Movatterモバイル変換


[0]ホーム

URL:


US20070294531A1 - System and methods for a vernam stream cipher, a keyed one-way hash and a non-cyclic pseudo-random number generator - Google Patents

System and methods for a vernam stream cipher, a keyed one-way hash and a non-cyclic pseudo-random number generator
Download PDF

Info

Publication number
US20070294531A1
US20070294531A1US11/705,313US70531307AUS2007294531A1US 20070294531 A1US20070294531 A1US 20070294531A1US 70531307 AUS70531307 AUS 70531307AUS 2007294531 A1US2007294531 A1US 2007294531A1
Authority
US
United States
Prior art keywords
random
byte
source
shuffled
pad
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/705,313
Inventor
Alexander Alten
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IndividualfiledCriticalIndividual
Priority to US11/705,313priorityCriticalpatent/US20070294531A1/en
Publication of US20070294531A1publicationCriticalpatent/US20070294531A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

The invention discloses a cryptographic system and consisting of three methods: a cryptographic Vernam stream cipher that permits software programs on separate computers to encrypt and decrypt information; a cryptographic keyed one-way hash that ensures the integrity and authenticity of a message; a non-cyclic pseudo-random number generator that permits a software program inside a computer to create large amounts of pseudo-random bits at high data rates.

Description

Claims (7)

US11/705,3132001-08-242007-02-12System and methods for a vernam stream cipher, a keyed one-way hash and a non-cyclic pseudo-random number generatorAbandonedUS20070294531A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US11/705,313US20070294531A1 (en)2001-08-242007-02-12System and methods for a vernam stream cipher, a keyed one-way hash and a non-cyclic pseudo-random number generator

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US09/938,790US7197142B2 (en)2001-08-242001-08-24System and methods for a vernam stream cipher
US11/705,313US20070294531A1 (en)2001-08-242007-02-12System and methods for a vernam stream cipher, a keyed one-way hash and a non-cyclic pseudo-random number generator

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US09/938,790DivisionUS7197142B2 (en)2001-08-242001-08-24System and methods for a vernam stream cipher

Publications (1)

Publication NumberPublication Date
US20070294531A1true US20070294531A1 (en)2007-12-20

Family

ID=25471961

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US09/938,790Expired - Fee RelatedUS7197142B2 (en)2001-08-242001-08-24System and methods for a vernam stream cipher
US11/705,313AbandonedUS20070294531A1 (en)2001-08-242007-02-12System and methods for a vernam stream cipher, a keyed one-way hash and a non-cyclic pseudo-random number generator

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US09/938,790Expired - Fee RelatedUS7197142B2 (en)2001-08-242001-08-24System and methods for a vernam stream cipher

Country Status (3)

CountryLink
US (2)US7197142B2 (en)
AU (1)AU2002329814A1 (en)
WO (1)WO2003019842A2 (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20070174536A1 (en)*2006-01-252007-07-26Hitachi, Ltd.Storage system and storage control apparatus
US8183980B2 (en)2005-08-312012-05-22Assa Abloy AbDevice authentication using a unidirectional protocol
US8358783B2 (en)2008-08-112013-01-22Assa Abloy AbSecure wiegand communications
US20140173238A1 (en)*2012-12-182014-06-19Rambus Inc.Methods and Circuits for Securing Proprietary Memory Transactions
WO2017023565A1 (en)*2015-08-052017-02-09TransferSoft, Inc.Symmetric stream cipher
WO2018211446A1 (en)*2017-05-192018-11-22International Business Machines CorporationCryptographic key-generation with application to data deduplication
US10452877B2 (en)2016-12-162019-10-22Assa Abloy AbMethods to combine and auto-configure wiegand and RS485
US11275603B2 (en)*2017-07-012022-03-15Intel CorporationTechnologies for memory replay prevention using compressive encryption
US11882201B2 (en)*2022-03-302024-01-23Itron, Inc.Data compression techniques for efficient network management
US12316721B2 (en)2022-03-302025-05-27Itron, Inc.Data compression techniques for efficient network management

Families Citing this family (35)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7260215B2 (en)*2001-09-042007-08-21Portauthority Technologies Inc.Method for encryption in an un-trusted environment
US20030142821A1 (en)*2002-01-022003-07-31Ross David MarshallCryptographic one time pad technique
US7836295B2 (en)*2002-07-292010-11-16International Business Machines CorporationMethod and apparatus for improving the resilience of content distribution networks to distributed denial of service attacks
US7685073B2 (en)*2002-07-302010-03-23Baker Paul LMethods for negotiating agreement over concealed terms through a blind agent
US7248696B2 (en)*2002-09-122007-07-24International Business Machines CorporationDynamic system bus encryption using improved differential transitional encoding
US20040247116A1 (en)*2002-11-202004-12-09Boren Stephen LaurenceMethod of generating a stream cipher using multiple keys
US7190791B2 (en)*2002-11-202007-03-13Stephen Laurence BorenMethod of encryption using multi-key process to create a variable-length key
US7097107B1 (en)2003-04-092006-08-29Mobile-Mind, Inc.Pseudo-random number sequence file for an integrated circuit card
JP3876324B2 (en)*2004-03-312007-01-31独立行政法人情報通信研究機構 Random number sequence sharing system, random number sequence sharing device, encryption / decryption system, encryption device, decryption device, random number sequence sharing method, encryption method, decryption method, and program
US7596544B2 (en)*2004-12-292009-09-29Alcatel-Lucent Usa Inc.Tracking set-expression cardinalities over continuous update streams
US8666900B1 (en)*2005-03-302014-03-04Intuit Inc.Secure product enablement over channels with narrow bandwidth
US9191198B2 (en)2005-06-162015-11-17Hewlett-Packard Development Company, L.P.Method and device using one-time pad data
US8041032B2 (en)*2005-08-192011-10-18Cardiac Pacemakers, Inc.Symmetric key encryption system with synchronously updating expanded key
US8250363B2 (en)*2005-09-292012-08-21Hewlett-Packard Development Company, L.P.Method of provisioning devices with one-time pad data, device for use in such method, and service usage tracking based on one-time pad data
US8842839B2 (en)*2005-09-292014-09-23Hewlett-Packard Development Company, L.P.Device with multiple one-time pads and method of managing such a device
US7762627B2 (en)*2005-11-022010-07-27Chung Lung ChangHeadrest-mounted entertainment systems
EP1921858A1 (en)*2006-11-092008-05-14Thomson LicensingMethod and device for managing a transmission of keys
EP2001154A1 (en)*2007-06-052008-12-10Nicolas ReffeMethod and device for encryption/decryption of an input data sequence
US8886940B2 (en)*2009-05-292014-11-11Apple Inc.Hash function using a card shuffling process
US8769148B1 (en)*2010-07-302014-07-01Google Inc.Traffic distribution over multiple paths in a network
CN103081397B (en)*2010-08-242015-09-23三菱电机株式会社Encryption device, encryption system, encryption method
MY159284A (en)*2010-10-202016-12-30Mimos BerhadA method for encrypting and decrypting data and a system therefor
CN102609441B (en)*2011-12-272014-06-25中国科学院计算技术研究所Local-sensitive hash high-dimensional indexing method based on distribution entropy
US9673983B2 (en)2012-09-142017-06-06Qualcomm IncorporatedApparatus and method for protecting message data
US9425959B1 (en)*2012-10-032016-08-23Altera CorporationSecurity variable scrambling
US9397830B2 (en)*2012-12-302016-07-19Raymond Richard FelicianoMethod and apparatus for encrypting and decrypting data
US10554399B2 (en)*2012-12-302020-02-04Audacious Designs, LlcMethod and apparatus for encrypting and decrypting data
GB2514428B (en)2013-08-192016-01-13Visa Europe LtdEnabling access to data
US20150244520A1 (en)*2014-02-212015-08-27Safe Frontier LlcOne-time-pad data encryption with media server
CA2983436A1 (en)2015-04-242017-01-197Tunnels, Inc.Random cipher pad cryptography
CN107203365B (en)*2016-03-172020-09-08阿里巴巴集团控股有限公司Random number generation and acquisition method and device
JP2019518397A (en)*2016-06-062019-06-27アジャイルピーキュー, インコーポレイテッド Data conversion system and method
US10728022B2 (en)*2017-12-282020-07-28Fujitsu LimitedSecure hash operations in a trusted execution environment
US11997189B2 (en)*2021-02-262024-05-28International Business Machines CorporationEncrypted communication using counter mode encryption and secret keys
US20240080186A1 (en)*2022-09-072024-03-07Google LlcRandom Trigger for Automatic Key Rotation

Citations (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5295188A (en)*1991-04-041994-03-15Wilson William JPublic key encryption and decryption circuitry and method
US5696828A (en)*1995-09-221997-12-09United Technologies Automotive, Inc.Random number generating system and process based on chaos
US5920900A (en)*1996-12-301999-07-06Cabletron Systems, Inc.Hash-based translation method and apparatus with multiple level collision resolution
US6049612A (en)*1997-03-102000-04-11The Pacid GroupFile encryption method and system
US6169969B1 (en)*1998-08-072001-01-02The United States Of America As Represented By The Director Of The National Security AgencyDevice and method for full-text large-dictionary string matching using n-gram hashing
US6226710B1 (en)*1997-11-142001-05-01Utmc Microelectronic Systems Inc.Content addressable memory (CAM) engine
US6334190B1 (en)*1997-07-152001-12-25Silverbrook Research Pty Ltd.System for the manipulation of secure data
US6785278B1 (en)*1998-12-102004-08-31International Business Machines CorporationMethods, systems and computer program products for hashing address values
US6980521B1 (en)*2000-11-292005-12-27Cisco Technology, Inc.Method and apparatus for per session load balancing with improved load sharing in a packet switched network
US7003107B2 (en)*2000-05-232006-02-21Mainstream EncryptionHybrid stream cipher

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US1310719A (en)1919-07-22Secret signaling system
US1479846A (en)1920-06-231924-01-08American Telephone & TelegraphCiphering device
US4908861A (en)1987-08-281990-03-13International Business Machines CorporationData authentication using modification detection codes based on a public one way encryption function
SE470242B (en)1992-05-121993-12-13Ericsson Telefon Ab L M Device for generating random numbers
US5454039A (en)1993-12-061995-09-26International Business Machines CorporationSoftware-efficient pseudorandom function and the use thereof for encryption
US5623549A (en)*1995-01-301997-04-22Ritter; Terry F.Cipher mechanisms with fencing and balanced block mixing
US5727062A (en)*1995-07-061998-03-10Ritter; Terry F.Variable size block ciphers
US5960086A (en)1995-11-021999-09-28Tri-Strata Security, Inc.Unified end-to-end security methods and systems for operating on insecure networks
US6868495B1 (en)*1996-09-122005-03-15Open Security Solutions, LlcOne-time pad Encryption key Distribution
US6088449A (en)1996-11-052000-07-11Tri-Strata Security, Inc.Tri-signature security architecture systems and methods
US5940002A (en)1997-10-101999-08-17Ut Automotive Dearborn, Inc.Security system with random number remote communication

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5295188A (en)*1991-04-041994-03-15Wilson William JPublic key encryption and decryption circuitry and method
US5696828A (en)*1995-09-221997-12-09United Technologies Automotive, Inc.Random number generating system and process based on chaos
US5920900A (en)*1996-12-301999-07-06Cabletron Systems, Inc.Hash-based translation method and apparatus with multiple level collision resolution
US6049612A (en)*1997-03-102000-04-11The Pacid GroupFile encryption method and system
US6334190B1 (en)*1997-07-152001-12-25Silverbrook Research Pty Ltd.System for the manipulation of secure data
US6226710B1 (en)*1997-11-142001-05-01Utmc Microelectronic Systems Inc.Content addressable memory (CAM) engine
US6169969B1 (en)*1998-08-072001-01-02The United States Of America As Represented By The Director Of The National Security AgencyDevice and method for full-text large-dictionary string matching using n-gram hashing
US6785278B1 (en)*1998-12-102004-08-31International Business Machines CorporationMethods, systems and computer program products for hashing address values
US7003107B2 (en)*2000-05-232006-02-21Mainstream EncryptionHybrid stream cipher
US6980521B1 (en)*2000-11-292005-12-27Cisco Technology, Inc.Method and apparatus for per session load balancing with improved load sharing in a packet switched network

Cited By (20)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8183980B2 (en)2005-08-312012-05-22Assa Abloy AbDevice authentication using a unidirectional protocol
US20070174536A1 (en)*2006-01-252007-07-26Hitachi, Ltd.Storage system and storage control apparatus
US7650462B2 (en)*2006-01-252010-01-19Hitachi, Ltd.Storage system and storage control apparatuses with compression and load balancing
US8358783B2 (en)2008-08-112013-01-22Assa Abloy AbSecure wiegand communications
US8923513B2 (en)2008-08-112014-12-30Assa Abloy AbSecure wiegand communications
US8943562B2 (en)2008-08-112015-01-27Assa Abloy AbSecure Wiegand communications
US20140173238A1 (en)*2012-12-182014-06-19Rambus Inc.Methods and Circuits for Securing Proprietary Memory Transactions
US9465961B2 (en)*2012-12-182016-10-11Rambus Inc.Methods and circuits for securing proprietary memory transactions
WO2017023565A1 (en)*2015-08-052017-02-09TransferSoft, Inc.Symmetric stream cipher
US10452877B2 (en)2016-12-162019-10-22Assa Abloy AbMethods to combine and auto-configure wiegand and RS485
US10277395B2 (en)2017-05-192019-04-30International Business Machines CorporationCryptographic key-generation with application to data deduplication
WO2018211446A1 (en)*2017-05-192018-11-22International Business Machines CorporationCryptographic key-generation with application to data deduplication
GB2576289A (en)*2017-05-192020-02-12IbmCryptographic key-generation with application to data deduplication
GB2576289B (en)*2017-05-192020-08-12IbmCryptographic key-generation with application to data deduplication
US11275603B2 (en)*2017-07-012022-03-15Intel CorporationTechnologies for memory replay prevention using compressive encryption
US20220083366A1 (en)*2017-07-012022-03-17Intel CorporationTechnologies for memory replay prevention using compressive encryption
US11775332B2 (en)*2017-07-012023-10-03Intel CorporationTechnologies for memory replay prevention using compressive encryption
US12386651B2 (en)2017-07-012025-08-12Intel CorporationTechnologies for memory replay prevention using compressive encryption
US11882201B2 (en)*2022-03-302024-01-23Itron, Inc.Data compression techniques for efficient network management
US12316721B2 (en)2022-03-302025-05-27Itron, Inc.Data compression techniques for efficient network management

Also Published As

Publication numberPublication date
WO2003019842A3 (en)2003-10-30
US7197142B2 (en)2007-03-27
AU2002329814A1 (en)2003-03-10
US20030039357A1 (en)2003-02-27
WO2003019842A2 (en)2003-03-06

Similar Documents

PublicationPublication DateTitle
US7197142B2 (en)System and methods for a vernam stream cipher
US7860241B2 (en)Simple universal hash for plaintext aware encryption
US11233628B2 (en)Equivocation augmentation dynamic secrecy system
US8983063B1 (en)Method and system for high throughput blockwise independent encryption/decryption
US8358781B2 (en)Nonlinear feedback mode for block ciphers
US8416947B2 (en)Block cipher using multiplication over a finite field of even characteristic
US5533128A (en)Pseudo-random transposition cipher system and method
US6189095B1 (en)Symmetric block cipher using multiple stages with modified type-1 and type-3 feistel networks
US20090060184A1 (en)Systems and Methods for Providing Autonomous Security
JPH09230787A (en)Encoding method and device therefor
WO2004010638A1 (en)Cryptographic key distribution using key unfolding
Madavi et al.Enhanced cloud security using cryptography and steganography techniques
US6961427B1 (en)Methods and apparatus for keystream generation
Singh et al.Study & analysis of cryptography algorithms: RSA, AES, DES, T-DES, blowfish
CN117725605B (en)Method and system for remotely and automatically compiling electronic archive file information confidentiality
KR100551992B1 (en) Application data encryption and decryption method
Bhat et al.Information Security using Adaptive Multidimensional Playfair Cipher.
EP1232603B1 (en)Methods and apparatus for keystream generation
Toledo et al.Mix-ORAM: Using delegated shuffles.
JPS6281145A (en) Data encryption method
KrzyzanowskiComputer Security
Amro et al.Known-plaintext attack and improvement of PRNG-based text encryption
Carter et al.Symmetric Cryptosystems and Symmetric Key Management
BarniSymmetric Cryptography
HK40017202A (en)Cryptographic systems and methods for extending apparent size of pools of truly random numbers

Legal Events

DateCodeTitleDescription
STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp