MY145989A - A polymorphic cipher - Google Patents
A polymorphic cipherInfo
- Publication number
- MY145989A MY145989A MYPI20092762A MY145989A MY 145989 A MY145989 A MY 145989A MY PI20092762 A MYPI20092762 A MY PI20092762A MY 145989 A MY145989 A MY 145989A
- Authority
- MY
- Malaysia
- Prior art keywords
- subkey
- encryption key
- rounds
- placing
- row
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
- H04L9/0656—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
- H04L9/0662—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/24—Key scheduling, i.e. generating round keys or sub-keys for block encryption
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
A METHOD (100) FOR ENCRYPTION THROUGH A KEY DRIVEN POLYMORPHIC CIPHER BY INITIALIZING A PSEUDORANDOM NUMBER GENERATOR, THE METHOD COMPRISES THE STEPS OF GENERATING A SUBKEY TABLE BASED ON AN ENCRYPTION KEY (K) (102), EXTRACTING FROM THE SUBKEY TABLE BLOCKS OF DATA X (104), MIXING EXTRACTED DATA FOR A NUMBER OF ROUNDS (106) AND PRODUCING A BLOCK OF CIPHERTEXT (108). THE METHOD FOR GENERATING A SUBKEY TABLE BASED ON AN ENCRYPTION KEY (K) FURTHER COMPRISES THE STEPS OF HASHING THE ENCRYPTION KEY (K) TO OBTAIN HO WHEREIN HO =H(K) (202), PLACING HO ON FIRST ROW OF THE SUBKEY TABLE (204),OBTAINING PI AND QI USING HI = H (PI. HI-1 + QI) FROM THE ENCRYPTION KEY (K) WHEREIN PI, AND QI ARE TWO LARGE SECRET INTEGER NUMBERS FOR I BEING 1 TO N NUMBER OF ROUNDS (206), DETERMINING HI, WHICH IS THE SUBKEY FOR I-TH ROUND (208) AND PLACING HI AS (I+1)ST ROW OF THE SUBKEY TABLE (210).
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MYPI20092762 MY145989A (en) | 2009-06-29 | 2009-06-29 | A polymorphic cipher |
PCT/MY2010/000104 WO2011002274A1 (en) | 2009-06-29 | 2010-06-22 | A polymorphic cipher |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MYPI20092762 MY145989A (en) | 2009-06-29 | 2009-06-29 | A polymorphic cipher |
Publications (1)
Publication Number | Publication Date |
---|---|
MY145989A true MY145989A (en) | 2012-06-04 |
Family
ID=43411204
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
MYPI20092762 MY145989A (en) | 2009-06-29 | 2009-06-29 | A polymorphic cipher |
Country Status (2)
Country | Link |
---|---|
MY (1) | MY145989A (en) |
WO (1) | WO2011002274A1 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8699703B2 (en) | 2011-10-19 | 2014-04-15 | Apple Inc. | System and method for pseudo-random polymorphic tree construction |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6259789B1 (en) * | 1997-12-12 | 2001-07-10 | Safecourier Software, Inc. | Computer implemented secret object key block cipher encryption and digital signature device and method |
US7254231B1 (en) * | 1999-10-14 | 2007-08-07 | Ati International Srl | Encryption/decryption instruction set enhancement |
JP3505482B2 (en) * | 2000-07-12 | 2004-03-08 | 株式会社東芝 | Encryption device, decryption device, extended key generation device, extended key generation method, and recording medium |
KR100675837B1 (en) * | 2004-12-13 | 2007-01-29 | 한국전자통신연구원 | Fast-GCM-AES block encoding apparatus and method |
-
2009
- 2009-06-29 MY MYPI20092762 patent/MY145989A/en unknown
-
2010
- 2010-06-22 WO PCT/MY2010/000104 patent/WO2011002274A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2011002274A1 (en) | 2011-01-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2008152393A3 (en) | Fuzzy keys | |
DE602007005166D1 (en) | NER STARTING NUMBER | |
WO2013080224A3 (en) | A method of generation and transmission of secure tokens based on tokens generated by trng and split into shares and the system thereof | |
WO2009008680A3 (en) | Method for generating downlink frame, and method for searching cell | |
ATE548820T1 (en) | METHOD AND APPARATUS BY AES CBC FOR ENCRYPTING AND DECRYPTING A MESSAGE AND VERIFYING MESSAGE INTEGRITY BY A MAC | |
IN2013MU01234A (en) | ||
WO2008049046A3 (en) | Method for securely extending key stream to encrypt high-entropy data | |
EP2348447A3 (en) | A computer implemented method for generating a set of identifiers from a private key, computer implemented method and computing device | |
GB2430593A (en) | Accelerated throughput synchronised word stream cipher, message authenticator and zero=knowledge output random number generator | |
NZ596935A (en) | Generating an encryption/decryption key by comparing data sets received from a central server | |
RU2011122728A (en) | METHOD AND SYSTEM FOR HIDING THE EXISTENCE OF DATA ENCRYPTION IN THE COMMUNICATION CHANNEL | |
MX337300B (en) | Method of providing a portable true random number generator based on the microstructure and noise found in digital images. | |
WO2008076861A3 (en) | Combinational combiner cryptographic method | |
WO2010045044A3 (en) | Method and device for sending encryption parameters | |
ATE438236T1 (en) | METHOD FOR STEGANOGRAPHIC CRYPTOGRAPHY | |
WO2008148784A3 (en) | Cryptographic methods and devices for the pseudo-random generation of data encryption and cryptographic hashing of a message | |
MX2009007039A (en) | Pilot transmission in a wireless communication system. | |
ATE472133T1 (en) | DECRYPTION PROCEDURE | |
WO2008086241A3 (en) | A method of two strings private key (symmetric) encryption and decryption algorithm | |
WO2012172832A3 (en) | Authenticator, authenticatee and authentication method | |
WO2008099831A1 (en) | Key generation device, key derivation device, encryption device, decryption device, method, and program | |
FI20075776A0 (en) | End-to-end encrypted communication | |
MY159284A (en) | A method for encrypting and decrypting data and a system therefor | |
WO2008114829A1 (en) | Encryption device, decryption device, encryption program, decryption program, and recording medium | |
MY145989A (en) | A polymorphic cipher |