H04L2209/20

PROCESSOR WITH A HASH CRYPTOGRAPHIC ALGORITHM AND DATA PROCESSING THEREOF
20230066718 · 2023-03-02 ·

A processor with a Hash cryptographic algorithm and a data processing method are shown. In response to one single Hash cryptographic instruction of an instruction set architecture, the processor reads a first storage space within a system memory to obtain an input message of a limited length, and processes the input message in accordance with the Hash cryptographic algorithm to generate a final Hash value of a specific length.

Method and devices for creating redundancy and encryption using Mojette Transform
11664976 · 2023-05-30 · ·

A method for hyper security encoding includes receiving data to be encrypted, and padding the data to be encrypted with padding data to avoid un-obfuscated bits after encryption. The method also includes encrypting, with a Mojette Transform, the data to be encrypted after the data to be encrypted is padded with the padding data, and outputting a result of the encryption as encrypted data.

SECURE ENCRYPTION OF PARTIAL BLOCKS
20230111001 · 2023-04-13 ·

Encrypting data blocks by receiving blocks of compressed data, determining a size, in bytes, of the compressed data, appending a trailer to the compressed data, the trailer associated with the size in bytes of the compressed data, encrypting the compressed data and trailer, yielding encrypted data, where a header of the encrypted data comprises a number of complete encrypted data blocks, and providing the encrypted data to a user.

FORMAT PRESERVING ENCRYPTION (FPE) SYSTEM AND METHOD FOR LONG STRINGS
20230113150 · 2023-04-13 ·

A format-preserving Just Encrypt 1 (JE1) system and method provides significant performance advantages over known FPE methods for longer character strings due to the technical improvements.

Message padding for bit-oriented and bit-reversed input messages

Systems, methods, and computer-readable media are disclosed for performing message padding of input messages in a manner that preserves the integrity of the input data regardless of whether the input message is in a bit-oriented format or a bit-reversed format. Each byte of a partial input message block of an input message may be converted from a bit-reversed format to a bit-oriented format prior to performing message padding in order to ensure that input data bits are not lost during the message padding. Subsequent to the message padding that generates one or more padded message blocks, the padded message block(s) may be converted from a bit-oriented format to a bit-reversed format to enable further processing of the input message to be performed to obtain a message digest.

Microprocessor with secure execution mode and store key instructions

A microprocessor conditionally grants a request to switch from a normal execution mode in which encrypted instructions cannot be executed, into a secure execution mode (SEM). Thereafter, the microprocessor executes a plurality of instructions, including a store-key instruction to write a set of one or more cryptographic key values into a secure memory of the microprocessor. After fetching an encrypted program from an instruction cache, the microprocessor decrypts the encrypted program into plaintext instructions using decryption logic within the microprocessor's instruction-processing pipeline.

Message processing using extended output functions

Systems, methods, and computer-readable media are disclosed for processing and message padding an input message as well as processing an extended output message (EOM) in a manner that ensures that the input message and the padded message are processed only a single time, thus avoiding generation of an incorrect message digest. In addition, in those scenarios in which multiple padded message blocks are generated, the disclosed systems, methods, and computer-readable media ensure that all of the padded message blocks are processed.

Method for transmitting encrypted packets in a communication network
11258581 · 2022-02-22 · ·

A method is provided for transmitting encrypted packets from a first node to a second node of a communication network. The first node pads each plaintext packet with a respective padding content. The padded plaintext packets are then encrypted and transmitted to the second node. For each plaintext packet, the first node randomly selects the padding size in a range comprised between a minimum padding size and a maximum padding size. If the size of a plaintext packet is lower than a predefined minimum packet size, the minimum padding size is set equal to the difference between predefined minimum packet size and the plaintext packet size.

DATA ENCRYPTION
20170288861 · 2017-10-05 ·

In some examples, applying a first encryption process to input data blocks for encrypted data blocks, applying a deduplication process to the encrypted data blocks for chunks and first hashes, applying a deduplication process to the hashes for a first set of deduplicated hashes and sending it to destination computer. If there are missing data blocks at the computer based on the first set of deduplicated hashes: receiving a second set of deduplicated hashes of the missing data blocks, selecting chunks from the input data blocks of the missing data blocks from the second set of deduplicated hashes, applying a second encryption process to selected chunks for encrypted data chunks, and applying a third encryption process to the first hashes for first encrypted hashes.

Preventing statistical inference attacks on data that is shared among multiple stakeholders with disjoint access privileges

According to one embodiment, a method, computer system, and computer program product for preventing statistical inference attacks is provided. The present invention may include splitting records into items, and classifying these items into shared items and private items; grouping the private items according to privacy and confidentiality requirements; restricting access of the private items to stakeholders based on the confidentiality requirements using cryptographic keys; generating and encrypting one or more placeholders for both existent and non-existent stakeholders; storing private items in private storage as indicated by links; creating shared records comprising links, placeholders, and shared items; adding integrity signatures to the shared records; and publishing the shared records to a shared medium.