KR20150058310A - 메시지 데이터를 보호하기 위한 장치 및 방법 - Google Patents
메시지 데이터를 보호하기 위한 장치 및 방법 Download PDFInfo
- Publication number
- KR20150058310A KR20150058310A KR1020157009352A KR20157009352A KR20150058310A KR 20150058310 A KR20150058310 A KR 20150058310A KR 1020157009352 A KR1020157009352 A KR 1020157009352A KR 20157009352 A KR20157009352 A KR 20157009352A KR 20150058310 A KR20150058310 A KR 20150058310A
- Authority
- KR
- South Korea
- Prior art keywords
- message data
- data
- remote station
- message
- padding bits
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/04—Protocols for data compression, e.g. ROHC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1475—Passive attacks, e.g. eavesdropping or listening without modification of the traffic monitored
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/166—Implementing security features at a particular protocol layer at the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/06—Optimizing the usage of the radio link, e.g. header compression, information sizing, discarding information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/16—Obfuscation or hiding, e.g. involving white box
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/20—Manipulating the length of blocks of bits, e.g. padding or block truncation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/24—Key scheduling, i.e. generating round keys or sub-keys for block encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/30—Compression, e.g. Merkle-Damgard construction
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (5)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201261701384P | 2012-09-14 | 2012-09-14 | |
| US61/701,384 | 2012-09-14 | ||
| US13/764,524 | 2013-02-11 | ||
| US13/764,524 US9673983B2 (en) | 2012-09-14 | 2013-02-11 | Apparatus and method for protecting message data |
| PCT/US2013/059524 WO2014043392A1 (en) | 2012-09-14 | 2013-09-12 | Apparatus and method for protecting message data |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| KR20150058310A true KR20150058310A (ko) | 2015-05-28 |
Family
ID=50274467
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| KR1020157009352A Ceased KR20150058310A (ko) | 2012-09-14 | 2013-09-12 | 메시지 데이터를 보호하기 위한 장치 및 방법 |
Country Status (6)
| Country | Link |
|---|---|
| US (3) | US9673983B2 (enExample) |
| EP (3) | EP3001642B1 (enExample) |
| JP (1) | JP2015528681A (enExample) |
| KR (1) | KR20150058310A (enExample) |
| CN (1) | CN104620555A (enExample) |
| WO (1) | WO2014043392A1 (enExample) |
Families Citing this family (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9673983B2 (en) | 2012-09-14 | 2017-06-06 | Qualcomm Incorporated | Apparatus and method for protecting message data |
| US9276750B2 (en) * | 2013-07-23 | 2016-03-01 | Intel Corporation | Secure processing environment measurement and attestation |
| US9519805B2 (en) * | 2013-08-01 | 2016-12-13 | Cellco Partnership | Digest obfuscation for data cryptography |
| ITMI20131824A1 (it) * | 2013-11-04 | 2015-05-05 | St Microelectronics Srl | Metodo di identificare un messaggio conforme allo standard ota (over the air) ed affetto da errore |
| WO2018108274A1 (en) * | 2016-12-15 | 2018-06-21 | Telecom Italia S.P.A. | Method for transmitting encrypted packets in a communication network |
| US10542039B2 (en) * | 2017-02-08 | 2020-01-21 | Nicira, Inc. | Security against side-channel attack in real-time virtualized networks |
| US10831935B2 (en) * | 2017-08-31 | 2020-11-10 | Pure Storage, Inc. | Encryption management with host-side data reduction |
| CN114257555B (zh) * | 2020-09-10 | 2025-01-21 | 马维尔亚洲私人有限公司 | 受信任的远程管理单元、网络交换机以及远程访问方法 |
| US11695541B2 (en) * | 2020-12-07 | 2023-07-04 | International Business Machines Corporation | Implementing resilient deterministic encryption |
Family Cites Families (21)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH0488736A (ja) * | 1990-07-31 | 1992-03-23 | Matsushita Electric Ind Co Ltd | データ伝送方式 |
| US5231668A (en) * | 1991-07-26 | 1993-07-27 | The United States Of America, As Represented By The Secretary Of Commerce | Digital signature algorithm |
| JP3627765B2 (ja) * | 1995-06-15 | 2005-03-09 | 日本電信電話株式会社 | スクランブルにより情報秘匿を行なう通信システムにおける送信装置 |
| CN1251449A (zh) * | 1998-10-18 | 2000-04-26 | 华强 | 两类字典压缩算法在数据压缩中的组合带参运用 |
| US6393126B1 (en) | 1999-06-23 | 2002-05-21 | Datum, Inc. | System and methods for generating trusted and authenticatable time stamps for electronic documents |
| US7222233B1 (en) | 2000-09-14 | 2007-05-22 | At&T Corp. | Method for secure remote backup |
| EP1325583A2 (en) | 2000-10-13 | 2003-07-09 | Eversystems Inc. | Secret key messaging |
| US7668315B2 (en) | 2001-01-05 | 2010-02-23 | Qualcomm Incorporated | Local authentication of mobile subscribers outside their home systems |
| US7016497B2 (en) | 2001-02-02 | 2006-03-21 | Asier Technology Corporation | Data decryption system |
| US20020184504A1 (en) * | 2001-03-26 | 2002-12-05 | Eric Hughes | Combined digital signature |
| US7197142B2 (en) | 2001-08-24 | 2007-03-27 | Alten Alexander I | System and methods for a vernam stream cipher |
| EP1944907A4 (en) * | 2005-11-04 | 2011-08-31 | Nec Corp | DEVICE, METHOD AND MESSAGE AUTHENTICATION AND RECORD MEDIUM DEVICE THEREFOR |
| US8127130B2 (en) | 2006-04-18 | 2012-02-28 | Advanced Communication Concepts, Inc. | Method and system for securing data utilizing reconfigurable logic |
| US8032181B2 (en) | 2007-09-01 | 2011-10-04 | Apple Inc. | Service provider activation with subscriber identity module policy |
| JP5079671B2 (ja) * | 2008-11-27 | 2012-11-21 | 日本電信電話株式会社 | ハッシュ値生成装置、検証装置、ハッシュ値生成方法、検証方法、プログラム、および記録媒体 |
| US20120079281A1 (en) | 2010-06-28 | 2012-03-29 | Lionstone Capital Corporation | Systems and methods for diversification of encryption algorithms and obfuscation symbols, symbol spaces and/or schemas |
| JP2012129920A (ja) | 2010-12-17 | 2012-07-05 | Nippon Telegr & Teleph Corp <Ntt> | 圧縮暗号化装置、復号伸長装置、それらの方法、及びプログラム |
| WO2012129638A2 (en) | 2011-03-31 | 2012-10-04 | Irdeto Canada Corporation | Method and system for protecting execution of cryptographic hash functions |
| US8886837B2 (en) | 2011-12-02 | 2014-11-11 | Cisco Technology, Inc. | Flow-based compression management |
| US9673983B2 (en) | 2012-09-14 | 2017-06-06 | Qualcomm Incorporated | Apparatus and method for protecting message data |
| US9231615B2 (en) | 2012-10-24 | 2016-01-05 | Seagate Technology Llc | Method to shorten hash chains in Lempel-Ziv compression of data with repetitive symbols |
-
2013
- 2013-02-11 US US13/764,524 patent/US9673983B2/en not_active Expired - Fee Related
- 2013-09-12 JP JP2015532051A patent/JP2015528681A/ja not_active Ceased
- 2013-09-12 EP EP15193863.6A patent/EP3001642B1/en not_active Not-in-force
- 2013-09-12 WO PCT/US2013/059524 patent/WO2014043392A1/en not_active Ceased
- 2013-09-12 KR KR1020157009352A patent/KR20150058310A/ko not_active Ceased
- 2013-09-12 EP EP13770751.9A patent/EP2896179B1/en not_active Not-in-force
- 2013-09-12 CN CN201380046996.3A patent/CN104620555A/zh active Pending
- 2013-09-12 EP EP15193854.5A patent/EP3001641B1/en not_active Not-in-force
-
2015
- 2015-03-16 US US14/659,024 patent/US9660811B2/en not_active Expired - Fee Related
- 2015-03-16 US US14/659,082 patent/US9729325B2/en not_active Expired - Fee Related
Also Published As
| Publication number | Publication date |
|---|---|
| CN104620555A (zh) | 2015-05-13 |
| US9660811B2 (en) | 2017-05-23 |
| EP3001641B1 (en) | 2017-04-19 |
| EP3001642B1 (en) | 2017-04-19 |
| US20150188708A1 (en) | 2015-07-02 |
| US9729325B2 (en) | 2017-08-08 |
| WO2014043392A1 (en) | 2014-03-20 |
| US20140079213A1 (en) | 2014-03-20 |
| EP2896179A1 (en) | 2015-07-22 |
| EP3001641A1 (en) | 2016-03-30 |
| EP2896179B1 (en) | 2017-04-19 |
| EP3001642A1 (en) | 2016-03-30 |
| US20150188709A1 (en) | 2015-07-02 |
| JP2015528681A (ja) | 2015-09-28 |
| US9673983B2 (en) | 2017-06-06 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US9729325B2 (en) | Apparatus and method for protecting message data | |
| US9112860B2 (en) | Method and apparatus for mutual authentication | |
| US9813392B2 (en) | Apparatus and method for providing a public key for authenticating an integrated circuit | |
| CA2792575A1 (en) | Multiple hashing in a cryptographic scheme | |
| CN106688204A (zh) | 生成加密校验和 | |
| CN103782615A (zh) | 用于订户向长期演进电信网络或通用移动电信系统进行验证的方法和设备 | |
| EP3022864B1 (en) | Apparatus and method for key update for use in a block cipher algorithm | |
| CN104995866B (zh) | 使用利用无进位乘法计算的通用哈希函数的消息认证 | |
| WO2013016736A2 (en) | Product authentication based upon a hyperelliptic curve equation and a curve pairing function | |
| CN113302961A (zh) | 安全信标 | |
| Vanhoef | A time-memory trade-off attack on WPA3's SAE-PK | |
| US20170366355A1 (en) | Parity check message authentication code | |
| KR100842261B1 (ko) | Cdma 방식의 이동통신 시스템을 위한 해쉬 알고리즘을이용한 데이터생성방법 | |
| KR20150103394A (ko) | 암호화 시스템 및 그것의 암호 통신 방법 | |
| KR101553148B1 (ko) | 비트 확장 방식을 이용한 암호화 장치 및 방법 | |
| KR102407204B1 (ko) | 보안이 개선된 암호압축 장치 및 방법 | |
| CN118821167A (zh) | 数据加密方法、装置、设备、计算机存储介质及程序产品 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PA0105 | International application |
Patent event date: 20150410 Patent event code: PA01051R01D Comment text: International Patent Application |
|
| PG1501 | Laying open of application | ||
| PA0201 | Request for examination |
Patent event code: PA02012R01D Patent event date: 20170814 Comment text: Request for Examination of Application |
|
| PA0302 | Request for accelerated examination |
Patent event date: 20170814 Patent event code: PA03022R01D Comment text: Request for Accelerated Examination |
|
| E902 | Notification of reason for refusal | ||
| PE0902 | Notice of grounds for rejection |
Comment text: Notification of reason for refusal Patent event date: 20171025 Patent event code: PE09021S01D |
|
| E601 | Decision to refuse application | ||
| PE0601 | Decision on rejection of patent |
Patent event date: 20180222 Comment text: Decision to Refuse Application Patent event code: PE06012S01D Patent event date: 20171025 Comment text: Notification of reason for refusal Patent event code: PE06011S01I |