CN104620555A - 用于保护消息数据的设备和方法 - Google Patents
用于保护消息数据的设备和方法 Download PDFInfo
- Publication number
- CN104620555A CN104620555A CN201380046996.3A CN201380046996A CN104620555A CN 104620555 A CN104620555 A CN 104620555A CN 201380046996 A CN201380046996 A CN 201380046996A CN 104620555 A CN104620555 A CN 104620555A
- Authority
- CN
- China
- Prior art keywords
- message data
- data
- produce
- filling
- message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 49
- 230000006870 function Effects 0.000 claims description 103
- 238000007906 compression Methods 0.000 claims description 96
- 230000006835 compression Effects 0.000 claims description 96
- 238000004422 calculation algorithm Methods 0.000 claims description 36
- 238000004590 computer program Methods 0.000 claims description 31
- 238000009795 derivation Methods 0.000 claims description 13
- 230000001419 dependent effect Effects 0.000 abstract 1
- 230000000694 effects Effects 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 8
- 238000004891 communication Methods 0.000 description 7
- 238000013461 design Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 239000000835 fiber Substances 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 230000002349 favourable effect Effects 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 239000006249 magnetic particle Substances 0.000 description 1
- 239000002245 particle Substances 0.000 description 1
- 229920002939 poly(N,N-dimethylacrylamides) Polymers 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1475—Passive attacks, e.g. eavesdropping or listening without modification of the traffic monitored
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/166—Implementing security features at a particular protocol layer at the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/04—Protocols for data compression, e.g. ROHC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/06—Optimizing the usage of the radio link, e.g. header compression, information sizing, discarding information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/16—Obfuscation or hiding, e.g. involving white box
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/20—Manipulating the length of blocks of bits, e.g. padding or block truncation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/24—Key scheduling, i.e. generating round keys or sub-keys for block encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/30—Compression, e.g. Merkle-Damgard construction
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (5)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201261701384P | 2012-09-14 | 2012-09-14 | |
| US61/701,384 | 2012-09-14 | ||
| US13/764,524 US9673983B2 (en) | 2012-09-14 | 2013-02-11 | Apparatus and method for protecting message data |
| US13/764,524 | 2013-02-11 | ||
| PCT/US2013/059524 WO2014043392A1 (en) | 2012-09-14 | 2013-09-12 | Apparatus and method for protecting message data |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN104620555A true CN104620555A (zh) | 2015-05-13 |
Family
ID=50274467
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201380046996.3A Pending CN104620555A (zh) | 2012-09-14 | 2013-09-12 | 用于保护消息数据的设备和方法 |
Country Status (6)
| Country | Link |
|---|---|
| US (3) | US9673983B2 (enExample) |
| EP (3) | EP2896179B1 (enExample) |
| JP (1) | JP2015528681A (enExample) |
| KR (1) | KR20150058310A (enExample) |
| CN (1) | CN104620555A (enExample) |
| WO (1) | WO2014043392A1 (enExample) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN114257555A (zh) * | 2020-09-10 | 2022-03-29 | 马维尔亚洲私人有限公司 | 受信任的远程管理单元、网络交换机以及远程访问方法 |
Families Citing this family (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9673983B2 (en) | 2012-09-14 | 2017-06-06 | Qualcomm Incorporated | Apparatus and method for protecting message data |
| US9276750B2 (en) * | 2013-07-23 | 2016-03-01 | Intel Corporation | Secure processing environment measurement and attestation |
| US9519805B2 (en) * | 2013-08-01 | 2016-12-13 | Cellco Partnership | Digest obfuscation for data cryptography |
| ITMI20131824A1 (it) * | 2013-11-04 | 2015-05-05 | St Microelectronics Srl | Metodo di identificare un messaggio conforme allo standard ota (over the air) ed affetto da errore |
| EP3556044B1 (en) * | 2016-12-15 | 2021-08-11 | Telecom Italia S.p.A. | Method for transmitting encrypted packets in a communication network |
| US10542039B2 (en) * | 2017-02-08 | 2020-01-21 | Nicira, Inc. | Security against side-channel attack in real-time virtualized networks |
| US10831935B2 (en) * | 2017-08-31 | 2020-11-10 | Pure Storage, Inc. | Encryption management with host-side data reduction |
| US11695541B2 (en) * | 2020-12-07 | 2023-07-04 | International Business Machines Corporation | Implementing resilient deterministic encryption |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1251449A (zh) * | 1998-10-18 | 2000-04-26 | 华强 | 两类字典压缩算法在数据压缩中的组合带参运用 |
| US20020078351A1 (en) * | 2000-10-13 | 2002-06-20 | Garib Marco Aurelio | Secret key Messaging |
| US20020184504A1 (en) * | 2001-03-26 | 2002-12-05 | Eric Hughes | Combined digital signature |
| US20090138710A1 (en) * | 2005-11-04 | 2009-05-28 | Nec Corporation | Message Authentication Device, Message Authentication Method, Message Authentication Program and Storage Medium therefor |
Family Cites Families (17)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH0488736A (ja) * | 1990-07-31 | 1992-03-23 | Matsushita Electric Ind Co Ltd | データ伝送方式 |
| US5231668A (en) * | 1991-07-26 | 1993-07-27 | The United States Of America, As Represented By The Secretary Of Commerce | Digital signature algorithm |
| JP3627765B2 (ja) * | 1995-06-15 | 2005-03-09 | 日本電信電話株式会社 | スクランブルにより情報秘匿を行なう通信システムにおける送信装置 |
| US6393126B1 (en) | 1999-06-23 | 2002-05-21 | Datum, Inc. | System and methods for generating trusted and authenticatable time stamps for electronic documents |
| US7222233B1 (en) | 2000-09-14 | 2007-05-22 | At&T Corp. | Method for secure remote backup |
| US7668315B2 (en) | 2001-01-05 | 2010-02-23 | Qualcomm Incorporated | Local authentication of mobile subscribers outside their home systems |
| US20020131590A1 (en) | 2001-02-02 | 2002-09-19 | Henson Kevin M. | Key matrix methodology |
| US7197142B2 (en) | 2001-08-24 | 2007-03-27 | Alten Alexander I | System and methods for a vernam stream cipher |
| US8127130B2 (en) | 2006-04-18 | 2012-02-28 | Advanced Communication Concepts, Inc. | Method and system for securing data utilizing reconfigurable logic |
| US8032181B2 (en) | 2007-09-01 | 2011-10-04 | Apple Inc. | Service provider activation with subscriber identity module policy |
| JP5079671B2 (ja) * | 2008-11-27 | 2012-11-21 | 日本電信電話株式会社 | ハッシュ値生成装置、検証装置、ハッシュ値生成方法、検証方法、プログラム、および記録媒体 |
| US20120079281A1 (en) | 2010-06-28 | 2012-03-29 | Lionstone Capital Corporation | Systems and methods for diversification of encryption algorithms and obfuscation symbols, symbol spaces and/or schemas |
| JP2012129920A (ja) | 2010-12-17 | 2012-07-05 | Nippon Telegr & Teleph Corp <Ntt> | 圧縮暗号化装置、復号伸長装置、それらの方法、及びプログラム |
| CA2831367C (en) | 2011-03-31 | 2019-02-12 | Irdeto B.V. | Method and system for protecting execution of cryptographic hash functions |
| US8886837B2 (en) | 2011-12-02 | 2014-11-11 | Cisco Technology, Inc. | Flow-based compression management |
| US9673983B2 (en) | 2012-09-14 | 2017-06-06 | Qualcomm Incorporated | Apparatus and method for protecting message data |
| US9231615B2 (en) | 2012-10-24 | 2016-01-05 | Seagate Technology Llc | Method to shorten hash chains in Lempel-Ziv compression of data with repetitive symbols |
-
2013
- 2013-02-11 US US13/764,524 patent/US9673983B2/en not_active Expired - Fee Related
- 2013-09-12 EP EP13770751.9A patent/EP2896179B1/en not_active Not-in-force
- 2013-09-12 WO PCT/US2013/059524 patent/WO2014043392A1/en not_active Ceased
- 2013-09-12 EP EP15193863.6A patent/EP3001642B1/en not_active Not-in-force
- 2013-09-12 KR KR1020157009352A patent/KR20150058310A/ko not_active Ceased
- 2013-09-12 CN CN201380046996.3A patent/CN104620555A/zh active Pending
- 2013-09-12 EP EP15193854.5A patent/EP3001641B1/en not_active Not-in-force
- 2013-09-12 JP JP2015532051A patent/JP2015528681A/ja not_active Ceased
-
2015
- 2015-03-16 US US14/659,024 patent/US9660811B2/en not_active Expired - Fee Related
- 2015-03-16 US US14/659,082 patent/US9729325B2/en not_active Expired - Fee Related
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1251449A (zh) * | 1998-10-18 | 2000-04-26 | 华强 | 两类字典压缩算法在数据压缩中的组合带参运用 |
| US20020078351A1 (en) * | 2000-10-13 | 2002-06-20 | Garib Marco Aurelio | Secret key Messaging |
| US20020184504A1 (en) * | 2001-03-26 | 2002-12-05 | Eric Hughes | Combined digital signature |
| US20090138710A1 (en) * | 2005-11-04 | 2009-05-28 | Nec Corporation | Message Authentication Device, Message Authentication Method, Message Authentication Program and Storage Medium therefor |
Non-Patent Citations (2)
| Title |
|---|
| JOHN KELSEY ET AL: ""Compression and Information Leakage of Plaintext"", 《FAST SOFTWARE ENCRYPTION》 * |
| T.DIERKS: ""The Transport Layer Security Protocol"", 《NEYWORK WORKING GROUP》 * |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN114257555A (zh) * | 2020-09-10 | 2022-03-29 | 马维尔亚洲私人有限公司 | 受信任的远程管理单元、网络交换机以及远程访问方法 |
| CN114257555B (zh) * | 2020-09-10 | 2025-01-21 | 马维尔亚洲私人有限公司 | 受信任的远程管理单元、网络交换机以及远程访问方法 |
Also Published As
| Publication number | Publication date |
|---|---|
| EP3001641B1 (en) | 2017-04-19 |
| WO2014043392A1 (en) | 2014-03-20 |
| US20140079213A1 (en) | 2014-03-20 |
| US9729325B2 (en) | 2017-08-08 |
| US20150188709A1 (en) | 2015-07-02 |
| US9660811B2 (en) | 2017-05-23 |
| EP2896179A1 (en) | 2015-07-22 |
| US9673983B2 (en) | 2017-06-06 |
| EP3001642A1 (en) | 2016-03-30 |
| EP2896179B1 (en) | 2017-04-19 |
| JP2015528681A (ja) | 2015-09-28 |
| EP3001641A1 (en) | 2016-03-30 |
| US20150188708A1 (en) | 2015-07-02 |
| EP3001642B1 (en) | 2017-04-19 |
| KR20150058310A (ko) | 2015-05-28 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN104620555A (zh) | 用于保护消息数据的设备和方法 | |
| CN110868287B (zh) | 一种认证加密密文编码方法、系统、装置及存储介质 | |
| WO2008045773A2 (en) | Method and apparatus for mutual authentication | |
| CN112612486B (zh) | 存储器烧录方法、装置和待烧录芯片 | |
| CN101502039A (zh) | 用于消息认证的加密方法 | |
| CN109361520B (zh) | 基于登录序号的物联网设备动态加密方法 | |
| CN113114654B (zh) | 一种终端设备接入安全认证方法、装置及系统 | |
| EP3022864B1 (en) | Apparatus and method for key update for use in a block cipher algorithm | |
| US8769301B2 (en) | Product authentication based upon a hyperelliptic curve equation and a curve pairing function | |
| CN105791258A (zh) | 一种数据传输方法、终端及开放平台 | |
| CN113302961B (zh) | 安全信标 | |
| KR102062377B1 (ko) | 전자서명을 은닉서명으로 변환하는 암호화 방법 | |
| CN105162592A (zh) | 一种认证可穿戴设备的方法及系统 | |
| CN104038337A (zh) | 一种基于aes128的数据加密方法 | |
| KR101329789B1 (ko) | 모바일 디바이스의 데이터베이스 암호화 방법 | |
| CN117097551A (zh) | 工控系统通信协议安全增强方法、系统、设备及存储介质 | |
| US20170366355A1 (en) | Parity check message authentication code | |
| KR100842261B1 (ko) | Cdma 방식의 이동통신 시스템을 위한 해쉬 알고리즘을이용한 데이터생성방법 | |
| CN118821167A (zh) | 数据加密方法、装置、设备、计算机存储介质及程序产品 | |
| CN118802194A (zh) | 加密、解密方法、装置、设备、存储介质 | |
| KR20250062467A (ko) | 순수 난수 기반의 데이터 암호화가 가능한 원격 단말 장치 및 그 동작 방법 | |
| CN120547549A (zh) | 一种专网蜂窝组网的空口加密方法 | |
| CN118573388A (zh) | 一种基于逻辑运算文件块的加解密方法及设备 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| EXSB | Decision made by sipo to initiate substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| WD01 | Invention patent application deemed withdrawn after publication | ||
| WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20150513 |