Information security via dynamic encryption with hash function
First Claim
1. A method of providing secure information, the method comprising regenerating a new encryption key with an encryption key, encrypted data, and a hash vector based upon an encryption key.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method providing secure information. An encryption key is regenerated by performing byte addition of an encryption key, encrypted data, and a hash vector based upon an encryption key. A hash vector is hashed by scanning indexed bytes of an encryption key and using indices and associated values of indices of an encryption key as indices of two bytes in the hash vector to be swapped. An authentication key is regenerated by performing byte addition of an authentication key, an auxiliary key, and a hash vector based upon an authentication key.
-
Citations
29 Claims
- 1. A method of providing secure information, the method comprising regenerating a new encryption key with an encryption key, encrypted data, and a hash vector based upon an encryption key.
-
8. A method of providing secure information, the method comprising the steps of:
-
generating n encryption keys;
encrypting n tracks of data records with n tracks of parallel encryption; and
regenerating an encryption key with an encryption key, a hash vector based upon an encryption key, and selected encrypted data. - View Dependent Claims (9)
-
-
10. A method of providing secure information, the method comprising the steps of:
-
encrypting a data record with a hash vector based upon an encryption key; and
regenerating an encryption key with an encryption key and encrypted data. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A system for providing secure information, the system comprising:
-
a source node;
a destination node;
a data stream created at said source node;
means for encrypting data of said data stream with a hash vector based upon an encryption key; and
means for regenerating a new encryption key with an encryption key, encrypted data, and a hash vector based upon an encryption key.
-
-
16. A method of authenticating one system node to another system node, the method comprising the steps of:
-
generating an authentication key at a node;
transmitting the authentication key to another node; and
starting a daemon at each node for regenerating a new authentication key with an authentication key, an auxiliary key, and a hash vector based upon an authentication key, and maintaining a corresponding number-regeneration-counter at each node. - View Dependent Claims (17, 18, 19, 20)
-
-
21. A method of validating data integrity, the method comprising the steps of:
-
buffering an encryption key and a hash vector based upon an encryption key at a source node;
encrypting a data record using a hash vector based upon an encryption key to yield a cipher record of a first point in time at a source node;
transmitting the encrypted data record to a destination node;
receiving a cipher from a destination node;
decrypting the received cipher from the destination node with a hash vector based upon an encryption key of a second point in time; and
comparing the decrypted received cipher to a data record. - View Dependent Claims (22)
-
-
23. A method of synchronizing one node to another node, the method comprising the steps of:
-
receiving a request from a first user to communicate with a second user along with an authentication key number regeneration count and a hashed value of an authentication key number regeneration count;
requesting an authentication key number regeneration count and a hashed value of an authentication key number regeneration count from a second user;
comparing a central authority authentication key number regeneration count to a user authentication key number regeneration count; and
aligning the authentication keys of a user and a central authority node according to the comparison. - View Dependent Claims (24, 25, 26, 27, 28, 29)
-
Specification