发明名称 Conversion schemes for cryptography systems
摘要 In a general aspect, a conversion scheme is used with a cryptographic system. In some aspects, a pad bit vector is generated based on a size of a message bit vector, and a record bit vector is generated based on the pad bit vector. The record bit vector indicates the size of the pad bit vector. The record bit vector, the message bit vector, and the pad bit vector are combined to yield a first bit vector. A hash function is applied to the first bit vector, and an encryption function is applied to a portion of the first bit vector. A ciphertext is generated based on the output of the hash function and the output of the encryption function.
申请公布号 US9614668(B1) 申请公布日期 2017.04.04
申请号 US201615265355 申请日期 2016.09.14
申请人 ISARA Corporation 发明人 Simmons Sean;Sui Jiayuan
分类号 H04L9/06;H04L9/30;G06F21/72;H04L29/06;H04L9/28;H04L9/14 主分类号 H04L9/06
代理机构 Henry Patent Law Firm PLLC 代理人 Henry Patent Law Firm PLLC
主权项 1. A computer-implemented encryption method, comprising: generating a pad bit vector based on a size of a message bit vector; generating a record bit vector based on the pad bit vector, the record bit vector indicating a size of the pad bit vector; combining the record bit vector, the message bit vector, and the pad bit vector to yield a first bit vector; by operation of one or more processors, applying a hash function to the first bit vector to yield a hash function output; by operation of one or more processors, applying a conversion function to a second portion of the first bit vector to yield a converted bit vector, wherein the conversion function is configured to receive a conversion function input and applying the conversion function comprises providing the second portion of the first bit vector as the conversion function input; by operation of the one or more processors, applying an encryption function to a first portion of the first bit vector to yield an encryption function output, wherein the encryption function is configured to receive first and second encryption function inputs and applying the encryption function comprises providing the first portion of the first bit vector as the first encryption function input and providing the converted bit vector as the second encryption function input; generating a ciphertext based on the hash function output and the encryption function output; and providing the ciphertext for communication to a node in a communication system; wherein generating the pad bit vector comprises determining a size of the pad bit vector based on the size of the message bit vector, a size of the first encryption function input and a size of the conversion function input.
地址 Waterloo, Ontario CA