Encrypting message for secure transmission
First Claim
1. A method for communicating information between a host and a server in the absence of standard privacy protocols, comprising:
- generating a temporary asymmetric key pair at the host, wherein the temporary asymmetric key pair includes a temporary public key and a corresponding temporary private key;
encrypting the temporary public key with the server'"'"'s public key;
sending the encrypted temporary public key from the host to the server;
decrypting the host'"'"'s temporary public key with the server'"'"'s private key at the server;
generating random data at the server;
encrypting the random data with the host'"'"'s temporary public key;
sending the encrypted random data from the server to the host;
decrypting the encrypted random data using the host'"'"'s temporary private key at the host; and
stirring a pseudo-random number generator of the host using the random data generated by the server.
0 Assignments
0 Petitions
Accused Products
Abstract
A system, apparatus, and method are provided for enhancing entropy in a pseudo-random number generator (PRNG) using remote sources. According to one embodiment of the present invention, first, the PRNG'"'"'s internal state is initialized. Local seeding information is then obtained from a local host. For added security, additional seeding information is obtained from one or more remote entropy servers operating independently to each maintain a constantly updated state pool. Finally, the PRNG is stirred based upon the local seeding information, and the additional seeding information.
54 Citations
28 Claims
-
1. A method for communicating information between a host and a server in the absence of standard privacy protocols, comprising:
-
generating a temporary asymmetric key pair at the host, wherein the temporary asymmetric key pair includes a temporary public key and a corresponding temporary private key;
encrypting the temporary public key with the server'"'"'s public key;
sending the encrypted temporary public key from the host to the server;
decrypting the host'"'"'s temporary public key with the server'"'"'s private key at the server;
generating random data at the server;
encrypting the random data with the host'"'"'s temporary public key;
sending the encrypted random data from the server to the host;
decrypting the encrypted random data using the host'"'"'s temporary private key at the host; and
stirring a pseudo-random number generator of the host using the random data generated by the server. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus, comprising:
-
a host to communicate with a server in the absence of standard privacy protocols, the host to generate a temporary asymmetric key pair, wherein the temporary asymmetric key pair includes a temporary public key and a corresponding temporary private key, encrypt the temporary public key with the server'"'"'s public key, and send the encrypted temporary public key from the host to the server; and
the server, coupled with the host, to receive the temporary public key from the host, the server is further to decrypt the host'"'"'s temporary public key with the server'"'"'s private key, generate random data at the server, encrypt the random data with the host'"'"'s temporary public key, and send the encrypted random data to the host. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. A system, comprising:
-
a host computer system (host) to communicate with a server computer system (server) in the absence of standard privacy protocols, the host having a local host computer, the host to generate a temporary asymmetric key pair, wherein the temporary asymmetric key pair includes a temporary public key and a corresponding temporary private key, encrypt the temporary public key with the server'"'"'s public key, and send the encrypted temporary public key from the host to the server; and
the server, coupled with the host, the server having a remote entropy server to receive the temporary public key from the host, the server is further to decrypt the host'"'"'s temporary public key with the server'"'"'s private key, generate random data at the server, encrypt the random data with the host'"'"'s temporary public key, and send the encrypted random data to the host. - View Dependent Claims (17, 18, 19, 20, 21)
-
-
22. A machine-readable medium having stored thereon sets of instructions which, when executed by a machine, cause the machine to:
-
generate a temporary asymmetric key pair at the host, wherein the temporary asymmetric key pair includes a temporary public key and a corresponding temporary private key;
encrypt the temporary public key with the server'"'"'s public key;
send the encrypted temporary public key from the host to the server;
decrypt the host'"'"'s temporary public key with the server'"'"'s private key at the server;
generate random data at the server;
encrypt the random data with the host'"'"'s temporary public key;
send the encrypted random data from the server to the host;
decrypt the encrypted random data using the host'"'"'s temporary private key at the host; and
stir a pseudo-random number generator of the host using the random data generated by the server. - View Dependent Claims (23, 24, 25, 26, 27, 28)
-
Specification