FI20165911L - Method and system for the encryption of data - Google Patents
Method and system for the encryption of dataInfo
- Publication number
- FI20165911L FI20165911L FI20165911A FI20165911A FI20165911L FI 20165911 L FI20165911 L FI 20165911L FI 20165911 A FI20165911 A FI 20165911A FI 20165911 A FI20165911 A FI 20165911A FI 20165911 L FI20165911 L FI 20165911L
- Authority
- FI
- Finland
- Prior art keywords
- encryption
- data
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
- H04L9/0656—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FI20165911A FI20165911L (en) | 2016-11-30 | 2016-11-30 | Method and system for the encryption of data |
PCT/FI2017/050841 WO2018100246A1 (en) | 2016-11-30 | 2017-11-29 | Method and arrangement for encrypting data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FI20165911A FI20165911L (en) | 2016-11-30 | 2016-11-30 | Method and system for the encryption of data |
Publications (2)
Publication Number | Publication Date |
---|---|
FI20165911A FI20165911A (en) | 2018-05-31 |
FI20165911L true FI20165911L (en) | 2018-05-31 |
Family
ID=62241264
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
FI20165911A FI20165911L (en) | 2016-11-30 | 2016-11-30 | Method and system for the encryption of data |
Country Status (2)
Country | Link |
---|---|
FI (1) | FI20165911L (en) |
WO (1) | WO2018100246A1 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111131158A (en) * | 2019-11-21 | 2020-05-08 | 珠海剑心互动娱乐有限公司 | Single byte symmetric encryption and decryption method, device and readable medium |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4596686B2 (en) * | 2001-06-13 | 2010-12-08 | 富士通株式会社 | Secure encryption against DPA |
US7190791B2 (en) * | 2002-11-20 | 2007-03-13 | Stephen Laurence Boren | Method of encryption using multi-key process to create a variable-length key |
US8839000B2 (en) * | 2009-03-23 | 2014-09-16 | Hewlett-Packard Development Company, L.P. | System and method for securely storing data in an electronic device |
US9246681B2 (en) * | 2013-12-23 | 2016-01-26 | Tec Solutions, Inc. | Use of 32-bit random numbers to produce cipher key stream for 8-bit data stream |
US9483640B2 (en) * | 2014-04-01 | 2016-11-01 | Georgetown University | System and method for deterring malicious network attacks |
US10313128B2 (en) * | 2014-08-29 | 2019-06-04 | The Boeing Company | Address-dependent key generator by XOR tree |
-
2016
- 2016-11-30 FI FI20165911A patent/FI20165911L/en not_active IP Right Cessation
-
2017
- 2017-11-29 WO PCT/FI2017/050841 patent/WO2018100246A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
FI20165911A (en) | 2018-05-31 |
WO2018100246A1 (en) | 2018-06-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG11201912230SA (en) | Methods and Systems For Blockchain-Implemented Event-Lock Encryption | |
HK1244921A1 (en) | Encryption and decryption system and method | |
SG11201707149UA (en) | Method and system for encryption | |
GB201602969D0 (en) | Method and system for authentication | |
GB201613109D0 (en) | Computer implemented method and system | |
GB2567990B (en) | Data protection system and method | |
EP3120593A4 (en) | Systems and methods for creating fingerprints of encryption devices | |
SG11201608945WA (en) | Secure data interaction method and system | |
SG11201610289RA (en) | Method and system for information authentication | |
GB2549371B (en) | Access authentication method and system | |
EP3192207A4 (en) | Apparatus and method for data encryption | |
GB201414302D0 (en) | Data security system and method | |
SG10201508390PA (en) | Data security system and method for operation thereof | |
HK1248870A1 (en) | Data loss prevention system and data loss prevention method | |
HK1247341A1 (en) | Data transformation system and method | |
GB201404100D0 (en) | Method and system for creating reference data | |
GB201514674D0 (en) | Distributed encryption system and method | |
SG10201505580VA (en) | Method And System For Generating Map Data | |
IL258926B (en) | Interception-proof authentication and encryption system and method | |
IL265907A (en) | Method and system for the transmission of bioinformatics data | |
HUE056795T2 (en) | System and method for the protected transmission of data | |
GB2540834B (en) | Method and system for providing torque-assist | |
GB201518383D0 (en) | System and method for sharing of data | |
PT3404570T (en) | Method and system for behaviour-based authentication | |
FI20165911L (en) | Method and system for the encryption of data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MM | Patent lapsed |