scispace - formally typeset
Patent

Secure deterministic encryption key generator system and method

Reads0
Chats0
TLDR
In this article, an encryption key generator (100) is disclosed which is highly resistant to cryptographic analysis or brute force attacks, and which accommodates the destruction of an encrypted key after each use by providing for the recreation of the key without need of key directories or other encryption key storage processes.
Abstract
An encryption key generator (100) is disclosed which is highly resistant to cryptographic analysis or brute force attacks, and which accommodates the destruction of an encryption key after each use by providing for the recreation of the key without need of key directories or other encryption key storage processes. A constant value (51) and a secret E-Key Seed (50) are applied as an input to a bit-shuffling algorithm (52) to provide a first many-to-few bit mapping and produce a first pseudo-random number. The first pseudo-random number in turn is applied as an input to a secure one-way hash algorithm (53) to provide a second many-to-few bit mapping and produce a second pseudo-random number or message digest that may be truncated to a desired bit length to serve as a non-predictable but deterministic encryption key (55). Same constant value (51) and E-Key Seed (50) inputs to the key generator (100) provide the same message digest and hence the same key (55).

read more

Citations
More filters
Patent

Secure data parser method and system

TL;DR: A secure data parser as discussed by the authors parses data and then splits the data into multiple portions that are stored or communicated distinctly, which can be used to protect data in motion by splitting original data into portions of data, that may be communicated using multiple communications paths.
Patent

Method and apparatus for the secure identification of the owner of a portable device

TL;DR: In this paper, an authentication system is provided that includes a portable device and a decryption node, where an individual uses the portable device such as a portable devices like a cell phone to compute a challenge and a response.
Patent

Distributed, scalable cryptographic access control

TL;DR: In this article, the authors propose to publish resources in an encrypted form, using corresponding resource keys, published through resource key files, with the publications effectively restricted to authorized peer systems only by encrypting the resource keys in a manner only the authorized peer system are able to recover them.
Patent

State-varying hybrid stream cipher

TL;DR: In one embodiment, a state-varying hybrid stream cipher operating within a computing device as discussed by the authors comprises at least two software routines, one for dividing plain text into variable-sized blocks, and the other for converting plain text to cipher text based on an encryption key, an internal identifier and a percentage of random data value.
Patent

Method and apparatus for a non-revealing do-not-contact list system

TL;DR: In this article, a method and apparatus for a non-revealing do-not-contact list system in which a donotcontact list of one-way hashed consumer contact information is provided to a set of one or more entities is presented.
References
More filters
Patent

System and method for electronic transmission, storage and retrieval of authenticated documents

TL;DR: In this paper, the authors address the interoperability problem between PKI and CA from a different point of view, with a focus on establishing a trust environment suitable for the creation, execution, maintenance, transfer, retrieval and destruction of electronic original information objects that may also be transferable records.
Patent

Personal security system

TL;DR: In this paper, a method and apparatus for verifying the identity of a system user is presented, where each user has a token which processes an inputted seed to generate a stored value which is either a current seed value or a function thereof.
Patent

Method of generating a unique number for a smart card and its use for the cooperation of the card with a host system

TL;DR: In this paper, a smart card (1) which includes a random access memory RAM (10) and a read-only memory PROM (7) incorporating a production key (PK), a distributor key (MK), a bearer code (CP), and a serial number (NS) generates a unique number (NU) which is stored in the memory RAM(10) in the card after execution of a program which is specific of the card.
Patent

Computer access control system and method

TL;DR: In this paper, a password issuing device can store and generate passwords for a multiplicity of distinct protected host systems, each of which can store, decrypt, and display one or more random digits.
Patent

Method and apparatus for verifying the integrity of a file stored separately from a computer

TL;DR: In this paper, a method and apparatus for verifying a file stored separately from a computer to be identical with a previous version of the file, before using the file is presented, by following a defined procedure to generate a first identifier based on the contents of the previous version, storing this identifier locally on the computer, and storing the file at a separate storage location.