Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

114 results about "Hash-based message authentication code" patented technology

In cryptography, an HMAC (sometimes expanded as either keyed-hash message authentication code or hash-based message authentication code) is a specific type of message authentication code (MAC) involving a cryptographic hash function and a secret cryptographic key. It may be used to simultaneously verify both the data integrity and the authenticity of a message, as with any MAC. Any cryptographic hash function, such as SHA-256 or SHA-3, may be used in the calculation of an HMAC; the resulting MAC algorithm is termed HMAC-X, where X is the hash function used (e.g. HMAC-SHA256 or HMAC-SHA3). The cryptographic strength of the HMAC depends upon the cryptographic strength of the underlying hash function, the size of its hash output, and the size and quality of the key.

Message authentication method and system

The invention discloses a message authentication method and a message authentication system, wherein the message authentication system comprises a quantum network service station and a client side; the quantum network service station is configured at a network side; the client side is configured at a user side; Interaction of message authentication information carrying message authentication codes is carried out between the client side and the network side; comparative authentication is carried out by comparison of the respectively generated message authentication codes; a quantum key card is also arranged; the network side generates true random numbers to respectively store in the quantum key card and the network side, so that corresponding user side keys are formed; and the user side keys of the quantum key card and the network side are respectively used for generating the message authentication codes to perform comparative authentication. According to the message authentication method and system disclosed by the invention, advantages of the existing classical communication network are utilized; in combination with keys generated by a true random number generator and quantum key distribution, information data can be transmitted to a receiver only after stage-by-stage mutual message authentication is carried out; therefore, the correctness of the information data is ensured better; and furthermore, the security also cannot be reduced.
Owner:ZHEJIANG SHENZHOU QUANTUM NETWORK TECH CO LTD

Short message authentication code residing method and device

The invention provides a short message authentication code residing method and device. The method includes the steps that a regular expression is adopted to conduct keyword matching to the short message content; when the short message content contains the keyword, the regular expression is adopted to conduct authentication code matching to the short message content so as to obtain the post-matching authentication code; the preset time of the authentication code is displayed at the present interface. The method is capable of automatically extracting the authentication code in the short message and displaying the preset time at the present interface, the user can fill in the authentication code according to the displayed authentication code on the authentication code interface within the preset time, the user needs not to remember the authentication code, and the user needs not to frequently switch from the short message application and the present application. According to the short message authentication code residing method and device, the authentication code is directly displayed on the present interface of the authentication code, the filling in of the authentication code needs only one step, that is, filling in the authentication code by manual inputting, so that the process of filling in the authentication code of the user is greatly facilitated and user experience is improved.
Owner:BEIJING BYTEDANCE NETWORK TECH CO LTD

Method and device for generating approximate message authentication codes

An approximate message authentication code (AMAC) which, like conventional message authentication codes, provides absolute authentication of the origin of the message, yet provides an approximate integrity check for the content of the message. The approximate integrity check will be computed probabilistically and will likely be the same for messages having only a small percentage of different bits. A distance measure on the AMACs, such as a Hamming distance measure, may be used to determine whether the number of bit differences between the messages is likely to be within an acceptable amount. The AMAC is a probabilistic checksum based on a shared key. The AMAC uses the message and a shared key as inputs. Optionally, an initial value may also be used as an input. In one version of the invention, the data in the message M are permuted and arranged (physically or logically) into a table having |A| bits in each column and T2 rows, where T is may be an odd integer. The permuted data are masked, for example, to generate an unbiased, independent, identically distributed set of bits (1 s and 0 s). Taking T rows at a time, the majority bit value for each column is determined and that majority value is used to generate a new row. This procedure is repeated on the T new rows of majority bits. The resulting |A| bits is the AMAC.
Owner:NYTELL SOFTWARE LLC

Efficient generic Hash function authentication scheme suitable for quantum cryptography system

The invention discloses an efficient generic Hash function authentication scheme suitable for a quantum cryptography system. In the scheme, a word-based design way is adopted. The scheme comprises the following steps: initializing a shared key of both parties and a word linear feedback shift register; performing vector multiplication on an authentication message and a register state in sequence by using an iteration and vector multiplier of the word linear feedback shift register; performing accumulation through an accumulator; performing exclusive or processing on a random number to obtain a message authentication code; and transmitting an authentication message and the message authentication code to the other party to realize an identity authentication function. The authentication scheme disclosed by the invention is clear in design principle, a design way is open, and any manual security defect does not exist; through the authentication scheme, an ideal safety security attribute can be achieved, and an efficient identity authentication function can be provided for the quantum cryptography system; and the authentication scheme has the characteristics of low occupation of resources, high portability and high platform adaptability.
Owner:THE PLA INFORMATION ENG UNIV

Handshake method and system based on datagram secure transmission protocol

ActiveCN108650227ASatisfy the needs of safety, autonomy and controllabilityTake advantage ofKey distribution for secure communicationTransmission protocolComputer hardware
The invention refers to a handshake method and a handshake system based on a datagram secure transmission protocol. The handshake method comprises: sending a client greeting message to the server by the client, wherein the client greeting message contains a list of all domestic commercial cipher suites supported by the client; receiving and determining whether the client greeting message carries astateless message authentication code by the server: if so, calculating to obtain a message authentication code by using a domestic hash algorithm, and comparing with the message authentication codecarried by the client greeting message to authenticate the client; sending a server greeting message to the client after the authentication, and informing the client of the domestic commercial ciphersuite selected by the client; and replacing the key specification according to the selected domestic commercial cipher suite by the client and the server, thereby establishing a data transmission link. The invention is capable of meeting the requirement of self-controllable information security in China and fully utilizing the unique advantages of the domestic encryption algorithm, and is compatible with the original DTLS protocol, and convenient for horizontal expansion.
Owner:SUZHOU KEDA TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products