Cryptographic mechanisms or cryptographic arrangements for secret or secure communication


  • CPC
  • H04L9/00
This industry / category may be too specific. Please go to a parent level for more data

Sub Industries

H04L9/001using chaotic signals H04L9/002Countermeasures against attacks on cryptographic mechanisms H04L9/003for power analysis H04L9/004for fault attacks H04L9/005for timing attacks H04L9/006involving public key infrastructure [PKI] trust models H04L9/007involving hierarchical structures H04L9/008involving homomorphic encryption H04L9/06the encryption apparatus using shift registers or memories for block-wise or stream coding H04L9/0606including means for manipulating block length H04L9/0612Countermeasures against differential power analysis H04L9/0618Block ciphers H04L9/0625with splitting of the data block into left and right halves H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations H04L9/0637Modes of operation H04L9/0643Hash functions H04L9/065Encryption by serially and continuously modifying data stream elements H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence H04L9/0662with particular pseudorandom sequence generator H04L9/0668producing a non-linear pseudorandom sequence H04L9/0675including means for processing multiple rounds H04L9/0681specifically for Rijndael H04L9/0687with splitting of the data block into left and right halves H04L9/0693including variable substitution, permutation, order or number of rounds, controlled by a key and/or the input data H04L9/08Key distribution or management H04L9/0802using a key distribution center, a trusted party or a key server H04L9/0805involving a conference key or a group key H04L9/0808using a control vector H04L9/0811using Diffie-Hellman key agreement H04L9/0813with user authentication or key authentication H04L9/0816Key establishment H04L9/0819Key transport or distribution H04L9/0822using key encryption key H04L9/0825using asymmetric-key encryption or public key infrastructure [PKI] H04L9/0827involving distinctive intermediate devices or communication paths H04L9/083involving central third party H04L9/0833involving conference or group key H04L9/0836using tree structure or hierarchical structure H04L9/0838Key agreement H04L9/0841involving Diffie-Hellman or related key agreement protocols H04L9/0844with user authentication or key authentication H04L9/0847involving identity based encryption [IBE] schemes H04L9/085Secret sharing or secret splitting H04L9/0852Quantum cryptography " H04L9/0855involving additional nodes H04L9/0858Details about key distillation or coding H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords H04L9/0863involving passwords or one-time passwords H04L9/0866involving user or device identifiers H04L9/0869involving random numbers or seeds H04L9/0872using geo-location information H04L9/0875based on channel impulse response [CIR] H04L9/0877using additional device H04L9/088Usage controlling of secret information H04L9/0883using quantum cryptography H04L9/0886using key recovery or key escrow H04L9/0888using secret sharing H04L9/0891Revocation or update of secret information H04L9/0894Escrow, recovery or storing of secret information H04L9/0897involving additional devices H04L9/10with particular housing, physical features or manual controls H04L9/12Transmitting and receiving encryption devices synchronised or initially set up in a particular manner H04L9/14using a plurality of keys or algorithms H04L9/16the keys or algorithms being changed during operation H04L9/18Encryption by serially and continuously modifying data stream elements H04L9/20Pseudorandom key sequence combined element-for-element with data sequence H04L9/22with particular pseudorandom sequence generator H04L9/24sequence produced by more than one generator H04L9/26producing a non-linear pseudorandom sequence H04L9/28using particular encryption algorithm H04L9/30Public key H04L9/3006underlying computational problems or public-key parameters H04L9/3013involving the discrete logarithm problem H04L9/302involving the integer factorization problem H04L9/3026details relating to polynomials generation H04L9/3033details relating to pseudo-prime or prime number generation H04L9/304based on error correction codes H04L9/3046based on factoring a large integer H04L9/3053based on a modular knapsack H04L9/306based on discrete logarithm H04L9/3066involving algebraic varieties H04L9/3073involving pairings H04L9/308based on polynomial equations H04L9/3086based on probabilistic schemes H04L9/3093involving Lattices or polynomial equations H04L9/32including means for verifying the identity or authority of a user of the system or for message authentication H04L9/3202involving a third party or a trusted authority H04L9/3205using a non-public key algorithm H04L9/3207using zero-knowledge proof H04L9/321involving a third party or a trusted authority H04L9/3213using tickets or tokens H04L9/3215using a plurality of channels H04L9/3218using proof of knowledge H04L9/3221interactive zero-knowledge proofs H04L9/3223using hash functions H04L9/3226using a predetermined code H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization H04L9/3231Biological data H04L9/3234involving additional secure or trusted devices H04L9/3236using cryptographic hash functions H04L9/3239involving non-keyed hash functions H04L9/3242involving keyed hash functions H04L9/3244for message authentication H04L9/3247involving digital signatures H04L9/3249using RSA or related signature schemes H04L9/3252using DSA or related signature schemes H04L9/3255using group based signatures H04L9/3257using blind signatures H04L9/326involving the concurrent use of a plurality of channels of different nature H04L9/3263involving certificates H04L9/3265using certificate chains, trees or paths; Hierarchical trust model H04L9/3268using certificate validation, registration, distribution or revocation H04L9/3271using challenge-response H04L9/3273for mutual authentication H04L9/3276involving splitting up or repeating the challenge and/or response H04L9/3278using physically unclonable functions [PUF] H04L9/3281using electronic signatures H04L9/3284using blind signatures H04L9/3286involving a plurality or a group of signers H04L9/3289with message recovery H04L9/3292with partial message recovery H04L9/3294using time stamps or public key certificates H04L9/3297involving time stamps H04L9/34Bits, or blocks of bits, of the telegraphic message being interchanged in time H04L9/36with means for detecting characters not meant for transmission H04L9/38Encryption being effected by mechanical apparatus