AU2003222888A1 - Method for generating secure keys for a cryptographic algorithm - Google Patents
Method for generating secure keys for a cryptographic algorithmInfo
- Publication number
- AU2003222888A1 AU2003222888A1 AU2003222888A AU2003222888A AU2003222888A1 AU 2003222888 A1 AU2003222888 A1 AU 2003222888A1 AU 2003222888 A AU2003222888 A AU 2003222888A AU 2003222888 A AU2003222888 A AU 2003222888A AU 2003222888 A1 AU2003222888 A1 AU 2003222888A1
- Authority
- AU
- Australia
- Prior art keywords
- cryptographic algorithm
- secure keys
- generating secure
- generating
- keys
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
- H04L9/003—Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0201883A FR2836312B1 (en) | 2002-02-15 | 2002-02-15 | SECURE KEY GENERATION METHOD FOR CRYPTOGRAPHIC ALGORITHM |
FR02/01883 | 2002-02-15 | ||
PCT/FR2003/000369 WO2003071733A1 (en) | 2002-02-15 | 2003-02-06 | Method for generating secure keys for a cryptographic algorithm |
Publications (1)
Publication Number | Publication Date |
---|---|
AU2003222888A1 true AU2003222888A1 (en) | 2003-09-09 |
Family
ID=27636184
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2003222888A Abandoned AU2003222888A1 (en) | 2002-02-15 | 2003-02-06 | Method for generating secure keys for a cryptographic algorithm |
Country Status (4)
Country | Link |
---|---|
CN (1) | CN1438784A (en) |
AU (1) | AU2003222888A1 (en) |
FR (1) | FR2836312B1 (en) |
WO (1) | WO2003071733A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8009017B2 (en) | 2003-04-01 | 2011-08-30 | Mi Kyoung Park | Contactless type communication tag, portable tag reader for verifying a genuine article, and method for providing information of whether an article is genuine or not |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8839460B2 (en) * | 2008-03-07 | 2014-09-16 | Qualcomm Incorporated | Method for securely communicating information about the location of a compromised computing device |
US8850568B2 (en) | 2008-03-07 | 2014-09-30 | Qualcomm Incorporated | Method and apparatus for detecting unauthorized access to a computing device and securely communicating information about such unauthorized access |
-
2002
- 2002-02-15 FR FR0201883A patent/FR2836312B1/en not_active Expired - Fee Related
- 2002-11-26 CN CN 02154353 patent/CN1438784A/en active Pending
-
2003
- 2003-02-06 AU AU2003222888A patent/AU2003222888A1/en not_active Abandoned
- 2003-02-06 WO PCT/FR2003/000369 patent/WO2003071733A1/en not_active Application Discontinuation
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8009017B2 (en) | 2003-04-01 | 2011-08-30 | Mi Kyoung Park | Contactless type communication tag, portable tag reader for verifying a genuine article, and method for providing information of whether an article is genuine or not |
Also Published As
Publication number | Publication date |
---|---|
WO2003071733A1 (en) | 2003-08-28 |
FR2836312B1 (en) | 2004-11-19 |
FR2836312A1 (en) | 2003-08-22 |
CN1438784A (en) | 2003-08-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB0215524D0 (en) | Method and apparatus for generating a cryptographic key | |
GB0215590D0 (en) | Method and apparatus for generating a cryptographic key | |
AU2002229972A1 (en) | Cryptographic key generation apparatus and method | |
AU2003238596A1 (en) | Biometric key generation for secure storage | |
AU2002321071A1 (en) | A method and system for generating and verifying a key protection certificate. | |
AU2003301719A1 (en) | Password encryption key | |
EP1547297A4 (en) | Apparatus for encryption key management | |
AU2001268071A1 (en) | Cryptographic communications using pseudo-randomly generated cryptography keys | |
AU2003239730A1 (en) | Round key generation for aes rijndael block cipher | |
AU2003265291A1 (en) | Cryptographic key distribution using key unfolding | |
AU2002232187A1 (en) | Authenticating method | |
EP1396471A3 (en) | Hydrogen generating apparatus | |
AU2003216152A1 (en) | Secure electonic messqging system requiring key retrieval for deriving decryption keys | |
EP1548687A4 (en) | Tamper-resistant elliptical curve encryption using secret key | |
AU2003202118A1 (en) | A hybrid network encrypt/decrypt scheme | |
AU2002326280A1 (en) | A method of generating an authentication | |
AU2003278588A1 (en) | Method of extraction of a secret key | |
AU2003208493A1 (en) | Encryption key hiding and recovering method and system | |
AUPS175802A0 (en) | A system for generating power | |
GB0200367D0 (en) | A public key encryption system | |
AU2003215703A1 (en) | Cryptographic revocation method using a chip card | |
AU2003255923A1 (en) | Method and system for generating a common secret key | |
AU2003276597A1 (en) | Key synchronization in a visual cryptographic system | |
AU2003247248A1 (en) | Method for starting a gas generating system | |
AU2003222888A1 (en) | Method for generating secure keys for a cryptographic algorithm |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MK6 | Application lapsed section 142(2)(f)/reg. 8.3(3) - pct applic. not entering national phase |