首页 / 技术领域 / 密码学 / 专利数据
序号 专利名 申请号 申请日 公开(公告)号 公开(公告)日 发明人
241 타원곡선 암호화 기반 센서노드 불법 위조 탐지 시스템 KR1020110109613 2011-10-26 KR101302639B1 2013-09-03 강태헌
본 발명은 센서 노드의 제어 코드와 ID, 라우팅 테이블과 같은 중요 데이터를 불법적으로 수정한 경우 이를 모니터링 센터에서 주기적으로 감지하여 공격 여부를 검출하고, 이에 따른 대책을 수립하도록 불법 수정 공격에 대한 효과적인 검출이 가능한 타원곡선 암호화 기반 센서노드 불법 위조 탐지 시스템에 관한 것으로,
본 발명에 따른 센서노드 불법 위조 탐지 시스템은 설치 장소의 상태를 감지하거나 미리 지정된 제어동작을 수행하며, 타원곡선 암호화 방법에 의해 외부 송출 정보를 암호화하는 복수의 센서노드; 상기 센서노드로부터 감지 정보를 제공받거나, 상기 제어동작을 위한 명령을 제공하는 관리서버; 상기 센서노드와 상기 관리서버를 연결하는 게이트웨이; 및 상기 센서노드에 기록된 정보 또는 상기 센서노드로부터 전달되는 정보의 위변조를 검출하기 위해 상기 게이트웨이를 통해 상기 센서노드로부터 전달되는 정보를 제공받아 위변조 여부를 검출하는 모니터링 센터;를 포함하여 구성된다.
242 Cryptography US41091920 1920-09-17 US1379551A 1921-05-24 GAUSS HENRY C
243 고속 자동 보상 양자 암호 송수신장치 및 방법 KR1020060030954 2006-04-05 KR100759811B1 2007-09-20 윤천주; 노태곤; 홍종철; 김헌오; 정태형
본 발명은 고속으로 양자 암호 키를 전송할 수 있는 자동 보상 양자 암호 송수신장치 및 방법에 관한 것으로 양자 암호 송신 장치는 파장 변환부,광 감쇠기, 광 위상 변조기 및 패러데이 미러를 포함하고, 양자 암호 수신 장치는 편광 분할기, 광 커플러, 광필터 및 광자 검출기를 포함하여 단일 광자가 전송되는 양자 경로상의 광섬유의 레일리이 산란에 의한 전송 속도의 한계를 극복하기 위한 시스템 및 방법에 관한 것이다. 양자 암호, 양자 키 분배
244 양자 암호 작성법을 사용하는 키 통신 방법 및 시스템 KR1019960701243 1994-09-08 KR1019960705433A 1996-10-09 폴데이비드타운센드; 케이스제임스블로우
본 발명은 양자 암호 작성법을 사용하는 키 통신 방법 및 시스템에 관한 것으로서, 양자 암호작성방법을 토대로한 통신 방법이 예를 들어, 송신기(T)와, 단일 광자 신호로부터 출력하는 초기 단계를 포함하며, 단일 광자 신호는 변조되지 않을수도 있고, 그후 수신기(R1∼R3)는 다른 비교환 양자의 기계적인 오퍼레이터에 대응하는 복수의 암호화 알파벳중 하나를 임의로 선택하고, 수신기는 단일광자 신호를 상기 선택된 오퍼래이터로써 변조하고 신호를 송신기에 복귀시키고, 송신기는 기계적인 오퍼래이터를 교대로 임의로 선택하고 양자의 수신기에 의해 변조된 상기 복귀된 신호를 검출할때 그 오퍼레이터를 사용하고, 그후 신호는 기결정된 암호화 알파벳을 사용해서 수신기에서 또한, 변조되고, 그후 신호는 기결정된 암호화 알파벳을 사용해서 수신 기에서 또한 변조되고, 신호가 송신기에서 되돌아서 수신될 때, 그것은 그것을 변조하기 위해 초기에 사용된 것과 같은 양자의 기계적인 오퍼래이터를 사용해서 검출되며, 비교는 송수신하면서 단일 광자 신호로 이루어져 도청기의 존재를 검출하는 것을 특징으로 한다.
245 Quantum cryptography US10627158 2003-07-25 US07983422B2 2011-07-19 Adrian Patrick Kent; William John Munro; Timothy Paul Spiller; Raymond G Beausoleil
A method of establishing a shared secret random cryptographic key between a sender and a recipient using a quantum communications channel is described. The method comprises: generating a plurality of random quantum states of a quantum entity, each random state being defined by a randomly selected one of a first plurality of bases in Hilbert space, transmitting the plurality of random quantum states of the quantum entity via the quantum channel to a recipient, measuring the quantum state of each of the received quantum states of the quantum entity with respect to a randomly selected one of a second plurality of bases in Hilbert space, transmitting to the recipient composition information describing a subset of the plurality of random quantum states, analysing the received composition information and the measured quantum states corresponding to the subset to derive a first statistical distribution describing the subset of transmitted quantum states and a second statistical distribution describing the corresponding measured quantum states, establishing the level of confidence in the validity of the plurality of transmitted random quantum states by verifying that the first and second statistical distributions are sufficiently similar, deriving a first binary sting and a second binary string, correlated to the first binary string, respectively from the transmitted and received plurality of quantum states not in the subset, and carrying out a reconciliation of the second binary string to the first binary string by using error correction techniques to establish the shared secret random cryptographic key from the first and second binary strings.
246 CRYPTOLOGIC REWRITABLE BLOCKCHAIN PCT/EP2017/062240 2017-05-23 WO2017202756A1 2017-11-30 ATENIESE, Giuseppe; CHIARAMONTE, Michael T.; TREAT, David; MAGRI, Bernardo; VENTURI, Daniele

A system includes circuitry for cryptologically rewriting blockchains in a non-tamper-evident or tamper-evident operation using a key secret held by a trusted party. The blockchains may include a series of blocks secured integrity codes that may prevent non-tamper-evident rewrites by non-trusted parties that are not in possession of the key secret. In some cases, the key may allow valid but tamper-evident rewrites of the blockchain by trusted entities. Integrity outputs may be generated from the integrity codes based on the content of the previous blocks in the series such that attempts by untrusted parties to replace a block may be detected through coding-inconsistencies with other blocks.

247 CRYPTOLOGIC REWRITABLE BLOCKCHAIN PCT/EP2017/062243 2017-05-23 WO2017202759A1 2017-11-30 ATENIESE, Giuseppe; CHIARAMONTE, Michael T.; TREAT, David; MAGRI, Bernardo; VENTURI, Daniele

A cryptologic system includes circuitry for rewriting blockchains in a non-tamper-evident or tamper-evident operation using a key secret held by a trusted party. The blockchains may include a series of blocks secured by a chameleon hash that may prevent non-tamper-evident rewrites by non-trusted parties that are not in possession of the key secret. Rewrite circuitry of the system may determine randomness data from the chameleon hash and altered data from a rewrite. The randomness data may be written to the randomness field of a block overwritten with the altered data such that the block remains coding-consistent with the chameleon hash and other blocks in the blockchain.

248 Quantum cryptography US10627158 2003-07-25 US20050036624A1 2005-02-17 Adrian Kent; William Munro; Timothy Spiller; Raymond Beausoleil
A method of establishing a shared secret random cryptographic key between a sender and a recipient using a quantum communications channel is described. The method comprises: generating a plurality of random quantum states of a quantum entity, each random state being defined by a randomly selected one of a first plurality of bases in Hilbert space, transmitting the plurality of random quantum states of the quantum entity via the quantum channel to a recipient, measuring the quantum state of each of the received quantum states of the quantum entity with respect to a randomly selected one of a second plurality of bases in Hilbert space, transmitting to the recipient composition information describing a subset of the plurality of random quantum states, analysing the received composition information and the measured quantum states corresponding to the subset to derive a first statistical distribution describing the subset of transmitted quantum states and a second statistical distribution describing the corresponding measured quantum states, establishing the level of confidence in the validity of the plurality of transmitted random quantum states by verifying that the first and second statistical distributions are sufficiently similar, deriving a first binary sting and a second binary string, correlated to the first binary string, respectively from the transmitted and received plurality of quantum states not in the subset, and carrying out a reconciliation of the second binary string to the first binary string by using error correction techniques to establish the shared secret random cryptographic key from the first and second binary strings.
249 Quantum cryptography US776296 1997-01-30 US5953421A 1999-09-14 Paul David Townsend
In a method of communication using quantum cryptography, single-photon signals from a highly attenuated source are modulated and subsequently detected. In the step of detecting the modulated signal, the signal is split between two branches according to its encoded statc. Signals corresponding to different encoded states are detected independently in the respective branches and the rate of detection of coincident signals is determined. This rate is compared with a threshold to detect the presence of an eavesdropper.
250 타원곡선 암호화 기반의 복제 불가능한 스마트미터 칩 KR1020140154707 2014-11-07 KR101636671B1 2016-07-21 김현민; 홍석희
본발명은스마트미터칩에관한것으로, 스마트그리드에이용되는스마트미터칩에있어서, 전력량을측정하는미터링부, 및타원곡선암호를이용하여상기측정된전력량의데이터를암호화하거나객체인증을수행하는보안인증부를포함하고, 하나의칩 형태로구현되는것을특징으로함으로써, 스마트그리드환경에서안전한제품운용이가능하다.
251 CRYPTOGRAPHIC METHOD AND SYSTEM EP13752183.7 2013-02-19 EP2817917B1 2018-04-11 HOOK, David Geoffrey; HARVEY, Richard Hans; DETTMAN, Peter Kai
The present invention relates to the field of security of electronic data and/or communications. In one form, the invention relates to data security and/or privacy in a distributed and/or decentralised network environment. In another form, the invention relates to enabling private collaboration and/or information sharing between users, agents and/or applications. Embodiment(s) of the present invention enable the sharing of key(s) and/or content between a first user and/or agent and a second user and/or agent. Furthermore, embodiment(s) of the present invention have application in sharing encrypted information via information sharing services. A number of inventions, aspects and embodiments are disclosed herein.
252 支援密碼學之指令 TW101134968 2012-09-24 TWI522832B 2016-02-21 荷斯奈爾馬修詹姆士; HORSNELL, MATTHEW JAMES; 柯蕭丹尼爾; KERSHAW, DANIEL; 格利森斯維特理查羅伊; GRISENTHWAITE, RICHARD ROY; 拜爾斯史都華大衛; BILES, STUART DAVID
253 연속적인 양자암호 키 분배를 위한 통신 장치 및 통신 방법 KR1020160149439 2016-11-10 KR1020170062379A 2017-06-07 한상욱; 문성욱; 김용수; 우민기
본발명은통신장치에있어서, 상기통신장치와연결된타통신장치로부터수신되는동기신호를검출하는동기신호검출기를포함하되, 상기타통신장치는제1 광원으로부터생성된양자신호를상기통신장치에전송하고; 및상기동기신호의검출결과에따라상기타통신장치로전송될양자신호에추가될디코이신호를생성하는제2 광원을포함한다.
254 공개키 암호를 위한 다중 제곱 연산 장치 및 방법 KR1020140041475 2014-04-07 KR101562323B1 2015-10-21 김호원; 서화정
본발명은전체제곱연산중 동일한결과값을도출하는부분과그렇지않은부분을나누어계산하여불필요한부분곱셈연산을효과적으로줄일수 있도록한 공개키암호를위한다중제곱연산장치및 방법에관한것으로, 연산초기에메모리에저장된하위비트에서부터인자값을레지스터로불러오고, 연산중간에중간결과값을레지스터로불러오는인자값리드부;하위비트에서부터같은열에위치한중복곱셈부분에대해부분곱셈연산을한번수행하고중간결과값을메모리에저장하는중간결과값연산부;모든중복열에대한곱셈연산이중간결과값연산부에서이루어졌는지판단하고, 모든열에대하여최종결과값연산이이루어졌는지판단하는연산확인부;중간결과값연산이이루어진것으로판단되면하위비트부터이전에계산된중간결과값을불러와서해당중간값에대한 1-비트논리적왼쪽이동또는더하기연산을수행하는중간결과값추가연산부;해당중간값과동일한열에위치한한번만곱셈이수행되는부분에대해곱셈연산을하여최종결과값을메모리에저장하는최종결과값연산부;를포함하는것이다.
255 전송 중 데이터 오류의 산사태 효과를 극복할 수 있는 암호화 방법 KR1020080127036 2008-12-15 KR101013746B1 2011-02-14 유영갑; 안영일; 김한벼리
암호 시스템간의 데이터 전송 시 에러(데이터 오류의 산사태 효과)를 극복할 수 있는 암호화 방법이 개시된다. 본 발명은 데이터를 전송단위로 나눈 다음, 전송 단위 별로 겹치는 비트가 없도록 원래의 데이터 방향의 반대방향으로 재배열하여 전송하고, 수신 후 역 재배열이 된 암호문에서 오류가 검출되면, 동일하지 않은 열과 행에 대하여 열과 행을 공유하지 않은 비트들로 오류 정정을 수행하는 것이다.
256 SYNCHRONISATION CRYPTOGRAPHIQUE ENTRELACEE EP07731671.9 2007-02-27 EP1992102A1 2008-11-19 ROUSSEAU, Frédéric
The invention concerns synchronization applied to a data stream structured in superframes. Each block in a superframe comprises a slow synchronization portion (A1) and at least one traffic frame (T2 à T24). The slow synchronization portions in the superframe result in at least one breakdown of a synchronization management word. In the superframe (ST) are inserted additional synchronization portions (a, b, c) similar to the low synchronization portions and distributed instead of traffic frame bits in the superframe. The invention provides for rapid synchronization coexisting with preexisting slow synchronization, without increasing the bandwidth. The invention is applicable in particular to cryptographic synchronization between stationary of mobile terminal devices operating in interconnected heterogeneous networks having different synchronization time constants.
257 TRUSTED CRYPTOGRAPHIC SWITCH EP06786510.5 2006-07-05 EP1908201A2 2008-04-09 ANDOLINA, John C.; BOURGET, Dennis J.
A cryptographic switch for routing information is disclosed. The cryptographic switch includes a first and second input ports, a first and second output ports and a first and second cryptographic paths. The first cryptographic path is configured to programmably couple between at least one of the first or second input ports and at least one of the first or second output ports. The second cryptographic path is configured to programmably couple between at least one of the first or second input ports and at least one of the first or second output ports.
258 CRYPTOGRAPHIC RECEIVER EP94927015.1 1994-09-23 EP0722640B1 1998-11-25 RARITY, John, Gilroy Defence Research Agency; TAPSTER, Paul, Richard Defence Research Agency
259 SYNCHRONISATION CRYPTOGRAPHIQUE ENTRELACEE EP07731671.9 2007-02-27 EP1992102B1 2010-10-27 ROUSSEAU, Frédéric
260 CRYPTOGRAPHIC RECEIVER EP94927015.0 1994-09-23 EP0722640A1 1996-07-24 RARITY, John, Gilroy Defence Research Agency; TAPSTER, Paul, Richard Defence Research Agency
A cryptographic receiver (10) includes photon detectors (52, 54, 56, 58) arranged to detect photons arriving from filters (22) and (24). A fibre coupler (14) randomly distributes each received photon (16) from an optical fibre to one of two photon channels (18, 20). The filters (22, 24) are each unbalanced Mach-Zehnder interferometers with a phase modulator (34, 44) in one arm (28, 38). The filters (22, 24) impose non-orthogonal measurement bases on photons within the respective channels (18, 20). A signal processor (60) derives a cryptographic key-code by analysis of signals received from the photon detectors (52, 54, 56, 58).
QQ群二维码
意见反馈