Matches 1 - 50 out of 74 1 2 >


Match Document Document Title
US20100329451 Cipher Implementation  
At least one of a keystream and a message authentication code are generated with a partial KASUMI block cipher, without utilizing a full KASUMI block cipher.
US20110280396 System and Method for Dynamically Allocating Stream Identifiers in a Multi-Encryption Transport System  
The present invention is suitable for use in a multi-encrypted system that dynamically allocates stream identifiers in a secondary overlay stream depending upon the identifiers in a primary...
US20060204115 Video encoding  
The invention relates to a video encoding apparatus (100) comprising a video analysis processor (101) and a video encoder (103). The video analysis processor (101) comprises a segmentation...
US20060193472 Secure encryption system, device and method  
A system, device and method for encrypting plaintext information securely. The system includes a transmitting agent to generate and synchronize a first cipher stream using the plaintext...
US20090063694 Multimedia Access Device, Multimedia Playing System Comprising the Multimedia Access Device, and Multimedia Data Playing Method  
A multimedia access device, a multimedia playing system comprising the multimedia access device, and a multimedia data playing method are provided. The multimedia playing system comprises a portal...
US20070230690 System for write failure recovery  
When cipher block chaining encryption/decryption is employed, write fault recovery is accomplished by storing information useful for the writing of cipher block chaining processed data before it...
US20060182275 Method for inserting synchronization markers into a video stream, compatible with a block cipher  
A method inserts synchronization markers into a standardized stream of compressed and ciphered data, wherein at least one part of the compressed data stream is ciphered bit by bit, by block...
US20070195952 Method And System For Computational Transformation  
The invention generally relates to computational transformation process, which has applications in cryptography, random number generation, hash code generation etc. The computational...
US20110026155 PATTERNED-MEDIA MAGNETIC RECORDING DISK WITH CRYPTOGRAPHICALLY SCRAMBLED PATTERNS AND DISK DRIVE OPERABLE WITH THE DISK  
Patterned-media magnetic recording disks are made from a master template that has nondata regions that contain a pattern of one or more discrete nondata islands and discrete gaps, with the pattern...
US20050147244 Method for cryptographic transformation of binary data blocks  
A method for cryptographic transformation of a binary data block comprising the steps splitting said data block into N≧2 sub-blocks, alternately converting said sub-blocks by the operations...
US20100228965 SYSTEM AND METHOD FOR USING A STREAMING PROTOCOL  
An initialization vector (IV) is employed to decrypt a block of a stream that has been encrypted with Cypher Block Chaining (CBC) encryption, without requiring decryption of previous blocks within...
US20070098156 Digital rights management  
A method for allocating to a device a license to use digital content, the method comprising the steps of: receiving a first block of ciphertext from the device; decrypting the first block of...
US20070217602 Method for fast quotient guess and congruencies manipulation  
A processor-executed computational method especially for use in cryptographic systems quickly determines a polynomial quotient under specific conditions. For a polynomial modulus f(x), a maximum...
US20070195951 Pipeline for high-throughput encrypt functions  
A method and network device to process network data is described. The method may comprise receiving the network data and security operation data at a security engine. The security operation data...
US20120250856 Method And System For Encryption With Bidirectional Difference Propagation  
An encryption method is disclosed, including two passes over a sequence of N input digital data X1, . . . XN blocks where the first pass executes iterative linear algebraic operations from the...
US20070106907 Method and device for encryption and decryption on the fly  
A method for protecting a datum, wherein the datum is encrypted and, prior to sending the datum to a recipient, the datum is divided into at least a first block and a second block. The method...
US20090257583 CIPHER FEEDBACK WITH VARIABLE BLOCK CHAINING  
Some embodiments of a method and apparatus for encrypting and decrypting data have been presented. In one embodiment, a current initialization vector (IV) is generated based on a previous block of...
US20050201556 Trick play of encrypted data in a conditional access signal  
An incoming data stream contains a stream of encrypted data and a stream of messages. Data in successive segments of the stream of encrypted data is decryptable with successive decryption...
US20100158243 METHOD OF ENCRYPTION IN NETWORKED EMBEDDED SYSTEMS  
A data encryption method includes providing a sender node having information to transmit. The information is divided into a sequence of frames. A respective one of a plurality of frame numbers is...
US20060159263 Scrambled state display method of broadcasting signal  
A scrambled state display method of a broadcasting signal is disclosed whereby discrimination is made as to whether cable TV broadcasting signal is a scrambled A/V stream and it is displayed on a...
US20070104325 Apparatus and method of detecting steganography in digital data  
Disclosed is a method of detecting stego data by determining whether a secret message is hidden in digital data. A method of detecting according to the invention includes extracting at least one...
US20100111298 BLOCK CIPHER DECRYPTION APPARATUS AND METHOD  
An apparatus and method obtains cipher block chaining mode (CBC) ciphertext blocks that were encrypted using a cipher block chaining encryption method, such a audio or video, and decrypts the CBC...
US20050141705 Verification method of mobile communication system  
A security verification method of a mobile communication system is provided. The method includes: (1) a first key and a second key are generated and stored in a first processor and a second...
US20100111297 FORMAT-PRESERVING CRYPTOGRAPHIC SYSTEMS  
Format-preserving encryption and decryption processes are provided. The encryption and decryption processes may use a block cipher. A string that is to be encrypted or decrypted may be converted...
US20060045264 Prevention of side channel attacks against block cipher implementations and other cryptographic systems  
Methods and apparatuses are disclosed for improving DES and other cryptographic protocols against external monitoring attacks by reducing the amount (and signal-to-noise ratio) of useful...
US20070286416 Implementation of AES encryption circuitry with CCM  
Circuitry for encrypting at least a part of an input data flow and generating a tag based on the input data flow with the same ciphering algorithm and the same key, the algorithm including...
US20060098818 Encryption technique for asynchronous control commands and data  
A method of transmitting information from a primary storage control unit to a secondary storage control unit in an asynchronous data copying system. The method includes building multiple...
US20070286415 AES encryption circuitry with CCM  
Circuitry for encrypting at least a part of an input data flow and generating a tag based on the input data flow with the same ciphering algorithm and the same key including a first ciphering...
US20090080648 CONTROLLED CRYPTOPERIOD TIMING TO REDUCE DECODER PROCESSING LOAD  
Systems and methods are disclosed for enabling encryptor devices to provide real-time messages having offset cryptoperiods according to an offset algorithm within common crypto-sync pulse...
US20050025312 Distribution of encrypted information  
A secure device capable of selectively enabling decryption of units of information is used to provide access to a stream of units of encrypted information. Each unit is linked to a time-stamp. An...
US20070064933 Method of symmetric key data encryption  
A method of symmetric key encryption involves using a composition of transformations leading to an enhanced homophonic substitution, wherein the mapping of characters varies depending on the...
US20070092076 Initialization method and termination method for scrambling transport stream  
The present invention provides a system, method and apparatus for encrypting/decrypting plain data/cipher text having lengths not equal to a multiple of a data chunk of a block cipher algorithm....
US20070177728 ARIA encryption/decryption apparatus and method, and method of generating initialization key for the same  
Disclosed is an Academy, Research Institute, and Agency (ARIA) encryption/decryption apparatus for encrypting and decrypting input data by repeating a plurality of rounds. The ARIA...
US20070237326 Computer System and Computer Program Executing Encryption or Decryption  
A computer system having resistance to timing attacks based on measuring processing times is offered. The computer system encrypts or decrypts a plain text or ciphertext via a process of...
US20100142076 PATTERNED-MEDIA MAGNETIC RECORDING DISK WITH CRYPTOGRAPHICALLY SCRAMBLED PATTERNS AND DISK DRIVE OPERABLE WITH THE DISK  
Patterned-media magnetic recording disks are made from a master template that has nondata regions that contain a pattern of one or more discrete nondata islands and discrete gaps, with the pattern...
US20070098157 Using code as keys for copy protection  
A method for obscuring data and software including the steps of (A) generating code for performing a predefined operation using one or more sets of predefined data, (B) generating a first binary...
US20060227965 Locally interative encryption generating compliant ciphertext for general syntax specifications  
A fast and secure syntax compliant encryption schema, “locally iterative encryption,” can produce compliant ciphertext for a general syntax specification. In one implementation, an engine...
US20090279697 CIPHERTEXT KEY CHAINING  
Some embodiments of a method and apparatus for encrypting and decrypting data have been presented. In one embodiment, a current key is generated from a prior ciphertext block and another key,...
US20050021990 Method for making secure a secret quantity  
The invention concerns a method and a system for making secure a secret quantity, contained in an electronic device, and used at least partly in an encryption algorithm of at least part of an...
US20050047592 Single-round enciphering apparatus and method using a reduced number of elements in a mobile communication system  
An enciphering apparatus and method divide an input bit stream with length 2n into first and second sub-bit streams with length n, perform an enciphering procedure, and output an enciphered bit...
US20070253548 Data protection system, method, and program  
The data dividing unit divides data into n pieces. An encoding unit generates m pieces of encoded data composed of a set of a bitmap matrix specifying a plurality pieces of divided data for...
US20060165232 Method and apparatus to encrypt video data streams  
A method and system for encrypting a video data stream, the video data stream partitioned into units based upon a type of data contained within the units. The method comprising: determining for...
US20110091035 HARDWARE KASUMI CYPHER WITH HYBRID SOFTWARE INTERFACE  
A system including a memory; a software interface, operatively connected to the memory, and configured to generate a modified version of a confidentially key (CKey), and a modified version of an...
US20100067687 METHOD AND APPARATUS FOR MAINTAINING DATA INTEGRITY FOR BLOCK-ENCRYPTION ALGORITHMS  
A method is disclosed for modifying an iterated block cipher by controlling the operations and transformations that cause diffusion. In one embodiment which is applicable to any iterated block...
US20060291648 Steam control device, stream encryption/decryption device, and stream encryption/decryption method  
The present invention provides a stream control device. The device includes a plurality of data processors that sequentially implement processing for stream data. The unit data of processing in...
US20060269055 Method and apparatus for improving performance and security of DES-CBC encryption algorithm  
Method and apparatus for transforming data in a data processing system. A first portion of a block of data is transformed using a first key having a first number of bits, and a second portion of...
US20070147604 Integrated circuit having advanced encryption standard core and wrapper for validating advanced encryption standard core  
Disclosed is an integrated circuit having an encryption core. The integrated circuit includes an encoder configured to encrypt an input plaintext using a first cipher key to produce a ciphertext,...
US20070110225 Method and apparatus for efficient encryption  
Methods and apparatuses are provided for accelerating the throughput and or reducing the power consumption of symmetric cryptography algorithms. Certain computations of a symmetric encryption or...
US20070140496 Escrow compatible key generation  
A method of managing encryption keys creates a new encryption key as a predictable and retrospectively repeatable function of a current encryption key. Information is then encrypted or...
US20070189523 Method and system for a ciphering interface with list processing  
A method and system for ciphering interface with list processing is described. Various aspects of a system for ciphering interface with list processing may include a cipher module that enables...

Matches 1 - 50 out of 74 1 2 >