CN1360771A - 自验证加密文本链 - Google Patents
自验证加密文本链 Download PDFInfo
- Publication number
- CN1360771A CN1360771A CN00808581A CN00808581A CN1360771A CN 1360771 A CN1360771 A CN 1360771A CN 00808581 A CN00808581 A CN 00808581A CN 00808581 A CN00808581 A CN 00808581A CN 1360771 A CN1360771 A CN 1360771A
- Authority
- CN
- China
- Prior art keywords
- message
- len
- key
- encryption
- piece
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 claims description 13
- 238000013459 approach Methods 0.000 abstract 1
- 238000004891 communication Methods 0.000 description 3
- 238000011156 evaluation Methods 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000000712 assembly Effects 0.000 description 1
- 238000000429 assembly Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Abstract
Description
Claims (1)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13841299P | 1999-06-08 | 1999-06-08 | |
US60/138,412 | 1999-06-08 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1360771A true CN1360771A (zh) | 2002-07-24 |
CN1160900C CN1160900C (zh) | 2004-08-04 |
Family
ID=22481885
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB008085811A Expired - Lifetime CN1160900C (zh) | 1999-06-08 | 2000-06-08 | 自验证加密文本链 |
Country Status (8)
Country | Link |
---|---|
US (1) | US7450717B1 (zh) |
EP (1) | EP1190524A1 (zh) |
KR (1) | KR20020016636A (zh) |
CN (1) | CN1160900C (zh) |
AU (1) | AU775055B2 (zh) |
CA (1) | CA2373787C (zh) |
TW (1) | TW496054B (zh) |
WO (1) | WO2000076118A1 (zh) |
Families Citing this family (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3305538B2 (ja) * | 1994-10-25 | 2002-07-22 | キユーピー株式会社 | 卵殻と卵殻膜との分離方法およびその装置 |
US7391865B2 (en) | 1999-09-20 | 2008-06-24 | Security First Corporation | Secure data parser method and system |
US7200227B2 (en) * | 2001-07-30 | 2007-04-03 | Phillip Rogaway | Method and apparatus for facilitating efficient authenticated encryption |
BRPI0517026A (pt) | 2004-10-25 | 2008-09-30 | Rick L Orsini | método e sistema analisador de dados seguros |
KR100736047B1 (ko) * | 2005-07-28 | 2007-07-06 | 삼성전자주식회사 | 무선 네트워크 장치 및 이를 이용한 인증 방법 |
US8345713B2 (en) * | 2006-10-25 | 2013-01-01 | Verizon Patent And Licensing Inc. | Methods and apparatus for content scrambling in a communications system |
EP2100404B1 (en) | 2006-11-07 | 2016-01-27 | Security First Corp. | Systems and methods for distributing and securing data |
CA2670597A1 (en) | 2006-12-05 | 2008-06-12 | Don Martin | Improved tape backup method using a secure data parser |
BRPI0816772A2 (pt) | 2007-09-14 | 2015-03-24 | Security First Corp | Sistemas e métodos para controlar chaves criptográficas |
US20090168994A1 (en) * | 2007-12-26 | 2009-07-02 | Heuss Michael R | Method for providing stronger encryption using conventional ciphers |
ES2449790T3 (es) | 2008-02-22 | 2014-03-21 | Security First Corp. | Sistemas y métodos para la gestión y la comunicación seguras en un grupo de trabajo |
US10169598B1 (en) | 2008-04-10 | 2019-01-01 | United Services Automobile Association | Systems and methods for sending and receiving encrypted submessages |
US20090316905A1 (en) * | 2008-06-19 | 2009-12-24 | Amjad Qureshi | Key exchange through a scramble methodology and system |
CA2760251A1 (en) | 2009-05-19 | 2010-11-25 | Security First Corp. | Systems and methods for securing data in the cloud |
WO2011068738A2 (en) | 2009-11-25 | 2011-06-09 | Orsini Rick L | Systems and methods for securing data in motion |
CA2788697C (en) * | 2010-02-09 | 2017-06-27 | Certicom Corp. | Device and method for implementing a cryptographic hash function |
US9443097B2 (en) | 2010-03-31 | 2016-09-13 | Security First Corp. | Systems and methods for securing data in motion |
US8948376B2 (en) | 2010-05-11 | 2015-02-03 | Ca, Inc. | Format-preserving encryption via rotating block encryption |
CN103238305A (zh) | 2010-05-28 | 2013-08-07 | 安全第一公司 | 用于安全数据储存的加速器系统 |
US8687803B2 (en) * | 2011-09-14 | 2014-04-01 | Apple Inc. | Operational mode for block ciphers |
CA2900504A1 (en) | 2013-02-13 | 2014-08-21 | Security First Corp. | Systems and methods for a cryptographic file system layer |
US9733849B2 (en) | 2014-11-21 | 2017-08-15 | Security First Corp. | Gateway for cloud-based secure storage |
US11038668B2 (en) * | 2015-05-17 | 2021-06-15 | Gideon Samid | Transposition encryption alphabet method (TEAM) |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2677200B1 (fr) | 1991-05-30 | 1993-09-17 | Besnard Christian | Dispositif de securisation de donnees numeriques. |
US5265164A (en) * | 1991-10-31 | 1993-11-23 | International Business Machines Corporation | Cryptographic facility environment backup/restore and replication in a public key cryptosystem |
US5491749A (en) * | 1993-12-30 | 1996-02-13 | International Business Machines Corporation | Method and apparatus for entity authentication and key distribution secure against off-line adversarial attacks |
GB2288519A (en) * | 1994-04-05 | 1995-10-18 | Ibm | Data encryption |
US5495533A (en) | 1994-04-29 | 1996-02-27 | International Business Machines Corporation | Personal key archive |
US5619575A (en) * | 1994-08-22 | 1997-04-08 | United Technologies Automotive, Inc. | Pseudorandom composition-based cryptographic authentication process |
US6333983B1 (en) * | 1997-12-16 | 2001-12-25 | International Business Machines Corporation | Method and apparatus for performing strong encryption or decryption data using special encryption functions |
-
2000
- 2000-06-07 US US09/588,828 patent/US7450717B1/en not_active Expired - Lifetime
- 2000-06-08 AU AU56019/00A patent/AU775055B2/en not_active Ceased
- 2000-06-08 EP EP00941297A patent/EP1190524A1/en not_active Withdrawn
- 2000-06-08 CN CNB008085811A patent/CN1160900C/zh not_active Expired - Lifetime
- 2000-06-08 CA CA002373787A patent/CA2373787C/en not_active Expired - Lifetime
- 2000-06-08 WO PCT/US2000/015869 patent/WO2000076118A1/en not_active Application Discontinuation
- 2000-06-08 TW TW089111170A patent/TW496054B/zh not_active IP Right Cessation
- 2000-06-08 KR KR1020017015658A patent/KR20020016636A/ko not_active Application Discontinuation
Also Published As
Publication number | Publication date |
---|---|
US7450717B1 (en) | 2008-11-11 |
CN1160900C (zh) | 2004-08-04 |
CA2373787A1 (en) | 2000-12-14 |
AU775055B2 (en) | 2004-07-15 |
CA2373787C (en) | 2008-09-09 |
AU5601900A (en) | 2000-12-28 |
EP1190524A1 (en) | 2002-03-27 |
TW496054B (en) | 2002-07-21 |
KR20020016636A (ko) | 2002-03-04 |
WO2000076118A1 (en) | 2000-12-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1160900C (zh) | 自验证加密文本链 | |
CN1682479B (zh) | 用于数据处理系统的加密和认证/解密和验证的方法和设备 | |
US5764772A (en) | Differential work factor cryptography method and system | |
US7499551B1 (en) | Public key infrastructure utilizing master key encryption | |
CN100536393C (zh) | 一种基于秘密共享密码机制的用户管理方法 | |
US7110539B1 (en) | Method and apparatus for encrypting and decrypting data | |
WO2008156452A1 (en) | System and method of per-packet keying | |
US7254233B2 (en) | Fast encryption and authentication for data processing systems | |
CN102664740A (zh) | 一种基于远程授权的招投标文件加解密方法 | |
US7894608B2 (en) | Secure approach to send data from one system to another | |
CN110691098A (zh) | 民爆信息多重加密通讯方法 | |
CN112347493A (zh) | 一种ofd文档加解密和脱密变灰方法 | |
US6542607B1 (en) | Device and method for the cryptographic processing of a digital data stream presenting any number of data | |
KR100551992B1 (ko) | 어플리케이션 데이터의 암호화 및 복호화 방법 | |
Rajasekar et al. | Introduction to Classical Cryptography | |
Keerthan et al. | Analysis of Key Based Cryptographic Algorithms and its Applications | |
KR100388059B1 (ko) | 비대칭키 암호 알고리즘을 이용한 데이터 암호화 시스템및 그 방법 | |
GB2264423A (en) | Devices for implementing public key cryptography and digital signatures | |
Mishra et al. | Comparative Study Of Efficient Data Hiding Techniques | |
US20040264702A1 (en) | Method and apparatus for producing cryptographic keys | |
Oberoi et al. | A Survey on Cryptography, Encryption and Compression Techniques. | |
Limbong et al. | IMPLEMENTATION OF ELGAMAL AND LEAST SIGNIFICANT BIT (LSB) ALGORITHM FOR ENDING AND HIDDEN MESSAGES IN DIGITAL IMAGES | |
Martin | Cryptographic Controls: The Heart of Cybersecurity | |
CN1084564C (zh) | 无需事先分配通讯密钥的密钥信托系统与方法 | |
Pandey et al. | A Modified Approach For Cryptograpic Hash Function Based On MD5 Algorithm |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
ASS | Succession or assignment of patent right |
Owner name: GENERAL MATERIAL HOLDING CO., LTD. Free format text: FORMER OWNER: GENERAL INSTRUMENT CORP. Effective date: 20130917 |
|
C41 | Transfer of patent application or patent right or utility model | ||
TR01 | Transfer of patent right |
Effective date of registration: 20130917 Address after: American California Patentee after: General Equipment Holdings Ltd Address before: American Pennsylvania Patentee before: General Instrument Corp. |
|
ASS | Succession or assignment of patent right |
Owner name: MOTOROLA MOBILITY LLC Free format text: FORMER OWNER: GENERAL MATERIAL HOLDING CO., LTD. Effective date: 20131101 |
|
C41 | Transfer of patent application or patent right or utility model | ||
TR01 | Transfer of patent right |
Effective date of registration: 20131101 Address after: Illinois State Patentee after: Motorola Mobility, Inc. Address before: American California Patentee before: General Equipment Holdings Ltd |
|
C41 | Transfer of patent application or patent right or utility model | ||
TR01 | Transfer of patent right |
Effective date of registration: 20160301 Address after: American California Patentee after: Technology Holdings Co., Ltd of Google Address before: Illinois State Patentee before: Motorola Mobility, Inc. |
|
CX01 | Expiry of patent term | ||
CX01 | Expiry of patent term |
Granted publication date: 20040804 |