Processing

Please wait...

Settings

Settings

Goto Application

1. WO2010046104 - AN ENCRYPTION METHOD

Publication Number WO/2010/046104
Publication Date 29.04.2010
International Application No. PCT/EP2009/007555
International Filing Date 22.10.2009
IPC
H04L 9/20 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Arrangements for secret or secure communication
18Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems
20Pseudorandom key sequence combined element-for-element with data sequence
G06F 21/60 2013.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
G06F 21/64 2013.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
64Protecting data integrity, e.g. using checksums, certificates or signatures
G06K 19/06 2006.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
19Record carriers for use with machines and with at least a part designed to carry digital markings
06characterised by the kind of the digital marking, e.g. shape, nature, code
CPC
G06F 21/602
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
602Providing cryptographic facilities or services
G06F 21/64
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
64Protecting data integrity, e.g. using checksums, certificates or signatures
H04L 9/0656
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
06the encryption apparatus using shift registers or memories for block-wise ; or stream; coding, e.g. DES systems ; or RC4; Hash functions; Pseudorandom sequence generators
065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
H04N 1/4486
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
NPICTORIAL COMMUNICATION, e.g. TELEVISION
1Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
44Secrecy systems
448Rendering the image unintelligible, e.g. scrambling
4486using digital data encryption
H04N 2201/3236
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
NPICTORIAL COMMUNICATION, e.g. TELEVISION
2201Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
3225of data relating to an image, a page or a document
3233of authentication information, e.g. digital signature, watermark
3236Details of authentication information generation
Applicants
  • UNIVERSITY OF ULSTER [GB]/[GB] (AllExceptUS)
  • CHEDDAD, Abbas [DZ]/[GB] (UsOnly)
  • CONDELL, Joan [GB]/[GB] (UsOnly)
  • CURRAN, Kevin [IE]/[GB] (UsOnly)
  • MCKEVITT, Paul [IE]/[GB] (UsOnly)
Inventors
  • CHEDDAD, Abbas
  • CONDELL, Joan
  • CURRAN, Kevin
  • MCKEVITT, Paul
Agents
  • BROPHY, David
Priority Data
0819443.323.10.2008GB
0819976.231.10.2008GB
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) AN ENCRYPTION METHOD
(FR) PROCÉDÉ DE CHIFFREMENT
Abstract
(EN)
There is described a method of encrypting a set of 2D input data, preferably image data. The method comprises obtaining the hash value of a password and re-sizing the hash value to fir the size of the 2D input data. The re-sized data is transformed using an irreversible transform, and the output of the transform is then used to encode the 2D data.
(FR)
L'invention concerne un procédé qui permet de chiffrer un ensemble de données d'entrée 2D, de préférence des données d'image. Ce procédé consiste à obtenir la valeur de hachage d'un mot de passe et à redimensionner la valeur de hachage pour l'adapter à la taille des données d'entrée 2D. Les données redimensionnées sont transformées au moyen d'une transformée irréversible, et la sortie de la transformée est ensuite utilisée pour coder les données 2D.
Also published as
Latest bibliographic data on file with the International Bureau