SG11202000807YA - Computer-implemented system and method for highly secure, high speed encryption and transmission of data - Google Patents

Computer-implemented system and method for highly secure, high speed encryption and transmission of data

Info

Publication number
SG11202000807YA
SG11202000807YA SG11202000807YA SG11202000807YA SG11202000807YA SG 11202000807Y A SG11202000807Y A SG 11202000807YA SG 11202000807Y A SG11202000807Y A SG 11202000807YA SG 11202000807Y A SG11202000807Y A SG 11202000807YA SG 11202000807Y A SG11202000807Y A SG 11202000807YA
Authority
SG
Singapore
Prior art keywords
computer
transmission
data
high speed
implemented system
Prior art date
Application number
SG11202000807YA
Inventor
Craig Steven Wright
Original Assignee
Nchain Holdings Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from GBGB1713499.0A external-priority patent/GB201713499D0/en
Application filed by Nchain Holdings Ltd filed Critical Nchain Holdings Ltd
Publication of SG11202000807YA publication Critical patent/SG11202000807YA/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0872Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3252Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Algebra (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
SG11202000807YA 2017-08-23 2018-08-15 Computer-implemented system and method for highly secure, high speed encryption and transmission of data SG11202000807YA (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
GBGB1713499.0A GB201713499D0 (en) 2017-08-23 2017-08-23 Computer-implemented system and method
IB2017055073 2017-08-23
PCT/IB2018/056116 WO2019038634A1 (en) 2017-08-23 2018-08-15 Computer-implemented system and method for highly secure, high speed encryption and transmission of data

Publications (1)

Publication Number Publication Date
SG11202000807YA true SG11202000807YA (en) 2020-03-30

Family

ID=63490643

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11202000807YA SG11202000807YA (en) 2017-08-23 2018-08-15 Computer-implemented system and method for highly secure, high speed encryption and transmission of data

Country Status (9)

Country Link
US (1) US12010216B2 (en)
EP (2) EP4283922A3 (en)
JP (2) JP2020532177A (en)
KR (2) KR20200040248A (en)
CN (2) CN118802114A (en)
SG (1) SG11202000807YA (en)
TW (1) TWI760546B (en)
WO (1) WO2019038634A1 (en)
ZA (1) ZA202000405B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB201905348D0 (en) * 2019-04-16 2019-05-29 Nchain Holdings Ltd Computer implemented method and system for encrypting data
CN111488618B (en) * 2020-04-13 2021-05-18 深圳信息职业技术学院 Block chain-based one-time pad encryption method, device and storage medium
EP3926497A1 (en) * 2020-06-19 2021-12-22 The Swatch Group Research and Development Ltd Method for traceability of an item of digital information in a computer system
EP3956775B1 (en) * 2020-06-24 2024-03-20 Beatdapp Software Inc. System and method for continuous tracking of media playback using blockchain
TWI761243B (en) * 2021-06-29 2022-04-11 中華電信股份有限公司 Encryption system and encryption method for group instant massaging
US20230421357A1 (en) * 2022-06-09 2023-12-28 NEC Laboratories Europe GmbH Method and system for anonymous symmetric authenticated key establishment

Family Cites Families (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5577124A (en) * 1995-03-09 1996-11-19 Arithmetica, Inc. Multi-purpose high speed cryptographically secure sequence generator based on zeta-one-way functions
US5991405A (en) 1998-01-27 1999-11-23 Dsc Telecom, L.P. Method for dynamically updating cellular phone unique encryption keys
CN1281555C (en) 1998-05-27 2006-10-25 东陶机器株式会社 Sanitary earthenware products and process for producing same
ATE403992T1 (en) * 1999-06-22 2008-08-15 Hitachi Ltd CRYPTOGRAPHIC APPARATUS AND METHOD
US7290142B1 (en) 1999-09-28 2007-10-30 Thomas Licensing System and method for initializing a simple network management protocol (SNMP) agent
JP2003134107A (en) * 2001-10-25 2003-05-09 Ntt Data Corp System, method and program for individual authentication
AU2003293125A1 (en) 2002-11-27 2004-06-23 Rsa Security Inc Identity authentication system and method
CN1759563A (en) * 2003-03-25 2006-04-12 独立行政法人情报通信研究机构 Device, method, and program for random number generation, encryption, and decryption, and recording medium
US20040268126A1 (en) * 2003-06-24 2004-12-30 Dogan Mithat C. Shared secret generation for symmetric key cryptography
FR2861234A1 (en) 2003-10-17 2005-04-22 St Microelectronics Sa ENCRYPTION OF DATA IN AN ELECTRONIC APPARATUS WITH MULTIPLE SYMMETRIC PROCESSORS
WO2004100496A2 (en) 2004-09-02 2004-11-18 Pisaramedia Oy Ends - messaging protocol that recovers and has backward security
US8594323B2 (en) 2004-09-21 2013-11-26 Rockstar Consortium Us Lp Method and apparatus for generating large numbers of encryption keys
EP1851902A1 (en) * 2005-02-25 2007-11-07 QUALCOMM Incorporated Small public-key based digital signatures for authentication
JP5060081B2 (en) 2006-08-09 2012-10-31 富士通株式会社 Relay device that encrypts and relays frames
US8165303B1 (en) * 2007-05-03 2012-04-24 Adobe Systems Incorporated Method and apparatus for public key cryptography
US8060750B2 (en) 2007-06-29 2011-11-15 Emc Corporation Secure seed provisioning
DE102008020928B4 (en) 2008-04-25 2014-04-17 Continental Automotive Gmbh A method for controlling an air-fuel ratio and method for detecting a fuel quality
EP2196937A1 (en) * 2008-12-15 2010-06-16 Thomson Licensing Methods and devices for instruction level software encryption
US8762741B2 (en) 2009-01-29 2014-06-24 Microsoft Corporation Privacy-preserving communication
RS53816B1 (en) 2009-08-28 2015-06-30 Geox S.P.A. Insert for vapor-permeable and waterproof soles
GB201020424D0 (en) 2010-12-02 2011-01-19 Qinetiq Ltd Quantum key distribution
JP5167374B2 (en) * 2011-01-21 2013-03-21 シャープ株式会社 Data encryption device and memory card
JP5525467B2 (en) * 2011-02-18 2014-06-18 株式会社日立製作所 Sensor device and control method thereof
US9858401B2 (en) * 2011-08-09 2018-01-02 Biogy, Inc. Securing transactions against cyberattacks
JP5622714B2 (en) * 2011-12-27 2014-11-12 株式会社東芝 Information processing apparatus and power usage adjustment system
JP6019453B2 (en) 2012-07-05 2016-11-02 株式会社クリプト・ベーシック ENCRYPTION DEVICE, DECRYPTION DEVICE, AND PROGRAM
JP5911654B2 (en) 2013-02-28 2016-04-27 コーニンクレッカ フィリップス エヌ ヴェKoninklijke Philips N.V. Random number generator and stream cipher
DE102013110552B4 (en) * 2013-09-24 2015-05-07 Bundesrepublik Deutschland, Vertreten Durch Das Bundesministerium Des Innern, Vertreten Durch Das Bundesamt Für Sicherheit In Der Informationstechnik, Vertreten Durch Den Präsidenten Provision and use of pseudonymous keys in hybrid encryption
EP2985945A1 (en) * 2014-08-15 2016-02-17 CompuGroup Medical AG Method for secure e-mail exchange
JP6287785B2 (en) * 2014-11-28 2018-03-07 ソニー株式会社 Cryptographic processing apparatus, cryptographic processing method, and program
US9735958B2 (en) 2015-05-19 2017-08-15 Coinbase, Inc. Key ceremony of a security system forming part of a host computer for cryptographic transactions
US10142107B2 (en) 2015-12-31 2018-11-27 Microsoft Technology Licensing, Llc Token binding using trust module protected keys
AU2017223133B2 (en) 2016-02-23 2022-09-08 nChain Holdings Limited Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys
TWI615732B (en) * 2016-12-27 2018-02-21 瑞昱半導體股份有限公司 Electronic component of electronic device, method of starting electronic device and encryption method

Also Published As

Publication number Publication date
EP3673610A1 (en) 2020-07-01
EP4283922A2 (en) 2023-11-29
CN118802114A (en) 2024-10-18
TW201921887A (en) 2019-06-01
US12010216B2 (en) 2024-06-11
KR20240135040A (en) 2024-09-10
WO2019038634A1 (en) 2019-02-28
EP3673610B1 (en) 2023-10-04
KR20200040248A (en) 2020-04-17
ZA202000405B (en) 2023-12-20
CN110999202B (en) 2024-09-06
CN110999202A (en) 2020-04-10
JP2023101776A (en) 2023-07-21
TWI760546B (en) 2022-04-11
JP2020532177A (en) 2020-11-05
EP4283922A3 (en) 2024-02-28
US20230188325A1 (en) 2023-06-15

Similar Documents

Publication Publication Date Title
EP3459202A4 (en) Method and system for secure data transmission
ZA201902947B (en) Data transmission method, apparatus and system
SG11202000807YA (en) Computer-implemented system and method for highly secure, high speed encryption and transmission of data
EP3195674A4 (en) Method and system for security and authentication of aircraft data transmissions
EP3300294A4 (en) Data encryption apparatus and method, and data decryption apparatus and method
EP3289689A4 (en) Method and system for low data rate transmission
EP3720019A4 (en) Internet of things data transmission method, device and system
EP3565148A4 (en) Data transmission method, apparatus and system
GB2539721B (en) System and method for secure transmission of data signals
EP3204858A4 (en) Highly secure networked system and methods for storage, processing, and transmission of sensitive personal information
EP3487116A4 (en) Method for ensuring security of data transformation, and network device
EP3226463A4 (en) Data encryption and decryption method and encryption and decryption device
EP3337088A4 (en) Data encryption method, decryption method, apparatus, and system
EP3331308A4 (en) Method and system for data transmission
EP3427212A4 (en) Systems, methods, and devices for secure generation and processing of data sets representing pre-funded payments
EP3232632A4 (en) Method and system for acquiring plaintext of network secret data
EP3232638A4 (en) Data transmission method, apparatus and system
EP3487241A4 (en) Data transmission method and system
EP3718040A4 (en) Systems and methods for improved data encryption
EP3404978A4 (en) Data transmission method, related apparatus and system
EP3282787A4 (en) Data transmission method, apparatus and system
EP3288304A4 (en) Data transmission method, apparatus and system
EP3297385A4 (en) Data transmission method, device and system, and access point
GB2526389B (en) System and method for secure transmission of data signals
IL265907A (en) Method and system for the transmission of bioinformatics data