SG11202110786SA - Cryptographic systems - Google Patents
Cryptographic systemsInfo
- Publication number
- SG11202110786SA SG11202110786SA SG11202110786SA SG11202110786SA SG11202110786SA SG 11202110786S A SG11202110786S A SG 11202110786SA SG 11202110786S A SG11202110786S A SG 11202110786SA SG 11202110786S A SG11202110786S A SG 11202110786SA SG 11202110786S A SG11202110786S A SG 11202110786SA
- Authority
- SG
- Singapore
- Prior art keywords
- cryptographic systems
- cryptographic
- systems
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0877—Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/24—Key scheduling, i.e. generating round keys or sub-keys for block encryption
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Algebra (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
NZ75221019 | 2019-03-29 | ||
PCT/IB2020/053032 WO2020201997A1 (en) | 2019-03-29 | 2020-03-30 | Cryptographic systems |
Publications (1)
Publication Number | Publication Date |
---|---|
SG11202110786SA true SG11202110786SA (en) | 2021-10-28 |
Family
ID=72667098
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11202110786SA SG11202110786SA (en) | 2019-03-29 | 2020-03-30 | Cryptographic systems |
Country Status (9)
Country | Link |
---|---|
US (1) | US20220086000A1 (en) |
EP (1) | EP3949252A4 (en) |
JP (1) | JP2022531538A (en) |
KR (1) | KR20210143846A (en) |
CN (1) | CN113924571A (en) |
AU (1) | AU2020251008A1 (en) |
CA (1) | CA3133947A1 (en) |
SG (1) | SG11202110786SA (en) |
WO (1) | WO2020201997A1 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117527267B (en) * | 2024-01-08 | 2024-04-19 | 南湖实验室 | Method and system for controlling remote data based on secret calculation |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7007170B2 (en) * | 2003-03-18 | 2006-02-28 | Widevine Technologies, Inc. | System, method, and apparatus for securely providing content viewable on a secure device |
GB2436668B (en) * | 2006-03-28 | 2011-03-16 | Identum Ltd | Electronic data communication system |
US8607358B1 (en) * | 2010-05-18 | 2013-12-10 | Google Inc. | Storing encrypted objects |
US9164926B2 (en) * | 2012-11-22 | 2015-10-20 | Tianjin Sursen Investment Co., Ltd. | Security control method of network storage |
US20150213433A1 (en) * | 2014-01-28 | 2015-07-30 | Apple Inc. | Secure provisioning of credentials on an electronic device using elliptic curve cryptography |
EP3860041B1 (en) * | 2014-06-18 | 2023-03-15 | Visa International Service Association | Efficient methods for authenticated communication |
US10169587B1 (en) * | 2018-04-27 | 2019-01-01 | John A. Nix | Hosted device provisioning protocol with servers and a networked initiator |
-
2020
- 2020-03-30 EP EP20783685.9A patent/EP3949252A4/en active Pending
- 2020-03-30 KR KR1020217034139A patent/KR20210143846A/en active Search and Examination
- 2020-03-30 US US17/436,030 patent/US20220086000A1/en active Pending
- 2020-03-30 AU AU2020251008A patent/AU2020251008A1/en active Pending
- 2020-03-30 JP JP2021556782A patent/JP2022531538A/en active Pending
- 2020-03-30 CA CA3133947A patent/CA3133947A1/en active Pending
- 2020-03-30 CN CN202080019673.5A patent/CN113924571A/en active Pending
- 2020-03-30 WO PCT/IB2020/053032 patent/WO2020201997A1/en active Search and Examination
- 2020-03-30 SG SG11202110786SA patent/SG11202110786SA/en unknown
Also Published As
Publication number | Publication date |
---|---|
KR20210143846A (en) | 2021-11-29 |
EP3949252A1 (en) | 2022-02-09 |
CN113924571A (en) | 2022-01-11 |
EP3949252A4 (en) | 2022-12-21 |
WO2020201997A1 (en) | 2020-10-08 |
AU2020251008A1 (en) | 2021-07-29 |
JP2022531538A (en) | 2022-07-07 |
US20220086000A1 (en) | 2022-03-17 |
CA3133947A1 (en) | 2020-10-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG11202100791UA (en) | Cross-blockchain interaction systems | |
GB2597191B (en) | Product-display system | |
GB201806508D0 (en) | Systems | |
GB201810294D0 (en) | Cybe defence system | |
IL286570A (en) | System | |
GB201913016D0 (en) | Elctrical systems | |
GB201811807D0 (en) | Encryption system | |
PL3911968T3 (en) | Locating system | |
GB202109370D0 (en) | Vehivle system | |
IL278066B (en) | Photovoltaic-electrochemical (pv-ec) system | |
SG11202111516UA (en) | Event system | |
GB202114885D0 (en) | Earphone systems | |
SG11202112164VA (en) | Novel lower-trolley system | |
SG11202110786SA (en) | Cryptographic systems | |
EP4085145A4 (en) | Guided excision-transposition systems | |
EP3924957C0 (en) | Cloth-tensioning system | |
GB2580512B (en) | System | |
GB201818482D0 (en) | Anti-drone system | |
DK3767166T3 (en) | Optisk system | |
SG11202011630VA (en) | Shoulder-massaging system | |
GB201917537D0 (en) | E-marking system | |
GB201916999D0 (en) | System | |
GB201913941D0 (en) | Aeroslo provision systems | |
GB201910371D0 (en) | Threadlocking system | |
GB201903687D0 (en) | Flowtech system |