CA3056814A1 - Procede et systeme cryptographiques symetriques et leurs applications - Google Patents
Procede et systeme cryptographiques symetriques et leurs applications Download PDFInfo
- Publication number
- CA3056814A1 CA3056814A1 CA3056814A CA3056814A CA3056814A1 CA 3056814 A1 CA3056814 A1 CA 3056814A1 CA 3056814 A CA3056814 A CA 3056814A CA 3056814 A CA3056814 A CA 3056814A CA 3056814 A1 CA3056814 A1 CA 3056814A1
- Authority
- CA
- Canada
- Prior art keywords
- key
- input
- data
- cryptographic
- inputs
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 84
- 230000001131 transforming effect Effects 0.000 claims description 4
- 238000010586 diagram Methods 0.000 description 30
- 238000004891 communication Methods 0.000 description 29
- 238000013459 approach Methods 0.000 description 26
- 238000013478 data encryption standard Methods 0.000 description 22
- 230000008569 process Effects 0.000 description 21
- 238000007726 management method Methods 0.000 description 17
- 230000008901 benefit Effects 0.000 description 14
- 238000012545 processing Methods 0.000 description 11
- 230000003068 static effect Effects 0.000 description 11
- 238000013500 data storage Methods 0.000 description 10
- 238000011084 recovery Methods 0.000 description 9
- 230000008520 organization Effects 0.000 description 8
- 230000005540 biological transmission Effects 0.000 description 5
- 238000006243 chemical reaction Methods 0.000 description 5
- 230000001172 regenerating effect Effects 0.000 description 4
- 241001441724 Tetraodontidae Species 0.000 description 3
- 230000001419 dependent effect Effects 0.000 description 3
- 238000009434 installation Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 238000006467 substitution reaction Methods 0.000 description 3
- 101000928335 Homo sapiens Ankyrin repeat and KH domain-containing protein 1 Proteins 0.000 description 2
- 101000701393 Homo sapiens Serine/threonine-protein kinase 26 Proteins 0.000 description 2
- 102100030617 Serine/threonine-protein kinase 26 Human genes 0.000 description 2
- 238000003491 array Methods 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 230000006378 damage Effects 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000008929 regeneration Effects 0.000 description 2
- 238000011069 regeneration method Methods 0.000 description 2
- 241000282412 Homo Species 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 238000009795 derivation Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000008030 elimination Effects 0.000 description 1
- 238000003379 elimination reaction Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 208000007150 epidermolysis bullosa simplex Diseases 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 230000001404 mediated effect Effects 0.000 description 1
- 230000005055 memory storage Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000009877 rendering Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000002441 reversible effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C1/00—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
- H04L9/0656—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
- H04L9/0662—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
L'invention concerne des systèmes et des procédés cryptographiques, y compris de nombreuses applications industrielles. Des modes de réalisation de la présente invention peuvent générer et régénérer la même clé symétrique. Les systèmes et les procédés cryptographiques comprennent un générateur de clé configuré pour utiliser deux entrées ou plus afin de générer de manière reproductible la clé symétrique et un moteur cryptographique configuré pour utiliser la clé symétrique afin de chiffrer et déchiffrer des données.
Applications Claiming Priority (11)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201762464160P | 2017-02-27 | 2017-02-27 | |
US62/464,160 | 2017-02-27 | ||
US201762524576P | 2017-06-25 | 2017-06-25 | |
US62/524,576 | 2017-06-25 | ||
US15/905,232 | 2018-02-26 | ||
US15/905,055 | 2018-02-26 | ||
US15/905,055 US10778424B2 (en) | 2017-02-27 | 2018-02-26 | Symmetric cryptographic method and system and applications thereof |
US15/905,162 | 2018-02-26 | ||
US15/905,232 US10742408B2 (en) | 2017-02-27 | 2018-02-26 | Many-to-many symmetric cryptographic system and method |
US15/905,162 US10686598B2 (en) | 2017-02-27 | 2018-02-26 | One-to-many symmetric cryptographic system and method |
PCT/CA2018/000036 WO2018152618A1 (fr) | 2017-02-27 | 2018-02-27 | Procédé et système cryptographiques symétriques et leurs applications |
Publications (1)
Publication Number | Publication Date |
---|---|
CA3056814A1 true CA3056814A1 (fr) | 2018-08-30 |
Family
ID=63252437
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA3056814A Pending CA3056814A1 (fr) | 2017-02-27 | 2018-02-27 | Procede et systeme cryptographiques symetriques et leurs applications |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP3596651A4 (fr) |
CA (1) | CA3056814A1 (fr) |
WO (1) | WO2018152618A1 (fr) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110738513B (zh) * | 2019-09-11 | 2022-08-02 | 完美世界(北京)软件科技发展有限公司 | 一种用于生成、验证兑换码的方法和装置 |
US11677754B2 (en) | 2019-12-09 | 2023-06-13 | Daniel Chien | Access control systems and methods |
CN111711515B (zh) * | 2020-05-18 | 2022-04-26 | 冠群信息技术(南京)有限公司 | 一种三方aes密钥合成方法、加密方法和解密方法 |
CN112100582B (zh) * | 2020-09-22 | 2023-06-16 | 焦点教育科技有限公司 | 一种应用强对称加密保护软件分发安全的方法 |
WO2022221753A1 (fr) * | 2021-04-16 | 2022-10-20 | Daniel Chien | Génération de clé partagée basée sur des horloges doubles |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1988001120A1 (fr) | 1986-07-31 | 1988-02-11 | Kabushiki Kaisya Advance | Systeme de generation d'une cle cryptographique partagee et systeme de communications utilisant la cle cryptographique partagee |
JP2008104040A (ja) * | 2006-10-20 | 2008-05-01 | Fujitsu Ltd | 共通鍵生成装置および共通鍵生成方法 |
US8189778B2 (en) * | 2008-07-07 | 2012-05-29 | General Instrument Corporation | Adaptive generation of a pseudo random number generator seed |
US8675864B2 (en) * | 2010-09-14 | 2014-03-18 | CompuGroup Medical AG | Apparatus for encrypting data |
ES2619613T3 (es) * | 2014-06-12 | 2017-06-26 | Nagravision S.A. | Método criptográfico para intercambiar mensajes de forma segura y dispositivo y sistema para implementar este método |
WO2016042693A1 (fr) * | 2014-09-19 | 2016-03-24 | 日本電気株式会社 | Dispositif de calcul de secret, procédé, support d'enregistrement et système de calcul de secret |
IL234956A (en) * | 2014-10-02 | 2017-10-31 | Kaluzhny Uri | Data bus protection with enhanced key entropy |
-
2018
- 2018-02-27 EP EP18756556.9A patent/EP3596651A4/fr active Pending
- 2018-02-27 CA CA3056814A patent/CA3056814A1/fr active Pending
- 2018-02-27 WO PCT/CA2018/000036 patent/WO2018152618A1/fr unknown
Also Published As
Publication number | Publication date |
---|---|
EP3596651A4 (fr) | 2021-01-06 |
EP3596651A1 (fr) | 2020-01-22 |
WO2018152618A1 (fr) | 2018-08-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11818262B2 (en) | Method and system for one-to-many symmetric cryptography and a network employing the same | |
US11271730B2 (en) | Systems and methods for deployment, management and use of dynamic cipher key systems | |
CA3056814A1 (fr) | Procede et systeme cryptographiques symetriques et leurs applications | |
JP2020532177A (ja) | データの高度なセキュリティ、高速暗号化および、伝送のためのコンピュータ実装システムおよび方法 | |
Poduval et al. | Secure file storage on cloud using hybrid cryptography | |
Junghanns et al. | Engineering of secure multi-cloud storage | |
US10848312B2 (en) | Zero-knowledge architecture between multiple systems | |
US20200045026A1 (en) | Centralized Data Management and SaaS with End-to-End Encryption | |
Sri et al. | SECURE FILE STORAGE USING HYBRID CRYPTOGRAPHY | |
Sarumi | A review of encryption methods for secure data communication | |
US11683159B2 (en) | Hybrid content protection architecture | |
Reddy et al. | Data Storage on Cloud using Split-Merge and Hybrid Cryptographic Techniques | |
Tripathi et al. | Survey on performance comparison of various symmetric encryption algorithms | |
Preethi et al. | Enabling Data Integrity Protection in Cloud Storage Using Cryptography | |
Sumathy et al. | Enhanced Public Integrity Auditing On Cloud Data Using Sha Algorithm | |
Prakash et al. | A Theoretical Framework on Enhancing Cloud Storage Security through Customized ECC Key Management Technique | |
Singh et al. | Security of Data with 3DES & Watermarking Algorithm | |
Rayapati et al. | Security in Cloud Technologies: A Brief Overview | |
Adamović | Development of a Cryptographic Solution Based on Kerberos for Database Security | |
Bansode et al. | Data Security in Message Passing using Armstrong Number | |
CN116094735A (zh) | 一种密码服务管理方法、设备及计算机存储介质 | |
Dable et al. | Design and Implement Enhancing Security in Multi Cloud Storage System using Distributed File System | |
Santhi Baskaran | Survey on Data Security using Encryption Algorithms in Cloud Environment | |
Yadav et al. | Fingerprinting Based Recursive Information Hiding Strategy in Cloud Computing Environment | |
Andrijauskas | Client Side Encryption for Soonr Cloud Service and Secure Key Distribution |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request |
Effective date: 20220930 |
|
EEER | Examination request |
Effective date: 20220930 |
|
EEER | Examination request |
Effective date: 20220930 |
|
EEER | Examination request |
Effective date: 20220930 |
|
EEER | Examination request |
Effective date: 20220930 |