DE60026868T2 - Ein einfaches implementierungsverfahren für kryptographische primitiva mittels elementar-register-operationen - Google Patents
Ein einfaches implementierungsverfahren für kryptographische primitiva mittels elementar-register-operationen Download PDFInfo
- Publication number
- DE60026868T2 DE60026868T2 DE60026868T DE60026868T DE60026868T2 DE 60026868 T2 DE60026868 T2 DE 60026868T2 DE 60026868 T DE60026868 T DE 60026868T DE 60026868 T DE60026868 T DE 60026868T DE 60026868 T2 DE60026868 T2 DE 60026868T2
- Authority
- DE
- Germany
- Prior art keywords
- mod
- ciphertext
- plaintext
- predefined
- order
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
- 238000000034 method Methods 0.000 title claims abstract description 99
- 230000006870 function Effects 0.000 claims description 12
- 238000007792 addition Methods 0.000 claims description 8
- 238000004364 calculation method Methods 0.000 claims description 7
- 230000002441 reversible effect Effects 0.000 claims description 7
- 238000004590 computer program Methods 0.000 claims 4
- 230000004044 response Effects 0.000 claims 2
- 238000004891 communication Methods 0.000 description 11
- 238000010586 diagram Methods 0.000 description 6
- 230000014509 gene expression Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 230000015572 biosynthetic process Effects 0.000 description 2
- 238000013478 data encryption standard Methods 0.000 description 2
- 239000000284 extract Substances 0.000 description 2
- 238000005755 formation reaction Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000002411 adverse Effects 0.000 description 1
- 230000006735 deficit Effects 0.000 description 1
- 239000002360 explosive Substances 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000007620 mathematical function Methods 0.000 description 1
- 230000000135 prohibitive effect Effects 0.000 description 1
- 230000003252 repetitive effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
- Synchronisation In Digital Transmission Systems (AREA)
- Mobile Radio Communication Systems (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US329139 | 1999-06-09 | ||
| US09/329,139 US6570988B1 (en) | 1999-06-09 | 1999-06-09 | Simple technique for implementing a cryptographic primitive using elementary register operations |
| PCT/US2000/016035 WO2000078118A2 (en) | 1999-06-09 | 2000-06-09 | Implementing a cryptographic primitive using elementary register operations |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| DE60026868D1 DE60026868D1 (de) | 2006-05-11 |
| DE60026868T2 true DE60026868T2 (de) | 2006-09-07 |
Family
ID=23284020
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| DE60026868T Expired - Lifetime DE60026868T2 (de) | 1999-06-09 | 2000-06-09 | Ein einfaches implementierungsverfahren für kryptographische primitiva mittels elementar-register-operationen |
Country Status (7)
| Country | Link |
|---|---|
| US (1) | US6570988B1 (enExample) |
| EP (1) | EP1468521B1 (enExample) |
| JP (1) | JP4559679B2 (enExample) |
| AT (1) | ATE321394T1 (enExample) |
| AU (1) | AU7981600A (enExample) |
| DE (1) | DE60026868T2 (enExample) |
| WO (1) | WO2000078118A2 (enExample) |
Families Citing this family (28)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6483918B2 (en) * | 1999-06-09 | 2002-11-19 | Microsoft Corporation | Technique for producing a parameter, such as a checksum, through a primitive that uses elementary register operations |
| US6657625B1 (en) * | 1999-06-09 | 2003-12-02 | Microsoft Corporation | System and method of caching glyphs for display by a remote terminal |
| US7505046B1 (en) | 2000-05-02 | 2009-03-17 | Adobe Systems Incorporated | Preserving opaque-like rendering in transparent 2D graphics using knockout groups |
| JP4045777B2 (ja) * | 2001-10-30 | 2008-02-13 | 株式会社日立製作所 | 情報処理装置 |
| US7068785B2 (en) * | 2002-02-05 | 2006-06-27 | Matsushita Electric Industrial Co., Ltd. | Table driven method for calculating arithmetic inverse for use in cryptography |
| US7529368B2 (en) | 2003-04-18 | 2009-05-05 | Via Technologies, Inc. | Apparatus and method for performing transparent output feedback mode cryptographic functions |
| US7519833B2 (en) * | 2003-04-18 | 2009-04-14 | Via Technologies, Inc. | Microprocessor apparatus and method for enabling configurable data block size in a cryptographic engine |
| US7925891B2 (en) * | 2003-04-18 | 2011-04-12 | Via Technologies, Inc. | Apparatus and method for employing cryptographic functions to generate a message digest |
| US7532722B2 (en) * | 2003-04-18 | 2009-05-12 | Ip-First, Llc | Apparatus and method for performing transparent block cipher cryptographic functions |
| US7536560B2 (en) | 2003-04-18 | 2009-05-19 | Via Technologies, Inc. | Microprocessor apparatus and method for providing configurable cryptographic key size |
| US7502943B2 (en) * | 2003-04-18 | 2009-03-10 | Via Technologies, Inc. | Microprocessor apparatus and method for providing configurable cryptographic block cipher round results |
| US7900055B2 (en) * | 2003-04-18 | 2011-03-01 | Via Technologies, Inc. | Microprocessor apparatus and method for employing configurable block cipher cryptographic algorithms |
| US8060755B2 (en) * | 2003-04-18 | 2011-11-15 | Via Technologies, Inc | Apparatus and method for providing user-generated key schedule in a microprocessor cryptographic engine |
| US7542566B2 (en) * | 2003-04-18 | 2009-06-02 | Ip-First, Llc | Apparatus and method for performing transparent cipher block chaining mode cryptographic functions |
| US7529367B2 (en) * | 2003-04-18 | 2009-05-05 | Via Technologies, Inc. | Apparatus and method for performing transparent cipher feedback mode cryptographic functions |
| US7539876B2 (en) * | 2003-04-18 | 2009-05-26 | Via Technologies, Inc. | Apparatus and method for generating a cryptographic key schedule in a microprocessor |
| US7844053B2 (en) | 2003-04-18 | 2010-11-30 | Ip-First, Llc | Microprocessor apparatus and method for performing block cipher cryptographic functions |
| US7528834B2 (en) * | 2003-09-30 | 2009-05-05 | Microsoft Corporation | System and method of caching glyphs for display by a remote terminal |
| US7715553B2 (en) * | 2005-08-01 | 2010-05-11 | Durward D. Dupre | Encrypting a plaintext message with authentication |
| US8090098B2 (en) | 2006-11-13 | 2012-01-03 | Electronics And Telecommunications Research Institute | Method of generating message authentication code using stream cipher and authentication/encryption and authentication/decryption methods using stream cipher |
| US8094813B2 (en) | 2008-09-02 | 2012-01-10 | Apple Inc. | System and method for modulus obfuscation |
| US9116765B2 (en) | 2011-10-20 | 2015-08-25 | Apple Inc. | System and method for obfuscating data using instructions as a source of pseudorandom values |
| EP2884692B1 (en) * | 2013-12-13 | 2020-05-20 | Nxp B.V. | Updating software on a secure element |
| FR3035240B1 (fr) * | 2015-04-15 | 2018-04-06 | Rambus Inc. | Procede de securisation de l'execution d'un programme |
| US20160308669A1 (en) * | 2015-04-20 | 2016-10-20 | Jian Ho | Method and System for Real Time Data Protection with Private Key and Algorithm for Transmission and Storage |
| US11176264B2 (en) | 2019-08-20 | 2021-11-16 | Bank Of America Corporation | Data access control using data block level decryption |
| US11741248B2 (en) | 2019-08-20 | 2023-08-29 | Bank Of America Corporation | Data access control using data block level encryption |
| US20230367489A1 (en) * | 2022-05-12 | 2023-11-16 | Micron Technology, Inc. | Performing cryptographic functions at a memory system |
Family Cites Families (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5003597A (en) * | 1989-12-21 | 1991-03-26 | Xerox Corporation | Method and apparatus for data encryption |
| US5724428A (en) * | 1995-11-01 | 1998-03-03 | Rsa Data Security, Inc. | Block encryption algorithm with data-dependent rotations |
| US6269163B1 (en) * | 1998-06-15 | 2001-07-31 | Rsa Security Inc. | Enhanced block ciphers with data-dependent rotations |
| US7174013B1 (en) * | 1998-10-20 | 2007-02-06 | Lucent Technologies Inc. | Efficient universal hashing method |
-
1999
- 1999-06-09 US US09/329,139 patent/US6570988B1/en not_active Expired - Lifetime
-
2000
- 2000-06-06 AU AU79816/00A patent/AU7981600A/en not_active Abandoned
- 2000-06-09 EP EP00970432A patent/EP1468521B1/en not_active Expired - Lifetime
- 2000-06-09 WO PCT/US2000/016035 patent/WO2000078118A2/en not_active Ceased
- 2000-06-09 JP JP2001504202A patent/JP4559679B2/ja not_active Expired - Lifetime
- 2000-06-09 DE DE60026868T patent/DE60026868T2/de not_active Expired - Lifetime
- 2000-06-09 AT AT00970432T patent/ATE321394T1/de not_active IP Right Cessation
Also Published As
| Publication number | Publication date |
|---|---|
| US6570988B1 (en) | 2003-05-27 |
| WO2000078118A3 (en) | 2004-05-21 |
| EP1468521A4 (en) | 2004-10-20 |
| DE60026868D1 (de) | 2006-05-11 |
| JP2003526118A (ja) | 2003-09-02 |
| ATE321394T1 (de) | 2006-04-15 |
| JP4559679B2 (ja) | 2010-10-13 |
| WO2000078118A2 (en) | 2000-12-28 |
| EP1468521B1 (en) | 2006-03-22 |
| AU7981600A (en) | 2001-01-09 |
| EP1468521A2 (en) | 2004-10-20 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| DE60026868T2 (de) | Ein einfaches implementierungsverfahren für kryptographische primitiva mittels elementar-register-operationen | |
| DE60019432T2 (de) | Eine technik, um einen parameter, wie z.b. eine prüfsumme, durch ein primitiv zu erzeugen, welche elementare register-operationen verwendet | |
| DE60305775T2 (de) | Verfahren und Gerät zur Berechnung von Haschwerten in einem kryptographischen Koprozessor | |
| DE60031304T3 (de) | Verfahren zur authentifizierung von softwarebenutzern | |
| DE69935469T2 (de) | Verfahren zur schnellen Ausführung einer Entschlüsselung oder einer Authentifizierung | |
| DE69534603T2 (de) | Verschlüsselungssystem für elliptische kurve | |
| DE60217260T2 (de) | Datenverarbeitungs- und Verschlüsselungseinheit | |
| DE69935455T2 (de) | Kryptographisches verfahren unter verwendung eines öffentlichen und eines privaten schlüssels | |
| DE69838258T2 (de) | Public-Key-Datenübertragungssysteme | |
| EP1298834B1 (de) | Verfahren und Vorrichtung zum Verschlüsseln und Entschlüsseln von Daten | |
| DE102005012098A1 (de) | Datenchiffrierprozessor sowie AES-Chiffriersystem und AES-Chiffrierverfahren | |
| DE102005024725A1 (de) | System und Verfahren für Chaotische Digitale Signatur, Verschlüsselung und Authentifizierung | |
| DE102022203725A1 (de) | Verfahren zum Austausch kryptographischer Schlüssel zwischen Kommunikationsteilnehmern | |
| EP3899844A1 (de) | Verfahren zum erzeugen einer blinden signatur | |
| DE112021007337T5 (de) | Chiffretext-umwandlungssystem, umwandlungsschlüssel- erzeugungsverfahren und umwandlungsschlüssel-erzeugungsprogramm | |
| DE60202149T2 (de) | Verfahren zur kryptographischen authentifizierung | |
| DE60117813T2 (de) | Verfahren und Vorrichtung zur Speicherung und wiedergewinnung eones Privaten Kryptoschlüssels | |
| DE202023104060U1 (de) | Eine mehrstufige randomisierte SALT-Technik für Vertraulichkeit in IoT-Geräten | |
| EP0616447B1 (de) | Verfahren zur gesicherten Datenübertragung über ungesicherte Verbindungen | |
| DE102007046102B4 (de) | Verfahren zum Schutz vor Veränderung von Daten und zur Authentifizierung des Datensenders bei der Datenübertragung durch Verwendung von Verschlüsselungsverfahren, bei denen mit Kenntnis von verschlüsselten und unverschlüsselten Daten andere Daten nicht mehr als zufällig richtig verschlüsselt werden können. | |
| DE69935980T2 (de) | Eine Technik zur Erstellung Privat authentifizierbarer kryptografischer Unterschriften und zur Verwendung einer solchen Unterschrift in Verbindung mit der Kopie eines Produktes | |
| WO1997032417A1 (de) | Verfahren zum generieren eines prüfworts für eine bitfolge zur überprüfung der integrität und authentizität der bitfolge | |
| DE60027119T2 (de) | Verfahren und Vorrichtung zum kryptographischen Datenschutz | |
| DE10355865A1 (de) | Verfahren und Chip zur kryptographischen Verschlüsselung von Daten | |
| WO2004006496A1 (de) | Verschlüsselungsverfahren basierend auf faktorisierung |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 8364 | No opposition during term of opposition |