Showing papers on "Format-preserving encryption published in 2018"
Patent•
08 Jun 2018
TL;DR: In this paper, a secret key is used to generate vectors that describe permutation (or repositioning) of characters within a segment length equal to a length of the transposition vector.
Abstract: Encryption and decryption techniques based on one or more transposition vectors. A secret key is used to generate vectors that describe permutation (or repositioning) of characters within a segment length equal to a length of the transposition vector. The transposition vector is then inherited by the encryption process, which shifts characters and encrypts those characters using a variety of encryption processes, all completely reversible. In one embodiment, one or more auxiliary keys, transmitted as clear text header values, are used as initial values to vary the transposition vectors generated from the secret key, e.g., from encryption-to-encryption. Any number of rounds of encryption can be applied, each having associated headers used to “detokenize” encryption data and perform rounds to decryption to recover the original data (or parent token information). Format preserving encryption (FPE) techniques are also provided with application to, e.g., payment processing.
24 citations
Patent•
26 Jul 2018
TL;DR: In this paper, a homomorphic and injective format-preserving encryption and an encrypted analytic matrix are presented. But the authors do not discuss the use of homomorphic encryption in the analysis of analytic matrix.
Abstract: Systems and methods that provide secure analytics using homomorphic and injective format-preserving encryption and an encrypted analytics matrix are disclosed herein. An example method includes encoding an analytic parameter set using a homomorphic encryption scheme as a homomorphic analytic matrix; transmitting a processing set to a server system, the processing set including at least the homomorphic analytic matrix and a keyed hashing function; and receiving a homomorphic encrypted result from the server system, the server system having utilized the homomorphic encryption scheme, the keyed hashing function, and a format preserving encryption scheme to evaluate the homomorphic analytic matrix over a datasource.
11 citations
BMW1
TL;DR: This work proposes a new algorithm for storing geographic spatial information in IoT devices and the Cloud securely while preserving the existing format.
Abstract: The rise Internet of Things (IoT) over the last years has allowed more and more devices to be connected and interact between themselves. Many of these devices, such as vehicles have to deal with geographic information, often considered as sensitive by many car manufacturers, like the BMW Group. For securely storing this geographic information, usually block ciphers are used. Unfortunately, they imply the disadvantage of breaking existing formats and compatibilities. To address this problem, we propose a new algorithm for storing geographic spatial information in IoT devices and the Cloud securely while preserving the existing format.
6 citations
01 Jan 2018
TL;DR: A Format Preserving Encryption method by accumulating with Advance encryption standard (AES), eXclusive OR operation and a translation method for 16 digit numeric data is proposed.
Abstract: In the current scenario data security has become an important issue with the growth of digital media. Many users and the applications are accessing the data both from inside and outside the database. Hence, the database as well as data within these databases has become the key target for most of the attackers. Many cryptographic schemes have been designed to solve this problem. Encryption plays an important role in providing the data confidentiality to data stored within the databases. But, the problem in adopting the standard encryption methods is that they may cause a damage to the existing schema as well as to the underlying applications or database as the output length is different from the input length and it also changes the format of data. This paper proposes a Format Preserving Encryption method by accumulating with Advance encryption standard(AES), eXclusive OR operation and a translation method for 16 digit numeric data. Format preserving encryption technique is used to minimizes the databases changes by preserving the format as well as the length of the input data.
6 citations
19 Aug 2018
TL;DR: The security deficiencies in the NIST SP800-38G standard have been highlighted by Bellare, Hoang, Tessaro, CCS ’16; Durak and Vaudenay, CRYPTO ’17 as mentioned in this paper.
Abstract: Format-preserving encryption (FPE) produces ciphertexts which have the same format as the plaintexts. Building secure FPE is very challenging, and recent attacks (Bellare, Hoang, Tessaro, CCS ’16; Durak and Vaudenay, CRYPTO ’17) have highlighted security deficiencies in the recent NIST SP800-38G standard. This has left the question open of whether practical schemes with high security exist.
6 citations
Posted Content•
TL;DR: Format-preserving encryption produces ciphertexts which have the same format as the plaintexts, leaving the question open of whether practical schemes with high security exist.
Abstract: Format-preserving encryption (FPE) produces ciphertexts which have the same format as the plaintexts. Building secure FPE is very challenging, and recent attacks (Bellare, Hoang, Tessaro, CCS ’16; Durak and Vaudenay, CRYPTO ’17) have highlighted security deficiencies in the recent NIST SP800-38G standard. This has left the question open of whether practical schemes with high security exist.
5 citations
Patent•
22 Nov 2018
TL;DR: In this paper, a pseudo random padding length is calculated when it is determined that padding is needed, and the calculated length of padding may be added to the plaintext and added padding may then be encrypted using format-preserving encryption to create a cipher text.
Abstract: Techniques for using padding in format preserving encryption are provided. In one aspect, it may be determined if padding of a plaintext undergoing format preserving encryption is needed. A pseudo random padding length may be calculated when it is determined that padding is needed. The calculated length of padding may be added to the plaintext when it is determined that padding is needed. The plaintext and added padding may be encrypted using format preserving encryption to create a cipher text.
2 citations
01 Jan 2018
2 citations
15 Aug 2018
TL;DR: The first targeted ciphers are proposed, a modification of the Swap-or-Not cipher proposed by Hoang, Morris, and Rogaway (CRYPTO 2012) and a new cipher called Mix-Swap-Unmix, which achieves the stronger notion of full security.
Abstract: We introduce Targeted Ciphers, which typically encipher points on domain \(\mathcal {X}\), but can be easily modified to instead encipher points on some subset \(\mathcal{S}\subseteq \mathcal {X}\). Ciphers that can directly support this domain targeting are useful in Format-Preserving Encryption, where one wishes to encipher points on a potentially complex domain \(\mathcal{S}\). We propose two targeted ciphers and analyze their security. The first, Targeted Swap-or-Not, is a modification of the Swap-or-Not cipher proposed by Hoang, Morris, and Rogaway (CRYPTO 2012). The second, a new cipher we call Mix-Swap-Unmix, achieves the stronger notion of full security. Our targeted ciphers perform domain targeting more efficiently than the recently proposed Cycle Slicer algorithm of Miracle and Yilek (ASIACRYPT 2017).
2 citations
Patent•
26 Jul 2018
TL;DR: Secure analytics using homomorphic and injective format-preserving encryption are disclosed in this paper, where an example method includes encoding an analytic parameter set using a homomorphic encryption scheme as a set of homomorphic analytic vectors.
Abstract: Secure analytics using homomorphic and injective format-preserving encryption are disclosed herein. An example method includes encoding an analytic parameter set using a homomorphic encryption scheme as a set of homomorphic analytic vectors; transmitting the set of homomorphic analytic vectors to a server system; and receiving a homomorphic encrypted result from the server system, the server system having utilized the homomorphic encryption scheme and a first injective, format-preserving encryption scheme to evaluate the set of homomorphic analytic vectors over a datasource.
2 citations
01 Jan 2018
03 May 2018
TL;DR: This paper introduces an efficient algorithm to mask the sensitive data using format preserving encryption and shows how data masking and data encryption are used to achieve this.
Abstract: For every organization the most important thing is sensitive data. Data masking and data encryption are used to achieve this. In this paper we introduce an efficient algorithm to mask the sensitive data using format preserving encryption.
TL;DR: An algorithm named Cycle-Prefix is put forward, which enhances the security and dynamics of FPE by using two adjustment factors and the circular encryption, compared with the traditional Prefix algorithm.
Abstract: In the era of big data, government, business and personal digital information will be possible for data mining. Data mining requires massive data as a support. However, the direct release of the original mass data, which usually contain some sensitive information of personal or analysis, will result in leakage of user privacy. Therefore, it is becoming increasingly important to protect privacy information in data publishing. In this paper, we focus on the multi-type self-identified format-preserving encryption. First, we introduce a multi-type self-identified format-preserving encryption system and discuss the encryption of various types of data in this system. Then, for the format preserving encryption (FPE) about Chinese name, we study from the encryption model construction and basic encryption scheme. The format-preserving encryption model about Chinese name is constructed and the concept of the name library is presented. Based on this, it is used to not only limit the message space to reduce complexity, but also ensure the cipher in accordance with the Chinese naming habits. In addition, according to the encryption and decryption model, format-preserving encryption process of Chinese name is designed. In order to add new names, the algorithm of name space expansion is proposed. Based on the Prefix, this paper put forward an algorithm named Cycle-Prefix, which enhances the security and dynamics of FPE by using two adjustment factors and the circular encryption. Compared with the traditional Prefix algorithm, experiments show that Cycle-Prefix can not only complete the task of FPE for Chinese name, but also encrypt same plain text into different ciphers under the premise of similar efficiency with Prefix.