GB0624058D0 - Self encryption - Google Patents
Self encryptionInfo
- Publication number
- GB0624058D0 GB0624058D0 GBGB0624058.4A GB0624058A GB0624058D0 GB 0624058 D0 GB0624058 D0 GB 0624058D0 GB 0624058 A GB0624058 A GB 0624058A GB 0624058 D0 GB0624058 D0 GB 0624058D0
- Authority
- GB
- United Kingdom
- Prior art keywords
- chunk
- chunks
- file
- hashes
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1074—Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
- H04L67/1078—Resource delivery mechanisms
- H04L67/108—Resource delivery mechanisms characterised by resources being split in blocks or fragments
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C1/00—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
-
- H04L29/08306—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0457—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply dynamic encryption, e.g. stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1074—Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/16—Obfuscation or hiding, e.g. involving white box
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/42—Anonymization, e.g. involving pseudonyms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
Abstract
A file is divided into chunks 2 and small data elements, such as bytes, are permuted between the chunks 3. Each chunk is hashed 4 to form a chunk hash, and each chunk hash is encrypted using one or more other chunk hashes 5 in a self encryption process. The chunk hashes and the encrypted chunk hashes are constituents of a mapping function. The chunks are distributed across various nodes of a peer-to-peer network. The permutation of the chunks contributes towards the effective encryption of the file. The file can be recovered using the mapping function.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0624058A GB2446200A (en) | 2006-12-01 | 2006-12-01 | Encryption system for peer-to-peer networks which relies on hash based self-encryption and mapping |
GB0709761.1A GB2444343B (en) | 2006-12-01 | 2007-05-22 | Self encryption |
PCT/GB2007/004440 WO2008065351A1 (en) | 2006-12-01 | 2007-11-21 | Self encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0624058A GB2446200A (en) | 2006-12-01 | 2006-12-01 | Encryption system for peer-to-peer networks which relies on hash based self-encryption and mapping |
Publications (2)
Publication Number | Publication Date |
---|---|
GB0624058D0 true GB0624058D0 (en) | 2007-01-10 |
GB2446200A GB2446200A (en) | 2008-08-06 |
Family
ID=37671713
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0624058A Withdrawn GB2446200A (en) | 2006-12-01 | 2006-12-01 | Encryption system for peer-to-peer networks which relies on hash based self-encryption and mapping |
GB0709761.1A Active GB2444343B (en) | 2006-12-01 | 2007-05-22 | Self encryption |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0709761.1A Active GB2444343B (en) | 2006-12-01 | 2007-05-22 | Self encryption |
Country Status (1)
Country | Link |
---|---|
GB (2) | GB2446200A (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
IL210169A0 (en) | 2010-12-22 | 2011-03-31 | Yehuda Binder | System and method for routing-based internet security |
US9900384B2 (en) * | 2013-07-12 | 2018-02-20 | Adobe Systems Incorporated | Distributed caching in a communication network |
US9621586B2 (en) | 2014-02-08 | 2017-04-11 | International Business Machines Corporation | Methods and apparatus for enhancing business services resiliency using continuous fragmentation cell technology |
US9521128B2 (en) | 2014-11-07 | 2016-12-13 | Qualcomm Incorporated | Using a hash of a filename to control encoding/decoding of a digital file |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6807632B1 (en) * | 1999-01-21 | 2004-10-19 | Emc Corporation | Content addressable information encapsulation, representation, and transfer |
AU3826901A (en) * | 2000-02-18 | 2001-08-27 | Undoo Inc | Hash file system and method for use in a commonality factoring system |
US7412462B2 (en) * | 2000-02-18 | 2008-08-12 | Burnside Acquisition, Llc | Data repository and method for promoting network storage of data |
US20030084020A1 (en) * | 2000-12-22 | 2003-05-01 | Li Shu | Distributed fault tolerant and secure storage |
US7043637B2 (en) * | 2001-03-21 | 2006-05-09 | Microsoft Corporation | On-disk file format for a serverless distributed file system |
US7418454B2 (en) * | 2004-04-16 | 2008-08-26 | Microsoft Corporation | Data overlay, self-organized metadata overlay, and application level multicasting |
WO2005119476A2 (en) * | 2004-05-19 | 2005-12-15 | Wurld Media, Inc. | Routing of digital content in a peer-to-peer dynamic connection structure |
FR2878673B1 (en) * | 2004-11-26 | 2007-02-09 | Univ Picardie Jules Verne Etab | PERENNE DISTRIBUTED BACKUP SYSTEM AND METHOD |
WO2007008567A1 (en) * | 2005-07-08 | 2007-01-18 | Matsushita Electric Industrial Co., Ltd. | Secure peer to peer messaging service |
CN1925388A (en) * | 2005-08-31 | 2007-03-07 | 西门子(中国)有限公司 | Resource encrypting and deencrypting method and system |
-
2006
- 2006-12-01 GB GB0624058A patent/GB2446200A/en not_active Withdrawn
-
2007
- 2007-05-22 GB GB0709761.1A patent/GB2444343B/en active Active
Also Published As
Publication number | Publication date |
---|---|
GB2444343B (en) | 2012-04-18 |
GB2446200A (en) | 2008-08-06 |
GB2444343A (en) | 2008-06-04 |
GB0709761D0 (en) | 2007-06-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
NZ603822A (en) | Permutation data transform to enhance security | |
EP1278113A3 (en) | On-disk file format for a serverless distributed file system | |
NO20044028L (en) | Use of isogenies for the development of cryptosystems | |
TNSN07055A1 (en) | Permutation data transform to enhance security | |
JP2017511920A5 (en) | ||
EP1982263A4 (en) | Automatically determining file replication mechanisms | |
AU2001295208A1 (en) | Encryption systems and methods for identifying and coalescing identical objects encrypted with different keys | |
GB2434900A (en) | System and method to support single instance storage operations | |
WO2007011679A3 (en) | Systems and methods of ambiguity envelope encryption scheme and applications | |
WO2007120772A3 (en) | Method, system, and computer-readable medium to maintain and/or purge files of a document management system | |
WO2009134930A3 (en) | Discarding sensitive data from persistent point-in-time image | |
WO2008121157A3 (en) | Cryptographic key management system facilitating secure access of data portions to corresponding groups of users | |
GB2444343B (en) | Self encryption | |
WO2012040231A3 (en) | Systems and methods for secure data sharing | |
DE60313778D1 (en) | System for secure document delivery | |
CN105760781A (en) | Storage method, restoration method and operation method of ordered and derivable large-data files | |
TW200637320A (en) | Securely ingesting encrypted content into content servers | |
Zhou et al. | A similarity-aware encrypted deduplication scheme with flexible access control in the cloud | |
WO2008136876A3 (en) | Secure distribution of content using decryption keys | |
DE602007004262D1 (en) | Creation of substrings while preserving privacy | |
GB0709754D0 (en) | Shared access to private files | |
GB0013356D0 (en) | A method of validating an encrypted message | |
TW200622903A (en) | Xparts-schematized data wrapper | |
CN104636369A (en) | Duplicated data deleting method capable of verifying file ownership | |
ATE515902T1 (en) | SECURE COMMUNICATION SYSTEM WITH TERMINAL DEVICES WITH DIFFERENT SECURITY PERFORMANCE LEVELS |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |