Cyber companion: attaching a secondary message to a primary one
First Claim
1. A method of securely transmitting messages comprising:
- obtaining a message m comprising characters to transmit, wherein the characters include one or more letters;
generating, by a computing device of a writer W, a primary message from the characters of the message by performing the following;
(a) generating a series of letter strings from the characters by rewriting the characters from the message m using a unary alphabet to identify a bit count for each letter from the message m, wherein the unary alphabet comprises a group of letters and corresponding bit counts and each letter in m is rewritten as a letter string comprising a bit string with a bit count identified as corresponding to a letter in the unary alphabet, wherein no two letters from the unary alphabet are represented by the same bit count and(b) combining each of the letter strings to form a message string as the primary message comprised of letter strings, wherein each letter string is bounded by a letter-string-start symbol and a letter-string-end symbol, and wherein the identities of the bits in one of the letter strings can be changed without changing the identity of the letter in the unary alphabet corresponding to the changed one of the letter strings;
adding a companion message comprising characters that are transmitted within the identities of the bits of the letter strings in the primary message, wherein the companion message is distinct from the primary message and in particular is generated by encrypting the primary message with a symmetric secret key of the writer W, wherein bits corresponding to a letter of the companion message cannot be changed without changing the letters of the companion message; and
receiving the primary message and companion message at a computing device of a first reader, wherein the first reader;
encrypts the primary message with a symmetric secret key of the first reader to generate a companion message for the first reader;
generates an updated companion message by performing an exclusive OR (XOR) operation between the companion message and the companion message of the first reader; and
transmits the primary message with the updated companion message to a computing device of a subsequent reader;
wherein the subsequent reader validates the writer W and the first reader using the secret symmetric key of writer W and the first reader known by the subsequent reader.
0 Assignments
0 Petitions
Accused Products
Abstract
Using Unary alphabet to express a cyber message, the identities of the message bits can be used to carry a companion message. The P (prime) message, and the C (companion) message can be related or unrelated. The C message may be used to authenticate, or to invalidate the P message and its writer. While the P message may be in the open, the C message may be limited to key-holding readers. The C message may be modified by successive readers while leaving the P message unchanged. A wide range of applications is available on account of the simple idea of writing the primary message via bit-count (ignoring bit identities), leaving the identity assignments to carry the companion message. Alice and Bob may exchange a large number of primary messages, where for most of them the companion message says: “ignore the primary message”. While both Alice and Bob, reading the companion message will regard only the proper messages, an eavesdropper will be thoroughly confused, or receive a misleading impression of the conversation between the two. If the C message is generated via a private key, then a reader of the P+C messages will be able to authenticate the prime message and its writer with the respective public key.
22 Citations
2 Claims
-
1. A method of securely transmitting messages comprising:
-
obtaining a message m comprising characters to transmit, wherein the characters include one or more letters; generating, by a computing device of a writer W, a primary message from the characters of the message by performing the following; (a) generating a series of letter strings from the characters by rewriting the characters from the message m using a unary alphabet to identify a bit count for each letter from the message m, wherein the unary alphabet comprises a group of letters and corresponding bit counts and each letter in m is rewritten as a letter string comprising a bit string with a bit count identified as corresponding to a letter in the unary alphabet, wherein no two letters from the unary alphabet are represented by the same bit count and (b) combining each of the letter strings to form a message string as the primary message comprised of letter strings, wherein each letter string is bounded by a letter-string-start symbol and a letter-string-end symbol, and wherein the identities of the bits in one of the letter strings can be changed without changing the identity of the letter in the unary alphabet corresponding to the changed one of the letter strings; adding a companion message comprising characters that are transmitted within the identities of the bits of the letter strings in the primary message, wherein the companion message is distinct from the primary message and in particular is generated by encrypting the primary message with a symmetric secret key of the writer W, wherein bits corresponding to a letter of the companion message cannot be changed without changing the letters of the companion message; and receiving the primary message and companion message at a computing device of a first reader, wherein the first reader; encrypts the primary message with a symmetric secret key of the first reader to generate a companion message for the first reader; generates an updated companion message by performing an exclusive OR (XOR) operation between the companion message and the companion message of the first reader; and transmits the primary message with the updated companion message to a computing device of a subsequent reader; wherein the subsequent reader validates the writer W and the first reader using the secret symmetric key of writer W and the first reader known by the subsequent reader. - View Dependent Claims (2)
-
Specification