Permutation data transform to enhance security
    1.
    发明授权
    Permutation data transform to enhance security 有权
    置换数据转换以增强安全性

    公开(公告)号:US08077861B2

    公开(公告)日:2011-12-13

    申请号:US10918717

    申请日:2004-08-12

    CPC classification number: H04L9/0631 H04L9/0643 H04L9/0861 H04L2209/20

    Abstract: A data input is divided into two segments; the second segment is also divided into groups. Bits in the first segment are used to control the application of permutation functions to bit groups in the second segment. The transformed data is assembled from the first segment and the permuted groups of the second segment. This data transformation can be applied in combination with a key derivation algorithm, a key wrapping algorithm, or an encryption algorithm to enhance the security of these other applications.

    Abstract translation: 数据输入分为两段; 第二部分也分为两组。 第一段中的位用于控制第二段中的位组的置换函数的应用。 经变换的数据从第一段和第二段的置换组组装。 该数据转换可以与密钥推导算法,密钥包装算法或加密算法结合使用,以增强这些其他应用的安全性。

    KEY DERIVATION FUNCTIONS TO ENHANCE SECURITY
    2.
    发明申请
    KEY DERIVATION FUNCTIONS TO ENHANCE SECURITY 有权
    提升安全性的主要衍生功能

    公开(公告)号:US20090262943A1

    公开(公告)日:2009-10-22

    申请号:US12492060

    申请日:2009-06-25

    CPC classification number: H04L9/0861

    Abstract: Key derivation algorithms are disclosed. In one key derivation application, a segment of the master key is hashed. Two numbers of derived from another segment of the master key. A universal hash function, using the two numbers, is applied to the result of the hash, from which bits are selected as the derived key. In another embodiment, an encoded counter is combined with segments of the master key. The result is then hashed, from which bits are selected as the derived key.

    Abstract translation: 公开了关键推导算法。 在一个密钥推导应用中,主密钥的一个段被散列。 两个数字从主键的另一个段导出。 使用两个数字的通用散列函数应用于散列的结果,从中选择位作为派生密钥。 在另一个实施例中,编码计数器与主密钥的段组合。 然后将结果散列,从中选择位作为派生密钥。

    Key derivation functions to enhance security
    3.
    发明授权
    Key derivation functions to enhance security 有权
    关键推导功能,以增强安全性

    公开(公告)号:US07577250B2

    公开(公告)日:2009-08-18

    申请号:US10918718

    申请日:2004-08-12

    CPC classification number: H04L9/0861

    Abstract: Key derivation algorithms are disclosed. In one key derivation application, a segment of the master key is hashed. Two numbers of derived from another segment of the master key. A universal hash function, using the two numbers, is applied to the result of the hash, from which bits are selected as the derived key. In another embodiment, an encoded counter is combined with segments of the master key. The result is then hashed, from which bits are selected as the derived key.

    Abstract translation: 公开了关键推导算法。 在一个密钥推导应用中,主密钥的一个段被散列。 两个数字从主键的另一个段导出。 使用两个数字的通用散列函数应用于散列的结果,从中选择位作为派生密钥。 在另一个实施例中,编码计数器与主密钥的段组合。 然后将结果散列,从中选择位作为派生密钥。

    Exponential data transform to enhance security
    4.
    发明授权
    Exponential data transform to enhance security 有权
    指数数据转换以增强安全性

    公开(公告)号:US07564970B2

    公开(公告)日:2009-07-21

    申请号:US10918103

    申请日:2004-08-12

    CPC classification number: H04L9/0631 H04L9/302

    Abstract: A data input is divided into two segments. The second segment is raised to a power of a function of the first segment, the power being relatively prime to a function of a predefined modulus. The modulus is then applied to the result. The transformed data is assembled from the first segment and the remainder modulo the modulus. This data transformation can be applied in combination with a key derivation algorithm, a key wrapping algorithm, or an encryption algorithm to enhance the security of these other applications.

    Abstract translation: 数据输入分为两段。 第二段被提升为第一段的功能的功率,功率相对于预定义模量的函数而起作用。 然后将模量应用于结果。 经变换的数据从第一段组装,其余模数模数。 该数据转换可以与密钥推导算法,密钥包装算法或加密算法结合使用,以增强这些其他应用的安全性。

    Exponential data transform to enhance security
    5.
    发明授权
    Exponential data transform to enhance security 有权
    指数数据转换以增强安全性

    公开(公告)号:US08737608B2

    公开(公告)日:2014-05-27

    申请号:US13410807

    申请日:2012-03-02

    CPC classification number: H04L9/0861

    Abstract: A data input is divided into two segments. The second segment is raised to a power of a function of the first segment, the power being relatively prime to a function of a predefined modulus. The modulus is then applied to the result. The transformed data is assembled from the first segment and the remainder modulo the modulus. This data transformation can be applied in combination with a key derivation algorithm, a key wrapping algorithm, or an encryption algorithm to enhance the security of these other applications.

    Abstract translation: 数据输入分为两段。 第二段被提升为第一段的功能的功率,功率相对于预定义模量的函数而起作用。 然后将模量应用于结果。 经变换的数据从第一段组装,其余模数模数。 该数据转换可以与密钥推导算法,密钥包装算法或加密算法结合使用,以增强这些其他应用的安全性。

    Key derivation functions to enhance security
    6.
    发明授权
    Key derivation functions to enhance security 有权
    关键推导功能,以增强安全性

    公开(公告)号:US08155310B2

    公开(公告)日:2012-04-10

    申请号:US12492060

    申请日:2009-06-25

    CPC classification number: H04L9/0861

    Abstract: Key derivation algorithms are disclosed. In one key derivation application, a segment of the master key is hashed. Two numbers of derived from another segment of the master key. A universal hash function, using the two numbers, is applied to the result of the hash, from which bits are selected as the derived key. In another embodiment, an encoded counter is combined with segments of the master key. The result is then hashed, from which bits are selected as the derived key.

    Abstract translation: 公开了关键推导算法。 在一个密钥推导应用中,主密钥的一个段被散列。 两个数字从主键的另一个段导出。 使用两个数字的通用散列函数应用于散列的结果,从中选择位作为派生密钥。 在另一个实施例中,编码计数器与主密钥的段组合。 然后将结果散列,从中选择位作为派生密钥。

    KEY DERIVATION FUNCTIONS TO ENHANCE SECURITY
    7.
    发明申请
    KEY DERIVATION FUNCTIONS TO ENHANCE SECURITY 有权
    提升安全性的主要衍生功能

    公开(公告)号:US20120163591A1

    公开(公告)日:2012-06-28

    申请号:US13410807

    申请日:2012-03-02

    CPC classification number: H04L9/0861

    Abstract: A data input is divided into two segments. The second segment is raised to a power of a function of the first segment, the power being relatively prime to a function of a predefined modulus. The modulus is then applied to the result. The transformed data is assembled from the first segment and the remainder modulo the modulus. This data transformation can be applied in combination with a key derivation algorithm, a key wrapping algorithm, or an encryption algorithm to enhance the security of these other applications.

    Abstract translation: 数据输入分为两段。 第二段被提升为第一段的功能的功率,功率相对于预定义模量的函数而起作用。 然后将模量应用于结果。 经变换的数据从第一段组装,其余模数模数。 该数据转换可以与密钥推导算法,密钥包装算法或加密算法结合使用,以增强这些其他应用的安全性。

Patent Agency Ranking