FR3092923B1 - Méthode cryptographique de vérification des données - Google Patents
Méthode cryptographique de vérification des données Download PDFInfo
- Publication number
- FR3092923B1 FR3092923B1 FR1901648A FR1901648A FR3092923B1 FR 3092923 B1 FR3092923 B1 FR 3092923B1 FR 1901648 A FR1901648 A FR 1901648A FR 1901648 A FR1901648 A FR 1901648A FR 3092923 B1 FR3092923 B1 FR 3092923B1
- Authority
- FR
- France
- Prior art keywords
- data
- mixing
- hash
- shuffled
- function
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title abstract 4
- 238000013524 data verification Methods 0.000 title 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Power Engineering (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Méthode cryptographique de vérification des données Procédé de comparaison mis en œuvre par au moins un appareil (A ; B), entre un premier et deuxième ensemble de données, en vue notamment de déterminer si ces deux ensembles de données sont identiques, ce procédé ne nécessitant pas la présence de ces deux ensembles de données sur l’appareil, et comportant les étapes suivantes : le mélange d’un nombre, dit nombre de mélange, au premier ensemble de données, à l’aide d’une fonction de mélange (105 ; 405), pour obtenir des données mélangées, le hachage des données mélangées à l’aide d’une fonction de hachage (106 ; 406), et la comparaison du haché ainsi obtenu à l’étape b) avec un troisième ensemble de données supposé être le haché du deuxième ensemble de données mélangé au même nombre de mélange que celui utilisé à l’étape a) et avec la même fonction de mélange (105 ; 405). Figure pour l’abrégé : Fig. 2
Priority Applications (13)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1901648A FR3092923B1 (fr) | 2019-02-19 | 2019-02-19 | Méthode cryptographique de vérification des données |
JP2021549168A JP7617008B2 (ja) | 2019-02-19 | 2020-02-17 | データを検証するための暗号方法 |
PCT/EP2020/054126 WO2020169542A1 (fr) | 2019-02-19 | 2020-02-17 | Méthode cryptographique de vérification des données |
EP20704320.9A EP3928232A1 (fr) | 2019-02-19 | 2020-02-17 | Méthode cryptographique de vérification des données |
AU2020225314A AU2020225314A1 (en) | 2019-02-19 | 2020-02-17 | Cryptographic data verification method |
KR1020217026080A KR20210153595A (ko) | 2019-02-19 | 2020-02-17 | 암호화 데이터 검증 방법 |
CA3128869A CA3128869A1 (fr) | 2019-02-19 | 2020-02-17 | Methode cryptographique de verification des donnees |
CN202080015504.4A CN113811874A (zh) | 2019-02-19 | 2020-02-17 | 加密数据验证方法 |
US16/793,123 US11914754B2 (en) | 2019-02-19 | 2020-02-18 | Cryptographic method for verifying data |
US16/934,376 US11956367B2 (en) | 2019-02-19 | 2020-07-21 | Cryptographic method for verifying data |
US18/072,962 US20240089240A1 (en) | 2019-02-19 | 2022-12-01 | Cryptographic method for verifying data |
US18/405,094 US20240160792A1 (en) | 2019-02-19 | 2024-01-05 | Cryptographic method for verifying data |
US18/606,564 US20240250826A1 (en) | 2019-02-19 | 2024-03-15 | Cryptographic method for verifying data |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1901648 | 2019-02-19 | ||
FR1901648A FR3092923B1 (fr) | 2019-02-19 | 2019-02-19 | Méthode cryptographique de vérification des données |
Publications (2)
Publication Number | Publication Date |
---|---|
FR3092923A1 FR3092923A1 (fr) | 2020-08-21 |
FR3092923B1 true FR3092923B1 (fr) | 2021-05-21 |
Family
ID=67810665
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
FR1901648A Active FR3092923B1 (fr) | 2019-02-19 | 2019-02-19 | Méthode cryptographique de vérification des données |
Country Status (9)
Country | Link |
---|---|
US (2) | US11914754B2 (fr) |
EP (1) | EP3928232A1 (fr) |
JP (1) | JP7617008B2 (fr) |
KR (1) | KR20210153595A (fr) |
CN (1) | CN113811874A (fr) |
AU (1) | AU2020225314A1 (fr) |
CA (1) | CA3128869A1 (fr) |
FR (1) | FR3092923B1 (fr) |
WO (1) | WO2020169542A1 (fr) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11956367B2 (en) | 2019-02-19 | 2024-04-09 | Bruno SANGLE-FERRIERE | Cryptographic method for verifying data |
FR3120134B1 (fr) | 2021-02-22 | 2025-02-28 | Marbeuf Conseil Et Rech | Procédé de géolocalisation d’un récepteur |
FR3120130B1 (fr) | 2021-02-22 | 2023-03-24 | Marbeuf Conseil Et Rech | Procédé de certification de la géolocalisation d’un récepteur |
FR3125659B1 (fr) | 2021-07-22 | 2023-07-21 | Marbeuf Conseil Et Rech | Système de communication quantique par photons intriqués |
FR3125658B1 (fr) | 2021-07-22 | 2023-07-21 | Marbeuf Conseil Et Rech | Système de communication quantique par photons intriqués |
FR3140457B1 (fr) | 2022-10-04 | 2024-08-30 | Marbeuf Conseil Et Rech | Méthode d’amélioration de hachage d’un fichier |
KR102686675B1 (ko) * | 2023-01-05 | 2024-07-22 | 주식회사 지엔기술 | 웹어셈블리를 활용한 파일 전송 방법, 서버 및 컴퓨터 프로그램 |
FR3145455B1 (fr) | 2023-01-26 | 2025-01-17 | Marbeuf Conseil Et Rech | Transmission d’un message par communication quantique avec détection d’écoute |
Family Cites Families (40)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA2262551C (fr) * | 1996-08-16 | 2002-09-17 | Bell Communications Research, Inc. | Generateur binaire perfectionne de nombres pseudo-aleatoires cryptographiquement surs, concu pour un chiffrement sur et rapide |
US7249256B2 (en) | 2001-07-11 | 2007-07-24 | Anoto Ab | Encryption protocol |
SE0102474L (sv) * | 2001-07-11 | 2003-01-12 | Anoto Ab | Krypteringsprotokoll |
JP2004144810A (ja) | 2002-10-22 | 2004-05-20 | Hitachi Electronics Service Co Ltd | ホームページ改ざん監視システム |
US8892887B2 (en) * | 2006-10-10 | 2014-11-18 | Qualcomm Incorporated | Method and apparatus for mutual authentication |
CN101547184A (zh) | 2008-03-24 | 2009-09-30 | 突触计算机系统(上海)有限公司 | 一种用于对网络传输的数据块进行验证的方法和装置 |
US9747340B2 (en) * | 2008-06-19 | 2017-08-29 | Microsoft Technology Licensing, Llc | Method and system of using a local hosted cache and cryptographic hash functions to reduce network traffic |
US20110116096A1 (en) * | 2009-03-31 | 2011-05-19 | Welch James D | Welch certainty principle |
US8543820B2 (en) * | 2009-05-11 | 2013-09-24 | Nec Corporation | Tag generation apparatus, tag verification apparatus, communication system, tag generation method, tag verification method, and recording medium |
US8694467B2 (en) | 2010-03-31 | 2014-04-08 | Xerox Corporation | Random number based data integrity verification method and system for distributed cloud storage |
WO2011161898A1 (fr) * | 2010-06-21 | 2011-12-29 | パナソニック株式会社 | Système de duplication de contenu, système d'utilisation de contenu, serveur de gestion, procédé d'utilisation de contenu, programme d'utilisation de contenu, et circuit intégré |
US10068200B1 (en) * | 2011-01-22 | 2018-09-04 | Mass Insight, Inc. | Business and data processing system for providing mass spectrometric services |
JP6080030B2 (ja) * | 2012-01-23 | 2017-02-15 | パナソニックIpマネジメント株式会社 | 電話転送システム、電話転送サーバおよび表示ユニット |
US9116849B2 (en) | 2013-03-13 | 2015-08-25 | Intel Corporation | Community-based de-duplication for encrypted data |
IN2013MU01164A (fr) * | 2013-03-26 | 2015-07-03 | Tata Consultancy Services Ltd | |
AU2013101046A4 (en) * | 2013-05-23 | 2013-09-19 | Nowww.Us Pty Ltd | A process for Encrypted Login to a Secure Computer Network, for the Creation of a Session of Encrypted Communications Between Computers and a Device Including a Mobile Phone Logged into a Network, for the Persistence of Encrypted Communications between Communication Devices, and for the Termination of Communications. |
US9565022B1 (en) * | 2013-07-02 | 2017-02-07 | Impinj, Inc. | RFID tags with dynamic key replacement |
US9658831B2 (en) * | 2014-03-11 | 2017-05-23 | Sony Corporation | Optical random number generator and method for generating a random number |
JP6717131B2 (ja) * | 2016-09-06 | 2020-07-01 | 富士通株式会社 | 制御プログラム、制御方法、情報処理装置、復号プログラム、復号方法、及び端末装置 |
US20180367540A1 (en) * | 2016-10-21 | 2018-12-20 | Wickr Inc. | Controlling access to content |
US10742405B2 (en) * | 2016-12-16 | 2020-08-11 | The Boeing Company | Method and system for generation of cipher round keys by bit-mixers |
US10491377B2 (en) * | 2017-02-28 | 2019-11-26 | Google Llc | Hashing using data parallel instructions |
US10833847B2 (en) * | 2017-02-28 | 2020-11-10 | Google Llc | Cryptographic hash generated using data parallel instructions |
US10505907B2 (en) * | 2017-05-02 | 2019-12-10 | Disney Enterprises, Inc. | Securely recognizing mobile devices |
EP3399761A1 (fr) * | 2017-05-05 | 2018-11-07 | Nagravision SA | Gestion des droits |
US10891366B1 (en) * | 2017-08-18 | 2021-01-12 | Jonetix Corporation | Secure hardware signature and related methods and applications |
WO2018226265A1 (fr) * | 2017-09-09 | 2018-12-13 | Apple Inc. | Mise en oeuvre d'une authentification biométrique |
EP4155988A1 (fr) * | 2017-09-09 | 2023-03-29 | Apple Inc. | Mise en oeuvre de l'authentification biometrique pour l'execution d'une fonction respective |
US11481786B2 (en) * | 2017-10-03 | 2022-10-25 | Sony Group Corporation | Genuine instance of digital goods |
US10944568B2 (en) * | 2017-10-06 | 2021-03-09 | The Boeing Company | Methods for constructing secure hash functions from bit-mixers |
EP3564846A1 (fr) * | 2018-04-30 | 2019-11-06 | Merck Patent GmbH | Procédés et systèmes de reconnaissance et d'authentification automatiques d'objets |
US10732861B2 (en) * | 2018-07-26 | 2020-08-04 | Qualtrics, Llc | Generating and providing low-latency cached content |
US20200110905A1 (en) * | 2018-10-04 | 2020-04-09 | Ca, Inc. | Security hardened software footprint in a computing environment |
US11570157B2 (en) * | 2018-10-09 | 2023-01-31 | Tfor Llc | Transencrypting method and apparatus for removing information from data transmitted over networks and stored in data storage facilities |
US10362169B1 (en) * | 2018-10-17 | 2019-07-23 | Capital One Services, Llc | Call data management platform |
WO2020079841A1 (fr) * | 2018-10-19 | 2020-04-23 | 日本電気株式会社 | Procédé et dispositif de gestion de qualité de nombres aléatoires |
US10937339B2 (en) * | 2019-01-10 | 2021-03-02 | Bank Of America Corporation | Digital cryptosystem with re-derivable hybrid keys |
US11956367B2 (en) * | 2019-02-19 | 2024-04-09 | Bruno SANGLE-FERRIERE | Cryptographic method for verifying data |
US20220085984A1 (en) * | 2020-09-14 | 2022-03-17 | Amir Keyvan Khandani | Methods and apparatus for randomized encryption, with an associated randomized decryption |
US11803441B2 (en) * | 2021-09-30 | 2023-10-31 | International Business Machines Corporation | Calibrated decoders for implementations of quantum codes |
-
2019
- 2019-02-19 FR FR1901648A patent/FR3092923B1/fr active Active
-
2020
- 2020-02-17 JP JP2021549168A patent/JP7617008B2/ja active Active
- 2020-02-17 CA CA3128869A patent/CA3128869A1/fr active Pending
- 2020-02-17 KR KR1020217026080A patent/KR20210153595A/ko active Pending
- 2020-02-17 AU AU2020225314A patent/AU2020225314A1/en active Pending
- 2020-02-17 WO PCT/EP2020/054126 patent/WO2020169542A1/fr unknown
- 2020-02-17 EP EP20704320.9A patent/EP3928232A1/fr active Pending
- 2020-02-17 CN CN202080015504.4A patent/CN113811874A/zh active Pending
- 2020-02-18 US US16/793,123 patent/US11914754B2/en active Active
-
2024
- 2024-01-05 US US18/405,094 patent/US20240160792A1/en active Pending
Also Published As
Publication number | Publication date |
---|---|
US20210165914A1 (en) | 2021-06-03 |
US20240160792A1 (en) | 2024-05-16 |
EP3928232A1 (fr) | 2021-12-29 |
US11914754B2 (en) | 2024-02-27 |
KR20210153595A (ko) | 2021-12-17 |
JP7617008B2 (ja) | 2025-01-17 |
FR3092923A1 (fr) | 2020-08-21 |
JP2022521525A (ja) | 2022-04-08 |
CA3128869A1 (fr) | 2020-08-27 |
AU2020225314A1 (en) | 2021-09-02 |
WO2020169542A1 (fr) | 2020-08-27 |
CN113811874A (zh) | 2021-12-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
FR3092923B1 (fr) | Méthode cryptographique de vérification des données | |
Joshi et al. | SummCoder: An unsupervised framework for extractive text summarization based on deep auto-encoders | |
Fu et al. | Semantic keyword search based on trie over encrypted cloud data | |
RU2017145939A (ru) | Персональный поисковый индекс с повышенной конфиденциальностью | |
FR3113963B1 (fr) | Chaine de confiance avancee en aeronautique domaine de l'invention | |
FR3102023B1 (fr) | Procédé de dérivation de signature partielle avec vérification partielle | |
Izakian | Privacy preserving record linkage meets record linkage using unencrypted data | |
Gandhi et al. | Successful treatment of a unique case of congophilic fibrillary glomerulonephritis: A case report | |
LU | Automatic recognition of the absent topics in Chinese punctuation clauses based on maximum entropy model | |
Shabaz et al. | Evaluation and Prediction of Common Patterns Found In Public Accessed Data on Social Network. | |
Heboyan et al. | Investing in Public Health: Cost-Benefit Analysis of VaxUp! Augusta COVID-19 Vaccination Initiative | |
Masson-Oursel | A. Avalon. Works on Tantra | |
Jarrett et al. | Evaluating PPRL vs clear text linkage with real-world data | |
Arroyuelo et al. | String Processing and Information Retrieval | |
Andrew | The Modern Jazz Pianist: An In-depth Look at Joey Calderazzo and Aaron Parks | |
DeMott | Long-term geomorphic effects of the Glines Canyon Dam removal on the Elwha River, WA, USA | |
Li et al. | BJUT at TREC 2017: Tasks Track. | |
Khashyarmanesh | Some results on the associated primes of powers of ideals | |
Peili | CLOUD TRAINING PLATFORM BASED ON A CONVERGENT ARCHITECTURE OF HETEROGENEOUS CLOUDS | |
Thoenes | Oilcrops complex: policy changes and industry measures-Annual compendium-2017 | |
Makwana et al. | Ab. No. 13 Incorporating Sprinting in the Early Phase of Hamstring Injury Rehabilitation to Accelerate Return to Full Participation in Track and Field Athletes: A Comparative Study of Two Rehabilitation Strategies | |
Ahn | The Study on the Adaptation Style in the Opening Sequence of< The Godfather>: Focusing on the Adapter's View of the Original Novel | |
Rozar | An American Myth: The Representation of Rosa Parks in Children's Literature | |
FR3098941B1 (fr) | Dispositif et Procédé pour l’analyse de performances d’une application n-tier | |
Dönder | ACE I/D, LTA C804A, HPA-1 (A/B) AND BETA FIBRINOGEN455 GA GENE POLYMORPHISMS GENOTYPE AND ALLEL FREQUENCY IN ISCHEMIC STROKE PATIENTS |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PLFP | Fee payment |
Year of fee payment: 2 |
|
PLSC | Publication of the preliminary search report |
Effective date: 20200821 |
|
PLFP | Fee payment |
Year of fee payment: 3 |
|
PLFP | Fee payment |
Year of fee payment: 4 |
|
PLFP | Fee payment |
Year of fee payment: 5 |
|
PLFP | Fee payment |
Year of fee payment: 6 |
|
PLFP | Fee payment |
Year of fee payment: 7 |