Crypto Basic Corporation

Japan

Back to Profile

1-4 of 4 for Crypto Basic Corporation Sort by
Query
Aggregations
Jurisdiction
        United States 2
        World 2
IPC Class
H04L 9/08 - Key distribution 3
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems 2
H04L 9/20 - Pseudorandom key sequence combined element-for-element with data sequence 2
Found results for  patents

1.

Common secret key generation device, encryption device, decryption device, common secret key generation method, encryption method, decryption method, and program

      
Application Number 14412028
Grant Number 09608812
Status In Force
Filing Date 2013-07-04
First Publication Date 2015-06-04
Grant Date 2017-03-28
Owner
  • CRYPTO BASIC CORPORATION (Japan)
  • ACTEIIVE CORPORATION (Japan)
Inventor
  • Ohya, Masanori
  • Iriyama, Satoshi
  • Accardi, Luigi
  • Regoli, Massimo

Abstract

A) is computed as a common secret key by a shared secret key computation section. An encryption/decryption device is thereby capable of rapid generation of the secure common secret key.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems

2.

Encryption device, decryption device, encryption method, decryption method, and program

      
Application Number 14390204
Grant Number 09467286
Status In Force
Filing Date 2013-03-15
First Publication Date 2015-04-23
Grant Date 2016-10-11
Owner
  • CRYPTO BASIC CORPORATION (Japan)
  • Acteiive Corporation (Japan)
Inventor
  • Ohya, Masanori
  • Iriyama, Satoshi
  • Accardi, Luigi
  • Regoli, Massimo

Abstract

2 into bit sequences, and joins these to the bit sequences W1, W2. The encryption device repeats the operation of the non-convertible matrices and the non-linear transformation until the respective numbers of bits of the bit sequence W1 and the bit sequence W2 have reached a number of bits of a bit sequence expressing encryption target data. The encryption device derives a pseudo-random number bit sequence by computing the exclusive logical sum between the bit sequence W1 and the bit sequence W2, and performs encryption using the pseudo-random number bit sequence. The encryption device is thereby able to increase the speed of encryption processing and to increase the cryptographic strength in cases in which the number of bits of the encryption target data is modifiable.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems

3.

SHARED SECRET KEY GENERATION DEVICE, ENCRYPTION DEVICE, DECRYPTION DEVICE, SHARED SECRET KEY GENERATION METHOD, ENCRYPTION METHOD, DECRYPTION METHOD, AND PROGRAM

      
Application Number JP2013068419
Publication Number 2014/007347
Status In Force
Filing Date 2013-07-04
Publication Date 2014-01-09
Owner CRYPTO BASIC CORPORATION (Japan)
Inventor
  • Ohya, Masanori
  • Iriyama, Satoshi
  • Accardi, Luigi
  • Regoli, Massimo

Abstract

A public data acquisition section (22) acquires public data that includes a prime number p, a natural number d, a matrix Q, and a matrix S. A secret key generation section (24) generates a secret key that includes natural numbers nA and kA. A non-commutative matrix generation section (26) calculates a matrix MA (MA = S-kAQnASkA), sends the matrix to a communication partner, and acquires a matrix MB (MB = S-kBQnBSkB) from the communication partner. A shared secret key calculation section (28) calculates a matrix MAB (MAB = S-kAMBnASkA) as a shared secret key. As a result, the encryption and decryption device can quickly generate a secure shared secret key.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04L 9/20 - Pseudorandom key sequence combined element-for-element with data sequence

4.

ENCRYPTION DEVICE, DECRYPTION DEVICE, ENCRYPTION METHOD, DECRYPTION METHOD, AND PROGRAM

      
Application Number JP2013057509
Publication Number 2013/150880
Status In Force
Filing Date 2013-03-15
Publication Date 2013-10-10
Owner
  • CRYPTO BASIC CORPORATION (Japan)
  • ACTEIIVE CORPORATION. (Japan)
Inventor
  • Ohya, Masanori
  • Iriyama, Satoshi
  • Accardi, Luigi
  • Regoli, Massimo

Abstract

On the basis of private data (A) and prime numbers (p1, p2), an encryption device generates noncommutative matrices (A1, A2) (100) and applies the noncommutative matrices (A1, A2) to vectors (vi1, vi-12) (104). The encryption device carries out a nonlinear conversion on the vector (vi1) and the vector (vi2), converting same to bit strings, and bonds same with bit strings (W1, W2) (106, 108). The encryption device repeats the application of the noncommutative matrices and the nonlinear conversion until the number of bits of the bit string (W1) and the bit string (W2) reach a number of bits of a bit string which represents data to be encrypted (110). The encryption device calculates an exclusive OR (XOR) of the bit string (W1) and the bit string (W2), derives a pseudorandom bit string (112), and carries out encryption using the pseudorandom bit string. Thus, it is possible for the encryption device to accelerate an encryption process and strengthen encryption breaking resistance when a number of bits of data to be encrypted is variable.

IPC Classes  ?

  • H04L 9/20 - Pseudorandom key sequence combined element-for-element with data sequence