JP2008545163A - セキュアハッシュ関数の強化 - Google Patents
セキュアハッシュ関数の強化 Download PDFInfo
- Publication number
- JP2008545163A JP2008545163A JP2008519339A JP2008519339A JP2008545163A JP 2008545163 A JP2008545163 A JP 2008545163A JP 2008519339 A JP2008519339 A JP 2008519339A JP 2008519339 A JP2008519339 A JP 2008519339A JP 2008545163 A JP2008545163 A JP 2008545163A
- Authority
- JP
- Japan
- Prior art keywords
- block
- sub
- message
- medium
- hash
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
- H04K1/04—Secret communication by frequency scrambling, i.e. by transposing or inverting parts of the frequency band or by inverting the whole band
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Power Engineering (AREA)
- Quality & Reliability (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US11/168,842 US7546461B2 (en) | 2005-06-28 | 2005-06-28 | Strengthening secure hash functions |
| PCT/US2006/022960 WO2007001829A2 (en) | 2005-06-28 | 2006-06-13 | Strengthening secure hash functions |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| JP2008545163A true JP2008545163A (ja) | 2008-12-11 |
| JP2008545163A5 JP2008545163A5 (enExample) | 2009-07-30 |
Family
ID=37569013
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2008519339A Pending JP2008545163A (ja) | 2005-06-28 | 2006-06-13 | セキュアハッシュ関数の強化 |
Country Status (6)
| Country | Link |
|---|---|
| US (1) | US7546461B2 (enExample) |
| EP (1) | EP1886432A2 (enExample) |
| JP (1) | JP2008545163A (enExample) |
| KR (1) | KR20080018182A (enExample) |
| CN (1) | CN101204035A (enExample) |
| WO (1) | WO2007001829A2 (enExample) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11843701B2 (en) | 2020-07-10 | 2023-12-12 | Fujitsu Limited | Computer-readable recording medium storing generation program for generating aggregation hash value by aggregating hash values for blocks of content, and generation apparatus for generating aggregation hash value by aggregating hash values for blocks of content |
Families Citing this family (27)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20070113083A1 (en) * | 2005-07-14 | 2007-05-17 | Volkovs Nikolajs | System and method of message authentication |
| KR100785810B1 (ko) * | 2006-12-05 | 2007-12-13 | 한국전자통신연구원 | Rfid 데이터 보호 장치 및 방법 |
| US8086860B2 (en) * | 2007-10-01 | 2011-12-27 | Tata Consultancy Services Limited | Method for preventing and detecting hash collisions of data during the data transmission |
| WO2013095503A1 (en) * | 2011-12-22 | 2013-06-27 | Intel Corporation | Method and apparatus to process sha-1 secure hashing algorithm |
| US9935768B2 (en) | 2012-08-06 | 2018-04-03 | Samsung Electronics Co., Ltd. | Processors including key management circuits and methods of operating key management circuits |
| KR102013841B1 (ko) | 2012-08-06 | 2019-08-23 | 삼성전자주식회사 | 데이터의 안전한 저장을 위한 키 관리 방법 및 그 장치 |
| CA2903830C (en) | 2013-03-05 | 2021-08-24 | Fasetto, Llc | System and method for cubic graphical user interfaces |
| CN103209075A (zh) * | 2013-03-15 | 2013-07-17 | 南京易司拓电力科技股份有限公司 | 一种密码交换方法 |
| DK3022638T3 (en) | 2013-07-18 | 2018-07-23 | Fasetto L L C | SYSTEM AND PROCEDURE FOR MULTIPLINE VIDEOS |
| US10095873B2 (en) | 2013-09-30 | 2018-10-09 | Fasetto, Inc. | Paperless application |
| US9584402B2 (en) | 2014-01-27 | 2017-02-28 | Fasetto, Llc | Systems and methods for peer to peer communication |
| MX379322B (es) | 2014-07-10 | 2025-03-11 | Fasetto Inc | Sistemas y metodos para editar mensajes. |
| AU2015328723A1 (en) | 2014-10-06 | 2017-04-20 | Fasetto, Inc. | Systems and methods for portable storage devices |
| US10437288B2 (en) | 2014-10-06 | 2019-10-08 | Fasetto, Inc. | Portable storage device with modular power and housing system |
| KR102452169B1 (ko) | 2015-03-11 | 2022-10-11 | 파세토, 인크. | 웹 api 통신을 위한 시스템 및 방법 |
| US10929071B2 (en) | 2015-12-03 | 2021-02-23 | Fasetto, Inc. | Systems and methods for memory card emulation |
| GB2562623A (en) * | 2016-02-23 | 2018-11-21 | Nchain Holdings Ltd | Registry and automated management method for blockchain-enforced smart contracts |
| AU2017363882B2 (en) | 2016-11-23 | 2021-08-12 | Fasetto, Inc. | Systems and methods for streaming media |
| CA3054681A1 (en) | 2017-02-03 | 2018-08-09 | Fasetto, Inc. | Systems and methods for data storage in keyed devices |
| US10763630B2 (en) | 2017-10-19 | 2020-09-01 | Fasetto, Inc. | Portable electronic device connection systems |
| TW201919361A (zh) * | 2017-11-09 | 2019-05-16 | 張英輝 | 以雜文加強保護之區塊加密及其解密之方法 |
| AU2018374384A1 (en) | 2017-12-01 | 2020-07-23 | Fasetto, Inc. | Systems and methods for improved data encryption |
| CN112292708B (zh) | 2018-04-17 | 2022-06-17 | 法斯埃托股份有限公司 | 具有实时反馈的演示系统和方法 |
| US11764945B2 (en) * | 2018-05-25 | 2023-09-19 | ZenmuTech, Inc | Data processing device, method, and computer program |
| US11288663B1 (en) | 2021-06-25 | 2022-03-29 | Arri E. Manuel | Blockring service, system, and method thereof |
| US11934667B1 (en) * | 2021-06-30 | 2024-03-19 | Amazon Technologies, Inc. | Encrypted-data-only media operations |
| US20250015984A1 (en) * | 2023-07-05 | 2025-01-09 | Theon Technology Llc | Use Of Quantum Resistant Iterative Keypads For Large Files |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPS5592483A (en) * | 1978-12-29 | 1980-07-12 | Ibm | Key control coding system |
| JPH0627878A (ja) * | 1991-03-20 | 1994-02-04 | Internatl Business Mach Corp <Ibm> | 暗号用キー入力の妥当性検査のための方法および装置 |
| JPH06202558A (ja) * | 1992-10-16 | 1994-07-22 | Internatl Business Mach Corp <Ibm> | 商用データ・マスキング |
| JPH09127868A (ja) * | 1995-07-03 | 1997-05-16 | General Instr Corp Of Delaware | 二重フィードフォワードハッシュ機能を有する暗号装置 |
| JP2001142394A (ja) * | 1999-08-31 | 2001-05-25 | Matsushita Electric Ind Co Ltd | 暗号化方法、暗号化装置、復号化方法及び復号化装置 |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO1998031122A1 (en) | 1997-01-08 | 1998-07-16 | Bell Communications Research, Inc. | A method and apparatus for generating secure hash functions |
| KR100389902B1 (ko) | 1997-06-23 | 2003-09-22 | 삼성전자주식회사 | 차분해독법과선형해독법에대하여안전성을보장하는고속블럭암호화방법 |
| US6578144B1 (en) | 1999-03-23 | 2003-06-10 | International Business Machines Corporation | Secure hash-and-sign signatures |
-
2005
- 2005-06-28 US US11/168,842 patent/US7546461B2/en not_active Expired - Fee Related
-
2006
- 2006-06-13 CN CNA2006800221760A patent/CN101204035A/zh active Pending
- 2006-06-13 JP JP2008519339A patent/JP2008545163A/ja active Pending
- 2006-06-13 EP EP06773016A patent/EP1886432A2/en not_active Withdrawn
- 2006-06-13 WO PCT/US2006/022960 patent/WO2007001829A2/en not_active Ceased
- 2006-06-13 KR KR1020077028547A patent/KR20080018182A/ko not_active Withdrawn
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPS5592483A (en) * | 1978-12-29 | 1980-07-12 | Ibm | Key control coding system |
| JPH0627878A (ja) * | 1991-03-20 | 1994-02-04 | Internatl Business Mach Corp <Ibm> | 暗号用キー入力の妥当性検査のための方法および装置 |
| JPH06202558A (ja) * | 1992-10-16 | 1994-07-22 | Internatl Business Mach Corp <Ibm> | 商用データ・マスキング |
| JPH09127868A (ja) * | 1995-07-03 | 1997-05-16 | General Instr Corp Of Delaware | 二重フィードフォワードハッシュ機能を有する暗号装置 |
| JP2001142394A (ja) * | 1999-08-31 | 2001-05-25 | Matsushita Electric Ind Co Ltd | 暗号化方法、暗号化装置、復号化方法及び復号化装置 |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11843701B2 (en) | 2020-07-10 | 2023-12-12 | Fujitsu Limited | Computer-readable recording medium storing generation program for generating aggregation hash value by aggregating hash values for blocks of content, and generation apparatus for generating aggregation hash value by aggregating hash values for blocks of content |
Also Published As
| Publication number | Publication date |
|---|---|
| US7546461B2 (en) | 2009-06-09 |
| WO2007001829A3 (en) | 2007-05-18 |
| EP1886432A2 (en) | 2008-02-13 |
| US20060294386A1 (en) | 2006-12-28 |
| KR20080018182A (ko) | 2008-02-27 |
| WO2007001829A2 (en) | 2007-01-04 |
| CN101204035A (zh) | 2008-06-18 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP2008545163A (ja) | セキュアハッシュ関数の強化 | |
| JP6144992B2 (ja) | 検索可能暗号処理システム及び方法 | |
| EP3134994B1 (en) | Method of obfuscating data | |
| Sadeghi-Nasab et al. | A comprehensive review of the security flaws of hashing algorithms | |
| WO2015163822A1 (en) | Method and system for generating / decrypting ciphertext, and method and system for searching ciphertexts in a database | |
| WO2013150880A1 (ja) | 暗号化装置、復号化装置、暗号化方法、復号化方法、及びプログラム | |
| JP2008545163A5 (enExample) | ||
| US20230141210A1 (en) | Neural networks | |
| Duan et al. | Secure and verifiable outsourcing of large-scale nonnegative matrix factorization (NMF) | |
| CN105763322B (zh) | 一种可混淆的加密密钥隔离数字签名方法及系统 | |
| JP7347501B2 (ja) | Macタグリスト生成装置、macタグリスト検証装置、方法及びプログラム | |
| Rajput et al. | A novel image encryption and authentication scheme using chaotic maps | |
| Polpong et al. | Authentication and password storing improvement using SXR algorithm with a hash function | |
| WO2016063512A1 (ja) | Macタグリスト生成装置、macタグリスト検証装置、macタグリスト生成方法、macタグリスト検証方法およびプログラム記録媒体 | |
| JP2011523103A (ja) | 対称暗号を実行するための技法 | |
| US20220173900A1 (en) | Deterministic random blinding | |
| WO2022239163A1 (ja) | 認証暗号化装置、認証復号装置、認証暗号システム、方法及びコンピュータ可読媒体 | |
| Cid | Recent developments in cryptographic hash functions: Security implications and future directions | |
| Churi et al. | JSH algorithm: a password encryption technique using Jumbling-Salting-Hashing | |
| US20240113871A1 (en) | Encryption processing apparatus, encryption processing method for encryption processing apparatus, and storage medium | |
| JP2017073716A (ja) | タグリスト生成装置、タグリスト検証装置、タグリスト更新装置、タグリスト生成方法及びプログラム | |
| Riadi et al. | Vigenère Cipher Algorithm Optimization for Digital Image Security using SHA512 | |
| Jasek | Sha-1 and md5 cryptographic hash functions: Security overview | |
| Abad et al. | Enhanced key generation algorithm of hashing message authentication code | |
| JP2017038336A (ja) | 復号方法 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20090612 |
|
| A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20090612 |
|
| A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20120106 |
|
| A02 | Decision of refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A02 Effective date: 20120601 |