H04L9/065

System and Method for Providing Hardware Based Fast and Secure Expansion and Compression Functions
20170359083 · 2017-12-14 · ·

A system and method for encoding data by providing data expansion and compression functions for arbitrary input and output lengths. The input is partitioned into groups of sequential bits. A subkey is selected from secret key material for each group of the input bits. A tree of XOR gates applies XOR operations between the subkeys to generate the output. The XOR gates are arranged in layers and all the XOR gates within a layer switch at about the same time. A compression function is performed if the input length is greater than or equal to the output length and an expansion function is performed if the input length is less than or equal to the output length. There is no statistical correlation between the input and the output. A nonlinear function can be applied to the output such as an invertible S-Box, non-invertible S-Box, or series of Rotate-Add-XOR operations.

COMPUTER-IMPLEMENTED SYSTEM AND METHODS FOR PROVIDING ENCRYPTED PROTECTED DATA
20230195913 · 2023-06-22 ·

A computer implemented method to provide encrypted protected data in response to an unauthorized access request and unencrypted protected data in response to an authorized access request may include the following steps: receiving a first access request for accessing protected data; determining if the first access request identifies the protected data through a specified namespace; and returning an encrypted version of the protected data in response to the first access request if the first access request did not identify the protected data through the specified namespace. Optionally, the method may include the steps of: receiving a second access request to access the protected data; determining if the second access request identifies the protected data through the specified namespace; and returning an unencrypted version of the protected data in response to the second access request only if the second access request identifies the protected data through the specified namespace.

DATA CONVERSION SYSTEMS AND METHODS

In various embodiments, a computer-readable memory medium coupled to a processor is disclosed. The memory medium is configured to store instructions which cause the processor to retrieve a seed value, receive a digital bit stream, receive a digital bit stream, generate a stream of random bits, using the seed value as a seed to a pseudo random number generator (PRNG), wherein the stream of random bits contains at least as many bits as the digital bit stream, shuffle bits of the stream of random bits to create a random bit buffer, generate an obfuscated digital bit stream by applying a first exclusive OR (XOR) to the digital bit stream and the random bit buffer, wherein the obfuscated digital bit stream has the same number of bits as the digital bit stream, and provide the obfuscated digital bit stream to the communications interface.

PRIVACY-PRESERVING STREAM ANALYTICS

Privacy-preserving stream analytics (personal data collection method, apparatus, and/or system) from an electronic (e.g., mobile) device providing communications, such as to a network (e.g., Internet). Data queries from a data analyst are received but not directly answered with a truthful query response. Truthful responses are privatized and anonymized based on a randomized response mechanism which releases privatized data and not the original answer. Anonymously transmitting randomized responses from the data owner to data aggregator using shares, each share of which is individually transmitted to an independent aggregator, which is configured for independently and asynchronously process each share, and sharing results with one another to arrive at a query response over an aggregate number of data owners.

SINGLE PASS PARALLEL ENCRYPTION METHOD AND APPARATUS

Apparatuses, methods and storage medium associated with single pass parallel encryption are disclosed herein. In embodiments, an apparatus for computing may comprise an encryption engine to encrypt a video stream. The encryption engine may comprise a plurality of encryption pipelines to respectively encrypt a plurality of video sub-streams partitioned from the video stream in parallel in a single pass as the video sub-streams are being generated. The plurality of encryption pipelines may use a corresponding plurality of multi-part encryption counters to encrypt the corresponding video sub-streams as the video sub-streams are being generated. Each of the multi-part encryption counters used by one of the encryption pipelines may comprise a sub-portion that remains constant while encoding the corresponding video sub-stream, but the sub-key is unique for the one encryption pipeline, and differs from corresponding sub-portions of the multi-part encryption counters used by the other encryption pipelines. Other embodiments may be disclosed or claimed.

System And Method For Secure Communications And Data Storage Using Multidimensional Encryption
20170346622 · 2017-11-30 ·

An encryption system and method has processors and a memory system, the memory system configured to hold at least one macroblock, an encryption key, and machine-readable instructions for encrypting the macroblock. The instructions include instructions for dividing the macroblock into subblocks by rows and encrypting the rows, for dividing the macroblock into subblocks by columns and encrypting the columns, and for performing a combining cipher of the cipher blocks to produce a final ciphertext of the macroblock. In alternative embodiments, the macroblock is divided in dimensions in addition to rows and columns. In embodiments, ciphertext is chained by using its ciphertext as part of a key for later macroblocks of a sequence, or propagated into later sequences of macroblocks.

Using fusion to reduce encryption in streaming applications

An embodiment includes analyzing data associated with an original flow graph comprising a plurality of operators of a stream computing application, including identifying a secure network connection between a first operator and a second operator that uses encryption. The embodiment fuses the first operator with the second operator such that a first logical function of the first operator is combined with a second logical function of the second operator. The embodiment then generates a modified flow graph as a modification of the original flow graph that combines the first operator and the second operator and lacks encryption between the first operator and the second operator.

ENHANCEMENT OF FLEXIBILITY TO CHANGE STS INDEX/COUNTER FOR IEEE 802.15.4Z
20230180176 · 2023-06-08 ·

A method and apparatus of a first network entity in a wireless communication system is provide. The method and apparatus comprises: identifying at least one set of bit strings to generate a ranging scrambled timestamp sequence (STS); identifying at least one initialization vector (IV) field corresponding to the at least one set of bit strings, wherein the at least one IV field comprises a 4-octet string; generating a ranging STS key and IV information element (RSKI IE) that includes the at least one IV field to convey and align a seed that is used to generate the ranging STS; and transmitting, to a second network entity, the generated RSKI IE for updating the ranging STS of the second network entity.

Systems and methods for performing reverse order cryptographic operations on data streams
09832022 · 2017-11-28 · ·

Integrated circuits may be programmed using configuration data to implement desired custom logic functions. The configuration data may be generated using a logic design system in the form of a configuration bit stream. The logic design system may generate a hash value for the stream by performing multiple hashing operations on the stream in a direction from a trailing end to a leading end of the stream in a reverse direction with respect to the order of the stream. The system may append the generated hash value to the leading end of the stream, may encrypt the hash value, and may provide the stream to an integrated circuit. The integrated circuit may decrypt or otherwise authenticate the hash value, may generate multiple test hash values for the stream and may compare the test hash values to hash values in the stream to determine whether the stream is authentic.

VARIABLE DATA PROTECTION
20220060316 · 2022-02-24 ·

Systems and methods of protecting data in a message for communication from a sender to a receiver, the sender and receiver sharing a secret including splitting the message into a number of ordered message blocks, the order being a proper order such that an aggregation of the blocks in the proper order constitutes the message; generating an encoded indication of a position of the block in the proper order of blocks, the encoding being reversible and based on at least a hash value for the block, a secret shared between the sender and the receiver, and a position of the block in the proper order; communicating the blocks and the encoded indications to the receiver, the blocks being communicated in an order different to the proper order so as to obfuscate the message, such that the blocks can be reassembled by the receiver in the proper order on the basis of the shared secret.