NZ517438A - Multiple module encryption method - Google Patents

Multiple module encryption method

Info

Publication number
NZ517438A
NZ517438A NZ517438A NZ51743800A NZ517438A NZ 517438 A NZ517438 A NZ 517438A NZ 517438 A NZ517438 A NZ 517438A NZ 51743800 A NZ51743800 A NZ 51743800A NZ 517438 A NZ517438 A NZ 517438A
Authority
NZ
New Zealand
Prior art keywords
module
encryption
decryption
key
upstream
Prior art date
Application number
NZ517438A
Other languages
English (en)
Inventor
Marco Sasselli
Christophe Nicolas
Michaeljohn Hill
Original Assignee
Nagracard Sa
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nagracard Sa filed Critical Nagracard Sa
Publication of NZ517438A publication Critical patent/NZ517438A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • H04L9/003Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Compression, Expansion, Code Conversion, And Decoders (AREA)
  • Slot Machines And Peripheral Devices (AREA)
  • Coupling Device And Connection With Printed Circuit (AREA)
NZ517438A 1999-08-30 2000-08-24 Multiple module encryption method NZ517438A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CH157399 1999-08-30
US19417100P 2000-04-03 2000-04-03
PCT/IB2000/001157 WO2001017159A1 (fr) 1999-08-30 2000-08-24 Methode d'encryptage multi-modules

Publications (1)

Publication Number Publication Date
NZ517438A true NZ517438A (en) 2003-09-26

Family

ID=25688037

Family Applications (1)

Application Number Title Priority Date Filing Date
NZ517438A NZ517438A (en) 1999-08-30 2000-08-24 Multiple module encryption method

Country Status (27)

Country Link
EP (1) EP1208666A1 (de)
JP (1) JP2003508965A (de)
KR (1) KR20020041807A (de)
CN (1) CN100448193C (de)
AP (1) AP2002002433A0 (de)
AU (1) AU769437B2 (de)
BG (1) BG64520B1 (de)
BR (1) BR0013712A (de)
CA (1) CA2383042A1 (de)
CU (1) CU22950A3 (de)
CZ (1) CZ2002582A3 (de)
DZ (1) DZ3193A1 (de)
EA (1) EA003745B1 (de)
EE (1) EE200200106A (de)
HK (1) HK1048407B (de)
HR (1) HRP20020179A2 (de)
HU (1) HU224846B1 (de)
IL (1) IL148285A0 (de)
MA (1) MA25431A1 (de)
MX (1) MXPA02001849A (de)
NO (1) NO20020951L (de)
NZ (1) NZ517438A (de)
OA (1) OA12153A (de)
PL (1) PL353795A1 (de)
SK (1) SK2892002A3 (de)
TR (1) TR200200525T2 (de)
WO (1) WO2001017159A1 (de)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8775319B2 (en) 2006-05-15 2014-07-08 The Directv Group, Inc. Secure content transfer systems and methods to operate the same
US10397258B2 (en) 2017-01-30 2019-08-27 Microsoft Technology Licensing, Llc Continuous learning for intrusion detection

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5594797A (en) * 1995-02-22 1997-01-14 Nokia Mobile Phones Variable security level encryption
DE19539700C1 (de) * 1995-10-25 1996-11-28 Siemens Ag Sicherheitschip

Also Published As

Publication number Publication date
BG64520B1 (bg) 2005-05-31
EP1208666A1 (de) 2002-05-29
HK1048407B (zh) 2009-09-25
CN1371563A (zh) 2002-09-25
CA2383042A1 (en) 2001-03-08
MXPA02001849A (es) 2004-02-26
CZ2002582A3 (cs) 2002-07-17
TR200200525T2 (tr) 2002-07-22
EE200200106A (et) 2003-04-15
MA25431A1 (fr) 2002-04-01
JP2003508965A (ja) 2003-03-04
OA12153A (fr) 2006-05-08
KR20020041807A (ko) 2002-06-03
BG106436A (en) 2002-10-31
AU6311800A (en) 2001-03-26
HUP0202691A2 (en) 2002-12-28
WO2001017159A1 (fr) 2001-03-08
HK1048407A1 (en) 2003-03-28
HRP20020179A2 (en) 2004-02-29
SK2892002A3 (en) 2002-07-02
AP2002002433A0 (en) 2002-03-31
IL148285A0 (en) 2002-09-12
BR0013712A (pt) 2002-05-07
CN100448193C (zh) 2008-12-31
NO20020951L (no) 2002-04-23
CU22950A3 (es) 2004-04-13
DZ3193A1 (fr) 2001-03-08
AU769437B2 (en) 2004-01-29
EA200200184A1 (ru) 2002-06-27
PL353795A1 (en) 2003-12-01
EA003745B1 (ru) 2003-08-28
NO20020951D0 (no) 2002-02-27
HU224846B1 (en) 2006-03-28

Similar Documents

Publication Publication Date Title
Young et al. Kleptography: Using cryptography against cryptography
CN110235409B (zh) 使用同态加密被保护的rsa签名或解密的方法
Karri et al. Concurrent error detection schemes for fault-based side-channel cryptanalysis of symmetric block ciphers
US7248700B2 (en) Device and method for calculating a result of a modular exponentiation
EP1234404B1 (de) Erzeugung eines mathematischen eingeschränkten schlüssels unter verwendung einer einwegfunktion
US20090010433A1 (en) Schryption method and device
Mandal et al. Analysis of avalanche effect in plaintext of des using binary codes
KR20060081847A (ko) 비밀키를 보호하는 스마트 카드 및 그것의 방법
US7190790B1 (en) Multiple module encryption method
Raghunandan et al. Comparative analysis of encryption and decryption techniques using mersenne prime numbers and phony modulus to avoid factorization attack of RSA
KR100396740B1 (ko) 계산적 디피-헬만 가정에 기반하는 안전성 증명 가능한공개키 암호화 방법
Li et al. Cryptanalysis of a data security protection scheme for VoIP
AU769437B2 (en) Multiple module encryption method
Khaleel et al. A novel stream cipher based on nondeterministic finite automata
CA2453081C (en) Method and apparatus for protecting ntru against a timing attack
Phan et al. On related-key and collision attacks: the case for the IBM 4758 cryptoprocessor
Lone et al. Common attacks on RSA and its variants with possible countermeasures
Handschuh et al. On the security of double and 2-key triple modes of operation
McEvoy et al. All-or-Nothing Transforms as a Countermeasure to Differential Side-Channel Analysis
Shakir Study and Design of an Encryption Algorithm for Data Transmitted Over the Network by the IDEA and RSA
Van Der Merwe et al. TR-31 and AS 2805 (Non) equivalence report
Rwabutaza et al. A comparative survey on cryptology-based methodologies
Anjali Krishna et al. A Study on Cryptographic Techniques
Gambhir et al. Elevating ‘e’in RSA: A Path to Improved Encryption Algorithms
Chalurkar et al. Survey on modular attack on RSA algorithm

Legal Events

Date Code Title Description
PSEA Patent sealed
RENW Renewal (renewal fees accepted)