüssels für ein Public-key Verschlüsselungssystem | |
DE69935030D1 (de) | System und Verfahren zur Web-Server Benutzerauthentifizierung | |
WO2002035314A3 (en) | Method and system for sharing anonymous user information | |
ATE293323T1 (de) | Verfahren und vorrichtung für ein robustes und schnelles kryptosystem | |
EP1035684A3 (de) | Vorrichtung zur kryptographischen Kommunikation | |
CA2253102A1 (en) | Method of and system for processing electronic document and recording medium for recording processing program | |
ATE375671T1 (de) | Verfahren und vorrichtung zum authentisierten zugriff einer station auf lokale datennetze, insbesondere funk-datennetze | |
DE60310556D1 (de) | Vorrichtung und Verfahren zur Verteilung von Zugangsdaten für Inhalte | |
ATE171025T1 (de) | Verfahren zur verwaltung eines geheimübertragungsschlüssels | |
SG124292A1 (en) | Block cipher apparatus using auxiliary transformation | |
BR9910236A (pt) | Método de envio de informação por uma rede de comunicação | |
EP0828210A3 (de) | Verfahren und Vorrichtung zum kryptographischen Schutz von Daten | |
EP1150452A3 (de) | System, Verfahren und Vorrichtung zur Authentifizierung | |
EP0756397A3 (de) | System und Verfahren zur Schlüsselverteilung und zur Authentifizierung zwischen einem Host-Prozessor und einer tragbaren Vorrichtung | |
EP0856968A3 (de) | Vorrichtung zur Verarbeitung eines kryptographischen Schlüssels zur Aufnahme in einer Datenrückgewinnungseinrichtung oder einer Schlüsseleinstellungseinrichtung zur Erzeugung eines kryptographischen Schlüssels | |
ATE310344T1 (de) | Verfahren zur einbringung eines diensteschlüssels in ein endgerät und vorrichtungen zur durchführung des verfahrens |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
8364 | No opposition during term of opposition | ||
8327 | Change in the person/name/address of the patent owner |
Owner name: DURWARD D. DUPRE, PLANO, TEX., US |