摘要:
Die echtzeitfähige quantencomputersichere Verschlüsselung von Daten aller Art ist ein einfaches, in einer Anordnung umgesetztes Chiffrier- und Dechiffrierverfahren. Sie basiert auf bis zu ca. 10 37 x 128Bit- datenblockbezogenen dynamischen zufallsbestimmten Bit(re)permutationen, auf eine echte One-Time-Pad-Verschlüsselung mit bis zu ca. 10 38 x 128Bit- langen dynamischen zufallsbestimmten Blockschlüsseln und auf bis zu ca. 10 37 x128Bit- datendoppelblockbezogenen dynamischen zufallsbestimmten Paket- Bit(re)permutationen. Der hierarchische Aufbau der erfindungsgemäßen Lösung erhöht den Aufwand eines Kryptoangriffes datendoppelblockbezogen auf über 10 850 Kombinationen. Die in Form von zufallsinformationsgesteuerten Look up Tabellen und dynamisch zufallsinformationsgesteuerten bitbezogenen antivalenten und/oder äquivalenten Logikverknüpfungen ausgeführte erfindungsgemäße technische Lösung widersteht gleichzeitig Quantencomputer und klassische kryptoanalytische Angriffe ohne Effizienzverluste.
摘要翻译:所有种类的数据的实时量子计算机安全的加密是一个简单的,反应在排列加密和解密。 它是基于高达约1037 X 128位数据的基于块的动态随机特定位(重新)置换与高达约1038 X 128位长的动态随机特定块密钥真正一次性垫加密和至多约1037 x128Bit-数据双块相关的动态随机某些位分组(重新)排列。 本发明的方案的分层结构增加基于双超过10850的组合中的密码攻击的数据块的成本。 在随机信息驱动的外观表和形式的向上的动态随机信息驱动bitbezogenen非等效和/或等效的逻辑运算进行本发明的技术方案可以承受相同的量子计算机和经典密码分析攻击,而不损失效率。
摘要:
A deterministic blinding method for cipher algorithms that employ key -mixing and substitution (S -box) operations uses a masking table (MASK[0] to MASK [63] ) constructed with a true mask (MASK[0] ) and a plurality of dummy masks corresponding to every possible S-box input. Each mask is applied in the key -mixing operation (e.g., bitwise XOR) to the cipher key (K) or to round subkeys (K1 to K16) to generate true and dummy keys or subkeys that are applied to the data blocks (DATA) within the overall cipher algorithm or within individual cipher rounds. The mask values prevent side-channel statistical analyses from determining the true from the dummy keys or subkeys. The true mask is identifiable to the cipher but not by external observers.
摘要:
To authenticate a user of a communications network, credentials from the user are centrally receiving. An authentication sequence is retrieved from a plurality of retrievable authentication sequences, and the retrieved authentication sequence is performed to authenticate the user based on the received credentials.
摘要:
An interpretive garment marking system and method allows for one or more garments to be used to convey messages or information, or otherwise provide forms of interaction with a first group of humans. Conveyance and interaction with the first group is done without conveyance and interaction with a second different group of humans even though the humans of both groups have substantially similar access to visually perceive the garments. Implementations include encryption, keying, camouflage, authentication, masking, selection, signing, manipulation, and/or combination.
摘要:
A technique for automatic cryptography uses a status table as a lookup table to convert an incoming bit flow, bit by bit, into an outgoing bit flow. The device performing the cryptography is in a different status for the conversion of each bit. The status table is generated through random number generation and includes, for each possible value of the status, new values to which the status is to be reset depending on whether the incoming bit is "1" or "0" and a value of the outgoing bit for that status. Each incoming bit is converted in the following manner. The status is determined and then reset using the status table and the value of the incoming bit. Then the value of the outgoing bit corresponding to the new status is read out.
摘要:
An apparatus for operating a cryptographic engine (58) may include a key generation module (60) for creating key pairs (66) for encrypting substantive content to be shared between two users over a secured or unsecured communication link. The key generation module (60) may include a point-modification module (70) as part of an elliptic curve module (74) for creating and processing keys (68). The point-modification module (70) preferably employs a point-halving algorithm for creating and processing keys (68) but may also employ any one or a combination of a variety of other algorithms. Hash functions (78) may be used to further process ephemeral secrets or ephemeral keys that may be used for transactions, sessions, or other comparatively short time increments of communication. The keys generated by the key generation module (60) may be configured to be processable by an encryption system for divulging independently to two independent parties a secret to be shared by the two independent parties. A point-halving algorithm may be provided to reduce the operation count of a cryptographic process.
摘要:
User device (12) classes are established in a communications network (100). An access point (10) utilizes a first password to create an encryption key, then generates a plurality of secondary passwords for use by devices (12). User device (12) classes are established by assigning a secondary password to a respective class of users, determining the network access permitted the class, determining the network services provided to the class and finally assigning the secondary password to a device (12') seeking to communicate within the network (100).
摘要:
The round number (R) is set to zero (100), then the round number (R) is incremented by one (102). The plaintext data (104) is subjected to a variable permutation (106). An entry is selected from the permutation table memory (108) and a value is selected from the Mask table memory (110) to conduct the variable permutation (106). Then, a choice component (C) is equated with round number (R). Next, a first variable key addition operation (114) is carried out on the data employing a key from the key table memory (116) and a value from the Mask table memory (110). In the next step (118), the choice component (C) is set to a value one greater than the round number (R). The following step (120) determines if choice component (C) is equal to 11. If the choice component (C) is equal to 11, then the choice component (C) is set equal to 1 and another variable key addition is performed (122). Otherwise, a variable key addition is performed immediately (122).
摘要:
One embodiment described herein provides a system and method for distributing quantum keys between first and second applications running on first and second client devices, respectively. During operation, a first application running on the first client device can transmit a first key request to a first quantum-key-management (QKM) module managing a first set of quantum keys, and transmit a notification to the second application running on the second client device, the notification prompting the second application to transmit a second key request to a second QKM module managing a second set of quantum keys. The first application can receive, from the first QKM module, a first quantum key based on the first key request, in response to the first QKM module determining that the second application receives a second quantum key based on the second key request.