KR20080018182A - 보안 해시 함수의 강화 - Google Patents
보안 해시 함수의 강화 Download PDFInfo
- Publication number
- KR20080018182A KR20080018182A KR1020077028547A KR20077028547A KR20080018182A KR 20080018182 A KR20080018182 A KR 20080018182A KR 1020077028547 A KR1020077028547 A KR 1020077028547A KR 20077028547 A KR20077028547 A KR 20077028547A KR 20080018182 A KR20080018182 A KR 20080018182A
- Authority
- KR
- South Korea
- Prior art keywords
- message
- subblock
- block
- xor
- hash
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
- H04K1/04—Secret communication by frequency scrambling, i.e. by transposing or inverting parts of the frequency band or by inverting the whole band
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Power Engineering (AREA)
- Quality & Reliability (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US11/168,842 | 2005-06-28 | ||
| US11/168,842 US7546461B2 (en) | 2005-06-28 | 2005-06-28 | Strengthening secure hash functions |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| KR20080018182A true KR20080018182A (ko) | 2008-02-27 |
Family
ID=37569013
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| KR1020077028547A Withdrawn KR20080018182A (ko) | 2005-06-28 | 2006-06-13 | 보안 해시 함수의 강화 |
Country Status (6)
| Country | Link |
|---|---|
| US (1) | US7546461B2 (enExample) |
| EP (1) | EP1886432A2 (enExample) |
| JP (1) | JP2008545163A (enExample) |
| KR (1) | KR20080018182A (enExample) |
| CN (1) | CN101204035A (enExample) |
| WO (1) | WO2007001829A2 (enExample) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR20180112061A (ko) * | 2016-02-23 | 2018-10-11 | 엔체인 홀딩스 리미티드 | 블록체인 집행의 스마트 계약을 위한 레지스트리 및 자동화 관리 방법 |
Families Citing this family (27)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20070113083A1 (en) * | 2005-07-14 | 2007-05-17 | Volkovs Nikolajs | System and method of message authentication |
| KR100785810B1 (ko) * | 2006-12-05 | 2007-12-13 | 한국전자통신연구원 | Rfid 데이터 보호 장치 및 방법 |
| US8086860B2 (en) * | 2007-10-01 | 2011-12-27 | Tata Consultancy Services Limited | Method for preventing and detecting hash collisions of data during the data transmission |
| US8954754B2 (en) * | 2011-12-22 | 2015-02-10 | Intel Corporation | Method and apparatus to process SHA-1 secure hashing algorithm |
| US9935768B2 (en) | 2012-08-06 | 2018-04-03 | Samsung Electronics Co., Ltd. | Processors including key management circuits and methods of operating key management circuits |
| KR102013841B1 (ko) | 2012-08-06 | 2019-08-23 | 삼성전자주식회사 | 데이터의 안전한 저장을 위한 키 관리 방법 및 그 장치 |
| MX364063B (es) | 2013-03-05 | 2019-04-11 | Fasetto Inc | Sistema y metodo para usuarios de interfaces de graficas cubicas. |
| CN103209075A (zh) * | 2013-03-15 | 2013-07-17 | 南京易司拓电力科技股份有限公司 | 一种密码交换方法 |
| US9886229B2 (en) | 2013-07-18 | 2018-02-06 | Fasetto, L.L.C. | System and method for multi-angle videos |
| US10095873B2 (en) | 2013-09-30 | 2018-10-09 | Fasetto, Inc. | Paperless application |
| US9584402B2 (en) | 2014-01-27 | 2017-02-28 | Fasetto, Llc | Systems and methods for peer to peer communication |
| KR20230082053A (ko) | 2014-07-10 | 2023-06-08 | 파세토, 인크. | 메시지 편집을 위한 시스템들 및 방법들 |
| JP6695868B2 (ja) | 2014-10-06 | 2020-05-20 | ファセット・インコーポレーテッド | ポータブル・ストレージ・デバイスのためのシステムおよび方法 |
| US10437288B2 (en) | 2014-10-06 | 2019-10-08 | Fasetto, Inc. | Portable storage device with modular power and housing system |
| CN112737895A (zh) | 2015-03-11 | 2021-04-30 | 法斯埃托股份有限公司 | 用于web api通信的系统和方法 |
| US10929071B2 (en) | 2015-12-03 | 2021-02-23 | Fasetto, Inc. | Systems and methods for memory card emulation |
| KR102572506B1 (ko) | 2016-11-23 | 2023-08-30 | 파세토, 인크. | 미디어를 스트리밍하기 위한 시스템 및 방법 |
| WO2018144833A1 (en) | 2017-02-03 | 2018-08-09 | Fasetto, Llc | Systems and methods for data storage in keyed devices |
| WO2019079628A1 (en) | 2017-10-19 | 2019-04-25 | Fasetto, Inc. | PORTABLE ELECTRONIC DEVICE CONNECTING SYSTEMS |
| TW201919361A (zh) * | 2017-11-09 | 2019-05-16 | 張英輝 | 以雜文加強保護之區塊加密及其解密之方法 |
| WO2019109033A1 (en) | 2017-12-01 | 2019-06-06 | Fasetto, Inc. | Systems and methods for improved data encryption |
| EP3782112B1 (en) | 2018-04-17 | 2024-10-23 | Fasetto, Inc. | Device presentation with real-time feedback |
| KR102809235B1 (ko) * | 2018-05-25 | 2025-05-15 | 젠무테크 가부시키가이샤 | 데이터 처리 장치, 방법 및 컴퓨터 프로그램이 기록된 기록 매체 |
| JP7526604B2 (ja) | 2020-07-10 | 2024-08-01 | 富士通株式会社 | 生成プログラム、生成方法、および生成装置 |
| US11288663B1 (en) | 2021-06-25 | 2022-03-29 | Arri E. Manuel | Blockring service, system, and method thereof |
| US11934667B1 (en) * | 2021-06-30 | 2024-03-19 | Amazon Technologies, Inc. | Encrypted-data-only media operations |
| US20250015984A1 (en) * | 2023-07-05 | 2025-01-09 | Theon Technology Llc | Use Of Quantum Resistant Iterative Keypads For Large Files |
Family Cites Families (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4229818A (en) * | 1978-12-29 | 1980-10-21 | International Business Machines Corporation | Method and apparatus for enciphering blocks which succeed short blocks in a key-controlled block-cipher cryptographic system |
| US5214698A (en) * | 1991-03-20 | 1993-05-25 | International Business Machines Corporation | Method and apparatus for validating entry of cryptographic keys |
| US5323464A (en) * | 1992-10-16 | 1994-06-21 | International Business Machines Corporation | Commercial data masking |
| US5606616A (en) * | 1995-07-03 | 1997-02-25 | General Instrument Corporation Of Delaware | Cryptographic apparatus with double feedforward hash function |
| WO1998031122A1 (en) | 1997-01-08 | 1998-07-16 | Bell Communications Research, Inc. | A method and apparatus for generating secure hash functions |
| KR100389902B1 (ko) | 1997-06-23 | 2003-09-22 | 삼성전자주식회사 | 차분해독법과선형해독법에대하여안전성을보장하는고속블럭암호화방법 |
| US6578144B1 (en) | 1999-03-23 | 2003-06-10 | International Business Machines Corporation | Secure hash-and-sign signatures |
| DE60024941T8 (de) * | 1999-08-31 | 2006-08-10 | Matsushita Electric Industrial Co., Ltd., Kadoma | Verschlüsselungsverfahren und -Vorrichtung, Entschlüsselungsverfahren und -Vorrichtung |
-
2005
- 2005-06-28 US US11/168,842 patent/US7546461B2/en not_active Expired - Fee Related
-
2006
- 2006-06-13 CN CNA2006800221760A patent/CN101204035A/zh active Pending
- 2006-06-13 JP JP2008519339A patent/JP2008545163A/ja active Pending
- 2006-06-13 KR KR1020077028547A patent/KR20080018182A/ko not_active Withdrawn
- 2006-06-13 EP EP06773016A patent/EP1886432A2/en not_active Withdrawn
- 2006-06-13 WO PCT/US2006/022960 patent/WO2007001829A2/en not_active Ceased
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR20180112061A (ko) * | 2016-02-23 | 2018-10-11 | 엔체인 홀딩스 리미티드 | 블록체인 집행의 스마트 계약을 위한 레지스트리 및 자동화 관리 방법 |
Also Published As
| Publication number | Publication date |
|---|---|
| US20060294386A1 (en) | 2006-12-28 |
| JP2008545163A (ja) | 2008-12-11 |
| WO2007001829A3 (en) | 2007-05-18 |
| CN101204035A (zh) | 2008-06-18 |
| US7546461B2 (en) | 2009-06-09 |
| WO2007001829A2 (en) | 2007-01-04 |
| EP1886432A2 (en) | 2008-02-13 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| KR20080018182A (ko) | 보안 해시 함수의 강화 | |
| Leurent et al. | {SHA-1} is a shambles: First {Chosen-Prefix} collision on {SHA-1} and application to the {PGP} web of trust | |
| Leurent et al. | From collisions to chosen-prefix collisions application to full SHA-1 | |
| Ali et al. | A novel improvement with an effective expansion to enhance the MD5 hash function for verification of a secure E-document | |
| Gnatyuk et al. | Secure hash function constructing for future communication systems and networks | |
| US10693626B2 (en) | Method and system for generating/decrypting ciphertext, and method and system for searching ciphertexts in a database | |
| EP1876748A2 (en) | Privacy-preserving concatenation of strings | |
| CN111859435B (zh) | 一种数据安全处理方法及装置 | |
| Albertini et al. | Malicious hashing: Eve’s variant of SHA-1 | |
| WO2016153430A1 (en) | Method of obfuscating data | |
| Alkandari et al. | Cryptographic hash function: A high level view | |
| WO2013150880A1 (ja) | 暗号化装置、復号化装置、暗号化方法、復号化方法、及びプログラム | |
| Majumdar et al. | A novel DNA-inspired encryption strategy for concealing cloud storage | |
| WO2021206727A1 (en) | Neural networks | |
| CN106452791A (zh) | 一种无信任中心的量子数字签名方法 | |
| Obeidat et al. | A novel secure cryptography model for data transmission based on Rotor64 technique | |
| Ahmad et al. | A secure network communication protocol based on text to barcode encryption algorithm | |
| Bock | Modern Cryptography for Cybersecurity Professionals: Learn how you can leverage encryption to better secure your organization's data | |
| US7986780B2 (en) | Privacy-preserving substring creation | |
| Polpong et al. | Authentication and password storing improvement using SXR algorithm with a hash function | |
| Yang | [Retracted] Application of Hybrid Encryption Algorithm in Hardware Encryption Interface Card | |
| Cid | Recent developments in cryptographic hash functions: Security implications and future directions | |
| WO2016063512A1 (ja) | Macタグリスト生成装置、macタグリスト検証装置、macタグリスト生成方法、macタグリスト検証方法およびプログラム記録媒体 | |
| Velioğlu et al. | A New Approach to Cryptographic Hashing: Color Hidden Hash Algorithm | |
| Gorbenko et al. | Analysis of Potential Post-Quantum Schemes of Hash-Based Digital Signatur |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PA0105 | International application |
Patent event date: 20071206 Patent event code: PA01051R01D Comment text: International Patent Application |
|
| PG1501 | Laying open of application | ||
| PC1203 | Withdrawal of no request for examination | ||
| WITN | Application deemed withdrawn, e.g. because no request for examination was filed or no examination fee was paid |