CA3056814A1 - Procede et systeme cryptographiques symetriques et leurs applications - Google Patents

Procede et systeme cryptographiques symetriques et leurs applications Download PDF

Info

Publication number
CA3056814A1
CA3056814A1 CA3056814A CA3056814A CA3056814A1 CA 3056814 A1 CA3056814 A1 CA 3056814A1 CA 3056814 A CA3056814 A CA 3056814A CA 3056814 A CA3056814 A CA 3056814A CA 3056814 A1 CA3056814 A1 CA 3056814A1
Authority
CA
Canada
Prior art keywords
key
input
data
cryptographic
inputs
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CA3056814A
Other languages
English (en)
Inventor
Glen Arthur Henderson
Brent Eric Nordin
Daniel Marcel Joseph Seguin
Prateek Srivastava
Ian Hugh Curry
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cord3 Innovation Inc
Original Assignee
Cord3 Innovation Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US15/905,055 external-priority patent/US10778424B2/en
Application filed by Cord3 Innovation Inc filed Critical Cord3 Innovation Inc
Publication of CA3056814A1 publication Critical patent/CA3056814A1/fr
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C1/00Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
    • H04L9/0662Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/04Masking or blinding

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

L'invention concerne des systèmes et des procédés cryptographiques, y compris de nombreuses applications industrielles. Des modes de réalisation de la présente invention peuvent générer et régénérer la même clé symétrique. Les systèmes et les procédés cryptographiques comprennent un générateur de clé configuré pour utiliser deux entrées ou plus afin de générer de manière reproductible la clé symétrique et un moteur cryptographique configuré pour utiliser la clé symétrique afin de chiffrer et déchiffrer des données.
CA3056814A 2017-02-27 2018-02-27 Procede et systeme cryptographiques symetriques et leurs applications Pending CA3056814A1 (fr)

Applications Claiming Priority (11)

Application Number Priority Date Filing Date Title
US201762464160P 2017-02-27 2017-02-27
US62/464,160 2017-02-27
US201762524576P 2017-06-25 2017-06-25
US62/524,576 2017-06-25
US15/905,232 2018-02-26
US15/905,055 2018-02-26
US15/905,055 US10778424B2 (en) 2017-02-27 2018-02-26 Symmetric cryptographic method and system and applications thereof
US15/905,162 2018-02-26
US15/905,232 US10742408B2 (en) 2017-02-27 2018-02-26 Many-to-many symmetric cryptographic system and method
US15/905,162 US10686598B2 (en) 2017-02-27 2018-02-26 One-to-many symmetric cryptographic system and method
PCT/CA2018/000036 WO2018152618A1 (fr) 2017-02-27 2018-02-27 Procédé et système cryptographiques symétriques et leurs applications

Publications (1)

Publication Number Publication Date
CA3056814A1 true CA3056814A1 (fr) 2018-08-30

Family

ID=63252437

Family Applications (1)

Application Number Title Priority Date Filing Date
CA3056814A Pending CA3056814A1 (fr) 2017-02-27 2018-02-27 Procede et systeme cryptographiques symetriques et leurs applications

Country Status (3)

Country Link
EP (1) EP3596651A4 (fr)
CA (1) CA3056814A1 (fr)
WO (1) WO2018152618A1 (fr)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110738513B (zh) * 2019-09-11 2022-08-02 完美世界(北京)软件科技发展有限公司 一种用于生成、验证兑换码的方法和装置
US11677754B2 (en) 2019-12-09 2023-06-13 Daniel Chien Access control systems and methods
CN111711515B (zh) * 2020-05-18 2022-04-26 冠群信息技术(南京)有限公司 一种三方aes密钥合成方法、加密方法和解密方法
CN112100582B (zh) * 2020-09-22 2023-06-16 焦点教育科技有限公司 一种应用强对称加密保护软件分发安全的方法
WO2022221753A1 (fr) * 2021-04-16 2022-10-20 Daniel Chien Génération de clé partagée basée sur des horloges doubles

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1988001120A1 (fr) 1986-07-31 1988-02-11 Kabushiki Kaisya Advance Systeme de generation d'une cle cryptographique partagee et systeme de communications utilisant la cle cryptographique partagee
JP2008104040A (ja) * 2006-10-20 2008-05-01 Fujitsu Ltd 共通鍵生成装置および共通鍵生成方法
US8189778B2 (en) * 2008-07-07 2012-05-29 General Instrument Corporation Adaptive generation of a pseudo random number generator seed
US8675864B2 (en) * 2010-09-14 2014-03-18 CompuGroup Medical AG Apparatus for encrypting data
ES2619613T3 (es) * 2014-06-12 2017-06-26 Nagravision S.A. Método criptográfico para intercambiar mensajes de forma segura y dispositivo y sistema para implementar este método
WO2016042693A1 (fr) * 2014-09-19 2016-03-24 日本電気株式会社 Dispositif de calcul de secret, procédé, support d'enregistrement et système de calcul de secret
IL234956A (en) * 2014-10-02 2017-10-31 Kaluzhny Uri Data bus protection with enhanced key entropy

Also Published As

Publication number Publication date
EP3596651A4 (fr) 2021-01-06
EP3596651A1 (fr) 2020-01-22
WO2018152618A1 (fr) 2018-08-30

Similar Documents

Publication Publication Date Title
US11818262B2 (en) Method and system for one-to-many symmetric cryptography and a network employing the same
US11271730B2 (en) Systems and methods for deployment, management and use of dynamic cipher key systems
CA3056814A1 (fr) Procede et systeme cryptographiques symetriques et leurs applications
JP2020532177A (ja) データの高度なセキュリティ、高速暗号化および、伝送のためのコンピュータ実装システムおよび方法
Poduval et al. Secure file storage on cloud using hybrid cryptography
Junghanns et al. Engineering of secure multi-cloud storage
US10848312B2 (en) Zero-knowledge architecture between multiple systems
US20200045026A1 (en) Centralized Data Management and SaaS with End-to-End Encryption
Sri et al. SECURE FILE STORAGE USING HYBRID CRYPTOGRAPHY
Sarumi A review of encryption methods for secure data communication
US11683159B2 (en) Hybrid content protection architecture
Reddy et al. Data Storage on Cloud using Split-Merge and Hybrid Cryptographic Techniques
Tripathi et al. Survey on performance comparison of various symmetric encryption algorithms
Preethi et al. Enabling Data Integrity Protection in Cloud Storage Using Cryptography
Sumathy et al. Enhanced Public Integrity Auditing On Cloud Data Using Sha Algorithm
Prakash et al. A Theoretical Framework on Enhancing Cloud Storage Security through Customized ECC Key Management Technique
Singh et al. Security of Data with 3DES & Watermarking Algorithm
Rayapati et al. Security in Cloud Technologies: A Brief Overview
Adamović Development of a Cryptographic Solution Based on Kerberos for Database Security
Bansode et al. Data Security in Message Passing using Armstrong Number
CN116094735A (zh) 一种密码服务管理方法、设备及计算机存储介质
Dable et al. Design and Implement Enhancing Security in Multi Cloud Storage System using Distributed File System
Santhi Baskaran Survey on Data Security using Encryption Algorithms in Cloud Environment
Yadav et al. Fingerprinting Based Recursive Information Hiding Strategy in Cloud Computing Environment
Andrijauskas Client Side Encryption for Soonr Cloud Service and Secure Key Distribution

Legal Events

Date Code Title Description
EEER Examination request

Effective date: 20220930

EEER Examination request

Effective date: 20220930

EEER Examination request

Effective date: 20220930

EEER Examination request

Effective date: 20220930

EEER Examination request

Effective date: 20220930