Abstract:
Systems and methods for security in a nationwide wireless network with geographically dispersed wireless routers are described. The wireless routers have an interface function with an ability to receive telephone calls from an authorized caller. The router, in response and on demand generates a set of bounded random numbers (BRN) as a random seed for use in generation of encryption keys for communication security between the router and a portable wireless device of the caller.
Abstract:
Apparatus and methods are provided for defending an electronic circuit secret algorithm and secret parameter values against a side-attack. In an example, a method can include receiving first one or more parameters for altering a clock signal of the electronic device at a non-volatile memory register, and altering a frequency of the clock signal of the electronic device during execution of an authentication routine according to the first one or more parameters.
Abstract:
A cryptographic key split combiner includes a plurality of key split generators adapted to generate cryptographic key splits, a key split randomizer adapted to randomize the cryptographic key splits to produce a cryptographic key, and a digital signature generator. Each of the key split generators is adapted to generate key splits from seed data. The digital signature generator is adapted to generate a digital signature based on the cryptographic key. The digital signature generator can also be adapted to generate the digital signature based on a credential value. A process for forming cryptographic keys includes generating a plurality of cryptographic key splits from seed data. The cryptographic key splits are randomized to produce a cryptographic key. A digital signature is generated based on the cryptographic key. Generating a digital signature based on the cryptographic key can include generating the digital signature based on a credential value.
Abstract:
Tables are defined to permit output masking for table look-ups to be carried out to resist power analysis attacks on cryptographic operations. A set of individually defined random values is used to mask each entry in a substitution table, defining a masked substitution table. A mask table is also defined such that the values of each entry, masked with the corresponding random value, is the value of a fixed mask. The masked substitution tables and the mask tables may be used in cryptographic operations to permit the output of table look-ups to be masked, without directly using the fixed mask value in the computations of the cryptographic operations.
Abstract:
The present invention is a user verification method and a user verification system, in which a password derivation pattern for each user is pre-registered into a verification server, and when a user is to use the system, the verification server generates a presented pattern and presents this to the user, the user inputs a password corresponding to the user's own password derivation pattern for the presented pattern, the verification server performs verification of the inputted password based on the presented pattern and the user's own password derivation pattern that was registered, and a verification result is then notified to the usage target system.
Abstract:
In a method for the secure, distributed generation of an encryption key for a cryptographic method, where the encryption key, as well as a public key are generated using deterministic methods from a large random number (seed), the seed (S) is generated on the user side by consulting variables known only to the user, and a public key (V) that is transmitted in advance from the trust center. Generation information suitable for generating the seed and, on the basis of which, the seed is able to be derived deterministically from the trust center, by consulting information known only to the center, is produced on the user side, and transmitted to the trust center to create the seed in parallel.
Abstract:
A seed value making method and device for a PRNG (Pseudo Random Number Generator) are provided. The seed value making method includes the steps of: accumulating in memory units of a First Data Pool data from various external sources, analyzing the data to determine a source type, computing entropy estimations for each of the external sources basing on the source type as determined, and generating a seed value by using the entropy estimations and the data accumulated in the memory units of the First Data Pool. Accordingly, in generating a seed value, dynamic estimation of random sources rate, and classification of sources on slow and fast ones, and reliable and unreliable ones, can be provided, and also, seed values can be made with taking in account rate and reliability of the sources.
Abstract:
Methods and apparatus for securely streaming multimedia packets, such as RTP packets, are disclosed, in which the payloads of the packets are shuffled. This reordering is performed using a shuffling function that depends on sequence numbers associated with each of the packets, a pre-determined group size N, and a pre-determined initialization value; in some embodiments this shuffling function comprises a cryptographic hashing function or other one-way function. A receiving device may reverse the shuffling, using a similar shuffling function, if the pre-determined group size N and the pre-determined initialization value are known.
Abstract:
Some embodiments of a method and apparatus for encrypting and decrypting data have been presented. In one embodiment, a stream cipher is run in parallel with a block cipher to output a stream of bits with a length equal to a number of ciphertext blocks in an output stream of the block cipher. The method may further include pre-processing a current plaintext block based on the stream of bits and the number of ciphertext blocks in the output stream of the block cipher. Then the block cipher may encipher the pre-processed block to generate a current ciphertext block.
Abstract:
A stream stretcher is provided for securely expanding a key stream to match fee length of a data block to be encrypted and/or decrypted. A key stream is obtained having a length of LZ bits. A length LD corresponding, to a data block to be encrypted/decrypted is obtained, where LD>LZ. LD−LZ new bits are recursively generated by combining at least two bits of the key stream. The LD−LZ new bits are appended to the key stream to generate a stretched key stream. The data block may then be encrypted/decrypted with the stretched key stream. The at least two bits are selected to have offsets that form a full positive difference set.
Abstract translation:提供流担架,用于安全地扩展密钥流以匹配要加密和/或解密的数据块的费用长度。 获得具有长度为L个Z位的密钥流。 获得与要加密/解密的数据块相对应的长度L SUB D,其中L D D Z L。 通过组合密钥流的至少两个比特来递归地生成新比特。 新的比特被添加到密钥流中以产生延伸的密钥流。 然后可以用拉伸的密钥流对数据块进行加密/解密。 选择至少两个位以具有形成完全正差分集的偏移。