AU2001290544A1 - Parallel bock encryption method and modes for data confidentiality and integrity protection - Google Patents
Parallel bock encryption method and modes for data confidentiality and integrity protectionInfo
- Publication number
- AU2001290544A1 AU2001290544A1 AU2001290544A AU9054401A AU2001290544A1 AU 2001290544 A1 AU2001290544 A1 AU 2001290544A1 AU 2001290544 A AU2001290544 A AU 2001290544A AU 9054401 A AU9054401 A AU 9054401A AU 2001290544 A1 AU2001290544 A1 AU 2001290544A1
- Authority
- AU
- Australia
- Prior art keywords
- bock
- modes
- parallel
- encryption method
- integrity protection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0637—Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
- H04L2209/125—Parallelization or pipelining, e.g. for accelerating processing of cryptographic operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/20—Manipulating the length of blocks of bits, e.g. padding or block truncation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/34—Encoding or coding, e.g. Huffman coding or error correction
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US22751900P | 2000-08-24 | 2000-08-24 | |
US60/227,519 | 2000-08-24 | ||
US09/931,151 | 2001-08-17 | ||
US09/931,151 US20020048364A1 (en) | 2000-08-24 | 2001-08-17 | Parallel block encryption method and modes for data confidentiality and integrity protection |
PCT/US2001/025949 WO2002017554A2 (en) | 2000-08-24 | 2001-08-20 | Parallel bock encryption method and modes for data confidentiality and integrity protection |
Publications (1)
Publication Number | Publication Date |
---|---|
AU2001290544A1 true AU2001290544A1 (en) | 2002-03-04 |
Family
ID=26921507
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2001290544A Abandoned AU2001290544A1 (en) | 2000-08-24 | 2001-08-20 | Parallel bock encryption method and modes for data confidentiality and integrity protection |
Country Status (4)
Country | Link |
---|---|
US (1) | US20020048364A1 (en) |
EP (1) | EP1319280A2 (en) |
AU (1) | AU2001290544A1 (en) |
WO (1) | WO2002017554A2 (en) |
Families Citing this family (72)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7046802B2 (en) * | 2000-10-12 | 2006-05-16 | Rogaway Phillip W | Method and apparatus for facilitating efficient authenticated encryption |
KR100593491B1 (en) * | 2001-07-17 | 2006-06-30 | 샤프 가부시키가이샤 | Apparatus and method for generating data for detecting false alteration of encrypted data during processing |
US7200227B2 (en) * | 2001-07-30 | 2007-04-03 | Phillip Rogaway | Method and apparatus for facilitating efficient authenticated encryption |
WO2003021849A2 (en) * | 2001-08-31 | 2003-03-13 | Hamilton John W | A non-algebraic cryptographic architecture |
US7512780B1 (en) * | 2001-08-31 | 2009-03-31 | Verizon Corporate Services Group, Inc. | Packet-parallel high performance cryptography systems and methods |
ITMI20011938A1 (en) * | 2001-09-17 | 2003-03-17 | Cit Alcatel | METHOD TO ENCRYPT A FLOW OF DATA |
KR100411586B1 (en) * | 2001-12-28 | 2003-12-18 | 한국전자통신연구원 | Method and apparatus for descrambling of transport stream data |
US7769169B2 (en) * | 2002-01-23 | 2010-08-03 | Certicom Corp. | Method and apparatus for generating a key stream |
US7221763B2 (en) * | 2002-04-24 | 2007-05-22 | Silicon Storage Technology, Inc. | High throughput AES architecture |
JP2004088505A (en) * | 2002-08-27 | 2004-03-18 | Matsushita Electric Ind Co Ltd | Parallel stream encrypting/decrypting device, its method and parallel stream encrypting/decrypting program |
KR100456599B1 (en) * | 2002-11-12 | 2004-11-09 | 삼성전자주식회사 | Cryptographic apparatus with parallel des structure |
JP4891521B2 (en) * | 2003-03-28 | 2012-03-07 | 三洋電機株式会社 | Data input / output method, and storage device and host device capable of using the method |
US7529367B2 (en) * | 2003-04-18 | 2009-05-05 | Via Technologies, Inc. | Apparatus and method for performing transparent cipher feedback mode cryptographic functions |
US7529368B2 (en) * | 2003-04-18 | 2009-05-05 | Via Technologies, Inc. | Apparatus and method for performing transparent output feedback mode cryptographic functions |
US7900055B2 (en) * | 2003-04-18 | 2011-03-01 | Via Technologies, Inc. | Microprocessor apparatus and method for employing configurable block cipher cryptographic algorithms |
US7542566B2 (en) * | 2003-04-18 | 2009-06-02 | Ip-First, Llc | Apparatus and method for performing transparent cipher block chaining mode cryptographic functions |
US7536560B2 (en) * | 2003-04-18 | 2009-05-19 | Via Technologies, Inc. | Microprocessor apparatus and method for providing configurable cryptographic key size |
US8060755B2 (en) * | 2003-04-18 | 2011-11-15 | Via Technologies, Inc | Apparatus and method for providing user-generated key schedule in a microprocessor cryptographic engine |
US7925891B2 (en) * | 2003-04-18 | 2011-04-12 | Via Technologies, Inc. | Apparatus and method for employing cryptographic functions to generate a message digest |
US7844053B2 (en) * | 2003-04-18 | 2010-11-30 | Ip-First, Llc | Microprocessor apparatus and method for performing block cipher cryptographic functions |
US7539876B2 (en) * | 2003-04-18 | 2009-05-26 | Via Technologies, Inc. | Apparatus and method for generating a cryptographic key schedule in a microprocessor |
US7502943B2 (en) * | 2003-04-18 | 2009-03-10 | Via Technologies, Inc. | Microprocessor apparatus and method for providing configurable cryptographic block cipher round results |
US7532722B2 (en) * | 2003-04-18 | 2009-05-12 | Ip-First, Llc | Apparatus and method for performing transparent block cipher cryptographic functions |
US7519833B2 (en) * | 2003-04-18 | 2009-04-14 | Via Technologies, Inc. | Microprocessor apparatus and method for enabling configurable data block size in a cryptographic engine |
US7152693B2 (en) | 2003-05-30 | 2006-12-26 | International Business Machines Corporation | Password security utility |
JP2004363739A (en) * | 2003-06-03 | 2004-12-24 | Hitachi Ltd | Enciphering device or deciphering device for common key cipher that can detect alteration |
CN100559425C (en) * | 2003-07-14 | 2009-11-11 | 索尼株式会社 | encryption device, encryption method, decryption device and decryption method |
US7792300B1 (en) * | 2003-09-30 | 2010-09-07 | Oracle America, Inc. | Method and apparatus for re-encrypting data in a transaction-based secure storage system |
US7697681B2 (en) * | 2004-02-06 | 2010-04-13 | Nortel Networks Limited | Parallelizable integrity-aware encryption technique |
US7885405B1 (en) * | 2004-06-04 | 2011-02-08 | GlobalFoundries, Inc. | Multi-gigabit per second concurrent encryption in block cipher modes |
US7409558B2 (en) * | 2004-09-02 | 2008-08-05 | International Business Machines Corporation | Low-latency data decryption interface |
US7496753B2 (en) * | 2004-09-02 | 2009-02-24 | International Business Machines Corporation | Data encryption interface for reducing encrypt latency impact on standard traffic |
US8744862B2 (en) * | 2006-08-18 | 2014-06-03 | Digital Rise Technology Co., Ltd. | Window selection based on transient detection and location to provide variable time resolution in processing frame-based data |
US7783037B1 (en) * | 2004-09-20 | 2010-08-24 | Globalfoundries Inc. | Multi-gigabit per second computing of the rijndael inverse cipher |
DE112005003281B4 (en) * | 2004-12-30 | 2012-02-16 | Topaz Systems Inc. | Electronic signature security system |
MX2007012024A (en) * | 2005-03-28 | 2007-11-23 | Datallegro Inc | Non-invasive encryption for relational database management systems. |
DE102005031611B4 (en) * | 2005-07-06 | 2007-11-22 | Infineon Technologies Ag | Proof of a change in the data of a data record |
US20070110225A1 (en) * | 2005-11-16 | 2007-05-17 | Sub-Crypto Systems, Llc | Method and apparatus for efficient encryption |
KR101369748B1 (en) * | 2006-12-04 | 2014-03-06 | 삼성전자주식회사 | Method for encrypting datas and appatus therefor |
JP4466641B2 (en) * | 2006-12-15 | 2010-05-26 | コニカミノルタビジネステクノロジーズ株式会社 | Cryptographic processing device |
KR20080072345A (en) * | 2007-02-02 | 2008-08-06 | 삼성전자주식회사 | Apparatus for encryption and method using the same |
US8107620B2 (en) * | 2007-03-21 | 2012-01-31 | International Business Machines Corporation | Simple and efficient one-pass authenticated encryption scheme |
US8898536B2 (en) * | 2007-04-27 | 2014-11-25 | Netapp, Inc. | Multi-core engine for detecting bit errors |
GB0711711D0 (en) * | 2007-06-15 | 2007-07-25 | Ibm | Method and system for encryption of blocks of data |
WO2010087865A1 (en) * | 2008-02-28 | 2010-08-05 | Qualcomm Incorporated | Efficient data processing for protocols in multiple layers of a protocol stack |
WO2009145587A2 (en) * | 2008-05-29 | 2009-12-03 | Lg Electronics Inc. | Method of encrypting control signaling |
US9158579B1 (en) | 2008-11-10 | 2015-10-13 | Netapp, Inc. | System having operation queues corresponding to operation execution time |
US8355499B2 (en) * | 2008-12-12 | 2013-01-15 | Micron Technology, Inc. | Parallel encryption/decryption |
CN101919203A (en) * | 2009-02-26 | 2010-12-15 | Lsi公司 | Cipher independent interface for cryptographic hardware service |
US8416948B2 (en) * | 2010-06-04 | 2013-04-09 | Leanics Corporation | System for secure variable data rate transmission |
KR101445339B1 (en) | 2010-12-23 | 2014-10-01 | 한국전자통신연구원 | Integrated cryptographic apparatus for providing confidentiality and integrity |
TWI442110B (en) | 2011-01-26 | 2014-06-21 | Coretronic Corp | Light guide plate and light source module |
WO2012131856A1 (en) * | 2011-03-25 | 2012-10-04 | 富士通株式会社 | Information processing device, tampering detection device, information processing method, tampering detection method, information processing program, and tampering detection program |
US9917695B2 (en) * | 2012-11-29 | 2018-03-13 | Blackberry Limited | Authenticated encryption method using working blocks |
US9154471B2 (en) | 2013-11-26 | 2015-10-06 | At&T Intellectual Property I, L.P. | Method and apparatus for unified encrypted messaging |
US10157282B2 (en) * | 2013-12-16 | 2018-12-18 | International Business Machines Corporation | Multiband encryption engine and a self testing method thereof |
US10015152B2 (en) * | 2014-04-02 | 2018-07-03 | International Business Machines Corporation | Securing data in a dispersed storage network |
WO2015166701A1 (en) * | 2014-04-28 | 2015-11-05 | 一郎 加沢 | Encryption method, program, and system |
US9594928B1 (en) * | 2014-10-14 | 2017-03-14 | Altera Corporation | Multi-channel, multi-lane encryption circuitry and methods |
US11418321B2 (en) * | 2014-12-03 | 2022-08-16 | Nagravision Sari | Block cryptographic method for encrypting/decrypting messages and cryptographic devices for implementing this method |
US9904807B2 (en) * | 2015-01-09 | 2018-02-27 | Toshiba Memory Corporation | Memory system and information processing system |
US10148423B2 (en) * | 2015-07-20 | 2018-12-04 | International Business Machines Corporation | Data security system with identifiable format-preserving encryption |
US10863138B2 (en) * | 2016-05-31 | 2020-12-08 | Intel Corporation | Single pass parallel encryption method and apparatus |
CN106130830B (en) * | 2016-08-31 | 2019-06-04 | 北京奇虎科技有限公司 | The test method and test device of safety equipment stability |
US10887090B2 (en) | 2017-09-22 | 2021-01-05 | Nec Corporation | Scalable byzantine fault-tolerant protocol with partial tee support |
CN109698704B (en) * | 2017-10-20 | 2022-12-02 | 人和未来生物科技(长沙)有限公司 | Comparative gene sequencing data decompression method, system and computer readable medium |
US10409783B1 (en) * | 2018-06-06 | 2019-09-10 | Capital One Services, Llc | Distributed work data management |
CN111310211A (en) * | 2020-02-19 | 2020-06-19 | 成都三零凯天通信实业有限公司 | Method for encrypting database by using SM4 algorithm |
US11502818B2 (en) * | 2020-05-06 | 2022-11-15 | King Saud University | System to secure encoding and mapping on elliptic curve cryptography (ECC) |
US11569987B2 (en) * | 2021-02-12 | 2023-01-31 | Blackberry Limited | Method and system for key agreement utilizing plactic monoids |
US11956370B2 (en) | 2021-06-23 | 2024-04-09 | Blackberry Limited | Method and system for digital signatures utilizing multiplicative semigroups |
CN113779614B (en) * | 2021-11-09 | 2022-03-15 | 深圳市永达电子信息股份有限公司 | Encryption method based on improved AES algorithm and computer-readable storage medium |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5757913A (en) * | 1993-04-23 | 1998-05-26 | International Business Machines Corporation | Method and apparatus for data authentication in a data communication environment |
-
2001
- 2001-08-17 US US09/931,151 patent/US20020048364A1/en not_active Abandoned
- 2001-08-20 EP EP01970551A patent/EP1319280A2/en not_active Withdrawn
- 2001-08-20 AU AU2001290544A patent/AU2001290544A1/en not_active Abandoned
- 2001-08-20 WO PCT/US2001/025949 patent/WO2002017554A2/en not_active Application Discontinuation
Also Published As
Publication number | Publication date |
---|---|
WO2002017554A2 (en) | 2002-02-28 |
US20020048364A1 (en) | 2002-04-25 |
WO2002017554A3 (en) | 2003-03-20 |
EP1319280A2 (en) | 2003-06-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2001290544A1 (en) | Parallel bock encryption method and modes for data confidentiality and integrity protection | |
AU2001260970A1 (en) | Block encryption method and schemes for data confidentiality and integrity protection | |
AU2001249511A1 (en) | Authentication method and schemes for data integrity protection | |
AU2002239500A1 (en) | Cryptographic data security system and method | |
AU3199399A (en) | Encryption key management system and method | |
AU5776700A (en) | Method for generating secure symmetric encryption and decryption | |
AU6919500A (en) | System and method for encrypting and decrypting files | |
AU2001255366A1 (en) | Systems and methods for encrypting/decrypting data | |
AU2001253824A1 (en) | Method and apparatus for using non-secure file servers for secure information storage | |
AU5245201A (en) | System and method for highly secure data communications | |
AU2002228676A1 (en) | Method and system for object encryption using transparent key management | |
AU2001294084A1 (en) | A method and an apparatus for a security policy | |
AU2002234117A1 (en) | System and method for project management and assessment | |
AU2998100A (en) | Data authentication system employing encrypted integrity blocks | |
HK1053556A1 (en) | System and method for processing information using encryption key block | |
AU2001275025A1 (en) | Methods and systems for supplying encryption keys | |
SG85691A1 (en) | Data encryption apparatus and method | |
AU2001273437A1 (en) | Method for protecting the privacy, security, and integrity of sensitive data | |
AU3203597A (en) | Decryption of retransmitted data in an encrypted communication system | |
AU2001257296A1 (en) | System and method for encryption using transparent keys | |
GB9709311D0 (en) | Data encryption/decryption method and apparatus | |
AU4298201A (en) | Method and system for encryption and authentication | |
WO2002056232A8 (en) | System and method for project management and assessment | |
AU2001269870A1 (en) | System and method for security policy | |
AU2924997A (en) | Decryption of retransmitted data in an encrypted communication system |