WO2009015979A3 - Method, computerized device and computer program for efficient and low power encrypting or decrypting of data - Google Patents
Method, computerized device and computer program for efficient and low power encrypting or decrypting of data Download PDFInfo
- Publication number
- WO2009015979A3 WO2009015979A3 PCT/EP2008/058572 EP2008058572W WO2009015979A3 WO 2009015979 A3 WO2009015979 A3 WO 2009015979A3 EP 2008058572 W EP2008058572 W EP 2008058572W WO 2009015979 A3 WO2009015979 A3 WO 2009015979A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- encrypting
- decrypting
- data
- efficient
- computer program
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
- H04L9/0656—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
- H04L9/0662—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/26—Testing cryptographic entity, e.g. testing integrity of encryption key or encryption algorithm
Abstract
The present invention relates to the field of computer data encrypting and decrypting, especially for mobile equipments like PDA, mobile phones, smart cards and the like, which need a good trade-off between computing speed, power consumption and security strength. The invention provides an encrypting/decrypting method implementing simple data operation. This method is based on generating a pseudo-random sequence through a function of the Collatz (or Syracuse) family from a starting number used as a secret key. Binary words of a secret length, extracted from the plain data, are encrypted into a sequence of encrypted numbers representing the offsets of these words whithin the binary form of the pseudo-random sequence.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP08785907A EP2176985A2 (en) | 2007-08-02 | 2008-07-03 | Method, computerized device and computer program for efficient and low power encrypting or decrypting of data |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP07113715 | 2007-08-02 | ||
EP07113715.2 | 2007-08-02 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2009015979A2 WO2009015979A2 (en) | 2009-02-05 |
WO2009015979A3 true WO2009015979A3 (en) | 2009-04-02 |
Family
ID=40220018
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2008/058572 WO2009015979A2 (en) | 2007-08-02 | 2008-07-03 | Method, computerized device and computer program for efficient and low power encrypting or decrypting of data |
Country Status (3)
Country | Link |
---|---|
US (1) | US8130956B2 (en) |
EP (1) | EP2176985A2 (en) |
WO (1) | WO2009015979A2 (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8175265B2 (en) | 2008-09-02 | 2012-05-08 | Apple Inc. | Systems and methods for implementing block cipher algorithms on attacker-controlled systems |
FR2974207B1 (en) * | 2011-04-14 | 2013-05-24 | In Webo Technologies | METHOD AND SYSTEM FOR SECURING A SOFTWARE |
US20130108038A1 (en) * | 2011-11-01 | 2013-05-02 | Apple Inc. | System and method for a collatz based hash function |
US8873750B2 (en) * | 2013-03-14 | 2014-10-28 | International Business Machines Corporation | Instruction for performing a pseudorandom number generate operation |
CN112818046B (en) * | 2021-01-25 | 2022-09-30 | 同济大学 | Non-space-time data transformation collection processing system and method based on rail traffic cloud control |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2003104969A2 (en) * | 2002-06-06 | 2003-12-18 | Cryptico A/S | Method for improving unpredictability of output of pseudo-random number generators |
US20050063539A1 (en) * | 2003-09-18 | 2005-03-24 | Langin-Hooper Jerry Joe | Prime-number-based method and apparatus for generating random numbers |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US660442A (en) * | 1900-03-09 | 1900-10-23 | Frederic Eugene Ives | Photochromoscopic apparatus. |
US6122379A (en) | 1996-05-30 | 2000-09-19 | Deloitte & Touche Inc. | Method and apparatus for performing simultaneous data compression and encryption |
US6668325B1 (en) * | 1997-06-09 | 2003-12-23 | Intertrust Technologies | Obfuscation techniques for enhancing software security |
US6760442B1 (en) | 1998-12-18 | 2004-07-06 | Sun Microsystems, Inc. | Method and apparatus for adjusting the quality of digital media |
EP1161811B1 (en) | 1999-03-22 | 2007-08-29 | Agency for Science, Technology and Research | Method and apparatus for encrypting and decrypting data |
CA2329889A1 (en) | 2000-12-29 | 2002-06-29 | Barbir Abdulkader | Encryption during modulation of signals |
-
2008
- 2008-06-12 US US12/137,900 patent/US8130956B2/en not_active Expired - Fee Related
- 2008-07-03 EP EP08785907A patent/EP2176985A2/en not_active Withdrawn
- 2008-07-03 WO PCT/EP2008/058572 patent/WO2009015979A2/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2003104969A2 (en) * | 2002-06-06 | 2003-12-18 | Cryptico A/S | Method for improving unpredictability of output of pseudo-random number generators |
US20050063539A1 (en) * | 2003-09-18 | 2005-03-24 | Langin-Hooper Jerry Joe | Prime-number-based method and apparatus for generating random numbers |
Non-Patent Citations (1)
Title |
---|
ANDREI ET AL.: "ABOUT THE COLLATZ CONJECTURE", ACTA INFORMATICA, vol. 35, no. 2, 1998, pages 167 - 179, XP002511411 * |
Also Published As
Publication number | Publication date |
---|---|
WO2009015979A2 (en) | 2009-02-05 |
US20090060190A1 (en) | 2009-03-05 |
US8130956B2 (en) | 2012-03-06 |
EP2176985A2 (en) | 2010-04-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Alanazi et al. | New comparative study between DES, 3DES and AES within nine factors | |
WO2008076861A3 (en) | Combinational combiner cryptographic method | |
WO2010026561A3 (en) | An appliance, system, method and corresponding software components for encrypting and processing data | |
WO2010024874A3 (en) | Message authentication code pre-computation with applications to secure memory | |
WO2008146482A1 (en) | Encryption device, decryption device, encryption method, and integrated circuit | |
TW200618572A (en) | Tokens/keys for wireless communications | |
WO2009134937A3 (en) | Format-preserving cryptographic systems | |
WO2008147577A3 (en) | Portable data encryption device with configurable security functionality and method for file encryption | |
WO2006045038A3 (en) | Enciphering method | |
TNSN07055A1 (en) | Permutation data transform to enhance security | |
MX336828B (en) | Key sharing device and system for configuration thereof. | |
ATE440336T1 (en) | METHOD FOR PROTECTING IC CARDS AGAINST PERFORMANCE ANALYSIS ATTACKS | |
ATE472133T1 (en) | DECRYPTION PROCEDURE | |
WO2009015979A3 (en) | Method, computerized device and computer program for efficient and low power encrypting or decrypting of data | |
WO2006023334A3 (en) | Permutation data transform to enhance security | |
Ali et al. | Enhancing security of vigenere cipher by stream cipher | |
CN102710413A (en) | System and method with function of DPA/SPA (Differential Power Analysis/Simple Power Analysis) attack prevention | |
MY159284A (en) | A method for encrypting and decrypting data and a system therefor | |
US20160241387A1 (en) | System and method for manipulating both the plaintext and ciphertext of an encryption process prior to dissemination to an intended recipient | |
CN103501220A (en) | Encryption method and device | |
US9135834B2 (en) | Apparatus and method to prevent side channel power attacks in advanced encryption standard using floating point operation | |
MX2009011831A (en) | Method of authentication and electronic device for performing the authentication. | |
Bulygin et al. | Study of the invariant coset attack on printcipher: more weak keys with practical key recovery | |
Som et al. | A simple algebraic model based polyalphabetic substitution cipher | |
US9160523B2 (en) | Apparatus and method to prevent side channel power attacks in advanced encryption standard |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08785907 Country of ref document: EP Kind code of ref document: A2 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2008785907 Country of ref document: EP |