Enhancing obfuscation of digital content through use of linear error correction codes
Abstract
Technologies related to enhancing security of digital content are described. Linear error correction codes (LECCs) are employed for dual purposes: 1) to obfuscate digital content; and 2) to verify integrity of the digital content. A transmitter computing system obfuscates digital content based upon an obfuscation protocol, wherein the obfuscated digital content includes an LECC. A receiver computing system deobfuscates the digital content by performing the inverse of the obfuscation protocol.
- Inventors:
- Issue Date:
- Research Org.:
- Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
- Sponsoring Org.:
- USDOE National Nuclear Security Administration (NNSA)
- OSTI Identifier:
- 1892965
- Patent Number(s):
- 11341217
- Application Number:
- 17/090,304
- Assignee:
- National Technology & Engineering Solutions of Sandia, LLC (Albuquerque, NM)
- Patent Classifications (CPCs):
-
G - PHYSICS G06 - COMPUTING G06F - ELECTRIC DIGITAL DATA PROCESSING
H - ELECTRICITY H03 - BASIC ELECTRONIC CIRCUITRY H03M - CODING
- DOE Contract Number:
- NA0003525
- Resource Type:
- Patent
- Resource Relation:
- Patent File Date: 11/05/2020
- Country of Publication:
- United States
- Language:
- English
Citation Formats
Corral, Celestino A. Enhancing obfuscation of digital content through use of linear error correction codes. United States: N. p., 2022.
Web.
Corral, Celestino A. Enhancing obfuscation of digital content through use of linear error correction codes. United States.
Corral, Celestino A. Tue .
"Enhancing obfuscation of digital content through use of linear error correction codes". United States. https://www.osti.gov/servlets/purl/1892965.
@article{osti_1892965,
title = {Enhancing obfuscation of digital content through use of linear error correction codes},
author = {Corral, Celestino A.},
abstractNote = {Technologies related to enhancing security of digital content are described. Linear error correction codes (LECCs) are employed for dual purposes: 1) to obfuscate digital content; and 2) to verify integrity of the digital content. A transmitter computing system obfuscates digital content based upon an obfuscation protocol, wherein the obfuscated digital content includes an LECC. A receiver computing system deobfuscates the digital content by performing the inverse of the obfuscation protocol.},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = {2022},
month = {5}
}
Save to My Library
You must Sign In or Create an Account in order to save documents to your library.
Works referenced in this record:
Wireless network security using randomness
patent-application, May 2009
- Xiao, Sheng; Gong, Weibo
- US Patent Application 12/277225; 20090138715
Self-synchronous packet scrambler
patent, November 1998
- Lang, Steven F.
- US Patent Document 5,835,602
System and method for fast and efficient searching of encrypted ciphertexts
patent-application, May 2020
- Rohloff, Kurt; Vaikuntanathan, Vinod; Shainski, Arina
- US Patent Application 16/102017; 20200151356
A method for sending digital data over a number of channels
patent-application, June 2020
- Cuellar, Jorge; Gasiba, Tiago
- US Patent Application 16/645813; 20200204354
Security flaws in 802.11 data link protocols
journal, May 2003
- Cam-Winget, Nancy; Housley, Russ; Wagner, David
- Communications of the ACM, Vol. 46, Issue 5
Enhancing embedded SRAM security and error tolerance with hardware CRC and obfuscation
conference, October 2015
- Kan, Senwen; Ottavi, Marco; Dworak, Jennifer
- 2015 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS)
A tutorial on CRC computations
journal, August 1988
- Ramabadran, T. V.; Gaitonde, S. S.
- IEEE Micro, Vol. 8, Issue 4