JP2008545163A - セキュアハッシュ関数の強化 - Google Patents
セキュアハッシュ関数の強化 Download PDFInfo
- Publication number
- JP2008545163A JP2008545163A JP2008519339A JP2008519339A JP2008545163A JP 2008545163 A JP2008545163 A JP 2008545163A JP 2008519339 A JP2008519339 A JP 2008519339A JP 2008519339 A JP2008519339 A JP 2008519339A JP 2008545163 A JP2008545163 A JP 2008545163A
- Authority
- JP
- Japan
- Prior art keywords
- block
- sub
- message
- medium
- hash
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
- H04K1/04—Secret communication by frequency scrambling, i.e. by transposing or inverting parts of the frequency band or by inverting the whole band
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Power Engineering (AREA)
- Quality & Reliability (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US11/168,842 US7546461B2 (en) | 2005-06-28 | 2005-06-28 | Strengthening secure hash functions |
| PCT/US2006/022960 WO2007001829A2 (en) | 2005-06-28 | 2006-06-13 | Strengthening secure hash functions |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| JP2008545163A true JP2008545163A (ja) | 2008-12-11 |
| JP2008545163A5 JP2008545163A5 (https=) | 2009-07-30 |
Family
ID=37569013
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2008519339A Pending JP2008545163A (ja) | 2005-06-28 | 2006-06-13 | セキュアハッシュ関数の強化 |
Country Status (6)
| Country | Link |
|---|---|
| US (1) | US7546461B2 (https=) |
| EP (1) | EP1886432A2 (https=) |
| JP (1) | JP2008545163A (https=) |
| KR (1) | KR20080018182A (https=) |
| CN (1) | CN101204035A (https=) |
| WO (1) | WO2007001829A2 (https=) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11843701B2 (en) | 2020-07-10 | 2023-12-12 | Fujitsu Limited | Computer-readable recording medium storing generation program for generating aggregation hash value by aggregating hash values for blocks of content, and generation apparatus for generating aggregation hash value by aggregating hash values for blocks of content |
Families Citing this family (27)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CA2552085A1 (en) * | 2005-07-14 | 2007-01-14 | Nikolajs Volkovs | System and method of message authentication |
| KR100785810B1 (ko) * | 2006-12-05 | 2007-12-13 | 한국전자통신연구원 | Rfid 데이터 보호 장치 및 방법 |
| US8086860B2 (en) * | 2007-10-01 | 2011-12-27 | Tata Consultancy Services Limited | Method for preventing and detecting hash collisions of data during the data transmission |
| WO2013095503A1 (en) * | 2011-12-22 | 2013-06-27 | Intel Corporation | Method and apparatus to process sha-1 secure hashing algorithm |
| KR102013841B1 (ko) | 2012-08-06 | 2019-08-23 | 삼성전자주식회사 | 데이터의 안전한 저장을 위한 키 관리 방법 및 그 장치 |
| US9935768B2 (en) | 2012-08-06 | 2018-04-03 | Samsung Electronics Co., Ltd. | Processors including key management circuits and methods of operating key management circuits |
| CN105706033B (zh) | 2013-03-05 | 2019-05-10 | 法斯埃托股份有限公司 | 用于立方体图形用户界面的系统和方法 |
| CN103209075A (zh) * | 2013-03-15 | 2013-07-17 | 南京易司拓电力科技股份有限公司 | 一种密码交换方法 |
| CA2918687C (en) | 2013-07-18 | 2020-04-14 | Fasetto, Inc. | System and method for multi-angle videos |
| US10095873B2 (en) | 2013-09-30 | 2018-10-09 | Fasetto, Inc. | Paperless application |
| US9584402B2 (en) * | 2014-01-27 | 2017-02-28 | Fasetto, Llc | Systems and methods for peer to peer communication |
| CA2954650C (en) | 2014-07-10 | 2022-08-30 | Fasetto, Llc | Systems and methods for message editing |
| US10437288B2 (en) | 2014-10-06 | 2019-10-08 | Fasetto, Inc. | Portable storage device with modular power and housing system |
| KR102213681B1 (ko) | 2014-10-06 | 2021-02-08 | 파세토, 인크. | 휴대용 저장 디바이스를 위한 시스템 및 방법 |
| CN107852421B (zh) | 2015-03-11 | 2021-02-05 | 法斯埃托股份有限公司 | 用于web api通信的系统和方法 |
| US10929071B2 (en) | 2015-12-03 | 2021-02-23 | Fasetto, Inc. | Systems and methods for memory card emulation |
| CN109417465B (zh) * | 2016-02-23 | 2021-01-15 | 区块链控股有限公司 | 区块链执行的智能合约的注册和自动化管理方法 |
| CN110199510B (zh) | 2016-11-23 | 2022-07-05 | 法斯埃托股份有限公司 | 用于流式传送媒体的系统和方法 |
| CA3054681A1 (en) | 2017-02-03 | 2018-08-09 | Fasetto, Inc. | Systems and methods for data storage in keyed devices |
| US10763630B2 (en) | 2017-10-19 | 2020-09-01 | Fasetto, Inc. | Portable electronic device connection systems |
| TW201919361A (zh) * | 2017-11-09 | 2019-05-16 | 張英輝 | 以雜文加強保護之區塊加密及其解密之方法 |
| US11985244B2 (en) | 2017-12-01 | 2024-05-14 | Fasetto, Inc. | Systems and methods for improved data encryption |
| WO2019204524A1 (en) | 2018-04-17 | 2019-10-24 | Fasetto, Inc. | Device presentation with real-time feedback |
| KR102809235B1 (ko) * | 2018-05-25 | 2025-05-15 | 젠무테크 가부시키가이샤 | 데이터 처리 장치, 방법 및 컴퓨터 프로그램이 기록된 기록 매체 |
| US11288663B1 (en) | 2021-06-25 | 2022-03-29 | Arri E. Manuel | Blockring service, system, and method thereof |
| US11934667B1 (en) * | 2021-06-30 | 2024-03-19 | Amazon Technologies, Inc. | Encrypted-data-only media operations |
| US20250015984A1 (en) * | 2023-07-05 | 2025-01-09 | Theon Technology Llc | Use Of Quantum Resistant Iterative Keypads For Large Files |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPS5592483A (en) * | 1978-12-29 | 1980-07-12 | Ibm | Key control coding system |
| JPH0627878A (ja) * | 1991-03-20 | 1994-02-04 | Internatl Business Mach Corp <Ibm> | 暗号用キー入力の妥当性検査のための方法および装置 |
| JPH06202558A (ja) * | 1992-10-16 | 1994-07-22 | Internatl Business Mach Corp <Ibm> | 商用データ・マスキング |
| JPH09127868A (ja) * | 1995-07-03 | 1997-05-16 | General Instr Corp Of Delaware | 二重フィードフォワードハッシュ機能を有する暗号装置 |
| JP2001142394A (ja) * | 1999-08-31 | 2001-05-25 | Matsushita Electric Ind Co Ltd | 暗号化方法、暗号化装置、復号化方法及び復号化装置 |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5892829A (en) | 1997-01-08 | 1999-04-06 | Bell Communications Research, Inc. | Method and apparatus for generating secure hash functions |
| KR100389902B1 (ko) | 1997-06-23 | 2003-09-22 | 삼성전자주식회사 | 차분해독법과선형해독법에대하여안전성을보장하는고속블럭암호화방법 |
| US6578144B1 (en) | 1999-03-23 | 2003-06-10 | International Business Machines Corporation | Secure hash-and-sign signatures |
-
2005
- 2005-06-28 US US11/168,842 patent/US7546461B2/en not_active Expired - Fee Related
-
2006
- 2006-06-13 JP JP2008519339A patent/JP2008545163A/ja active Pending
- 2006-06-13 KR KR1020077028547A patent/KR20080018182A/ko not_active Withdrawn
- 2006-06-13 WO PCT/US2006/022960 patent/WO2007001829A2/en not_active Ceased
- 2006-06-13 EP EP06773016A patent/EP1886432A2/en not_active Withdrawn
- 2006-06-13 CN CNA2006800221760A patent/CN101204035A/zh active Pending
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPS5592483A (en) * | 1978-12-29 | 1980-07-12 | Ibm | Key control coding system |
| JPH0627878A (ja) * | 1991-03-20 | 1994-02-04 | Internatl Business Mach Corp <Ibm> | 暗号用キー入力の妥当性検査のための方法および装置 |
| JPH06202558A (ja) * | 1992-10-16 | 1994-07-22 | Internatl Business Mach Corp <Ibm> | 商用データ・マスキング |
| JPH09127868A (ja) * | 1995-07-03 | 1997-05-16 | General Instr Corp Of Delaware | 二重フィードフォワードハッシュ機能を有する暗号装置 |
| JP2001142394A (ja) * | 1999-08-31 | 2001-05-25 | Matsushita Electric Ind Co Ltd | 暗号化方法、暗号化装置、復号化方法及び復号化装置 |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11843701B2 (en) | 2020-07-10 | 2023-12-12 | Fujitsu Limited | Computer-readable recording medium storing generation program for generating aggregation hash value by aggregating hash values for blocks of content, and generation apparatus for generating aggregation hash value by aggregating hash values for blocks of content |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2007001829A3 (en) | 2007-05-18 |
| EP1886432A2 (en) | 2008-02-13 |
| US7546461B2 (en) | 2009-06-09 |
| WO2007001829A2 (en) | 2007-01-04 |
| US20060294386A1 (en) | 2006-12-28 |
| KR20080018182A (ko) | 2008-02-27 |
| CN101204035A (zh) | 2008-06-18 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP2008545163A (ja) | セキュアハッシュ関数の強化 | |
| EP3134994B1 (en) | Method of obfuscating data | |
| WO2015163822A1 (en) | Method and system for generating / decrypting ciphertext, and method and system for searching ciphertexts in a database | |
| WO2013150880A1 (ja) | 暗号化装置、復号化装置、暗号化方法、復号化方法、及びプログラム | |
| JP2008545163A5 (https=) | ||
| US10326589B2 (en) | Message authenticator generating apparatus, message authenticator generating method, and computer readable recording medium | |
| WO2019031026A1 (ja) | 暗号化装置、暗号化方法、復号化装置、及び復号化方法 | |
| US9049004B2 (en) | Low-power encryption apparatus and method | |
| CN105763322B (zh) | 一种可混淆的加密密钥隔离数字签名方法及系统 | |
| JP7347501B2 (ja) | Macタグリスト生成装置、macタグリスト検証装置、方法及びプログラム | |
| Rajput et al. | A novel image encryption and authentication scheme using chaotic maps | |
| WO2016063512A1 (ja) | Macタグリスト生成装置、macタグリスト検証装置、macタグリスト生成方法、macタグリスト検証方法およびプログラム記録媒体 | |
| US11552794B2 (en) | Deterministic random blinding | |
| Yang | [Retracted] Application of Hybrid Encryption Algorithm in Hardware Encryption Interface Card | |
| JP2011523103A (ja) | 対称暗号を実行するための技法 | |
| WO2022239163A1 (ja) | 認証暗号化装置、認証復号装置、認証暗号システム、方法及びコンピュータ可読媒体 | |
| US12438712B2 (en) | Encryption processing apparatus, encryption processing method for encryption processing apparatus, and storage medium | |
| US20250015984A1 (en) | Use Of Quantum Resistant Iterative Keypads For Large Files | |
| Churi et al. | JSH algorithm: a password encryption technique using Jumbling-Salting-Hashing | |
| JP2017073716A (ja) | タグリスト生成装置、タグリスト検証装置、タグリスト更新装置、タグリスト生成方法及びプログラム | |
| JP2017038336A (ja) | 復号方法 | |
| Riadi et al. | Vigenère Cipher Algorithm Optimization for Digital Image Security using SHA512 | |
| Jasek | Sha-1 and md5 cryptographic hash functions: Security overview | |
| CN114676452A (zh) | 一种数据安全存储方法和装置 | |
| EP4641420A1 (en) | Processing of data in a secure environment |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20090612 |
|
| A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20090612 |
|
| A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20120106 |
|
| A02 | Decision of refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A02 Effective date: 20120601 |