Abstract:
A method and apparatus of a device that stores an object on a plurality of storage servers is described. In an exemplary embodiment, the device receives an object to be stored and encrypts the object with a first key. The device further creates a plurality of bit vectors from the encrypted object. In addition, the device randomizes the plurality of bit vectors to generate a plurality of randomized bit vectors. Furthermore, the device sends the plurality of randomized bit vectors and the plurality of second keys to the plurality of storage servers, wherein each of the plurality of storage servers stores at least one each of the plurality of randomized bit vectors and the plurality of second keys.
Abstract:
Disclosed in some examples are methods, systems, and machine readable media for encrypting return addresses with a cryptographic key. The call and return operations may be changed to incorporate an XOR operation on the return address with the cryptographic key. Upon calling a function, the return address may be XORed with the key which encrypts the return address. The encrypted return address may then be placed upon the stack. Upon returning from the function, the return address may be retrieved from the stack and XORed with the cryptographic key which then decrypts the return address. The processor may then return control to the address indicated by the unencrypted return address. This method makes modifications of the return address useless as an attack vector because the result of modifying the return address will be unpredictable to the attacker as a result of the XOR operation done on the return address.
Abstract:
본 발명의 일 실시예에 따른 통신 객체와 연결되는 암복호화 장치는 기 설정된 복수 개의 키를 저장하는 키 저장부와, 상기 키 저장부로부터 상기 복수 개의 키 중 어느 하나인 제1 키를 전달받으며, 상기 전달받은 제1 키를 기초로 데이터를 암호화하는 처리부와, 상기 통신 객체로부터 암호화될 데이터를 전달받으며, 상기 전달받은 데이터를 상기 처리부에 전달하고, 상기 처리부에 전달한 데이터가 상기 제1 키를 기초로 상기 처리부에 의하여 암호화되면 상기 암호화된 데이터를 상기 처리부로부터 전달받으며, 상기 처리부로부터 전달받은 암호화된 데이터를 상기 통신 객체로 전달하는 데이터 포트부와, 상기 암복호화 장치를 타 암복호화 장치와 물리적으로 연결시키는 연결부를 포함하며, 상기 복수 개의 키는 상기 연결부가 상기 타 암복호화 장치에 포함된 연결부와 연결되면 생성된다.
Abstract:
A method (30) of establishing a key related to at least two network instances (Slice 1, Slice 2) is disclosed performed in a network node (11; 12). The network instances (Slice 1, Slice 2) are used in serving a communication device (14). The method (30) comprises obtaining (31) a first key (K eNB1 ; K ASME1 ) relating to at least a first network instance (Slice 1); obtaining (32) a second key (K eNB2 ; K ASME2 ) relating to an additional network instance (Slice 2); determining (33), based on the first key (K eNB1 ; K ASME1 ) and the second key (K eNB2 ; K ASME2 ), a joint key (K eNB_joint ; K ASME_joint ) for use in protecting communication with the communication device (14) on the at least first network instance (Slice 1) and on the additional network instance (Slice 2). A method (40) in a communication device (14), network node (11; 12), communication device (14), computer programs and computer program products are also disclosed.
Abstract translation:公开了一种在网络节点(11; 12)中执行的建立与至少两个网络实例(切片1,切片2)有关的密钥的方法(30)。 网络实例(片1,片2)用于服务通信设备(14)。 所述方法(30)包括:获得(31)与至少第一网络实例(切片1)相关的第一密钥(K eNB1; K ASME1); 获得(32)与另外的网络实例(切片2)有关的第二密钥(K eNB2; K ASME2)。 基于所述第一密钥(K eNB1; K ASME1)和所述第二密钥(K eNB2; K)来确定(33) ASME2 sub>),用于保护与所述至少第一网络实例(14)上的通信设备(14)的通信的联合密钥(K eNB_joint_KMEME_joint) (切片1)和附加网络实例(切片2)。 还公开了通信设备(14),网络节点(11; 12),通信设备(14),计算机程序和计算机程序产品中的方法(40)。 p>
Abstract:
A method, an apparatus, and a computer program product for symmetric stream encryption are provided. An encryption chain is obtained from a real random number generator (RRNG) and stored in memory. A vector key is identified based on numbers obtained from a fast, large period pseudo-random number generator. A set of encryption keys are identified from the encryption chain using the vector key. Strings of clear text are encrypted using the encryption keys.
Abstract:
Methods, systems, and computer programs for generating cryptographic function parameters are described. In some examples, a solution to a puzzle is obtained. A pseudorandom generator is seeded based on the solution. After seeding the pseudorandom generator, an output from the pseudorandom generator is obtained. A parameter for a cryptographic function is generated. The parameter is generated from the output from the pseudorandom generator.
Abstract:
A method of encoding and encrypting input data (D1) to generate corresponding encoded and encrypted data (E2) is provided. The input data (D1) is encoded to generate intermediate encoded data streams. The intermediate encoded data streams include at least one critical data stream that is critical and essential for subsequent decoding of one or more remaining data streams of the intermediate encoded data streams. The at least one critical data stream is encrypted using one or more encryption algorithms to generate at least one intermediate encrypted data stream. Subsequently, unencrypted portions of the intermediate encoded data streams are merged together with the at least one intermediate encrypted data stream to generate the encoded and encrypted data (E2).
Abstract:
A method of encoding and encrypting input data (D1) to generate corresponding encoded and encrypted data (E2) is provided. At least a first data block of the input data (D1) is encoded to generate a first encoded data block. The at least first encoded data block is then encrypted using at least one key to provide a first encoded and encrypted data block for inclusion in the encoded and encrypted data (E2). Moreover, a first seed value is generated for use in encrypting a next encoded data block to provide a next encoded and encrypted data block for inclusion in the encoded and encrypted data (E2). Furthernnore, a next seed value is generated for use in encrypting a subsequent encoded data block, in a sequential repetitive manner until each data block of the input data (D1) is encoded and encrypted into the encoded and encrypted data (E2).
Abstract:
Die Erfindung betrifft ein Verfahren und eine Vorrichtung zur Verschlüsselung von Rohdaten, wobei eine Verschlüsselungsmaschine (200) umfassend eine Transformationseinheit (213) herangezogen wird, die abhängig von ihrem inneren Zustand eine Verschlüsselungsart in Form einer Transformationsvorschrift (g i ) bestimmt, wobei die einzelnen Bytes (b i ) der Rohdaten durch verschiedene eineindeutige Transformationsvorschriften (g i ) verschlüsselt werden, wobei die Transformationseinheit (213) vorab in einen von einem Passwort (W 0 ) abhängigen Initialzustand gebracht wird, und ein der Verschlüsselungsmaschine (200) zugehöriger deterministischer Zufallszahlengenerator (212) abhängig vom Passwort (W 0 ) ebenfalls in einen Initialzustand gebracht wird. Erfindungsgemäß ist vorgesehen, dass der innere Zustand der Transformationseinheit (213) sowie der innere Zustand des Zufallszahlengenerators (212) nach einer Anzahl von Verschlüsselungen von Bytes, insbesondere nach der Verschlüsselung jedes Bytes, abhängig vom jeweils zu verschlüsselnden Rohdaten-Byte und/oder vom jeweiligen Endergebnis der Verschlüsselung geändert und aktualisiert wird und dieser neue innere Zustand der jeweils nächsten Verschlüsselung zugrunde gelegt wird.
Abstract:
A Hardware-Embedded Delay PUF (HELP) leverages entropy by monitoring path stability and measuring path delays from core logic macros. HELP incorporates techniques to deal with bias. A unique feature of HELP is that it may compare data measured from different test structures. HELP may be implemented in existing FPGA platforms. HELP may leverage both path stability and within-die variations as sources of entropy.