TW200644564A - Methods and systems for incremental crypto processing of fragmented packets - Google Patents
Methods and systems for incremental crypto processing of fragmented packetsInfo
- Publication number
- TW200644564A TW200644564A TW095104366A TW95104366A TW200644564A TW 200644564 A TW200644564 A TW 200644564A TW 095104366 A TW095104366 A TW 095104366A TW 95104366 A TW95104366 A TW 95104366A TW 200644564 A TW200644564 A TW 200644564A
- Authority
- TW
- Taiwan
- Prior art keywords
- packet
- encryption
- fragment
- fragments
- hash
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0637—Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Mobile Radio Communication Systems (AREA)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US65159605P | 2005-02-09 | 2005-02-09 |
Publications (1)
Publication Number | Publication Date |
---|---|
TW200644564A true TW200644564A (en) | 2006-12-16 |
Family
ID=36658740
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW095104366A TW200644564A (en) | 2005-02-09 | 2006-02-09 | Methods and systems for incremental crypto processing of fragmented packets |
Country Status (3)
Country | Link |
---|---|
US (1) | US20070255947A1 (zh) |
TW (1) | TW200644564A (zh) |
WO (1) | WO2006086554A2 (zh) |
Families Citing this family (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7475244B2 (en) * | 2002-11-05 | 2009-01-06 | Kabushiki Kaisha Toshiba | Wireless communication device, portable terminal, communication control program and communication system |
EP1877948B1 (en) * | 2005-05-02 | 2013-07-03 | NDS Limited | Native scrambling system |
US7839845B2 (en) * | 2005-06-27 | 2010-11-23 | Intel Corporation | Apparatus, system and method capable of aggregate compression in a wireless LAN |
US8087092B2 (en) * | 2005-09-02 | 2011-12-27 | Uniloc Usa, Inc. | Method and apparatus for detection of tampering attacks |
US20070268918A1 (en) * | 2006-05-22 | 2007-11-22 | Marvell International Ltd. | Packet tunneling for wireless clients using maximum transmission unit reduction |
US8284929B2 (en) * | 2006-09-14 | 2012-10-09 | Uniloc Luxembourg S.A. | System of dependant keys across multiple pieces of related scrambled information |
US8345713B2 (en) | 2006-10-25 | 2013-01-01 | Verizon Patent And Licensing Inc. | Methods and apparatus for content scrambling in a communications system |
US8949600B2 (en) * | 2006-10-27 | 2015-02-03 | Qualcomm Incorporated | Composed message authentication code |
US8356178B2 (en) * | 2006-11-13 | 2013-01-15 | Seagate Technology Llc | Method and apparatus for authenticated data storage |
US8160962B2 (en) * | 2007-09-20 | 2012-04-17 | Uniloc Luxembourg S.A. | Installing protected software product using unprotected installation image |
US8464059B2 (en) * | 2007-12-05 | 2013-06-11 | Netauthority, Inc. | System and method for device bound public key infrastructure |
TWI341095B (en) * | 2007-12-12 | 2011-04-21 | Nat Univ Tsing Hua | Light-overhead and flexible wireless sensor message authentication method |
US20090168994A1 (en) * | 2007-12-26 | 2009-07-02 | Heuss Michael R | Method for providing stronger encryption using conventional ciphers |
US20090170474A1 (en) * | 2007-12-27 | 2009-07-02 | Motorola, Inc. | Method and device for authenticating trunking control messages |
US20090190762A1 (en) * | 2008-01-30 | 2009-07-30 | Andrew Dellow | Method and system for preventing generation of decryption keys via sample gathering |
US8713666B2 (en) * | 2008-03-27 | 2014-04-29 | Check Point Software Technologies, Ltd. | Methods and devices for enforcing network access control utilizing secure packet tagging |
EP2311233A1 (en) * | 2008-05-21 | 2011-04-20 | Uniloc Usa, Inc. | Device and method for secured communication |
FI20080534A0 (fi) | 2008-09-22 | 2008-09-22 | Envault Corp Oy | Turvallinen ja valikoidusti kiistettävissä oleva tiedostovarasto |
US9008314B2 (en) * | 2008-11-18 | 2015-04-14 | Verizon Patent And Licensing Inc. | Secure wireless communications |
US8281122B2 (en) * | 2009-03-02 | 2012-10-02 | Intel Corporation | Generation and/or reception, at least in part, of packet including encrypted payload |
US9141489B2 (en) | 2009-07-09 | 2015-09-22 | Uniloc Luxembourg S.A. | Failover procedure for server system |
US8934630B2 (en) | 2009-11-02 | 2015-01-13 | International Business Machines Corporation | Compressing block-cipher encrypted data |
US11968292B1 (en) * | 2014-12-18 | 2024-04-23 | Amazon Technologies, Inc. | Incremental authenticated data encodings |
DE102015209709A1 (de) * | 2015-05-27 | 2016-12-01 | Continental Teves Ag & Co. Ohg | Verfahren zur Sicherstellung der Informationssicherheit von über einen Datenbus übertragenen Daten sowie Datenbussystem |
US9832123B2 (en) * | 2015-09-11 | 2017-11-28 | Cisco Technology, Inc. | Network named fragments in a content centric network |
CN106686008B (zh) * | 2017-03-03 | 2019-01-11 | 腾讯科技(深圳)有限公司 | 信息存储方法及装置 |
US11082408B2 (en) * | 2017-07-20 | 2021-08-03 | Michael T. Jones | Systems and methods for packet spreading data transmission with anonymized endpoints |
CN117527351A (zh) * | 2023-11-08 | 2024-02-06 | 青海师范大学 | 一种数据完整性验证方法及装置 |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6832316B1 (en) * | 1999-12-22 | 2004-12-14 | Intertrust Technologies, Corp. | Systems and methods for protecting data secrecy and integrity |
WO2001056221A2 (en) * | 2000-01-31 | 2001-08-02 | Vdg Inc. | Block encryption method and schemes for data confidentiality and integrity protection |
US7082534B2 (en) * | 2002-05-31 | 2006-07-25 | Broadcom Corporation | Method and apparatus for performing accelerated authentication and decryption using data blocks |
US7277548B2 (en) * | 2002-10-23 | 2007-10-02 | Ndosa Technologies, Inc. | Cryptographic method and computer program product for use in wireless local area networks |
JP4549303B2 (ja) * | 2005-02-07 | 2010-09-22 | 株式会社ソニー・コンピュータエンタテインメント | パイプラインを用いてメッセージ認証コードを提供する方法および装置 |
-
2006
- 2006-02-08 US US11/351,331 patent/US20070255947A1/en not_active Abandoned
- 2006-02-08 WO PCT/US2006/004583 patent/WO2006086554A2/en active Application Filing
- 2006-02-09 TW TW095104366A patent/TW200644564A/zh unknown
Also Published As
Publication number | Publication date |
---|---|
WO2006086554A3 (en) | 2007-03-01 |
US20070255947A1 (en) | 2007-11-01 |
WO2006086554A2 (en) | 2006-08-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TW200644564A (en) | Methods and systems for incremental crypto processing of fragmented packets | |
Glissa et al. | 6LowPSec: An end-to-end security protocol for 6LoWPAN | |
Proano et al. | Packet-hiding methods for preventing selective jamming attacks | |
CN101980558B (zh) | 一种Ad hoc网络传输层协议上的加密认证方法 | |
WO2006116620A3 (en) | Ciphering and re-ordering packets in a wireless communication system | |
WO2007075156A3 (en) | Cryptography related to keys | |
WO2008020279A3 (en) | Reducing security protocol overhead in low data rate applications over a wireless link | |
WO2006045038A3 (en) | Enciphering method | |
Boakye-Boateng et al. | Encryption protocol for resource-constrained devices in fog-based IoT using one-time pads | |
SG129298A1 (en) | Rtp payload format | |
TW200742354A (en) | Method of encrypting/decrypting transport stream having a plurality of packets and related apparatus thereof | |
WO2008080800A3 (en) | Securing communication | |
EP1947798A3 (en) | Method and apparatus using AES CBC for encrypting and decrypting a message and to verify the message integrity by means of MAC | |
WO2007011679A3 (en) | Systems and methods of ambiguity envelope encryption scheme and applications | |
WO2009021219A3 (en) | Key identifier in packet data convergence protocol header | |
Bandirmali et al. | WSNSec: A scalable data link layer security protocol for WSNs | |
Krontiris et al. | Scatter–secure code authentication for efficient reprogramming in wireless sensor networks | |
CN102946315A (zh) | 一种采用分组方式构造mac码的方法及系统 | |
CN110730366B (zh) | 基于位运算的轻量级视频流加密、解密方法及加解密方法 | |
Prameela et al. | A robust energy efficient and secure data dissemination protocol for wireless body area networks | |
Sun et al. | Securing network access in wireless sensor networks | |
Wenceslao Jr | Performance efficiency of modified AES algorithm using multiple S-boxes | |
WO2007031894A3 (en) | Improved cryptographic method and system | |
Khakurel et al. | Security vulnerabilities in IEEE 802.11 and adaptive encryption technique for better performance | |
Kong et al. | Improved rectangle attack on SMS4 reduced to 18 rounds |