GB2580386A8 - Variable data protection - Google Patents
Variable data protection Download PDFInfo
- Publication number
- GB2580386A8 GB2580386A8 GB1900271.6A GB201900271A GB2580386A8 GB 2580386 A8 GB2580386 A8 GB 2580386A8 GB 201900271 A GB201900271 A GB 201900271A GB 2580386 A8 GB2580386 A8 GB 2580386A8
- Authority
- GB
- United Kingdom
- Prior art keywords
- message
- receiver
- blocks
- sender
- block
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/34—Bits, or blocks of bits, of the telegraphic message being interchanged in time
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
- H04K1/06—Secret communication by transmitting the information or elements thereof at unnatural speeds or in jumbled order or backwards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3003—Monitoring arrangements specially adapted to the computing system or computing system component being monitored
- G06F11/3006—Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is distributed, e.g. networked systems, clusters, multiprocessor systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3003—Monitoring arrangements specially adapted to the computing system or computing system component being monitored
- G06F11/302—Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3409—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/76—Arrangements for rearranging, permuting or selecting data according to predetermined rules, independently of the content of the data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/22—Arrangements for preventing the taking of data from a data transmission channel without authorisation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
- G06F2201/865—Monitoring of software
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C1/00—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/10—Digital recording or reproducing
- G11B20/12—Formatting, e.g. arrangement of data block or words on the record carriers
- G11B2020/1291—Formatting, e.g. arrangement of data block or words on the record carriers wherein the formatting serves a specific purpose
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/16—Obfuscation or hiding, e.g. involving white box
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
Abstract
Protecting data in a message communicated from a sender to a receiver, the sender and receiver sharing a secret, comprising: splitting 704 the message into a number of ordered message blocks, generating 706, for each block, an encoded indication of a position of the block in a proper order of blocks as found in the original message, the encoding being reversible and based on at least a hash value for the content of the block and a secret shared between the sender and the receiver, and a position of the block in the proper order; communicating 708 the blocks and the encoded position indications to the receiver, the blocks being communicated in an order different to the proper order to obfuscate the message. The message can be reassembled by the receiver to the proper order by using the shared secret. The number of ordered message blocks that a message is divided into is variable and determined 702 on the basis of a performance analysis of the sender or receiver, the performance analysis determining a maximum number of hashing operations that can be performed by the device (e.g. hash speed) or execution time while satisfying a predetermined performance criterion.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1900271.6A GB2580386B8 (en) | 2019-01-09 | 2019-01-09 | Variable data protection |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1900271.6A GB2580386B8 (en) | 2019-01-09 | 2019-01-09 | Variable data protection |
Publications (5)
Publication Number | Publication Date |
---|---|
GB201900271D0 GB201900271D0 (en) | 2019-02-27 |
GB2580386A GB2580386A (en) | 2020-07-22 |
GB2580386B GB2580386B (en) | 2021-07-28 |
GB2580386B8 GB2580386B8 (en) | 2021-08-11 |
GB2580386A8 true GB2580386A8 (en) | 2021-08-11 |
Family
ID=65527982
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB1900271.6A Active GB2580386B8 (en) | 2019-01-09 | 2019-01-09 | Variable data protection |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2580386B8 (en) |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6957349B1 (en) * | 1999-01-28 | 2005-10-18 | Yutaka Yasukura | Method for securing safety of electronic information |
US8204217B2 (en) * | 2009-01-28 | 2012-06-19 | Telefonaktiebolaget Lm Ericsson (Publ) | Lightweight streaming protection by sequence number scrambling |
US9521128B2 (en) * | 2014-11-07 | 2016-12-13 | Qualcomm Incorporated | Using a hash of a filename to control encoding/decoding of a digital file |
-
2019
- 2019-01-09 GB GB1900271.6A patent/GB2580386B8/en active Active
Also Published As
Publication number | Publication date |
---|---|
GB2580386B (en) | 2021-07-28 |
GB2580386B8 (en) | 2021-08-11 |
GB2580386A (en) | 2020-07-22 |
GB201900271D0 (en) | 2019-02-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9086819B2 (en) | System and method for combining deduplication and encryption of data | |
CN103581173B (en) | Safe data transmission method, system and device based on industrial Ethernet | |
EP2897051A3 (en) | Verifiable audit log | |
WO2019046317A8 (en) | Key data processing method and apparatus, and server | |
EP4254860A3 (en) | Key pair infrastructure for secure messaging | |
PH12018501742A1 (en) | A method and system for securing computer software using a distributed hash table and a block chain | |
MY190550A (en) | Method and device for processing service request | |
CN103095461B (en) | The authentication method of network signal between a kind of quantum safety network equipment | |
IL294252B2 (en) | Client(s) to cloud or remote server secure data or file object encryption gateway | |
RU2017134659A (en) | Authentication of controllers LAN messages | |
WO2007105126A3 (en) | Method and system for obfuscating a cryptographic function | |
US20160344553A1 (en) | Storing and retrieving ciphertext in data storage | |
WO2019060554A3 (en) | Methods and systems for determining a video player playback position | |
CA2579909A1 (en) | System and method for determining a security encoding to be applied to outgoing messages | |
US10305689B2 (en) | Encryption apparatus, decryption apparatus, cryptography processing system, encryption method, decryption method, encryption program, and decryption program | |
SG11201809981QA (en) | Processing method for preventing copy attack, and server and client | |
JP2017216664A5 (en) | ||
CN104967693A (en) | Document similarity calculation method facing cloud storage based on fully homomorphic password technology | |
CN112580072A (en) | Data set intersection method and device | |
GB2617733A (en) | Implementing resilient deterministic encryption | |
KR101825838B1 (en) | Method of partially encrypting data, method of decrypting a partially-encrpted data, storage medium for a program decrypting a partially-encrpted data | |
CN107040366A (en) | A kind of data ciphering method for carrying effective business information transmission and regular length | |
MX2022002895A (en) | Determination of spatial audio parameter encoding and associated decoding. | |
GB2580386A8 (en) | Variable data protection | |
GB2553913A (en) | Media key block based broadcast encryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
S117 | Correction of errors in patents and applications (sect. 117/patents act 1977) |
Free format text: REQUEST FILED; REQUEST FOR CORRECTION UNDER SECTION 117 FILED ON 28 JULY 2021 |
|
S117 | Correction of errors in patents and applications (sect. 117/patents act 1977) |
Free format text: CORRECTIONS ALLOWED; REQUEST FOR CORRECTION UNDER SECTION 117 FILED ON 28 JULY 2021 WAS ALLOWED ON 5 AUGUST 2021 |