CO5300374A1 - Metodo y dispositivo para el control efectivo de la longitud de clave - Google Patents
Metodo y dispositivo para el control efectivo de la longitud de claveInfo
- Publication number
- CO5300374A1 CO5300374A1 CO00029649A CO00029649A CO5300374A1 CO 5300374 A1 CO5300374 A1 CO 5300374A1 CO 00029649 A CO00029649 A CO 00029649A CO 00029649 A CO00029649 A CO 00029649A CO 5300374 A1 CO5300374 A1 CO 5300374A1
- Authority
- CO
- Colombia
- Prior art keywords
- encryption key
- input
- elements
- output
- except
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Accounting & Taxation (AREA)
- General Physics & Mathematics (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Finance (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Lock And Its Accessories (AREA)
- Detection And Prevention Of Errors In Transmission (AREA)
- Computer And Data Communications (AREA)
Abstract
Un dispositivo de comunicación para calcular una clave de cifrado, K'c9 manipulando una clave de cifrado, K'c9 para utilizarse en un algoritmo de encriptado; dicho dispositivo consta de:un elemento de memoria para almacenar uno o más polinomios;una pluralidad de elementos de conmutación, cada uno con una primera entrada, una segunda entrada y una salida, donde dichos elementos de conmutación de primera entrada están conectados a dicho elementos de memoria;una pluralidad de elementos de retardo, cada uno con una entrada y una salida, donde dicha salida de uno de dichos elementos de retardo está conectado a dichos elementos de segundas entradas; yuna pluralidad de funciones de adición, cada una con una primera entrada, una segunda entrada y una salida, donde:dichas primeras entradas de funciones de adición están conectadas a todas excepto a una salida de dichos elementos de retardo,dichas segundas entradas de función de adición están conectadas a todas excepto a una de salidas de dichos elementos, ydichas salidas de función de adición están conectadas a todas excepto a una de dichos entradas de elementos de retardo.1 Un método para calcular una clave de encriptado, K'c(x), para encriptar datos que constan de los siguientes pasos:obtener una clave de cifrado, K'c9;determinar una longitud de clave de cifrado máxima, L; determinar una longitud de clave de encriptado utilizable máxima, Lmaxobtener un polinomio g1(x);obtener un polinomio g2(x), para extender los puntos de partida de dicha clave de encriptado, K'c(x); ycalcular dicha clave de encriptado, K'c9donde K'c(x) = g2(L)(x) [K'c(x) mod g1(L)(x)]. <EMI FILE="00029649_1" ID="1" IMF=JPEG >
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13094499P | 1999-04-26 | 1999-04-26 | |
US09/461,766 US6947560B1 (en) | 1999-04-26 | 1999-12-15 | Method and device for effective key length control |
Publications (1)
Publication Number | Publication Date |
---|---|
CO5300374A1 true CO5300374A1 (es) | 2003-07-31 |
Family
ID=26828998
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CO00029649A CO5300374A1 (es) | 1999-04-26 | 2000-04-25 | Metodo y dispositivo para el control efectivo de la longitud de clave |
Country Status (12)
Country | Link |
---|---|
US (1) | US6947560B1 (es) |
EP (1) | EP1171971B1 (es) |
JP (1) | JP4668428B2 (es) |
CN (2) | CN1332524C (es) |
AR (1) | AR023605A1 (es) |
AT (1) | ATE298481T1 (es) |
AU (1) | AU4913000A (es) |
BR (1) | BR0010029B1 (es) |
CO (1) | CO5300374A1 (es) |
DE (1) | DE60020953T2 (es) |
MY (1) | MY123139A (es) |
WO (1) | WO2000065768A1 (es) |
Families Citing this family (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6931130B1 (en) * | 1999-10-07 | 2005-08-16 | International Business Machines Corporation | Dynamically adjustable software encryption |
US7360121B2 (en) * | 2002-02-22 | 2008-04-15 | Bea Systems, Inc. | System for monitoring a subsystem health |
US7287075B2 (en) * | 2002-02-22 | 2007-10-23 | Bea Systems, Inc. | System for monitoring managed server health |
JP4655452B2 (ja) * | 2003-03-24 | 2011-03-23 | 富士ゼロックス株式会社 | 情報処理装置 |
EP1629626B1 (en) * | 2003-05-23 | 2008-02-27 | Nxp B.V. | Method and apparatus for a low memory hardware implementation of the key expansion function |
US7570641B2 (en) * | 2005-08-23 | 2009-08-04 | Macrovision Corporation | Techniques for watermarking and distributing content |
US8183980B2 (en) * | 2005-08-31 | 2012-05-22 | Assa Abloy Ab | Device authentication using a unidirectional protocol |
US7873166B2 (en) * | 2005-09-13 | 2011-01-18 | Avaya Inc. | Method for undetectably impeding key strength of encryption usage for products exported outside the U.S |
US20080037775A1 (en) * | 2006-03-31 | 2008-02-14 | Avaya Technology Llc | Verifiable generation of weak symmetric keys for strong algorithms |
WO2010019593A1 (en) | 2008-08-11 | 2010-02-18 | Assa Abloy Ab | Secure wiegand communications |
US20170070481A1 (en) * | 2015-09-03 | 2017-03-09 | Pilixo Limited | Communication channel security against packet sniffing |
US10452877B2 (en) | 2016-12-16 | 2019-10-22 | Assa Abloy Ab | Methods to combine and auto-configure wiegand and RS485 |
US11621837B2 (en) | 2020-09-03 | 2023-04-04 | Theon Technology Llc | Secure encryption of data using partial-key cryptography |
US11310042B2 (en) | 2020-09-11 | 2022-04-19 | Crown Sterling Limited, LLC | Methods of storing and distributing large keys |
US11552780B2 (en) | 2020-12-23 | 2023-01-10 | Theon Technologies, Inc. | Homomorphic one-time pad encryption |
US11755772B2 (en) | 2021-09-20 | 2023-09-12 | Crown Sterling Limited, LLC | Securing data in a blockchain with a one-time pad |
US11943336B2 (en) | 2021-11-22 | 2024-03-26 | Theon Technology Llc | Use of gradient decent function in cryptography |
US11791988B2 (en) | 2021-11-22 | 2023-10-17 | Theon Technology Llc | Use of random entropy in cryptography |
US11902420B2 (en) | 2021-11-23 | 2024-02-13 | Theon Technology Llc | Partial cryptographic key transport using one-time pad encryption |
Family Cites Families (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE3371947D1 (en) * | 1982-12-20 | 1987-07-09 | Radiotechnique Sa | Generator of random number sequences |
US4797921A (en) * | 1984-11-13 | 1989-01-10 | Hitachi, Ltd. | System for enciphering or deciphering data |
JPH0727325B2 (ja) * | 1987-02-13 | 1995-03-29 | 沖電気工業株式会社 | 暗号化装置 |
US5008938A (en) * | 1990-03-09 | 1991-04-16 | Motorola, Inc. | Encryption apparatus |
US5199072A (en) | 1992-02-03 | 1993-03-30 | Motorola, Inc. | Method and apparatus for restricting access within a wireless local area network |
US5278905A (en) | 1992-05-13 | 1994-01-11 | At&T Bell Laboratories | Method and apparatus for processor base encryption |
US5323464A (en) * | 1992-10-16 | 1994-06-21 | International Business Machines Corporation | Commercial data masking |
US5345507A (en) * | 1993-09-08 | 1994-09-06 | International Business Machines Corporation | Secure message authentication for binary additive stream cipher systems |
US5799087A (en) * | 1994-04-28 | 1998-08-25 | Citibank, N.A. | Electronic-monetary system |
CN1089205C (zh) * | 1994-09-24 | 2002-08-14 | 西安电子科技大学 | 一种高速数据置乱方法 |
EP1526472A3 (en) * | 1995-02-13 | 2006-07-26 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US5729559A (en) * | 1995-03-27 | 1998-03-17 | Motorola, Inc. | Method and apparatus for correcting errors using multiple estimates |
US5778074A (en) * | 1995-06-29 | 1998-07-07 | Teledyne Industries, Inc. | Methods for generating variable S-boxes from arbitrary keys of arbitrary length including methods which allow rapid key changes |
CN1155192C (zh) * | 1995-07-27 | 2004-06-23 | 通用仪器公司 | 为加密处理信息提供密码密钥的方法和装置 |
US5657390A (en) * | 1995-08-25 | 1997-08-12 | Netscape Communications Corporation | Secure socket layer application program apparatus and method |
US5631962A (en) | 1995-10-23 | 1997-05-20 | Motorola, Inc. | Circuit and method of encrypting key validation |
US5724428A (en) * | 1995-11-01 | 1998-03-03 | Rsa Data Security, Inc. | Block encryption algorithm with data-dependent rotations |
US5727063A (en) * | 1995-11-27 | 1998-03-10 | Bell Communications Research, Inc. | Pseudo-random generator |
US5883956A (en) | 1996-03-28 | 1999-03-16 | National Semiconductor Corporation | Dynamic configuration of a secure processing unit for operations in various environments |
EP0891663A1 (en) * | 1996-04-01 | 1999-01-20 | Hewlett-Packard Company | Transmitting messages over a network |
US5815573A (en) * | 1996-04-10 | 1998-09-29 | International Business Machines Corporation | Cryptographic key recovery system |
US5710814A (en) * | 1996-07-23 | 1998-01-20 | Cheyenne Property Trust | Cryptographic unit touch point logic |
US5850443A (en) * | 1996-08-15 | 1998-12-15 | Entrust Technologies, Ltd. | Key management system for mixed-trust environments |
US5862159A (en) * | 1996-09-11 | 1999-01-19 | Texas Instruments Incorporated | Parallelized cyclical redundancy check method |
US5937066A (en) * | 1996-10-02 | 1999-08-10 | International Business Machines Corporation | Two-phase cryptographic key recovery system |
US6252958B1 (en) * | 1997-09-22 | 2001-06-26 | Qualcomm Incorporated | Method and apparatus for generating encryption stream ciphers |
-
1999
- 1999-12-15 US US09/461,766 patent/US6947560B1/en not_active Expired - Lifetime
-
2000
- 2000-04-11 JP JP2000614599A patent/JP4668428B2/ja not_active Expired - Lifetime
- 2000-04-11 WO PCT/EP2000/003284 patent/WO2000065768A1/en active IP Right Grant
- 2000-04-11 CN CNB2004100493185A patent/CN1332524C/zh not_active Expired - Lifetime
- 2000-04-11 CN CNB008067570A patent/CN1282323C/zh not_active Expired - Lifetime
- 2000-04-11 DE DE60020953T patent/DE60020953T2/de not_active Expired - Lifetime
- 2000-04-11 EP EP00931061A patent/EP1171971B1/en not_active Expired - Lifetime
- 2000-04-11 BR BRPI0010029-3A patent/BR0010029B1/pt active IP Right Grant
- 2000-04-11 AT AT00931061T patent/ATE298481T1/de not_active IP Right Cessation
- 2000-04-11 AU AU49130/00A patent/AU4913000A/en not_active Abandoned
- 2000-04-21 MY MYPI20001740A patent/MY123139A/en unknown
- 2000-04-25 CO CO00029649A patent/CO5300374A1/es not_active Application Discontinuation
- 2000-04-26 AR ARP000101976A patent/AR023605A1/es unknown
Also Published As
Publication number | Publication date |
---|---|
ATE298481T1 (de) | 2005-07-15 |
CN1332524C (zh) | 2007-08-15 |
CN1558592A (zh) | 2004-12-29 |
WO2000065768A1 (en) | 2000-11-02 |
AU4913000A (en) | 2000-11-10 |
DE60020953T2 (de) | 2005-12-01 |
CN1282323C (zh) | 2006-10-25 |
JP4668428B2 (ja) | 2011-04-13 |
JP2002543667A (ja) | 2002-12-17 |
BR0010029B1 (pt) | 2014-02-04 |
AR023605A1 (es) | 2002-09-04 |
EP1171971A1 (en) | 2002-01-16 |
US6947560B1 (en) | 2005-09-20 |
BR0010029A (pt) | 2002-01-15 |
MY123139A (en) | 2006-05-31 |
EP1171971B1 (en) | 2005-06-22 |
CN1348646A (zh) | 2002-05-08 |
DE60020953D1 (de) | 2005-07-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CO5300374A1 (es) | Metodo y dispositivo para el control efectivo de la longitud de clave | |
JP2004505289A5 (es) | ||
KR101655637B1 (ko) | 가변 회로 토폴로지를 가지는 고활용도 범용 로직 어레이 및 상수 전력 시그니처를 가지는 다양한 로직 게이트를 실현하기 위한 로지스틱 맵 회로 | |
US6078667A (en) | Generating unique and unpredictable values | |
WO2002033883A3 (en) | Generation of a common encryption key | |
DE69723872D1 (de) | Aufbau eines zyklotomischen polynoms eines kryptosystems basierend auf dem diskreten logarithmus über endliche körper | |
US20070098153A1 (en) | Cryptographic processing apparatus | |
FR2728981B1 (es) | ||
WO2000051244A8 (en) | A fuzzy commitment scheme | |
SE9801738L (sv) | Lågeffekträknare | |
DE60315167D1 (de) | Tastaturverbesserungen | |
Purohit et al. | FPGA Implementation of the AES Algorithm with Lightweight LFSR-Based Approach and Optimized Key Expansion | |
US8577942B2 (en) | Electronic device and data processing device for implementing cryptographic algorithms | |
KR100478974B1 (ko) | 직렬 유한체 승산기 | |
Dey | SD-AREE-I Cipher: Amalgamation of Bit Manipulation, Modified VERNAM CIPHER & Modified Caesar Cipher (SD-AREE) | |
US9257988B2 (en) | Configurable decoder with applications in FPGAs | |
Fúster-Sabater et al. | Linear solutions for cryptographic nonlinear sequence generators | |
ATE320628T1 (de) | Zufallssignalgenerator | |
JP2004118651A (ja) | 乱数発生方法及び乱数発生装置 | |
Rueppel | Key agreements based on function composition | |
Zhang et al. | Tight lower bound of consecutive lengths for QC-LDPC codes with girth at least ten | |
Li et al. | Research and implementation of A reconfigurable low power E0 algorithm | |
SE0001917D0 (sv) | A scrambler and a method of scrambling data words | |
Xie et al. | LLPA: A protocol for high speed packet authentication | |
WO2009030857A3 (fr) | Generateur et procede de generation de fonction pseudo-aleatoire a cle secrete |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FA | Application withdrawn |