GENERATION OF RANDOMIZED MESSAGES FOR CRYPTOGRAPHIC HASH FUNCTIONS
First Claim
Patent Images
1. A randomized message generation system comprising:
- ;
processor(s);
a primary randomization module coupled to the processors, the primary randomization module obtains a random value based on a randomization criterion to randomize a message; and
a secondary randomization module coupled to the processors, the secondary randomization module populates a last data block of the message with a randomization parameter to obtain a randomized message for use in a cryptographic hash function, wherein the randomization parameter is computed using the random value.
1 Assignment
0 Petitions
Accused Products
Abstract
Method(s) and system(s) for generation of randomized messages for cryptographic hash functions are described herein. The method includes obtaining a random value based on a randomization criterion to randomize a message. Further, a last data block of the message is populated with a randomization parameter to obtain a randomized message. The randomization parameter populated in the last block is computed using the random value.
-
Citations
16 Claims
-
1. A randomized message generation system comprising:
- ;
processor(s); a primary randomization module coupled to the processors, the primary randomization module obtains a random value based on a randomization criterion to randomize a message; and a secondary randomization module coupled to the processors, the secondary randomization module populates a last data block of the message with a randomization parameter to obtain a randomized message for use in a cryptographic hash function, wherein the randomization parameter is computed using the random value. - View Dependent Claims (2, 3, 4, 5, 6)
- ;
-
7. A method for generating randomized messages for cryptographic hash functions comprising:
-
obtaining a random value based on a randomization criterion to randomize a message; and populating a last data block of the message with a randomization parameter to obtain a randomized message, wherein the randomization parameter is computed using the random value. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory computer-readable medium having embodied thereon a computer program for executing a method for authenticating a user, the method comprising:
-
obtaining a random value based on a randomization criterion to randomize a message; and populating a last data block of the message with a randomization parameter to obtain a randomized message, wherein the randomization parameter is computed using the random value. - View Dependent Claims (14, 15, 16)
-
Specification