Jutla
Charanjit Jutla US
Patent application number | Description | Published |
---|---|---|
20120300930 | Single-Round Password-Based Key Exchange Protocols - A method for initializing encrypted communications using a common reference string and a shared password, includes determining a secret key of a peer using a first message, a second message and the common reference string, wherein the first message and the second message each comprise a tuple of elements of a cyclic group G of prime order p, a blinding encryption of the shared password, and a hash projection key. | 11-29-2012 |
Charanjit S. Jutla, New York, NY US
Patent application number | Description | Published |
---|---|---|
20080232591 | SIMPLE AND EFFICIENT ONE-PASS AUTHENTICATED ENCRYPTION SCHEME - The present invention provides encryption schemes and apparatus, which are more efficient than the existing single pass authenticated encryption schemes, while providing the same level of security. The initial vectors, which are an essential part of these schemes, are chosen in an incremental and safe fashion. This also leads to an incremental method for generating the pair-wise differentially uniform sequences or XOR-universal sequences which are another essential part of such schemes. The incrementality of the generation of these sequences extends to even across different plain-text messages being encrypted, leading to substantial savings in time to encrypt. A further step of encryption is shown to be redundant and leads to savings over earlier schemes. Another embodiment describes splitting the plain-text blocks into two sets, and using the block-cipher in encrypt mode on one set and the block-cipher in decrypt mode on the other set, leading to beneficial hardware solutions. | 09-25-2008 |
20100104095 | Novel Hash Function With Provable Resistance To Differential Attacks - A system and method for coding data to help resist differential attacks. Data in m columns may be initialized to an initialized value. One new column of data may be mixed with a new input word and input to an advanced mixer. The advanced mixer may include linear mixing having indexed bytes and performing of exclusive-OR operation and transposing. An output of the advanced mixer may be a new m column state. A value of m could be 0 through 30. The value of m may have a preferred range of 27 through 36. Systems to implement the foregoing method are also described. | 04-29-2010 |
20100104096 | Data Processing For Coding - A system and method for data processing for coding. The method may include providing a first plurality of bytes of data, non-linearly transforming the first plurality of bytes into a second plurality of bytes, multiplying each of the second plurality of bytes of data by a predetermined constant of a plurality of constants to generate a third plurality of bytes, and organizing in use the third plurality of bytes as a plurality of output bytes. Systems to practice the foregoing methods are also described. | 04-29-2010 |
Charanjit S. Jutla, Elmsford, NY US
Patent application number | Description | Published |
---|---|---|
20150039885 | CONJUNCTIVE SEARCH IN ENCRYPTED DATA - A method comprises receiving a first cryptographic token for one search term and a second cryptographic token is generated using the one search term and at least another search term. A first search is conducted using the first cryptographic token to generate a first result set, and the second cryptographic token is used for computing a subset of results of the first result set. | 02-05-2015 |
20150039903 | MASKING QUERY DATA ACCESS PATTERN IN ENCRYPTED DATA - A method for encrypting a database includes the following step. Keywords in the database are encrypted to obtain encrypted search tags for the keywords. A table of reverse indices is generated for the encrypted search tags. A table of cross keyword indices is generated. A method for searching in an encrypted database includes the following steps. A search is formulated as a conjunct of two or more atomic search queries. One of the conjuncts is selected as a primary atomic search query. Search capabilities are generated for a secondary atomic search query using the primary atomic search query and the secondary atomic search query. Such methods mask query data and the actual composition of the database to reduce computation complexity and privacy leakage. | 02-05-2015 |
Charanjit Singh Jutla, Elmsford, NY US
Patent application number | Description | Published |
---|---|---|
20080226063 | SIMPLE UNIVERSAL HASH FOR PLAINTEXT AWARE ENCRYPTION - A simple universal hash apparatus and method include input means for inputting at least one of a plurality of Plaintext blocks into an integrity aware encryption scheme using at least one of two secret keys to obtain a plurality of Ciphertext blocks; Plaintext checksum means for computing a Plaintext checksum value from said plurality of Plaintext blocks; Ciphertext checksum means for processing said plurality of Ciphertext blocks and a third key to obtain a Ciphertext checksum; and combination means for combining said Plaintext checksum and said Ciphertext checksum to obtain the simple universal hash value. | 09-18-2008 |
Charanjit Singh Jutla, New York, NY US
Patent application number | Description | Published |
---|---|---|
20100082493 | System and Method for Utility Sampling for Trust Metrics in PKI - A method for measuring trust in a transaction over a public key certificate network includes associating each edge K | 04-01-2010 |
Dawn Jutla, Halifax CA
Patent application number | Description | Published |
---|---|---|
20100100439 | Multi-platform system apparatus for interoperable, multimedia-accessible and convertible structured and unstructured wikis, wiki user networks, and other user-generated content repositories - The present invention involves allowing users (e.g. an employee, student, professional, expert) to interoperably use multimedia (e.g. text, voice and image gestures) for input and output, including to interface, search, index, edit, add, delete, organize, share, transfer, create, and manage organization(s)' knowledge and information resources within structured wikis, unstructured wikis, and wiki user networks, with extension to other types of user-generated content repositories. The invention makes organizational knowledge and information resources fully accessible by users with different types of interface abilities. The invention proposes a multimedia accessible wild platform-system connecting information and knowledge consumers and producers. | 04-22-2010 |
Dawn Natalie Jutla, Halifax CA
Patent application number | Description | Published |
---|---|---|
20120246264 | Data Exchange Between Communicating Computing Equipment Using Differential Information - Two pieces of communicating computing equipment (parties), including computers, routers, and mobile computing devices, having a communication function between the two parties. The sender/receiver store the most recent messages sent/received. The sender modifies a new message, to be sent, by comparing it with the previously sent message to the receiver and by removing from the new message those parts that were already sent in the previous message and also including in the modified message differential information describing the differences between the new message and the previous message. When the receiver receives the modified message from the sender, the receiver compares the received modified message to the previously received message, and using this comparison and the differential information included in the received modified message, the receiver derives the new message used by the sender to create the modified message actually sent. | 09-27-2012 |
Tarsem S. Jutla, Peoria, IL US
Patent application number | Description | Published |
---|---|---|
20140046635 | Facility Design and Management Systems Using Bi-Directional Cad-Des Interface - A computer-implemented method for automatically communicating updates between a computer-aided-design (CAD) module that generates a representation of the physical structure of a facility and a discrete event simulator (DES) module that simulates processes occurring within the facility is disclosed. The method may include establishing a communication link between the CAD module and the DES module. The method may also include receiving, by a processor, an update to at least one of the representation of the physical structure of the facility generated by the CAD module or the processes simulated by the DES module, and automatically communicating, by the processor, data representing the received update between the CAD module and the DES module over the communication link | 02-13-2014 |