GB0624058D0 - Self encryption - Google Patents

Self encryption

Info

Publication number
GB0624058D0
GB0624058D0 GBGB0624058.4A GB0624058A GB0624058D0 GB 0624058 D0 GB0624058 D0 GB 0624058D0 GB 0624058 A GB0624058 A GB 0624058A GB 0624058 D0 GB0624058 D0 GB 0624058D0
Authority
GB
United Kingdom
Prior art keywords
chunk
chunks
file
hashes
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GBGB0624058.4A
Other versions
GB2446200A (en
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to GB0624058A priority Critical patent/GB2446200A/en
Publication of GB0624058D0 publication Critical patent/GB0624058D0/en
Priority to GB0709761.1A priority patent/GB2444343B/en
Priority to PCT/GB2007/004440 priority patent/WO2008065351A1/en
Publication of GB2446200A publication Critical patent/GB2446200A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1074Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
    • H04L67/1078Resource delivery mechanisms
    • H04L67/108Resource delivery mechanisms characterised by resources being split in blocks or fragments
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C1/00Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
    • H04L29/08306
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0457Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply dynamic encryption, e.g. stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1074Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/16Obfuscation or hiding, e.g. involving white box
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/42Anonymization, e.g. involving pseudonyms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks

Abstract

A file is divided into chunks 2 and small data elements, such as bytes, are permuted between the chunks 3. Each chunk is hashed 4 to form a chunk hash, and each chunk hash is encrypted using one or more other chunk hashes 5 in a self encryption process. The chunk hashes and the encrypted chunk hashes are constituents of a mapping function. The chunks are distributed across various nodes of a peer-to-peer network. The permutation of the chunks contributes towards the effective encryption of the file. The file can be recovered using the mapping function.
GB0624058A 2006-12-01 2006-12-01 Encryption system for peer-to-peer networks which relies on hash based self-encryption and mapping Withdrawn GB2446200A (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
GB0624058A GB2446200A (en) 2006-12-01 2006-12-01 Encryption system for peer-to-peer networks which relies on hash based self-encryption and mapping
GB0709761.1A GB2444343B (en) 2006-12-01 2007-05-22 Self encryption
PCT/GB2007/004440 WO2008065351A1 (en) 2006-12-01 2007-11-21 Self encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0624058A GB2446200A (en) 2006-12-01 2006-12-01 Encryption system for peer-to-peer networks which relies on hash based self-encryption and mapping

Publications (2)

Publication Number Publication Date
GB0624058D0 true GB0624058D0 (en) 2007-01-10
GB2446200A GB2446200A (en) 2008-08-06

Family

ID=37671713

Family Applications (2)

Application Number Title Priority Date Filing Date
GB0624058A Withdrawn GB2446200A (en) 2006-12-01 2006-12-01 Encryption system for peer-to-peer networks which relies on hash based self-encryption and mapping
GB0709761.1A Active GB2444343B (en) 2006-12-01 2007-05-22 Self encryption

Family Applications After (1)

Application Number Title Priority Date Filing Date
GB0709761.1A Active GB2444343B (en) 2006-12-01 2007-05-22 Self encryption

Country Status (1)

Country Link
GB (2) GB2446200A (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
IL210169A0 (en) 2010-12-22 2011-03-31 Yehuda Binder System and method for routing-based internet security
US9900384B2 (en) * 2013-07-12 2018-02-20 Adobe Systems Incorporated Distributed caching in a communication network
US9621586B2 (en) 2014-02-08 2017-04-11 International Business Machines Corporation Methods and apparatus for enhancing business services resiliency using continuous fragmentation cell technology
US9521128B2 (en) 2014-11-07 2016-12-13 Qualcomm Incorporated Using a hash of a filename to control encoding/decoding of a digital file

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6807632B1 (en) * 1999-01-21 2004-10-19 Emc Corporation Content addressable information encapsulation, representation, and transfer
AU3826901A (en) * 2000-02-18 2001-08-27 Undoo Inc Hash file system and method for use in a commonality factoring system
US7412462B2 (en) * 2000-02-18 2008-08-12 Burnside Acquisition, Llc Data repository and method for promoting network storage of data
US20030084020A1 (en) * 2000-12-22 2003-05-01 Li Shu Distributed fault tolerant and secure storage
US7043637B2 (en) * 2001-03-21 2006-05-09 Microsoft Corporation On-disk file format for a serverless distributed file system
US7418454B2 (en) * 2004-04-16 2008-08-26 Microsoft Corporation Data overlay, self-organized metadata overlay, and application level multicasting
WO2005119476A2 (en) * 2004-05-19 2005-12-15 Wurld Media, Inc. Routing of digital content in a peer-to-peer dynamic connection structure
FR2878673B1 (en) * 2004-11-26 2007-02-09 Univ Picardie Jules Verne Etab PERENNE DISTRIBUTED BACKUP SYSTEM AND METHOD
WO2007008567A1 (en) * 2005-07-08 2007-01-18 Matsushita Electric Industrial Co., Ltd. Secure peer to peer messaging service
CN1925388A (en) * 2005-08-31 2007-03-07 西门子(中国)有限公司 Resource encrypting and deencrypting method and system

Also Published As

Publication number Publication date
GB2444343B (en) 2012-04-18
GB2446200A (en) 2008-08-06
GB2444343A (en) 2008-06-04
GB0709761D0 (en) 2007-06-27

Similar Documents

Publication Publication Date Title
NZ603822A (en) Permutation data transform to enhance security
EP1278113A3 (en) On-disk file format for a serverless distributed file system
NO20044028L (en) Use of isogenies for the development of cryptosystems
TNSN07055A1 (en) Permutation data transform to enhance security
JP2017511920A5 (en)
EP1982263A4 (en) Automatically determining file replication mechanisms
AU2001295208A1 (en) Encryption systems and methods for identifying and coalescing identical objects encrypted with different keys
GB2434900A (en) System and method to support single instance storage operations
WO2007011679A3 (en) Systems and methods of ambiguity envelope encryption scheme and applications
WO2007120772A3 (en) Method, system, and computer-readable medium to maintain and/or purge files of a document management system
WO2009134930A3 (en) Discarding sensitive data from persistent point-in-time image
WO2008121157A3 (en) Cryptographic key management system facilitating secure access of data portions to corresponding groups of users
GB2444343B (en) Self encryption
WO2012040231A3 (en) Systems and methods for secure data sharing
DE60313778D1 (en) System for secure document delivery
CN105760781A (en) Storage method, restoration method and operation method of ordered and derivable large-data files
TW200637320A (en) Securely ingesting encrypted content into content servers
Zhou et al. A similarity-aware encrypted deduplication scheme with flexible access control in the cloud
WO2008136876A3 (en) Secure distribution of content using decryption keys
DE602007004262D1 (en) Creation of substrings while preserving privacy
GB0709754D0 (en) Shared access to private files
GB0013356D0 (en) A method of validating an encrypted message
TW200622903A (en) Xparts-schematized data wrapper
CN104636369A (en) Duplicated data deleting method capable of verifying file ownership
ATE515902T1 (en) SECURE COMMUNICATION SYSTEM WITH TERMINAL DEVICES WITH DIFFERENT SECURITY PERFORMANCE LEVELS

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)