CN101204035A - 加强安全散列函数 - Google Patents
加强安全散列函数 Download PDFInfo
- Publication number
- CN101204035A CN101204035A CNA2006800221760A CN200680022176A CN101204035A CN 101204035 A CN101204035 A CN 101204035A CN A2006800221760 A CNA2006800221760 A CN A2006800221760A CN 200680022176 A CN200680022176 A CN 200680022176A CN 101204035 A CN101204035 A CN 101204035A
- Authority
- CN
- China
- Prior art keywords
- block
- sub
- message
- blocks
- medium
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
- H04K1/04—Secret communication by frequency scrambling, i.e. by transposing or inverting parts of the frequency band or by inverting the whole band
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Power Engineering (AREA)
- Quality & Reliability (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US11/168,842 | 2005-06-28 | ||
| US11/168,842 US7546461B2 (en) | 2005-06-28 | 2005-06-28 | Strengthening secure hash functions |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN101204035A true CN101204035A (zh) | 2008-06-18 |
Family
ID=37569013
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CNA2006800221760A Pending CN101204035A (zh) | 2005-06-28 | 2006-06-13 | 加强安全散列函数 |
Country Status (6)
| Country | Link |
|---|---|
| US (1) | US7546461B2 (enExample) |
| EP (1) | EP1886432A2 (enExample) |
| JP (1) | JP2008545163A (enExample) |
| KR (1) | KR20080018182A (enExample) |
| CN (1) | CN101204035A (enExample) |
| WO (1) | WO2007001829A2 (enExample) |
Families Citing this family (28)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20070113083A1 (en) * | 2005-07-14 | 2007-05-17 | Volkovs Nikolajs | System and method of message authentication |
| KR100785810B1 (ko) * | 2006-12-05 | 2007-12-13 | 한국전자통신연구원 | Rfid 데이터 보호 장치 및 방법 |
| US8086860B2 (en) * | 2007-10-01 | 2011-12-27 | Tata Consultancy Services Limited | Method for preventing and detecting hash collisions of data during the data transmission |
| US8954754B2 (en) * | 2011-12-22 | 2015-02-10 | Intel Corporation | Method and apparatus to process SHA-1 secure hashing algorithm |
| US9935768B2 (en) | 2012-08-06 | 2018-04-03 | Samsung Electronics Co., Ltd. | Processors including key management circuits and methods of operating key management circuits |
| KR102013841B1 (ko) | 2012-08-06 | 2019-08-23 | 삼성전자주식회사 | 데이터의 안전한 저장을 위한 키 관리 방법 및 그 장치 |
| MX364063B (es) | 2013-03-05 | 2019-04-11 | Fasetto Inc | Sistema y metodo para usuarios de interfaces de graficas cubicas. |
| CN103209075A (zh) * | 2013-03-15 | 2013-07-17 | 南京易司拓电力科技股份有限公司 | 一种密码交换方法 |
| US9886229B2 (en) | 2013-07-18 | 2018-02-06 | Fasetto, L.L.C. | System and method for multi-angle videos |
| US10095873B2 (en) | 2013-09-30 | 2018-10-09 | Fasetto, Inc. | Paperless application |
| US9584402B2 (en) | 2014-01-27 | 2017-02-28 | Fasetto, Llc | Systems and methods for peer to peer communication |
| KR20230082053A (ko) | 2014-07-10 | 2023-06-08 | 파세토, 인크. | 메시지 편집을 위한 시스템들 및 방법들 |
| JP6695868B2 (ja) | 2014-10-06 | 2020-05-20 | ファセット・インコーポレーテッド | ポータブル・ストレージ・デバイスのためのシステムおよび方法 |
| US10437288B2 (en) | 2014-10-06 | 2019-10-08 | Fasetto, Inc. | Portable storage device with modular power and housing system |
| CN112737895A (zh) | 2015-03-11 | 2021-04-30 | 法斯埃托股份有限公司 | 用于web api通信的系统和方法 |
| US10929071B2 (en) | 2015-12-03 | 2021-02-23 | Fasetto, Inc. | Systems and methods for memory card emulation |
| BR112018016815A2 (pt) * | 2016-02-23 | 2018-12-26 | Nchain Holdings Ltd | método para gestão e registro automático para contratos inteligentes aplicados através de blockchain |
| KR102572506B1 (ko) | 2016-11-23 | 2023-08-30 | 파세토, 인크. | 미디어를 스트리밍하기 위한 시스템 및 방법 |
| WO2018144833A1 (en) | 2017-02-03 | 2018-08-09 | Fasetto, Llc | Systems and methods for data storage in keyed devices |
| WO2019079628A1 (en) | 2017-10-19 | 2019-04-25 | Fasetto, Inc. | PORTABLE ELECTRONIC DEVICE CONNECTING SYSTEMS |
| TW201919361A (zh) * | 2017-11-09 | 2019-05-16 | 張英輝 | 以雜文加強保護之區塊加密及其解密之方法 |
| WO2019109033A1 (en) | 2017-12-01 | 2019-06-06 | Fasetto, Inc. | Systems and methods for improved data encryption |
| EP3782112B1 (en) | 2018-04-17 | 2024-10-23 | Fasetto, Inc. | Device presentation with real-time feedback |
| KR102809235B1 (ko) * | 2018-05-25 | 2025-05-15 | 젠무테크 가부시키가이샤 | 데이터 처리 장치, 방법 및 컴퓨터 프로그램이 기록된 기록 매체 |
| JP7526604B2 (ja) | 2020-07-10 | 2024-08-01 | 富士通株式会社 | 生成プログラム、生成方法、および生成装置 |
| US11288663B1 (en) | 2021-06-25 | 2022-03-29 | Arri E. Manuel | Blockring service, system, and method thereof |
| US11934667B1 (en) * | 2021-06-30 | 2024-03-19 | Amazon Technologies, Inc. | Encrypted-data-only media operations |
| US20250015984A1 (en) * | 2023-07-05 | 2025-01-09 | Theon Technology Llc | Use Of Quantum Resistant Iterative Keypads For Large Files |
Family Cites Families (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4229818A (en) * | 1978-12-29 | 1980-10-21 | International Business Machines Corporation | Method and apparatus for enciphering blocks which succeed short blocks in a key-controlled block-cipher cryptographic system |
| US5214698A (en) * | 1991-03-20 | 1993-05-25 | International Business Machines Corporation | Method and apparatus for validating entry of cryptographic keys |
| US5323464A (en) * | 1992-10-16 | 1994-06-21 | International Business Machines Corporation | Commercial data masking |
| US5606616A (en) * | 1995-07-03 | 1997-02-25 | General Instrument Corporation Of Delaware | Cryptographic apparatus with double feedforward hash function |
| WO1998031122A1 (en) | 1997-01-08 | 1998-07-16 | Bell Communications Research, Inc. | A method and apparatus for generating secure hash functions |
| KR100389902B1 (ko) | 1997-06-23 | 2003-09-22 | 삼성전자주식회사 | 차분해독법과선형해독법에대하여안전성을보장하는고속블럭암호화방법 |
| US6578144B1 (en) | 1999-03-23 | 2003-06-10 | International Business Machines Corporation | Secure hash-and-sign signatures |
| DE60024941T8 (de) * | 1999-08-31 | 2006-08-10 | Matsushita Electric Industrial Co., Ltd., Kadoma | Verschlüsselungsverfahren und -Vorrichtung, Entschlüsselungsverfahren und -Vorrichtung |
-
2005
- 2005-06-28 US US11/168,842 patent/US7546461B2/en not_active Expired - Fee Related
-
2006
- 2006-06-13 CN CNA2006800221760A patent/CN101204035A/zh active Pending
- 2006-06-13 JP JP2008519339A patent/JP2008545163A/ja active Pending
- 2006-06-13 KR KR1020077028547A patent/KR20080018182A/ko not_active Withdrawn
- 2006-06-13 EP EP06773016A patent/EP1886432A2/en not_active Withdrawn
- 2006-06-13 WO PCT/US2006/022960 patent/WO2007001829A2/en not_active Ceased
Also Published As
| Publication number | Publication date |
|---|---|
| US20060294386A1 (en) | 2006-12-28 |
| JP2008545163A (ja) | 2008-12-11 |
| KR20080018182A (ko) | 2008-02-27 |
| WO2007001829A3 (en) | 2007-05-18 |
| US7546461B2 (en) | 2009-06-09 |
| WO2007001829A2 (en) | 2007-01-04 |
| EP1886432A2 (en) | 2008-02-13 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN101204035A (zh) | 加强安全散列函数 | |
| US9455833B2 (en) | Behavioral fingerprint in a white-box implementation | |
| CN104683093B (zh) | 兼具完整性验证的区块加密装置、区块加密方法、区块解密装置及区块解密方法 | |
| JP6877889B2 (ja) | 暗号化装置、暗号化方法、復号化装置、及び復号化方法 | |
| CN111066077B (zh) | 加密装置、加密方法、解密装置以及解密方法 | |
| US9485226B2 (en) | Method for including an implicit integrity or authenticity check into a white-box implementation | |
| Tiwari | Cryptography in blockchain | |
| WO2021206727A1 (en) | Neural networks | |
| CN110663215A (zh) | 在白盒场景中的椭圆曲线点乘设备和方法 | |
| CN113098675A (zh) | 基于多项式完全同态的二进制数据加密系统及方法 | |
| US7912212B2 (en) | Symmetric cryptosystem using cascaded chaotic maps | |
| US9049004B2 (en) | Low-power encryption apparatus and method | |
| WO2019163032A1 (ja) | 暗号化装置、暗号化方法、プログラム、復号装置、復号方法 | |
| CN109714154B (zh) | 一种代码体积困难白盒安全模型下的白盒密码算法的实现方法 | |
| Yang | [Retracted] Application of Hybrid Encryption Algorithm in Hardware Encryption Interface Card | |
| Taher et al. | Best S-box amongst differently sized S-boxes based on the avalanche effect in the advance encryption standard algorithm | |
| EP2940917A1 (en) | Behavioral fingerprint in a white-box implementation | |
| JP4914329B2 (ja) | メッセージ認証子生成装置、メッセージ認証子検証装置、メッセージ認証子生成方法、メッセージ認証子検証方法、プログラム、および記録媒体 | |
| EP2940677A1 (en) | Method for including an implicit integrity or authenticity check into a white-box implementation | |
| Velioğlu et al. | A New Approach to Cryptographic Hashing: Color Hidden Hash Algorithm | |
| WO2022215249A1 (ja) | 暗号化装置、復号装置、暗号化方法、暗号化プログラム、復号方法及び復号プログラム | |
| Jasek | Sha-1 and md5 cryptographic hash functions: Security overview | |
| CN119814279B (zh) | 用于抗量子计算的混合加密认证方法、装置及设备 | |
| Chang et al. | Context-committing authenticated encryptions using tweakable stream cipher | |
| Lakshmi et al. | A Compact Hardware Design and Implementation on FPGA Based Hybrid of AES and Keccak SHA3-512 for Enhancing Data Security |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
| WD01 | Invention patent application deemed withdrawn after publication |
Open date: 20080618 |