UA122327C2 - Nado- криптографія з генераторами ключів - Google Patents

Nado- криптографія з генераторами ключів

Info

Publication number
UA122327C2
UA122327C2 UAA201702158A UAA201702158A UA122327C2 UA 122327 C2 UA122327 C2 UA 122327C2 UA A201702158 A UAA201702158 A UA A201702158A UA A201702158 A UAA201702158 A UA A201702158A UA 122327 C2 UA122327 C2 UA 122327C2
Authority
UA
Ukraine
Prior art keywords
key
cryptography
key generator
generator
derived
Prior art date
Application number
UAA201702158A
Other languages
English (en)
Inventor
Майкл Фіске
Майкл ФИСКЕ
Original Assignee
Фіске Софтваре Ллс
Фиске Софтваре Ллс
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from PCT/US2014/050462 external-priority patent/WO2015023550A1/en
Application filed by Фіске Софтваре Ллс, Фиске Софтваре Ллс filed Critical Фіске Софтваре Ллс
Publication of UA122327C2 publication Critical patent/UA122327C2/uk

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C1/00Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • H04L9/0858Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/24Key scheduling, i.e. generating round keys or sub-keys for block encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • General Physics & Mathematics (AREA)
  • Power Engineering (AREA)
  • Algebra (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Computing Systems (AREA)
  • Mathematical Analysis (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Представлена симетрична криптографія для шифрування і розшифровки інформації яка може бути ефективним чином реалізована апаратним або програмним способом. Симетрична криптографія використовує генератор ключів так, щоб криптографія не залежала від одного статичного криптографічного ключа. Генератор ключів являє собою величину або набір величин, з яких генерується перший ключ. Генератор ключів істотно збільшує обчислювальну складність диференційного криптоаналізу і інших криптографічних атак. В одному з прикладів здійснення винаходу генератор ключів оновлюється з використанням односторонніх функцій, що демонструють лавинний ефект, який створює непередбачувану послідовність ключів, які використовуються в процесі шифрування або розшифрування. В одному з прикладів здійснення винаходу динамічний ключ отримують з генератора ключів за допомогою односторонньої функції хешування. В одному з прикладів здійснення винаходу блоковий шифр використовує різні динамічні ключі для шифрування кожного блока звичайного тексту, де кожен ключ отримують з різного генератора ключів.
UAA201702158A 2014-08-10 2015-09-28 Nado- криптографія з генераторами ключів UA122327C2 (uk)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
PCT/US2014/050462 WO2015023550A1 (en) 2013-08-13 2014-08-10 Nado cryptography using one-way functions
US201462056537P 2014-09-28 2014-09-28
US14/843,999 US20170063530A1 (en) 2013-08-13 2015-09-03 NADO Cryptography with Key Generators
PCT/US2015/052734 WO2016044856A2 (en) 2014-08-10 2015-09-28 Nado cryptography with key generators

Publications (1)

Publication Number Publication Date
UA122327C2 true UA122327C2 (uk) 2020-10-26

Family

ID=55534014

Family Applications (1)

Application Number Title Priority Date Filing Date
UAA201702158A UA122327C2 (uk) 2014-08-10 2015-09-28 Nado- криптографія з генераторами ключів

Country Status (5)

Country Link
US (1) US20170063530A1 (uk)
EP (1) EP3178192A4 (uk)
RU (1) RU2691253C2 (uk)
UA (1) UA122327C2 (uk)
WO (1) WO2016044856A2 (uk)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9235697B2 (en) 2012-03-05 2016-01-12 Biogy, Inc. One-time passcodes with asymmetric keys
US11876889B2 (en) * 2015-09-03 2024-01-16 Fiske Software, Llc NADO cryptography with key generators
WO2018027050A1 (en) 2016-08-04 2018-02-08 Google Llc Encoding and reconstructing inputs using neural networks
CN108830714A (zh) * 2018-05-28 2018-11-16 拜迪网络科技(上海)有限公司 区块链预言机
JP2020048107A (ja) * 2018-09-20 2020-03-26 富士ゼロックス株式会社 データ管理方法、データ管理装置及びデータ管理プログラム
TWI672932B (zh) * 2018-09-27 2019-09-21 國立交通大學 基於質數陣列的後量子非對稱密鑰產生方法及系統、加密方法、解密方法及加密通訊系統
CN109347636B (zh) * 2018-12-05 2021-09-24 中国信息通信研究院 一种密钥恢复方法、***、计算机设备及可读介质
CN111049639B (zh) * 2019-11-01 2022-10-28 浙江理工大学 一种基于fpga的动态数据加解密实现方法
JP2023509977A (ja) * 2020-01-10 2023-03-10 ゼットイーユー・テクノロジーズ・インコーポレイテッド 対称非同期生成的暗号化のための方法
US11238757B2 (en) * 2020-06-11 2022-02-01 Fmr Llc Shifting substitution cipher based efficient vaultless data tokenization apparatuses, methods and systems
US20220385472A1 (en) * 2021-05-26 2022-12-01 Hamid Pishdadian Blockchain Enabled Data Authentication System Using Simulated Quantum Entanglement

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7404080B2 (en) * 2001-04-16 2008-07-22 Bjorn Markus Jakobsson Methods and apparatus for efficient computation of one-way chains in cryptographic applications
US7657033B2 (en) * 2004-12-10 2010-02-02 Fiske Software Llc Cryptography related to keys
RU2329544C2 (ru) * 2006-05-19 2008-07-20 Эдуард Аркадьевич Бардаев Способ адаптивного поточного шифрования и устройство для его осуществления
US8948387B2 (en) * 2008-08-21 2015-02-03 Freescale Semiconductor, Inc. Security key generator
US8942371B2 (en) * 2009-09-03 2015-01-27 Jerzy Henryk Urbanik Method and system for a symmetric block cipher using a plurality of symmetric algorithms
US9235697B2 (en) * 2012-03-05 2016-01-12 Biogy, Inc. One-time passcodes with asymmetric keys

Also Published As

Publication number Publication date
US20170063530A1 (en) 2017-03-02
RU2017107351A (ru) 2018-09-10
RU2691253C2 (ru) 2019-06-11
EP3178192A4 (en) 2017-08-30
EP3178192A2 (en) 2017-06-14
WO2016044856A3 (en) 2016-05-19
RU2017107351A3 (uk) 2018-11-28
WO2016044856A2 (en) 2016-03-24

Similar Documents

Publication Publication Date Title
UA122327C2 (uk) Nado- криптографія з генераторами ключів
MX2016001900A (es) Criptografia nado utilizando funciones unidireccionales.
PH12018501745A1 (en) Personal device security using elliptic curve cryptography for secret sharing
WO2016057086A3 (en) Common modulus rsa key pairs for signature generation and encryption/decryption
EP3068066A3 (en) Private computation on encrypted biometric data using homomorphic encryption
GB2512249A (en) Secure peer discovery and authentication using a shared secret
EP2544400A3 (en) PUF based Cryptographic communication system and cryptographic communication method
WO2018213744A3 (en) REDUCTION OF SENSITIVE DATA COMPROMISE IN A VIRTUAL MACHINE
JP2015524945A5 (uk)
SG11201909664PA (en) Sequence encryption method accompanying adjustable random reconfiguration of key
CN105406969A (zh) 数据加密装置及方法
US20190103957A1 (en) Encryption device, encryption method, decryption device and decryption method
WO2014113132A3 (en) Method for secure symbol comparison
EA201591431A1 (ru) Полупроводниковое устройство для обеспечения безопасности, обладающее свойствами для предотвращения обратного проектирования
JP2014085674A5 (uk)
CN103916248A (zh) 一种全同态加密公钥空间压缩方法
PH12016502362B1 (en) Systems and methods for controlling media distribution
GB201210004D0 (en) Random number distruibution
PH12018500929A1 (en) Method and system for generating ciphertext by pin entry device
EP3618345A4 (en) RE-ENCRYPTED KEY GENERATION DEVICE, RE-ENCRYPTION DEVICE, RE-ENCRYPTED ENCRYPTED TEXT DECRYPTION DEVICE, AND CRYPTOSYSTEM
CN105187418B (zh) 一种弱签名算法
MY159284A (en) A method for encrypting and decrypting data and a system therefor
JP2016525836A5 (uk)
Alshammari Comparison of a chaotic cryptosystem with other cryptography systems
SG10201609449SA (en) System and method for constructing a self-authenticating message using identity-based crytography