TW200644564A - Methods and systems for incremental crypto processing of fragmented packets - Google Patents

Methods and systems for incremental crypto processing of fragmented packets

Info

Publication number
TW200644564A
TW200644564A TW095104366A TW95104366A TW200644564A TW 200644564 A TW200644564 A TW 200644564A TW 095104366 A TW095104366 A TW 095104366A TW 95104366 A TW95104366 A TW 95104366A TW 200644564 A TW200644564 A TW 200644564A
Authority
TW
Taiwan
Prior art keywords
packet
encryption
fragment
fragments
hash
Prior art date
Application number
TW095104366A
Other languages
English (en)
Inventor
Abhijit Choudhury
Sudhanshu Jain
Himanshu Shukla
Mathew Kayalackakom
Shekhar Ambe
T Mohanakumari B
Adrian Lewis
Original Assignee
Sinett Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sinett Corp filed Critical Sinett Corp
Publication of TW200644564A publication Critical patent/TW200644564A/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0637Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)
TW095104366A 2005-02-09 2006-02-09 Methods and systems for incremental crypto processing of fragmented packets TW200644564A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US65159605P 2005-02-09 2005-02-09

Publications (1)

Publication Number Publication Date
TW200644564A true TW200644564A (en) 2006-12-16

Family

ID=36658740

Family Applications (1)

Application Number Title Priority Date Filing Date
TW095104366A TW200644564A (en) 2005-02-09 2006-02-09 Methods and systems for incremental crypto processing of fragmented packets

Country Status (3)

Country Link
US (1) US20070255947A1 (zh)
TW (1) TW200644564A (zh)
WO (1) WO2006086554A2 (zh)

Families Citing this family (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7475244B2 (en) * 2002-11-05 2009-01-06 Kabushiki Kaisha Toshiba Wireless communication device, portable terminal, communication control program and communication system
EP1877948B1 (en) * 2005-05-02 2013-07-03 NDS Limited Native scrambling system
US7839845B2 (en) * 2005-06-27 2010-11-23 Intel Corporation Apparatus, system and method capable of aggregate compression in a wireless LAN
US8087092B2 (en) * 2005-09-02 2011-12-27 Uniloc Usa, Inc. Method and apparatus for detection of tampering attacks
US20070268918A1 (en) * 2006-05-22 2007-11-22 Marvell International Ltd. Packet tunneling for wireless clients using maximum transmission unit reduction
US8284929B2 (en) * 2006-09-14 2012-10-09 Uniloc Luxembourg S.A. System of dependant keys across multiple pieces of related scrambled information
US8345713B2 (en) 2006-10-25 2013-01-01 Verizon Patent And Licensing Inc. Methods and apparatus for content scrambling in a communications system
US8949600B2 (en) * 2006-10-27 2015-02-03 Qualcomm Incorporated Composed message authentication code
US8356178B2 (en) * 2006-11-13 2013-01-15 Seagate Technology Llc Method and apparatus for authenticated data storage
US8160962B2 (en) * 2007-09-20 2012-04-17 Uniloc Luxembourg S.A. Installing protected software product using unprotected installation image
US8464059B2 (en) * 2007-12-05 2013-06-11 Netauthority, Inc. System and method for device bound public key infrastructure
TWI341095B (en) * 2007-12-12 2011-04-21 Nat Univ Tsing Hua Light-overhead and flexible wireless sensor message authentication method
US20090168994A1 (en) * 2007-12-26 2009-07-02 Heuss Michael R Method for providing stronger encryption using conventional ciphers
US20090170474A1 (en) * 2007-12-27 2009-07-02 Motorola, Inc. Method and device for authenticating trunking control messages
US20090190762A1 (en) * 2008-01-30 2009-07-30 Andrew Dellow Method and system for preventing generation of decryption keys via sample gathering
US8713666B2 (en) * 2008-03-27 2014-04-29 Check Point Software Technologies, Ltd. Methods and devices for enforcing network access control utilizing secure packet tagging
EP2311233A1 (en) * 2008-05-21 2011-04-20 Uniloc Usa, Inc. Device and method for secured communication
FI20080534A0 (fi) 2008-09-22 2008-09-22 Envault Corp Oy Turvallinen ja valikoidusti kiistettävissä oleva tiedostovarasto
US9008314B2 (en) * 2008-11-18 2015-04-14 Verizon Patent And Licensing Inc. Secure wireless communications
US8281122B2 (en) * 2009-03-02 2012-10-02 Intel Corporation Generation and/or reception, at least in part, of packet including encrypted payload
US9141489B2 (en) 2009-07-09 2015-09-22 Uniloc Luxembourg S.A. Failover procedure for server system
US8934630B2 (en) 2009-11-02 2015-01-13 International Business Machines Corporation Compressing block-cipher encrypted data
US11968292B1 (en) * 2014-12-18 2024-04-23 Amazon Technologies, Inc. Incremental authenticated data encodings
DE102015209709A1 (de) * 2015-05-27 2016-12-01 Continental Teves Ag & Co. Ohg Verfahren zur Sicherstellung der Informationssicherheit von über einen Datenbus übertragenen Daten sowie Datenbussystem
US9832123B2 (en) * 2015-09-11 2017-11-28 Cisco Technology, Inc. Network named fragments in a content centric network
CN106686008B (zh) * 2017-03-03 2019-01-11 腾讯科技(深圳)有限公司 信息存储方法及装置
US11082408B2 (en) * 2017-07-20 2021-08-03 Michael T. Jones Systems and methods for packet spreading data transmission with anonymized endpoints
CN117527351A (zh) * 2023-11-08 2024-02-06 青海师范大学 一种数据完整性验证方法及装置

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6832316B1 (en) * 1999-12-22 2004-12-14 Intertrust Technologies, Corp. Systems and methods for protecting data secrecy and integrity
WO2001056221A2 (en) * 2000-01-31 2001-08-02 Vdg Inc. Block encryption method and schemes for data confidentiality and integrity protection
US7082534B2 (en) * 2002-05-31 2006-07-25 Broadcom Corporation Method and apparatus for performing accelerated authentication and decryption using data blocks
US7277548B2 (en) * 2002-10-23 2007-10-02 Ndosa Technologies, Inc. Cryptographic method and computer program product for use in wireless local area networks
JP4549303B2 (ja) * 2005-02-07 2010-09-22 株式会社ソニー・コンピュータエンタテインメント パイプラインを用いてメッセージ認証コードを提供する方法および装置

Also Published As

Publication number Publication date
WO2006086554A3 (en) 2007-03-01
US20070255947A1 (en) 2007-11-01
WO2006086554A2 (en) 2006-08-17

Similar Documents

Publication Publication Date Title
TW200644564A (en) Methods and systems for incremental crypto processing of fragmented packets
Glissa et al. 6LowPSec: An end-to-end security protocol for 6LoWPAN
Proano et al. Packet-hiding methods for preventing selective jamming attacks
CN101980558B (zh) 一种Ad hoc网络传输层协议上的加密认证方法
WO2006116620A3 (en) Ciphering and re-ordering packets in a wireless communication system
WO2007075156A3 (en) Cryptography related to keys
WO2008020279A3 (en) Reducing security protocol overhead in low data rate applications over a wireless link
WO2006045038A3 (en) Enciphering method
Boakye-Boateng et al. Encryption protocol for resource-constrained devices in fog-based IoT using one-time pads
SG129298A1 (en) Rtp payload format
TW200742354A (en) Method of encrypting/decrypting transport stream having a plurality of packets and related apparatus thereof
WO2008080800A3 (en) Securing communication
EP1947798A3 (en) Method and apparatus using AES CBC for encrypting and decrypting a message and to verify the message integrity by means of MAC
WO2007011679A3 (en) Systems and methods of ambiguity envelope encryption scheme and applications
WO2009021219A3 (en) Key identifier in packet data convergence protocol header
Bandirmali et al. WSNSec: A scalable data link layer security protocol for WSNs
Krontiris et al. Scatter–secure code authentication for efficient reprogramming in wireless sensor networks
CN102946315A (zh) 一种采用分组方式构造mac码的方法及系统
CN110730366B (zh) 基于位运算的轻量级视频流加密、解密方法及加解密方法
Prameela et al. A robust energy efficient and secure data dissemination protocol for wireless body area networks
Sun et al. Securing network access in wireless sensor networks
Wenceslao Jr Performance efficiency of modified AES algorithm using multiple S-boxes
WO2007031894A3 (en) Improved cryptographic method and system
Khakurel et al. Security vulnerabilities in IEEE 802.11 and adaptive encryption technique for better performance
Kong et al. Improved rectangle attack on SMS4 reduced to 18 rounds