Method of enabling manual selection of all possible attributes of encryption

    公开(公告)号:US11917048B2

    公开(公告)日:2024-02-27

    申请号:US16170070

    申请日:2018-10-25

    IPC分类号: H04L9/06 H04L9/08

    摘要: A method which is obtained specifically by output oriented coding, making possible the maximum selection of encryption parameters used for encryption by systems using OpenSSL, however without compromising the integrity of the encryption by autogenerating some Attributes thereby making possible row wise encryption in a database and encoding (if encoding is required) on the database side. The method has to satisfy the conditions/restrictions mentioned herein [0054]. This Invention is related to today's information technology and communicating methodology where encryptions and encodings are being used. The present invention can be described as software that enables a method of encryption acting as an Enhanced security feature or a technique which will enable users to manually or automatically select encryption parameters thereby encrypting and securing data. The primary reason for development of this method is to enable the users to have control over their encryption settings or parameters increasing the privacy and security. The invention method or technique is nothing but making sure that user is in control of encryption attributes, Methods, Techniques depending on the security levels required for encryption rather than a program controlling them, but assisting the User.

    Cryptographic data communication apparatus

    公开(公告)号:US11909855B2

    公开(公告)日:2024-02-20

    申请号:US18075460

    申请日:2022-12-06

    IPC分类号: H04L9/06 H04L9/08 H04L9/32

    摘要: In one embodiment, data communication apparatus includes packet processing circuitry to receive data from a memory responsively to a data transfer request, and cryptographically process the received data in units of data blocks using a block cipher so as to add corresponding cryptographically processed data blocks to a sequence of data packets, the sequence including respective ones of the cryptographically processed data blocks having block boundaries that are not aligned with payload boundaries of respective one of the packets, such that respective ones of the cryptographically processed data blocks are divided into two respective segments, which are contained in successive respective ones of the packets in the sequence, and a network interface which includes one or more ports for connection to a packet data network and is configured to send the sequence of data packets to a remote device over the packet data network via the one or more ports.

    Systems and methods for preventing side-channel attacks

    公开(公告)号:US11791978B2

    公开(公告)日:2023-10-17

    申请号:US17270259

    申请日:2019-08-29

    发明人: Moinuddin Qureshi

    摘要: Disclosed herein is a method of accessing a cache, the method comprising: mapping respective physical line addresses (PLAs) of a plurality of PLAs to respective cache locations of a plurality of cache locations in a cache, each PLA of the plurality of PLAs having an associated memory line; encrypting, with a block cipher using a first key, a first PLA of the plurality of PLAs to provide a first encrypted line address (ELA), the first ELA having an associated first encrypted cache location; upon receiving a request to access a first memory line associated with the first PLA, encrypting, using the first key, the first PLA into the first ELA to determine the associated first encrypted cache location; and accessing the first encrypted cache location. Also disclosed herein are systems for implementing the same.

    ALTERNATIVE REPRESENTATION OF THE CRYPTO-ALGORITHM DES

    公开(公告)号:US20180309568A1

    公开(公告)日:2018-10-25

    申请号:US15771157

    申请日:2016-10-28

    IPC分类号: H04L9/06 H04L9/00

    摘要: A processor device has an executable implementation of the cryptographic algorithm DES implemented with an XOR linkage operation at the round exit and an implemented computation step S arranged to map expanded right input values r′ as computation step entry values x=r′ onto exit values s=S[x]. The computation step S is implemented as a key-dependent computation step further comprises a key linkage operation for linking input values of the round with key values of the round derived directly or indirectly from the key. The computation step S is implemented as a combined key-dependent computation step T which further comprises: a permutation operation P associated with the round, arranged to be applied to exit values s of the computation step S and to supply the exit values s of the computation step in permutated form to the XOR linkage operation at the round exit.