JP2008545163A - セキュアハッシュ関数の強化 - Google Patents

セキュアハッシュ関数の強化 Download PDF

Info

Publication number
JP2008545163A
JP2008545163A JP2008519339A JP2008519339A JP2008545163A JP 2008545163 A JP2008545163 A JP 2008545163A JP 2008519339 A JP2008519339 A JP 2008519339A JP 2008519339 A JP2008519339 A JP 2008519339A JP 2008545163 A JP2008545163 A JP 2008545163A
Authority
JP
Japan
Prior art keywords
block
sub
message
medium
hash
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
JP2008519339A
Other languages
English (en)
Japanese (ja)
Other versions
JP2008545163A5 (enExample
Inventor
エー.ユバル ギデオン
ベンカテサン ラマラスナム
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Corp
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corp filed Critical Microsoft Corp
Publication of JP2008545163A publication Critical patent/JP2008545163A/ja
Publication of JP2008545163A5 publication Critical patent/JP2008545163A5/ja
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • H04K1/04Secret communication by frequency scrambling, i.e. by transposing or inverting parts of the frequency band or by inverting the whole band
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Power Engineering (AREA)
  • Quality & Reliability (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
JP2008519339A 2005-06-28 2006-06-13 セキュアハッシュ関数の強化 Pending JP2008545163A (ja)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11/168,842 US7546461B2 (en) 2005-06-28 2005-06-28 Strengthening secure hash functions
PCT/US2006/022960 WO2007001829A2 (en) 2005-06-28 2006-06-13 Strengthening secure hash functions

Publications (2)

Publication Number Publication Date
JP2008545163A true JP2008545163A (ja) 2008-12-11
JP2008545163A5 JP2008545163A5 (enExample) 2009-07-30

Family

ID=37569013

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2008519339A Pending JP2008545163A (ja) 2005-06-28 2006-06-13 セキュアハッシュ関数の強化

Country Status (6)

Country Link
US (1) US7546461B2 (enExample)
EP (1) EP1886432A2 (enExample)
JP (1) JP2008545163A (enExample)
KR (1) KR20080018182A (enExample)
CN (1) CN101204035A (enExample)
WO (1) WO2007001829A2 (enExample)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11843701B2 (en) 2020-07-10 2023-12-12 Fujitsu Limited Computer-readable recording medium storing generation program for generating aggregation hash value by aggregating hash values for blocks of content, and generation apparatus for generating aggregation hash value by aggregating hash values for blocks of content

Families Citing this family (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070113083A1 (en) * 2005-07-14 2007-05-17 Volkovs Nikolajs System and method of message authentication
KR100785810B1 (ko) * 2006-12-05 2007-12-13 한국전자통신연구원 Rfid 데이터 보호 장치 및 방법
US8086860B2 (en) * 2007-10-01 2011-12-27 Tata Consultancy Services Limited Method for preventing and detecting hash collisions of data during the data transmission
WO2013095503A1 (en) * 2011-12-22 2013-06-27 Intel Corporation Method and apparatus to process sha-1 secure hashing algorithm
US9935768B2 (en) 2012-08-06 2018-04-03 Samsung Electronics Co., Ltd. Processors including key management circuits and methods of operating key management circuits
KR102013841B1 (ko) 2012-08-06 2019-08-23 삼성전자주식회사 데이터의 안전한 저장을 위한 키 관리 방법 및 그 장치
CA2903830C (en) 2013-03-05 2021-08-24 Fasetto, Llc System and method for cubic graphical user interfaces
CN103209075A (zh) * 2013-03-15 2013-07-17 南京易司拓电力科技股份有限公司 一种密码交换方法
DK3022638T3 (en) 2013-07-18 2018-07-23 Fasetto L L C SYSTEM AND PROCEDURE FOR MULTIPLINE VIDEOS
US10095873B2 (en) 2013-09-30 2018-10-09 Fasetto, Inc. Paperless application
US9584402B2 (en) 2014-01-27 2017-02-28 Fasetto, Llc Systems and methods for peer to peer communication
MX379322B (es) 2014-07-10 2025-03-11 Fasetto Inc Sistemas y metodos para editar mensajes.
AU2015328723A1 (en) 2014-10-06 2017-04-20 Fasetto, Inc. Systems and methods for portable storage devices
US10437288B2 (en) 2014-10-06 2019-10-08 Fasetto, Inc. Portable storage device with modular power and housing system
KR102452169B1 (ko) 2015-03-11 2022-10-11 파세토, 인크. 웹 api 통신을 위한 시스템 및 방법
US10929071B2 (en) 2015-12-03 2021-02-23 Fasetto, Inc. Systems and methods for memory card emulation
GB2562623A (en) * 2016-02-23 2018-11-21 Nchain Holdings Ltd Registry and automated management method for blockchain-enforced smart contracts
AU2017363882B2 (en) 2016-11-23 2021-08-12 Fasetto, Inc. Systems and methods for streaming media
CA3054681A1 (en) 2017-02-03 2018-08-09 Fasetto, Inc. Systems and methods for data storage in keyed devices
US10763630B2 (en) 2017-10-19 2020-09-01 Fasetto, Inc. Portable electronic device connection systems
TW201919361A (zh) * 2017-11-09 2019-05-16 張英輝 以雜文加強保護之區塊加密及其解密之方法
AU2018374384A1 (en) 2017-12-01 2020-07-23 Fasetto, Inc. Systems and methods for improved data encryption
CN112292708B (zh) 2018-04-17 2022-06-17 法斯埃托股份有限公司 具有实时反馈的演示系统和方法
US11764945B2 (en) * 2018-05-25 2023-09-19 ZenmuTech, Inc Data processing device, method, and computer program
US11288663B1 (en) 2021-06-25 2022-03-29 Arri E. Manuel Blockring service, system, and method thereof
US11934667B1 (en) * 2021-06-30 2024-03-19 Amazon Technologies, Inc. Encrypted-data-only media operations
US20250015984A1 (en) * 2023-07-05 2025-01-09 Theon Technology Llc Use Of Quantum Resistant Iterative Keypads For Large Files

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS5592483A (en) * 1978-12-29 1980-07-12 Ibm Key control coding system
JPH0627878A (ja) * 1991-03-20 1994-02-04 Internatl Business Mach Corp <Ibm> 暗号用キー入力の妥当性検査のための方法および装置
JPH06202558A (ja) * 1992-10-16 1994-07-22 Internatl Business Mach Corp <Ibm> 商用データ・マスキング
JPH09127868A (ja) * 1995-07-03 1997-05-16 General Instr Corp Of Delaware 二重フィードフォワードハッシュ機能を有する暗号装置
JP2001142394A (ja) * 1999-08-31 2001-05-25 Matsushita Electric Ind Co Ltd 暗号化方法、暗号化装置、復号化方法及び復号化装置

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998031122A1 (en) 1997-01-08 1998-07-16 Bell Communications Research, Inc. A method and apparatus for generating secure hash functions
KR100389902B1 (ko) 1997-06-23 2003-09-22 삼성전자주식회사 차분해독법과선형해독법에대하여안전성을보장하는고속블럭암호화방법
US6578144B1 (en) 1999-03-23 2003-06-10 International Business Machines Corporation Secure hash-and-sign signatures

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS5592483A (en) * 1978-12-29 1980-07-12 Ibm Key control coding system
JPH0627878A (ja) * 1991-03-20 1994-02-04 Internatl Business Mach Corp <Ibm> 暗号用キー入力の妥当性検査のための方法および装置
JPH06202558A (ja) * 1992-10-16 1994-07-22 Internatl Business Mach Corp <Ibm> 商用データ・マスキング
JPH09127868A (ja) * 1995-07-03 1997-05-16 General Instr Corp Of Delaware 二重フィードフォワードハッシュ機能を有する暗号装置
JP2001142394A (ja) * 1999-08-31 2001-05-25 Matsushita Electric Ind Co Ltd 暗号化方法、暗号化装置、復号化方法及び復号化装置

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11843701B2 (en) 2020-07-10 2023-12-12 Fujitsu Limited Computer-readable recording medium storing generation program for generating aggregation hash value by aggregating hash values for blocks of content, and generation apparatus for generating aggregation hash value by aggregating hash values for blocks of content

Also Published As

Publication number Publication date
US7546461B2 (en) 2009-06-09
WO2007001829A3 (en) 2007-05-18
EP1886432A2 (en) 2008-02-13
US20060294386A1 (en) 2006-12-28
KR20080018182A (ko) 2008-02-27
WO2007001829A2 (en) 2007-01-04
CN101204035A (zh) 2008-06-18

Similar Documents

Publication Publication Date Title
JP2008545163A (ja) セキュアハッシュ関数の強化
JP6144992B2 (ja) 検索可能暗号処理システム及び方法
EP3134994B1 (en) Method of obfuscating data
Sadeghi-Nasab et al. A comprehensive review of the security flaws of hashing algorithms
WO2015163822A1 (en) Method and system for generating / decrypting ciphertext, and method and system for searching ciphertexts in a database
WO2013150880A1 (ja) 暗号化装置、復号化装置、暗号化方法、復号化方法、及びプログラム
JP2008545163A5 (enExample)
US20230141210A1 (en) Neural networks
Duan et al. Secure and verifiable outsourcing of large-scale nonnegative matrix factorization (NMF)
CN105763322B (zh) 一种可混淆的加密密钥隔离数字签名方法及系统
JP7347501B2 (ja) Macタグリスト生成装置、macタグリスト検証装置、方法及びプログラム
Rajput et al. A novel image encryption and authentication scheme using chaotic maps
Polpong et al. Authentication and password storing improvement using SXR algorithm with a hash function
WO2016063512A1 (ja) Macタグリスト生成装置、macタグリスト検証装置、macタグリスト生成方法、macタグリスト検証方法およびプログラム記録媒体
JP2011523103A (ja) 対称暗号を実行するための技法
US20220173900A1 (en) Deterministic random blinding
WO2022239163A1 (ja) 認証暗号化装置、認証復号装置、認証暗号システム、方法及びコンピュータ可読媒体
Cid Recent developments in cryptographic hash functions: Security implications and future directions
Churi et al. JSH algorithm: a password encryption technique using Jumbling-Salting-Hashing
US20240113871A1 (en) Encryption processing apparatus, encryption processing method for encryption processing apparatus, and storage medium
JP2017073716A (ja) タグリスト生成装置、タグリスト検証装置、タグリスト更新装置、タグリスト生成方法及びプログラム
Riadi et al. Vigenère Cipher Algorithm Optimization for Digital Image Security using SHA512
Jasek Sha-1 and md5 cryptographic hash functions: Security overview
Abad et al. Enhanced key generation algorithm of hashing message authentication code
JP2017038336A (ja) 復号方法

Legal Events

Date Code Title Description
A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20090612

A621 Written request for application examination

Free format text: JAPANESE INTERMEDIATE CODE: A621

Effective date: 20090612

A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20120106

A02 Decision of refusal

Free format text: JAPANESE INTERMEDIATE CODE: A02

Effective date: 20120601