Abstract:
In embodiments, secure compression algorithms are provided that may be employed as a single operation on raw data to produce compressed and encrypted data. In embodiments, the algorithms described herein may be performed using any type of dictionary based encryption. In one embodiment, upon adding a new prefix to a dictionary table, the dictionary table may be permuted to randomize the entries into the table. The randomization may be based upon a permutation value generated by a deterministic pseudo-random generator and/or pseudo-random function. Other embodiments of randomization may be employed to provide secure compression. For example, instead of permuting the entire table upon adding a prefix, the prefix may be randomly added to the table.
Abstract:
Dans un composant électronique, on exécute un calcul cryptographique comprenant une étape d'obtention de points P sur une courbe elliptique vérifiant l'équation suivante : Y 2 + a 1 XY + a 3 Y = X 3 + a 2 X 2 + a 4 + X + a 6 (1) où a 1 , a 2 , a 3 , a 4 et a 6 sont des éléments d'un ensemble A d'éléments; où A est un anneau des entiers modulaires Z/qZ où q est un entier positif produit d'un nombre I de nombres premiers différents strictement supérieurs à 3, I étant un nombre entier supérieur ou égal à 2, ou A est un corps fini Fq avec q puissance d'un nombre entier premier; où X et Y sont les coordonnées des points P et sont des éléments de A. On détermine un paramètre (11), puis, on obtient des coordonnées X et Y d'un point P (13) par application d'une fonction (12) audit paramètre. La fonction d'Euler φ de A vérifie l'équation : φ(A) mod 3 = 1, La fonction est une fonction inversible et déterministe exprimée par une fraction rationnelle en a 1 , a 2 , a 3 , a 4 et a 6 et en ledit paramètre dans A, et atteint au moins un nombre q/4 1 de points P, avec I égal à 1 pour un corps fini F q . Ensuite, on utilise le point P dans une application cryptographique de chiffrement ou de hachage ou de signature ou d'authentification ou d'identification.
Abstract:
A network storage server receives multiple write requests from a set of clients via a network and internally buffers multiple data blocks written by the write requests. At a consistency point, the storage server commits the data blocks to a nonvolatile mass storage facility. The consistency point process includes using a storage operating system in the network storage server to compress the data blocks, encrypt selected data blocks, and store the compressed and (possibly) encrypted data blocks in the nonvolatile mass storage facility. Data blocks can also be fingerprinted in parallel with compression and/or encryption, to facilitate subsequent deduplication. Data blocks can be indexed and classified according to content or attributes of the data. Encryption can be applied at different levels of logical container granularity, where a separate, unique cryptographic key is used for each encrypted data container.
Abstract:
In one exemplary embodiment, a method includes: storing data for a file, organized as blocks, each having a portion of the file (301); and maintaining a skip list for the data (302). The skip list is an ordered tree structure having a root node, internal nodes and leaf nodes. Each leaf node corresponds to a block. Each node has a rank value corresponding to size of a subtree rooted at the node. The skip list employs a hashing scheme. The hash value of the root node and internal nodes is computed from a level of the node, the rank value and an interval between the node and another linked node to the right of or below the node. The hash value of the leaf nodes is computed from a level of the node, the rank value and an interval associated with the node.
Abstract:
This invention discloses a method for authenticating messages in an industrial control system environment where several resource-constrained industrial controllers interact with various entities. Messages are authenticated by concatenating the original message with a tag, generated with the use of a shared secret key between the sender and receiver. This architecture achieves the goals of integrity and availability by using Message Authentication Codes, which are chosen keeping the metrics of speed and security in focus. Further, Replay attacks and Denial of Service attacks are circumvented by using the method and architecture of the present invention
Abstract:
The claimed subject matter relates to architectures and/or mechanisms that can facilitate issuing, embedding and verification of an optical DNA (o-DNA) signature (108, 326, 804 906, or 1108). A first mechanism (102, 302, 902, or 1102) is provided for obtaining a set of manufacturing errors (202 or 802) inherent in an optical media instance (200, 306, 800, or 1106). These errors can be encoded into the o-DNA that can be cryptographically signed with a private key (320), then embedded into the source optical media instance. A second mechanism (908 or 1110) is provided that can decrypt the o-DNA with a public key and compare the authenticated errors to the observed errors to ascertain whether the optical media instance is authentic as opposed to a forgery or counterfeit.
Abstract:
This present invention provides a method for data to be obfuscated in several ways preferably including self encryption and decryption. The data is preferably chunked, renamed, byte or bit swapped, encrypted and compressed through algorithms seeded by elements preferably derived from the data itself so that data holds the key to reversing the processes used and preferably these keys may be recorded for later use.
Abstract:
Methods and apparatus for improved scrambling and/or descrambling of packets in a communications network are described, e.g., improved scrambling/descrambling of MPEG-2 transport stream packets over an Internet Protocol network. Advance Encryption Standard (AES) under cipher block chaining is utilized in scrambling some transport stream packets. Methods and apparatus for computing an initialization vector or vectors used by the AES are also described. The initialization vector can be set to either a constant or a programmable random number. Scrambling methods and apparatus directed to scrambling solitary termination blocks with a reduced size packet payload e.g., less than 128 bits in an MPEG-2 transport stream packet, are also described. Various features are useful for and can be implemented in set-top boxes and IPTV scramblers in the headsets.
Abstract:
A method of operating a telecommunications network comprises performing, at a sending node (20), compression on at least a portion of a header portion of the packet and encryption on at least a portion of the packet in a manner whereby the compression and the encryption are bound to an extent that, at a receiving node (22), verification of decompression and decryption of the packet are interdependent.
Abstract:
L'invention concerne un dispositif et un procédé de hachage cryptographique d'un message M, comportant les étapes suivantes; former une séquence (M1,...Mi,...,Mc) de m-uplets de données M1=(a 1,1 ,....,a 1,m ),..., Mi=(a i,1 ,....,a i,m ),..., Mc=(a c,1 ,....,a c,m ), où m est un entier strictement positif, à partir dudit message M, calculer de manière itérative des p-uplets successifs de sortie V 1 ,...V i ,...,V C , où p est un entier strictement positif, correspondant à ladite séquence (M1, ...Mi,...,Mc) de m-uplets de données en fonction d'au moins un ensemble de polynômes multivariés définis sur un corps fini, et déterminer une valeur de hachage dudit message M en fonction du dernier p-uplet de sortie V c .