[go: up one dir, main page]

GB2386523B - Symmetric key cryptosystem - Google Patents

Symmetric key cryptosystem

Info

Publication number
GB2386523B
GB2386523B GB0206094A GB0206094A GB2386523B GB 2386523 B GB2386523 B GB 2386523B GB 0206094 A GB0206094 A GB 0206094A GB 0206094 A GB0206094 A GB 0206094A GB 2386523 B GB2386523 B GB 2386523B
Authority
GB
United Kingdom
Prior art keywords
key
data
algorithm
confidentiality
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
GB0206094A
Other versions
GB0206094D0 (en
GB2386523A (en
Inventor
Samual James Golightly
Stuart James Kennedy
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ETERNITY LICENSING Ltd
Original Assignee
ETERNITY LICENSING Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ETERNITY LICENSING Ltd filed Critical ETERNITY LICENSING Ltd
Priority to GB0206094A priority Critical patent/GB2386523B/en
Publication of GB0206094D0 publication Critical patent/GB0206094D0/en
Publication of GB2386523A publication Critical patent/GB2386523A/en
Application granted granted Critical
Publication of GB2386523B publication Critical patent/GB2386523B/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0637Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/08Randomization, e.g. dummy operations or using noise
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

A symmetric (shared key) key encryption system which encodes message data using an algorithm, a secret key(1) and a random initial message(5) and a matching decryption system which decodes encrypted data using an algorithm and the same secret key(1). The system uses an irreversible function and a random initial message(5) to obscure the key(1) from cryptographic analysis, resulting in a system with a high level of data confidentiality at the same time as low resource utilisation and high speed operation. Confidentiality is further enhanced by the essentially linear relationship between key length and the product of resource utilisation and processing time per unit message data, allowing the system architect to select a longer key length without disproportionate increase in complexity or power consumption or decrease in speed.
GB0206094A 2002-03-15 2002-03-15 Symmetric key cryptosystem Expired - Fee Related GB2386523B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB0206094A GB2386523B (en) 2002-03-15 2002-03-15 Symmetric key cryptosystem

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0206094A GB2386523B (en) 2002-03-15 2002-03-15 Symmetric key cryptosystem

Publications (3)

Publication Number Publication Date
GB0206094D0 GB0206094D0 (en) 2002-04-24
GB2386523A GB2386523A (en) 2003-09-17
GB2386523B true GB2386523B (en) 2005-02-23

Family

ID=9933012

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0206094A Expired - Fee Related GB2386523B (en) 2002-03-15 2002-03-15 Symmetric key cryptosystem

Country Status (1)

Country Link
GB (1) GB2386523B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200708027A (en) * 2005-04-29 2007-02-16 Sean O'neil Process of and apparatus for hashing
EP2553622B1 (en) 2010-03-31 2020-10-21 British Telecommunications public limited company Secure data recorder

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
http://www.cs.tau.ac.il/ïah/Notes/N2.pdf, "Encryption and Randomness", Secure Communication and Commerce with Cryptography, Chapter 4, Amir Herzberg, 11/12/2001 *
http://www.item.uni-bremen.de/research/papers/paper.pdf/Andreas.Schubert/icecs99/icecs99.pdf, "Efficient VLSI implementatern symmertric block ciphers", Schubert and Anheier, 23/12/1999 *

Also Published As

Publication number Publication date
GB0206094D0 (en) 2002-04-24
GB2386523A (en) 2003-09-17

Similar Documents

Publication Publication Date Title
CN110650010B (en) Method, device and device for generating and using private key in an asymmetric key
Vanstone Next generation security for wireless: elliptic curve cryptography
Bisht et al. A comparative study of some symmetric and asymmetric key cryptography algorithms
TW200618572A (en) Tokens/keys for wireless communications
TW375721B (en) DES chip processor capable of executing data encryption standard (DES) operation
Tayde et al. File Encryption Decryption using AES algorithm in android phone
Olutola et al. Comparative analysis of encryption algorithms
WO2001056221A3 (en) Block encryption method and schemes for data confidentiality and integrity protection
WO2003030447A3 (en) An encryption device, a decrypting device, a secret key generation device,a copyright protection system and a cipher communication device
KR920005645A (en) Information processing device with replaceable hermetic element
EP1154348A9 (en) File management apparatus
SG111191A1 (en) Use of isogenies for design of cryptosystems
BRPI0700267A (en) method of communication between a router and a host, router for communicating with a host, and host for communicating with a router
WO2001084766A3 (en) System and method for encryption using transparent keys
Idrizi et al. Analyzing the speed of combined cryptographic algorithms with secret and public key
WO2005099150A3 (en) Public key cryptographic methods and systems
Mandal et al. Analysis of avalanche effect in plaintext of des using binary codes
Gandhi et al. A study on current scenario of audio encryption
Sekar et al. Comparative study of encryption algorithm over big data in cloud systems
NZ506002A (en) Encryption processing for streaming media by assigning tag value, creating packet key, encrypting data and adding tag value
Kaur A Review on Symmetric Key Cryptography Algorithms.
KR970056124A (en) Differential Factor Cryptography Method and System
GB2386523B (en) Symmetric key cryptosystem
WO2004064011A3 (en) Method of constructing hyperelliptic curves suitable for cryptographic purposes and cryptographic apparatus using such a method
Verma et al. Simulation-Based Comparative Analysis Of Symmetric Algorithms.

Legal Events

Date Code Title Description
PCNP Patent ceased through non-payment of renewal fee

Effective date: 20090315