CO5300374A1 - Metodo y dispositivo para el control efectivo de la longitud de clave - Google Patents

Metodo y dispositivo para el control efectivo de la longitud de clave

Info

Publication number
CO5300374A1
CO5300374A1 CO00029649A CO00029649A CO5300374A1 CO 5300374 A1 CO5300374 A1 CO 5300374A1 CO 00029649 A CO00029649 A CO 00029649A CO 00029649 A CO00029649 A CO 00029649A CO 5300374 A1 CO5300374 A1 CO 5300374A1
Authority
CO
Colombia
Prior art keywords
encryption key
input
elements
output
except
Prior art date
Application number
CO00029649A
Other languages
English (en)
Inventor
Ben Smeets
Mattias Hansson
Joakim Persson
Original Assignee
Ericsson Telefon Ab L M
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ericsson Telefon Ab L M filed Critical Ericsson Telefon Ab L M
Publication of CO5300374A1 publication Critical patent/CO5300374A1/es

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Lock And Its Accessories (AREA)
  • Detection And Prevention Of Errors In Transmission (AREA)
  • Computer And Data Communications (AREA)

Abstract

Un dispositivo de comunicación para calcular una clave de cifrado, K'c9 manipulando una clave de cifrado, K'c9 para utilizarse en un algoritmo de encriptado; dicho dispositivo consta de:un elemento de memoria para almacenar uno o más polinomios;una pluralidad de elementos de conmutación, cada uno con una primera entrada, una segunda entrada y una salida, donde dichos elementos de conmutación de primera entrada están conectados a dicho elementos de memoria;una pluralidad de elementos de retardo, cada uno con una entrada y una salida, donde dicha salida de uno de dichos elementos de retardo está conectado a dichos elementos de segundas entradas; yuna pluralidad de funciones de adición, cada una con una primera entrada, una segunda entrada y una salida, donde:dichas primeras entradas de funciones de adición están conectadas a todas excepto a una salida de dichos elementos de retardo,dichas segundas entradas de función de adición están conectadas a todas excepto a una de salidas de dichos elementos, ydichas salidas de función de adición están conectadas a todas excepto a una de dichos entradas de elementos de retardo.1 Un método para calcular una clave de encriptado, K'c(x), para encriptar datos que constan de los siguientes pasos:obtener una clave de cifrado, K'c9;determinar una longitud de clave de cifrado máxima, L; determinar una longitud de clave de encriptado utilizable máxima, Lmaxobtener un polinomio g1(x);obtener un polinomio g2(x), para extender los puntos de partida de dicha clave de encriptado, K'c(x); ycalcular dicha clave de encriptado, K'c9donde K'c(x) = g2(L)(x) [K'c(x) mod g1(L)(x)]. <EMI FILE="00029649_1" ID="1" IMF=JPEG >
CO00029649A 1999-04-26 2000-04-25 Metodo y dispositivo para el control efectivo de la longitud de clave CO5300374A1 (es)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US13094499P 1999-04-26 1999-04-26
US09/461,766 US6947560B1 (en) 1999-04-26 1999-12-15 Method and device for effective key length control

Publications (1)

Publication Number Publication Date
CO5300374A1 true CO5300374A1 (es) 2003-07-31

Family

ID=26828998

Family Applications (1)

Application Number Title Priority Date Filing Date
CO00029649A CO5300374A1 (es) 1999-04-26 2000-04-25 Metodo y dispositivo para el control efectivo de la longitud de clave

Country Status (12)

Country Link
US (1) US6947560B1 (es)
EP (1) EP1171971B1 (es)
JP (1) JP4668428B2 (es)
CN (2) CN1332524C (es)
AR (1) AR023605A1 (es)
AT (1) ATE298481T1 (es)
AU (1) AU4913000A (es)
BR (1) BR0010029B1 (es)
CO (1) CO5300374A1 (es)
DE (1) DE60020953T2 (es)
MY (1) MY123139A (es)
WO (1) WO2000065768A1 (es)

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6931130B1 (en) 1999-10-07 2005-08-16 International Business Machines Corporation Dynamically adjustable software encryption
US7287075B2 (en) * 2002-02-22 2007-10-23 Bea Systems, Inc. System for monitoring managed server health
US7360121B2 (en) * 2002-02-22 2008-04-15 Bea Systems, Inc. System for monitoring a subsystem health
JP4655452B2 (ja) * 2003-03-24 2011-03-23 富士ゼロックス株式会社 情報処理装置
WO2004105306A1 (en) * 2003-05-23 2004-12-02 Koninklijke Philips Electronics N.V. Method and apparatus for a low memory hardware implementation of the key expansion function
US7570641B2 (en) * 2005-08-23 2009-08-04 Macrovision Corporation Techniques for watermarking and distributing content
US8183980B2 (en) * 2005-08-31 2012-05-22 Assa Abloy Ab Device authentication using a unidirectional protocol
US7873166B2 (en) * 2005-09-13 2011-01-18 Avaya Inc. Method for undetectably impeding key strength of encryption usage for products exported outside the U.S
US20080037775A1 (en) * 2006-03-31 2008-02-14 Avaya Technology Llc Verifiable generation of weak symmetric keys for strong algorithms
WO2010019593A1 (en) 2008-08-11 2010-02-18 Assa Abloy Ab Secure wiegand communications
US20170070481A1 (en) * 2015-09-03 2017-03-09 Pilixo Limited Communication channel security against packet sniffing
US10452877B2 (en) 2016-12-16 2019-10-22 Assa Abloy Ab Methods to combine and auto-configure wiegand and RS485
US11621837B2 (en) 2020-09-03 2023-04-04 Theon Technology Llc Secure encryption of data using partial-key cryptography
US11310042B2 (en) 2020-09-11 2022-04-19 Crown Sterling Limited, LLC Methods of storing and distributing large keys
US11552780B2 (en) 2020-12-23 2023-01-10 Theon Technologies, Inc. Homomorphic one-time pad encryption
US11755772B2 (en) 2021-09-20 2023-09-12 Crown Sterling Limited, LLC Securing data in a blockchain with a one-time pad
US11791988B2 (en) 2021-11-22 2023-10-17 Theon Technology Llc Use of random entropy in cryptography
US11943336B2 (en) 2021-11-22 2024-03-26 Theon Technology Llc Use of gradient decent function in cryptography
US11902420B2 (en) 2021-11-23 2024-02-13 Theon Technology Llc Partial cryptographic key transport using one-time pad encryption

Family Cites Families (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3371947D1 (en) * 1982-12-20 1987-07-09 Radiotechnique Sa Generator of random number sequences
US4797921A (en) * 1984-11-13 1989-01-10 Hitachi, Ltd. System for enciphering or deciphering data
JPH0727325B2 (ja) * 1987-02-13 1995-03-29 沖電気工業株式会社 暗号化装置
US5008938A (en) * 1990-03-09 1991-04-16 Motorola, Inc. Encryption apparatus
US5199072A (en) 1992-02-03 1993-03-30 Motorola, Inc. Method and apparatus for restricting access within a wireless local area network
US5278905A (en) 1992-05-13 1994-01-11 At&T Bell Laboratories Method and apparatus for processor base encryption
US5323464A (en) * 1992-10-16 1994-06-21 International Business Machines Corporation Commercial data masking
US5345507A (en) * 1993-09-08 1994-09-06 International Business Machines Corporation Secure message authentication for binary additive stream cipher systems
US5799087A (en) * 1994-04-28 1998-08-25 Citibank, N.A. Electronic-monetary system
CN1089205C (zh) * 1994-09-24 2002-08-14 西安电子科技大学 一种高速数据置乱方法
CN100365535C (zh) * 1995-02-13 2008-01-30 英特特拉斯特技术公司 用于安全交易管理和电子权利保护的系统和方法
US5729559A (en) * 1995-03-27 1998-03-17 Motorola, Inc. Method and apparatus for correcting errors using multiple estimates
US5778074A (en) * 1995-06-29 1998-07-07 Teledyne Industries, Inc. Methods for generating variable S-boxes from arbitrary keys of arbitrary length including methods which allow rapid key changes
KR19990035965A (ko) * 1995-07-27 1999-05-25 맥클린토크 샤운 엘 은폐된 작업인자를 가진 암호시스템
US5657390A (en) * 1995-08-25 1997-08-12 Netscape Communications Corporation Secure socket layer application program apparatus and method
US5631962A (en) 1995-10-23 1997-05-20 Motorola, Inc. Circuit and method of encrypting key validation
US5724428A (en) * 1995-11-01 1998-03-03 Rsa Data Security, Inc. Block encryption algorithm with data-dependent rotations
US5727063A (en) * 1995-11-27 1998-03-10 Bell Communications Research, Inc. Pseudo-random generator
US5883956A (en) 1996-03-28 1999-03-16 National Semiconductor Corporation Dynamic configuration of a secure processing unit for operations in various environments
WO1997037461A1 (en) * 1996-04-01 1997-10-09 Hewlett-Packard Company Transmitting messages over a network
US5815573A (en) * 1996-04-10 1998-09-29 International Business Machines Corporation Cryptographic key recovery system
US5710814A (en) * 1996-07-23 1998-01-20 Cheyenne Property Trust Cryptographic unit touch point logic
US5850443A (en) * 1996-08-15 1998-12-15 Entrust Technologies, Ltd. Key management system for mixed-trust environments
US5862159A (en) * 1996-09-11 1999-01-19 Texas Instruments Incorporated Parallelized cyclical redundancy check method
US5937066A (en) * 1996-10-02 1999-08-10 International Business Machines Corporation Two-phase cryptographic key recovery system
US6252958B1 (en) * 1997-09-22 2001-06-26 Qualcomm Incorporated Method and apparatus for generating encryption stream ciphers

Also Published As

Publication number Publication date
CN1558592A (zh) 2004-12-29
US6947560B1 (en) 2005-09-20
BR0010029B1 (pt) 2014-02-04
AU4913000A (en) 2000-11-10
DE60020953T2 (de) 2005-12-01
AR023605A1 (es) 2002-09-04
EP1171971A1 (en) 2002-01-16
EP1171971B1 (en) 2005-06-22
CN1348646A (zh) 2002-05-08
JP4668428B2 (ja) 2011-04-13
MY123139A (en) 2006-05-31
BR0010029A (pt) 2002-01-15
CN1332524C (zh) 2007-08-15
WO2000065768A1 (en) 2000-11-02
ATE298481T1 (de) 2005-07-15
DE60020953D1 (de) 2005-07-28
CN1282323C (zh) 2006-10-25
JP2002543667A (ja) 2002-12-17

Similar Documents

Publication Publication Date Title
CO5300374A1 (es) Metodo y dispositivo para el control efectivo de la longitud de clave
JP2004505289A5 (es)
KR101655637B1 (ko) 가변 회로 토폴로지를 가지는 고활용도 범용 로직 어레이 및 상수 전력 시그니처를 가지는 다양한 로직 게이트를 실현하기 위한 로지스틱 맵 회로
US6078667A (en) Generating unique and unpredictable values
WO2002033883A3 (en) Generation of a common encryption key
ATE246418T1 (de) Aufbau eines zyklotomischen polynoms eines kryptosystems basierend auf dem diskreten logarithmus über endliche körper
US20070098153A1 (en) Cryptographic processing apparatus
WO2002079957A3 (en) Power saving in computing applications
CN100492965C (zh) 序列产生器
FR2728981B1 (es)
CY1114077T1 (el) Συσκευη και μεθοδος στροβιλο - παρεμβολης
WO2005038641A3 (en) Data security
DE69805155D1 (de) Integrierte Schaltung und Chipkarte mit einer solchen Schaltung
SE9801738L (sv) Lågeffekträknare
Dey SD-AREE-I Cipher: Amalgamation of Bit Manipulation, Modified VERNAM CIPHER & Modified Caesar Cipher (SD-AREE)
EP1764762A1 (en) Electronic element and data processing method
SE9801781L (sv) Linjärt återkopplade skiftregister med låg effekt
US9257988B2 (en) Configurable decoder with applications in FPGAs
DE50302669D1 (de) Zufallssignalgenerator
Stankovic Fourier decision diagrams on finite non-Abelian groups with preprocessing
Purohit et al. FPGA Implementation of the AES Algorithm with Lightweight LFSR-Based Approach and Optimized Key Expansion
Li et al. An algorithm for constructing a minimal register with non-linear update generating a given sequence
Fisher et al. Generation of finite inductive, pseudo random, binary sequences
Zhang et al. Tight lower bound of consecutive lengths for QC-LDPC codes with girth at least ten
Rueppel Key agreements based on function composition

Legal Events

Date Code Title Description
FA Application withdrawn