Unlock instant, AI-driven research and patent intelligence for your innovation.

Generation of cryptographic signatures using hash keys

A technique for ciphering and ciphering, applied in the field of authenticated information

Inactive Publication Date: 2004-06-02
GENERAL INSTR CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Such devices and methods should be able to generate a cryptographic signature (such as a program key, etc.) to confirm all the same information confirmed in a known linear scrambling manner, and without the disadvantages of linear scrambling

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Generation of cryptographic signatures using hash keys
  • Generation of cryptographic signatures using hash keys
  • Generation of cryptographic signatures using hash keys

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] As previously mentioned, FIG. 1 illustrates a satellite communication system in which incoming signals are encrypted by an encoder / transmitter 10 and transmitted to a satellite 12 for distribution to a plurality of receivers 14,16 and 18. As shown in FIG. Each receiver has a sub-set of different confirmation rights taken from the weight sets S0, S1, S2, S3, S4, . . . SN. The authorization rights allow different receivers to access different information signals (eg, television programs) distributed by the satellite 12 .

[0038] Such as image 3 The present invention shown can overcome the disadvantages of complex calculations required by the prior art linear hybrid approach (FIG. 2). should understand image 3 The specific embodiment shown is an example only. image 3 In particular, a simple binary tree-like chaining embodiment is shown in which information from three different information groups or classes (Group A, Group B and Group C) are authenticated by a digital s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and apparatus are provided for generating a digital signature that authenticates information of a plurality of different information groups. Information from each group is hashed to produce a separate hash key for each group authenticating the information in that group. Particular combinations of the hash keys are hashed together to produce at least one combined hash key. Each of the hash keys is ultimately combined in a predetermined order with all other hash keys via the combined hash keys to produce the digital signature in a manner that authenticates the information of all of the information groups. The digital signature is reproducible without access to all of the information groups authenticated thereby. Instead, information from a first information group is provided together with a set of hash keys and combined hash keys embodying authenticated information from the other groups. The hash key for the first information group is produced locally and combined with the other hash keys and / or combined hash keys in order to reproduce the digital signature.

Description

technical field [0001] The present invention relates to the generation of cryptographic signatures, and more particularly to methods and apparatus for generating and recovering information capable of authenticating a plurality of different groups of information without transmitting all of the authenticated information. The present invention is applicable to any security scheme in which information is authenticated by a signature, including telecommunications applications requiring controlled access to different pairs of signals. Such telecommunications applications include satellite and cable television systems, electronic mail systems, personal communications, cellular telephones, and the like. Applications outside the scope of telecommunications include the confidential storage and retrieval of digital data. [0002] Although the invention is described herein in terms of a secure broadcast system for television signals, it should be understood that the invention is applicab...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G09C1/00H04B7/15H04L9/32
CPCH04L2209/38H04L9/3247H04L2209/56H04L2209/12H04L9/3242H04L9/50H04L9/32
Inventor 艾瑞克·史若克保罗·莫瑞尼布蓝特·坎德楼
Owner GENERAL INSTR CORP