AU7981600A - A simple technique for implementing a cryptographic primitive using elementary register operations - Google Patents
A simple technique for implementing a cryptographic primitive using elementary register operationsInfo
- Publication number
- AU7981600A AU7981600A AU79816/00A AU7981600A AU7981600A AU 7981600 A AU7981600 A AU 7981600A AU 79816/00 A AU79816/00 A AU 79816/00A AU 7981600 A AU7981600 A AU 7981600A AU 7981600 A AU7981600 A AU 7981600A
- Authority
- AU
- Australia
- Prior art keywords
- technique
- primitive
- implementing
- register operations
- invertible
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 title abstract 4
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
- Synchronisation In Digital Transmission Systems (AREA)
- Mobile Radio Communication Systems (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US09329139 | 1999-06-09 | ||
| US09/329,139 US6570988B1 (en) | 1999-06-09 | 1999-06-09 | Simple technique for implementing a cryptographic primitive using elementary register operations |
| PCT/US2000/016035 WO2000078118A2 (en) | 1999-06-09 | 2000-06-09 | Implementing a cryptographic primitive using elementary register operations |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| AU7981600A true AU7981600A (en) | 2001-01-09 |
Family
ID=23284020
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| AU79816/00A Abandoned AU7981600A (en) | 1999-06-09 | 2000-06-06 | A simple technique for implementing a cryptographic primitive using elementary register operations |
Country Status (7)
| Country | Link |
|---|---|
| US (1) | US6570988B1 (enExample) |
| EP (1) | EP1468521B1 (enExample) |
| JP (1) | JP4559679B2 (enExample) |
| AT (1) | ATE321394T1 (enExample) |
| AU (1) | AU7981600A (enExample) |
| DE (1) | DE60026868T2 (enExample) |
| WO (1) | WO2000078118A2 (enExample) |
Families Citing this family (28)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6483918B2 (en) * | 1999-06-09 | 2002-11-19 | Microsoft Corporation | Technique for producing a parameter, such as a checksum, through a primitive that uses elementary register operations |
| US6657625B1 (en) * | 1999-06-09 | 2003-12-02 | Microsoft Corporation | System and method of caching glyphs for display by a remote terminal |
| US7505046B1 (en) | 2000-05-02 | 2009-03-17 | Adobe Systems Incorporated | Preserving opaque-like rendering in transparent 2D graphics using knockout groups |
| JP4045777B2 (ja) * | 2001-10-30 | 2008-02-13 | 株式会社日立製作所 | 情報処理装置 |
| US7068785B2 (en) * | 2002-02-05 | 2006-06-27 | Matsushita Electric Industrial Co., Ltd. | Table driven method for calculating arithmetic inverse for use in cryptography |
| US7529368B2 (en) | 2003-04-18 | 2009-05-05 | Via Technologies, Inc. | Apparatus and method for performing transparent output feedback mode cryptographic functions |
| US7519833B2 (en) * | 2003-04-18 | 2009-04-14 | Via Technologies, Inc. | Microprocessor apparatus and method for enabling configurable data block size in a cryptographic engine |
| US7925891B2 (en) * | 2003-04-18 | 2011-04-12 | Via Technologies, Inc. | Apparatus and method for employing cryptographic functions to generate a message digest |
| US7532722B2 (en) * | 2003-04-18 | 2009-05-12 | Ip-First, Llc | Apparatus and method for performing transparent block cipher cryptographic functions |
| US7536560B2 (en) | 2003-04-18 | 2009-05-19 | Via Technologies, Inc. | Microprocessor apparatus and method for providing configurable cryptographic key size |
| US7502943B2 (en) * | 2003-04-18 | 2009-03-10 | Via Technologies, Inc. | Microprocessor apparatus and method for providing configurable cryptographic block cipher round results |
| US7900055B2 (en) * | 2003-04-18 | 2011-03-01 | Via Technologies, Inc. | Microprocessor apparatus and method for employing configurable block cipher cryptographic algorithms |
| US8060755B2 (en) * | 2003-04-18 | 2011-11-15 | Via Technologies, Inc | Apparatus and method for providing user-generated key schedule in a microprocessor cryptographic engine |
| US7542566B2 (en) * | 2003-04-18 | 2009-06-02 | Ip-First, Llc | Apparatus and method for performing transparent cipher block chaining mode cryptographic functions |
| US7529367B2 (en) * | 2003-04-18 | 2009-05-05 | Via Technologies, Inc. | Apparatus and method for performing transparent cipher feedback mode cryptographic functions |
| US7539876B2 (en) * | 2003-04-18 | 2009-05-26 | Via Technologies, Inc. | Apparatus and method for generating a cryptographic key schedule in a microprocessor |
| US7844053B2 (en) | 2003-04-18 | 2010-11-30 | Ip-First, Llc | Microprocessor apparatus and method for performing block cipher cryptographic functions |
| US7528834B2 (en) * | 2003-09-30 | 2009-05-05 | Microsoft Corporation | System and method of caching glyphs for display by a remote terminal |
| US7715553B2 (en) * | 2005-08-01 | 2010-05-11 | Durward D. Dupre | Encrypting a plaintext message with authentication |
| US8090098B2 (en) | 2006-11-13 | 2012-01-03 | Electronics And Telecommunications Research Institute | Method of generating message authentication code using stream cipher and authentication/encryption and authentication/decryption methods using stream cipher |
| US8094813B2 (en) | 2008-09-02 | 2012-01-10 | Apple Inc. | System and method for modulus obfuscation |
| US9116765B2 (en) | 2011-10-20 | 2015-08-25 | Apple Inc. | System and method for obfuscating data using instructions as a source of pseudorandom values |
| EP2884692B1 (en) * | 2013-12-13 | 2020-05-20 | Nxp B.V. | Updating software on a secure element |
| FR3035240B1 (fr) * | 2015-04-15 | 2018-04-06 | Rambus Inc. | Procede de securisation de l'execution d'un programme |
| US20160308669A1 (en) * | 2015-04-20 | 2016-10-20 | Jian Ho | Method and System for Real Time Data Protection with Private Key and Algorithm for Transmission and Storage |
| US11176264B2 (en) | 2019-08-20 | 2021-11-16 | Bank Of America Corporation | Data access control using data block level decryption |
| US11741248B2 (en) | 2019-08-20 | 2023-08-29 | Bank Of America Corporation | Data access control using data block level encryption |
| US20230367489A1 (en) * | 2022-05-12 | 2023-11-16 | Micron Technology, Inc. | Performing cryptographic functions at a memory system |
Family Cites Families (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5003597A (en) * | 1989-12-21 | 1991-03-26 | Xerox Corporation | Method and apparatus for data encryption |
| US5724428A (en) * | 1995-11-01 | 1998-03-03 | Rsa Data Security, Inc. | Block encryption algorithm with data-dependent rotations |
| US6269163B1 (en) * | 1998-06-15 | 2001-07-31 | Rsa Security Inc. | Enhanced block ciphers with data-dependent rotations |
| US7174013B1 (en) * | 1998-10-20 | 2007-02-06 | Lucent Technologies Inc. | Efficient universal hashing method |
-
1999
- 1999-06-09 US US09/329,139 patent/US6570988B1/en not_active Expired - Lifetime
-
2000
- 2000-06-06 AU AU79816/00A patent/AU7981600A/en not_active Abandoned
- 2000-06-09 EP EP00970432A patent/EP1468521B1/en not_active Expired - Lifetime
- 2000-06-09 WO PCT/US2000/016035 patent/WO2000078118A2/en not_active Ceased
- 2000-06-09 JP JP2001504202A patent/JP4559679B2/ja not_active Expired - Lifetime
- 2000-06-09 DE DE60026868T patent/DE60026868T2/de not_active Expired - Lifetime
- 2000-06-09 AT AT00970432T patent/ATE321394T1/de not_active IP Right Cessation
Also Published As
| Publication number | Publication date |
|---|---|
| US6570988B1 (en) | 2003-05-27 |
| WO2000078118A3 (en) | 2004-05-21 |
| EP1468521A4 (en) | 2004-10-20 |
| DE60026868D1 (de) | 2006-05-11 |
| JP2003526118A (ja) | 2003-09-02 |
| ATE321394T1 (de) | 2006-04-15 |
| JP4559679B2 (ja) | 2010-10-13 |
| DE60026868T2 (de) | 2006-09-07 |
| WO2000078118A2 (en) | 2000-12-28 |
| EP1468521B1 (en) | 2006-03-22 |
| EP1468521A2 (en) | 2004-10-20 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| AU7981600A (en) | A simple technique for implementing a cryptographic primitive using elementary register operations | |
| WO2000075750A3 (en) | Parameter generation using elementary register operations | |
| WO2001056221A3 (en) | Block encryption method and schemes for data confidentiality and integrity protection | |
| WO2002017554A3 (en) | Parallel bock encryption method and modes for data confidentiality and integrity protection | |
| SG124291A1 (en) | Block cipher apparatus using auxuiliary transformation | |
| WO2001076130A3 (en) | Authentication method and schemes for data integrity protection | |
| WO2001089138A3 (en) | Method and apparatus for the security of cryptographic ciphers | |
| WO2006045038A2 (en) | Enciphering method | |
| WO2003019842A3 (en) | Stream cipher, hash, and pseudo-random number generator | |
| WO2002101979A3 (en) | Improved data encryption and decryption system and method | |
| EP1014617A3 (en) | Method and apparatus for elliptic curve cryptography and recording medium therefor | |
| AU4451696A (en) | Method for implementing a private key communication protocol between two processing devices | |
| TW367684B (en) | A process of cryptographic communication | |
| KR20010101799A (ko) | 암호화 스트림 암호를 생성하는 방법 및 장치 | |
| AU5203899A (en) | Using unpredictable information to minimize leakage from smartcards and other cryptosystems | |
| JP2001522167A (ja) | 暗号化ストリーム暗号を生成させる方法および装置 | |
| CA2179691A1 (en) | Cryptographic Apparatus with Double Feedforward Hash Function | |
| WO2005034421A3 (en) | Information transfer system, encryption device, and decryption device using elliptic curve | |
| WO2002011361A3 (en) | Data encryption and decryption using error correction methodologies | |
| AU2084201A (en) | One's complement cryptographic combiner | |
| CA2391997A1 (en) | Methods and apparatus for keystream generation | |
| GB0006668D0 (en) | Encrypting and decrypting | |
| WO2004034174A3 (en) | Encryption circuit arrangement and method therefor | |
| EP1633078A3 (en) | Cryptographic technique that provides fast encryption and decryption and assures integrity of a ciphertext message | |
| WO2003030442A3 (en) | Cisponentiation method, software, and device for exponentiation |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| MK6 | Application lapsed section 142(2)(f)/reg. 8.3(3) - pct applic. not entering national phase |