DE68926200T2 - Geheime Datenübertragung mittels Steuervektoren - Google Patents

Geheime Datenübertragung mittels Steuervektoren

Info

Publication number
DE68926200T2
DE68926200T2 DE1989626200 DE68926200T DE68926200T2 DE 68926200 T2 DE68926200 T2 DE 68926200T2 DE 1989626200 DE1989626200 DE 1989626200 DE 68926200 T DE68926200 T DE 68926200T DE 68926200 T2 DE68926200 T2 DE 68926200T2
Authority
DE
Germany
Prior art keywords
data transmission
secret data
control vectors
vectors
control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
DE1989626200
Other languages
English (en)
Other versions
DE68926200D1 (de
Inventor
Stephen M Matyas
Dennis G Abraham
Donald B Johnson
Ramesh K Karne
An V Le
Rostislaw Prymak
Julian Thomas
John D Wilkins
Phil C Yeh
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US07/231,114 external-priority patent/US4941176A/en
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Publication of DE68926200D1 publication Critical patent/DE68926200D1/de
Application granted granted Critical
Publication of DE68926200T2 publication Critical patent/DE68926200T2/de
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/30Arrangements for executing machine instructions, e.g. instruction decode
    • G06F9/30003Arrangements for executing specific machine instructions
    • G06F9/30007Arrangements for executing specific machine instructions to perform operations on data operands
    • G06F9/3001Arithmetic instructions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/30Arrangements for executing machine instructions, e.g. instruction decode
    • G06F9/30003Arrangements for executing specific machine instructions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/30Arrangements for executing machine instructions, e.g. instruction decode
    • G06F9/30003Arrangements for executing specific machine instructions
    • G06F9/30007Arrangements for executing specific machine instructions to perform operations on data operands
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/30Arrangements for executing machine instructions, e.g. instruction decode
    • G06F9/30003Arrangements for executing specific machine instructions
    • G06F9/30007Arrangements for executing specific machine instructions to perform operations on data operands
    • G06F9/30018Bit or string instructions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/30Arrangements for executing machine instructions, e.g. instruction decode
    • G06F9/38Concurrent instruction execution, e.g. pipeline, look ahead
    • G06F9/3877Concurrent instruction execution, e.g. pipeline, look ahead using a slave processor, e.g. coprocessor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0637Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
DE1989626200 1988-08-11 1989-08-09 Geheime Datenübertragung mittels Steuervektoren Expired - Fee Related DE68926200T2 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US07/231,114 US4941176A (en) 1988-08-11 1988-08-11 Secure management of keys using control vectors
US23351588A 1988-08-18 1988-08-18

Publications (2)

Publication Number Publication Date
DE68926200D1 DE68926200D1 (de) 1996-05-15
DE68926200T2 true DE68926200T2 (de) 1996-10-17

Family

ID=26924823

Family Applications (1)

Application Number Title Priority Date Filing Date
DE1989626200 Expired - Fee Related DE68926200T2 (de) 1988-08-11 1989-08-09 Geheime Datenübertragung mittels Steuervektoren

Country Status (2)

Country Link
EP (1) EP0354774B1 (de)
DE (1) DE68926200T2 (de)

Families Citing this family (54)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE69019593T2 (de) * 1989-04-27 1996-01-25 Ibm Sichere Handhabung von Schlüsseln unter Verwendung von Kontrollvektoren mit Mehrwegüberwachung.
JP2689998B2 (ja) * 1990-08-22 1997-12-10 インターナショナル・ビジネス・マシーンズ・コーポレイション 暗号動作を行う装置
US5301231A (en) * 1992-02-12 1994-04-05 International Business Machines Corporation User defined function facility
DE69331064T2 (de) * 1992-12-14 2002-07-18 Commw Of Australia Canberra Sicherheit einer elektronischen nachricht
US6744894B1 (en) 1994-04-01 2004-06-01 Mitsubishi Corporation Data management system
US7036019B1 (en) 1994-04-01 2006-04-25 Intarsia Software Llc Method for controlling database copyrights
JPH07271865A (ja) 1994-04-01 1995-10-20 Mitsubishi Corp データベース著作権管理方法
US6741991B2 (en) 1994-09-30 2004-05-25 Mitsubishi Corporation Data management system
US7302415B1 (en) * 1994-09-30 2007-11-27 Intarsia Llc Data copyright management system
US6424715B1 (en) 1994-10-27 2002-07-23 Mitsubishi Corporation Digital content management system and apparatus
EP0715241B1 (de) 1994-10-27 2004-01-14 Mitsubishi Corporation Gerät für Dateiurheberrechte-Verwaltungssystem
EP0709760B1 (de) 1994-10-27 2006-05-31 Intarsia Software LLC Urheberrechtsdatenverwaltungssystem
GB9503738D0 (en) * 1995-02-24 1995-04-19 Int Computers Ltd Cryptographic key management
US8595502B2 (en) 1995-09-29 2013-11-26 Intarsia Software Llc Data management system
US7801817B2 (en) 1995-10-27 2010-09-21 Makoto Saito Digital content management system and apparatus
US6061449A (en) * 1997-10-10 2000-05-09 General Instrument Corporation Secure processor with external memory using block chaining and block re-ordering
JP3272283B2 (ja) 1997-11-14 2002-04-08 富士通株式会社 電子データ保管装置
JP4763866B2 (ja) 1998-10-15 2011-08-31 インターシア ソフトウェア エルエルシー 2重再暗号化によりデジタルデータを保護する方法及び装置
US7260724B1 (en) 1999-09-20 2007-08-21 Security First Corporation Context sensitive dynamic authentication in a cryptographic system
US7391865B2 (en) 1999-09-20 2008-06-24 Security First Corporation Secure data parser method and system
WO2001022650A2 (en) 1999-09-20 2001-03-29 Ethentica, Inc. Server-side implementation of a cryptographic system
US6853988B1 (en) 1999-09-20 2005-02-08 Security First Corporation Cryptographic server with provisions for interoperability between cryptographic systems
GB0124681D0 (en) * 2001-10-15 2001-12-05 Hewlett Packard Co Method and apparatus for encrypting data
GB0124686D0 (en) 2001-10-15 2001-12-05 Hewlett Packard Co A scheme for splitting trusted authorities based on the shamir's secret sharing
GB0124670D0 (en) 2001-10-15 2001-12-05 Hewlett Packard Co Method and apparatus for encrypting data
US7103754B2 (en) 2003-03-28 2006-09-05 International Business Machines Corporation Computer instructions for having extended signed displacement fields for finding instruction operands
US7159122B2 (en) * 2003-05-12 2007-01-02 International Business Machines Corporation Message digest instructions
US7257718B2 (en) 2003-05-12 2007-08-14 International Business Machines Corporation Cipher message assist instructions
US7356710B2 (en) 2003-05-12 2008-04-08 International Business Machines Corporation Security message authentication control instruction
US7921300B2 (en) 2003-10-10 2011-04-05 Via Technologies, Inc. Apparatus and method for secure hash algorithm
CA2922172A1 (en) 2004-10-25 2006-05-04 Security First Corp. Secure data parser method and system
BRPI0618725A2 (pt) 2005-11-18 2011-09-06 Rick L Orsini método analisador de dados seguro e sistema
BRPI0718581A2 (pt) 2006-11-07 2014-03-11 Security First Corp Sistemas e métodos para distribuir e proteger dados
EP2482218A3 (de) 2006-12-05 2012-10-31 Security First Corporation Verbessertes Sicherungsverfahren auf einem Datenspeicher mit einem sicheren Datenparser
BRPI0816772A2 (pt) 2007-09-14 2015-03-24 Security First Corp Sistemas e métodos para controlar chaves criptográficas
CN101981890B (zh) 2008-02-22 2014-10-15 安全第一公司 安全工作组管理和通信的系统和方法
WO2010135412A2 (en) 2009-05-19 2010-11-25 Security First Corp. Systems and methods for securing data in the cloud
JP5650238B2 (ja) 2009-11-25 2015-01-07 セキュリティー ファースト コープ. 移動中のデータをセキュア化するためのシステムおよび方法
AU2011235068B2 (en) 2010-03-31 2015-10-01 Security First Corp. Systems and methods for securing data in motion
CN103238305A (zh) 2010-05-28 2013-08-07 安全第一公司 用于安全数据储存的加速器系统
US9251377B2 (en) 2012-12-28 2016-02-02 Intel Corporation Instructions processors, methods, and systems to process secure hash algorithms
US8924741B2 (en) 2012-12-29 2014-12-30 Intel Corporation Instruction and logic to provide SIMD secure hashing round slice functionality
CN105051750B (zh) 2013-02-13 2018-02-23 安全第一公司 用于加密文件系统层的系统和方法
US10038550B2 (en) 2013-08-08 2018-07-31 Intel Corporation Instruction and logic to provide a secure cipher hash round functionality
US10503510B2 (en) 2013-12-27 2019-12-10 Intel Corporation SM3 hash function message expansion processors, methods, systems, and instructions
US9252944B2 (en) 2014-03-21 2016-02-02 International Business Machines Corporation Key wrapping for common cryptographic architecture (CCA) key token
US9912481B2 (en) 2014-03-27 2018-03-06 Intel Corporation Method and apparatus for efficiently executing hash operations
US9317719B2 (en) 2014-09-04 2016-04-19 Intel Corporation SM3 hash algorithm acceleration processors, methods, systems, and instructions
US9658854B2 (en) 2014-09-26 2017-05-23 Intel Corporation Instructions and logic to provide SIMD SM3 cryptographic hashing functionality
US9733849B2 (en) 2014-11-21 2017-08-15 Security First Corp. Gateway for cloud-based secure storage
US11928472B2 (en) 2020-09-26 2024-03-12 Intel Corporation Branch prefetch mechanisms for mitigating frontend branch resteers
US11700135B2 (en) * 2020-12-26 2023-07-11 Intel Corporation ISA accessible physical unclonable function
US11706039B2 (en) 2020-12-26 2023-07-18 Intel Corporation ISA accessible physical unclonable function
US20220261509A1 (en) * 2021-02-13 2022-08-18 Intel Corporation Region-based deterministic memory safety

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4386233A (en) * 1980-09-29 1983-05-31 Smid Miles E Crytographic key notarization methods and apparatus
JPH0691529B2 (ja) * 1985-12-18 1994-11-14 沖電気工業株式会社 回線暗号装置間通信方式
US4850017A (en) * 1987-05-29 1989-07-18 International Business Machines Corp. Controlled use of cryptographic keys via generating station established control values

Also Published As

Publication number Publication date
EP0354774B1 (de) 1996-04-10
EP0354774A3 (de) 1992-08-12
DE68926200D1 (de) 1996-05-15
EP0354774A2 (de) 1990-02-14

Similar Documents

Publication Publication Date Title
DE68926200T2 (de) Geheime Datenübertragung mittels Steuervektoren
FI912272A0 (fi) Tietoliikennejärjestelmä
DE68916218D1 (de) Rechnergesteuerter anpassungsfähiger Lautfernsprecher.
GB2217949B (en) Data encryption
DK339889A (da) Kommunikationskabel
DE68929288T2 (de) Datenübertragungsvorrichtung
DE68915777T2 (de) Litzensteuervorrichtung.
DK177189A (da) Hydrostatisk styreindretning
DE68924041T2 (de) Vektordatenübertragungssteuerung.
GB2217129B (en) Devices for generating control data
DE68919333D1 (de) Datenübertragungsvorrichtung.
NL192758B (nl) Toonbesturingsinrichting.
DE68908371T2 (de) Verschlüsselungssystem.
DE68926076D1 (de) Sichere Schlüsselverwaltung mittels erweiterten Steuervektoren
DK247288D0 (da) Hydrostatisk styreindretning
DE68926005T2 (de) Sichere Schlüsselverwaltung mittels Steuervektoren
DK152089D0 (da) Databanekontrolsystem
DE68928214D1 (de) Dateneingabesystem
KR890015242A (ko) 데이타 재생 장치
DK363788A (da) Hydrostatisk styreindretning
FI95419B (fi) Ohut tietoliikennekaapeli
GB8901497D0 (en) Data encryption device
FI883268A0 (fi) Engaongssugpaose foer patientsekret.
DE69026343T2 (de) Datenübertragungsvorrichtung
DE3855438D1 (de) Datenübertragungsvorrichtung

Legal Events

Date Code Title Description
8364 No opposition during term of opposition
8339 Ceased/non-payment of the annual fee