GB0624058D0 - Self encryption - Google Patents
Self encryptionInfo
- Publication number
- GB0624058D0 GB0624058D0 GBGB0624058.4A GB0624058A GB0624058D0 GB 0624058 D0 GB0624058 D0 GB 0624058D0 GB 0624058 A GB0624058 A GB 0624058A GB 0624058 D0 GB0624058 D0 GB 0624058D0
- Authority
- GB
- United Kingdom
- Prior art keywords
- chunk
- chunks
- file
- hashes
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000013507 mapping Methods 0.000 abstract 2
- 239000000470 constituent Substances 0.000 abstract 1
- 238000000034 method Methods 0.000 abstract 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1074—Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
- H04L67/1078—Resource delivery mechanisms
- H04L67/108—Resource delivery mechanisms characterised by resources being split in blocks or fragments
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C1/00—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
-
- H04L29/08306—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0457—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply dynamic encryption, e.g. stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1074—Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/16—Obfuscation or hiding, e.g. involving white box
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/42—Anonymization, e.g. involving pseudonyms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
A file is divided into chunks 2 and small data elements, such as bytes, are permuted between the chunks 3. Each chunk is hashed 4 to form a chunk hash, and each chunk hash is encrypted using one or more other chunk hashes 5 in a self encryption process. The chunk hashes and the encrypted chunk hashes are constituents of a mapping function. The chunks are distributed across various nodes of a peer-to-peer network. The permutation of the chunks contributes towards the effective encryption of the file. The file can be recovered using the mapping function.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0624058A GB2446200A (en) | 2006-12-01 | 2006-12-01 | Encryption system for peer-to-peer networks which relies on hash based self-encryption and mapping |
GB0709761.1A GB2444343B (en) | 2006-12-01 | 2007-05-22 | Self encryption |
PCT/GB2007/004440 WO2008065351A1 (en) | 2006-12-01 | 2007-11-21 | Self encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0624058A GB2446200A (en) | 2006-12-01 | 2006-12-01 | Encryption system for peer-to-peer networks which relies on hash based self-encryption and mapping |
Publications (2)
Publication Number | Publication Date |
---|---|
GB0624058D0 true GB0624058D0 (en) | 2007-01-10 |
GB2446200A GB2446200A (en) | 2008-08-06 |
Family
ID=37671713
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0624058A Withdrawn GB2446200A (en) | 2006-12-01 | 2006-12-01 | Encryption system for peer-to-peer networks which relies on hash based self-encryption and mapping |
GB0709761.1A Active GB2444343B (en) | 2006-12-01 | 2007-05-22 | Self encryption |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0709761.1A Active GB2444343B (en) | 2006-12-01 | 2007-05-22 | Self encryption |
Country Status (1)
Country | Link |
---|---|
GB (2) | GB2446200A (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
IL210169A0 (en) | 2010-12-22 | 2011-03-31 | Yehuda Binder | System and method for routing-based internet security |
US9900384B2 (en) * | 2013-07-12 | 2018-02-20 | Adobe Systems Incorporated | Distributed caching in a communication network |
US9621586B2 (en) | 2014-02-08 | 2017-04-11 | International Business Machines Corporation | Methods and apparatus for enhancing business services resiliency using continuous fragmentation cell technology |
US9521128B2 (en) | 2014-11-07 | 2016-12-13 | Qualcomm Incorporated | Using a hash of a filename to control encoding/decoding of a digital file |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6807632B1 (en) * | 1999-01-21 | 2004-10-19 | Emc Corporation | Content addressable information encapsulation, representation, and transfer |
JP4846156B2 (en) * | 2000-02-18 | 2011-12-28 | イーエムシー コーポレイション | Hash file system and method for use in a commonality factoring system |
US7412462B2 (en) * | 2000-02-18 | 2008-08-12 | Burnside Acquisition, Llc | Data repository and method for promoting network storage of data |
US20020120874A1 (en) * | 2000-12-22 | 2002-08-29 | Li Shu | Method and system for secure exchange of messages |
US7043637B2 (en) * | 2001-03-21 | 2006-05-09 | Microsoft Corporation | On-disk file format for a serverless distributed file system |
US7418454B2 (en) * | 2004-04-16 | 2008-08-26 | Microsoft Corporation | Data overlay, self-organized metadata overlay, and application level multicasting |
WO2005119477A2 (en) * | 2004-05-19 | 2005-12-15 | Wurld Media, Inc. | Object schemas and packet chain protocols for managing digital content routing and distribution in peer-to-peer dynamic connection structures |
FR2878673B1 (en) * | 2004-11-26 | 2007-02-09 | Univ Picardie Jules Verne Etab | PERENNE DISTRIBUTED BACKUP SYSTEM AND METHOD |
CN101044741B (en) * | 2005-07-08 | 2012-04-18 | 松下电器产业株式会社 | Secure peer to peer messaging service |
CN1925388A (en) * | 2005-08-31 | 2007-03-07 | 西门子(中国)有限公司 | Resource encrypting and deencrypting method and system |
-
2006
- 2006-12-01 GB GB0624058A patent/GB2446200A/en not_active Withdrawn
-
2007
- 2007-05-22 GB GB0709761.1A patent/GB2444343B/en active Active
Also Published As
Publication number | Publication date |
---|---|
GB0709761D0 (en) | 2007-06-27 |
GB2444343B (en) | 2012-04-18 |
GB2446200A (en) | 2008-08-06 |
GB2444343A (en) | 2008-06-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TW200610349A (en) | Key derivation functions to enhance security | |
NZ603822A (en) | Permutation data transform to enhance security | |
EP1278113A3 (en) | On-disk file format for a serverless distributed file system | |
NO20044028L (en) | Use of isogenies for the development of cryptosystems | |
ATE532144T1 (en) | DOCUMENT SECURITY MANAGEMENT SYSTEM | |
TNSN07055A1 (en) | Permutation data transform to enhance security | |
JP2017511920A5 (en) | ||
CN108200172B (en) | Cloud storage system and method supporting safe data deduplication and deletion | |
WO2005059717A3 (en) | Certificate based digital rights management | |
GB0624056D0 (en) | msSAN | |
EP1982263A4 (en) | Automatically determining file replication mechanisms | |
AU2001295208A1 (en) | Encryption systems and methods for identifying and coalescing identical objects encrypted with different keys | |
ATE523017T1 (en) | KEY AGREEMENT AND TRANSPORT PROTOCOL | |
GB2434900A (en) | System and method to support single instance storage operations | |
MX2008001850A (en) | Protecting digital media of various content types. | |
WO2010040078A3 (en) | System and method for organizing data to facilitate data deduplication | |
WO2009036350A3 (en) | Optimized data stream compression using data-dependent chunking | |
TW200711436A (en) | Secure patch system | |
WO2007120772A3 (en) | Method, system, and computer-readable medium to maintain and/or purge files of a document management system | |
GB2444343B (en) | Self encryption | |
WO2008086241A3 (en) | A method of two strings private key (symmetric) encryption and decryption algorithm | |
CN105760781A (en) | Storage method, restoration method and operation method of ordered and derivable large-data files | |
DE602007004262D1 (en) | Creation of substrings while preserving privacy | |
GB0013356D0 (en) | A method of validating an encrypted message | |
ES2198201B1 (en) | PROCEDURE AND SYSTEM OF DISTRIBUTION AND MANAGEMENT OF RIGHTS OF USE ASSOCIATED WITH A CONTENT PURCHASED, FOR MOBILE TERMINALS. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |