DE68926200D1 - Geheime Datenübertragung mittels Steuervektoren - Google Patents
Geheime Datenübertragung mittels SteuervektorenInfo
- Publication number
- DE68926200D1 DE68926200D1 DE68926200T DE68926200T DE68926200D1 DE 68926200 D1 DE68926200 D1 DE 68926200D1 DE 68926200 T DE68926200 T DE 68926200T DE 68926200 T DE68926200 T DE 68926200T DE 68926200 D1 DE68926200 D1 DE 68926200D1
- Authority
- DE
- Germany
- Prior art keywords
- data transmission
- secret data
- control vectors
- vectors
- control
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 230000005540 biological transmission Effects 0.000 title 1
- 239000013598 vector Substances 0.000 title 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/30—Arrangements for executing machine instructions, e.g. instruction decode
- G06F9/30003—Arrangements for executing specific machine instructions
- G06F9/30007—Arrangements for executing specific machine instructions to perform operations on data operands
- G06F9/3001—Arithmetic instructions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/30—Arrangements for executing machine instructions, e.g. instruction decode
- G06F9/30003—Arrangements for executing specific machine instructions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/30—Arrangements for executing machine instructions, e.g. instruction decode
- G06F9/30003—Arrangements for executing specific machine instructions
- G06F9/30007—Arrangements for executing specific machine instructions to perform operations on data operands
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/30—Arrangements for executing machine instructions, e.g. instruction decode
- G06F9/30003—Arrangements for executing specific machine instructions
- G06F9/30007—Arrangements for executing specific machine instructions to perform operations on data operands
- G06F9/30018—Bit or string instructions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/30—Arrangements for executing machine instructions, e.g. instruction decode
- G06F9/38—Concurrent instruction execution, e.g. pipeline or look ahead
- G06F9/3877—Concurrent instruction execution, e.g. pipeline or look ahead using a slave processor, e.g. coprocessor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0637—Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Computational Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Pure & Applied Mathematics (AREA)
- Storage Device Security (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US07/231,114 US4941176A (en) | 1988-08-11 | 1988-08-11 | Secure management of keys using control vectors |
US23351588A | 1988-08-18 | 1988-08-18 |
Publications (2)
Publication Number | Publication Date |
---|---|
DE68926200D1 true DE68926200D1 (de) | 1996-05-15 |
DE68926200T2 DE68926200T2 (de) | 1996-10-17 |
Family
ID=26924823
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DE68926200T Expired - Fee Related DE68926200T2 (de) | 1988-08-11 | 1989-08-09 | Geheime Datenübertragung mittels Steuervektoren |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP0354774B1 (de) |
DE (1) | DE68926200T2 (de) |
Families Citing this family (55)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE69019593T2 (de) * | 1989-04-27 | 1996-01-25 | Ibm | Sichere Handhabung von Schlüsseln unter Verwendung von Kontrollvektoren mit Mehrwegüberwachung. |
JP2689998B2 (ja) * | 1990-08-22 | 1997-12-10 | インターナショナル・ビジネス・マシーンズ・コーポレイション | 暗号動作を行う装置 |
US5301231A (en) * | 1992-02-12 | 1994-04-05 | International Business Machines Corporation | User defined function facility |
AU675816B2 (en) * | 1992-12-14 | 1997-02-20 | Commonwealth Of Australia, The | Message document security |
US7036019B1 (en) | 1994-04-01 | 2006-04-25 | Intarsia Software Llc | Method for controlling database copyrights |
US6744894B1 (en) | 1994-04-01 | 2004-06-01 | Mitsubishi Corporation | Data management system |
JPH07271865A (ja) | 1994-04-01 | 1995-10-20 | Mitsubishi Corp | データベース著作権管理方法 |
US6741991B2 (en) | 1994-09-30 | 2004-05-25 | Mitsubishi Corporation | Data management system |
US7302415B1 (en) * | 1994-09-30 | 2007-11-27 | Intarsia Llc | Data copyright management system |
EP1691315A1 (de) | 1994-10-27 | 2006-08-16 | Intarsia Software LLC | Verwaltungssystem für Datenurheberrecht |
US6424715B1 (en) | 1994-10-27 | 2002-07-23 | Mitsubishi Corporation | Digital content management system and apparatus |
DE69532434T2 (de) | 1994-10-27 | 2004-11-11 | Mitsubishi Corp. | Gerät für Dateiurheberrechte-Verwaltungssystem |
GB9503738D0 (en) * | 1995-02-24 | 1995-04-19 | Int Computers Ltd | Cryptographic key management |
US8595502B2 (en) | 1995-09-29 | 2013-11-26 | Intarsia Software Llc | Data management system |
US7801817B2 (en) | 1995-10-27 | 2010-09-21 | Makoto Saito | Digital content management system and apparatus |
US6061449A (en) * | 1997-10-10 | 2000-05-09 | General Instrument Corporation | Secure processor with external memory using block chaining and block re-ordering |
JP3272283B2 (ja) | 1997-11-14 | 2002-04-08 | 富士通株式会社 | 電子データ保管装置 |
JP4763866B2 (ja) | 1998-10-15 | 2011-08-31 | インターシア ソフトウェア エルエルシー | 2重再暗号化によりデジタルデータを保護する方法及び装置 |
WO2001022322A2 (en) | 1999-09-20 | 2001-03-29 | Ethentica, Inc. | Electronic commerce with cryptographic authentication |
US7391865B2 (en) | 1999-09-20 | 2008-06-24 | Security First Corporation | Secure data parser method and system |
US7260724B1 (en) | 1999-09-20 | 2007-08-21 | Security First Corporation | Context sensitive dynamic authentication in a cryptographic system |
US6853988B1 (en) | 1999-09-20 | 2005-02-08 | Security First Corporation | Cryptographic server with provisions for interoperability between cryptographic systems |
GB0124686D0 (en) | 2001-10-15 | 2001-12-05 | Hewlett Packard Co | A scheme for splitting trusted authorities based on the shamir's secret sharing |
GB0124681D0 (en) | 2001-10-15 | 2001-12-05 | Hewlett Packard Co | Method and apparatus for encrypting data |
GB0124670D0 (en) | 2001-10-15 | 2001-12-05 | Hewlett Packard Co | Method and apparatus for encrypting data |
US7103754B2 (en) | 2003-03-28 | 2006-09-05 | International Business Machines Corporation | Computer instructions for having extended signed displacement fields for finding instruction operands |
US7159122B2 (en) | 2003-05-12 | 2007-01-02 | International Business Machines Corporation | Message digest instructions |
US7356710B2 (en) * | 2003-05-12 | 2008-04-08 | International Business Machines Corporation | Security message authentication control instruction |
US7257718B2 (en) | 2003-05-12 | 2007-08-14 | International Business Machines Corporation | Cipher message assist instructions |
US7921300B2 (en) * | 2003-10-10 | 2011-04-05 | Via Technologies, Inc. | Apparatus and method for secure hash algorithm |
CN102609640B (zh) | 2004-10-25 | 2015-07-15 | 安全第一公司 | 安全数据分析方法和系统 |
WO2008054406A2 (en) | 2005-11-18 | 2008-05-08 | Orsini Rick L | Secure data parser method and system |
BRPI0718581A2 (pt) | 2006-11-07 | 2014-03-11 | Security First Corp | Sistemas e métodos para distribuir e proteger dados |
EP2482218A3 (de) | 2006-12-05 | 2012-10-31 | Security First Corporation | Verbessertes Sicherungsverfahren auf einem Datenspeicher mit einem sicheren Datenparser |
BRPI0816772A2 (pt) | 2007-09-14 | 2015-03-24 | Security First Corp | Sistemas e métodos para controlar chaves criptográficas |
ES2449790T3 (es) | 2008-02-22 | 2014-03-21 | Security First Corp. | Sistemas y métodos para la gestión y la comunicación seguras en un grupo de trabajo |
BRPI1013062A2 (pt) | 2009-05-19 | 2016-04-05 | Security First Corp | sistemas e métodos para proteger dados na nuvem |
EP2504973B1 (de) | 2009-11-25 | 2016-11-16 | Security First Corp. | Systeme und verfahren zur sicherung von daten in bewegung |
WO2011123699A2 (en) | 2010-03-31 | 2011-10-06 | Orsini Rick L | Systems and methods for securing data in motion |
CA2800809A1 (en) | 2010-05-28 | 2011-12-01 | Lawrence A. Laurich | Accelerator system for use with secure data storage |
US9251377B2 (en) | 2012-12-28 | 2016-02-02 | Intel Corporation | Instructions processors, methods, and systems to process secure hash algorithms |
US8924741B2 (en) | 2012-12-29 | 2014-12-30 | Intel Corporation | Instruction and logic to provide SIMD secure hashing round slice functionality |
AU2014216207A1 (en) | 2013-02-13 | 2015-09-10 | Security First Corp. | Systems and methods for a cryptographic file system layer |
US10038550B2 (en) | 2013-08-08 | 2018-07-31 | Intel Corporation | Instruction and logic to provide a secure cipher hash round functionality |
US10503510B2 (en) | 2013-12-27 | 2019-12-10 | Intel Corporation | SM3 hash function message expansion processors, methods, systems, and instructions |
US9252944B2 (en) | 2014-03-21 | 2016-02-02 | International Business Machines Corporation | Key wrapping for common cryptographic architecture (CCA) key token |
US9912481B2 (en) | 2014-03-27 | 2018-03-06 | Intel Corporation | Method and apparatus for efficiently executing hash operations |
US9317719B2 (en) | 2014-09-04 | 2016-04-19 | Intel Corporation | SM3 hash algorithm acceleration processors, methods, systems, and instructions |
US9658854B2 (en) | 2014-09-26 | 2017-05-23 | Intel Corporation | Instructions and logic to provide SIMD SM3 cryptographic hashing functionality |
US9733849B2 (en) | 2014-11-21 | 2017-08-15 | Security First Corp. | Gateway for cloud-based secure storage |
US11928472B2 (en) | 2020-09-26 | 2024-03-12 | Intel Corporation | Branch prefetch mechanisms for mitigating frontend branch resteers |
US11706039B2 (en) | 2020-12-26 | 2023-07-18 | Intel Corporation | ISA accessible physical unclonable function |
US11700135B2 (en) * | 2020-12-26 | 2023-07-11 | Intel Corporation | ISA accessible physical unclonable function |
US12022013B2 (en) | 2020-12-26 | 2024-06-25 | Intel Corporation | ISA accessible physical unclonable function |
US20220261509A1 (en) * | 2021-02-13 | 2022-08-18 | Intel Corporation | Region-based deterministic memory safety |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4386233A (en) * | 1980-09-29 | 1983-05-31 | Smid Miles E | Crytographic key notarization methods and apparatus |
JPH0691529B2 (ja) * | 1985-12-18 | 1994-11-14 | 沖電気工業株式会社 | 回線暗号装置間通信方式 |
US4850017A (en) * | 1987-05-29 | 1989-07-18 | International Business Machines Corp. | Controlled use of cryptographic keys via generating station established control values |
-
1989
- 1989-08-09 DE DE68926200T patent/DE68926200T2/de not_active Expired - Fee Related
- 1989-08-09 EP EP89308079A patent/EP0354774B1/de not_active Expired - Lifetime
Also Published As
Publication number | Publication date |
---|---|
EP0354774A3 (de) | 1992-08-12 |
EP0354774B1 (de) | 1996-04-10 |
EP0354774A2 (de) | 1990-02-14 |
DE68926200T2 (de) | 1996-10-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE68926200D1 (de) | Geheime Datenübertragung mittels Steuervektoren | |
FI912272A0 (fi) | Tietoliikennejärjestelmä | |
DE68927396D1 (de) | Schriftzeichendaten-Steuerung | |
DE68916218D1 (de) | Rechnergesteuerter anpassungsfähiger Lautfernsprecher. | |
GB2217949B (en) | Data encryption | |
DK339889A (da) | Kommunikationskabel | |
DE69130658D1 (de) | Sichere kryptographische Operationen mit abwechselnden Steuervektorfestlegungsmoden | |
DE3854994D1 (de) | Mehrnutzerdatenübermittlungssystem | |
DK211790D0 (da) | Datatransmissionssystem | |
DE69024765D1 (de) | Datenübertragungssystem | |
DE68918616D1 (de) | Bilddatenübertragungsgerät. | |
DE68929288D1 (de) | Datenübertragungsvorrichtung | |
DE68924288D1 (de) | Bilddatenübertragungsgerät. | |
FR2627312B1 (fr) | Enregistreur de donnees | |
KR900702704A (ko) | 수상기 제어 장치 | |
DE68915777D1 (de) | Litzensteuervorrichtung. | |
DE3888192D1 (de) | Getriebesteuerungsgerät. | |
FI894431A0 (fi) | Pao samplad data baserat faslaosningssystem. | |
DK177189A (da) | Hydrostatisk styreindretning | |
DE68924041D1 (de) | Vektordatenübertragungssteuerung. | |
GB2217129B (en) | Devices for generating control data | |
DE68919333D1 (de) | Datenübertragungsvorrichtung. | |
NL192758B (nl) | Toonbesturingsinrichting. | |
DE68913319D1 (de) | Bilddatenübertragungsgerät. | |
DE68908371D1 (de) | Verschluesselungssystem. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
8364 | No opposition during term of opposition | ||
8339 | Ceased/non-payment of the annual fee |