Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

50 results about "Cryptographic primitive" patented technology

Cryptographic primitives are well-established, low-level cryptographic algorithms that are frequently used to build cryptographic protocols for computer security systems. These routines include, but are not limited to, one-way hash functions and encryption functions.

Block encryption method and schemes for data confidentiality and integrity protection

A block encryption method and schemes (modes of operation) that provide both data confidentiality and integrity with a single cryptographic primitive and a single processing pass over the input plaintext string by using a non-cryptographic Manipulation Detection Code function for secure data communication over insecure channels and for secure data storage on insecure media. The present invention allows, in a further aspect, software and hardware implementations, and use in high-performance and low-power applications, and low-power, low-cost hardware devices. The block encryption method and schemes of this invention allow, in yet a further aspect, encryption and decryption in parallel or pipelined manners in addition to sequential operation. In a yet further aspect, the block encryption method and schemes of this invention are suitable for real-time applications.
Owner:VDG

Method and apparatus for time-lapse cryptography

According to one aspect, provided is a construction and specification for an implementation of a new cryptographic primitive, “Time-Lapse Cryptography”, with which a sender can encrypt a message so that it is guaranteed to be revealed at an exact moment in the future, even if this revelation turns out to be undesirable to the sender. In one embodiment, a Time-Lapse Cryptography Service is provided (“the Service”) based on a network of parties. Senders encrypt their messages with this public key whose secret key is not known to anyone—not even a trusted third party—until a predefined and specific future time T+δ, at which point the secret key is constructed and published. In one example, the secret key can only be known after it is constructed. At or after that time, anyone can decrypt the cipher text using this secret key. Other embodiments describe other applications of such a service, for example, one embodiment is used in sealed bid auctions, others in insider stock sales, clinical trials, and electronic voting, among a variety of possible implementations. In one embodiment, a method for cryptographic encoding is provided, including generation of cryptographic key components by a plurality of parties, where participation of the parties is verified. A public key is constructed from a plurality of key components,
Owner:PRESIDENT & FELLOWS OF HARVARD COLLEGE

Cryptographic techniques for a communications network

Techniques are described for enabling authentication and / or key agreement between communications network stations and service networks. The techniques described include the negotiation and use of a cryptographic primitive shared between a service network and a home environment of a station. The techniques described also feature a key usage indicator, such as a sequence number, maintained by the service network and a station. Comparison of the key usage indicators can, for example, permit efficient authentication of the service network.
Owner:VERIZON LAB

Constructions of variable input length cryptographic primitives for high efficiency and high security

A hash function is applied to a prefix of a VIL input. The output is added to a suffix of the input. A block cipher is applied to results of the addition. An encryption function is performed on the prefix. The final output is the output of the block cipher and the encryption function. In a second encryption technique, a hash function is applied to an input, and the output of the hash function has first and second portions. A block cipher is applied to the second portion. The output of the block cipher is added to the first portion, and a second function is applied to the result of this first addition. The output of the second function is added to the second portion. An inverse hash function is then applied to the output of the first and second additions, creating an encrypted output.
Owner:ALCATEL-LUCENT USA INC

Systems and methods for preventing transmitted cryptographic parameters from compromising privacy

A method for secure cryptographic communication comprises transmitting information that identifies a group key from a first device to a second device. The method further comprises, in the first device, using the group key to encrypt an input vector, transmitting the encrypted input vector, encrypting privacy-sensitive information using a device key, an encryption algorithm, and the input vector, and transmitting the encrypted privacy-sensitive information to the second device.
Owner:SMART COSMOS SOLUTIONS INC

All-photon cryptographic primitive preparation method based on high-throughput perovskite micro-single crystal array

The invention relates to the technical field of perovskite single-crystal photoelectric devices, in particular to an all-photon cryptographic primitive preparation method based on a high-flux perovskite micro-single-crystal array. The method comprises the following steps of: regulating and controlling the atmosphere of a high-flux micro-droplet evaporation recrystallization solvent to control the environment humidity and the temperature of a hot plate; and by means of a solution method, successfully achieving one-step evaporation self-assembly on a patterned array substrate, so as to efficiently prepare the shape-controllable high-flux perovskite nanorod single crystal array. Laser emission information and characteristics of the crystal array are collected and successfully applied to establishment of the all-photon cryptographic primitive PUF, and encryption and decryption of encrypted transmission information are achieved. The excellent chemical/structural stability of the high-flux all-inorganic perovskite single crystal dot matrix provides innate advantages for stable formation and reading of the password primitive, the preparation method is simple, the operation is flexible, and the high-flux perovskite single crystal array is certainly promoted to enter a new step in the application of the all-photon password primitive.
Owner:SHANGHAI UNIV

Method for preparing cryptographic primitive based on perovskite crystal and application thereof

The invention relates to a method for preparing cryptographic primitives based on perovskite crystals and application thereof, and the method comprises the steps that different chips with component segregation perovskite crystals are prepared, the fluorescence emission spectrum of a target array on the perovskite crystal chips is scanned and read, according to the number of emission peaks of the target array, array patterns are divided into four types: one emission peak, two emission peaks, three emission peaks, and four or more emission peaks, and the coding rules that the pattern of one emission peak is 00, the pattern of two emission peaks is 01, the pattern of three emission peaks is 10, and the pattern of four or more emission peaks is 11 are set; all patterns on the target array are converted into a binary coding array composed of 0 and 1, namely cryptographic primitives of the target array are formed, and the cryptographic primitives can be used for constructing a computer cryptographic security system. The method for preparing the password primitives based on the perovskite crystals has the technical effects of being high in randomness, unclonable, rapid in coding and capable of being produced on a large scale at low cost.
Owner:SHANGHAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products