GB2444343B - Self encryption - Google Patents
Self encryptionInfo
- Publication number
- GB2444343B GB2444343B GB0709761.1A GB0709761A GB2444343B GB 2444343 B GB2444343 B GB 2444343B GB 0709761 A GB0709761 A GB 0709761A GB 2444343 B GB2444343 B GB 2444343B
- Authority
- GB
- United Kingdom
- Prior art keywords
- chunk
- chunks
- file
- hashes
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000013507 mapping Methods 0.000 abstract 2
- 239000000470 constituent Substances 0.000 abstract 1
- 238000000034 method Methods 0.000 abstract 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1074—Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
- H04L67/1078—Resource delivery mechanisms
- H04L67/108—Resource delivery mechanisms characterised by resources being split in blocks or fragments
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C1/00—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
-
- H04L29/06659—
-
- H04L29/06687—
-
- H04L29/08306—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0457—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply dynamic encryption, e.g. stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1074—Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/16—Obfuscation or hiding, e.g. involving white box
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/42—Anonymization, e.g. involving pseudonyms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
A file is divided into chunks 2 and small data elements, such as bytes, are permuted between the chunks 3. Each chunk is hashed 4 to form a chunk hash, and each chunk hash is encrypted using one or more other chunk hashes 5 in a self encryption process. The chunk hashes and the encrypted chunk hashes are constituents of a mapping function. The chunks are distributed across various nodes of a peer-to-peer network. The permutation of the chunks contributes towards the effective encryption of the file. The file can be recovered using the mapping function.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/GB2007/004440 WO2008065351A1 (en) | 2006-12-01 | 2007-11-21 | Self encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0624058A GB2446200A (en) | 2006-12-01 | 2006-12-01 | Encryption system for peer-to-peer networks which relies on hash based self-encryption and mapping |
Publications (3)
Publication Number | Publication Date |
---|---|
GB0709761D0 GB0709761D0 (en) | 2007-06-27 |
GB2444343A GB2444343A (en) | 2008-06-04 |
GB2444343B true GB2444343B (en) | 2012-04-18 |
Family
ID=37671713
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0624058A Withdrawn GB2446200A (en) | 2006-12-01 | 2006-12-01 | Encryption system for peer-to-peer networks which relies on hash based self-encryption and mapping |
GB0709761.1A Active GB2444343B (en) | 2006-12-01 | 2007-05-22 | Self encryption |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0624058A Withdrawn GB2446200A (en) | 2006-12-01 | 2006-12-01 | Encryption system for peer-to-peer networks which relies on hash based self-encryption and mapping |
Country Status (1)
Country | Link |
---|---|
GB (2) | GB2446200A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9177157B2 (en) | 2010-12-22 | 2015-11-03 | May Patents Ltd. | System and method for routing-based internet security |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9900384B2 (en) * | 2013-07-12 | 2018-02-20 | Adobe Systems Incorporated | Distributed caching in a communication network |
US9621586B2 (en) | 2014-02-08 | 2017-04-11 | International Business Machines Corporation | Methods and apparatus for enhancing business services resiliency using continuous fragmentation cell technology |
US9521128B2 (en) | 2014-11-07 | 2016-12-13 | Qualcomm Incorporated | Using a hash of a filename to control encoding/decoding of a digital file |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001061563A1 (en) * | 2000-02-18 | 2001-08-23 | Avamar Technologies, Inc. | Hash file system and method for use in a commonality factoring system |
US20020038296A1 (en) * | 2000-02-18 | 2002-03-28 | Margolus Norman H. | Data repository and method for promoting network storage of data |
WO2002052787A2 (en) * | 2000-12-22 | 2002-07-04 | The Charles Stark Draper Laboratory, Inc. | Message splitting and spatially diversified message routing for increasing transmission assurance and data security over distributed networks |
US20020194209A1 (en) * | 2001-03-21 | 2002-12-19 | Bolosky William J. | On-disk file format for a serverless distributed file system |
WO2007008567A1 (en) * | 2005-07-08 | 2007-01-18 | Matsushita Electric Industrial Co., Ltd. | Secure peer to peer messaging service |
WO2007025998A2 (en) * | 2005-08-31 | 2007-03-08 | Nokia Siemens Networks Gmbh & Co. Kg | Method and system for resource encryption and decryption |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6807632B1 (en) * | 1999-01-21 | 2004-10-19 | Emc Corporation | Content addressable information encapsulation, representation, and transfer |
US7418454B2 (en) * | 2004-04-16 | 2008-08-26 | Microsoft Corporation | Data overlay, self-organized metadata overlay, and application level multicasting |
EP1752002A1 (en) * | 2004-05-19 | 2007-02-14 | Wurld Media, Inc. | Dynamic connection structure topologies and methods for facilitating the peer-to-peer transfer of digital files |
FR2878673B1 (en) * | 2004-11-26 | 2007-02-09 | Univ Picardie Jules Verne Etab | PERENNE DISTRIBUTED BACKUP SYSTEM AND METHOD |
-
2006
- 2006-12-01 GB GB0624058A patent/GB2446200A/en not_active Withdrawn
-
2007
- 2007-05-22 GB GB0709761.1A patent/GB2444343B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001061563A1 (en) * | 2000-02-18 | 2001-08-23 | Avamar Technologies, Inc. | Hash file system and method for use in a commonality factoring system |
US20020038296A1 (en) * | 2000-02-18 | 2002-03-28 | Margolus Norman H. | Data repository and method for promoting network storage of data |
WO2002052787A2 (en) * | 2000-12-22 | 2002-07-04 | The Charles Stark Draper Laboratory, Inc. | Message splitting and spatially diversified message routing for increasing transmission assurance and data security over distributed networks |
US20020194209A1 (en) * | 2001-03-21 | 2002-12-19 | Bolosky William J. | On-disk file format for a serverless distributed file system |
WO2007008567A1 (en) * | 2005-07-08 | 2007-01-18 | Matsushita Electric Industrial Co., Ltd. | Secure peer to peer messaging service |
WO2007025998A2 (en) * | 2005-08-31 | 2007-03-08 | Nokia Siemens Networks Gmbh & Co. Kg | Method and system for resource encryption and decryption |
Non-Patent Citations (2)
Title |
---|
Hwang, K-F and Chang, C-C, "A Self-Encryption Mechanism for Authentication of Roaming and Teleconference Services", IEEE Transactions on Wireless Communications, Vol. 2. No. 2, March 2003. * |
Smith, Richard E, "Internet Cryptography", Addison Wesley Longmon, Inc. October 1997, ISBN 0-201-92480-3, pp40-41. * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9177157B2 (en) | 2010-12-22 | 2015-11-03 | May Patents Ltd. | System and method for routing-based internet security |
Also Published As
Publication number | Publication date |
---|---|
GB2444343A (en) | 2008-06-04 |
GB0709761D0 (en) | 2007-06-27 |
GB2446200A (en) | 2008-08-06 |
GB0624058D0 (en) | 2007-01-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TW200610349A (en) | Key derivation functions to enhance security | |
NZ603822A (en) | Permutation data transform to enhance security | |
EP1278113A3 (en) | On-disk file format for a serverless distributed file system | |
NO20044028L (en) | Use of isogenies for the development of cryptosystems | |
ATE532144T1 (en) | DOCUMENT SECURITY MANAGEMENT SYSTEM | |
TNSN07055A1 (en) | Permutation data transform to enhance security | |
CN108200172B (en) | Cloud storage system and method supporting safe data deduplication and deletion | |
JP2017511920A5 (en) | ||
WO2005059717A3 (en) | Certificate based digital rights management | |
GB0624056D0 (en) | msSAN | |
EP1982263A4 (en) | Automatically determining file replication mechanisms | |
AU2001295208A1 (en) | Encryption systems and methods for identifying and coalescing identical objects encrypted with different keys | |
WO2010141445A3 (en) | Workgroup key wrapping for community of interest membership authentication | |
MX2008001850A (en) | Protecting digital media of various content types. | |
WO2010040078A3 (en) | System and method for organizing data to facilitate data deduplication | |
TW200711436A (en) | Secure patch system | |
AR076255A1 (en) | METHODS FOR THE OPERATION OF A POINT-TO-POINT NETWORK WITH FIXED PREFIX | |
WO2007120772A3 (en) | Method, system, and computer-readable medium to maintain and/or purge files of a document management system | |
GB2444343B (en) | Self encryption | |
DE602007004262D1 (en) | Creation of substrings while preserving privacy | |
GB0013356D0 (en) | A method of validating an encrypted message | |
ES2198201B1 (en) | PROCEDURE AND SYSTEM OF DISTRIBUTION AND MANAGEMENT OF RIGHTS OF USE ASSOCIATED WITH A CONTENT PURCHASED, FOR MOBILE TERMINALS. | |
CN104636369A (en) | Duplicated data deleting method capable of verifying file ownership | |
TW200702989A (en) | Data structure using memory blocks to encrypt data | |
KR101315683B1 (en) | Encrypting and decrypting method without causing change of data size and type |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
732E | Amendments to the register in respect of changes of name or changes affecting rights (sect. 32/1977) |
Free format text: REGISTERED BETWEEN 20151029 AND 20151104 |
|
PCNP | Patent ceased through non-payment of renewal fee |
Effective date: 20200522 |
|
S28 | Restoration of ceased patents (sect. 28/pat. act 1977) |
Free format text: APPLICATION FILED |
|
S28 | Restoration of ceased patents (sect. 28/pat. act 1977) |
Free format text: RESTORATION ALLOWED Effective date: 20210820 |