FI20165911A - Menetelmä ja järjestelmä tiedon salaukseen - Google Patents

Menetelmä ja järjestelmä tiedon salaukseen

Info

Publication number
FI20165911A
FI20165911A FI20165911A FI20165911A FI20165911A FI 20165911 A FI20165911 A FI 20165911A FI 20165911 A FI20165911 A FI 20165911A FI 20165911 A FI20165911 A FI 20165911A FI 20165911 A FI20165911 A FI 20165911A
Authority
FI
Finland
Prior art keywords
data encryption
encryption
data
Prior art date
Application number
FI20165911A
Other languages
English (en)
Swedish (sv)
Other versions
FI20165911L (fi
Inventor
Sam Widlund
Original Assignee
Sam Widlund
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sam Widlund filed Critical Sam Widlund
Priority to FI20165911A priority Critical patent/FI20165911L/fi
Priority to PCT/FI2017/050841 priority patent/WO2018100246A1/en
Publication of FI20165911A publication Critical patent/FI20165911A/fi
Publication of FI20165911L publication Critical patent/FI20165911L/fi

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)
FI20165911A 2016-11-30 2016-11-30 Menetelmä ja järjestelmä tiedon salaukseen FI20165911L (fi)

Priority Applications (2)

Application Number Priority Date Filing Date Title
FI20165911A FI20165911L (fi) 2016-11-30 2016-11-30 Menetelmä ja järjestelmä tiedon salaukseen
PCT/FI2017/050841 WO2018100246A1 (en) 2016-11-30 2017-11-29 Method and arrangement for encrypting data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
FI20165911A FI20165911L (fi) 2016-11-30 2016-11-30 Menetelmä ja järjestelmä tiedon salaukseen

Publications (2)

Publication Number Publication Date
FI20165911A true FI20165911A (fi) 2018-05-31
FI20165911L FI20165911L (fi) 2018-05-31

Family

ID=62241264

Family Applications (1)

Application Number Title Priority Date Filing Date
FI20165911A FI20165911L (fi) 2016-11-30 2016-11-30 Menetelmä ja järjestelmä tiedon salaukseen

Country Status (2)

Country Link
FI (1) FI20165911L (fi)
WO (1) WO2018100246A1 (fi)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111131158A (zh) * 2019-11-21 2020-05-08 珠海剑心互动娱乐有限公司 单字节对称加密解密方法、装置及可读介质

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4596686B2 (ja) * 2001-06-13 2010-12-08 富士通株式会社 Dpaに対して安全な暗号化
US7190791B2 (en) * 2002-11-20 2007-03-13 Stephen Laurence Boren Method of encryption using multi-key process to create a variable-length key
DE112009004491T5 (de) * 2009-03-23 2012-09-06 Hewlett-Packard Development Co., L.P. System und Verfahren zum sicheren Speichern von Daten in einem elektronischen Gerät
US9246681B2 (en) * 2013-12-23 2016-01-26 Tec Solutions, Inc. Use of 32-bit random numbers to produce cipher key stream for 8-bit data stream
US9483640B2 (en) * 2014-04-01 2016-11-01 Georgetown University System and method for deterring malicious network attacks
US10313128B2 (en) * 2014-08-29 2019-06-04 The Boeing Company Address-dependent key generator by XOR tree

Also Published As

Publication number Publication date
WO2018100246A1 (en) 2018-06-07
FI20165911L (fi) 2018-05-31

Similar Documents

Publication Publication Date Title
HK1244921A1 (zh) 加密和解密系統和方法
SG11201707149UA (en) Method and system for encryption
EP3320440A4 (en) Secure data management system and method
EP3175410A4 (en) System and method for performing authentication using data analytics
DK3129912T3 (da) Fremgangsmåde og system til sikring af data
SG11201608945WA (en) Secure data interaction method and system
DK3138081T3 (da) System og fremgangsmåde til opnåelse af køretøjs-telematikdata
SG11201610289RA (en) Method and system for information authentication
DK3547772T3 (da) Datatransmissionsfremgangsmåde og - apparat
DK3091888T3 (da) Datastyringssystem og -fremgangsmåde til rengøringsindretning
DK3231131T3 (da) System og fremgangsmåde til at erstatte fælles identificerende data
HK1211122A1 (en) Method and system for processing periodic order information
SG10201508390PA (en) Data security system and method for operation thereof
HK1224095A1 (zh) 種用於信息交互的數據處理方法、裝置及系統
IL255223A0 (en) System and method for cryptographically oriented database management
BR112017021861A2 (pt) método e aparelho de envio de dados, método e aparelho de programação de recurso, mídia legível por computador.
KR20180084931A (ko) 컨텐츠 공유를 위한 시스템 및 방법
HK1215903A1 (zh) 基於職位的數據管理方法及裝置
GB201404100D0 (en) Method and system for creating reference data
GB201514674D0 (en) Distributed encryption system and method
DK3369208T3 (da) System og fremgangsmåde til aflytningssikret godkendelse og kryptering
FI20165381A (fi) Menetelmä ja järjestelmä
KR20180084786A (ko) 데이터 처리 장치 및 데이터 처리 방법
GB201518383D0 (en) System and method for sharing of data
FI20165911A (fi) Menetelmä ja järjestelmä tiedon salaukseen

Legal Events

Date Code Title Description
MM Patent lapsed