WO2010004335A3 - Data security devices and methods - Google Patents

Data security devices and methods Download PDF

Info

Publication number
WO2010004335A3
WO2010004335A3 PCT/GB2009/050814 GB2009050814W WO2010004335A3 WO 2010004335 A3 WO2010004335 A3 WO 2010004335A3 GB 2009050814 W GB2009050814 W GB 2009050814W WO 2010004335 A3 WO2010004335 A3 WO 2010004335A3
Authority
WO
WIPO (PCT)
Prior art keywords
bit
message
segments
hash value
module
Prior art date
Application number
PCT/GB2009/050814
Other languages
French (fr)
Other versions
WO2010004335A2 (en
Inventor
Maire Patricia O'neill
Original Assignee
The Queen's University Of Belfast
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by The Queen's University Of Belfast filed Critical The Queen's University Of Belfast
Publication of WO2010004335A2 publication Critical patent/WO2010004335A2/en
Publication of WO2010004335A3 publication Critical patent/WO2010004335A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor

Abstract

A hash value computation device for computing a hash value for a message using a hash algorithm that defines a key is provided, the device comprising a message schedule element having an input module which receives the message in 8-bit segments, a plurality of 8-bit memory modules which store the 8-bit segments of the message, an 8-bit message schedule value module which uses the 8-bit message segments and the hash algorithm to provide an 8-bit message schedule value for each 8-bit message segment, and an output module which outputs the 8-bit message schedule values, and a hash value computation element comprising a first input module which receives the 8-bit message schedule values, a second input module which receives 8-bit segments of the key defined by the hash algorithm, a plurality of 8-bit memory modules which store the 8-bit segments of the key, a hash value computation module which uses the 8- bit message schedule values and the 8-bit key segments to compute a hash value for the message, and an output module which outputs the hash value.
PCT/GB2009/050814 2008-07-09 2009-07-09 Data security devices and methods WO2010004335A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB0812593.2 2008-07-09
GB0812593A GB0812593D0 (en) 2008-07-09 2008-07-09 Data security devices and methods

Publications (2)

Publication Number Publication Date
WO2010004335A2 WO2010004335A2 (en) 2010-01-14
WO2010004335A3 true WO2010004335A3 (en) 2010-03-04

Family

ID=39722025

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB2009/050814 WO2010004335A2 (en) 2008-07-09 2009-07-09 Data security devices and methods

Country Status (2)

Country Link
GB (1) GB0812593D0 (en)
WO (1) WO2010004335A2 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101872338B (en) * 2010-06-04 2012-08-29 杭州电子科技大学 Method for obtaining safe information abstract in authentication header
GB2507988A (en) 2012-11-15 2014-05-21 Univ Belfast Authentication method using physical unclonable functions

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070110230A1 (en) * 2000-04-13 2007-05-17 Broadcom Corporation Authentication engine architecture and method

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070110230A1 (en) * 2000-04-13 2007-05-17 Broadcom Corporation Authentication engine architecture and method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
MARTIN FELDHOFER ET AL: "A Case Against Currently Used Hash Functions in RFID Protocols", 1 January 2006, ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2006: OTM 2006 WORKSHOPS LECTURE NOTES IN COMPUTER SCIENCE;;LNCS, SPRINGER, BERLIN, DE, PAGE(S) 372 - 381, ISBN: 9783540482697, XP019050445 *
MOOSEOP KIM ET AL: "Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing", 12 December 2007, INFORMATION AND COMMUNICATIONS SECURITY; [LECTURE NOTES IN COMPUTER SCIENCE], SPRINGER BERLIN HEIDELBERG, BERLIN, HEIDELBERG, PAGE(S) 375 - 385, ISBN: 9783540770473, XP019084536 *
YONGJE CHOI ET AL: "Low power implementation of SHA-1 algorithm for RFID system", CONSUMER ELECTRONICS, 2006. ISCE '06. 2006 IEEE TENTH INTERNATIONAL SY MPOSIUM ON ST. PETERSBURG, RUSSIA 28-01 JUNE 2006, PISCATAWAY, NJ, USA,IEEE, 28 June 2006 (2006-06-28), pages 1 - 5, XP010936862, ISBN: 978-1-4244-0216-8 *

Also Published As

Publication number Publication date
GB0812593D0 (en) 2008-08-20
WO2010004335A2 (en) 2010-01-14

Similar Documents

Publication Publication Date Title
WO2014179145A3 (en) Drive level encryption key management in a distributed storage system
AU2012225621A8 (en) Secure file sharing method and system
WO2009091577A3 (en) Data bus inversion apparatus, systems, and methods
WO2012129638A3 (en) Method and system for protecting execution of cryptographic hash functions
WO2011112350A3 (en) Photovoltaic system with managed output an method of managing variability of output from a photovoltaic system
WO2011019550A3 (en) System and method for associating a load demand with a variable power generation
GB2442249B (en) Authentication device and method
WO2011073691A3 (en) Utility data processing system
EP2713548A4 (en) Key generation, backup and migration method and system based on trusted computing
WO2009062176A3 (en) Activating applications based on accelerometer data
WO2010042533A3 (en) Photovoltaic module performance monitoring system and devices
GB2428358B (en) Crytographic system and method for encrypting input data
EP2315929A4 (en) Fuel conservation systems and methods
EP2398208A3 (en) Method for securing transmission data and security system for implementing the same
WO2011058011A3 (en) Variable substitution data processing method
WO2008112153A3 (en) Variable instruction width software programmable data pattern generator
EP2854330A3 (en) System and method for multivariate public key encryption/decryption
WO2008018925A3 (en) Control word key store for multiple data streams
WO2009025165A1 (en) Steam utilizing facility simulation system and method for seeking scheme for improving steam utilizing facility
WO2010083108A3 (en) Power and area efficient serdes transmitter
NZ702250A (en) Network based management of protected data sets
IN2013MU02122A (en)
WO2009109715A3 (en) Countermeasure method and devices for asymmetrical cryptography with signature diagram
RU2013142986A (en) ENCRYPTION PROCESSING DEVICE AND METHOD FOR ENCRYPTION PROCESSING AND PROGRAM
WO2014014401A3 (en) Authentication of a product using two labels

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09785293

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09785293

Country of ref document: EP

Kind code of ref document: A2