CN106031079B - 加密算法中的运算符提升 - Google Patents
加密算法中的运算符提升 Download PDFInfo
- Publication number
- CN106031079B CN106031079B CN201480076008.4A CN201480076008A CN106031079B CN 106031079 B CN106031079 B CN 106031079B CN 201480076008 A CN201480076008 A CN 201480076008A CN 106031079 B CN106031079 B CN 106031079B
- Authority
- CN
- China
- Prior art keywords
- data value
- obscure
- expression
- operator
- component
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/008—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
-
- H—ELECTRICITY
- H03—ELECTRONIC CIRCUITRY
- H03M—CODING; DECODING; CODE CONVERSION IN GENERAL
- H03M13/00—Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
- H03M13/03—Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words
- H03M13/05—Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using block codes, i.e. a predetermined number of check bits joined to a predetermined number of information bits
- H03M13/21—Non-linear codes, e.g. m-bit data word to n-bit code word [mBnB] conversion with error detection or error correction
-
- H—ELECTRICITY
- H03—ELECTRONIC CIRCUITRY
- H03M—CODING; DECODING; CODE CONVERSION IN GENERAL
- H03M13/00—Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
- H03M13/03—Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words
- H03M13/23—Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using convolutional codes, e.g. unit memory codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/16—Obfuscation or hiding, e.g. involving white box
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0637—Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
- H04L9/0656—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
- H04L9/0656—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
- H04L9/0662—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Percussion Or Vibration Massage (AREA)
- Storage Device Security (AREA)
- Measuring And Recording Apparatus For Diagnosis (AREA)
- Image Processing (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP13198943 | 2013-12-20 | ||
| EP13198943.6 | 2013-12-20 | ||
| PCT/EP2014/078107 WO2015091583A1 (en) | 2013-12-20 | 2014-12-17 | Operator lifting in cryptographic algorithm |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN106031079A CN106031079A (zh) | 2016-10-12 |
| CN106031079B true CN106031079B (zh) | 2019-10-11 |
Family
ID=49955140
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201480076008.4A Expired - Fee Related CN106031079B (zh) | 2013-12-20 | 2014-12-17 | 加密算法中的运算符提升 |
Country Status (5)
| Country | Link |
|---|---|
| US (1) | US10075290B2 (https=) |
| EP (1) | EP3085004A1 (https=) |
| JP (1) | JP6397921B2 (https=) |
| CN (1) | CN106031079B (https=) |
| WO (1) | WO2015091583A1 (https=) |
Families Citing this family (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| BR112015014470A2 (pt) | 2012-12-21 | 2017-07-11 | Koninklijke Philips Nv | compilador configurado para compilar um programa de computador, dispositivo de computação configurado para executar um programa de computador compilado por um compilador, método para executar um programa de computador compilado por um compilador e programa de computador |
| US10270598B2 (en) * | 2016-08-26 | 2019-04-23 | Intel Corporation | Secure elliptic curve cryptography instructions |
| JP7383985B2 (ja) * | 2019-10-30 | 2023-11-21 | 富士電機株式会社 | 情報処理装置、情報処理方法及びプログラム |
| US12099997B1 (en) | 2020-01-31 | 2024-09-24 | Steven Mark Hoffberg | Tokenized fungible liabilities |
| JP2024545943A (ja) | 2021-11-23 | 2024-12-16 | ストロング フォース ティエクス ポートフォリオ 2018,エルエルシー | システムが他のシステムを含むトランザクションプラットフォーム |
Citations (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2006012638A2 (en) * | 2004-07-29 | 2006-02-02 | Vadium Technology, Inc. | Techniques to strengthen one-time pad encryption |
| WO2006058561A1 (en) * | 2004-12-01 | 2006-06-08 | Telecom Italia S.P.A. | Method and related device for hardware-oriented conversion between arithmetic and boolean random masking |
| CN1890914A (zh) * | 2003-12-11 | 2007-01-03 | 皇家飞利浦电子股份有限公司 | 块加密系统、利用置换隐藏各加密轮的核心加密函数 |
| CN1926800A (zh) * | 2003-10-20 | 2007-03-07 | 伊索普株式会社 | 信息的加密发送接收方法 |
| CN101093627A (zh) * | 2007-08-07 | 2007-12-26 | 威盛电子股份有限公司 | 密码编译码装置 |
| CN101242275A (zh) * | 2008-03-07 | 2008-08-13 | 四川虹微技术有限公司 | 基于流密码加密的安全传输方法 |
| CN101578813A (zh) * | 2007-01-11 | 2009-11-11 | 皇家飞利浦电子股份有限公司 | 跟踪实现的拷贝 |
| CN101969374A (zh) * | 2010-10-27 | 2011-02-09 | 北京航空航天大学 | 分组密码算法中混淆层的实现方法 |
| CN102460404A (zh) * | 2009-06-01 | 2012-05-16 | 起元技术有限责任公司 | 生成混淆数据 |
Family Cites Families (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US3849760A (en) * | 1971-07-12 | 1974-11-19 | Hitachi Ltd | Multi-dimensional pattern recognition processor |
| JP2000115157A (ja) * | 1998-10-02 | 2000-04-21 | Nippon Telegr & Teleph Corp <Ntt> | 紛失通信方法 |
| US6448910B1 (en) * | 2001-03-26 | 2002-09-10 | Morpho Technologies | Method and apparatus for convolution encoding and viterbi decoding of data that utilize a configurable processor to configure a plurality of re-configurable processing elements |
| US20060291650A1 (en) * | 2001-05-22 | 2006-12-28 | Viswanath Ananth | State-varying hybrid stream cipher |
| WO2006046187A1 (en) * | 2004-10-28 | 2006-05-04 | Koninklijke Philips Electronics N.V. | Method and system for obfuscating a cryptographic function |
| JP4618684B2 (ja) * | 2006-06-14 | 2011-01-26 | 日本電信電話株式会社 | 透かし埋め込み処理方法、透かし埋め込み処理システム、サービス提供者装置および顧客装置、並びにプログラム |
| US7630982B2 (en) * | 2007-02-24 | 2009-12-08 | Trend Micro Incorporated | Fast identification of complex strings in a data stream |
| US20080235802A1 (en) * | 2007-03-21 | 2008-09-25 | Microsoft Corporation | Software Tamper Resistance Via Integrity-Checking Expressions |
| US8473751B2 (en) * | 2007-12-13 | 2013-06-25 | Oberthur Technologies | Method for cryptographic data processing, particularly using an S box, and related device and software |
| US8280056B2 (en) * | 2009-01-29 | 2012-10-02 | Fortress Applications Ltd. | System and methods for encryption with authentication integrity |
| WO2010132695A1 (en) * | 2009-05-13 | 2010-11-18 | Daniel Wayne Engels | System and method for securely identifying and authenticating devices in a symmetric encryption system |
| US8718280B2 (en) | 2010-12-17 | 2014-05-06 | Apple Inc. | Securing keys of a cipher using properties of the cipher process |
-
2014
- 2014-12-17 WO PCT/EP2014/078107 patent/WO2015091583A1/en not_active Ceased
- 2014-12-17 JP JP2016540494A patent/JP6397921B2/ja not_active Expired - Fee Related
- 2014-12-17 CN CN201480076008.4A patent/CN106031079B/zh not_active Expired - Fee Related
- 2014-12-17 US US15/104,753 patent/US10075290B2/en not_active Expired - Fee Related
- 2014-12-17 EP EP14821131.1A patent/EP3085004A1/en not_active Withdrawn
Patent Citations (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1926800A (zh) * | 2003-10-20 | 2007-03-07 | 伊索普株式会社 | 信息的加密发送接收方法 |
| CN1890914A (zh) * | 2003-12-11 | 2007-01-03 | 皇家飞利浦电子股份有限公司 | 块加密系统、利用置换隐藏各加密轮的核心加密函数 |
| WO2006012638A2 (en) * | 2004-07-29 | 2006-02-02 | Vadium Technology, Inc. | Techniques to strengthen one-time pad encryption |
| WO2006058561A1 (en) * | 2004-12-01 | 2006-06-08 | Telecom Italia S.P.A. | Method and related device for hardware-oriented conversion between arithmetic and boolean random masking |
| CN101578813A (zh) * | 2007-01-11 | 2009-11-11 | 皇家飞利浦电子股份有限公司 | 跟踪实现的拷贝 |
| CN101093627A (zh) * | 2007-08-07 | 2007-12-26 | 威盛电子股份有限公司 | 密码编译码装置 |
| CN101242275A (zh) * | 2008-03-07 | 2008-08-13 | 四川虹微技术有限公司 | 基于流密码加密的安全传输方法 |
| CN102460404A (zh) * | 2009-06-01 | 2012-05-16 | 起元技术有限责任公司 | 生成混淆数据 |
| CN101969374A (zh) * | 2010-10-27 | 2011-02-09 | 北京航空航天大学 | 分组密码算法中混淆层的实现方法 |
Non-Patent Citations (1)
| Title |
|---|
| efficient aggregation of encrypted data in wireless sensor networks;Claude Castelluccia, Einar Mykletun, Gene Tsudik;《The second annual international conference on Mobile and Ubiquitous System:Networking and Services》;20051121;第1-9页 * |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2015091583A1 (en) | 2015-06-25 |
| CN106031079A (zh) | 2016-10-12 |
| US10075290B2 (en) | 2018-09-11 |
| JP6397921B2 (ja) | 2018-09-26 |
| JP2017501445A (ja) | 2017-01-12 |
| US20160315761A1 (en) | 2016-10-27 |
| EP3085004A1 (en) | 2016-10-26 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12445418B2 (en) | Affine masking for secure encryption schemes | |
| US11323255B2 (en) | Methods and systems for encryption and homomorphic encryption systems using Geometric Algebra and Hensel codes | |
| US7764785B2 (en) | Method for communicating securely over an insecure communication channel | |
| JP5599728B2 (ja) | ホワイトボックス実装 | |
| EP3552338A1 (en) | Method of rsa signature or decryption protected using a homomorphic encryption | |
| US10826694B2 (en) | Method for leakage-resilient distributed function evaluation with CPU-enclaves | |
| US8976960B2 (en) | Methods and apparatus for correlation protected processing of cryptographic operations | |
| JP7123959B2 (ja) | 楕円曲線点乗算デバイス及び方法 | |
| JP6517436B2 (ja) | 暗号化デバイス及び符号化デバイス | |
| JP2012129993A (ja) | 暗号装置の保護方法及び保護システム | |
| CN106031079B (zh) | 加密算法中的运算符提升 | |
| CN115549891B (zh) | 同态加密方法、同态解密方法、同态计算方法及设备 | |
| JP2020515093A (ja) | 符号化加算のための計算デバイス | |
| CN115865348B (zh) | 数据加密方法、同态计算方法及设备 | |
| Reyad et al. | Image encryption using koblitz’s encoding and new mapping method based on elliptic curve random number generator | |
| CN106603224B (zh) | 基于白盒加密的安全运行方法及系统 | |
| JP4706811B2 (ja) | 依頼計算を用いた演算装置、及び記録媒体 | |
| KR20220079522A (ko) | 기하 대수 및 헨젤 코드들을 이용한 암호화를 위한 방법들 및 시스템들과 동형 암호화 시스템들 | |
| US20230379136A1 (en) | Secure provision of keys for fully homomorphic encryption | |
| US12143491B2 (en) | Secured performance of an elliptic curve cryptographic process | |
| CN110874479B (zh) | 安全处理决策树模型的方法、系统、数据终端及处理终端 | |
| Shi et al. | Obfuscatable multi-recipient re-encryption for secure privacy-preserving personal health record services | |
| Chaouch et al. | Enhanced Image Security in Cloud Computing Using Hybrid Encryption with ECC and Spatiotemporal Cryptography | |
| Elamir et al. | Review of Advanced Techniques for Data Security Technology and Applications | |
| Jain et al. | Analysis of Different Cryptographic Algorithms in Cloud-Based Multi-robot Systems |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant | ||
| CF01 | Termination of patent right due to non-payment of annual fee | ||
| CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20191011 Termination date: 20201217 |