DE60112130D1 - Vorrichtung zur datenverschlüsselung unter verwendung einer schlüsselmatrix - Google Patents

Vorrichtung zur datenverschlüsselung unter verwendung einer schlüsselmatrix

Info

Publication number
DE60112130D1
DE60112130D1 DE60112130T DE60112130T DE60112130D1 DE 60112130 D1 DE60112130 D1 DE 60112130D1 DE 60112130 T DE60112130 T DE 60112130T DE 60112130 T DE60112130 T DE 60112130T DE 60112130 D1 DE60112130 D1 DE 60112130D1
Authority
DE
Germany
Prior art keywords
encryption
plain
character
characters
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
DE60112130T
Other languages
English (en)
Other versions
DE60112130T2 (de
Inventor
M Henson
Myron Smith
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Durward D Dupre Plano Tex Us
Original Assignee
Asier Tech Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Asier Tech Corp filed Critical Asier Tech Corp
Application granted granted Critical
Publication of DE60112130D1 publication Critical patent/DE60112130D1/de
Publication of DE60112130T2 publication Critical patent/DE60112130T2/de
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C1/00Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
    • G09C1/02Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system by using a ciphering code in chart form
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/20Manipulating the length of blocks of bits, e.g. padding or block truncation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/24Key scheduling, i.e. generating round keys or sub-keys for block encryption
DE60112130T 2001-02-02 2001-05-15 Vorrichtung zur datenverschlüsselung unter verwendung einer schlüsselmatrix Expired - Lifetime DE60112130T2 (de)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US26640001P 2001-02-02 2001-02-02
US266400P 2001-02-02
PCT/US2001/040737 WO2002063592A2 (en) 2001-02-02 2001-05-15 Data encryption system using key matrix

Publications (2)

Publication Number Publication Date
DE60112130D1 true DE60112130D1 (de) 2005-08-25
DE60112130T2 DE60112130T2 (de) 2006-06-08

Family

ID=23014417

Family Applications (1)

Application Number Title Priority Date Filing Date
DE60112130T Expired - Lifetime DE60112130T2 (de) 2001-02-02 2001-05-15 Vorrichtung zur datenverschlüsselung unter verwendung einer schlüsselmatrix

Country Status (7)

Country Link
US (5) US6996234B2 (de)
EP (1) EP1410558B1 (de)
AT (1) ATE300134T1 (de)
AU (1) AU2001259860B2 (de)
CA (1) CA2437500C (de)
DE (1) DE60112130T2 (de)
WO (1) WO2002063592A2 (de)

Families Citing this family (60)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7418098B1 (en) * 2000-11-27 2008-08-26 Protegrity Corporation Data type preserving encryption
US6996234B2 (en) * 2001-02-02 2006-02-07 Asier Technology Corporation Data decryption methodology
US7016493B2 (en) * 2001-03-01 2006-03-21 Asier Technology Corporation Key matrix system
GB2373074B (en) * 2001-03-10 2004-10-13 Ibm A method and apparatus for storage of security keys and certificates
DE60130902T2 (de) * 2001-11-23 2008-07-17 Protegrity Research & Development Verfahren zum Erkennen des Eindringens in ein Datenbanksystem
US20030149876A1 (en) * 2002-02-01 2003-08-07 Secure Choice Llc Method and system for performing perfectly secure key exchange and authenticated messaging
US7826466B2 (en) 2002-06-26 2010-11-02 Atheros Communications, Inc. Communication buffer scheme optimized for VoIP, QoS and data networking over a power line
US8149703B2 (en) 2002-06-26 2012-04-03 Qualcomm Atheros, Inc. Powerline network bridging congestion control
WO2004034632A1 (en) * 2002-10-10 2004-04-22 Asier Technology Corporation Method and system for data encryption and decryption
US20040148356A1 (en) * 2002-11-04 2004-07-29 Bishop James William System and method for private messaging
US7383586B2 (en) 2003-01-17 2008-06-03 Microsoft Corporation File system operation and digital rights management (DRM)
US8213601B2 (en) * 2003-02-07 2012-07-03 Patrick Zuili Font level encryption method and apparatus
US8666065B2 (en) * 2003-02-07 2014-03-04 Britesmart Llc Real-time data encryption
US8064474B2 (en) * 2003-03-20 2011-11-22 Qualcomm Atheros, Inc. Method and apparatus for selecting a responder to enable reliable multicast
US7281187B2 (en) * 2003-11-20 2007-10-09 Intellon Corporation Using error checking bits to communicated an address or other bits
US7684568B2 (en) * 2003-11-24 2010-03-23 Intellon Corporation Encrypting data in a communication network
US8090857B2 (en) 2003-11-24 2012-01-03 Qualcomm Atheros, Inc. Medium access control layer that encapsulates data from a plurality of received data units into a plurality of independently transmittable blocks
US7660327B2 (en) 2004-02-03 2010-02-09 Atheros Communications, Inc. Temporary priority promotion for network communications in which access to a shared medium depends on a priority level
EP1577791B1 (de) * 2004-03-16 2011-11-02 Microdasys Inc. Inhaltsüberwachung für XML
US7422152B2 (en) 2004-05-13 2008-09-09 Cisco Technology, Inc. Methods and devices for providing scalable RFID networks
EP1790115A1 (de) * 2004-09-14 2007-05-30 P. Prahlad Singanamala Verfahren und system zur rechnerischen transformation
US7509431B2 (en) * 2004-11-17 2009-03-24 Cisco Technology, Inc. Performing message and transformation adapter functions in a network element on behalf of an application
US7664879B2 (en) 2004-11-23 2010-02-16 Cisco Technology, Inc. Caching content and state data at a network element
US7987272B2 (en) 2004-12-06 2011-07-26 Cisco Technology, Inc. Performing message payload processing functions in a network element on behalf of an application
US7496750B2 (en) 2004-12-07 2009-02-24 Cisco Technology, Inc. Performing security functions on a message payload in a network element
US7725934B2 (en) * 2004-12-07 2010-05-25 Cisco Technology, Inc. Network and application attack protection based on application layer message inspection
US7606267B2 (en) * 2004-12-10 2009-10-20 Cisco Technology, Inc. Reducing the sizes of application layer messages in a network element
US8082304B2 (en) 2004-12-10 2011-12-20 Cisco Technology, Inc. Guaranteed delivery of application layer messages by a network element
US7551567B2 (en) * 2005-01-05 2009-06-23 Cisco Technology, Inc. Interpreting an application message at a network element using sampling and heuristics
US20060155862A1 (en) * 2005-01-06 2006-07-13 Hari Kathi Data traffic load balancing based on application layer messages
US7698416B2 (en) * 2005-01-25 2010-04-13 Cisco Technology, Inc. Application layer message-based server failover management by a network element
US7725715B2 (en) * 2005-02-24 2010-05-25 Access Business Group International Llc System and method for three-phase data encryption
US7602911B2 (en) * 2005-03-14 2009-10-13 Microsoft Corporation Method and system for enhancing cryptography-based security
US9787471B1 (en) * 2005-06-02 2017-10-10 Robert T. Jenkins and Virginia T. Jenkins Data enciphering or deciphering using a hierarchical assignment system
US7953826B2 (en) 2005-07-14 2011-05-31 Cisco Technology, Inc. Provisioning and redundancy for RFID middleware servers
US8175190B2 (en) 2005-07-27 2012-05-08 Qualcomm Atheros, Inc. Managing spectra of modulated signals in a communication network
US7345585B2 (en) 2005-08-01 2008-03-18 Cisco Technology, Inc. Network based device for providing RFID middleware functionality
US7853018B2 (en) * 2005-11-10 2010-12-14 Atallah Mikhail J Method and apparatus for hiding a private key
US8698603B2 (en) 2005-11-15 2014-04-15 Cisco Technology, Inc. Methods and systems for automatic device provisioning in an RFID network using IP multicast
US8769311B2 (en) 2006-05-31 2014-07-01 International Business Machines Corporation Systems and methods for transformation of logical data objects for storage
US8626726B2 (en) 2006-05-31 2014-01-07 International Business Machines Corporation Method and system for transformation of logical data objects for storage
US7792301B2 (en) * 2006-06-29 2010-09-07 Microsoft Corporation Access control and encryption in multi-user systems
US8396221B2 (en) 2006-12-21 2013-03-12 Oracle International Corporation Secure broadcasting and multicasting
US9059838B2 (en) * 2007-03-30 2015-06-16 Verizon Patent And Licensing Inc. Encryption algorithm with randomized buffer
US20090103726A1 (en) * 2007-10-18 2009-04-23 Nabeel Ahmed Dual-mode variable key length cryptography system
US8225106B2 (en) 2008-04-02 2012-07-17 Protegrity Corporation Differential encryption utilizing trust modes
CN101661546B (zh) * 2008-08-28 2012-12-19 深圳富泰宏精密工业有限公司 在手持行动电子装置中进行文件加密的系统及方法
US8364984B2 (en) 2009-03-13 2013-01-29 Microsoft Corporation Portable secure data files
US9684710B2 (en) * 2009-05-28 2017-06-20 Microsoft Technology Licensing, Llc Extending random number summation as an order-preserving encryption scheme
US8958554B2 (en) * 2009-11-30 2015-02-17 Red Hat, Inc. Unicode-compatible stream cipher
US9058497B2 (en) 2010-12-23 2015-06-16 Microsoft Technology Licensing, Llc Cryptographic key management
US20130254553A1 (en) * 2012-03-24 2013-09-26 Paul L. Greene Digital data authentication and security system
US9673983B2 (en) 2012-09-14 2017-06-06 Qualcomm Incorporated Apparatus and method for protecting message data
WO2014135989A2 (en) 2013-03-06 2014-09-12 Assa Abloy Ab Localized pin management with reader verification and no disclosure
US10360821B2 (en) 2014-02-03 2019-07-23 AT Communications Co., Ltd. Sentence recognition device, sentence recognition method, and recording medium
RU2600100C2 (ru) * 2014-07-29 2016-10-20 Федеральное государственное бюджетное образовательное учреждение высшего профессионального образования "Амурский государственный университет" Способ шифрования информации
KR101689165B1 (ko) * 2015-03-12 2016-12-23 권오헌 이미지를 이용한 암호화 장치 및 방법
US9692598B2 (en) * 2015-08-07 2017-06-27 Terry L. Davis Multi-use long string authentication keys
US10277561B2 (en) 2016-07-22 2019-04-30 International Business Machines Corporation Database management system shared ledger support
CN111241606B (zh) * 2020-01-21 2021-03-23 北京连山科技股份有限公司 一种一拖三的移动存储设备

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4809327A (en) * 1986-09-02 1989-02-28 Unisys Corporation Encrtption of messages employing unique control words and randomly chosen encryption keys
GB9015799D0 (en) * 1990-07-18 1991-06-12 Plessey Telecomm A data communication system
US5245658A (en) * 1992-01-06 1993-09-14 George Bush Domain-based encryption
US5438622A (en) * 1994-01-21 1995-08-01 Apple Computer, Inc. Method and apparatus for improving the security of an electronic codebook encryption scheme utilizing an offset in the pseudorandom sequence
DE69532434T2 (de) * 1994-10-27 2004-11-11 Mitsubishi Corp. Gerät für Dateiurheberrechte-Verwaltungssystem
US5799090A (en) * 1995-09-25 1998-08-25 Angert; Joseph C. pad encryption method and software
US5991403A (en) * 1996-12-23 1999-11-23 Intel Corporation Recoverable cryptographic transformation on YUV data suitable for compressions
US6885747B1 (en) * 1997-02-13 2005-04-26 Tec.Sec, Inc. Cryptographic key split combiner
US6373948B1 (en) * 1997-08-15 2002-04-16 Lucent Technologies Inc. Cryptographic method and apparatus for restricting access to transmitted programming content using program identifiers
US7095852B2 (en) * 1998-02-13 2006-08-22 Tecsec, Inc. Cryptographic key split binder for use with tagged data elements
US6118873A (en) * 1998-04-24 2000-09-12 International Business Machines Corporation System for encrypting broadcast programs in the presence of compromised receiver devices
US6363480B1 (en) * 1999-09-14 2002-03-26 Sun Microsystems, Inc. Ephemeral decryptability
US6891951B2 (en) * 2000-01-21 2005-05-10 Victor Company Of Japan, Ltd. Cryptosystem-related method and apparatus
JP2001211153A (ja) * 2000-01-25 2001-08-03 Murata Mach Ltd 秘密鍵生成方法
US6922472B2 (en) * 2000-05-05 2005-07-26 Teleputers, Llc Method and system for performing permutations using permutation instructions based on butterfly networks
FR2814009B1 (fr) 2000-09-14 2003-01-31 Jean Roland Riviere Procede et dispositif de transformation de donnees a caractere convolutif et decalages variables, et systemes les mettant en oeuvre
US6996234B2 (en) * 2001-02-02 2006-02-07 Asier Technology Corporation Data decryption methodology
US7016493B2 (en) 2001-03-01 2006-03-21 Asier Technology Corporation Key matrix system

Also Published As

Publication number Publication date
CA2437500C (en) 2006-02-21
EP1410558B1 (de) 2005-07-20
US6950518B2 (en) 2005-09-27
US7016497B2 (en) 2006-03-21
DE60112130T2 (de) 2006-06-08
ATE300134T1 (de) 2005-08-15
US20020131591A1 (en) 2002-09-19
US6996234B2 (en) 2006-02-07
US20020136403A1 (en) 2002-09-26
US20020141573A1 (en) 2002-10-03
US20020141574A1 (en) 2002-10-03
EP1410558A2 (de) 2004-04-21
AU2001259860B2 (en) 2007-02-15
US7003108B2 (en) 2006-02-21
WO2002063592A2 (en) 2002-08-15
US20020131590A1 (en) 2002-09-19
CA2437500A1 (en) 2002-08-15
WO2002063592A3 (en) 2003-09-18

Similar Documents

Publication Publication Date Title
DE60112130D1 (de) Vorrichtung zur datenverschlüsselung unter verwendung einer schlüsselmatrix
GB2397735A (en) An encryption system
WO2001097480A3 (en) System and method for controlling the access to digital works through a network
EP0998080A3 (de) Verfahren zur Sicherung einer Funkverbindung in einem drahtlosen System
EP0802654A3 (de) Verschlüsselungsverfahren, Entschlüsselungsverfahren und Beglaubigungsverfahren
ATE355671T1 (de) Vorrichtung und verfahren zur informationsverarbeitung
DE60043053D1 (de) Selbstgenerierung von zertifikaten unter verwendung eines sicheren mikroprozessors in einer vorrichtung zur digitalen datenübertragung
WO2002043309A3 (en) Cryptographic data security system and method
EP1843343A3 (de) Verfahren und Gerät zum Kontrollieren des Verteilens und der Benutzung von Digitalwerken
EP1249964A3 (de) Empfangsendgerät, Vorrichtung zum Schlüsselverwaltung und Verfahren zum Anpassen eines Schlüssels für ein Public-key Verschlüsselungssystem
DE69935030D1 (de) System und Verfahren zur Web-Server Benutzerauthentifizierung
WO2002035314A3 (en) Method and system for sharing anonymous user information
ATE293323T1 (de) Verfahren und vorrichtung für ein robustes und schnelles kryptosystem
EP1035684A3 (de) Vorrichtung zur kryptographischen Kommunikation
CA2253102A1 (en) Method of and system for processing electronic document and recording medium for recording processing program
ATE375671T1 (de) Verfahren und vorrichtung zum authentisierten zugriff einer station auf lokale datennetze, insbesondere funk-datennetze
DE60310556D1 (de) Vorrichtung und Verfahren zur Verteilung von Zugangsdaten für Inhalte
ATE171025T1 (de) Verfahren zur verwaltung eines geheimübertragungsschlüssels
SG124292A1 (en) Block cipher apparatus using auxiliary transformation
BR9910236A (pt) Método de envio de informação por uma rede de comunicação
EP0828210A3 (de) Verfahren und Vorrichtung zum kryptographischen Schutz von Daten
EP1150452A3 (de) System, Verfahren und Vorrichtung zur Authentifizierung
EP0756397A3 (de) System und Verfahren zur Schlüsselverteilung und zur Authentifizierung zwischen einem Host-Prozessor und einer tragbaren Vorrichtung
EP0856968A3 (de) Vorrichtung zur Verarbeitung eines kryptographischen Schlüssels zur Aufnahme in einer Datenrückgewinnungseinrichtung oder einer Schlüsseleinstellungseinrichtung zur Erzeugung eines kryptographischen Schlüssels
ATE310344T1 (de) Verfahren zur einbringung eines diensteschlüssels in ein endgerät und vorrichtungen zur durchführung des verfahrens

Legal Events

Date Code Title Description
8364 No opposition during term of opposition
8327 Change in the person/name/address of the patent owner

Owner name: DURWARD D. DUPRE, PLANO, TEX., US