Thu, 03 Nov 2016 08:00:00 EDTApparatus and associated methods relate to securely transmitting, directly between two mobile devices, AES-256 encrypted file attachments which are decrypted within an application program (APP) using a decryption key that is available only to the APP. In an illustrative embodiment, the encrypted file may be attached to an e-mail. The e-mail may be transmitted directly to another mobile device via direct Wi-Fi, for example. The e-mail may be transmitted directly to another mobile device using Bluetooth, for example. In encrypted attachment may be deciphered only within the APP running on the receiving mobile device using a private key accessible to only the APP.
Thu, 03 Nov 2016 08:00:00 EDTAn encryption key is used to decode messages sent to control devices, such as devices connected by the Internet of Things. For security, at least a portion of the encryption key is send to a receiving device via a first communication technology and a remaining portion of the encryption key is sent to the receiving device via a second communication technology different or disparate from the first communication technology.
Thu, 03 Nov 2016 08:00:00 EDTAn electronic device is provided. The electronic device includes a first buffer configured to store video data and a system on chip. The system on chip may include a compression module configured to compress the video data stored in the first buffer, an encryption module configured to encrypt the compressed video data, and a universal serial bus (USB) hardware interface configured to transmit the encrypted video data. The compression module, the encryption module, and the USB hardware interface may be connected by a hardware signal line which is used to transmit video data.
Thu, 03 Nov 2016 08:00:00 EDTThe present disclosure includes: a communication module; a memory that stores a secret key encryption and restoration program; and a processor that executes the program, wherein when a request for restoration of a secret key is received from a user, the processor restores the secret key of which restoration is requested on the basis of restoration information received from each of a key management server and one or more trusted devices according to execution of the program, the secret key of the user is generated and encrypted by the processor in response to the request from the user, and the restoration information is generated corresponding to the secret key and then transmitted to each of the key management server and the one or more trusted devices through the communication module.
Thu, 03 Nov 2016 08:00:00 EDTApproaches described herein allow a stateless device to recover at least one private key. In particular, a stateless device can provide service-account credentials to a directory service to establish a first session and acquire a certificate and private key using information associated with the stateless device. The stateless device can store its private key before the first session ends. A stateless device can then provide user-account credentials to the directory service to establish a second session. After the second session begins, a private key can be acquired by the stateless device.
Thu, 03 Nov 2016 08:00:00 EDTA method begins by computing device receiving a store data object message. The method continues by determining at least a portion of the data object. The method continues by determining an encryption key based on the at least a portion of the data object and a key reference of the encryption key. The method continues by retrieving a prior encryption key with a similar key reference from dispersed storage network (DSN) memory and calculating a difference key based on the encryption key and the prior encryption key. The method continues by creating encryption key information including the difference key and the similar key reference of the prior encryption key and encrypting the portion of the data object utilizing the key in accordance with operational parameters.
Thu, 03 Nov 2016 08:00:00 EDTA method for generating a secret cryptographic key, which is common to a first node and a second node, with the aid of at least one helper node. The first node wirelessly transmits a first random sequence, the second node receives the first random sequence via a generally static reciprocal first communication channel, the second node receives a first signal, which is a function of the first random sequence, with the aid of the helper node, the second node derives the key from the first signal using the first random sequence, the second node wirelessly transmits a second random sequence, the first node receives the second random sequence, the first node receives a second signal, which is a function of the second random sequence, with the aid of the helper node, and derives the key from the second signal with the aid of the second random sequence.
Thu, 03 Nov 2016 08:00:00 EDTA key generation device generates an initial secret key, and a time update key at regular intervals, and transmits the initial secret key and the time update key to a terminal device. The terminal device utilizes the initial secret key, the time update key, and a private key generated by the terminal device itself to form a key group. The key group and a public key generated by the terminal device are used as a key pair to encrypt and decrypt data, give a digital signature, and verify digital signatures. The time update key includes a time period, and after the time period expires the time update key cannot be used by the terminal device to generate the key group. A data signature and encryption method is also provided.
Thu, 03 Nov 2016 08:00:00 EDTA system for performing a secure sequence of transformations of a data value, using encrypted representations of the data value is disclosed. The system comprises first transformation means 101 for applying a transformation to an input data value to obtain an obfuscated representation thereof, wherein the obfuscated representation contains a redundancy that depends on an input variable. The system comprises a sequence of second transformation means 102; 110 for applying a transformation to compute transformed obfuscated representations. The system further comprises fourth transformation means 103 for applying a transformation such that a last obfuscated transformed data is obtained. The system comprises fifth transformation means 104 for applying a transformation that depends on the last obfuscated transformed data and the input data.
Thu, 03 Nov 2016 08:00:00 EDTMethods of securing a cryptographic device against implementation attacks are described. A disclosed method comprises the steps of: generating secret values (324) using a pseudorandom generator (510); providing a key (330), an input (324) having a number of chunks and the secret values to an encryption module (340); indexing the chunks and the secret values (324); processing the input chunk wise by encrypting the secret values (324) indexed by the chunks using the key (330) and the encryption module (340); generating for each chunk a pseudorandom output (330′) of the encryption module (340), providing the pseudorandom output as the key (330′) when processing the next chunk; and performing a final transformation on the last pseudorandom output (330′) from the previous step by using it as a key to encrypt a fixed plaintext.
Thu, 03 Nov 2016 08:00:00 EDTA communication device includes: a processor configured to execute a process including: extracting, when an execution request of processing is received, a fixed identifier that is an identifier indicating a transmission source, and that has a fixed value, from the execution request; calculating a hash value of the fixed identifier extracted at the extracting, by using a predetermined hash function; creating a value that indicates the transmission source, and that includes the hash value calculated at the calculating in a part thereof, as an interim identifier that varies in value according to an execution condition of the processing; and communicating with the transmission source by using the interim identifier created at the creating.
Thu, 03 Nov 2016 08:00:00 EDTAspects of the present disclosure are directed to methods and systems for protecting sensitive data in a hosted service system. The system includes a host system and the host system includes a key management system (KMS) and a metadata service system (MSS). The KMS and the MSS are communicatively coupled to each other. The system further includes a database management system (DBMS) having a database, a query pre-parser, and a results handler. The query pre-parser and the results handler are communicatively coupled to the KMS and the MSS, and the system also includes a processing application adapted to process at least some data received from a tenant system.