UA67860C2 - Method for coding and decoding data - Google Patents

Method for coding and decoding data Download PDF

Info

Publication number
UA67860C2
UA67860C2 UA2002021660A UA2002021660A UA67860C2 UA 67860 C2 UA67860 C2 UA 67860C2 UA 2002021660 A UA2002021660 A UA 2002021660A UA 2002021660 A UA2002021660 A UA 2002021660A UA 67860 C2 UA67860 C2 UA 67860C2
Authority
UA
Ukraine
Prior art keywords
module
encryption
decryption
differs
modules
Prior art date
Application number
UA2002021660A
Other languages
English (en)
Ukrainian (uk)
Original Assignee
Nagracard Sa
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nagracard Sa filed Critical Nagracard Sa
Priority claimed from PCT/IB2000/001157 external-priority patent/WO2001017159A1/fr
Publication of UA67860C2 publication Critical patent/UA67860C2/uk

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • H04L9/003Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • H04L9/005Countermeasures against attacks on cryptographic mechanisms for timing attacks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)
  • Infusion, Injection, And Reservoir Apparatuses (AREA)
UA2002021660A 1999-08-30 2000-08-24 Method for coding and decoding data UA67860C2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CH157399 1999-08-30
PCT/IB2000/001157 WO2001017159A1 (fr) 1999-08-30 2000-08-24 Methode d'encryptage multi-modules

Publications (1)

Publication Number Publication Date
UA67860C2 true UA67860C2 (en) 2004-07-15

Family

ID=27792847

Family Applications (1)

Application Number Title Priority Date Filing Date
UA2002021660A UA67860C2 (en) 1999-08-30 2000-08-24 Method for coding and decoding data

Country Status (8)

Country Link
US (1) US7190790B1 (es)
AR (1) AR025429A1 (es)
JO (1) JO2271B1 (es)
MY (1) MY133728A (es)
PA (1) PA8501701A1 (es)
TW (1) TW546935B (es)
UA (1) UA67860C2 (es)
ZA (1) ZA200201394B (es)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7617158B2 (en) * 2004-03-22 2009-11-10 Telefonaktiebolaget L M Ericsson (Publ) System and method for digital rights management of electronic content
US7496753B2 (en) * 2004-09-02 2009-02-24 International Business Machines Corporation Data encryption interface for reducing encrypt latency impact on standard traffic
US7409558B2 (en) * 2004-09-02 2008-08-05 International Business Machines Corporation Low-latency data decryption interface
JP4107673B2 (ja) * 2005-02-10 2008-06-25 インターナショナル・ビジネス・マシーンズ・コーポレーション 通信中継システム、制御方法、プログラム、及び情報処理システム
US7940926B2 (en) * 2006-06-08 2011-05-10 Novell, Inc. Cooperative encoding of data by pluralities of parties
WO2009033248A1 (en) * 2007-09-10 2009-03-19 Novell, Inc. A method for efficient thread usage for hierarchically structured tasks
US9081953B2 (en) 2012-07-17 2015-07-14 Oracle International Corporation Defense against search engine tracking
WO2024112340A1 (en) * 2022-11-23 2024-05-30 SafeMoon US, LLC System and method of securing a server using elliptic curve cryptography

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5365589A (en) * 1992-02-07 1994-11-15 Gutowitz Howard A Method and apparatus for encryption, decryption and authentication using dynamical systems
FR2718311A1 (fr) * 1994-03-30 1995-10-06 Trt Telecom Radio Electr Dispositif de mise en Óoeuvre d'un système de signature de message et carte à puce comportant un tel dispositif.
GB2288519A (en) * 1994-04-05 1995-10-18 Ibm Data encryption
US5594797A (en) 1995-02-22 1997-01-14 Nokia Mobile Phones Variable security level encryption
DE19539700C1 (de) 1995-10-25 1996-11-28 Siemens Ag Sicherheitschip
US5768390A (en) * 1995-10-25 1998-06-16 International Business Machines Corporation Cryptographic system with masking
US5742686A (en) * 1996-06-14 1998-04-21 Finley; Phillip Scott Device and method for dynamic encryption
US5933501A (en) * 1996-08-01 1999-08-03 Harris Corporation `Virtual` encryption scheme combining different encryption operators into compound-encryption mechanism
US5901303A (en) * 1996-12-27 1999-05-04 Gemplus Card International Smart cards, systems using smart cards and methods of operating said cards in systems
US6240183B1 (en) * 1997-06-19 2001-05-29 Brian E. Marchant Security apparatus for data transmission with dynamic random encryption
US6128735A (en) * 1997-11-25 2000-10-03 Motorola, Inc. Method and system for securely transferring a data set in a data communications system
US6330675B1 (en) * 1998-02-13 2001-12-11 Liquid Audio, Inc. System and method for secure transfer of digital data to a local recordable storage medium
DE69936856T2 (de) * 1998-06-03 2008-04-30 Cryptography Research Inc., San Francisco Ausgewogene kryptographische rechenmethode und apparat zur schlupfminimierung in smartcards und anderen kryptosystemen
AU6381799A (en) * 1998-06-03 2000-01-10 Cryptography Research, Inc. Secure modular exponentiation with leak minimization for smartcards and other cryptosystems
IL139935A (en) * 1998-06-03 2005-06-19 Cryptography Res Inc Des and other cryptographic processes with leak minimization for smartcards and other cryptosystems

Also Published As

Publication number Publication date
AR025429A1 (es) 2002-11-27
PA8501701A1 (es) 2002-02-21
MY133728A (en) 2007-11-30
TW546935B (en) 2003-08-11
US7190790B1 (en) 2007-03-13
ZA200201394B (en) 2003-02-19
JO2271B1 (en) 2005-04-07

Similar Documents

Publication Publication Date Title
Courtois et al. Stealth address and key management techniques in blockchain systems
CN103986583A (zh) 一种动态加密方法及其加密通信系统
KR20240093634A (ko) 암호화 복호화 방법, 장치 및 매체
CN109995520A (zh) 基于深度卷积神经网络的密钥传输方法、图像处理平台
CN101931527A (zh) 对反直观量子密钥分配系统的单光子分束攻击方法
UA67860C2 (en) Method for coding and decoding data
CN106027560A (zh) 一种面向智能终端的安全传输方法及系统
Achuthshankar et al. A novel symmetric cryptography algorithm for fast and secure encryption
CN114567427A (zh) 一种区块链隐蔽数据分段传输方法
WO2017114739A1 (en) System and method for hiding a cryptographic secret using expansion
Kondo et al. An Extended Version of the Polybius Cipher
Lin et al. A genetic algorithm for ciphertext-only attack in cryptanalysis
Gaur et al. A comparative study and analysis of cryptographic algorithms: RSA, DES, AES, BLOWFISH, 3-DES, and TWOFISH
CN111915290A (zh) 一种iOS系统下基于密钥拆分保护的移动支付密码键盘及其实现方法
KR20020041807A (ko) 다중-모듈 암호화 방법
Kandul et al. Steganography with cryptography in android
CN117955637B (zh) 数据加密方法及装置、数据解密方法及装置
Yakubu et al. Audio secret management scheme using shamir’s secret sharing
Kim et al. A cryptanalytic view of the NSA’s Skipjack block cipher design
Zneit et al. Secure Method to Protect Secret Short Messages using Rearrangement Key
RU2325766C2 (ru) Способ защиты информации
JP2000115157A (ja) 紛失通信方法
Samid Finite Key OTP Functionality: Ciphers That Hold Off Attackers Smarter Than Their Designers
Sangeetha et al. Email Protection in the Digital Age: Evaluating Symmetric Cryptographic Algorithms
Singh et al. 64. RSA ENCRYPTION