JP2015528681A - メッセージデータを保護するための装置および方法 - Google Patents
メッセージデータを保護するための装置および方法 Download PDFInfo
- Publication number
- JP2015528681A JP2015528681A JP2015532051A JP2015532051A JP2015528681A JP 2015528681 A JP2015528681 A JP 2015528681A JP 2015532051 A JP2015532051 A JP 2015532051A JP 2015532051 A JP2015532051 A JP 2015532051A JP 2015528681 A JP2015528681 A JP 2015528681A
- Authority
- JP
- Japan
- Prior art keywords
- message data
- data
- message
- remote station
- generate
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/04—Protocols for data compression, e.g. ROHC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1475—Passive attacks, e.g. eavesdropping or listening without modification of the traffic monitored
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/166—Implementing security features at a particular protocol layer at the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/06—Optimizing the usage of the radio link, e.g. header compression, information sizing, discarding information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/16—Obfuscation or hiding, e.g. involving white box
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/20—Manipulating the length of blocks of bits, e.g. padding or block truncation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/24—Key scheduling, i.e. generating round keys or sub-keys for block encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/30—Compression, e.g. Merkle-Damgard construction
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (5)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201261701384P | 2012-09-14 | 2012-09-14 | |
| US61/701,384 | 2012-09-14 | ||
| US13/764,524 | 2013-02-11 | ||
| US13/764,524 US9673983B2 (en) | 2012-09-14 | 2013-02-11 | Apparatus and method for protecting message data |
| PCT/US2013/059524 WO2014043392A1 (en) | 2012-09-14 | 2013-09-12 | Apparatus and method for protecting message data |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| JP2015528681A true JP2015528681A (ja) | 2015-09-28 |
| JP2015528681A5 JP2015528681A5 (enExample) | 2017-08-31 |
Family
ID=50274467
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2015532051A Ceased JP2015528681A (ja) | 2012-09-14 | 2013-09-12 | メッセージデータを保護するための装置および方法 |
Country Status (6)
| Country | Link |
|---|---|
| US (3) | US9673983B2 (enExample) |
| EP (3) | EP3001642B1 (enExample) |
| JP (1) | JP2015528681A (enExample) |
| KR (1) | KR20150058310A (enExample) |
| CN (1) | CN104620555A (enExample) |
| WO (1) | WO2014043392A1 (enExample) |
Families Citing this family (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9673983B2 (en) | 2012-09-14 | 2017-06-06 | Qualcomm Incorporated | Apparatus and method for protecting message data |
| US9276750B2 (en) * | 2013-07-23 | 2016-03-01 | Intel Corporation | Secure processing environment measurement and attestation |
| US9519805B2 (en) * | 2013-08-01 | 2016-12-13 | Cellco Partnership | Digest obfuscation for data cryptography |
| ITMI20131824A1 (it) * | 2013-11-04 | 2015-05-05 | St Microelectronics Srl | Metodo di identificare un messaggio conforme allo standard ota (over the air) ed affetto da errore |
| WO2018108274A1 (en) * | 2016-12-15 | 2018-06-21 | Telecom Italia S.P.A. | Method for transmitting encrypted packets in a communication network |
| US10542039B2 (en) * | 2017-02-08 | 2020-01-21 | Nicira, Inc. | Security against side-channel attack in real-time virtualized networks |
| US10831935B2 (en) * | 2017-08-31 | 2020-11-10 | Pure Storage, Inc. | Encryption management with host-side data reduction |
| CN114257555B (zh) * | 2020-09-10 | 2025-01-21 | 马维尔亚洲私人有限公司 | 受信任的远程管理单元、网络交换机以及远程访问方法 |
| US11695541B2 (en) * | 2020-12-07 | 2023-07-04 | International Business Machines Corporation | Implementing resilient deterministic encryption |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH0488736A (ja) * | 1990-07-31 | 1992-03-23 | Matsushita Electric Ind Co Ltd | データ伝送方式 |
| JPH098797A (ja) * | 1995-06-15 | 1997-01-10 | Nippon Telegr & Teleph Corp <Ntt> | スクランブル方法 |
| JP2010128154A (ja) * | 2008-11-27 | 2010-06-10 | Nippon Telegr & Teleph Corp <Ntt> | ハッシュ値生成装置、検証装置、ハッシュ値生成方法、検証方法、プログラム、および記録媒体 |
| JP2012129920A (ja) * | 2010-12-17 | 2012-07-05 | Nippon Telegr & Teleph Corp <Ntt> | 圧縮暗号化装置、復号伸長装置、それらの方法、及びプログラム |
Family Cites Families (17)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5231668A (en) * | 1991-07-26 | 1993-07-27 | The United States Of America, As Represented By The Secretary Of Commerce | Digital signature algorithm |
| CN1251449A (zh) * | 1998-10-18 | 2000-04-26 | 华强 | 两类字典压缩算法在数据压缩中的组合带参运用 |
| US6393126B1 (en) | 1999-06-23 | 2002-05-21 | Datum, Inc. | System and methods for generating trusted and authenticatable time stamps for electronic documents |
| US7222233B1 (en) | 2000-09-14 | 2007-05-22 | At&T Corp. | Method for secure remote backup |
| EP1325583A2 (en) | 2000-10-13 | 2003-07-09 | Eversystems Inc. | Secret key messaging |
| US7668315B2 (en) | 2001-01-05 | 2010-02-23 | Qualcomm Incorporated | Local authentication of mobile subscribers outside their home systems |
| US7016497B2 (en) | 2001-02-02 | 2006-03-21 | Asier Technology Corporation | Data decryption system |
| US20020184504A1 (en) * | 2001-03-26 | 2002-12-05 | Eric Hughes | Combined digital signature |
| US7197142B2 (en) | 2001-08-24 | 2007-03-27 | Alten Alexander I | System and methods for a vernam stream cipher |
| EP1944907A4 (en) * | 2005-11-04 | 2011-08-31 | Nec Corp | DEVICE, METHOD AND MESSAGE AUTHENTICATION AND RECORD MEDIUM DEVICE THEREFOR |
| US8127130B2 (en) | 2006-04-18 | 2012-02-28 | Advanced Communication Concepts, Inc. | Method and system for securing data utilizing reconfigurable logic |
| US8032181B2 (en) | 2007-09-01 | 2011-10-04 | Apple Inc. | Service provider activation with subscriber identity module policy |
| US20120079281A1 (en) | 2010-06-28 | 2012-03-29 | Lionstone Capital Corporation | Systems and methods for diversification of encryption algorithms and obfuscation symbols, symbol spaces and/or schemas |
| WO2012129638A2 (en) | 2011-03-31 | 2012-10-04 | Irdeto Canada Corporation | Method and system for protecting execution of cryptographic hash functions |
| US8886837B2 (en) | 2011-12-02 | 2014-11-11 | Cisco Technology, Inc. | Flow-based compression management |
| US9673983B2 (en) | 2012-09-14 | 2017-06-06 | Qualcomm Incorporated | Apparatus and method for protecting message data |
| US9231615B2 (en) | 2012-10-24 | 2016-01-05 | Seagate Technology Llc | Method to shorten hash chains in Lempel-Ziv compression of data with repetitive symbols |
-
2013
- 2013-02-11 US US13/764,524 patent/US9673983B2/en not_active Expired - Fee Related
- 2013-09-12 JP JP2015532051A patent/JP2015528681A/ja not_active Ceased
- 2013-09-12 EP EP15193863.6A patent/EP3001642B1/en not_active Not-in-force
- 2013-09-12 WO PCT/US2013/059524 patent/WO2014043392A1/en not_active Ceased
- 2013-09-12 KR KR1020157009352A patent/KR20150058310A/ko not_active Ceased
- 2013-09-12 EP EP13770751.9A patent/EP2896179B1/en not_active Not-in-force
- 2013-09-12 CN CN201380046996.3A patent/CN104620555A/zh active Pending
- 2013-09-12 EP EP15193854.5A patent/EP3001641B1/en not_active Not-in-force
-
2015
- 2015-03-16 US US14/659,024 patent/US9660811B2/en not_active Expired - Fee Related
- 2015-03-16 US US14/659,082 patent/US9729325B2/en not_active Expired - Fee Related
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH0488736A (ja) * | 1990-07-31 | 1992-03-23 | Matsushita Electric Ind Co Ltd | データ伝送方式 |
| JPH098797A (ja) * | 1995-06-15 | 1997-01-10 | Nippon Telegr & Teleph Corp <Ntt> | スクランブル方法 |
| JP2010128154A (ja) * | 2008-11-27 | 2010-06-10 | Nippon Telegr & Teleph Corp <Ntt> | ハッシュ値生成装置、検証装置、ハッシュ値生成方法、検証方法、プログラム、および記録媒体 |
| JP2012129920A (ja) * | 2010-12-17 | 2012-07-05 | Nippon Telegr & Teleph Corp <Ntt> | 圧縮暗号化装置、復号伸長装置、それらの方法、及びプログラム |
Non-Patent Citations (2)
| Title |
|---|
| KENNETH G. PATERSON, ET AL.: "Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol", LNCS, ASIACRYPT 2011: ADVANCES IN CRYPTOLOGY - ASIACRYPT 2001, vol. 7073, JPN6017028405, 2011, pages 372 - 389, ISSN: 0003887265 * |
| PIERRE-ALAIN FOUQUE, ET AL.: "HMAC is Randomness Extractor and Applications to TLS", PROCEEDINGS OF THE 2008 ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS, JPN7017002476, 20 March 2008 (2008-03-20), pages 21 - 32, ISSN: 0003887264 * |
Also Published As
| Publication number | Publication date |
|---|---|
| CN104620555A (zh) | 2015-05-13 |
| US9660811B2 (en) | 2017-05-23 |
| EP3001641B1 (en) | 2017-04-19 |
| EP3001642B1 (en) | 2017-04-19 |
| US20150188708A1 (en) | 2015-07-02 |
| KR20150058310A (ko) | 2015-05-28 |
| US9729325B2 (en) | 2017-08-08 |
| WO2014043392A1 (en) | 2014-03-20 |
| US20140079213A1 (en) | 2014-03-20 |
| EP2896179A1 (en) | 2015-07-22 |
| EP3001641A1 (en) | 2016-03-30 |
| EP2896179B1 (en) | 2017-04-19 |
| EP3001642A1 (en) | 2016-03-30 |
| US20150188709A1 (en) | 2015-07-02 |
| US9673983B2 (en) | 2017-06-06 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US9673983B2 (en) | Apparatus and method for protecting message data | |
| US9813392B2 (en) | Apparatus and method for providing a public key for authenticating an integrated circuit | |
| CN105940439B (zh) | 使用排列应对对密码算法的旁通道攻击的对策 | |
| CN110401615B (zh) | 一种身份认证方法、装置、设备、系统及可读存储介质 | |
| CN106529308B (zh) | 一种数据加密方法、装置及移动终端 | |
| JP2010515083A5 (enExample) | ||
| JP2010515083A (ja) | 組み合わせコンバイナ暗号化方法 | |
| CN104283853A (zh) | 一种提高信息安全性的方法、终端设备及网络设备 | |
| CN107408187A (zh) | 通过认证令牌的改进安全 | |
| US8769301B2 (en) | Product authentication based upon a hyperelliptic curve equation and a curve pairing function | |
| EP3022864B1 (en) | Apparatus and method for key update for use in a block cipher algorithm | |
| CN102916810B (zh) | 传感器认证方法、系统和装置 | |
| Zegers et al. | A lightweight encryption and secure protocol for smartphone cloud | |
| TWM569453U (zh) | Digital data processing system | |
| US20170366355A1 (en) | Parity check message authentication code | |
| KR100842261B1 (ko) | Cdma 방식의 이동통신 시스템을 위한 해쉬 알고리즘을이용한 데이터생성방법 | |
| TWI672653B (zh) | 數位資料加密方法、數位資料解密方法及數位資料處理系統 | |
| KR20170013141A (ko) | 클라이언트 인증 방법, 클라이언트의 동작 방법, 서버, 및 통신 소프트웨어 | |
| KR20210157057A (ko) | 보안이 개선된 암호압축 장치 및 방법 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20160824 |
|
| A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20160824 |
|
| A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20170710 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20170721 |
|
| A871 | Explanation of circumstances concerning accelerated examination |
Free format text: JAPANESE INTERMEDIATE CODE: A871 Effective date: 20170721 |
|
| A975 | Report on accelerated examination |
Free format text: JAPANESE INTERMEDIATE CODE: A971005 Effective date: 20170721 |
|
| A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20170731 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20171026 |
|
| A02 | Decision of refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A02 Effective date: 20180129 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20180529 |
|
| A911 | Transfer to examiner for re-examination before appeal (zenchi) |
Free format text: JAPANESE INTERMEDIATE CODE: A911 Effective date: 20180713 |
|
| A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20181001 |
|
| A045 | Written measure of dismissal of application [lapsed due to lack of payment] |
Free format text: JAPANESE INTERMEDIATE CODE: A045 Effective date: 20190225 |