WO2005034423A1 - Method for cryptographically processing a message, method for generatiing a cryptographically processed message, method for performing a cryptographic operation on a message, computer system, client computer, server computer and computer program elements - Google Patents
Method for cryptographically processing a message, method for generatiing a cryptographically processed message, method for performing a cryptographic operation on a message, computer system, client computer, server computer and computer program elements Download PDFInfo
- Publication number
- WO2005034423A1 WO2005034423A1 PCT/SG2004/000320 SG2004000320W WO2005034423A1 WO 2005034423 A1 WO2005034423 A1 WO 2005034423A1 SG 2004000320 W SG2004000320 W SG 2004000320W WO 2005034423 A1 WO2005034423 A1 WO 2005034423A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- message
- cryptographic key
- computer
- partial
- key
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 60
- 238000012545 processing Methods 0.000 title claims abstract description 25
- 238000004590 computer program Methods 0.000 title claims description 9
- 238000000354 decomposition reaction Methods 0.000 claims abstract description 33
- 238000004422 calculation algorithm Methods 0.000 claims description 15
- 230000001010 compromised effect Effects 0.000 description 5
- 238000010586 diagram Methods 0.000 description 5
- 238000012546 transfer Methods 0.000 description 5
- 238000004891 communication Methods 0.000 description 3
- 238000001514 detection method Methods 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 238000012544 monitoring process Methods 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 239000012141 concentrate Substances 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3249—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
Definitions
- Method for cryptographically processing a message Method for generating a cryptographically processed message, method for performing a cryptographic operation on a message, computer system, client computer, server computer and computer program elements
- the invention relates to a method for cryptographically processing a message, a method for generating a cryptographically processed message, a method for performing a cryptographic operation on a message, a computer system, a client computer, a server computer and computer program elements.
- Some of the data transferred using a computer network or stored in a computer network is often secret, e.g. it should not be read or changed by people who are not privileged to do so.
- information (or data) security solutions and network security solutions i.e. methods for guaranteeing security of computer networks, for example for preventing that non-authorized people access the computer network and/or the data transferred in the computer network, are of major importance.
- Products for the prevention of attacks at the boundary between two computer networks for example firewalls
- Products for the detection of an attack after the attack has happened for example intrusion, detection systems
- Firewalls are designed to protect computer systems in a computer network from hackers who attack from outside the computer network, but not from malicious insiders, i.e., from people who access the computer network from the inside, e.g. by a computer system which is part of the computer network. Firewalls concentrate security at one port, aggravating the single point of failure phenomenon. Intrusion detection systems can only detect an attack after the damage has been done.hackers normally work faster to come out with new attack methodologies to avoid being detected.
- Application server computers which make use of public key cryptographic (PKC) systems for securing data transfers are playing an increasingly important role in the Internet, for example in electronic commerce.
- PLC public key cryptographic
- Such application server computers are for example web server computers that serve Internet client computers, like a web server computer hosting the web site of a bank and transferring the state of an account of a user to an- Internet client computer used by that user.
- SSL Secure sockets layer
- An application server computer used by an enterprise such as a web server computer which hosts a web page of the enterprise, has typically to be placed outside the firewall of the enterprise's computer network, i.e., in a publicly accessible computer network separated from the enterprise's computer network by the firewall, such that web client computers are able to access the web server computer.
- the web server computer is not protected by the firewall. This makes the web server computer vulnerable to attacks. If the web server computer carries a private key which is used for secure data transfer by an underlying PKC, the web server computer becomes a vulnerable point of failure.
- An object of the invention is to prevent the security problems which arise when a private key is stored on a computer which is vulnerable to attacks.
- the object is achieved by a method for cryptographically processing a message, a method for generating a cryptographically processed message, a method for performing a cryptographic operation on a message, a computer system, a client computer, a server computer and computer program elements with the features according to the independent claims.
- a method for cryptographically processing a message wherein a first partial cryptographic key and a second partial cryptographic key, which correspond to a decomposition of a private cryptographic key, are used; the message is processed using the first partial cryptographic key resulting in a first partially processed message; the message is processed using the second partial cryptographic key resulting in a second partially processed message; and the first partially processed message and the second partially processed message are combined resulting in a cryptographically processed message.
- a method for generating a cryptographically processed message a method for performing a cryptographic operation on a message, a computer system, a client computer, a server computer and computer program elements according to the method for cryptographically processing a message described above are provided.
- a method for protecting a private key e.g. a RSA key
- Partial operations corresponding to the multiple key parts are performed separately and the results are later combined.
- the partial operations are carried out on separate computers and in particular, that on each computer only a key part - not the complete private key - has to be stored.
- the private cryptographic key is at least decomposed into two partial cryptographic keys .
- the private cryptographic key can be decomposed into a multiplicity of partial cryptographic keys which are stored on different key server computers. Accordingly, each of the multiplicity of key server computers can perform a partial operation using the partial cryptographic key stored in the key server computer and send the result to some server computer which combines the results.
- the key parts are stored in an application server computer and in one or more key server computers .
- the key server computers each carry out a partial private key cryptographic operation, e.g. compute a partial signature or a partial decryption, and send the results to the application server computer which assembles the results to form the result of the complete private key cryptographic operation, e.g. the complete signature or decryption.
- the application server computer computes a partial signature or a partial decryption itself and combines it with the results from the key server computers .
- the procedure is for example controlled by an administrator managing the key parts on different key server computers and application server computers and who creates key-pairs (consisting each of a private key and a public key) and managing them during their entire lifetime .
- an efficient mechanism for refreshing the key parts and a mechanism for splitting a RSA private exponent, such that efficient computation is achieved is used. These two mechanisms can also be controlled by an administrator .
- load balancing techniques can be used such that the cryptographical operations can be distributed to the key server computers .
- a private key of an application server computer has to be duplicated on all load balancing server computers or all the load balancing server computers share a common private key.
- a 'load balancing server computer is in this case a computer performing cryptographic operations for the application server computer based on the private key, i.e., "helping" the application server computer at performing cryptographic operations.
- helping the application server computer at performing cryptographic operations.
- a private key is split in a first and a second part and the first part is stored in a publicly accessible application server computer and the second part is stored in a key server computer. If an attacker succeeds in getting the first part, he still needs to compromise the key server computer to obtain the second part. Since the first part and the second part are preferably regularly refreshed, it will be difficult for the attacker to obtain both parts unless the application server computer and the key server computer are compromised at around the same time.
- e-immunity is built into a computer system so that the computer system is tolerant to intrusions and attacks- it can maintain the overall system security even when individual components are repeatedly broken into and controlled by an attacker.
- processing of the message using the first partial cryptographic key is carried out by a first computer and the processing of the message using the second partial cryptographic key is carried out by a second computer.
- the first and the second computer are coupled via a computer network.
- the first computer is located in a publicly accessible computer network and the second computer is located in a secure computer network coupled to the publicly accessible computer network.
- the method further comprises the step of transmitting the message from the first computer to the second computer.
- first partial cryptographic key and the second partial cryptographic key correspond to a decomposition of the private cryptographic key into a plurality of partial cryptographic keys .
- the plurality of partial cryptographic keys give, when summed, the private cryptographic key.
- the cryptographical processing of the message is the signing of the message or the decrypting of a message. It is preferred that the message is processed according to a public key cryptographic algorithm.
- a public cryptographic key for decrypting a message there exists a public cryptographic key for decrypting a message and a private cryptographic key for decrypting (signing) a message.
- a pair consisting of a private cryptographic key and a public cryptographic key are generated.
- the private cryptographic key and the public cryptographic key are for example large integers (e.g. with more than 100 binary digits) .
- the message is encrypted using the public cryptographic key and is then sent to a receiver.
- the receiver can decrypt the message using the private key. Since the message can only be decrypted using the private key and the private key is kept secret by the receiver, the message can not be decrypted by some unauthorized person.
- the public key cryptographic algorithm is the RSA algorithm.
- the invention can also be applied to other cryptographic methods than RSA, for example to other assymetric cryptographic methods, key generating algorithms or other signing methods.
- f (x+y) f (x) f (y) were x and y are cryptographic key parts.
- cryptographic methods which are based on the discrete logarithm satisfy this prerequisite. It is further preferred that at selected times and after or before the message is processed, a refreshed decomposition is determined.
- the refreshed decomposition is determined by decomposing the first partial cryptographic key and the second partial cryptographic key and combining these decompositions to form a decomposition of the private cryptographic key.
- Figure 1 shows a computer system according to an embodiment of the invention.
- Figure 2 shows a flow diagram according to an embodiment of the invention.
- Figure 3 shows a private key, a first private key part and a second private key part according to an embodiment of the invention.
- Figure 4 shows a flow diagram according to an embodiment of the invention.
- Fig.l shows a computer system 100 according to an embodiment of the invention.
- the computer system 100 comprises an application server computer 101, which resides in a DMZ 102.
- the DMZ 102 (demilitarised zone) is a subnetwork that is located between a secure subnet 103 and a public network 104 which is publicly accessible.
- the secure subnet 103 is e.g. a corporate private LAN (local area network), the public network 104 is e.g. the Internet.
- the public network 104 is e.g. the Internet.
- a client computer 105 resides in the public network 104 which is coupled to the application server computer 101.
- Some web application runs on the application server computer 101 and the application server computer 101 serves the client computer 105 according to the web application.
- the application server computer 101 hosts the web side of the enterprise which owns the secure subnet 103.
- the secure subnet 103 comprises a first key server computer 107 and a second key server computer 108 and an administrator 109, i.e., a computer system used by an administrator of the secure subnet 103.
- the secure subnet 103 is protected at the boundary to the DMZ 102 by a firewall computer 106.
- the application server computer 101 is responsible for the processing of secure operations, e.g. .SSL (secure socket layer) authentication of the client computer 105, decryption of encrypted data sent from the client computer 105 to the application server computer 101 and signing messages sent by the application server computer 101 to the client computer 105.
- secure operations e.g. .SSL (secure socket layer) authentication of the client computer 105
- decryption of encrypted data sent from the client computer 105 to the application server computer 101 e.g.SSL (secure socket layer) authentication of the client computer 105
- signing messages sent by the application server computer 101 to the client computer 105 e.g. .SSL (secure socket layer)
- Fig.2 shows a flow diagram 200 according to an embodiment of the invention.
- N modulus, product of two large prime numbers p and q, i.e.
- C is computed according to
- the message M has the form of an integer, which is smaller than N.
- Large messages are broken up into smaller messages, such that the smaller messages can each be expressed as integers smaller than N.
- D is computed from M by some hashing algorithm.
- D can be generated using MD2, MD4, MD5, the SHA- 0 (Secure Hash Algorithm) or the SHA-1.
- the administrator 109 determines a public key (e, N) and a corresponding private key (d, N) for use with the RSA algorithm.
- the administrator can generate the key-pair.
- the key-pair might already exist and the administrator just splits the already existing key. This should also be reflected in Fig.2.
- the public key can be made known to users in the public network 104 by a certificate, which is digitally signed by a corresponding certificate authority.
- the administrator 109 creates the public key and the private key using standard key generation techniques.
- d__ r d2, d 3 , ..., d]_ (1 integer) are the parts of d, which is in the following referred to as the private key (although, to be exact, the private key is made up of d and N) .
- Each share can be stored on a different key server computer 107, 108 (accordingly, the secure subnet 103 can comprise a multiplicity of key server computers) .
- the secure subnet 103 can comprise a multiplicity of key server computers.
- d is split into two parts according to some decomposition, i.e., ( 8 )
- di j _ and d 2 i are selected random integers.
- d u is then assigned to the application server computer, i.e., is stored on the application server computer and d 2 ⁇ is stored on the key server computer 107, 108.
- d j _ (which corresponds to a decomposition which is assigned the number i) is stored on the i th key server computer, i.e., one of the key server computers 107, 108 which is assigned the number i.
- d 2 i is stored on the first key server computer 107.
- step 203 a cipher text has to be decrypted or a message digest has to be signed.
- a cipher text is decrypted according to this embodiment.
- the cipher text which is denoted by C, is generated from a message M by using the public key generated in step 201.
- the cipher text C is e.g. sent to the application server computer 101 by the client computer 105.
- the client computer 105 used the public key generated in step 201 to encrypt a message to create the cipher text C.
- C is assumed to be an integer generated according to equation (4).
- the application server computer 101 in step 204 first computes
- the application server computer 101 passes C to the first key server computer 107, which is assumed as mentioned above to hold the share d 2 j_ of the private key.
- step 205 the first key server computer 107 computes
- step 206 the cipher text C is decrypted and the message M is reconstructed.
- the application server computer 101 might calculate its partial decryption according to equation (11) at the same time as the first key server computer 107. It can pass the cipher text to the first key server computer 107 and while the first key server computer 107 is computing its partial decryption according to equation (12) , the application server 101 creates its partial decryption at the same time.
- the message digest D is e.g. generated by the application server computer 101 from the message M, which has to be sent from the application server computer 101 to the client computer 105, by using a hash function.
- step 207 the application server computer 101 calculates a partial signature according to
- the application server computer 101 sends D to the first key server computer 107.
- the first key server computer 107 computes
- the application server 101 might calculate its partial signature according to equation (14) at the same time as the first key server computer 107. It can pass D to the the first key server computer 107 and while the first key server computer 107 is computing its partial signature according to equation (15) , the application server 101 creates its partial decryption at the same time.
- the application server computer 101 computes in step 209 the signature according to
- the application server computer 101 does not perform the security functions all by itself, but cooperates with the key server computers 107, 108, in this example with the first key server computer 107, for performing security operations, such as decryption or signing.
- the key server computers 107, 108 are located inside the secure subnet 103 and are well protected -by the firewall computer 106. As mentioned, the private, key shares are stored by the key server computers 107, 108 to assist any secure function of the application server computer 101 (in this example the private key share d 2i is stored by the first key server computer 107) .
- the administrator 109 is responsible for the generation of private keys and public keys, maintaining the secure configuration and monitoring the status. In case of any discrepancies, the administrator 109 can react accordingly.
- the application server computer 101 is cooperating with the key server computers 107, 108 via secure channels, i.e., all data transferred from the application server computer 101 to the key server computers 107,108 according to the process described above with reference to fig.2 is transferred via secure channels. Since the private key d is split into two parts dn and d 2i , the application server computer 101 has to interact with the first key server computer 107, i.e. with the one of key server computer 107, 108, which holds the part of the private key not stored in the application server computer 101.
- the application server computer 101 performs part of the security functions using its private key part and one of the key server computers 107, 108 performs another part of the security functions using its private key part.
- the application server computer 101 combines, as described in steps 206 and 209, the two partial results together.
- the private key parts d ⁇ and d ⁇ 1 are never combined to create the complete private key d.
- Fig.3 shows a private key 301, denoted by d, a first private key part 302, denoted by d]_, and a second private key part 303, denoted by d 2 , according to an embodiment of the invention.
- the application server computer 101 has to compute X dl mod N, where X is C or D.
- the application server computer 101 does this by computing
- a number i is chosen. Then, the lower i bits of the second private key part 303 are set to zero. The higher
- the administrator 109 can store the private key 301 in some secure location, e.g. offline, or can delete the private key 301, since it is easy to construct the private key 301 from the first private key part 302 and second private key part 303.
- the decomposition of the private key d into two parts is changed at some times, referred to as refresh periods.
- Fig.4 shows a flow diagram 400 according to an embodiment of the invention.
- the processing steps of the flow diagram 400 are carried out by an application server computer 401, e.g. the application server computer 101, and a key server computer 402, e.g. one of the key server computers 107, 108.
- an application server computer 401 e.g. the application server computer 101
- a key server computer 402 e.g. one of the key server computers 107, 108.
- the application server computer 401 and the key server computer 402 communicate via fire wall 403.
- a first private key ' share 403, denoted by ⁇ __ be stored on the application server computer 401 and a second private key share 404, denoted by d 2 , be stored on the key server computer 402.
- the first private key share 403 and the second private key share 404 form a private key denoted by d, which is used for decryption and signing purposes as described above.
- all d ] _j_ are stored on the application server computer 101, and the respective second private key share d 2 _ is stored on the i th key server computer.
- the application server computer 101 can now depending on the work load of the key server computers 107, 108, distribute the partial decryption or signature operations to different key server computers 107, 108. According to the key server computer 107, 108, the application server computer 101 distributes the partial operation to, the application server computer 101 has to use the corresponding private key share, i.e.
- the application server computer 101 has to use d]__ for the partial operation performed by the application server computer 101, if a partial operation is distributed to the i th key server computer. As described above with reference to Fig.2, the application server computer 101 combines the results of the partial operations .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/574,222 US20060285683A1 (en) | 2004-10-01 | 2004-10-01 | Method for cryptographically processing a message, method for generating a cryptographically processed message, method for performing a cryptographic operation on a message, computer system, client computer, server computer and computer program elements |
EP04775641A EP1676396A4 (en) | 2003-10-03 | 2004-10-01 | METHOD FOR CRYPTOGRAPHIC PROCESSING OF A MESSAGE, METHOD FOR CREATING A CRYPTOGRAPHIC MESSAGE, METHOD FOR PERFORMING CRYPTOGRAPHIC OPERATION ON A MESSAGE, COMPUTER SYSTEM, CLIENT COMPUTER, SERVER COMPUTER AND COMPUTER PROGRAM ELEMENTS |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US50872003P | 2003-10-03 | 2003-10-03 | |
US60/508,720 | 2003-10-03 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005034423A1 true WO2005034423A1 (en) | 2005-04-14 |
Family
ID=34421780
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/SG2004/000320 WO2005034423A1 (en) | 2003-10-03 | 2004-10-01 | Method for cryptographically processing a message, method for generatiing a cryptographically processed message, method for performing a cryptographic operation on a message, computer system, client computer, server computer and computer program elements |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP1676396A4 (en) |
WO (1) | WO2005034423A1 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1876749A1 (en) * | 2006-07-06 | 2008-01-09 | Sap Ag | Privacy-preserving substring creation |
EP1876748A2 (en) | 2006-07-06 | 2008-01-09 | Sap Ag | Privacy-preserving concatenation of strings |
ITTV20110019A1 (en) * | 2011-02-08 | 2012-08-09 | Ct Vue S P A | COMPUTERIZED SYSTEM FOR THE MANAGEMENT OF SENSITIVE DATA GENERATED BY A MEDICAL DEVICE AND RELATIVE METHOD |
US8818959B2 (en) | 2008-12-02 | 2014-08-26 | Adobe Systems Incorporated | Virtual embedding of files in documents |
US9448976B2 (en) | 2008-05-20 | 2016-09-20 | Adobe Systems Incorporated | Package file presentation including reference content |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5905799A (en) * | 1994-07-20 | 1999-05-18 | Bell Atlantic Network Services, Inc. | Programmed computer for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem |
WO2000049768A1 (en) * | 1999-02-17 | 2000-08-24 | Thomas Mittelholzer | Method for signature splitting to protect private keys |
US20020076042A1 (en) * | 2000-12-19 | 2002-06-20 | Ravi Sandhu | System and method for crypto-key generation and use in cryptosystem |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5625692A (en) * | 1995-01-23 | 1997-04-29 | International Business Machines Corporation | Method and system for a public key cryptosystem having proactive, robust, and recoverable distributed threshold secret sharing |
US6035041A (en) * | 1997-04-28 | 2000-03-07 | Certco, Inc. | Optimal-resilience, proactive, public-key cryptographic system and method |
GB2342022B (en) * | 1997-07-28 | 2002-12-18 | Director Government Comm Headq | Split-key cryptographic system and method |
US5991414A (en) * | 1997-09-12 | 1999-11-23 | International Business Machines Corporation | Method and apparatus for the secure distributed storage and retrieval of information |
-
2004
- 2004-10-01 EP EP04775641A patent/EP1676396A4/en not_active Withdrawn
- 2004-10-01 WO PCT/SG2004/000320 patent/WO2005034423A1/en active Search and Examination
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5905799A (en) * | 1994-07-20 | 1999-05-18 | Bell Atlantic Network Services, Inc. | Programmed computer for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem |
WO2000049768A1 (en) * | 1999-02-17 | 2000-08-24 | Thomas Mittelholzer | Method for signature splitting to protect private keys |
US20020076042A1 (en) * | 2000-12-19 | 2002-06-20 | Ravi Sandhu | System and method for crypto-key generation and use in cryptosystem |
Non-Patent Citations (1)
Title |
---|
See also references of EP1676396A4 * |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1876749A1 (en) * | 2006-07-06 | 2008-01-09 | Sap Ag | Privacy-preserving substring creation |
EP1876748A2 (en) | 2006-07-06 | 2008-01-09 | Sap Ag | Privacy-preserving concatenation of strings |
EP1876748A3 (en) * | 2006-07-06 | 2008-01-23 | Sap Ag | Privacy-preserving concatenation of strings |
US7986780B2 (en) | 2006-07-06 | 2011-07-26 | Sap Ag | Privacy-preserving substring creation |
US7995750B2 (en) | 2006-07-06 | 2011-08-09 | Sap Ag | Privacy-preserving concatenation of strings |
US9448976B2 (en) | 2008-05-20 | 2016-09-20 | Adobe Systems Incorporated | Package file presentation including reference content |
US8818959B2 (en) | 2008-12-02 | 2014-08-26 | Adobe Systems Incorporated | Virtual embedding of files in documents |
US10025761B2 (en) | 2008-12-02 | 2018-07-17 | Adobe Systems Incorporated | Virtual embedding of files in documents |
ITTV20110019A1 (en) * | 2011-02-08 | 2012-08-09 | Ct Vue S P A | COMPUTERIZED SYSTEM FOR THE MANAGEMENT OF SENSITIVE DATA GENERATED BY A MEDICAL DEVICE AND RELATIVE METHOD |
Also Published As
Publication number | Publication date |
---|---|
EP1676396A4 (en) | 2010-03-10 |
EP1676396A1 (en) | 2006-07-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5313521A (en) | Key distribution protocol for file transfer in the local area network | |
EP0535863B1 (en) | A cryptographic protocol for secure communications | |
KR100769482B1 (en) | Systems, methods, and software for remote password authentication using multiple servers | |
KR0151217B1 (en) | How to Look Up a Secret Key in a Public-Key Cryptography System | |
Moghaddam et al. | A scalable and efficient user authentication scheme for cloud computing environments | |
US8688998B2 (en) | Resilent cryptographic scheme | |
WO2017147503A1 (en) | Techniques for confidential delivery of random data over a network | |
WO2002051062A1 (en) | A system and method for crypto-key generation and use in cryptosystem | |
EP2786292A1 (en) | Methods and devices for securing keys for a non-secured, distributed environment with applications to virtualization and cloud-computing security and management | |
Bellovin et al. | An attack on the interlock protocol when used for authentication | |
Hoover et al. | Software smart cards via cryptographic camouflage | |
Lehto et al. | CryptoVault-a secure hardware wallet for decentralized key management | |
US20060285683A1 (en) | Method for cryptographically processing a message, method for generating a cryptographically processed message, method for performing a cryptographic operation on a message, computer system, client computer, server computer and computer program elements | |
Yeboah-Ofori et al. | Applied cryptography in network systems security for cyberattack prevention | |
EP1676396A1 (en) | Method for cryptographically processing a message, method for generatiing a cryptographically processed message, method for performing a cryptographic operation on a message, computer system, client computer, server computer and computer program elements | |
Natarajan et al. | Secure user authentication and data sharing for mobile cloud computing using BLAKE2 and Diffie-Hellman key exchange | |
US20170018207A1 (en) | Symmetric encryption device and method used | |
Basu et al. | Secured hierarchical secret sharing using ECC based signcryption | |
Nithya et al. | An Analysis on Cryptographic Algorithms for Handling Network Security Threats | |
WO1999049613A1 (en) | Cryptographic key-recovery mechanism | |
Zhang et al. | Cryptanalysis of Lee–Hwang–Li's key authentication scheme | |
Yoon et al. | An efficient password authentication schemes without using the server public key for grid computing | |
Jaglan | Proposing Efficient Approach to Improve Integrity Checking in Cloud Data Security. | |
Tan et al. | A new secure network upgrade system | |
Yerlikaya et al. | Designing a communication system for secure access to network devices |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2006285683 Country of ref document: US Ref document number: 10574222 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2004775641 Country of ref document: EP |
|
DPEN | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed from 20040101) | ||
WWP | Wipo information: published in national office |
Ref document number: 2004775641 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 10574222 Country of ref document: US |